Find analysis of data from Cutter's ongoing industry research efforts, brief treatments of topics that don't require the in-depth research of an Executive Report, updates on previously-covered topics, and more, in 2-4 page Executive Updates.

SaaS Appeal Growing

Jeffrey Kaplan

In late 2005 and early 2006, Cutter Consortium published a series of Executive Updates 1 based on the results of its first software-as-a-service (SaaS) survey, which dispelled many of the misconceptions about the relatively new phenomena at the time.


Using Video Games to Enhance Training

Brian Dooley

Gaming and simulation have been used for some time in education as "edutainment" -- from model UN and political scenarios in high schools to courtroom reenactments for those studying law. In business, role-playing games and simulations have long been a part of management training. Today, gaming and simulation are reaching entirely new levels and new audiences as they go online and merge with the vast and ever-growing video gaming sector.


A Pragmatic Approach to Implementing ITIL: Part II -- Process Development and Success

J. Benjamin Moore, Jr.

In Part I of this two-part Executive Update series, I provided an overview of the methodology and approach used to develop detailed business processes for managing an IT environment, specifically related to the IT Infrastructure Library (ITIL) and its service management component. A real-life case study was presented, describing one of my clients -- a large organization with more than 50,000 employees that had limited understanding of ITIL or the benefits of service management.


Service-Oriented Architecture: Strengths and Weaknesses

Tom Welsh

This is the third in a series of four Executive Updates in which I am analyzing the results of a recent Cutter Consortium survey on service-oriented architecture (SOA).


Business Modeling and Analytics

Brian Dooley

Business modeling currently describes a vast territory with conflicting purposes, methods, and outcomes. Some of the confusion is historical -- as between financial modeling and models created specifically for software development, for example.


Synthesis of Lean, Mindful, and Agile with the Theory of Constraints

Christoph Steindl, Christian Federspiel

A May 2006 article in APICS magazine describes the search by a California-based global electronics manufacturer for the best approach to continuous improvement.1 The company found that the right combination of the Theory of Constraints (TOC),2 Lean, and Six Sigma3 led to the most effective long-term results (see sidebar "In Search of the Best Approach").


Revisiting the "IT Doesn't Matter" Argument

Steve Andriole

There were inklings of technology concern in the early 1990s, but they all disappeared when the Internet intoxicated everyone. But since 2000, there have been a series of challenges about the value of information technology, about whether or not IT is still really important. Paul Strassmann, for example, has argued for years that investments in technology do not predict profitability or growth (www.strassmann.com).


Running Your EA Practice Like a Business: A Holistic Approach

Tushar Hazra

Imagine a perfect world where everything works just fine -- all goes as planned and nothing goes off track. For a CIO attempting to deliver business solutions in today's IT world, there is no such thing as a perfect world. Most CIOs and other practitioners involved in making business decisions willingly agree on one thing: change is the only constant fact in their world.


BI in the 21st Century: Models for Dynamic Real-Time Business Optimization

Steve Andriole

Let's anticipate where we'll all be in 10 years and then try to figure out how to get there. As more technology becomes commoditized and continues to deliver reliable, secure, and "always on" services, the role it plays in the early 21st century will continue to change dramatically. Twenty years ago, we said it was all going to be about the data; 20 years from now, it's all going to be about information, knowledge, and the intelligence they enable.


The Agile Path

Patrick Wilson Welsh

It does us no good to look for enemies in software development, or even victims to be protected from the enemies. When we presume there is a Them that is somehow set against an Us, we are already subtly creating a barrier that creates Them. We are alienating people, which is rarely helpful. We may not realize we are doing it, but the damage (and missed opportunity) is still real. Unfortunately, the early years of the agile movement have been divisive -- full of battle lines of one kind or another. Many of us have artificially divided software development into "agile" and "not agile" -- as if agility were somehow binary.


Internal IT Controls Above and Below the Border: SOX and Canada's Bill 198

Daniel Langin
INTRODUCTION

It has sometimes been said of the US and UK that they are two nations separated by a common language. In some respects, the same can be said about Canada and the US. Upon crossing the border, miles turn to kilometers, gallons to liters, and a dollar (although still called a dollar) buys more or less, depending on which direction one is headed.


Business Process Outsourcing Risks: A Multitude of Flavors

Yuwei Shi

Theoretically speaking, there is nothing in business that cannot be outsourced. This extreme view sees an infinite, irreversible trend of more and more business activities being outsourced, from as early as when power supply was outsourced to specialist power plants, which most companies of the world now take for granted. In the context of IT, the ever-increasing scope of outsourcing remains controversial. The focal point of this controversy lies within business process outsourcing (BPO).


