Advisors provide a continuous flow of information on the topics covered by each practice, including consultant insights and reports from the front lines, analyses of trends, and breaking new ideas. Advisors are delivered directly to your email inbox, and are also available in the resource library.

Creating and Implementing a Security Strategy

Charles Pfleeger

The question is not if, but when. Don't question if you will need a computer security strategy; determine when the situation will arise showing you need one. Hackers, criminals, naive users, accidents, tired employees, acts of nature -- all of these can cause serious damage to IT systems and data. Failing to address security can lead to unnecessary risk and expense.


Managing Stakeholder Conflict

Michael Mah

In the mid- to late 1990s, time pressure on software projects accelerated dramatically under the "Internet speed" mantra. It seemed that our industry was hell-bent on bending reality with regard to time, and chants to "build it faster" were the norm.


So ... How Do You Prevent Burnout?

Rob Thomsett

The answer is pretty clear. To minimize burnout, upper management, the project manager, and project leaders should focus on the following actions (none of which require extra money, promotion, or other traditional rewards):


XMI and the Future

Paul Harmon

Frankenstein at Work

Dwayne Phillips

There have been times in my career as an IT manager when I felt my primary role was to motivate people. I wanted to bring out the best in them because people are the fundamental resource in IT. Their imagination and energy make everything work. Sometimes my attempts at motivating people seemed to work well, and sometimes it was a disaster.


Corporate Spending on Data Warehousing and Business Intelligence in 2003

Curt Hall

Results from our latest survey analyzing corporate data warehousing and BI trends show that fewer companies plan to increase spending on their data warehousing and BI efforts in 2003 than those that indicated they planned to do so just nine months ago.


Microsoft and Open Source -- Now or Never

Cutter Consortium, Cutter Consortium
  For more information on Cutter Consortium's Enterprise Architecture Advisory Service, please contact Dennis Crowley at +1 781 641 5125 or e-mail dcrowley@cutter.com

Unisys and Software Development

Paul Harmon

About a year ago, after I attended the 2002 Unisys financial analysts conference, I wrote about Unisys' plans to use the Object Management Group's (OMG) Model Driven Architecture (MDA) in application development and business process outsourcing. I just got back from the 2003 version of the conference and can report that Unisys has made great progress and is gearing up for a major push.


The Numbers Game

Pamela Hollington

In consulting arrangements, there is nothing more challenging than developing a project estimate that both the client and vendor can work from. Yet there is really not much that is more important to achieve. A recent situation I faced sheds some light on the challenges this can bring.


Lighting a Fire Under Wireless Adoption

Ian Hayes
  For more on wireless technology, see the October 2002 issue of Cutter IT Journal, available from Cutter Consortium at +1 781 641 9876, fax +1 781 648 1950, or e-mail s

Guiding Principles

Jim Highsmith

Waiting for Godot Or Whatever Happened to Component-Based Development?

Ken Orr

I recently stumbled across something in the opinion section of one of the major computer trade magazines. The author was trying to explain why neither object nor component reuse had quite lived up to expectations. Object (component-based) development has always been sold on the following assumptions:


Waiting for Godot Or Whatever Happened to Component-Based Development?

Ken Orr

I recently stumbled across something in the opinion section of one of the major computer trade magazines. The author was trying to explain why neither object nor component reuse had quite lived up to expectations. Object (component-based) development has always been sold on the following assumptions:


Alignment in Sourcing: What Does it Mean?

Ian Hayes

What is the purpose of alignment in an outsourcing engagement? At the highest level, it means ensuring that the strategies pursued by the outsourcing engagement are in line with corporate goals. At the lowest level, it means making sure that the right tasks are performed, at the right time, in the right order of priority.


What's Driving the Corporate Use of BI and Enterprise Analytics?

Curt Hall

A reader recently asked me about the extent to which companies are applying BI and some of the key reasons that are driving them to do so. I thought I'd make these questions the topic of this week's Advisor.


41% Have Experienced Data Warehouse Project Failures

Cutter Consortium, Cutter Consortium
  For more information on Cutter Consortium's Business Intelligence Advisory Service, please contact Dennis Crowley at +1 781 641 5125 or e-mail dcrowley@cutter.com.