Advisors provide a continuous flow of information on the topics covered by each practice, including consultant insights and reports from the front lines, analyses of trends, and breaking new ideas. Advisors are delivered directly to your email inbox, and are also available in the resource library.
Are You Steeped in Obsolete Thinking Skills?
Why Change Management? An Open Letter to Agilists
Cloud Computing: Agreement on Pros and Cons
BI Versus Enterprise Data Warehousing
This Is Not a Controlled Experiment
We back our qualitative work as Cutter consultants with plenty of quantitative data. We measure and report on productivity through the Productivity Index.
Risk Information Irresponsibility
The late management theorist Peter Drucker once said that everyone in an organization has to ask him or herself, "What information do I need to do my job? How am I going to get it, and from whom? And how do I know that it is true?" Furthermore, each person must also ask, "What information am I responsible for?
This is Not a Controlled Experiment
We back our qualitative work as Cutter consultants with plenty of quantitative data. We measure and report on productivity through the Productivity Index.
Achieving Real Value-Add from Your Business-Driven Enterprise Architecture: Realizing the Void
Enterprise architecture is grossly misunderstood. It's not an IT issue; it's an enterprise issue for the following reasons:
Seven Keys to Successful Virtual Communication
When Tom was put in charge of a group that was geographically dispersed, he really floundered around in the dark. He suffered misunderstandings, relied on inaccurate data, made some bad decisions, alienated people, and was insecure in knowing what was really going on and what should be done. Tom had been a highly successful ScrumMaster.
Leadership and Risk Management
The corporate world is littered with the carcasses of enterprises, large and small, wounded -- some mortally -- by failures of the "Siamese twins" of leadership and risk management. Why are these two concepts referred to as "Siamese twins"? Because neither can function without the other.
Pitfalls of Agile XXIV: Fearing Pitfalls
The Role of Solution Architect
The table below summarizes the main differences that I typically see.
Fixing ERM: From IT Security to Human Behavior
[From the Editor: This week's Cutter IT Advisor is from Cutter Fellow Robert N. Charette and Brian Hagen's introduction to the July 2012 issue of Cutter IT Journal, "Fixing ERM: From IT Security to Human Behavior" (Vol. 25, No. 7). Learn more about Cutter IT Journal.]
Data Governance Requirements in the Era of Compliance and Big Data
The avalanche of digital data that has resulted in Big Data storage and analytics is leading to additional issues as data volumes continue to grow in volume, variety, and velocity. A critical issue for the enterprise is how to maintain control of these immense pools of structured and unstructured data.
Are We Falling Behind? Is ITIL a Help or a Distraction?
Often managers latch on to the methodologies and practices that happen to be in fashion -- the latest management BS! Some make desperate demands for their staff to react, perhaps by creating a service catalog, but without identifying who is going to use it and how it is to be used. Despite containing some really good guidance, ITIL can become a distraction, with organizations using it unsuccessfully as a safety blanket or shield.
Security Architecture
Constantly changing security boundaries that are simultaneously "owned" by everyone and no one demand a new approach at both the technical and policy levels. A properly designed and managed enterprise security architecture (ESA) enables this. The less-defined security boundaries that encompass infrastructure require a new way of defining cyber security architecture for the cloud. Organizations still have the same mission; they just need to change their mindset on how they do business in the cloud.
Tablets for the Enterprise, Part II
In March, I discussed various tablet options in regard to their possible roles in the enterprise (see " Tablets for the Enterprise").
Tablets for the Enterprise, Part II
In March, I discussed various tablet options in regard to their possible roles in the enterprise (see " Tablets for the Enterprise