by Gabriele Piccoli, Senior Consultant, Cutter Consortium; Assistant Professor of Information Systems at the School of Hotel Administration at Cornell University INT
Domain Security Assertion 173: The forces that oppose crime and fraud on the Internet are almost completely overwhelmed by numerous and ingenious would-be exploiters.
A profusion of designs for privacy-enhancing technologies in the scientific literature has not led to successful deployments of products in the real world.
As the amount of collected information from multiple sources and formats grows (witness the growth in storage requirements due to the explosion of the Internet), the ability to derive value from
This Executive Report by Dr. Sara Cullen is the third in a four-part series on the outsourcing lifecycle. The series is based on a detailed understanding of the outsourcing experiences of 107 organizations. This report picks up where Part II left off and takes you through the final building block of the Architect Phase (Design) and the two building blocks of the Engage Phase (Select and Negotiate), the first two of four phases in the outsourcing lifecycle. These building blocks will have a crucial effect on how successful your outsourcing initiative will be.
by Gabriele Piccoli, Senior Consultant, Cutter Consortium; Assistant Professor of Information Systems at the School of Hotel Administration at Cornell University INT
SPEAKING DIFFERENT LANGUAGES Stories of project and system failures due to miscommunication between business and IT abound, and despite a variety of real or perceived solutions -- be they business, technological, social, or oth