July 1, 2013 11:45 AM
Posted by: Renodis
In a recent blog post I talked about the 6 Ways IT Leaders Can Be Relevant to the Business.
- Sit at the Executive table
- Partner with leaders of the business
- Act like a problem solver and solution provider, not an order taker
- Outsource where necessary, delegate when necessary
- Run IT like a business
- Hire the right talent and hold them accountable
But now let’s take a dive into a few examples of just how IT leaders are driving results and becoming relevant to the business.
Retail company ABC wants to improve the customer experience, improve customer data gathering, and increase supply chain efficiencies. The IT organization proposed using multichannel commerce (eCommerce, POS, Supply Chain, CRM) to help increase sales, make it easy for their customers to order their products online, and reduce customer wait times when visiting their retail locations.
Financial company ABC needed to reduce downtime of network for voice and internet communication, and also needed to improve customer data security. The IT organization proposed upgrades to their network bandwidth to improve performance, increased security, implementing a disaster recovery plan to protect data, and web based applications for use at branch locations to support customer data.
Company ABC in the manufacturing industry needed to improve internal collaboration and communication, increase employee productivity, and improve internal employee knowledge of products and services. The IT organization proposed and implemented collaboration tools and web based platforms to improve customer relationship management and internal communication/productivity between employees, customers, and partners.
Company ABC in the distribution industry wanted to increase field sales, improve the customer experience, and improve productivity. The IT organization proposed using mobility and tablets in the field to deliver web based training and web based platforms for order entry, resulting in improved employee performance, increased efficiencies for order entry, and an improved customer experience.
Bringing It All Together
Supply chain, inventory processing, collaboration, web based training, GPS, mobility, improving bandwidth to improve efficiencies and network performance… Whatever your business does, systems and technology can help drive results for the business and improve the experience for customers and internal end users. But all of these things need to be tied to the overall future strategy of the business, not just a way to use technology for the sake of using technology.
This is the job of IT to work with Executive teams and stakeholders to understand their strategies, goals, desired outcomes, key challenges, and how IT can help them achieve these results.
Ryan Carter is an experienced industry expert in Telecom Management and Enterprise Account Manager at Renodis.
June 14, 2013 5:29 PM
Posted by: Renodis
Most of us are pretty savvy about spotting virus and phishing attempts (if not, keep an eye out for the upcoming blog “Spotting Mobile Virus and Phishing Attempts”). What we don’t seem to know are all the ways in which viruses are triggered. The word trigger in this article is just a fancy term for ways to start viruses AKA malware. Most people also understand that they need to trigger something that will infect their system, like “accepting” a program or running an EXE file. But did you know that NOW viruses can be triggered by sound, vibrational signaling or light?!
New Triggers for Mobile Viruses: Why is this important to you?
Though this blog covers viruses on mobile devices, there are similarities with the same kind of viruses found on PCs. The reason for this is that both PCs and smartphones have an operating system. The operating system and programs that run on the devices is what viruses rely on to do their damage.
Whether for the PC or a mobile device, the similarities of most viruses lay in purpose which is to be disruptive to the functioning of the device and destroy or capture information.
But these new triggers for viruses seem to be a step up. They are targeting just mobile devices which tend to carry just as much and in some cases MORE confidential information than a PC. Think about it – credit cards, banking information, company confidential documents, phone numbers, addresses, etc. So be aware of the information you store on your phone.
New Triggers for Mobile Viruses: Why use sensors to trigger viruses?
Typically the way a virus works is just like the common cold. It can be passed from person to person and in this case, device to device. In most cases viruses are attached to executable files (these are files that start programs). This means that a virus can exist on your device and not infect it until a human action has occurred to start the infection (for instance running a program that contains a virus) and just like a cold, human action can keep passing the virus along unknowingly via files, emails and attachments.
Traditional virus attacks use TCP/IP (or simply stated, a connection to the internet) to launch via some triggering event or by human interaction of starting an infected program. Both of these methods can be detected by anti-virus software which monitors network packets and scans executable files before they are run.
The unique advantage of these new triggers is that they are harder to detect. Plus, traditional triggers for viruses may require an internet connection whereas with the new triggers do not nor do they require a human interaction to start it.
New Triggers for Mobile Viruses: How can I protect my device?
To protect yourself, continue to follow standard protocol.
1) Don’t open EXE files that were sent to you anonymously
2) Don’t fill out forms asking for confidential information if unsolicited
3) When downloading a new application pay attention to the type of information that the application can collect from your device.
The bad news is that it is very hard for any of today’s anti-virus software to detect the new mobile viruses that are triggered by sound, vibrational signaling or light. I reviewed a couple of mobile anti-virus software that I like and from what I could see they do not have anything in place to detect these viruses.
New Triggers for Mobile Viruses: The Summary
My guess would be that due to the proliferation of mobile viruses there is a good chance that some mobile devices may already have viruses that can be triggered using this technique.
The good news, if any, is that currently these types of attacks are rare and somewhat sophisticated to create. So at this point I don’t advise locking your phone in a sound and light proof case. But it is best to keep aware of the threats that exist for your your mobile device.
Reynaldo Lyles is a recognized expert in mobility thought leadership, new industry standards in mobile device management and compliance, and the Mobility Practice Leader for Renodis Telecom Management.
June 13, 2013 3:54 PM
Posted by: Dr. Werner Hopf
Much to the dismay of consumers and businesses around the world, data security breaches continue to occur regularly. Increasingly, Personal Identifying Information (PII) and Payment Card Information (PCI) are being revealed publically. Sometimes it is exposure through maliciousness, but often times it is also through carelessness.