Wiki Cool and Effective Technology

John Berry

Some of the big technologies, the ones with the deepest impact on the everyday work lives of people, prove to be some of the least complex to learn and use. Think e-mail and the word processor. After having mastered these tools, you stand back and ask the question every meaningful innovation begs: why didn't someone invent these sooner? So too will users demand an answer to this question: couldn't someone have invented the corporate wiki years ago, when I could have first used it?


Corporate Adoption of Text Mining Technology: Trends and Directions

Curt Hall

Although text mining technology has been available for years, its use has mainly been relegated to intelligence agencies, news providers, wire services, and other organizations whose business primarily centers on the handling or processing of large volumes of textual information.


Methodology Object Management and Quality Assurance

Charles Butler
INTRODUCTION

In a 2004 Cutter IT Journal article, Methodology Object Management (MOM) was introduced to fit an entire range of software development processes -- from the "heavy" traditional waterfall approach to "light" agile development methods [2]. MOM's basic tenets were developed for IT organizations that have multiple development cultures but aspire to manage the overall development structure consistently -- regardless of the software technique used in the various business lines.


Best Practices in ERM

Donna Fitzgerald

There is no single best practice that is appropriate for all areas of risk associated with IT. Each risk area has a number of practices that should be considered. In this Executive Update, I focus on the following three areas:

Business strategy risks

Compliance risks

Process risks


The Configuration Concept: Supplier Grouping

Sara Cullen

This Executive Update is the second in a series that examines information and communications technology (ICT) outsourcing and its various configuration options. The series is based on a recent Cutter Consortium survey of 73 organizations in 25 countries across the globe. 1


Sun's New Business Model

Manish Srivastava

Sun Microsystems has released its operating system (Solaris 10) and Java Enterprise System (JES) under a new subscription scheme in which the customer gets the entire enterprise software stack for free, and support is charged on a per-employee-per-year basis instead of the typical per-processor-per-user model. The JES contains Sun's portal server, application server, identity server, Web server, clustering software, and some other similar products.


A Pragmatic Approach to Implementing ITIL: Part I -- Getting Started

J. Benjamin Moore, Jr.

This Executive Update, the first in a series of two, provides an overview of the methodology and approach used to develop detailed business processes for managing an IT environment. A real-life case study using an approach for creating service management processes and subprocesses is presented, and the interfaces needed to support application development migration are identified. Finally, an example process model as well as process flows are included.


Service-Oriented Architecture: Strategies and Implementation

Tom Welsh

This is the second of four Executive Updates in which I shall be analyzing the results of a recent Cutter Consortium survey on service-oriented architecture (SOA).


Just Enough Organization

Steve Andriole

Lots of companies wrestle with organizational structure. Consultants and gurus have all sorts of ideas about how to organize technology in just about every company in the world. But what should the basics look like? What are the pieces that should work for just about all companies -- regardless of their vertical industry?

There are five primary pieces -- all under the authority of the office of the chief information officer (CIO):

A governance organization


Service-Oriented Architecture: Awareness and Plans

Tom Welsh

Five years have passed since service-oriented architecture (SOA) started to become the IT industry's favorite new topic, displacing older paradigms such as client-server, object orientation, and transaction processing. When making critical decisions about future architecture and procurement plans, it is especially desirable to obtain as many hard facts as possible; so Cutter Consortium recently conducted a survey to establish what IT user organizations are thinking and doing about SOA.


Podcasting and Defamation in the US

Jeffrey Hermes, Samantha Gerlovin
WHAT IS PODCASTING?

Podcasting is the distribution of audio and/or video content via the Internet on a subscription basis.


Agile Code Priorities: Part II -- Using a Priority Hierarchy in Different Types of Scenarios

Patrick Wilson Welsh

In the first Executive Update of this series concerning agile code priorities (Vol. 7, No. 16), I presented a priority scheme for making code-related choices. Here in Part II, I'll go over a few different scenarios in which these priorities may be used, and I'll discuss which specific choices are best in each scenario.


A Tale of Two Privacies: Protection for Private Consumer Information Under US and EU Law

Daniel Langin
INTRODUCTION

The novel A Tale of Two Cities 1 begins with the oft-quoted line, "It was the best of times, it was the worst of times...." Although these words were written to describe the situation prior to the French Revolution, the same words could apply with equal force to the situation consumers face today with respect to protection of their private information.