Advisors provide a continuous flow of information on the topics covered by each practice, including consultant insights and reports from the front lines, analyses of trends, and breaking new ideas. Advisors are delivered directly to your email inbox, and are also available in the resource library.

Why Agile Fails at Scale: The Human Side

Mark Levison

My Cutter colleagues will give you excellent advice on some of the key elements to making Lean-Agile work at scale. Even with their advice, however, implementing any large-scale change is very difficult.


10 Neuroscience Facts for Architects

Mike Rosen

In my last Advisor (see "Take a SCARF to Architecture Reviews," 30 November 2011), I wrote about the SCARF model (status, certainty,


Shopycat and Muppet: Social Analytics Fueling the Next Generation of E-Commerce Applications

Curt Hall

The latest news to set the social analytics world buzzing is retailing giant Walmart's "Shopycat" social shopping application for Facebook.


Will History Repeat Itself? The Pitfalls of Blinkered Views and the Horseless Carriage Syndrome

Annie Shum

When making investment decisions that could impact the business for multiple decades, it is vital to take a measured approach. Forward-thinking leaders and stakeholders should evaluate choices and trade-offs based on a long-term view with a broad historical perspective.


Repurposing the Business Analysis Practice for Greater Value

Neal Mcwhorter

The business analysis profession is in the midst of change. Work is underway within organizations and associations to formalize and standardize what it means to be a business analyst (BA). The role has had a long and tortuous existence. A child of necessity, the role evolved to bridge the gap between what those responsible for operating an organization wanted to do and what those responsible for implementing technology were able to deliver.


Testing Assumptions About Security Awareness

Shari Pfleeger

It's clear that our once-a-year, work-your-way-through-a-slide-set approach to computer security training doesn't work. Even with this training, people still write down their passwords, click on links in emails from untrusted sources, and download free software with unknown provenance. For example, last year, 10,000 New York State employees were sent a phishing email to test their ability to recognize suspicious email and links. Three-quarters of the recipients opened the email, and 17% clicked on the embedded link.


Social Media Analysis for Reputation Management

Curt Hall

If there were any lingering doubts as to social media's potential to attack an organization's brand or reputation, they now have been laid to rest. The most recent incident involves an undercover video circulated by an animal rights group that shows alleged cruelty at a


Birds, Bats, Dandelions, Dogs, Transformers, and Convergent Evolution

Vince Kellen

In case you have forgotten your high school biology, convergent evolution occurs when different organisms from different genetic lineages acquire the same trait. Bats and birds both have wings, even though they do not share any ancestor with wings.


To Change or Not to Change?

Markus Gartner

David Anderson describes Kanban as an evolutionary change method.1 In comparison to other agile methods, Kanban can be introduced with little changes. But what are the differences between different methods? And is there a way to handle changes more successfully?


Take a SCARF to Architecture Reviews

Mike Rosen

I've been doing architecture for close to 20 years now and have built my practices based on what I've read, studied, and researched, and also from my experience of what works with clients.


Business Architecture on the March

William Ulrich

[From the Editor: This week's Advisor is from William Ulrich's introduction to the November 2011 issue of Cutter IT Journal "Business Architecture in Practice: Lessons from the Trenches" (Vol. 24, No. 11).


Measuring Collaborative Value

David Coleman

For the last decade I have been asked, "What is the ROI for collaboration?" I have come to several conclusions about this: one, that it is the wrong question to ask (and is a trap in itself) and two, everyone wants collaboration, but no one seems willing to pay fo


Is It Time to Move to Plan G, or is It Plan H?

Robert Charette

One of my favorite sayings is from former US President Teddy Roosevelt, who once said that “Risk is like fire: If controlled it will help you; if uncontrolled it will rise up and destroy you.”


Security Is the Name of the Game When It Comes to Mobile Device Management

Curt Hall

Mobility is now one of the top strategic priorities for organizations. In fact, supporting mobility is seen as so important that some organizations are offering employees the option of using their own personal devices.


Cloud Computing: Checking for Blind Spots

Suresh Malladi

Cloud computing discussions are fraught with apprehension about security, privacy, interoperability, reliability, and so on. While the advocates of cloud computing emphasize the importance of IT governance to address these issues,1 most of the practitioner literature is confined to surface-level analysis of the cloud computing concerns. Here I will focus on the nuances of some issues. In doing so, my first goal is to stimulate more thought about all issues that can mar cloud computing.


Big or Little, Devops Needs a Complete Picture

Hillel Glazer

The Cutter IT Journal from August 2011 asks, "Devops: A Software Revolution in the Making?" (Vol. 24, No.


Agile Analytics: Evolving Excellent Data Models and Architectures

Ken Collier

Last month I began an Advisor series that I am unofficially calling the "Scrum Ain't Enough" series (see "Agile


Social Media: A Roadmap for Reasoned Adoption

Claude Baudoin

What should your "enterprise social media adoption roadmap" look like?


Anything Measurable Will Be Measured

Israel Gat

Consider this Advisor a very pragmatic recommendation to the software development manager/director/VP. I have a feeling that the opinion I express here might get me in hot water, but what would life be like without some risk?


Considerations for Scalability

Mike Rosen

I was recently asked by a client to evaluate a product in terms of scalability. The client had invested in a custom case management system that had 100 users and wanted to know whether the current architecture would support scaling to 3,000 users.


Security and the Enterprise

Dan Shoemaker

Security of information is a hot topic these days. That is probably because cyber crime has reached a level of popularity that far outstrips the drug trade in terms of ROI for everybody from old-fashioned Mafiosi types to any kid in the Ukraine with a computer. And given the fact that crime on the Internet is all about money, any CEO who does not take all of the steps necessary to secure their organization against cyber attacks is rolling the dice with their company's assets. At least that's what current doctrine would like you to believe.


Toward a Knowledge Architecture

Claude Baudoin

First came the realization that the collective knowledge of an organization or, for that matter, the individual knowledge of its members, is not solely held in libraries of documents.


Reflections on Innovation, Part II: A Useful Idea -- Special Things

Lee Devin

In the first installment of this Advisor series (Reflections on Innovation, Part I: An Idea, 29 September 2011), I suggested that you can conceive the idea of something -- its perfect,