Category

Featured

Mar 282017
 
Building the Case for Blockchain in Your Organization

Is there a case for blockchain in your organization? Cutter Business Technology Journal contributing authors Steven Kursh and Arthur Schnure recently argued that companies should begin considering which parts of their organization might benefit from blockchain. Among their advice to CIOs and CTOs is to look for areas of friction when it comes to exchange of value or information that would benefit from a blockchain implementation and profit from a shared ledger system. Write Kursh and Schnure, “Take a page from IBM, which announced in July 2016 that it plans to implement a solution to help its finance division resolve client and partner disputes. IBM believes the new system — one of the largest commercial rollouts of Read more

Mar 212017
 
The Truth about Transformation

According to Dr. Stephen J. Andriole, Cutter Fellow and Professor of Business Technology at Villanova University, most professionals think digital leverages emerging technologies. However, Steve Andriole’s experience tells a different story: “The truth is that most transformational leverage comes from operational and strategic technology rather than emerging technology. This is because many business models and processes are antiquated, as evidenced by the relative ease with which, for example, Uber and Airbnb cut directly into the taxi and hotel markets. Of course, there are countless ways emerging technology can improve — and even disrupt — processes and even whole industries, but the real leverage lies with operational and strategic technology, especially when they are leveraged together. “Does this mean that Read more

Oct 262016
 
IoT-based DDOS Attacks

Last week’s DDoS attack against Dyn Inc. had an impact on many organizations beyond the reported hits to PayPal, Twitter, Amazon, Spotify, and others. Even Cutter’s website search function was out of commission for a short while! Experts have warned that at some point, smart versions of devices such as refrigerators, televisions and thermostats could be manipulated to alter their basic functions, but did anyone foresee that these devices would be used to launch a third-party attack? This isn’t the first time it’s happened, and it’s not likely to be the last. In the July 2016 Cutter article Securing the IoT: It Takes the Global Village, author David Tayouri discusses the threats Internet of Things Read more

Jan 262016
 
Thank You, Ed, for All You Gave Us

As many of you will know by the time you read this, Ed Yourdon died last week. He was a pioneer in software engineering, author of 26 computer books and hundreds of computer articles, a prominent consultant and lecturer, and, here at Cutter, founder and longtime Editor of what is now known as Cutter IT Journal. Ed also cofounded the Consortium part of Cutter, authored many Cutter technology journals, and wrote thousands of Cutter email advisors. Most importantly, Ed was a great friend to all of us. His influence on Cutter’s mission and values endures. My first encounter with Ed was at a CASE conference. He had just delivered a brilliant keynote that, true to form, Read more

Jan 122016
 

[All posts in this series: 1, 2, 3, 4] As I read through Tom Grant’s article on Agile Frameworks, one word kept jumping out at me: structure! People like frameworks because they provide a structure that is repeatable. As I think back to all the Agile deployments I have dealt with, there were many misconceptions about Agile but the one that was consistent was that Agile did not have structure. Many managers who asked for Agile to be implemented had the idea that being Agile meant that you didn’t have to do many of the things that they were doing with the other software development process they were using. Managers focused on the literal meaning Read more

Dec 172014
 
It’s 2015 – Do You Know Where Your Data Is?

The “Internet of Things” will take further hold and become more fully embedded as a reality in our society. However, a tipping point is likely to be reached in 2015 as public awareness of the potential for these technologies to violate personal privacy increases. This will lead to an associated public outcry for stricter controls and government legislation regarding how people, organizations and government collect and use this information. The public will no longer be satisfied to leave technology companies and users to self-police their uses of their personal data. Surveillance and other technologies that permit the collection of data about people will continue to proliferate. Analytical tools are emerging to interpret this information, and Read more

What really is an MVP?

 Posted by on Nov 24, 2014  2 Responses »
Nov 242014
 
What really is an MVP?

In his highly influential book, The Lean Startup, Eric Ries introduced term “minimal viable product” (MVP). As Ries rightly points out, firms putting out new products typically spend too much time and money on features that miss the mark somehow in meeting customer needs or are simply unnecessary. The result is a delayed over-expensive product that is more likely than not an economic failure. Reese proposes a better alternative: put out the least function (minimal) product that you can that might meet customer needs or at least will draw customer attention (viable). This way the team can test the market with different feature sets, get customer feedback, and commit development resources to the expensive activity Read more