Business Transformation Requires Transformational Leaders

Leadership and teaming skills are front and center in times of rapid change. Meet today’s constant disruption head on with expert guidance in leadership, business strategy, transformation, and innovation. Whether the disruption du jour is a digitally-driven upending of traditional business models, the pandemic-driven end to business as usual, or the change-driven challenge of staffing that meets your transformation plans—you’ll be prepared with cutting edge techniques and expert knowledge that enable strategic leadership.

Subscribe to the Leadership Advisor

Recently Published

The new frontier for competition is the entire customer experience (CX) — from thinking about a purchase to the renewal (of a service) or replacement (of a product).

The best response to digital disruption from the EA team is to examine the dis­ruption, understand the implications in terms of the components and configuration of the architecture (i.e., translate them into architectural thinking), and present options for responding as potential changes to the architecture. The important thing is to present these options as clearly as possible so that stakeholders can make architecturally informed decisions.

Understanding certain perspectives of privacy allows us to detail why it is important in the context of blockchain, distributed ledger, and smart contract technology. Thus, questioning the importance of privacy to anyone deploying the technology, using the technology, or regulating the technology, is important. How is a blockchain different than any database? How is it used differently than normal databases? What are the implications of deploying an immutable record of information in a distributed consensus network? How is the technology used in blockchains different from any other information or data storage technology? These are the questions firms should be asking as they attempt to understand the concept and its implications on an active, and evolving, basis.

Cutter Consortium’s Technical Due Diligence for Acquisitions ensures an unbiased assessment of the software, software architecture, technology, security, and technology skills of your potential acquisition. Discover the value and SWOTs of your target company’s current-state systems.

This article discusses the Industrial Internet along with the IoT applications and domains that are most likely to benefit from edge computing.

This issue of Cutter Business Technology Journal offers perspectives from seven authors on fog/edge computing to bring some sunlight to the challenges, benefits, and possible uses of these emerging technologies.

The authors address the criteria for operating unmanned aerial vehicles, or “aerial drones,” in a fog architecture. The use of drones in supply chain delivery offers faster, more cost-effective delivery but also poses myriad concerns, ranging from collision to security risks, as well as regulatory concerns.

The OpenFog Reference Architecture for fog computing has emerged as a highly credible paradigm for architecting compute-intensive solutions for networks and applications that utilize IoT, 5G, and artificial intelligence. In this article, we’ll examine how fog architecture addresses cybersecurity for next-generation networks.