Content Vault : Sort by Most Recent
Technology, Cloud

How NGO's can benefit from the cloud

Blog-post by,
RickBlaisdell

Without a doubt, cloud computing is changing the way we work and the way we communicate through technology networks. Nowadays, almost every business is using cloud computing services, so it is no wonder the fact that many schools, charities, nonprofit and non-governmental organizations are using it as well.


CIO Leadership, IT Performance

Enterprise architecture, program management key at GE unit

CIO embraces, cloud, BYOD, big data and collaboration

Blog-post by,
Community Manager
,

In a wide-ranging interview, General Electric Intelligent Platforms (GEIP) CIO and "Lean Leader" ("Lean" grew out Six Sigma to squeeze out defects except it focuses more on efficiency) Vince Campisi describes what life is like in a huge industrial giant like GE. How does the unit collaborate with other units when substantial business is generated internally? He also describe views on BYOD, big data, cloud and social media. GEIP is the industrial controls and automation arm of General Electric.

(5)
   
(3) (3)

Business Issues, CIO Leadership, Applications

Simplification, commonality the goals of GE unit's application modernization

CIO Vince Campisi drives down number of ERP, G/L systems

Blog-post by,
Community Manager
,

My recent wide-ranging discussion with General Electric Intelligent Platforms (GEIP) CIO and "Lean Leader" Vince Campisi touched on a dramatic application modernization, which calls for  reducing the number of ERP and general ledger systems to essentially, one each. GEIP is a $1B industrial controls concern - embedded technology and automation -  that heavily focuses on software. It also serves other GE units, thus deriving substantial internal business. The interview was by phone on Nov. 2. Part II of II.

(1)
   
(1) (1)

Business Issues, Applications

How to prevent Google Apps data Loss

Blog-post by,
RickBlaisdell

According to Google, more than 4 million businesses use Google Apps. It provides core collaboration and communication tools like Gmail, Calendar, Contacts and Drive. In this context, it is obvious that business users trust Google’s cloud to run critical parts of their data and systems.  Google Apps includes critical security features and disaster recovery capabilities specifically designed to keep data safe and secure.


Business Issues, CIO Leadership, Technology, Security

CEOs – How does your company protect the information it uses? Do you know?

Blog-post by,

Today corporate data is at a higher risk of theft than ever before. C-level officers have the duty to protect the digital assets of their organizations. Moreover, laws and regulations impose specific privacy and cybersecurity obligations on companies. Cybersecurity requires active oversight by boards and senior executives.

(3)
   
(2) (2)

CIO Leadership, Applications

Stop project failure: 4 goals to help you improve requirements processes with COBIT 5

Blog-post by,
HP Blogger
,
myles.suer

If you’ve ever looked at reports about trends in software success (like the Standish CHAOS study), you’ll be familiar with disheartening statistics that the majority of IT projects aren’t delivered on time, on budget or with the required features and functions. Needless to say this doesn’t do much to help IT’s credibility with the business. What can your organization do to make sure IT projects aren’t failing? You can start by taking a good look at your requirements process.

(1) (1)

Business Issues, CIO Leadership, Technology, Security

This Week’s Best IT Security Governance Security #13

Blog-post by,

This week the focus was on Sandy and its impact on enterprises’ technology assets. Natural disasters bring great challenges for IT leaders. Thor Olavsrud, fromCSO.com, writes a great article about How IT Leaders Can Best Plan for Disaster.


Business Issues, CIO Leadership, Technology, Security

5 Benefits of Proper IT Security Governance

Blog-post by,

In today’s economic, political, and social environment, customers are demanding the security of their information, as the concern about privacy and identity theft rises. Business partners, suppliers, and vendors are requiring security from one another, especially when they provide mutual network and information access. National and international regulators are asking enterprises to prove that they obey privacy laws and implement high-security measures.

(1)
   
(2) (2)