Related Reports

Reports from the Cutter Consortium

A 21st-Century Enterprise Microarchitecture
McDavid, Doug | Executive Reports |
The 21st-century enterprise architecture (EA) must expand far beyond enterprise-wide IT in order to become a powerful management tool for designing the enterprise and maintaining its health. This Executive Report develops a simple microarchitecture framework as a foundation for additional innovative architectural views of the structure and behavior of enterpr...

, Cutter Consortium: Data Insight & Social BI
How to Make an Elephant Go Through a Needle's Eye
Konkol, Sebastian | Executive Reports |
Enterprise-grade data warehouse (DW) and business intelligence (BI) projects are still perceived as "heavy" and believed to be successful only by attacking them with waterfall-style software development processes. While there are specific DW/BI endeavors that project teams can safely execute as waterfall, most can be successfully transformed into Agile pr...

, Cutter Consortium: Data Insight & Social BI
Cloud Management: Where We Are Going and How to Get There, Part I -- SMAC Tre...
Willcocks, Leslie P.; Lacity, Mary C. | Executive Reports |
The cloud represents a potential crossing point. However, our research over a span of four years has found time and again that it takes a huge amount of effort to make the cloud work to scale for the long term. Executives need to address five major trends and understand the likely impacts of SMAC technologies and automation. This Execu...

, Cutter Consortium: Data Insight & Social BI
Developing Connected Products and Services for the Internet of Things
Hall, Curt | Executive Reports |
Mobile, networking, cloud, analytic, and electronic sensor technologies have evolved to the point where it is now practical for organizations to implement connected products and services that can extend and enhance their relationships with customers, streamline business processes, and lead to new lines of revenue and even new business models. Although the benefi...

, Cutter Consortium: Data Insight & Social BI
Social Business Analytics: Beyond Social Media Listening
Hall, Curt | Executive Reports |
Every day, people create billions of posts on social media sites and on customer forums, blogs, and company Web pages. This tsunami of social content is dramatically changing the way companies follow and engage consumers. But just listening to social conversations is no longer sufficient. Taking advantage of social media insight requires integrating and analyzin...

, Cutter Consortium: Data Insight & Social BI
Creating Crowd Value: Taking the Next Step Beyond the Social Enterprise
Coleman, David | Executive Reports |

As a business leader you're probably just starting to contend with social networks in your business and often find them to be of questionable value. The "social enterprise" is being touted as the next big thing: the new way to do business and a "social" way to do business. But the next big thing in collaboration is crowds, not the social enterprise. Social...

, Cutter Consortium: Business Technology Trends & Impacts
Applying Decision Models to Resource Allocation in Network Security
Moitra, Soumyo | Executive Reports |

Making effective decisions regarding the allocation of resources for network security is a key part of business today. This Executive Report focuses on the relevant issues, including a number of questions that require special attention from CIOs and chief security officers (CSOs). The report presents the questions to be asked, offers ways of answering them...

, Cutter Consortium: Enterprise Risk Management & Governance
Is It Time to Radically Change Your Approach to CRM?
Love, Jim | Executive Reports | 22 August 2011 | Innovation; Business Intelligence; Business-IT Strategies

CRM continues to ride a growing wave of interest as businesses struggle to find any way to gain advantage in difficult markets and difficult economic situations. Companies have demanded, or at least pursued, strategies that I call the "Three Fs" (features, functions, and fads). Vendors ha...

, Cutter Consortium: Innovation
Corporate Cyber Attacks, Threats, and Security
Majumdar, Arun K. | Executive Reports | 19 May 2011 | Enterprise Risk Management & Governance

This Executive Report by Arun K. Majumdar provides executives, government workers, and security professionals a fast track to gaining insight into cyber security. It covers executive liabilities and accountabilities, the top eight cyber security cases, situational awareness, and a multitude of need-to...

