avatar

Yesterday, I gave you a preview of Monday’s Summit 2010 program. Tuesday’s program is filled with just as many sparks! The first session is a case study. It will be led by Rogelio Oliva, who in addition to being a Cutter Senior Consultant, is Associate Professor of Information and Operation Management at the Mays Business School and previously, Assistant Professor in the Technology and Operations Management Unit at the Harvard Business School. So he really knows how to present a case! The case is on IT Cost and IT Value — a pretty important topic these days! First, everyone participating in the Summit will discuss the case in small breakout groups. Then we’ll all come …

Read more

 
avatar

Here at Cutter HQ, as we fondly call it, we’re in full Summit mode: printing badges, packing boxes, tweaking the final menus – getting all the behind-the-scenes stuff done. But that’s certainly not the exciting stuff! What is exciting is the program. As always (this is the 14th Summit we’ve held here in the Boston area), there’s nothing theoretical about the program or sessions. It’s all about creating and discovering business-technology strategies that pave the way for success. And since there are no vendor sponsors, there are no pitches, subtle or otherwise, about silver bullet-type solutions. Here’s a peek at Monday’s sessions: We’re addressing cloud computing. Lou Mazzucchelli’s tackling this topic. If you’ve ever heard …

Read more

Oct 192010
 
avatar

It has been just over 50 years since preeminent IBM computer scientist Hans Peter Luhn coined the term “business intelligence.” And ever since then, BI has been viewed as getting information to the people who need it in a timely fashion and in a form that is easily consumed and acted upon (the right data to the right people at the right time). From those seemingly prehistoric days of data processing, when BI consisted primarily of monthly reports on green bar paper, to today’s splashy interactive graphics on wireless mobile devices, both the data that is available and the means with which to deliver it to the right people have changed dramatically. But have these …

Read more

 
avatar

With large global firms depending on suppliers and business partners in many locations around the world, it is pretty likely that all organizations will at some point be disrupted by some sort of crisis. And it is also pretty likely in this event that some aspect of IT will come into play — either as a source of or in response to the crisis. What is IT’s role in both crisis prevention and crisis mitigation? What kinds of tools, applications, strategies, and infrastructures work best to facilitate crisis response? The January 2011 Cutter IT Journal seeks to shed some light on this pressing issue. Proposals of interest are due 22 October. To respond, please visit …

Read more

 
avatar

There are no computer systems that are “too important to fail.” Failure, as any competent engineer will tell you, is always an option. Yet modern societies increasingly depend on systems to be foolproof. Electrical grids, air traffic control, automobile control, and medical equipment are all life-critical systems, and none of us wants to depend on life-critical systems with a high failure rate. Nobody wants to trust a large portion of his life savings to a financial trading system that is subject to unpredictable failure either. The same is true of the Internet itself. What we need to do is take a step back and study the design, architecture, and feedback control of these systems. Without …

Read more

 
avatar

Jim Highsmith and I have finalized the content and the format for our forthcoming Cutter Summit seminar. The seminar is structured around a case study which includes four exercises. We expect the case study/exercises will take close to two-thirds of the allotted time (the morning of October 27). In the other third we will provide the theory and practices to be used in the seminar exercises and (hopefully) in many future technical debt engagements participants in the workshop will oversee. The seminar does not require deep technical knowledge. It targets participants who possess conceptual grasp of software development, software governance and IT operations/ITIL. If you feel like reading a little about technical debt prior to …

Read more

 
avatar

Legacy modernization — seemed like a good idea at the time. So why do so many modernization projects end in failure? How can we properly measure the complexity of the task and plan the project accordingly? What are the best ways to modernize and extract value from a legacy application while at the same time preserving business knowledge? The upcoming issue of Cutter IT Journal seeks to tackle these tough questions and provide insight into the strategies and approaches that can lead to successful legacy modernization initiatives. Join the debate in the December 2010 Cutter IT Journal — with Guest Editor Don Estes. To share your perspective with us, send us a short article abstract …

Read more

 
avatar

Early this year, fellow Cutter Consultants Mitch Ummel, Mike Rosen, and I wrote an Executive Report on the Smart Grid. In that report, we talked about all the potential that the Smart Grid offers, how it would be designed, and also about the serious problems that such an ambitious undertaking faces — especially problems related to reliability and security. We expressed fears that since the next generation of Smart Grid electrical utilities is based on current standards taken from the Internet and the current generation of operating systems, it would be subject to serious attacks by more and more sophisticated hackers which, in turn, could seriously jeopardize the reliability and security of our most critical …

Read more

 
avatar

The worst mistake is not telling the boss. Or so said an article a few years ago in the Washington Post about the importance of immediately disclosing problems or mistakes to your boss.1 I am a great believer in this idea as well, which is part of what the late management theorist and practitioner Peter Drucker called “information responsibility.” Without knowing the true state of play, it is pretty difficult to manage enterprise risk effectively.2 This Washington Post article came to mind again as I read a Bloomberg News article last week dealing with the roots of the financial meltdown,3 as well as from a recent coincidental conversation I had with a friend of mine …

Read more

 
avatar

Security and data privacy/regulatory considerations are two of the biggest bottlenecks standing in the way of more organizations adopting cloud computing. Simply put, many organizations have serious misgivings about using cloud computing — in particular, software as a service (SaaS) offerings — due to regulatory requirements prohibiting them from using the cloud for storing sensitive data, or due to concerns about the privacy and security of data residing in the cloud. Organizations have also gone to considerable lengths to put the systems and processes in place that enable them to enforce consistent access control policies for their enterprise applications. Thus, it is quite understandable that many organizations remain leery of the security capabilities for ensuring …

Read more