Advisors provide a continuous flow of information on the topics covered by each practice, including consultant insights and reports from the front lines, analyses of trends, and breaking new ideas. Advisors are delivered directly to your email inbox, and are also available in the resource library.

How Enterprise IT Uses Utility Computing

Jeffrey Kaplan

In April 2005, Cutter Consortium surveyed nearly 100 enterprise IT professionals regarding their views on utility computing. When asked how they define utility computing, the majority of all survey participants defined it as "deploying computing power on an as-needed basis."

"How do you define utility computing?"


The Contemporary Project Landscape

Robert Wysocki
  For more information on Cutter Consortium's Agile Software Development & Project Management advisory service, please contact Dennis Crowley at +1 781 641 5125 or e-mail dcrowley@cutter.com

Short Lists

Steve Andriole

10 Practices for VMO Success

Brian Dooley

Information and communications environments have grown in complexity, and single vendors are less likely to be able to provide the complete array of services required. Therefore, businesses are less likely to outsource to a single contractor.


A New Rap for Enterprise Computing

Borys Stokalski
  For more information on Cutter Consortium's Enterprise Architecture advisory service, please contact Dennis Crowley at +1 781 641 5125 or e-mail dcrowley@cutter.com.

Making Policy

Robert Charette

A little over three years ago now, the Sarbanes-Oxley (SOX) legislation was passed into law. Now is an appropriate time to review the US Security and Exchange Commission's (SEC) estimates of the cost of SOX, especially the compliance with Section 404, which requires companies to implement internal controls on their financial transactions and information.


Measurement Shock, Self-Loathing, and Organizational Learning

Michael Mah

Last week while playing tennis, my friend Holly sent her forehand sailing high into an adjacent court. "Aargh," she cried. Then, with a casual grin, she said, "That's what I love about this game -- it gives you plenty of chances to practice self-loathing." She reminded me of Lucy from the "Peanuts" comics.


The Serious but Unfinished Business of Software Quality

Robert Austin
People like to complain about software quality, and with good reason. Who has not experienced the stages of grief (concern, fear, horror, anger, resignation) that follow a "fatal exception" notification indicating that you've lost work? Yes, software quality should be better. But software users' self-righteous complaining doesn't help the situation.

Side Channels: Privacy's Stealth Enemy

Vasilios Katos

When it comes to protecting my personal data, I feel both organizationally and technologically handicapped. Of course, there is the Data Protection Act (DPA), which applies mostly to countries of the western world, but how would that actually protect my personal data?


Far-Flung Teams Increase Intellectual Capital

Jessica Lipnack, Jeffrey Stamps, Jeffrey Stamps

TrueDemand for RFID Analysis

Curt Hall

In a BI Advisor I wrote back in February 2004, I said that increased use of radio frequency identification (RFID) technology would lead to new analytic applications for supply-chain analysis and operational business intelligence (BI). (See, " BI and Radio Frequency Identification," 3 February 2004.)


Sourcing: What Works for You? In-, Off-, or Near-Shore?

Tushar Hazra
  For more information on Cutter Consortium's Sourcing and Vendor Relationships advisory service, please contact Dennis Crowley at +1 781 641 5125 or e-mail dcrowley@cutter.com.

(Paper) Documentation Considered Harmful

Bruce Taylor

It's been part of programmers' training since the earliest days:


Enterprise Security Governance

Julia Allen

What does it mean to govern for enterprise security or, stated differently, to govern an organization to achieve and sustain an acceptable or adequate level of security?

Our definition of governing for enterprise security (GES) is


What's the End User Got to Do with IT? Part 3

Ken Orr
  What's the End User Got to Do with IT? Part 1 Part 2

Align IT Strategies for Delivering Right Business Value: Developing Effective IT Strategies

Tushar Hazra

In my previous Advisor (" Align IT Strategies for Delivering Right Business Value: Setting the Ground Rules," 20 July 2005), I discussed setting ground rules to establish and manage IT alignment initiatives and shared my observations from the practice. In this Advisor, I focus on the concepts relevant to developing strategies.