Advisors provide a continuous flow of information on the topics covered by each practice, including consultant insights and reports from the front lines, analyses of trends, and breaking new ideas. Advisors are delivered directly to your email inbox, and are also available in the resource library.
Cooperation or Conflict in Modern Software Management
"A fundamental problem in our industry is that software projects are chronically overconstrained and underspecified," said Cutter Senior Consultant Ken Orr. This statement underscored a lively debate during the Modern Project Management panel discussion at the recent Summit 2002 conference.
From Objects to Integration
IT Maintenance and Enterprise Applications
So, your organization is faced with an upgrade of your enterprise resource planning (ERP) application. Your executives do not view this as a large-scale effort, but you and your staff know far better. Now what?
Has Text Mining's Time Arrived?
Product Development and Agile Methods
Project Office: Dead on Arrival -- Learning from Worst Practices
Moore No More?
Metrics: Going for the First Down, Not the Touchdown
CMMI
Most readers are familiar with the Capability Maturity Model (CMM), which was developed by the Software Engineering Institute (SEI) at Carnegie Mellon University and first released in 1990. CMM is a major effort to describe best practices in software development.
Cultivating an Innovative IT Environment
Everybody and everything is constantly changing, including change itself. In today's business environment, no amount of planning guards against the volatility and constant change that organizations face. The ability to respond to these circumstances is not only a competitive advantage, but also a survival skill.
Taxonomy Products
Interest in ebXML on the Rise, According to Cutter Consortium Survey
The Next Wave of IT Employment Shortages
Professional Conscience
Process and Application Architectures
Security Tools and Software
Security allows you to protect the confidentiality of your information. It also allows you to access this information when you need it and to trust its integrity. It is an ongoing process where reasonable amounts must be spent to reduce avoidable risks.
To be secure, you must require:
Successful CRM Requirements
My wife and I recently went shopping with my mother to purchase a new kitchen clock. While completing the transaction, the salesperson asked my mother if she'd like to take out their extended warranty service on the clock. Somewhat taken aback, she exclaimed agitatedly, "Extended warranty on a clock!
Core Elements of Would-Be Agile
Software Creativity
Network Armies
CRM Deficiencies Are Slow To Be Acknowledged
eTom and Process Architectures
Everyone talks about architecture these days, and there are many different types or levels of architecture. Since its inception in 1987, the granddaddy of architectures, the Zachman Framework, has doubled, from three levels and three areas to six levels and six areas (see http://www.zifa.com).
Internet Technologies Put Attack Capabilities at Terrorists' Fingertips
The world's most eminent IT gurus are warning of the potential dangers to our information infrastructure caused by natural or malicious acts. In this post-9/11 world they are calling for companies, governments, and economies to take steps to buffer themselves from pandemic effects.

