Advisors provide a continuous flow of information on the topics covered by each practice, including consultant insights and reports from the front lines, analyses of trends, and breaking new ideas. Advisors are delivered directly to your email inbox, and are also available in the resource library.

Reflections on Innovation, Part III: The Pleasure of Special Things -- Innovation and Learning

Lee Devin

Our favorite philosopher, the mighty Aristotle, remarks in his book that people are hardwired to enjoy art; it's part of what makes them human.


A Contrarian View of Scalability

Israel Gat

In just about every due diligence engagement I carry out, the VC and I spend a lot of time on scalabity of the software architecture. The company whose software architecture we are evaluating usually has a good track record of successfully scaling up on quite a few technology and business dimensions.


Unified Portfolio Management: The Basics

Brian Dooley

Enterprise portfolio management has been evolving for the past several years toward a unified vision that incorporates the diverse areas of portfolio concepts, bringing them together through s


Inciting Infrastructure Insights

Steven Baker

Good infrastructure is like having a good dinner party planner -- when everything goes well, few guests notice or appreciate the careful plans and up-front investments that went into the event. Yet if and when something does go wrong, things seem to come to an abrupt halt, often with embarrassing results.


Agile Analytics: Curing the Common Hangover

Ken Collier

This Advisor is a continuation of the "Scrum Ain't Enough" series (see "Agile Analytics: Community, Customers, and and Collaboration," 18 October 2011, and "


Enron Redux: Struggling Not to Forget

Robert Charette

"The company is fundamentally sound. The balance sheet is strong. Our financial liquidity has never been stronger. And we again have record operating and financial results."


Why Agile Fails at Scale: The Human Side

Mark Levison

My Cutter colleagues will give you excellent advice on some of the key elements to making Lean-Agile work at scale. Even with their advice, however, implementing any large-scale change is very difficult.


10 Neuroscience Facts for Architects

Mike Rosen

In my last Advisor (see "Take a SCARF to Architecture Reviews," 30 November 2011), I wrote about the SCARF model (status, certainty,


Shopycat and Muppet: Social Analytics Fueling the Next Generation of E-Commerce Applications

Curt Hall

The latest news to set the social analytics world buzzing is retailing giant Walmart's "Shopycat" social shopping application for Facebook.


Will History Repeat Itself? The Pitfalls of Blinkered Views and the Horseless Carriage Syndrome

Annie Shum

When making investment decisions that could impact the business for multiple decades, it is vital to take a measured approach. Forward-thinking leaders and stakeholders should evaluate choices and trade-offs based on a long-term view with a broad historical perspective.


Repurposing the Business Analysis Practice for Greater Value

Neal Mcwhorter

The business analysis profession is in the midst of change. Work is underway within organizations and associations to formalize and standardize what it means to be a business analyst (BA). The role has had a long and tortuous existence. A child of necessity, the role evolved to bridge the gap between what those responsible for operating an organization wanted to do and what those responsible for implementing technology were able to deliver.


Testing Assumptions About Security Awareness

Shari Pfleeger

It's clear that our once-a-year, work-your-way-through-a-slide-set approach to computer security training doesn't work. Even with this training, people still write down their passwords, click on links in emails from untrusted sources, and download free software with unknown provenance. For example, last year, 10,000 New York State employees were sent a phishing email to test their ability to recognize suspicious email and links. Three-quarters of the recipients opened the email, and 17% clicked on the embedded link.


Social Media Analysis for Reputation Management

Curt Hall

If there were any lingering doubts as to social media's potential to attack an organization's brand or reputation, they now have been laid to rest. The most recent incident involves an undercover video circulated by an animal rights group that shows alleged cruelty at a


Birds, Bats, Dandelions, Dogs, Transformers, and Convergent Evolution

Vince Kellen

In case you have forgotten your high school biology, convergent evolution occurs when different organisms from different genetic lineages acquire the same trait. Bats and birds both have wings, even though they do not share any ancestor with wings.


To Change or Not to Change?

Markus Gartner

David Anderson describes Kanban as an evolutionary change method.1 In comparison to other agile methods, Kanban can be introduced with little changes. But what are the differences between different methods? And is there a way to handle changes more successfully?


Take a SCARF to Architecture Reviews

Mike Rosen

I've been doing architecture for close to 20 years now and have built my practices based on what I've read, studied, and researched, and also from my experience of what works with clients.


Business Architecture on the March

William Ulrich

[From the Editor: This week's Advisor is from William Ulrich's introduction to the November 2011 issue of Cutter IT Journal "Business Architecture in Practice: Lessons from the Trenches" (Vol. 24, No. 11).


Measuring Collaborative Value

David Coleman

For the last decade I have been asked, "What is the ROI for collaboration?" I have come to several conclusions about this: one, that it is the wrong question to ask (and is a trap in itself) and two, everyone wants collaboration, but no one seems willing to pay fo


Is It Time to Move to Plan G, or is It Plan H?

Robert Charette

One of my favorite sayings is from former US President Teddy Roosevelt, who once said that “Risk is like fire: If controlled it will help you; if uncontrolled it will rise up and destroy you.”


Security Is the Name of the Game When It Comes to Mobile Device Management

Curt Hall

Mobility is now one of the top strategic priorities for organizations. In fact, supporting mobility is seen as so important that some organizations are offering employees the option of using their own personal devices.


Cloud Computing: Checking for Blind Spots

Suresh Malladi

Cloud computing discussions are fraught with apprehension about security, privacy, interoperability, reliability, and so on. While the advocates of cloud computing emphasize the importance of IT governance to address these issues,1 most of the practitioner literature is confined to surface-level analysis of the cloud computing concerns. Here I will focus on the nuances of some issues. In doing so, my first goal is to stimulate more thought about all issues that can mar cloud computing.


Big or Little, Devops Needs a Complete Picture

Hillel Glazer

The Cutter IT Journal from August 2011 asks, "Devops: A Software Revolution in the Making?" (Vol. 24, No.


Agile Analytics: Evolving Excellent Data Models and Architectures

Ken Collier

Last month I began an Advisor series that I am unofficially calling the "Scrum Ain't Enough" series (see "Agile