Name: Michael Lin
Name: Eric Baldeschwieler
Red Hat CEO Jim Whitehurst is coming up on his five-year anniversary at the helm, following his arrival in December 2007. Under Whitehurst's leadership, Red Hat's revenue has grown from US$523 million in its fiscal 2008 to more than $1.1 billion in its fiscal 2012, without deviating from its core strategy of open-source infrastructure software.
Name: Michael Milligan
Name: Harry Sverdlove
Name: Catherine Goodison
Name: Amichai Shulman
In April of 1995, Steve Jobs, then head of NeXT Computer, was interviewed as part of the Computerworld Honors Program Oral History project. The wide-ranging interview was conducted by Daniel Morrow, executive director of the awards program.
By Computerworld (US) staff | 07 October, 2011 09:13
Barbara Koster, CIO of Prudential Financial, oversees 1,700 IT employees and formulates policies, establishes standards and architectures, and develops guidelines and management practices for the financial services giant. She also manages the company's global networks and data centers and other technology infrastructure.
By Lucas Mearian | 09 August, 2011 01:21
Running the internal IT operations of Cisco Systems is a big job not just because of the size of the company -- more than 70,000 employees worldwide and a market capitalisation in the range of $US100 billion -- but also because Cisco is continually developing new IT products across a broad range of technologies and is known for rapidly adopting those products for its own use. Cisco CIO Rebecca Jacoby spoke with IDG News Service on the sidelines of the NetWork conference last week and shared some insights into the legendary enterprise IT company's own enterprise IT.
By Stephen Lawson | 14 December, 2010 08:29
Internet activist, author and system administrator at Google, Tom Limoncelli, would like to see geeks getting more involved in social justice, organisations thinking more creatively about IT, and systems administrators embracing their soft skills.
By Dahna McConnachie | 09 January, 2009 07:35
MIT Deputy Dean JoAnne Yates is co-author of an upcoming article on information overload called "Ubiquitous E-mail: Individual Experiences and Organizational Consequences of BlackBerry Use"
By Matt Hamblen | 18 November, 2008 08:19
Silicon Valley is the epitome of California's youth worship, geek-style. It's the stage where wunderkinds emerge and are feted: Yahoo's Jerry Yang and David Filo, Netscape's Marc Andreessen, Google's Sergey Brin and Larry Page, Facebook's Mark Zuckerberg -- all in their 20s when they hit it big. Going farther back, let's not forget Steve Jobs and Steve Wozniak, who were 21 and 25, respectively, when they started Apple Computer.
By Eric Lai | 03 November, 2008 11:44
Social networking sites offer IT job seekers the resources to find peers with similar skills and learn more about employers. But candidates should be aware that the online outlets also provide employees a glimpse into the personal lives of potential hires. That can be good or it can be very bad, according to Rona Borre, president and CEO of Instant Technology, an IT recruiting and staff augmentation firm in the US. Borre recently talked with Denise Dubie about how new technologies can boost or torpedo job searches.
Bruce Marcus, the executive vice president and CIO of The McGraw-Hill Companies, answers questions about moving into leadership positions, dealing with a difficult boss and the impact of the economy on IT.
IT professionals with strong technical backgrounds can drum up some great ideas for start-up companies, but they often lack the business acumen to keep those companies afloat. To help these would-be captains of industry, Computerworld recently spoke with Ken Blanchard, the best-selling co-author of The One Minute Entrepreneur and The One Minute Manager to gain insight on the steps that technology entrepreneurs should take -- and avoid. Step one: Remember the basics.
New attack types combine known and unknown threats to exploit “unknown” vulnerabilities. Attackers are also hiding malware inside documents, websites, hosts and networks. These attacks have many purposes such as financial and ideological motives. They focus on stealing data, sabotaging business continuity, or damaging a company’s reputation.
- Link between NSA and Regin cyberespionage malware becomes clearer
- How not to waste your money on the second wave of 802.11ac wireless gear
- China signals censors will continue to crack down on VPN services
- Facebook, Instagram temporarily down in many countries
- Quantum bringing public cloud into virtual storage fold
- Data retention: Journalists decry 'Stasi‐like surveillance state'
- DEA cameras tracking hundreds of millions of car journeys across the US
- Telstra no better off under HFC transition plan, government says
- Oracle and Samsung said to be teaming up for mobile cloud delivery
- Microsoft results buoyed by cloud products, but profit drops
- In Pictures: 5 things we love, hate about the ASUS X205 notebook
- Get ready for the 24-hour laptop: Battery life hits new highs
- Facebook testing spartan Android 'Lite' service
- States threaten lawsuit against Obama's municipal broadband plan
- Simple Google search outed alleged Silk Road founder