Terry Childs, former network admin for the city of San Francisco, was recently found guilty of one felony count of denying computer services. In 2008, Childs refused to hand over WAN network passwords to his boss, and the city went 12 days without administrative control.
While Childs should have surrendered the passwords when asked, one juror, Jason Chilton, felt that the city was also at fault, saying that “management did everything they possibly could wrong.” Ineffective management and communication, he said, put Childs in a difficult situation.
The crew at outdoor apparel and accessory retailer Eastern Mountain Sports knows a thing or two about motivation. They are guides, not employees, after all, who traverse mountains themselves. But since introducing Information Builders’ BI dashboards across its 64 stores, competition has kicked up a notch.
Several new contests or “face-offs” between stores have popped up since real-time sales stats made a debut on BI dashboards for all to see. Now, there are also best-place sales competitions among guides, stores and distribution managers.
Security threats are everywhere. Not just your traditional hackers and cybercriminals — I’m talking about the people who work for you. Those who absent-mindedly leave a laptop in an airport or misplace a flash drive are putting your company’s data at risk.
This type of data loss is pretty common, no matter how serious you are about security. Just ask Apple.
Colleges across the country have started turning to cloud email services such as Gmail in an effort to cut costs. It’s not entirely surprising, either: IT shops have been toying with the idea of moving to Gmail or other cloud email services for some time, and younger generations of users are already using cloud email services, even circumventing the email programs provided to them by the college in favor of the ones they check most often.
Security continues to be a top priority for IT organizations shelling out budget dollars and planning for the future. But do you know the right questions to ask when evaluating potential security vendors and service providers?
This week, I wrote a story for SearchCIO-Midmarket.com on the importance of performing vendor risk assessments on your data recovery service providers — something not many organizations regularly do today. According to Paul Reymann, CEO of security consulting firm Reymann Group Inc., the importance of vetting third-party data recovery providers is just not on the radar screen of many organizations.
I just got word from Microsoft that they plan to release Office 2010 and SharePoint 2010 — with the new Microsoft business intelligence (BI) features — on May 12. Continued »
CIO Rich Secor decided to look into cloud computing pricing to see what all the buzz was about. Could it save his company, Health Advances LLC, some money? Could it provide better application performance? Continued »
The Google Fiber for communities deadline is right around the corner. In an effort to test out its plans for high-speed broadband and fiber-to-the-home connections, Google has asked interested communities to step forward and express why they might be a good fit for the super-fast test installation. Continued »
I was at a Boston Society for Information Management (SIM) event the other day on transformation: how CIOs are transforming the business and the role of IT, but what struck me is how little a role cloud computing was playing, as of yet, in business or IT transformation. Continued »
How important are IT certifications today? As organizations start to hire again (there were 58,229 available tech jobs on Dice.com this month), IT certifications could help potential candidates stand out from the competition — and possibly make more money. Continued »