, Cutter Consortium: Enterprise Risk Management & Governance
The Emerging Risk Environment and What You Need to Know About It
Dooley, Brian J. | Executive Reports | 01 October 2010 | Enterprise Risk Management & Governance

In recent years, both the enterprise risk environment and enterprise security measures have evolved considerably. In this Executive Report by Brian J. Dooley, we look at how risk is now being brought into the fold of a unifying concept, enterprise risk management (ERM), which attempts to consolidate...

, Cutter Consortium: Enterprise Risk Management & Governance
The Debate Surrounding Offshoring and Its Effect on Employment
Cullen, Sara; Gupta, Nupur; Manap, Madina; Rosales, Alejandro | Executive Reports | 01 August 2010 | Business Technology Trends & Impacts; Sourcing & Vendor Relationships

Although offshoring has existed in a variety of forms for decades, its controversy continues unabated. The debate includes whether offshoring actually saves money or not, what activities are and are not good candidates for off...

, Cutter Consortium: Business Technology Trends & Impacts
Achieving Business Benefits by Implementing Enterprise Risk Management
Sherringham, Keith; Unhelkar, Bhuvan | Executive Reports | 01 July 2010 | Enterprise Risk Management & Governance

The global financial crisis and the oil spill in the Gulf of Mexico highlight the significance of risk in business and the need to embed capacities and capabilities for the management, mitigation, and response to risk. From the ownership of risk by company directors through managemen...

, Cutter Consortium: Enterprise Risk Management & Governance
Bungee Jumping ... System Style: The Risks Complexity Brings to Systems
Orr, Ken; The Cutter Business Technology Council; Grochow, Jerrold; Margáin, Julio César | Executive Reports | 01 April 2010 | Business Technology Trends & Impacts

Society is becoming increasingly dependent on complex, technology-rich systems. With increased complexity comes increased potential for disaster, since we currently lack the ability to understand how such large-scale, interconnected ...

, Cutter Consortium: Business Technology Trends & Impacts
Has a Flat World Flattened Education, Too?
Scott, Robert D.; The Cutter Business Technology Council; Weis, Allan H.; Nolan, Richard L. | Executive Reports | 01 June 2010 | Business Technology Trends & Impacts

Colleges and universities are rapidly adopting online learning and other computer-based learning tools and techniques. The next generation of graduates will be computer savvy but not necessarily technically or socially competent. C...

, Cutter Consortium: Business Technology Trends & Impacts
Rational Economic Behavior and the Internet: Why You Want to Pay Per Packet
Mazzucchelli, Lou; The Cutter Business Technology Council; Weis, Allan H.; Rangaswami, JP | Executive Reports | 01 May 2010 | Business Technology Trends & Impacts

The current mode of flat-rate pricing for wired and wireless data communications discourages space-efficient software, encourages unlimited consumption, and is unsustainable. Rising capital and operating expenses to keep pace with inc...

, Cutter Consortium: Business Technology Trends & Impacts
And Now for Something Completely Different: IT Governance from a Relationship...
Lee, Laurence Lock | Executive Reports | 01 April 2010 | Enterprise Risk Management & Governance

Traditional process/compliance-centered approaches to IT governance have not proven totally effective against the general malaise of often poor return from IT investments. This Executive Report by Dr. Laurence Lock Lee offers a relationship-centered approach to IT governance as a profitable adjunct ...

, Cutter Consortium: Enterprise Risk Management & Governance
Enterprise Risk Management Framework: A Practical View
Doughty, Ken | Executive Reports | 01 January 2010 | Enterprise Risk Management & Governance

Enterprise risk management (ERM) facilitates management's desire to effectively manage the organization's risk and to create sustainable value to its stakeholders through capital growth and increased dividend stream. No organization operates in a risk-free environment, and ERM does not create such an en...

, Cutter Consortium: Enterprise Risk Management & Governance

Reports archive

Special reduced prices are available for the following publications: