Advisors provide a continuous flow of information on the topics covered by each practice, including consultant insights and reports from the front lines, analyses of trends, and breaking new ideas. Advisors are delivered directly to your email inbox, and are also available in the resource library.

Side Channels: Privacy's Stealth Enemy

Vasilios Katos

When it comes to protecting my personal data, I feel both organizationally and technologically handicapped. Of course, there is the Data Protection Act (DPA), which applies mostly to countries of the western world, but how would that actually protect my personal data?


Far-Flung Teams Increase Intellectual Capital

Jessica Lipnack, Jeffrey Stamps, Jeffrey Stamps

TrueDemand for RFID Analysis

Curt Hall

In a BI Advisor I wrote back in February 2004, I said that increased use of radio frequency identification (RFID) technology would lead to new analytic applications for supply-chain analysis and operational business intelligence (BI). (See, " BI and Radio Frequency Identification," 3 February 2004.)


Sourcing: What Works for You? In-, Off-, or Near-Shore?

Tushar Hazra
  For more information on Cutter Consortium's Sourcing and Vendor Relationships advisory service, please contact Dennis Crowley at +1 781 641 5125 or e-mail dcrowley@cutter.com.

(Paper) Documentation Considered Harmful

Bruce Taylor

It's been part of programmers' training since the earliest days:


Enterprise Security Governance

Julia Allen

What does it mean to govern for enterprise security or, stated differently, to govern an organization to achieve and sustain an acceptable or adequate level of security?

Our definition of governing for enterprise security (GES) is


What's the End User Got to Do with IT? Part 3

Ken Orr
  What's the End User Got to Do with IT? Part 1 Part 2

Align IT Strategies for Delivering Right Business Value: Developing Effective IT Strategies

Tushar Hazra

In my previous Advisor (" Align IT Strategies for Delivering Right Business Value: Setting the Ground Rules," 20 July 2005), I discussed setting ground rules to establish and manage IT alignment initiatives and shared my observations from the practice. In this Advisor, I focus on the concepts relevant to developing strategies.


Building a Safe Information-Sharing Environment

Ken Orr

Since 9/11, enormous effort has been devoted to answering one basic question: "Why can't our intelligence agencies share critical information?" Indeed, following the attacks, various commissions and public agencies have devoted a large percentage of their time to solving the information-sharing problem.


Corporate and Team Culture Affects What Is Rewarded

Johanna Rothman
  For more information on the Cutter IT Journal, please contact Dennis Crowley at +1 781 641 5125, or e-mail dcrowley@cutter.com.

InfoSec Tipping Point

Robert Charette

Tipping points are hard to recognize until well after the fact. But if you look closely, patterns start to emerge that indicate that the information security tipping point is coming or possibly has been reached already.


Managing IT Innovation: Spotting the Next Big Thing

Robert Austin
How should companies scan the horizon for the next big thing? How should people who see an important new thing alert decisionmakers?

The Coming Wave of Demanding Business Managers

Bob Benson, Tom Bugnitz, Tom Bugnitz, Tom Walton, William Walton, William Walton, Kaleb Walton

Process Perspective Is Essential for Ensuring Data Protection

Curt Hall
  For more information on Cutter Consortium's Business Intelligence advisory service, please contact Dennis Crowley at +1 781 641 5125, or e-mail dcrowley@cutter.com.