CIO Symmetry

A SearchCIO Small Business blog


February 14, 2014  4:14 PM

Spreadsheet errors, the new Microsoft CEO and our award-winning pieces



Posted by: Emily McLaughlin
CIO, cloud computing, Leadership and Strategy, Microsoft, Midmarket CIO, mobile technology, Strategy for CIOs, Weekly Wrap-Up

If we may brag for a moment (and tip our cap to the Olympics): The SearchCIO team took gold in several categories in TechTarget’s internal editorial awards this week, which honored our work during the past year.

Senior News Writer Nicole Laskowski’s Data Mill series, which focuses on all things data, was among the honorees. In her most recent weekly column, Laskowski talked to Felienne Hermans, assistant professor at Delft University of Technology, and Steven Gustafson, R&D manager at the Knowledge Discovery Lab for Schenectady, N.Y.-based GE Global Research, about new visualization tools with the ability to spot weaknesses in error-prone spreadsheets.

Senior Features Writer Karen Goulart’s CIO Innovator profile of Bally Total Fitness CIO Guy Their also nabbed top honors. In this feature from last year, which appeared in our flagship CIO Decisions e-zine, Thier opened up to Goulart about managing his company’s total business transformation.

SearchCIO also won an award for our CIO Briefing on the evolution of big data. After you’ve checked out that guide, stop by this month’s edition, which looks at why traditional IT infrastructure is getting a little TLC — or, in some cases, being scrapped completely — as outsourcing, cloud technologies and hybrid IT take hold.

Awards aside…

The appointment of Microsoft CEO Satya Nadella is causing quite the stir in IT circles. Some of our expert CIO contributors — Harvey Koeppel, Niel Nickolaisen and Ravi Ravishanker — weigh in on the Microsoft landscape Nadella now faces.

In place of our regular Searchlight column, check out a recap from our latest SearchCIO tweet jam. Read why #CIOChat participants believe wearable devices will present CIOs with huge, expensive data challenges — but that shouldn’t deter them from finding ways to extract value for business.

Also on SearchCIO, Editorial Director Christina Torode talks to Baroness Pauline Neville-Jones, the U.K’s special representative to business on cybersecurity as appointed by the prime minister, about cybersecurity. In this video, filmed at ISSA’s International Conference, Neville-Jones discussed why mapping enterprise infrastructure should be a top concern for IT leaders looking to improve cybersecurity.

In SearchCompliance news…

Contributor Judith M. Myerson outlined three steps security professionals should take to implement defense in depth, mitigating risks stemming from mobile GRC application use. In another video with Neville-Jones, the Baroness talked about how companies are not necessarily looking in the right places to ensure information protection — something that will definitely hurt the business. Learn why what you don’t know will hurt you.

Stay tuned for our next weekly roundup here on CIO Symmetry and follow @SearchCIO, @SearchCIOSMB and @ITCompliance to get news as it’s posted.

February 7, 2014  5:54 PM

Biometric technologies and an IT startup culture have CIOs buzzing



Posted by: Emily McLaughlin
CIO, cloud computing, Leadership and Strategy, Microsoft, Midmarket CIO, mobile technology, Strategy for CIOs, Web 2.0, Weekly Wrap-Up

As innovative biometric technologies enter the corporate sphere, we expect to hear IT leaders and their users exhale a big, collective sigh of relief. Why? Startup companies specializing in biometric authentication are popping up all over the place, providing organizations with harder-to-hack password options for better security. In this Future State column, SearchCIO Senior News Writer Nicole Laskowski talks to Kansas City startup EyeVerify LLC about its technology that recognizes blood vessel patterns in the eye and uses that information to allow access to, say, mobile banking applications.

Much like biometric technologies, wearable devices are beginning to cause a stir among enterprise executives. During our most recent tweet jam, participants took to Twitter to discuss what to do with all that data, which tools are needed to make workplace wearables effective and how to improve customer interactions and increase business value.

In other news….

