Name: Michael Lin
Name: Eric Baldeschwieler
Red Hat CEO Jim Whitehurst is coming up on his five-year anniversary at the helm, following his arrival in December 2007. Under Whitehurst's leadership, Red Hat's revenue has grown from US$523 million in its fiscal 2008 to more than $1.1 billion in its fiscal 2012, without deviating from its core strategy of open-source infrastructure software.
Name: Michael Milligan
Name: Harry Sverdlove
Name: Catherine Goodison
Name: Amichai Shulman
In April of 1995, Steve Jobs, then head of NeXT Computer, was interviewed as part of the Computerworld Honors Program Oral History project. The wide-ranging interview was conducted by Daniel Morrow, executive director of the awards program.
By Computerworld (US) staff | 07 October, 2011 09:13
Barbara Koster, CIO of Prudential Financial, oversees 1,700 IT employees and formulates policies, establishes standards and architectures, and develops guidelines and management practices for the financial services giant. She also manages the company's global networks and data centers and other technology infrastructure.
By Lucas Mearian | 09 August, 2011 01:21
Running the internal IT operations of Cisco Systems is a big job not just because of the size of the company -- more than 70,000 employees worldwide and a market capitalisation in the range of $US100 billion -- but also because Cisco is continually developing new IT products across a broad range of technologies and is known for rapidly adopting those products for its own use. Cisco CIO Rebecca Jacoby spoke with IDG News Service on the sidelines of the NetWork conference last week and shared some insights into the legendary enterprise IT company's own enterprise IT.
By Stephen Lawson | 14 December, 2010 08:29
Internet activist, author and system administrator at Google, Tom Limoncelli, would like to see geeks getting more involved in social justice, organisations thinking more creatively about IT, and systems administrators embracing their soft skills.
By Dahna McConnachie | 09 January, 2009 07:35
MIT Deputy Dean JoAnne Yates is co-author of an upcoming article on information overload called "Ubiquitous E-mail: Individual Experiences and Organizational Consequences of BlackBerry Use"
By Matt Hamblen | 18 November, 2008 08:19
Silicon Valley is the epitome of California's youth worship, geek-style. It's the stage where wunderkinds emerge and are feted: Yahoo's Jerry Yang and David Filo, Netscape's Marc Andreessen, Google's Sergey Brin and Larry Page, Facebook's Mark Zuckerberg -- all in their 20s when they hit it big. Going farther back, let's not forget Steve Jobs and Steve Wozniak, who were 21 and 25, respectively, when they started Apple Computer.
By Eric Lai | 03 November, 2008 11:44
Social networking sites offer IT job seekers the resources to find peers with similar skills and learn more about employers. But candidates should be aware that the online outlets also provide employees a glimpse into the personal lives of potential hires. That can be good or it can be very bad, according to Rona Borre, president and CEO of Instant Technology, an IT recruiting and staff augmentation firm in the US. Borre recently talked with Denise Dubie about how new technologies can boost or torpedo job searches.
Bruce Marcus, the executive vice president and CIO of The McGraw-Hill Companies, answers questions about moving into leadership positions, dealing with a difficult boss and the impact of the economy on IT.
IT professionals with strong technical backgrounds can drum up some great ideas for start-up companies, but they often lack the business acumen to keep those companies afloat. To help these would-be captains of industry, Computerworld recently spoke with Ken Blanchard, the best-selling co-author of The One Minute Entrepreneur and The One Minute Manager to gain insight on the steps that technology entrepreneurs should take -- and avoid. Step one: Remember the basics.
If you’re looking for your first ERP system or looking to upgrade from an existing system, the evaluation, selection and implementation process is a long-term strategic decision for your organization. To help you through this process, here are eight simple steps for a successful ERP system selection.
Today’s security threats increasingly involve application-layer DDoS attacks mounted by organized groups of attackers to damage web-facing applications by exhausting resources. F5 BIG-IP ASM provides application-layer protection against DDoS attacks.
- Apple hit with class action lawsuit for alleged labor rule violations
- Telstra to kill 2G services
- Seafaring robot shrugs off monster Typhoon Rammasun
- Zero-day flaws in Tails aren't for sale, vulnerability broker says
- Apple grows Mac sales by 18 per cent on the back of the MacBook Air
- Rules of engagement needed for the Internet: RSA
- How Nokia both helped and hindered Microsoft's earnings
- Vodafone upbeat on turnaround despite more customer losses
- Five takeaways from the Apple earnings call
- More mobile gadgets than people? Seven countries - including Australia - now qualify
- Apple "inadvertently admitted" to iOS backdoor: forensics expert
- Juniper jettisons mobile security business
- TOR patch coming
- Microsoft revenue lifted by Cloud sales to businesses
- ARM develops second wave of 64-bit processors