Advisors provide a continuous flow of information on the topics covered by each practice, including consultant insights and reports from the front lines, analyses of trends, and breaking new ideas. Advisors are delivered directly to your email inbox, and are also available in the resource library.
Using Frame Technology to Capitalize Software Components
Capital assets are long-term investments whose ROIs are expected to more than repay their capital. Conventional software components rarely satisfy this definition. A prominent reason is that our industry demands components be used as is, much like physical parts. Yet unlimited malleability is software's greatest asset (and its greatest liability).
Agile and SOA -- Two Dimensions of a Corporate IT Strategy
In his recent Advisor "Achieving Agile Software: Fail to Scale -- Prepare to Fail" (25 June 2009), Cutter Senior Consultant Paul Allen had raised the issue of the connection between agile and SOA.
And the Walls Come A-Tumblin' Down
Dispelling the Common Myths Regarding SaaS
Cloud computing and software as a service (SaaS) have captured plenty of industry and press attention, but they have also created an equal share of confusion and even controversy. While there are solid reasons to be cautious about how to approach these rapidly evolving Web-based alternatives, there is also growing evidence that they are no passing fad.
Crowdsourcing for Fun and Profit
Lord of Their Ring: One to Rule Them All
If You Have to Justify IT ... Look Carefully
Out of this World: The Semantic Web 3.0 Mashup Universe
The Internet is undergoing a rapid transformation from a web of hyperlinked documents to a web of semantically linked data. Recent observations lead me to believe we're seeing the emergence of what may qualify as Web 3.0 (or Semantic Web) applications [1]. These applications are consumers and providers of semantically linked data.
Contractor Under Your Skin? Seek Underlying Values
We all know by now that the relationship between the parties of an outsourcing contract is paramount to the success of the deal. While there is a fair bit of advice out there, it is mainly process-oriented (e.g., communicate frequently, plan together, have improvement workshops). But what if you genuinely do not like your counterpart on the other side?
Including Innovation in the Game of Survival
Making Choices: The Tools We Use
Finally! Cut, Copy, Paste, and Search on iPhone
Managing the Complete Product Lifecycle, Part III: The Marketing Product Manager
In Part II of this series (see "Managing the Complete Product Lifecycle, Part II: The Technical Product Manager," 3 June 2009), we talked about the product manager role that is primarily focused on the technical integrity of the product.
Key Steps to Ensuring Successful EA
Recently, we've written about some core strategies that help ensure the success of enterprise architecture, such as developing key EA capabilities (see "Six Key Capabilities on Road to EA Success," 18 March 2009) and employing an iterative and incremental approach to EA programs (see "Take Iterative Steps: Start Small, Empower Team Via Vision, Value," 29 April 2009).
Real Life: Stranger, and Often More Threat-Filled, Than Fiction
Many information security and privacy practitioners spend a lot of time thinking up hypothetical situations to use in training content for information security and privacy as well as awareness communications. What a waste of valuable time! All you need to do is scan the headlines for a few minutes, and you're sure to find many security and privacy incidents that have occurred throughout the world.
The Voices We Value
Making business decisions is never easy. It becomes progressively more complicated as those around us offer their "two cents' worth" about how we should act or what practices we should adopt. And the sheer number of those around us sometimes means that we receive input from a host of different parties, all with different perspectives.
I'm Not a Risk Manager, I'm a Risk Ecologist
Alpha Raises Level of Research
We Need to Improve Financial Management in IT Governance
We've recently spent considerable time in IT organizations in the US and in Latin America dealing with aspects of IT financial management. Through the Cutter Benchmark Review, we've also conducted studies for four years about IT budgeting (see "Linking IT Budgeting, Governance, and Value," Vol. 8, No. 7; "The IT Budget: The Centerpiece of IT Governance," Vol. 7, No.
Risk Assessment Gets to the Bottom of Security Basics
In recent Advisors, I have talked about data security and perimeter security (see "Are You at the Controls? Do You Know Where Your Data Is?" 10 June 2009 and "Is Your Perimeter Secure?" 17 June 2009).
PowerPoint Soufflé Delite
1 (14 oz.) piece informative content
1 (10 oz.) default design template, whole
3 cups bullet list
1/4 cup chart wizard output
6 animations, coarsely chopped
3 tablespoons slide transition
2 teaspoons clip art
2 teaspoons banner word art
Preparation:Preheat oven to 375ºF.