Advisors provide a continuous flow of information on the topics covered by each practice, including consultant insights and reports from the front lines, analyses of trends, and breaking new ideas. Advisors are delivered directly to your email inbox, and are also available in the resource library.
Testing Assumptions About Security Awareness
It's clear that our once-a-year, work-your-way-through-a-slide-set approach to computer security training doesn't work. Even with this training, people still write down their passwords, click on links in emails from untrusted sources, and download free software with unknown provenance. For example, last year, 10,000 New York State employees were sent a phishing email to test their ability to recognize suspicious email and links. Three-quarters of the recipients opened the email, and 17% clicked on the embedded link.
To Change or Not to Change?
Take a SCARF to Architecture Reviews
Business Architecture on the March
[From the Editor: This week's Advisor is from William Ulrich's introduction to the November 2011 issue of Cutter IT Journal "Business Architecture in Practice: Lessons from the Trenches" (Vol. 24, No. 11).
Measuring Collaborative Value
Is It Time to Move to Plan G, or is It Plan H?
Cloud Computing: Checking for Blind Spots
Cloud computing discussions are fraught with apprehension about security, privacy, interoperability, reliability, and so on. While the advocates of cloud computing emphasize the importance of IT governance to address these issues,1 most of the practitioner literature is confined to surface-level analysis of the cloud computing concerns. Here I will focus on the nuances of some issues. In doing so, my first goal is to stimulate more thought about all issues that can mar cloud computing.
Big or Little, Devops Needs a Complete Picture
The Cutter IT Journal from August 2011 asks, "Devops: A Software Revolution in the Making?" (Vol. 24, No.
Agile Analytics: Evolving Excellent Data Models and Architectures
Last month I began an Advisor series that I am unofficially calling the "Scrum Ain't Enough" series (see "Agile
Social Media: A Roadmap for Reasoned Adoption
Anything Measurable Will Be Measured
Considerations for Scalability
Security and the Enterprise
Security of information is a hot topic these days. That is probably because cyber crime has reached a level of popularity that far outstrips the drug trade in terms of ROI for everybody from old-fashioned Mafiosi types to any kid in the Ukraine with a computer. And given the fact that crime on the Internet is all about money, any CEO who does not take all of the steps necessary to secure their organization against cyber attacks is rolling the dice with their company's assets. At least that's what current doctrine would like you to believe.
Toward a Knowledge Architecture
Reflections on Innovation, Part II: A Useful Idea -- Special Things
In the first installment of this Advisor series (Reflections on Innovation, Part I: An Idea, 29 September 2011), I suggested that you can conceive the idea of something -- its perfect,
Go Big or Go Home with Agile
Modeling Languages that Support BPM
Need Software Engineers to Develop Secure Software? Put It in Your Job Descriptions!
Recently I had occasion to review software engineering position descriptions to try to understand what skills were sought after for entry-level software engineers. Much to my chagrin, I found that the top-level requirements, and for the most part the secondary requirements, made no mention of knowledge of how to develop secure software, how to avoid coding vulnerabilities, how to do threat modeling, and so on.
Gonnegtions, the Occupy Movement, and the Future of Decision Making
In the literary classic The Great Gatsby, Meyer Wolfsheim hints at some shady business "gonnegtions" (an intentional mispronunciation of "connections"), suggesting that there's money to be made if the protagonist is a fellow "businessman" (read: criminal). Over the past few weeks, we've seen the Occupy Wall Street movement
The Make-Up of a Big Agile Engagement: You Need Two Frameworks
The "secret sauce" of agile productivity at the team level is that everyone does the most important thing at any point in time. Instead of following a rigid plan in which it takes months, and possibly years, to act on feedback, agile methods are geared toward immediacy of feedback and subsequent adaptation.

