Robotic process automation (RPA) and cognitive automation (CA) tools are getting a lot of attention. But, as reported by Mary Lacity and Leslie Willcocks in their new report, Smart Service Automation: Benefits, Cases, and Lessons, potential adopters of these new types of service automation tools remain skeptical about the claims surrounding their promised business value. These potential adopters are still not sure why an organization would move to service automation, what they’d achieve if they were to do it, and what are the best practices. To answer these questions, Lacity and Willcocks conducted two surveys of 143 outsourcing professionals and interviewed 48 people, including service automation adopters, providers, and advisors. From the interviews, they identified 20 adoption journeys. The 20 Read more
Anne Mullaney oversees Cutter's marketing and product development activities and in-house editorial/research teams. She has more than 25 years experience in the high-tech publishing business. Read more ...
Data-centric protection and security focuses on the organization’s sensitive data (as opposed to its overall computer networks and applications). This is accomplished by locating, identifying, and cataloging sensitive data as well as by applying encryption, data masking, and policy-based data access controls (and end-user monitoring) to protect data residing across multiple enterprise environments. To what extent are organizations adopting, or planning to adopt, data-centric protection and security practices? In a recent Cutter Consortium survey, Senior Consultant Curt Hall asked 50 organizations about their data protection practices to shed some light on this important question. As shown in the figure below, more than a third (37%) of surveyed organizations currently have data-centric protection and security practices in place. Read more
Cutter Consortium has been conducting a survey to gain insight into how organizations are adopting — or planning to adopt — blockchain technology. We are also looking to identify important issues organizations are encountering (or foresee encountering) in their blockchain efforts. In addition to analyzing the data, Cutter Senior Consultant Curt Hall has been conducting phone interviews with leaders and practitioners from different organizations who are implementing or working to implement blockchain applications. Their opinions and recommendations on using the technology add depth and richness to Curt’s analysis. Curt will be presenting his findings in a series of Executive Updates over the next couple of months. Hall’s first Executive Update, published last week, examined the initial survey Read more
There is a common set of questions burning in peoples’ minds when they think about the business architect role, whether they are new to the discipline or experienced but seeking to compare approaches. Recently, Cutter Senior Consultant Whynde Kuehn addressed these important questions in depth in a Business & Enterprise Architecture Advisor. Here’s a bulleted outline: 1. What Do Business Architects Do? The business architect role is a strategic one that works at an enterprise level across business units. At a high level, business architects: Facilitate the application of business architecture for business and IT value. Build and maintain the business architecture knowledgebase. Provide input to and assist with the internal business architecture practice. 2. How Read more
Is there a case for blockchain in your organization? Cutter Business Technology Journal contributing authors Steven Kursh and Arthur Schnure recently argued that companies should begin considering which parts of their organization might benefit from blockchain. Among their advice to CIOs and CTOs is to look for areas of friction when it comes to exchange of value or information that would benefit from a blockchain implementation and profit from a shared ledger system. Write Kursh and Schnure, “Take a page from IBM, which announced in July 2016 that it plans to implement a solution to help its finance division resolve client and partner disputes. IBM believes the new system — one of the largest commercial rollouts of Read more
According to Dr. Stephen J. Andriole, Cutter Fellow and Professor of Business Technology at Villanova University, most professionals think digital leverages emerging technologies. However, Steve Andriole’s experience tells a different story: “The truth is that most transformational leverage comes from operational and strategic technology rather than emerging technology. This is because many business models and processes are antiquated, as evidenced by the relative ease with which, for example, Uber and Airbnb cut directly into the taxi and hotel markets. Of course, there are countless ways emerging technology can improve — and even disrupt — processes and even whole industries, but the real leverage lies with operational and strategic technology, especially when they are leveraged together. “Does this mean that Read more
I’m sure our invitation isn’t the only one you’ve received to a conference on digital transformation. So, you’re probably wondering, what makes Cutter’s Summit 2016 — focused on digital transformation — different and worth spending the time and money on? Here are just 3 of the many ways that the Summit stands out: 1. No lectures, no talking heads. Every session is interactive. There’s a case study session, where you’ll work through the GE and the Industrial Internet case; first on your own, reading the case before you even arrive in Boston, and then with a small group of your peers at the Summit, and finally in a high-energy conversation facilitated by Harvard Business School Read more