Showing 2021 - 2040 of 2385
What if enterprise architecture (EA) enabled the organization to flex in pace with the rhythm of its strategy process, facilitating the ongoing renewal of differentiating capabilities, allowing it to constantly maintain a position at the forefront of the competitive order?
June 1, 2005 | Authored By: Ruth Malan, Dana Bredemeyer
Volume VIII, No. 12; December 1996
November 30, 1996 | Authored By:
INTRODUCTION For a service company that delivers quality IT applications, project management (PM) is a fundamental discipline.
February 28, 2002 | Authored By: Andrea Gelli
February 28, 2002 | Authored By: Andrea Gelli
Outsourcing to Ireland has exploded during the last two decades, and some of the world's largest IT companies now have bases of operation in Ireland that provide products and support to their offices worldwide.
October 31, 2006 | Authored By: Neil Brennan
You can't spell business without "e." And business-to-business (B2B) e-commerce is hot right now.
October 31, 2000 | Authored By: James Tompkins
Domain IT Industry
December 31, 2001 | Authored By: Cem Kaner, Cutter Business Technology Council, Cutter Business Technology Council, Cutter Business Technology Council
In this report, the author first briefly clarifies what she means by design thinking. This is to avoid confusion that otherwise may arise from the different meanings associated with the term. Subsequently, she provides a short introduction to the method itself, and then introduces two cases and their design thinking practice. Next, she presents a framework of findings and explain the different concepts of the framework and their interconnections through examples from the cases. To extend this, she provides some additional thoughts on the presented findings before finally wrapping it all up in an alternative visualization of some of the key learnings from this report.
December 22, 2015 | Authored By: Caroline Heerema
Ross Anderson, noted professor of computer engineering in the Cambridge Computer Laboratory, explains "Why Information Security is Hard" in economic terms [1]. It isn't because we need better security technology or security models or cryptography.
December 1, 2005 | Authored By: Richard Baskerville
Opening Statement by Jim Highsmith
May 31, 2004 | Authored By: Glen Alleman
Read the Executive Summary
December 1, 2005 | Authored By: Kenneth Rau
GROW YOUR CUSTOMERS WITH ERM CENTRAL FROM CUSTOMER ANALYTICS by Curt Hall
August 31, 1999 | Authored By: Curt Hall
This issue of Cutter Benchmark Review focuses on a topic of interest to all organizations, bar none: the use of prepackaged software and the management of the implementation process of off-the-shelf applications. (Not a member? Download your complimentary copy of the issue here.)
August 31, 2006 | Authored By: Erica Wagner, Sue Newell
It's difficult to click through the Web pages of a major IT consulting firm or flip through a computer industry periodical without coming face-to-face with a reference to IT governance or IT alignment.
August 31, 2009 | Authored By: Dennis Adams
CAN WE CONTROL INNOVATION AND STAY OUT OF A DILBERT CARTOON?
October 31, 2004 | Authored By: Alan Chachich