In this issue of Cutter Benchmark Review, we tackle the topic of virtual teams and their management. Like any team, virtual teams are groups of individuals with shared objectives and shared responsibilities. Unlike traditional or colocated teams, though, virtual teams draw members from multiple locations and thus cannot easily meet face-to-face.
July 2006
June 2006
At the heart of customer relationship management (CRM) is the customer, and knowing the customer is key. Next month you’ll learn why it's vital to determine not just the customer’s propensity to buy but her capacity to buy — and why companies whose CRM systems leverage broader market data and predictive analytics will surpass those that get their CRM functionality out of a box.
In this issue:- CRM: The Next Five Years
- Web 2.0 and CRM: Harnessing the Power of Collective Business Intelligence
- Capacity Scoring: An Essential CRM Capability for Identifying and
- Maximizing the Analytic Value Chain: The Fusion of Enabling Technology and Marketing Science
- The Wireless CRM Market: Double-Digit Growth, High ROIs, Hosted Systems
- Business-to-Business CRM: The Next Five Years
- CRM from an M&A Perspective
June 2006
In this issue of Cutter Benchmark Review, we focus on the corporate applications of wireless networking.
In this issue:- Corporate Applications of Wireless Networking: Moving Beyond Cell Phones and BlackBerries
- Can Corporate Applications of Wireless Go Beyond Simple Productivity Applications?
- Ubiquitous Wireless Adoption Brings Business Opportunity — and Risks — for IT Leaders
- Corporate Applications of Wireless Networking: We Still Have a Lot of Room to Roam
- Corporate Applications of Wireless Networking Survey Data
May 2006
In this issue of Cutter Benchmark Review, we focus on a topic that is dear to my heart and to that of many IT professionals I know: innovation in IT departments.
May 2006
In the first installment of "Securing Cyberspace," we asked, "Is it time to rethink our strategy?" The answer was a resounding "yes." In next month's issue, our authors discuss a bevy of innovative ways we can protect our cyber infrastructure, from managing cyber risk through cyber insurance to reengineering the base protocols of TCP/IP.
In this issue:- Securing Cyberspace: What Exactly Should We Be Doing?
- Opening Statement: Securing Cyberspace: What Exactly Should We Be Doing?
- How to Stop Talking About - and Start Fixing - Cyber Security Problems
- Moving Beyond Security: The Resilience Imperative
- Contracting for Information Security in Commercial Transactions: A New Tool for Managing Risk
- The Role of Cyber Insurance in Fighting the War on Terror
- Payments System Security: No Longer Just a "Company Issue"
- Forging a Public-Private Partnership: The "Wonk-Free" Approach to Cyber Security