Depending up on how you look at it, crowdsourcing is all the rage these days -- think Wikipedia, X Prize and Kickstarter -- or at the other extreme, greatly underused.
By Bob Brown | 17 June, 2014 06:31
Premier 100 IT Leader Robert Krestakos also answers questions on certifications and acting on suspicions.
By Robert Krestakos | 07 October, 2013 22:48
Many don't know what they don't know. Insider (registration required)
With no budget, our manager has to devise a security awareness and training program on his own.
The organizations that will prosper in the future are those led by people who have imagined a future they want to live in.
Both corporations and their employees who tweet on the company's behalf must clarify the question.
Premier 100 IT Leader Bill Brown also has advice on job boredom and careers networking.
The upcoming Google+ History will prepare your content for sharing, but holds it in a private space until you choose to share it. It's how social networking should work, writes columnist Mike Elgan.
Cyberespionage is coming of age but the problem with weapons like Stuxnet is that they will be used against us
Beware: Hubris, sycophantism and dformation professionnelle can spread from the corner office to IT.
In my 15 years as a CIO, I've experienced a gamut of questionable sales techniques. Some favorites, so to speak, include the "end-of-quarter deal never to be repeated," which is then repeated at the end of the next quarter; the promise that "we're your partner and you always get our best price," which you suspect is being made to all of the company's hundreds of other customers; and the selling of products that don't yet exist.
There was a time when India was known to the outside world for its ability to provide enormous labour at relatively low prices, prompting global companies to outsource their work to India. Indian companies very quickly transformed the value proposition from cost to quality with more IT companies in India having global quality certification than any country in the world. This made India the outsourcing capital of the world.
If you invest in the development of IT professionals outside your company, you help improve the level of talent in the entire IT ecosystem -- and, in turn, the quality of candidates who apply for your jobs, says Yoh's Joel Capperella.
Businesses that cut training and development during the recession will be challenged to recruit IT professionals to help them grow as the economy improves. Robert Half Technology's John Reed offers tips for stepping up professional development efforts for IT staffers.
If your resume can't get past the applicant tracking system, it might never be seen by human eyes.
Geeks are devoted to Truth, with a capital T. The question 'When will it be done?' feels like a request to lie. Insider; registration required)
Shaw reviews Seagate's Backup Plus external storage drives, Rubbo International's D-Wings.
They lifted their wine glasses from the cinema bar and raised them to the air. 'What elegant women,' I thought. 'The gaming development industry isn't the male-dominated, hoodie-wearing stereotype any longer.' I was waiting for the start of Indie Games: The Movie, which screened on the evening before the New Zealand Game Developers Conference in Auckland.
Premier 100 IT Leader Edward Martin also has advice on the indispensable skills and how to become a CIO.
We like our risk management, don’t we? It allows us to identify risks, and take action to mitigate them. Risk Management can and should be applied to social media usage. It makes good sense to manage the risk by having a very clear social media policy.
By Breed Lewis | 12 March, 2011 10:00
In this White Paper, IDC offers up some quantifiable benefits that Asian enterprises have observed as a result of deploying backup and recovery solutions. · Many enterprises are finding that the backup and recovery processes and technologies that they have implemented have not kept pace with the demands of the business · IDC identifies how organizations can experience savings and improvements from the deployment of different types of technologies · The benefits fall into three categories: storage environment cost savings; end-user productivity enhancements; and IT staff productivity optimization
- FTProgram Manager - Integration & SolutionsNSW
- FTAcquisition Marketing ExceutiveNSW
- FTSenior SEO ManagerNSW
- FTStudio Design ManagerVIC
- CCWeb / Mobile Developer - Magento - HTML5, CSS - Excellent CMS SkillsNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- FTStudio Design ManagerVIC
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesNSW
- FTChief Information Officer - CSIROACT
As your organization implements BYOD, it’s important to maintain compliance with data security and privacy regulations. This paper provides some key best practices to avoid problems and stay vigilant. • Poor compliance can result in financial penalties, litigation and damage to your company’s reputation • Make sure you have the IT solutions you need to avoid data leaks, avert data loss and prevent unauthorized access to information • Employ solutions designed to streamline BYOD management and simplify the process of proving compliance
- Webcam snooper now looking for a job
- Telstra targets government with secure cloud offer
- Australia, Canada, UK and China weigh in on Insecam privacy issue
- Traces of Regin malware may date back to 2006
- Analyst, Vodafone cast doubt on likelihood of telco's sale
- Symantec identifies sophisticated, stealthy 'Regin' malware
- Spliddit: Algorithms to divide the rent, stuff, or credit fairly between people
- Why is Microsoft updating Windows PCs for a security bug on the server?
- Prices for 4K monitors sink below $500
- Apple's $450 million e-books settlement gets final approval
- Black Friday: Newegg axes prices on laptops, desktops, tablets and more
- Reports: EU taking first step towards breaking up Google
- Double-edged feedback sword nicks Microsoft over OneDrive
- The ups and downs of Microsoft Band
- US man sentenced for hacking POS systems at Subway