Category

Featured

Apr 112017
 
Who is Taking the Lead on Blockchain?

Cutter Consortium has been conducting a survey to gain insight into how organizations are adopting — or planning to adopt — blockchain technology. We are also looking to identify important issues organizations are encountering (or foresee encountering) in their blockchain efforts. In addition to analyzing the data, Cutter Senior Consultant Curt Hall has been conducting phone interviews with leaders and practitioners from different organizations who are implementing or working to implement blockchain applications. Their opinions and recommendations on using the technology add depth and richness to Curt’s analysis. Curt will be presenting his findings in a series of Executive Updates over the next couple of months. Hall’s first Executive Update, published last week, examined the initial survey Read more

Apr 042017
 
What is the Role of the Business Architect?

There is a common set of questions burning in peoples’ minds when they think about the business architect role, whether they are new to the discipline or experienced but seeking to compare approaches. Recently, Cutter Senior Consultant Whynde Kuehn addressed these important questions in depth in a Business & Enterprise Architecture Advisor. Here’s a bulleted outline:  1. What Do Business Architects Do? The business architect role is a strategic one that works at an enterprise level across business units. At a high level, business architects: Facilitate the application of business architecture for business and IT value. Build and maintain the business architecture knowledgebase. Provide input to and assist with the internal business architecture practice. 2. How Read more

Mar 282017
 
Building the Case for Blockchain in Your Organization

Is there a case for blockchain in your organization? Cutter Business Technology Journal contributing authors Steven Kursh and Arthur Schnure recently argued that companies should begin considering which parts of their organization might benefit from blockchain. Among their advice to CIOs and CTOs is to look for areas of friction when it comes to exchange of value or information that would benefit from a blockchain implementation and profit from a shared ledger system. Write Kursh and Schnure, “Take a page from IBM, which announced in July 2016 that it plans to implement a solution to help its finance division resolve client and partner disputes. IBM believes the new system — one of the largest commercial rollouts of Read more

Mar 212017
 
The Truth about Transformation

According to Dr. Stephen J. Andriole, Cutter Fellow and Professor of Business Technology at Villanova University, most professionals think digital leverages emerging technologies. However, Steve Andriole’s experience tells a different story: “The truth is that most transformational leverage comes from operational and strategic technology rather than emerging technology. This is because many business models and processes are antiquated, as evidenced by the relative ease with which, for example, Uber and Airbnb cut directly into the taxi and hotel markets. Of course, there are countless ways emerging technology can improve — and even disrupt — processes and even whole industries, but the real leverage lies with operational and strategic technology, especially when they are leveraged together. “Does this mean that Read more

Oct 262016
 
IoT-based DDOS Attacks

Last week’s DDoS attack against Dyn Inc. had an impact on many organizations beyond the reported hits to PayPal, Twitter, Amazon, Spotify, and others. Even Cutter’s website search function was out of commission for a short while! Experts have warned that at some point, smart versions of devices such as refrigerators, televisions and thermostats could be manipulated to alter their basic functions, but did anyone foresee that these devices would be used to launch a third-party attack? This isn’t the first time it’s happened, and it’s not likely to be the last. In the July 2016 Cutter article Securing the IoT: It Takes the Global Village, author David Tayouri discusses the threats Internet of Things Read more

Jan 262016
 
Thank You, Ed, for All You Gave Us

As many of you will know by the time you read this, Ed Yourdon died last week. He was a pioneer in software engineering, author of 26 computer books and hundreds of computer articles, a prominent consultant and lecturer, and, here at Cutter, founder and longtime Editor of what is now known as Cutter IT Journal. Ed also cofounded the Consortium part of Cutter, authored many Cutter technology journals, and wrote thousands of Cutter email advisors. Most importantly, Ed was a great friend to all of us. His influence on Cutter’s mission and values endures. My first encounter with Ed was at a CASE conference. He had just delivered a brilliant keynote that, true to form, Read more

Jan 122016
 

[All posts in this series: 1, 2, 3, 4] As I read through Tom Grant’s article on Agile Frameworks, one word kept jumping out at me: structure! People like frameworks because they provide a structure that is repeatable. As I think back to all the Agile deployments I have dealt with, there were many misconceptions about Agile but the one that was consistent was that Agile did not have structure. Many managers who asked for Agile to be implemented had the idea that being Agile meant that you didn’t have to do many of the things that they were doing with the other software development process they were using. Managers focused on the literal meaning Read more