Advisors provide a continuous flow of information on the topics covered by each practice, including consultant insights and reports from the front lines, analyses of trends, and breaking new ideas. Advisors are delivered directly to your email inbox, and are also available in the resource library.
Sourcing and Risk: Information Security's View
BEA Buys Plumtree Software
Managing Technology Due Diligence: Packaging and Communications
The Other Face of Outsourcing
Developing Collaborations/Partnerships
Relational and Object-Oriented Database Design in the 21st Century -- Part 3
Align IT Strategies for Delivering Right Business Value: Recognizing the Complexities of Risk Management and Governance
In my previous two Advisors (" Align IT Strategies for Delivering Right Business Value: Setting the Ground Rules," 20 July 2005, and " Align IT Strategies for Delivering Right Business Value: Developing Effective IT Strategies," 3 August 2005), I discussed setting ground rules to establish and
Constraints on Wireless Applications and Development Challenges
The explosive growth of the market for wireless devices is stimulating widespread efforts to clone almost any technology developed for desktop computers to wireless handheld devices connected to a wireless network. This is challenging, as mobile applications must work within the daunting constraints of devices that have the following characteristics:
Summer Jigsaw Puzzles and Project Management
During this summer's family week at the beach, my wife bought a 1,000-piece jigsaw puzzle for us to assemble during hot afternoons and periods of rain. I noticed several things about assembling a jigsaw puzzle that may apply to projects and project management.
How Enterprise IT Uses Utility Computing
In April 2005, Cutter Consortium surveyed nearly 100 enterprise IT professionals regarding their views on utility computing. When asked how they define utility computing, the majority of all survey participants defined it as "deploying computing power on an as-needed basis."
"How do you define utility computing?"
The Contemporary Project Landscape
A Pragmatic Approach to Agile Software Development with Offshoring
Managing Organizational Fire
Short Lists
10 Practices for VMO Success
Information and communications environments have grown in complexity, and single vendors are less likely to be able to provide the complete array of services required. Therefore, businesses are less likely to outsource to a single contractor.
A New Rap for Enterprise Computing
Managing Change -- Six Keys to Success, Part 2
Making Policy
A little over three years ago now, the Sarbanes-Oxley (SOX) legislation was passed into law. Now is an appropriate time to review the US Security and Exchange Commission's (SEC) estimates of the cost of SOX, especially the compliance with Section 404, which requires companies to implement internal controls on their financial transactions and information.
Measurement Shock, Self-Loathing, and Organizational Learning
Last week while playing tennis, my friend Holly sent her forehand sailing high into an adjacent court. "Aargh," she cried. Then, with a casual grin, she said, "That's what I love about this game -- it gives you plenty of chances to practice self-loathing." She reminded me of Lucy from the "Peanuts" comics.

