Advisors provide a continuous flow of information on the topics covered by each practice, including consultant insights and reports from the front lines, analyses of trends, and breaking new ideas. Advisors are delivered directly to your email inbox, and are also available in the resource library.

CMM in an Agile World

Ken Schwaber

Politics and Risk Management

Jim Highsmith

"Can-do thinking makes risk management impossible. Since acknowledging real risk is defeatism, the risk management function in a can-do organization is restricted to dealing with those smallish risks that can be mitigated by quick action. That means you confront all the risks except the ones that really matter." (Tom DeMarco, Why Does Software Cost So Much? .)


What the *Wall Street Journal* Didn't Say

Ed Yourdon

Offshore outsourcing is a big deal these days, especially in the IT field. And because I made dire predictions about the phenomenon in a 1992 book entitled Decline and Fall of the American Programmer , I've been getting lots of phone calls from curious journalists and unemployed programmers lately.


Let Business Vision Define Enterprise Architecture

Peter Herzum

In an ideal world, enterprise architecture would be defined within a well-articulated business vision and business strategy. These would provide the focus and context to the IT strategy and to the IT organization as a whole, particularly to the enterprise architecture.


The Quantum Leap to Perfect Data

Michael Brackett

Disparity of the data resource in most public- and private-sector organizations is a truism. Data disparity arises for the following reasons:


Be (A)ware of Proprietary Technology

Chris Verhoef

When outsourcing application development, there are a few things you can do to reduce your risks through the vendor selection process. For a start, it is easy to fall prey to comparing contractors on a cost-only basis. While cost is important, it should not be treated separately from, say, a contractor's use of proprietary technology and its position in the marketplace.


Artificial Intelligence: Still Alive and Well

Curt Hall
Still alive and well Still alive and well Every now and then I know it's kinda hard to tell ... But I'm still alive and well

Agile from First Principles

Tom Bragg

Many of us today believe that an agile methodology provides benefits in improved code quality, better fit to requirements, and lower risk of failure. However, a common criticism leveled at this approach is that the path of development may meander, involving rework due to a lack of up-front requirements and architecture definition.


CRM As a Web Service

Paul Harmon

At the beginning of October, Siebel systems announced that it will offer its customer relationship management (CRM) modules as Web services, as part of IBM's OnDemand program.


Project Jumpstart

Neil Roodyn

I was recently commissioned to assist a development team in making some technical decisions that would help them migrate to .NET. Meeting with the developers briefly beforehand allowed me to understand some of their issues.


Alignment the Old-Fashioned Way: Aggressively Managing Risk

Robert Charette
  For more on risk management, join Cutter's Risk Management Intelligence Network.

Coaching and Team Building

Jim Highsmith
  Coaching and Team Building series: Part I Part II

Security and the Mobile Professional

Cutter Consortium

 

Many companies are worried about the challenges of securing their remotely accessed networks, and with such a wide variety of devices available to mobile professionals, the headaches for those tackling the issue are approaching migraine-like proportions. To investigate the issues surrounding securing mobile workforces, we spoke with Derek Bluestone, product manager at Fiberlink, a managed Internet-based virtual provider network (VPN) to Fortune 1000 enterprises.