New year, new ‘zine! Our CIO Decisions e-zine got a facelift this month, and touched on some hard-hitting CIO topics from top dogs like MetLife, the University of Michigan and Purdue University. Topics covered in this issue include how to draw IT inspiration from startups, a CIO’s cloud conundrum and the ongoing battle against malware.

In addition to our info-packed e-zine, SearchCIO was bustling with valuable advice for CIOs, including how to rise through the leadership ranks and usher in corporate-wide cloud strategies. Learn what it takes to get ahead in this CIO Innovators feature of Allstate’s Pat Coffey, a programmer-turned-senior vice president. In our second CIO Innovators piece of the week, learn how Revlon CIO David Giambruno built a corporate cloud that transformed the department from a vertical organization into a horizontal one. For our small-business audience, contributor Christine Parizo assesses the ongoing presence of PCs in the workplace, even as Microsoft winds down Windows XP support.

Ponder this….

Have you ever gotten half way to your destination and realized you forgot your flash drive or external hard drive at home? Well, that’s exactly how Dropbox Inc. was born. Last week, Andrew Houston, Dropbox CEO and a former MIT student, returned to Cambridge, Mass., for a fireside chat on “The War for Talent.” Read Houston’s five tips for winning the tech talent war in Data Mill, then hop over to our TotalCIO blog to learn about Dropbox’s company culture philosophy.

Fresh off the press….

Karen Goulart’s weekly — and very timely — Searchlight column looks at the potential of Bill Gates’ new advisory role at Microsoft as the company welcomes new CEO Satya Nadella. After debating what Nadella should do first, take a look at other stories in Goulart’s round-up, including Facebook’s 10th anniversary and more.

Stay tuned for our next weekly roundup here on CIO Symmetry and follow @SearchCIO, @SearchCIOSMB and @ITCompliance to get news as it’s posted.


January 31, 2014  5:20 PM

Technology of the future has CIOs and data scientists concerned



Posted by: Emily McLaughlin
CIO, Midmarket CIO, Strategy for CIOs, Weekly Wrap-Up

As January wound down, we had one heck of an exciting week on SearchCIO. For starters, Wednesday marked our first #CIOChat of the new year, and the wearable-tech theme attracted a huge (virtual) crowd. Expert Simon Jones, managing director at OnPR, a technology public relations and analyst firm, and a blogger at WearableTechWatch, bunkered down over in Munich and responded in real time to our followers’ tweets about this technology of the future — or is it now the present? In our first recap, tweet jam participants discussed how CIOs should prepare for bring your own wearables now. Stay tuned for more tweet roundups next week, which will all be found on SearchCIO.

Nicole Laskowski’s Data Mill column hit on another hot button topic: ethical dilemmas for data scientists. Columbia University challenges students to not just trust data-driven decisions, but also to think hard about ethics and data manipulation — especially as organizations try to monetize the data they collect. And speaking of the collection and storage of data, are you keeping up with all things data center? Take our CIO quiz on managing today’s data center to find out.

While CIOs wait for Columbia students bake and ripen, they’re plagued by the ongoing struggle to attract the right mix of IT talent within their organization — and there’s no time to dilly-dally. As new technologies like cloud, mobile computing and predictive analytics enter the enterprise, building teams quickly is important. Executive Editor Linda Tucci took notes at the Society for Information Management’s annual CIO gathering in Boston, sharing how four top-drawer business technologists are addressing the IT skills challenge.

Speaking of IT roles, how important is the CIO title? Senior Community Manager Jenny Laurello sat in on the recent “CEO/CIO Marriage Proposal” panel at the American Society of Association Executives (ASAE) Technology Conference in Washington, D.C. In other piece on the CIO role, Nigel Fenwick, a vice president and principal analyst at Forrester Research Inc., advised organizations to play to their digital strengths if they want to survive digital disruption — but is there a place for the CIO in all that?

And hot off the press today, this week’s Searchlight explores how omnichannel strategy could to return location-based social networking website Foursquare to relevance.

