Advisors provide a continuous flow of information on the topics covered by each practice, including consultant insights and reports from the front lines, analyses of trends, and breaking new ideas. Advisors are delivered directly to your email inbox, and are also available in the resource library.
Seven Keys to Successful Virtual Communication
When Tom was put in charge of a group that was geographically dispersed, he really floundered around in the dark. He suffered misunderstandings, relied on inaccurate data, made some bad decisions, alienated people, and was insecure in knowing what was really going on and what should be done. Tom had been a highly successful ScrumMaster.
Leadership and Risk Management
The corporate world is littered with the carcasses of enterprises, large and small, wounded -- some mortally -- by failures of the "Siamese twins" of leadership and risk management. Why are these two concepts referred to as "Siamese twins"? Because neither can function without the other.
Pitfalls of Agile XXIV: Fearing Pitfalls
The Role of Solution Architect
The table below summarizes the main differences that I typically see.
Fixing ERM: From IT Security to Human Behavior
[From the Editor: This week's Cutter IT Advisor is from Cutter Fellow Robert N. Charette and Brian Hagen's introduction to the July 2012 issue of Cutter IT Journal, "Fixing ERM: From IT Security to Human Behavior" (Vol. 25, No. 7). Learn more about Cutter IT Journal.]
Data Governance Requirements in the Era of Compliance and Big Data
The avalanche of digital data that has resulted in Big Data storage and analytics is leading to additional issues as data volumes continue to grow in volume, variety, and velocity. A critical issue for the enterprise is how to maintain control of these immense pools of structured and unstructured data.
Are We Falling Behind? Is ITIL a Help or a Distraction?
Often managers latch on to the methodologies and practices that happen to be in fashion -- the latest management BS! Some make desperate demands for their staff to react, perhaps by creating a service catalog, but without identifying who is going to use it and how it is to be used. Despite containing some really good guidance, ITIL can become a distraction, with organizations using it unsuccessfully as a safety blanket or shield.
Security Architecture
Constantly changing security boundaries that are simultaneously "owned" by everyone and no one demand a new approach at both the technical and policy levels. A properly designed and managed enterprise security architecture (ESA) enables this. The less-defined security boundaries that encompass infrastructure require a new way of defining cyber security architecture for the cloud. Organizations still have the same mission; they just need to change their mindset on how they do business in the cloud.
Tablets for the Enterprise, Part II
In March, I discussed various tablet options in regard to their possible roles in the enterprise (see " Tablets for the Enterprise").
Tablets for the Enterprise, Part II
In March, I discussed various tablet options in regard to their possible roles in the enterprise (see " Tablets for the Enterprise
Give Me the Creeps
My Newfound Appreciation for BPM
In recent engagements, I have had the opportunity to move away from consulting within the infrastructure world of SOA and into the realm of pure business process management (BPM). Prior to that, I had more of a conceptual appreciation as to how BPM technology could integrate within an SOA.
The Challenges of Industry Data Models
All effort in data warehousing is ultimately to make information discovery and delivery possible. Though I do not intend to explore the Inmon versus Kimball theories here, I do think they hold clues for dealing with industry models. There are also models that build two layers, one for storage and the other for consumption. It is important that enterprises learn to rise above these two theories and make a meaningful blend of the two.
RBS: Royal Bank of Scotland or Real Bad Service?
Making Effective Use of Cloud Architecture Practice: Are We There Yet?
In my last Advisor ("Cloud Architecture Practice: Sharing a Few Observations and Lessons Learned"), I submitted a few observations and lessons learned from a real-wor
Business Analysis and Agility
Mobile Platforms and Virtualization
The advent of iOS and Android has created a seismic shift in the fortunes of manufacturers, with stalwarts such as Nokia and Motorola superseded by Apple and Samsung. Overall, a recent Cutter survey suggests strong support for Apple's iOS and Google's Android, with limited support for RIM's BlackBerry and almost none for Symbian. Microsoft's Windows Phone registers with about 1 in 5 respondents, suggesting that there is some way to go before this newest platform has yet to make an impact.