Advisors provide a continuous flow of information on the topics covered by each practice, including consultant insights and reports from the front lines, analyses of trends, and breaking new ideas. Advisors are delivered directly to your email inbox, and are also available in the resource library.
CMM in an Agile World
Politics and Risk Management
"Can-do thinking makes risk management impossible. Since acknowledging real risk is defeatism, the risk management function in a can-do organization is restricted to dealing with those smallish risks that can be mitigated by quick action. That means you confront all the risks except the ones that really matter." (Tom DeMarco, Why Does Software Cost So Much? .)
What the *Wall Street Journal* Didn't Say
Offshore outsourcing is a big deal these days, especially in the IT field. And because I made dire predictions about the phenomenon in a 1992 book entitled Decline and Fall of the American Programmer , I've been getting lots of phone calls from curious journalists and unemployed programmers lately.
Let Business Vision Define Enterprise Architecture
In an ideal world, enterprise architecture would be defined within a well-articulated business vision and business strategy. These would provide the focus and context to the IT strategy and to the IT organization as a whole, particularly to the enterprise architecture.
A New Paradigm or Just One More Layer?
The Quantum Leap to Perfect Data
Disparity of the data resource in most public- and private-sector organizations is a truism. Data disparity arises for the following reasons:
Be (A)ware of Proprietary Technology
When outsourcing application development, there are a few things you can do to reduce your risks through the vendor selection process. For a start, it is easy to fall prey to comparing contractors on a cost-only basis. While cost is important, it should not be treated separately from, say, a contractor's use of proprietary technology and its position in the marketplace.
Artificial Intelligence: Still Alive and Well
Insourcing: The Other Alternative
Agile from First Principles
Many of us today believe that an agile methodology provides benefits in improved code quality, better fit to requirements, and lower risk of failure. However, a common criticism leveled at this approach is that the path of development may meander, involving rework due to a lack of up-front requirements and architecture definition.
Larry's Right: "Thinfrastructure" Makes Sense
Financial Correctness & Architecture for Innovation
CRM As a Web Service
At the beginning of October, Siebel systems announced that it will offer its customer relationship management (CRM) modules as Web services, as part of IBM's OnDemand program.
Project Jumpstart
I was recently commissioned to assist a development team in making some technical decisions that would help them migrate to .NET. Meeting with the developers briefly beforehand allowed me to understand some of their issues.
The Perils of Piecemeal Optimization
Alignment the Old-Fashioned Way: Aggressively Managing Risk
Security and the Mobile Professional
Many companies are worried about the challenges of securing their remotely accessed networks, and with such a wide variety of devices available to mobile professionals, the headaches for those tackling the issue are approaching migraine-like proportions. To investigate the issues surrounding securing mobile workforces, we spoke with Derek Bluestone, product manager at Fiberlink, a managed Internet-based virtual provider network (VPN) to Fortune 1000 enterprises.

