Content Vault : Sort by Most Discussed
Technology, Security

Weakest links are greatest opportunities to enforce application security

Application security must be addressed across all phases of the Software Development Life Cycle

Blog-post by E.G. Nadhan,
HP Blogger
, Mon, 08/12/2013 - 18:02

“By and large, most successful attacks today, approximately greater than 70 percent, are targeted at applications where inherently, most vulnerabilities reside,” says HP Distinguished Technologist, John Diamant in his interview on SecuritySolutionsWatch.com.

(13)
   
(7) (7)

CIO Leadership, IT Performance

An expectation framework for our innovations?

How does IT factor into the drivers of change?

Blog-post by Charles Bess, Tue, 06/11/2013 - 19:24

This week I was working on a presentation for the ISSIP Service Futures SIG titled: Service Futures and Drivers of Change.  Part of the presentation included a discussion of megatrends – the industry independent trends that will shape our lives in the future and their effect on business decision making.  

(13)
   
(2) (2)

CIO Leadership, IT Performance

Making telework work.

Telecommuting is more than just working from home.

Blog-post by Joel Dobbs, , Tue, 02/26/2013 - 23:29
jdobbs

Like many of you, I was surprised to see Yahoo’s recent announcement that employees will no longer be allowed to work from home.  The responses in the media have been predictably varied and, at times, harsh.  Yahoo’s rationale, at least the explanation I have seen, is that collaboration and innovation work better when people are physically together.  Fair enough, although one could make the argument that everyone doesn’t need to be together all of the time. That, however, is another discussion entirely.

(13)
   
(2) (2)

CIO Leadership, IT Performance

Have we outsourced too much?

Blog-post by Heather Campbell, Tue, 06/19/2012 - 17:03
hcampbell

Back in the early 1990’s, I was working for one of the top five financial institutions in Canada and was approached by some sales people from a large Indian multi-national.  At the time, my colleagues could not fathom a Canadian bank outsourcing application development, including customer data, to India. 

(13)
   
(1) (1)

Technology, IT Performance

CTO or CIO: it's the former at J.C. Penney

Blog-post by John Dodge,
Community Manager
, Mon, 03/19/2012 - 16:00
jdodge

The J.C Penney Company (JCP), a $20 billion company, has opted for a CTO instead of CIO. 

(13)
   
(2) (2)
Tags: CIO CTO IT JCP

Technology, IT Performance

Do your homework!

Blog-post by Joel Dobbs, , Fri, 01/27/2012 - 19:01

“Success always comes when preparation meets opportunity”--Henry Hartman

 

I have an acquaintance that works in the news business.  He recently bemoaned how lazy most reporters have become in the current age of instant information and in a world where political parties, special interest groups and others send them a generous dose of “talking points” daily.  “Most don’t spend time doing the hard work of investigative reporting anymore,” he said.  “They don’t search for the facts themselves. They have become lazy.”

(13)
   
(3) (3)

Technology, Cloud

State of the tweeting CIO

Blog-post by John Dodge,
Community Manager
, Mon, 01/23/2012 - 16:51

I follow a lot of CIOs on Twitter and was going through them this morning. A random analysis of followers and how many times they tweeted is telling. CIOs are trying on Twitter, but their overall presence remains tepid if this random guttcheck of 30 is any indication. 

(13)
   
(3) (3)

Business Issues, CIO Leadership, Technology, Cloud, Security

Cloud Security Concerns – Myth or Reality?

Blog-post by Gene De Libero, Fri, 01/09/2015 - 03:32

I know I’m not alone when I say that as a CIO, I’ve come across more than my share of unauthorized applications running in the cloud. There’s constant pressure from upper management to produce results and quite frankly, maybe my team and me took a bit too long to respond to the needs of the business. It happens.

(12)
   
(3) (3)