Name: Michael Lin
Name: Eric Baldeschwieler
Red Hat CEO Jim Whitehurst is coming up on his five-year anniversary at the helm, following his arrival in December 2007. Under Whitehurst's leadership, Red Hat's revenue has grown from US$523 million in its fiscal 2008 to more than $1.1 billion in its fiscal 2012, without deviating from its core strategy of open-source infrastructure software.
Name: Michael Milligan
Name: Harry Sverdlove
Name: Catherine Goodison
Name: Amichai Shulman
In April of 1995, Steve Jobs, then head of NeXT Computer, was interviewed as part of the Computerworld Honors Program Oral History project. The wide-ranging interview was conducted by Daniel Morrow, executive director of the awards program.
By Computerworld (US) staff | 07 October, 2011 09:13
Barbara Koster, CIO of Prudential Financial, oversees 1,700 IT employees and formulates policies, establishes standards and architectures, and develops guidelines and management practices for the financial services giant. She also manages the company's global networks and data centers and other technology infrastructure.
By Lucas Mearian | 09 August, 2011 01:21
Running the internal IT operations of Cisco Systems is a big job not just because of the size of the company -- more than 70,000 employees worldwide and a market capitalisation in the range of $US100 billion -- but also because Cisco is continually developing new IT products across a broad range of technologies and is known for rapidly adopting those products for its own use. Cisco CIO Rebecca Jacoby spoke with IDG News Service on the sidelines of the NetWork conference last week and shared some insights into the legendary enterprise IT company's own enterprise IT.
By Stephen Lawson | 14 December, 2010 08:29
Internet activist, author and system administrator at Google, Tom Limoncelli, would like to see geeks getting more involved in social justice, organisations thinking more creatively about IT, and systems administrators embracing their soft skills.
By Dahna McConnachie | 09 January, 2009 07:35
MIT Deputy Dean JoAnne Yates is co-author of an upcoming article on information overload called "Ubiquitous E-mail: Individual Experiences and Organizational Consequences of BlackBerry Use"
By Matt Hamblen | 18 November, 2008 08:19
Silicon Valley is the epitome of California's youth worship, geek-style. It's the stage where wunderkinds emerge and are feted: Yahoo's Jerry Yang and David Filo, Netscape's Marc Andreessen, Google's Sergey Brin and Larry Page, Facebook's Mark Zuckerberg -- all in their 20s when they hit it big. Going farther back, let's not forget Steve Jobs and Steve Wozniak, who were 21 and 25, respectively, when they started Apple Computer.
By Eric Lai | 03 November, 2008 11:44
Social networking sites offer IT job seekers the resources to find peers with similar skills and learn more about employers. But candidates should be aware that the online outlets also provide employees a glimpse into the personal lives of potential hires. That can be good or it can be very bad, according to Rona Borre, president and CEO of Instant Technology, an IT recruiting and staff augmentation firm in the US. Borre recently talked with Denise Dubie about how new technologies can boost or torpedo job searches.
Bruce Marcus, the executive vice president and CIO of The McGraw-Hill Companies, answers questions about moving into leadership positions, dealing with a difficult boss and the impact of the economy on IT.
IT professionals with strong technical backgrounds can drum up some great ideas for start-up companies, but they often lack the business acumen to keep those companies afloat. To help these would-be captains of industry, Computerworld recently spoke with Ken Blanchard, the best-selling co-author of The One Minute Entrepreneur and The One Minute Manager to gain insight on the steps that technology entrepreneurs should take -- and avoid. Step one: Remember the basics.
When Canadian food distributor George Weston Limited moved to Microsoft Office 365, it chose F5 Application Delivery Controllers to centrally manage user traffic to its Active Directory Federation Services (ADFS) servers.
What can malware do in 60 seconds? One minute can change everything for a business. The speed of business is all about being responsive to customers and stakeholders. So what happens when the speed of business is overtaken by the speed of malware? Given the unprecedented growth in the number of security threats that focus on stealing data, sabotaging business continuity and damaging a company’s reputation, what should organizations do to ensure the speed of malware doesn’t disrupt the speed of business? T
- Staples says hack may have compromised 1 million-plus payment cards
- Judge questions evidence on whether NSA spying is too broad
- Twitter parody of North Korea's mouthpiece not afraid to crow over Sony's capitulation
- Three ways enterprise software is changing
- Google may launch Android Auto, making your car a big mobile device
- After FBI blames North Korea for Sony attack, now what?
- T-Mobile to pay $90M for unauthorized charges on customers' bills
- Buckle up IT: The enterprise needs you for cloud adoption
- Companies battle for control of Italy's national fiber network
- Obama promises response on Sony hack, says pulling movie was mistake
- Microsoft hits Windows tech support scammers with lawsuit
- Trojan program based on ZeuS targets 150 banks, can hijack webcams
- In 2015, EU aims to sweep away old rules on data protection and copyright
- FBI concludes North Korea 'responsible' for Sony hack
- What we know about North Korea's cyberarmy