Advisors provide a continuous flow of information on the topics covered by each practice, including consultant insights and reports from the front lines, analyses of trends, and breaking new ideas. Advisors are delivered directly to your email inbox, and are also available in the resource library.

US Cloud Companies and the NSA's Data Collection Tentacles

Curt Hall

Last month I discussed the US National Security Agency's (NSA) electronic surveillance and data gathering practices (aka "Prism"), which were leaked by Edward Snowden, a former NSA contractor (with Booz Allen Hamilton) and previous CIA employee, to the Guardian and Washington Post news organizations (see


Will IT Make (Most of) Us Illiterate?

Vince Kellen

I remember learning how to use a slide rule both from my father and in high school. My father was enamored of this computational device but at the time, handheld calculators were all the rage. High school teachers were lamenting the fact that students would miss the opportunity to learn how to use a slide rule. As students, we didn't care about this at all.


Agile-Embedded Group Coherence Ingredients

Joanna Zweig, Priya Marsonia, Cesar Idrovo

The collaborative nature of Agile projects has exposed participants to opportunities to experience a number of ingredients associated with group coherence (GC) in the research literature. We call these "Agile embedded ingredients," as they surface in Agile work. We present four here and discuss both their Agile appearance and the research about them. They are: (1) the commonly shared goal, (2) shared leadership, (3) trust and respect, and (4) practice.


EA Value Proposition

Mike Rosen

In my last Advisor (see "Firmitas, Utilitas, Venustas"), I introduced some of the ideas presented by EA Conference Chair Chris Potts in his keynote at the IRM Enterprise Architecture Conference, "High Im


Managing Customer Perceptions

Pranab Chakraborty

Aldous Huxley, author of the classic novel Brave New World, once said, "There are things known and there are things unknown, and in between are the doors of perception."


Why We Need the Data Knowledge Network

Danette McGilvray, Masha Bykin

Many projects concentrate their efforts on implementing technology used to support the business needs (replace System X with System Y) or deliver new functionality. In meetings, the topic of conversation is usually about which application to purchase and which vendor to choose. Those are important issues, but equally important considerations are how your company will use the information to conduct business, the readiness of existing data, and how you can adapt the data to fulfill the requirements of the new system.


Did I Do That?

Robert Charette

In early June, the International Monetary Fund (IMF) released a remarkable report entitled, "Greece: Ex Post Evaluation of Exceptional Access Under the 2010 Stand-By Arrangement," documenting the IMF's decision to participate in the economic rescue of Greece from its self-created ec


Architecture Debt

Roger Evernden

Architecture debt refers to the cost and effort of dealing with the backlog of maintenance and change to legacy architectures that are necessary to bring the architectural landscape up to date.


Disciplined Agile Delivery in the Enterprise

Scott Ambler

I'm honored to be the Guest Editor of this month's Cutter IT Journal. This issue describes the experiences and findings of senior consultants and researchers who have been actively involved with helping organizations around the world apply Agile strategies in enterprise environments.


IT Development As Last, Not First

John Seddon

It is time to turn our thinking about IT development's role in change on its head. Instead of IT being the driver and necessary means for change, it should be relegated to last in the order of things. The first step is study, which changes management's perception of the problem(s). The second step is to improve the service design so that it works for customers. The third and final step is to pull in IT development to provide the means to run the service in the new way.


Cisco Buys Composite Software, Becomes a Data Virtualization Leader

Curt Hall

One of the more interesting acquisitions affecting the enterprise software, BI, and data management industry so far this year involves networking giant Cisco, which purchased data virtualization1 vendor Composite Software for approximately US $180 million in cash.


Too Many Secrets, Too Many Secret Keepers

Ken Orr

I don't know about you, but I've begun to notice a pattern in the problems that we have in keeping our secrets lately. Three years ago, a US Army enlisted man stationed in Iraq downloaded 250,000 US State Department cables and then handed them over to WikiLeaks which in turn handed them over to the press.


Agile Maturity Assessments: Boon or Bane?

Venkatesh Krishnamurthy

Circa 1990 (memo from the quality head): The lead assessor will be visiting our organization to check the maturity level this week. Please ensure documents are checked into the repository and folders named as per the standards. We need to get CMM Level 5 this year.

Circa 2010 (memo from Agile group lead): Please ensure every one completes the Agile maturity assessment as we need to understand the maturity levels of our teams.


Firmitas, Utilitas, Venustas

Mike Rosen

Last week I attended the IRM Enterprise Architecture Conference in London. This is the third year the conference has coincided with the BPM Conference, and the combination really seems to be working.


Good and Bad Leadership

Kerry Gentry, David Caruso

Leadership per se is either effective or ineffective. There are no universal criteria for good or bad leadership, and the quality of leadership should not be confused with the motivation or objectives of the leader. Once leadership is deemed effective or ineffective, judgment about whether it is good or bad rests on an unpredictable mix of situational and subjective criteria. Like anything else, leadership comes with associated costs and unintended consequences. The limits of tolerable costs are largely determined by the value and priority of the leader's objectives.


Visual Discovery

Brian Dooley

There is no question that we are becoming more visually oriented in our approach to thinking today. You can see it in the increasing numbers of PowerPoint presentations given with the admonition that fewer words will suffice.


Are You Relying on Data -- or Information?

Carl Pritchard

Truly savvy managers know the value of information. It's the stuff intelligent decisions are borne of.


Software As an Asset

Jens Coldewey

In a recent Advisor I took the stance that nearly all software development is part of what we call an infinite game and therefore should be managed like a product rather than a project, which is a management approach for finite games (see "On Projects, Products, and Gaming Theory").


Complex Event Processing Heats Up

Curt Hall

Complex event processing (CEP) has received considerable interest among organizations because of its ability to increase operational efficiency by identifying and interpreting the effect of seemingly unrelated events taking place across the enterprise and then notifying the appropri


The CIO as the New Brewmaster of the IT Investment Portfolio

Bob Multhaup

Measuring the value of IT is something that every CIO and IT customer has been asking how to do for years. The difficulty is that it's a very complex and sophisticated problem to solve, and it has typically been addressed by keeping a cap on IT costs and developing some business cases for large IT initiatives.


The CIO as the New Brewmaster of the IT Investment Portfolio

Bob Multhaup

Measuring the value of IT is something that every CIO and IT customer has been asking how to do for years. The difficulty is that it's a very complex and sophisticated problem to solve, and it has typically been addressed by keeping a cap on IT costs and developing some business cases for large IT initiatives.


Big Brother and the Big Data Holding Companies

Curt Hall

The electronic surveillance practices of the US National Security Agency (NSA) are hot, front-page news around the world.


Realizing the Benefits of Agile Outsourcing

Sebastian Hassinger

When my cofounders and I began in 2007 to create a software development services firm in Vietnam, one of our most powerful motivations was to create a shop that could support innovative projects. Outsourcing had historically been very much geared toward low-risk, low-innovation work at the large-enterprise level.


FEAPO Summit Report

Mike Rosen

Last month I attended the annual meeting of the Federation of Enterprise Architecture Professional Organizations (FEAPO). I first became aware of FEAPO in the spring of 2010 when it was initially being formed. At that time, Dr.


Virtual Spaces and Distributed Teams

Brian Dooley

For myriad reasons, distributed agile software development represents the cutting edge of collaboration technology. It provides a laboratory for techniques that teams can beneficially employ throughout the enterprise.