On our blogs…

Whether intentionally or by mistake, humans account for most cybersecurity breaches. In three separate midmarket studies released this month, the majority of participants pointed the finger of blame squarely at themselves when asked to identify their company’s biggest data security risk, but they should also turn a watchful eye on fellow members of senior management, said Senior Features Writer Karen Goulart. Also on our blogs, Senior News Writer Nicole Laskowski discussed the move away from strategy models and governance toward experimentation and agility. Dave Aron, an analyst at Stamford, Conn.-based Gartner Research Inc., suggests IT start playing Go, the oldest board game in the world, to find some strategic inspiration.

On SearchCompliance…

Contributor Christine Parizo examined the difference between compliance and security — a distinction made evident by recent retail credit card fiascos at companies assumed to be compliant with industry standards and regulations. In another tip, Jeffrey Ritter discussed the often-overlooked digital information governance factors that are critical to maintaining records management compliance.

Stay tuned for our next weekly roundup here on CIO Symmetry and follow @SearchCIO, @SearchCIOSMB and @ITCompliance to read stories right after they’re posted.


January 30, 2014  6:14 PM

Stealing digital strategy ideas from the game Go



Posted by: Nicole Laskowski
CIO

The digital business seems to have cast aside strategy models and governance — those old IT mainstays — in favor of experimentation and agility. And for good reason. “Old strategy models don’t capture new realities,” said Dave Aron, an analyst with Stamford, Conn.-based Gartner Research Inc., at Gartner Symposium last fall.

GoMost strategy models are about “the lefthand side of the value chain,” he said, focused on producers and distributors rather than end users. But digital opportunities are a much more customer-centric initiative, and traditional models just aren’t cutting it. The real challenge for IT departments isn’t kicking strategy models to the curb — it’s figuring out how to design new models for the digital world.

Aron’s suggestion on where to find a little inspiration? Start playing Go, the oldest board game in the world, and hugely popular in countries like Japan, Korea and China.

Here’s how the game works: Two players sit opposite each other. One has a bowl of black stones; the other a bowl of white stones. Players take turns placing stones on a board with a grid-like pattern. “You don’t move stones, you just place them,” Aron said. The goal is to surround a larger total area of the board than your opponent. But here’s where things get tricky and where a mix of offensive and defensive thinking is required: Players not only need to acquire new territory but they also have to protect the territory they already acquired. If a player’s stones are surrounded by his opponents’, he loses control of the territory.

There are no dice to roll, no cards to turn over, no time limitation to adhere to. This is a game that requires strategic and tactical thinking, not unlike chess. But, whereas chess is one big battle, Go “is a war with multiple battles,” Aron said. Need more convincing that Go could influence digital business strategy? Consider this: IBM’s Deep Blue famously beat Garry Kasparov at chess in 1996 and again in 1997, but “no Go software can come anywhere near beating the best Go player in the world,” he said.

During his “maverick” session at Gartner Symposium, Aron explained how the game of Go could be applied to digital leadership and digital strategy. Here’s a handful of ideas to get you started:

1. Consider the corner. In Go, the most powerful spots on the board, and the first areas often occupied, are the corners — not the center. “Two walls of the house are already built, in a sense,” Aron said. Growing a digital business doesn’t have to mean building something shiny and brand new. Instead, figure out how to extend what you’re already doing into the digital space. “Look at the way GE talks about the industrial Internet,” he said.

2. Build a solid framework. The opening moves of Go are called fuseki. Players lay out their intentions, many times selecting a couple of different areas on the board they could develop, Aron said. Likewise, a business’ digital strategy should include more than, say, social media. “You want to adapt and explore and set up a big framework that’s loosely connected,” Aron said. Developing that framework will take time but should not be rushed. If you do hurry, “no matter how well you execute, you’re going to limit the value you create,” he said.

3. Be flexible. One of the strategic plays in Go is called sabaki , or “play lightly,” a technique once defined as “fancy footwork” utilized when conditions become hazardous or dangerous, Aron said. CIOs, take note: Especially during times of uncertainty (economic or otherwise), a little ducking and weaving may be in order. Don’t let certain assets or technologies that aren’t passing muster hold you back. Instead, be flexible. “We must be willing to cannibalize,” Aron said.

