Advisors provide a continuous flow of information on the topics covered by each practice, including consultant insights and reports from the front lines, analyses of trends, and breaking new ideas. Advisors are delivered directly to your email inbox, and are also available in the resource library.
Book Review: Software Factories
Side Channels: Privacy's Stealth Enemy
When it comes to protecting my personal data, I feel both organizationally and technologically handicapped. Of course, there is the Data Protection Act (DPA), which applies mostly to countries of the western world, but how would that actually protect my personal data?
Far-Flung Teams Increase Intellectual Capital
TrueDemand for RFID Analysis
In a BI Advisor I wrote back in February 2004, I said that increased use of radio frequency identification (RFID) technology would lead to new analytic applications for supply-chain analysis and operational business intelligence (BI). (See, " BI and Radio Frequency Identification," 3 February 2004.)
Sourcing: What Works for You? In-, Off-, or Near-Shore?
(Paper) Documentation Considered Harmful
It's been part of programmers' training since the earliest days:
Enterprise Security Governance
What does it mean to govern for enterprise security or, stated differently, to govern an organization to achieve and sustain an acceptable or adequate level of security?
Our definition of governing for enterprise security (GES) is
Align IT Strategies for Delivering Right Business Value: Developing Effective IT Strategies
In my previous Advisor (" Align IT Strategies for Delivering Right Business Value: Setting the Ground Rules," 20 July 2005), I discussed setting ground rules to establish and manage IT alignment initiatives and shared my observations from the practice. In this Advisor, I focus on the concepts relevant to developing strategies.
ESB Goes Open Source
Building a Safe Information-Sharing Environment
Since 9/11, enormous effort has been devoted to answering one basic question: "Why can't our intelligence agencies share critical information?" Indeed, following the attacks, various commissions and public agencies have devoted a large percentage of their time to solving the information-sharing problem.
Business Objects Buys SRC Software
Corporate and Team Culture Affects What Is Rewarded
Managing Change -- Six Keys to Success, Part 1
InfoSec Tipping Point
Tipping points are hard to recognize until well after the fact. But if you look closely, patterns start to emerge that indicate that the information security tipping point is coming or possibly has been reached already.

