Name: Michael Lin
Name: Eric Baldeschwieler
Red Hat CEO Jim Whitehurst is coming up on his five-year anniversary at the helm, following his arrival in December 2007. Under Whitehurst's leadership, Red Hat's revenue has grown from US$523 million in its fiscal 2008 to more than $1.1 billion in its fiscal 2012, without deviating from its core strategy of open-source infrastructure software.
Name: Michael Milligan
Name: Harry Sverdlove
Name: Catherine Goodison
Name: Amichai Shulman
In April of 1995, Steve Jobs, then head of NeXT Computer, was interviewed as part of the Computerworld Honors Program Oral History project. The wide-ranging interview was conducted by Daniel Morrow, executive director of the awards program.
By Computerworld (US) staff | 07 October, 2011 09:13
Barbara Koster, CIO of Prudential Financial, oversees 1,700 IT employees and formulates policies, establishes standards and architectures, and develops guidelines and management practices for the financial services giant. She also manages the company's global networks and data centers and other technology infrastructure.
By Lucas Mearian | 09 August, 2011 01:21
Running the internal IT operations of Cisco Systems is a big job not just because of the size of the company -- more than 70,000 employees worldwide and a market capitalisation in the range of $US100 billion -- but also because Cisco is continually developing new IT products across a broad range of technologies and is known for rapidly adopting those products for its own use. Cisco CIO Rebecca Jacoby spoke with IDG News Service on the sidelines of the NetWork conference last week and shared some insights into the legendary enterprise IT company's own enterprise IT.
By Stephen Lawson | 14 December, 2010 08:29
Internet activist, author and system administrator at Google, Tom Limoncelli, would like to see geeks getting more involved in social justice, organisations thinking more creatively about IT, and systems administrators embracing their soft skills.
By Dahna McConnachie | 09 January, 2009 07:35
MIT Deputy Dean JoAnne Yates is co-author of an upcoming article on information overload called "Ubiquitous E-mail: Individual Experiences and Organizational Consequences of BlackBerry Use"
By Matt Hamblen | 18 November, 2008 08:19
Silicon Valley is the epitome of California's youth worship, geek-style. It's the stage where wunderkinds emerge and are feted: Yahoo's Jerry Yang and David Filo, Netscape's Marc Andreessen, Google's Sergey Brin and Larry Page, Facebook's Mark Zuckerberg -- all in their 20s when they hit it big. Going farther back, let's not forget Steve Jobs and Steve Wozniak, who were 21 and 25, respectively, when they started Apple Computer.
By Eric Lai | 03 November, 2008 11:44
Social networking sites offer IT job seekers the resources to find peers with similar skills and learn more about employers. But candidates should be aware that the online outlets also provide employees a glimpse into the personal lives of potential hires. That can be good or it can be very bad, according to Rona Borre, president and CEO of Instant Technology, an IT recruiting and staff augmentation firm in the US. Borre recently talked with Denise Dubie about how new technologies can boost or torpedo job searches.
Bruce Marcus, the executive vice president and CIO of The McGraw-Hill Companies, answers questions about moving into leadership positions, dealing with a difficult boss and the impact of the economy on IT.
IT professionals with strong technical backgrounds can drum up some great ideas for start-up companies, but they often lack the business acumen to keep those companies afloat. To help these would-be captains of industry, Computerworld recently spoke with Ken Blanchard, the best-selling co-author of The One Minute Entrepreneur and The One Minute Manager to gain insight on the steps that technology entrepreneurs should take -- and avoid. Step one: Remember the basics.
In this White Paper, IDC offers up some quantifiable benefits that Asian enterprises have observed as a result of deploying backup and recovery solutions. · Many enterprises are finding that the backup and recovery processes and technologies that they have implemented have not kept pace with the demands of the business · IDC identifies how organizations can experience savings and improvements from the deployment of different types of technologies · The benefits fall into three categories: storage environment cost savings; end-user productivity enhancements; and IT staff productivity optimization
- FTAcquisition Marketing ExceutiveNSW
- FTStudio Design ManagerVIC
- FTProgram Manager - Integration & SolutionsNSW
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesVIC
Bolstered by favorable economics, today’s global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously. This DDoS threat spectrum includes conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.
- Startup SQLdep aims to help DBAs stay sane
- BlackBerry's deal to buy voice crypto company Secusmart blessed by German government
- Apple's Black Friday sale includes iPhone for the first time
- France, Germany want EU to take a tougher stance on tech firms
- Coming soon: Murder by Internet
- Distracted? Slap this Hitachi gizmo on your forehead to focus
- Uber suspends Nevada operations, affecting nearly 1,000 jobs
- Sony confirms development of e-paper smartwatch
- Sydney Startup Weekend doubles attendance in one year
- ASIC unhappy with exclusion from data retention regime
- Australian Internet Security Initiative portal launched to help ISPs
- How SBS scaled up for FIFA World Cup online
- Hail pounds telecom networks in Queensland
- RMIT University builds virtual networking labs for students
- Weather.com fixes web application vulnerabilities