4. Nurture potential. In Japanese, agi loosely translates to taste; in the game of Go, it loosely translates to potential – both good and bad. Either can be undone in the long term, which means players have to think about their next move, as well as how each move, cumulatively, could impact their standing. CIOs, think of it as a reminder that sometimes it’s best to think long term rather than focus on immediate business outcomes, especially “in uncertain times, when we don’t know how cloud or social will play out in industries,” Aron said.

5. Listen to observers. There is an expression in Japanese Go that states, “Those who observe the game have an eight-point advantage over those who play the game,” according to Aron. “The observer has advantage of neutrality,” he said. When building a digital strategy, include digital nonexecutives and create positions on project/governance boards for people outside of the organization who have credibility but don’t have any skin in the game. They can provide a powerful perspective and ask the taboo or “stupid” questions without fear of judgment. Roles like these are traditionally used at the top of companies, but Aron suggests using them at lower levels as well, especially in digital-related initiatives.


January 29, 2014  5:21 PM

Data security risk: What to do when the enemy is you



Posted by: Karen Goulart
CIO

When it comes to cybersecurity breaches, we have seen the enemy, and the enemy is you. More specifically, it’s your fellow members of senior management. In three separate midmarket studies released this month, the majority of participants pointed the finger of blame squarely at themselves when asked to identify their company’s biggest data security risk.

With so much news about large-scale data security breaches at major companies — including Target and Neiman Marcus, just in recent weeks — there’s been a lot of focus on the outsiders who are finding their way in. Who are these super-hackers, able to burrow into data these big companies have paid millions to protect? Of course it’s important to identify the perpetrators, but there’s also something to that whole ounce of protection being worth a pound of cure.

In the largest of the three studies, a Stroz Friedberg online survey of about 700 information workers, more than half graded the response of American companies to cybersecurity threats a “C” or lower.  Almost three-quarters said they were concerned that hackers “could break into their employers’ computer networks and steal their personal information.”

The biggest perpetrators in this survey were those in top leadership positions. Call it carelessness, call it hubris, whatever you call it, it puts a company’s assets at risk. A majority of senior management respondents — 58% — said they’d accidentally sent sensitive information to the wrong person via digital means. Another scary number: Nine in 10 senior managers copped to uploading work files to personal email and cloud-based accounts, potentially opening their companies to data theft and network attacks.

So what’s a CIO to do, in addition to keeping his or her own behavior in check, that is? The experts seem to agree on three steps: education, education and more education. In the Stroz Friedberg survey, respondents who said they avoided risky digital behavior pointed to strict company policy as the reason. That’s great, but there’s probably a little more to it. A company can have the tightest security policies in corporate America, but if no one reads them, they’re worthless. These policy-abiding employees likely come from companies where leaders take the time to make sure the rules are fully understood. Former White House CIO Theresa Payton put it well in a conversation with SearchCIO about cybersecurity:

“It needs to not be that thing the security group does; it needs to be something that’s seen as a part of the corporate culture — not a once-a-year ‘check it off the list,’” Payton said. “It’s posters, it’s conversations, it’s case studies, it’s healthy competitions where you’re playing Internet safety games, it’s a variety of different things. In the beginning, it’s got to focus on the individual, because that’s how they’re going to remember it. ”

As for getting the data security risk message to fellow executives and senior management, Payton had some helpful tips for that as well. Even if you regularly provide them with security briefs and information, they may not be reading/remembering that information — so find ways to make it stick:

  • Communicate in their terms, according to their goals and directives. Connect your security information to their important business initiatives.
  • Look at the company strategy. Tie your security conversation to individual company objectives.
  • When new projects are announced, talk about the changes you’ll be making to security to accommodate that project.

What are your best tips for curbing data security risk? Drop us a note in the comments.


