October 2, 2000 | Authored By: Cutter Consortium, Cutter Consortium
Showing 101 - 120 of 396
Domain Security
January 1, 2005 | Authored By: Cutter Business Technology Council
When people tell me they are already practicing risk management on their projects, more of
February 25, 2010 | Authored By: Tim Lister
It is sad but true that the economic crisis has now also appeared in Poland.
March 26, 2009 | Authored By: Daniel Spica
My last Advisor (see "
April 23, 2009 | Authored By: Daniel Spica
Domain IT Industry
June 30, 2002 | Authored By: Ken Orr, Cutter Business Technology Council, Cutter Business Technology Council, Cutter Business Technology Council
BOTH SIDES ALWAYS LOSE: THE LITIGATION OF SOFTWARE-INTENSIVE CONTRACTS by Tom
March 31, 1998 | Authored By: Tim Lister
Topic Summary The past is a foreign country: they do things differently there. — L.P. Hartley, opening lines of The Go-Between (1953)
May 1, 2009 | Authored By: Cutter Business Technology Council
Domain Security
December 31, 2004 | Authored By: Tim Lister, Cutter Business Technology Council, Cutter Business Technology Council, Cutter Business Technology Council
Domain Collaboration
December 31, 2000 | Authored By: Ken Orr, Cutter Business Technology Council, Cutter Business Technology Council, Cutter Business Technology Council
Domain Government Assertion 164: Changes in federal discovery rules are affecting the IT/legal partnership and creating new areas of business risk.
July 31, 2007 | Authored By: Ronald Blitstein, Lynne Ellyn, Cutter Business Technology Council, Cutter Business Technology Council, Cutter Business Technology Council
The structured analysis/design methodologies that my colleagues and I developed in the 1970s and 1980s are often described as "obsolete" by those who advocate object-oriented methods such as UML.
April 21, 1998 | Authored By: Ed Yourdon
Domain IT strategy Assertion 175: Those organizations with years of application development and no application cleanup are discovering the large cost of "application gridlock."
August 31, 2008 | Authored By: Tim Lister, Cutter Business Technology Council, Cutter Business Technology Council, Cutter Business Technology Council
Topic Summary From our very first security Opinion, "Pandemic I: Malicious Disruption (The Halloween Scenario)" in October of 2001, we have dealt with security p
November 30, 2007 | Authored By: Cutter Business Technology Council, Mark Seiden
September 18, 2000 | Authored By: Cutter Consortium, Cutter Consortium
PART I: THE "MAKE OR BREAK" OF A PROJECT
How important are development teams to the success of a software project? Does team structure really matter? To a varying degree, most of us believe that it does.
October 1, 2004 | Authored By: E.M. Bennatan
Domain E-Business
September 30, 2000 | Authored By: Ken Orr, Cutter Business Technology Council, Cutter Business Technology Council, Cutter Business Technology Council
Domain IT Industry
June 30, 2001 | Authored By: Tim Lister, Cutter Business Technology Council, Cutter Business Technology Council, Cutter Business Technology Council
Domain IT strategy
October 31, 2004 | Authored By: Lou Mazzucchelli, Cutter Business Technology Council, Cutter Business Technology Council, Cutter Business Technology Council