Advisors provide a continuous flow of information on the topics covered by each practice, including consultant insights and reports from the front lines, analyses of trends, and breaking new ideas. Advisors are delivered directly to your email inbox, and are also available in the resource library.
How Enterprise IT Uses Utility Computing
In April 2005, Cutter Consortium surveyed nearly 100 enterprise IT professionals regarding their views on utility computing. When asked how they define utility computing, the majority of all survey participants defined it as "deploying computing power on an as-needed basis."
"How do you define utility computing?"
The Contemporary Project Landscape
A Pragmatic Approach to Agile Software Development with Offshoring
Managing Organizational Fire
Short Lists
10 Practices for VMO Success
Information and communications environments have grown in complexity, and single vendors are less likely to be able to provide the complete array of services required. Therefore, businesses are less likely to outsource to a single contractor.
A New Rap for Enterprise Computing
Managing Change -- Six Keys to Success, Part 2
Making Policy
A little over three years ago now, the Sarbanes-Oxley (SOX) legislation was passed into law. Now is an appropriate time to review the US Security and Exchange Commission's (SEC) estimates of the cost of SOX, especially the compliance with Section 404, which requires companies to implement internal controls on their financial transactions and information.
Measurement Shock, Self-Loathing, and Organizational Learning
Last week while playing tennis, my friend Holly sent her forehand sailing high into an adjacent court. "Aargh," she cried. Then, with a casual grin, she said, "That's what I love about this game -- it gives you plenty of chances to practice self-loathing." She reminded me of Lucy from the "Peanuts" comics.
The Serious but Unfinished Business of Software Quality
Book Review: Software Factories
Side Channels: Privacy's Stealth Enemy
When it comes to protecting my personal data, I feel both organizationally and technologically handicapped. Of course, there is the Data Protection Act (DPA), which applies mostly to countries of the western world, but how would that actually protect my personal data?
Far-Flung Teams Increase Intellectual Capital
TrueDemand for RFID Analysis
In a BI Advisor I wrote back in February 2004, I said that increased use of radio frequency identification (RFID) technology would lead to new analytic applications for supply-chain analysis and operational business intelligence (BI). (See, " BI and Radio Frequency Identification," 3 February 2004.)
Sourcing: What Works for You? In-, Off-, or Near-Shore?
(Paper) Documentation Considered Harmful
It's been part of programmers' training since the earliest days:
Enterprise Security Governance
What does it mean to govern for enterprise security or, stated differently, to govern an organization to achieve and sustain an acceptable or adequate level of security?
Our definition of governing for enterprise security (GES) is
Align IT Strategies for Delivering Right Business Value: Developing Effective IT Strategies
In my previous Advisor (" Align IT Strategies for Delivering Right Business Value: Setting the Ground Rules," 20 July 2005), I discussed setting ground rules to establish and manage IT alignment initiatives and shared my observations from the practice. In this Advisor, I focus on the concepts relevant to developing strategies.

