Advisors provide a continuous flow of information on the topics covered by each practice, including consultant insights and reports from the front lines, analyses of trends, and breaking new ideas. Advisors are delivered directly to your email inbox, and are also available in the resource library.
Why XP Matters to You, Now More Than Ever
Capability Cases
Katrina Forces a Hard Look at Risk
Big Iron
Enhancing IT's Image
Pitney Bowes Buys Data Quality Vendor FirstLogic
Pitney Bowes is acquiring data quality tools vendor FirstLogic for approximately US $50.3 million. Pitney Bowes plans to integrate FirstLogic's specialized data cleansing and enhancement technology with its own data quality, enterprise mail, and document management systems, thus further solidifying its position as a major player in the market for such products and services.
Portfolio Management for Small Organizations: Right-Sizing
Knowledge Management for Software Projects
Security Strategy Questions
Determining the range of actions that an organization needs to take to reduce security risk to an adequate or acceptable level depends on what an organization needs to protect and what it needs to prevent. Consider the following questions from an enterprise perspective:
Security and Privacy in a Wireless World
"We Know What the Business Wants"
EDA Is Part of SOA, Not Separate
Event-driven architecture (EDA) has been at the center of an architectural controversy lately. The basic question is: Is EDA the same as service-oriented architecture (SOA), part of an SOA, or different than SOA? Let's examine what EDA is and put the debate into an architectural context to determine how EDA and SOA relate.
What Metrics Say About XP
Frothy eloquence neither convinces nor satisfies me. I am from Missouri. You have got to show me. -- Missouri Congressman Willard Duncan Vandiver, 1899
Sourcing and Risk: Information Security's View
BEA Buys Plumtree Software
Managing Technology Due Diligence: Packaging and Communications
The Other Face of Outsourcing
Developing Collaborations/Partnerships
Relational and Object-Oriented Database Design in the 21st Century -- Part 3
Align IT Strategies for Delivering Right Business Value: Recognizing the Complexities of Risk Management and Governance
In my previous two Advisors (" Align IT Strategies for Delivering Right Business Value: Setting the Ground Rules," 20 July 2005, and " Align IT Strategies for Delivering Right Business Value: Developing Effective IT Strategies," 3 August 2005), I discussed setting ground rules to establish and
Constraints on Wireless Applications and Development Challenges
The explosive growth of the market for wireless devices is stimulating widespread efforts to clone almost any technology developed for desktop computers to wireless handheld devices connected to a wireless network. This is challenging, as mobile applications must work within the daunting constraints of devices that have the following characteristics:
Summer Jigsaw Puzzles and Project Management
During this summer's family week at the beach, my wife bought a 1,000-piece jigsaw puzzle for us to assemble during hot afternoons and periods of rain. I noticed several things about assembling a jigsaw puzzle that may apply to projects and project management.

