Advisors provide a continuous flow of information on the topics covered by each practice, including consultant insights and reports from the front lines, analyses of trends, and breaking new ideas. Advisors are delivered directly to your email inbox, and are also available in the resource library.

Creating Stronger Financial Models for Offshore Projects: Part I

Rick Brenner
  Creating Stronger Financial Models for Offshore Projects series: Part I Part II

Only Eat When Hungry

Ken Schwaber
  For more on agile software development, join Cutter's Agile Software Development and Project Management advisory service.

Agile Data Modeling, Part 2

Ken Orr
  Agile Data Modeling series: Part 1 Part 2

Risk Management: A Simple, Stratified Approach, Part 1

Michael Harris

Risk management is getting to be too complex to use on anything less than a major, multimillion-dollar project. The use of risk management on IT programs is overly complicated. This two-part Bulletin shows one way of cutting through the clutter of risk management tools, status reports, and metrics by adopting a simple, stratified approach.


Exploring SOA Options

Paul Harmon

The Loss (and Recovery) of Trust

Sam Bayer
  For more on project management, see the March 2004 issue of Cutter Benchmark Review. For more information, contact Cutter Consortium at +1 781 641 9876, fax +1 781 648 1950, or e-mail service@cutter.com.

 


The Strategic IT Plan: The Supply Side of Business-IT Planning

Bob Benson, Tom Bugnitz, Tom Bugnitz, Tom Walton, William Walton, William Walton, Kaleb Walton

Keeping the Wizard's Curtain Closed: Protecting Personal Data

Scott Nathan
  For more on sourcing and vendor relationships, join Cutter's Sourcing and Vendor Relationships advisory service.

Agile Control

Jim Highsmith

Security Alignment

William Ulrich

Security is a growing requirement facing companies opening their systems to the Internet. Security experts say that companies are just beginning to understand the implications of allowing outside entities past their firewall using broadband and other emerging technologies. The following questions help determine how well your security strategy is aligned with business requirements.


Why Real Options Is the Wrong Approach to Software Valuation

Martha Amram

A number of recent academic papers have attempted to apply real options to software design. Real options is the application of mathematical models from the world of financial options to real or non-financial assets. Because software developers lack a correct and intuitively comfortable way to value their projects, academics believe real options can help.