January 24, 2014  7:24 PM

Hadoop 2.0, 2014 IT master plan, NSA data collection and more



Posted by: Emily McLaughlin
CIO, Leadership and Strategy, Midmarket CIO, Strategy for CIOs

This week, SearchCIO and SearchCompliance shared a slew of content covering a wide variety of IT hot-button issues. On Monday, the Data Mill was all about Hadoop – Hadoop 2.0, to be specific. In her weekly column, Senior News Writer Nicole Laskowski talked to Merv Adrian and Nick Heudecker, both analysts at Gartner Inc., to get the skinny on how Hadoop 2.0 will impact big data and big data technologies.

Our longtime expert contributor Niel Nickolaisen has taken on a new role as chief technology officer at O.C. Tanner Co., a Salt Lake City-based human resource consulting company focused on designing and implementing employee recognition programs. Lucky for us, his new role hasn’t slowed him down. In this week’s CIO Matters column, Nickolaisen examined how ITSM principles boost service levels and free up IT resource capacity in a fast-paced IT environment.

TechTarget’s senior VP of editorial Mark Schlack tackled a two-part overview of TechTarget’s annual survey of IT priorities, which drew 5,241 worldwide respondents, including 1,368 in the U.S. and Canada. In his first recap, Schlack observed that the IT master plan for 2014 includes a lot of business intelligence, mobility and Windows 8. In the second part, Schlack analyzed 2014′s enterprise IT blueprint. Looking to read more about IT salaries in the year ahead? Check out our IT Salary Survey guide.

In a CIO Snapshot feature by Karen Goulart, four executive-level IT leaders share what they see as the biggest CIO challenges today and in the immediate future. Leaders spotlighted include University of Miami Deputy CIO Brad Rohrer, Institute of Electrical and Electronics Engineers CIO Alexander Pasik, TopGolf International Inc. CIO Tom LaPlante and Boston Celtics Vice President of Technology Jay Wessel. Learn why keeping up to speed and embracing the cloud top their lists.

In Goulart’s weekly SearchCIO Searchlight column (fresh off the press today!), she looked at how the NSA surveillance fallout could result in a data collection policy for all. Read on to learn some not-so-good news for HP and BlackBerry.

In Compliance news…

On Jan. 16, SearchCompliance hosted its inaugural #GRCchat tweet jam. Participants logged on to Twitter to answer a series of questions following an information governance theme. In our first recap, tweet jammers highlighted the importance of streamline management. Other #GRCchat recaps reviewed how to craft a complete info governance structure, who and when to train staff in info governance, and which departments or roles should be responsible for championing risk management.

Our next #GRCchat will take place Feb. 20 at 12 p.m. EST. In the meantime, join SearchCIO’s #CIOChat Jan. 29, at 3 p.m. EST, where the topic du jour is wearable technology.

Stay tuned for our next weekly roundup here on CIO Symmetry and follow @SearchCIO, @SearchCIOSMB and @ITCompliance to read stories as they’re posted during the week.


January 20, 2014  3:41 PM

Fraudulent activity at major retailers: Credit card scams abound



Posted by: Emily McLaughlin
CIO, Midmarket CIO, mobile technology, Strategy for CIOs

In light of the recent data breaches at a major retailer (cough, cough, Target), credit card anti-fraud efforts are taking the data-privacy spotlight. Fraud certainly causes headaches for all involved — for starters, the organization that allowed the breach and is suffering financial and reputational damage, and of course the individuals whose information has been stolen. In SearchCIO Data Mill last week, Nicole Laskowski visited the concept of credit card bust-out fraud, a scam causing not just headaches, but migraines, for financial institutions.

As we gear up for a “wearables”-themed #CIOChat, read our recent consumer tech coverage from the 2014 Consumer Electronics Show in Las Vegas. We didn’t attend, but Twitter was buzzing with live updates and a constant stream of news-worthy content, and Senior Features Writer Karen Goulart rounded up some of the best CES coverage from the Web.

Speaking of Searchlight, Goulart’s most recent Searchlight piece was all about why CIOs need to up their cyberthreat defenses, how Google is getting more connected and what the net neutrality ruling means for the average American.

