CIO Symmetry:

CIO


September 9, 2011  2:57 PM

What’s the verdict on the VMworld 2011 booth babes?



Posted by: Wendy Schuchart
CIO, women in IT

Last week, CIO Symmetry was in the middle of a veritable booth babe coup. I never would have imagined that the VMworld 2011 promotional models would be such an emotional subject and, yet,...

September 6, 2011  7:18 PM

Banning Facebook to solve privacy, productivity issues not the answer



Posted by: Scot Petersen
CIO, Facebook, social media

Facebook surpassed 750 million users this summer. That's a heck of a lot of people, but not really news. What is news is the movement afoot banning Facebook from users. Many companies are still banning Facebook in the name of...


August 30, 2011  4:14 PM

Rooftop solar panels look to be a sound green investment



Posted by: Scot Petersen
CIO, Green IT, ROI

Rooftop solar panels are finally turning on a light bulb over some business leaders' heads. A big office park in my town is putting up solar panels on the roofs of two parking garages on its property. The total of 2,052 panels, which will sit on previously unused space, will generate 585...


August 29, 2011  3:00 PM

What really happened with the RSA breach



Posted by: Wendy Schuchart
CIO, Linux, RSA, Steve Jobs, Twitter

It's been a busy week in tech, between the Earth shaking, hurricane preparations and the departure of one of tech's most recognizable faces, Steve Jobs. Here's our favorite pieces of tech news from last week, including an update on the RSA breach, how we're evolving our management styles in the age...


August 26, 2011  1:32 PM

Lessons learned from Steve Jobs’ effective leadership style



Posted by: Wendy Schuchart
CIO, IT/business alignment, IT/Business Leadership

You may have heard that Steve Jobs has decided to step down from his successful tenure as Apple's CEO. Without a doubt, Jobs' effective leadership style was directly...


August 23, 2011  3:43 PM

HP takes a turn at re-engineering the corporation



Posted by: Scot Petersen
CIO, HP, IT business transformation

Everyone is in the middle of IT business transformation these days. You could call it re-engineering the corporation,


August 19, 2011  2:21 PM

Scorned employee exploits network security policy after layoffs



Posted by: Wendy Schuchart
CIO, network security policy, rogue employees, security risk

Picture this scenario: Employee A leaves the company to take another position. Your network security policy demands that you kill his ids and passwords, right? What about if Employee B leaves the company in a way that isn't entirely voluntary? You certainly kill his access, tout suite, but...


August 16, 2011  6:12 PM

How the Google acquisition of Motorola affects your mobile workforce



Posted by: Wendy Schuchart
CIO, Google, Linux, mobile workforce

It's been a busy week in tech. Google's acquisition of Motorola has everyone wondering how it will affect their mobile workforce. Here's a tasting menu of the choicest bits around the Web, including Google's acquisition of Motorola and how you'll have to pry the smartphones from the cold dead hands...


August 9, 2011  5:13 PM

Is iPhone 5 ready to overpower competitors for business users?



Posted by: Lmartinek
CIO, iPhone 5, mobility

I was with some friends last week when we landed on the topic of phones. The conversation began when one person said she was planning to buy a new phone within the next couple of weeks, but it wasn't long before her brother interjected. He began adamantly telling her she should wait for the iPhone...


August 4, 2011  11:17 PM

Intrusion testing means thinking like a hacker



Posted by: Wendy Schuchart
CIO, Hacking, security risk

Back in the '90s and early 2000s, I had two acquaintances who called themselves "hackers." Being a burgeoning geek girl myself, I kind of figured that they were affecting the moniker to be cool. Back then, the image of a hacker was different, more like the Robin Hoods of the Internet age. It was...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: