avatar

Many of the discussions I am exposed to as an agile consultant are about this question, “Have Agile methods crossed the chasm?” The client wants to know whether he or she will be using a software method that has reached a certain level of maturity and acceptance. Needless to say, the question is of critical importance. A client might be willing to be an early adopter, or even desire to be an early adopter, but he or she wants to be very clear up front about the maturity level of the software method to be adopted. As important as the question is, I will not try to debate it here, as beauty is often in …

Read more

 
avatar

Cutter Consortium is pleased to announce that Hubert Smits and Ralph Hughes have joined our team as Senior Consultants. Hubert Smits is an innovative, assertive, and goal-oriented agile consultant, coach, and trainer who has successfully spearheaded enterprise-level agile-lean enablement efforts, including those at Oracle, Avaya, BMC Software, AOL, Fender, GE Energy, Amdocs, MySpace, and Compete. He specializes in working with large product development efforts in organizations that require organization-wide move to Agile practices. Israel Gat, Director of Cutter’s Agile practice, said “Hubert Smits is broadly acclaimed as the best Agile teacher/coach in the US. He possesses deep expertise and a ton of experience in large scale end-to-end Agile rollouts. We are extremely proud that he’s …

Read more

 
avatar

For every vendor presentation claiming that cloud computing is an unprecedented revolution, there is an analyst paper denouncing the hyperbole. Every new example of IT goes through this phase, just as surely as a child goes through the “terrible twos” — and at about the same age. When a concept does not catch on, the providers and analyst firms have a ready solution: rename and restart. The move to “pay per view” use of externally hosted IT resources was given several other names over the past decade, and a new bout of fever erupted each time; two examples are “utility computing” coined by Sun and HP (2000) and “on-demand computing” by IBM (2002). No one …

Read more

 
avatar

Congratulations to Cutter Consortium Senior Consultant Ken Collier! His latest book, Agile Analytics: A Value-Driven Approach to Business Intelligence and Data Warehousing, was named one of the “11 Books to Recharge Your Leadership Skills” by CIO-Insight. A leading expert with Cutter’s Business Intelligence and Agile Product & Project Management practices, Ken is the developer of the Agile Business Intelligence (Agile BI) methodology, which combines agile methods with data warehousing, business intelligence, and advanced analytics. He has successfully adapted agile techniques to DW/BI to create the Agile Analytics style. He continues to refine these ideas as a technical lead and project manager on several agile DW/BI project teams. As CIO-Insight points out, Ken’s latest book is …

Read more

 
avatar

Of the many challenges facings today’s CIO, perhaps none is more daunting or critical as the development of its IT personnel — especially in light of changing workforce demographics and evolving technology trends. It begs the question — “is the age of the ‘deep IT technologist’ behind us?” The September 2011 Cutter IT Journal, with Guest Editor Robert Scott, will examine both the opportunities and challenges in recruiting, retaining and developing the skills and competencies of the 21st Century IT staff. Proposals of interest are due 23 June 2011. To respond, please visit http://www.cutter.com/content-and-analysis/journals-and-reports/cutter-it-journal/callforpapers02.html

 
avatar

I keep six honest serving-men  (They taught me all I knew);  Their names are What and Why and When  And How and Where and Who. – “The Elephant’s Child,” by Rudyard Kipling Green IT practice translates the green IT strategies, plans, and policies in the day-to-day workings of the organization by using its transformational and operational capabilities. My approach to green IT in practice is based on four distinct yet interrelated dimensions of business: economy (why), technology (what), process (how), and people (who). I have discussed this approach in detail in my book Green IT Strategies and Applications.1 Reiterating my oft-expressed view of green IT in practice: unless the greening effort is tied closely to the …

Read more

May 312011
 
Green IT in 2011

According to my calendar, it’s time to revisit International Green IT Awareness Week. Pop by their site and sign up for some of the webcasts they have scheduled for this week — I’m sure you’ll find sessions on some key Green IT topics that are useful to you. Green IT continues to be a topic Cutter covers regularly — both because cost savings is a critical agenda item in nearly every discussion of IT — and because we believe it’s a good thing to do! We supports International Green IT Awareness Week’s mission to “initiate, promote and support green IT discussions, emboldening employees with the knowledge and innovative ideas to reduce the environmental footprint of …

Read more

 
avatar

Dispatched to Saigon in 1963, a fact finding mission reported back to Washington in two voices. The military envoy was quite optimistic on the prospects for success in Vietnam. In contrast, his counterpart from the state department was very pessimistic. Puzzled by the variance between the two reports, JFK inquired ”You two did visit the same country, didn’t you?” A variant of the question often comes to my mind during the interviews I do in preparation for my executive workshops. The variance between what I hear from one exec versus what I hear from another makes me wonder whether the two are actually working for the same company. For example, the past week an interviewee from a company …

Read more

 
avatar

We seem to invest heavily in IT service management solutions that are highly dependent upon agent technologies for the visibility needed to “drive” (i.e. access, secure, manage and control) the desktops, laptops and servers within our IT infrastructure.  Are these applications so compelling that we trust traditional agent-based management models which are inherently vulnerable to the same risks as the endpoints they manage? Is it wisdom to introduce the resultant IT operational handicaps of being unable to identify over 15-20% of our infrastructure’s endpoints1 due to issues of hidden, missing, outdated, or misconfigured agents required for anti-virus, inventory and patches? Given the significance of the functionality of these mission critical IT management and security applications, …

Read more

May 172011
 
avatar

On one of the LinkedIn groups I belong to, someone just posted this discussion item: “Is Open Compute for Everyone? I guess the cloud is no longer technology’s darling. All the IT buzz now surrounds the Open Compute Project. If you are not familiar with the Open Compute Project, take a quick look at http://opencompute.org. You will see that this is really the brainchild of some bright engineers at Facebook, and the results are impressive.” Here’s the comment I posted in reply, and I think I missed several more points in the heat of the moment: “‘The cloud is no longer technology’s darling?’ Nonsense. If you look at the blogs, the conferences, the papers by …

Read more