Depending up on how you look at it, crowdsourcing is all the rage these days -- think Wikipedia, X Prize and Kickstarter -- or at the other extreme, greatly underused.
By Bob Brown | 17 June, 2014 06:31
Premier 100 IT Leader Robert Krestakos also answers questions on certifications and acting on suspicions.
By Robert Krestakos | 07 October, 2013 22:48
Many don't know what they don't know. Insider (registration required)
With no budget, our manager has to devise a security awareness and training program on his own.
The organizations that will prosper in the future are those led by people who have imagined a future they want to live in.
Both corporations and their employees who tweet on the company's behalf must clarify the question.
Premier 100 IT Leader Bill Brown also has advice on job boredom and careers networking.
The upcoming Google+ History will prepare your content for sharing, but holds it in a private space until you choose to share it. It's how social networking should work, writes columnist Mike Elgan.
Cyberespionage is coming of age but the problem with weapons like Stuxnet is that they will be used against us
Beware: Hubris, sycophantism and dformation professionnelle can spread from the corner office to IT.
In my 15 years as a CIO, I've experienced a gamut of questionable sales techniques. Some favorites, so to speak, include the "end-of-quarter deal never to be repeated," which is then repeated at the end of the next quarter; the promise that "we're your partner and you always get our best price," which you suspect is being made to all of the company's hundreds of other customers; and the selling of products that don't yet exist.
There was a time when India was known to the outside world for its ability to provide enormous labour at relatively low prices, prompting global companies to outsource their work to India. Indian companies very quickly transformed the value proposition from cost to quality with more IT companies in India having global quality certification than any country in the world. This made India the outsourcing capital of the world.
If you invest in the development of IT professionals outside your company, you help improve the level of talent in the entire IT ecosystem -- and, in turn, the quality of candidates who apply for your jobs, says Yoh's Joel Capperella.
Businesses that cut training and development during the recession will be challenged to recruit IT professionals to help them grow as the economy improves. Robert Half Technology's John Reed offers tips for stepping up professional development efforts for IT staffers.
If your resume can't get past the applicant tracking system, it might never be seen by human eyes.
Geeks are devoted to Truth, with a capital T. The question 'When will it be done?' feels like a request to lie. Insider; registration required)
Shaw reviews Seagate's Backup Plus external storage drives, Rubbo International's D-Wings.
They lifted their wine glasses from the cinema bar and raised them to the air. 'What elegant women,' I thought. 'The gaming development industry isn't the male-dominated, hoodie-wearing stereotype any longer.' I was waiting for the start of Indie Games: The Movie, which screened on the evening before the New Zealand Game Developers Conference in Auckland.
Premier 100 IT Leader Edward Martin also has advice on the indispensable skills and how to become a CIO.
We like our risk management, don’t we? It allows us to identify risks, and take action to mitigate them. Risk Management can and should be applied to social media usage. It makes good sense to manage the risk by having a very clear social media policy.
By Breed Lewis | 12 March, 2011 10:00
The rise of mobile users and apps, coupled with the continued growth in SaaS, has transformed traditional business environments. Identity is the new perimeter. Learn what you can do with a centralized Identity Access Management (IAM) service across this hybrid IT environment.
- Local tech sector outpacing US, UK: report
- ACCC mulls new pricing for SMS, voice calls
- Woolworths sees future in hybrid cloud
- Mitro makes password manager open source as team heads to Twitter
- Airport stopover, multi-platform publishing apps Aussie winners in Talent Unleashed Awards
- Microsoft security tool EMET 5.0 puts a leash on plugins
- Authors beware: computers can write fables
- Some are twisting the facts in requests to be forgotten, Google says
- Almost 200,000 people may have been affected by US visa system crash
- One of Google's mysterious barges is on the move
- Who wins if Iliad buys T-Mobile?
- Most USB thumb drives can be reprogrammed to silently infect computers
- Windows Server 2003 support expiration could push sales next year
- NASA plans next-gen scientific tools for 2020 Mars rover
- Attackers exploit remote access tools to compromise retail systems