Executive Editor Linda Tucci rolled out a two-part feature story featuring Wade Miquelon, CFO of Walgreens. In part one, Miquelon discussed the tug of war between IT legacy systems and technology that could reinvent the business.  The second part looked at the costs of strategic technology and the benefit of new-age supply chains.

In small-business news, Jenny Laurello, SearchCIO’s senior community manager, sat down with American Society for Association Executives (ASAE) CIO Reggie Henry at the organization’s recent technology conference to learn why IT executives should continually recalibrate their IT roadmap in 2014.

Over on SearchCompliance.com, we rolled out two videos, one from the 2013 ISSA International Conference and another from the ARMA 2013 International Conference and Expo. In the first video, Professor Glenn Harlan Reynolds shared how whistleblower protection could benefit public and private sectors. In the second video, Barry Murphy, principal analyst and co-founder of eDJ Group Inc., discussed why data profiling is key to a successful information management strategy.

Of course, don’t forget to browse through our Essential Guide for news and tip covering the latest trends in IT executive compensation, employee satisfaction and the evolution of IT careers. Stay tuned for our next weekly roundup here on CIO Symmetry and follow @SearchCIO, @SearchCIOSMB and @ITCompliance to read stories as soon as they’re posted.


January 13, 2014  6:46 PM

CIO news from CES 2014, cloud news from Cloud Pulse and more



Posted by: Emily McLaughlin
CIO, cloud computing, Leadership and Strategy, Midmarket CIO, mobile technology, Strategy for CIOs

Alongside our New Year’s coverage of TechTarget’s 2013 IT Salary and Careers Survey, SearchCIO, SearchCIO-Midmarket and SearchCompliance have been pouncing on the hot topics of 2014: IT transformation, customer engagement and what’s next in tech — i.e. wearables, cloud computing and big data tools.

If you’re following consumer technology news, odds are you’ve heard a lot about the 2014 International Consumer Electronics Show (CES). Techies and leaders in information technology flocked to Las Vegas last week (Jan. 7-10) to preview the year’s new gadgets and talk topics like the Internet of Things (IoT) and wearable technology.

Senior Features Writer Karen Goulart ended the week, per usual, with her SearchCIO Searchlight column, and the main topic of her weekly recap was CES and wearable technology. There was a similar theme in Goulart’s first Searchlight of 2014, a list of lists that predicted what’s next in technology.

Other news from SearchCIO

Among the 830 IT leaders who responded to the biannual TechTarget Cloud Pulse survey, 45% indicated “business needs” as their top reason for adopting public cloud technologies. Karen Goulart talked to Laura Patterson, CIO for the University of Michigan in Dearborn, Mich., about the results. Goulart delivered a whole slate of recent cloud computing reportage: check out how CIOs are using cloud toward an end-to-end implementation strategy and the importance of security in new cloud computing arrangements.

Since the calendar year turned, SearchCIO experts have shared important news and advice for CIOs and IT leaders. Peter Burris, vice president and research director in the CIO practice at Forrester Research Inc., highlighted three fronts where companies must engage with their customers in an expert tip. In addition, CIO Niel Nickolaisen outlined 10 steps guiding the CIO’s trek toward IT transformation in this column.

As the year wound down, SearchCIO hosted a tweet jam with an “IT resolutions and regrets” theme. In recaps from the #CIOChat, participants shared their project focus regrets and how to resolve IT issues in 2014. And speaking of IT resolutions, Senior News Writer Nicole Laskowski looks at big data/semantic analysis and other data-related IT resolutions in The Data Mill. In her latest Data Mill, Laskowski looks at how big data takes a big bite out of credit card fraud.

Finally, in a fun tip Jenny Laurello shares how the collaborative skills of Quincy Jones, longevity of the Rolling Stones and tenacity of Tina Turner are the makings of a potent digital strategy.

Coverage from SearchCIO-Midmarket

SearchCIO wasn’t the only site to report on CES 2014 and cloud trends. In this recap, take a look at how the Internet of Things (IoT) and wearables have enterprise CIOs envisioning a consumerized-tech future. Goulart talked to two in-the-know CIOS about advice for cloud computing novices in a CIO Symmetry blog post. Managing Editor Rachel Lebeaux also took to the blog to discuss Boston’s technology wish list.

There’s more: A panel of experts at the ASAE’s Technology Conference detailed how to create an enterprise MDM policy and ensure mobile device security, reported our community manager Jenny Laurello attended the event. And finally, readers can test their knowledge pertaining to project management practices by taking our quiz.

Updates from SearchCompliance

Looking to give compliance a boost in 2014? In this Q&A with Derek Gascon, executive director of the Compliance, Governance and Oversight Council, we look at how effective data management strategy can transform IT organizations.

Attention CCOs: What is Rule 38a-1(c) of the Investment Company Act of 1940 and how is it lowering liabilities for CCOs? Get answers in this FAQ by Caron Carlson, part of SearchCompliance’s IT Compliance FAQ series.

Site Editor Ben Cole took a trip to ARMA’s international conference and came back with a plethora of info for security and compliance professionals. To start, watch this video interview with Barry Murphy, principal analyst and co-founder of eDJ Group Inc., about profiling data as part of an information management strategy. Next, watch how certain unique business needs force information governance to adapt in this video Q&A with ARMA International Executive Director of Content Diane Carlisle.

Top stories across sites

Didn’t have time to read it all this year? We’ve collected and list-ified some of our most popular SearchCIO, SearchCIO-Midmarket and SearchCompliance articles to make your life a little easier.

Stay tuned for our next weekly roundup here on CIO Symmetry and follow @SearchCIO, @SearchCIOSMB and @ITCompliance to read stories the moment they’re posted.


January 9, 2014  4:11 PM

IT professional salary info and career aspirations: An executive view



Posted by: Emily McLaughlin
CIO, IT salaries, Leadership and Strategy, Midmarket CIO, Strategy for CIOs

Every fall, TechTarget polls the IT masses to find out which technology professionals have enough dough in which to roll. In addition to learning who the high earners are, TechTarget’s 2013 Annual Salary and Careers Survey asked participants (1,711 IT professionals in North America) about bonuses, pay cuts, IT budgets/staffing and overall job satisfaction.

Over the past couple weeks, the writers and editors at SearchCIO and its sister sites have sifted through the salary data, turning out story after story for your reading pleasure, plus another special treat.

Visual learners, rejoice! Take a look at our — if we do say so ourselves — visually appealing IT career salaries infographic, which depicts everything from 2013 salaries and expected compensation changes in 2014 to IT priorities and the mood within IT organizations.

Looking for a more detailed overview of our survey? Head over to our Essential Guide for the ultimate overview of our Salary and Careers Survey stories. Topics covered include:

The IT executive perspective
Three senior IT executives dish on their compensation and what keeps them engaged in the workplace. Read the full feature by SearchCIO Editorial Director Christina Torode to absorb their advice and learn about their top projects in the year ahead.

Senior IT execs’ increased earning potential
Could you be making more money? A senior IT executive’s earning power is contingent on industry, company size, company revenue and a number of other factors. Executive Editor Linda Tucci picks apart the salary data.

Compensations on the rise
Senior IT executives responding to the survey reported an increase in compensation in 2013. Senior Features Writer Karen Goulart explains how those compensation numbers are expected to increase steadily through 2014.

Innovation and growth make IT do the happy dance
Just like Mom always told you, money doesn’t equate to happiness  — so what does? Goulart weeded through the survey data on IT job satisfaction and the organizational mood and found that CIOs get excited when they see their company moving forward

Cloud, cloud and more cloud
According to salary survey respondent David Girard, “Cloud is making a huge difference to IT careers.” Learn why cloud computing continues to loom large, plus more from Torode on career goals among IT professional.

Budgets and headcounts: Up or unchanged
Overall, IT leaders saw a stable or growing change in their IT department budgets and headcounts, according to survey results parsed by Senior News Writer Nicole Laskowski. Several executives weigh in on how they’ll direct IT resources in the year ahead.

BYOD continues to gain traction in IT
Outsourcing who? Bring your own device takes the spotlight in Laskowski’s roundup of top technology priorities, while only 2% of survey respondents said that outsourcing and privacy are their primary project areas.

The GRC salary
SearchCompliance Site Editor Ben Cole took a peek at salary trends amongst the governance, risk and compliance professionals who took our survey – turns out, as the demand for their skill increases, so do their salaries.

What do you think about all this salary mumbo-jumbo? Do these numbers and experiences match up with your own? Share your thoughts here or on the individual story pages.


December 23, 2013  5:42 PM

CIOs offer uninitiated some advice on going to the cloud



Posted by: Karen Goulart
CIO

As 2013 was coming to a close, SearchCIO took a look ahead to the new year and asked some CIOs and industry experts to weigh in on the shape of cloud strategies in 2014. It looks like we’ll be seeing enterprises embrace new trends in security and a drive toward going data center free in the months to come. But what about the midsize companies?  Those who fall between startups running entirely on cloud and enterprises with the staff and budget to put toward cloud directives? Some companies have only made baby steps — sometimes inadvertently, if at all — toward embracing the cloud. What should they be looking to do this year ?

Two of the CIOs we spoke to for the cloud strategies 2014 story were more than happy to share their advice. As much as one can be an old hand at a relatively new technology, these two gentlemen are it.  Alexander Pasik is a former analyst with Stamford, Conn.-based Gartner Inc.  who served as CIO for the Guggenheim (where he finished his tenure with 70% of applications being cloud based ) and is currently looking to go data center-free as CIO for the Institute for Electronics and Electrical Engineers (IEEE). Larry Bolick is CIO of Boston-based Aquent, where he started going all in on cloud back in 2008.

What advice would you give a CIO who is just starting to seek cloud solutions?

Alexander Pasik:  As you go from infrastructure to platform to software as a service, the economic benefits increase. So if you can identify well defined point solutions for SaaS,  like e-mail, contact and calendar or if , suppose you’re a small company and you haven’t invested a lot in a financials package,  financials packages are pretty much consistent, you’re not going to get an advantage by using financial package over another so why not use a cloud based one?  So it’s a matter of identifying the things that are as boiler plate as possible, that you’re not going to want to make changes to, that you can just use out of the box.  Like an e-mail system, like a financial system, etcetera.

Should they be worried about the maturity of solutions at this point?

Pasik: That’s the thing, right now it’s so hyped up that there’s a lot of vendors providing solutions in the cloud, but many of these vendors might be very small and might have very limited sustainability. You might be tempted to go with a cloud vendor who has some interesting, unique solution that you can just plug and play. But if these guys are a start-up that may not be around in a year then you’re stuck because you just put all your data in their systems. So you do have to make sure that you are working with reputable vendors that you know you can rely on.

What advice would you give a CIO who is just starting to look at using cloud?

Larry Bolick: I think the logical starting points are still where they were when I started. If you haven’t used cloud to begin with, you’re probably going to start thinking about  an application that hosted in the cloud like with a Google  or a Salesforce or something like that.  But to use clouds as a kind of the PaaS or IaaS you’re probably going to start through your software development organization or your IT organization. Just to get them familiar with it. Because you need the systems administration ability anyway from that organization to get familiar with the cloud to support all that stuff. So that’s the logical place to start. Within that organization, everyone needs and extra server now and then to scale or everyone needs a test environment that’s not part of your production software environment – those are the areas that that traditional – if you can call three or four  years a tradition -  those are the areas that are have been the place where many folks have started getting familiar with cloud based services.

What about having the right skills?

Bolick: One nice thing now is it’s easier to find the system administration  resources that are familiar with cloud services and virtualization that’s associated with it than it was a few years ago. A few years ago you basically had to grow those resources and now you can find them just as the market has got more legitimacy and more people have started using them.

 


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: