CIO Symmetry:

Virtualization


May 10, 2012  3:46 PM

The most popular mobile OS? Hint: It’s not an Apple product



Posted by: Wendy Schuchart
Android, Apple, BYOD, Google, Hacking, mobile devices, mobile technology, mobile workforce, network security policy, Operating systems, Security, security risk, SMB security

We've scoured the Web looking for the top notes for your executive lunch break. This week, we're digging into mobile and smartphone news, including the most popular mobile device and the risks your BYOD users are facing with the latest Android malware attacks. The majority of U.S. mobile users...

May 8, 2012  7:37 PM

Technology for competitive advantage is CIOs’ new Job One



Posted by: Scot Petersen
BI, big data, Business Intelligence, CIO Jobs, cloud computing, cloud computing strategy, Midmarket CIO, Outsourcing, outsourcing services, Strategy for CIOs

Competitive advantage is not that new a business term -- it was popularized by Harvard Business School professor Michael Porter in the 1980s -- but it has never been more important as a...


May 3, 2012  4:39 PM

Practical lessons in workplace culture from Google and Facebook



Posted by: Wendy Schuchart
CIO Careers and Staffing, Evernote, Facebook, Google, IT staff development, IT staff development and retention, work/life balance, worker satisfaction, workplace culture

When it comes to retaining your IT talent, it's about more than benefits and job security -- workplace culture matters too. It's the intangible (and sometimes tangible) practical lessons in keeping your IT talent happy that make the difference. For instance, Phil Libin, CEO of


April 6, 2012  2:56 PM

Will vendor relations be strained after Dell acquisitions?



Posted by: Wendy Schuchart
AppAssure Software, Cisco, Clerity, cloud applications, cloud computing, cloud security, Dell, Hacking, Hewlett-Packard, IBM, Make Technologies, security tools, SonicWall, Vendor Relationships, Vendor selection and management, Wyse Technologies

It's been a busy week for Dell, not to mention for managing CIO vendor relations. This past Tuesday, Dell announced its impending acquisition of Wyse Technology Inc., a cloud software and hardware company (and the source of one of our favorite


March 19, 2012  11:42 AM

The new iPad release: A win or a wash?



Posted by: Wendy Schuchart
Apple, data privacy, Google, Google Plus, iPad, iPad 3, mobile application development, mobile applications, mobile technology, mobile workforce, remote connectivity, Skype, social media, social media tools, social networking, women in IT

Each week, we cover all the best blogs and give an executive summary for busy CIOs. Things were shaking in the world of IT last week, with the breaking news that there's a risk of data privacy on Skype and the very revealing study that women are considered better leaders than men. And let us not...


February 23, 2012  7:54 PM

Will Obama’s data-privacy bill of rights work?



Posted by: Wendy Schuchart
Amazon, Apple, data privacy, data security, Google, Google privacy policy, Hewlett-Packard, Microsoft, mobile applications, Research In Motion, Web 2.0, Web surfing

After a month fraught with data privacy disasters, the big guns are stepping up to the plate. Yesterday, the White House issued a call for Congress to pass a...


February 20, 2012  5:26 PM

Are personal privacy violations just the cost of mobility?



Posted by: Wendy Schuchart
Apple, data privacy, data security, Facebook, Google, Google privacy policy, iPhone, Moore's Law, Security

Each week, we scour the Web and bring you the most tantalizing tidbits that hit our radar. This week, we're looking at the nasty reality of personal privacy violations, the price of insider trading and a hot new transistor that's the size of a single atom. • Remember Google's vow to do...


February 13, 2012  5:25 PM

How free mobile apps risk personal data privacy and security



Posted by: Wendy Schuchart
Android, big data, data privacy, data security, Google, Hacking, iPhone, iPhone business apps, mobile applications, mobile devices, mobile technology, mobile tools

Each week, we scour the Web and bring you the choicest cuts for your approval. This week, we're looking at data privacy and security in the form of denial-of-service attacks, smart chatting and two free mobile apps suffering from major personal data security issues. Your team is your first line...


January 31, 2012  3:08 PM

Shared services are the next generation of IT



Posted by: Scot Petersen
cloud computing, cloud computing strategy, data storage, managed services, shared services, Virtualization

Last week I wrote about the transformation of banking services into products. This week I want to discuss different types of services--shared services. One of the first technology...


January 27, 2012  2:22 PM

Google privacy policy changes? Get over it



Posted by: Wendy Schuchart
data privacy, Facebook, Google, Google personal search, Google Plus, Google privacy policy, online reputation, SharePoint and Web 2.0

Three days ago, we all learned of someĀ changes to Google's privacy policy. With the new changes, it will take what it knows about its users and "combine information you've provided from one service...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: