Advisors provide a continuous flow of information on the topics covered by each practice, including consultant insights and reports from the front lines, analyses of trends, and breaking new ideas. Advisors are delivered directly to your email inbox, and are also available in the resource library.
Business Process Frameworks, Enterprise Patterns, and MDA
I've been concerned for some time with how one can simplify and accelerate the development of large-scale business processes. I've begun to use the term second-generation BP to describe business process frameworks like the Supply Chain Council's SCOR and the TeleManagement Forum's eTOM/NGOSS architecture.
Agile MDA
Model-Driven Architecture (MDA) is a broad church covering several approaches to model-driven development. People often think of models as blueprints that are filled in with code. Model-driven development automates the transformations among these several models. That is, MDA is commonly viewed as supporting "heavyweight," process-heavy modeling techniques.
ITO and BPO: Management Fads?
Don't Crack the Box
Real-Time Vision
Effective Risk Management Is a Process, Not an Outcome
Components and the Web
Whatever happened to all the arguments about component standards? A few years ago, it was popular to talk of DCOM/.NET and EJB/J2EE and compare their relative chances of success. Some comparisons would even include the Object Management Group's (OMG) CORBA Component standard.
Measurable Success
Smartsourcing IT Projects
Enterprise Information Portals and Web Services
Here's another interesting finding based on the results of a Cutter survey conducted last September that asked 127 end-user organizations of various sizes located worldwide questions designed to measure the adoption and use of enterprise information portals (EIPs) in conjunction with other information technologies and business strategies.
Managing Risk in Software Process Improvement
The Principles of Agile Project Management, Part 1
Combatting Malicious Software, Part 2
In the first Bulletin in this two-part series (" Best Practices for Combatting Malicious Software, Part 1," 4 March 2004), I began an examination of the components that must be considered when developing an information security program. In this article, I conclude that discussion.
When Not to Kill an IT Project
Recently, one of my clients and I were discussing a project that his team had deployed some time ago. It was a real success story in risk management. The team had skillfully managed the deadline and the scope, using project simulations of where things were heading, and delivered within two weeks of their 90% probability date.
The Coming Consolidation
The Business Value of Software Architecture
Cost Reduction Negotiation Strategies
Corporate Use of Text Mining in Enterprise Information Portals
Here's an interesting finding based on the results of a Cutter survey (conducted last September), which asked 127 end-user organizations of various sizes located worldwide questions designed to measure the adoption and use of enterprise information portals (EIPs) in conjunction with other information technologies and business strategies.