With the explosion of ecommerce and electronic records, retailers, government agencies and the medical industry – among others – are struggling with the effective management of terabytes of personal and business data. For companies that capture, analyze and store PII and PCI data, there is an urgent need for encryption and hiding information fields.
Countries, states and other regulatory bodies are enforcing stricter laws that dictate how companies handle sensitive information. One of the methods used to secure this data is encryption. More than ten states now have such laws on the books; in addition, stringent regulations are already in place in Canada and Europe. Business organizations that do not comply face large monetary fines. As a result, CIOs and CFOs are keeping a close eye on this area.
Typically encrypting active data can be a challenge, but data that has been archived in SAP® databases can be equally or more challenging, and often forgotten altogether. Why? Often data will “lose” its encryption when it is archived in SAP systems. Many enterprises are unaware of this, which makes them vulnerable to fines or a breach if one occurs. There is a growing need to properly encrypt both data when it is archived as well as that which was archived long before mandates were ever enacted. This can be a daunting task. The addition of advanced encryption should not serve as a deterrent to a robust archiving strategy.
Government organizations are also beginning to more vigorously enforce regulations, especially those related to HIPPA, PII, PCI and others which support encryption. This is causing many corporations to scramble to meet audit and data encryption obligations. The risks, both financial and to public image, are significant. As Big Data exponentially increases the amount of information organizations create, access, store and archive, the challenge to manage it securely only gains more urgency.
That’s not all. What about business data that is audited for Government, Risk and Compliance (GRC) purposes? Even more so than PCI and PII, it is imperative that data needed for any audit or legal requirement be immediately available in order to prove compliance and avoid penalties.
Tackling risk and compliance requires a data management platform which offers a combination of traditional SAP archiving and other SAP-certified software to meet GRC obligations. The optimal solution uses the standard archiving process, with minimal system performance degradation. For data retrieval, it can update SAP Tcodes for end users and auditors to read the archive data, making both online and archived data available.
Archiving becomes increasingly important as the cost of IT storage infrastructure continues to escalate and storing data in an active database can be expensive regardless of your SAP system. The challenge becomes even more complicated for those planning to transition to SAP HANA™. HANA utilizes disk space on a “pay-as-you-grow” basis and in-memory blades have already developed a reputation for being rather expensive. The best way to control HANA costs is to operate a lean active database by utilizing nearline storage and eliminating unnecessary information as aggressively as possible.
Whether used for eCommerce, GRC or for sensitive intellectual property, the importance of data encryption cannot be overstated. As the Big Data explosion continues, the trend of states, countries and regulatory bodies enacting tougher laws governing data encryption will only continue to expand. For this reason, organizations must take a closer look at not just their encryption strategy but also their overall archiving strategy to ensure that both can function in a complementary manner to get the most from their SAP investment, optimize system performance and to ensure organizational risk mitigation.
June 6, 2013 6:31 PM
Posted by: Renodis
There have been numerous articles written on CIOs and IT Leaders and how they should be of value to the business. You hear the saying ‘IT executives should partner with the business’ a lot. Okay, that’s great, but exactly how do you make it happen?
Joe Topinka, CIO of Red Wing Shoes, said at the recent Mid-Market CIO Executive Summit “IT resources must be a partner of the business and an active part of the future strategy rather than simply an enabler of technology.” This is the exact truth. Be relevant, provide impact.
What is Not Relevant?
First let’s look at what is ‘not relevant’. If you want to be non-relevant, then I suggest you not meet on a regular business with your executive team, not be visible to the company, do not help solve problems, and do not meet with key stakeholders and management to discuss their needs. You could just be an order taker and deliver ‘as promised’, or you could work with your executives and be a partner to leverage technology to help drive business results.
It’s easy for IT leaders (CIOs, VPs, Directors, Managers- regardless of title) to be so buried in the weeds with day to day responsibilities that they can forget how to remain relevant to the business. One IT leader (names will not be used to protect the innocent) had the title of VP of IT but was taking helpdesk support calls from internal end users to support the business. Now don’t get me wrong, it’s great this person helped where needed, and I realize IT leaders wear many hats, but taking helpdesk calls is not being relevant to the business. This is about being buried in the weeds, resulting in becoming behind on key IT projects and initiatives, and eventually non-relevant.
6 Ways IT Leaders Can Be Relevant to the Business
So, how do you become relevant and impactful to your business? Here are 6 Ways IT Leaders Can Be Relevant to the Business, regardless if you are a CIO, VP, or other leader of IT:
- Sit at the executive table – “Out of sight, out of mind” is an old saying, but if you are not working closely with the executive team, you will be out of mind.
- Partner with leaders of the business - Work and meet with business leaders on a regular basis (monthly, weekly, quarterly, whatever works for them) and build relationships to understand their needs and challenges.
- Act like a problem solver and a solution provider, not an order taker – Don’t enable technology and implement tools for the sake of it. Ask questions, pose risks and ways to mitigate them, offer alternative solutions, and alternative opinions.
- Outsource where necessary, delegate when necessary – You can’t do everything and be everything on your own in IT, there are certain components that should be handled by a 3rd party (i.e. staffing using contractors, use a partner to manage telecom, SaaS, infrastructure, application management, etc.)
- Run IT like a business – Measure, deliver, and report results. Everything you do in IT should be measured, evaluated, and measured again using industry benchmarks. If you use a 3rd party vendor, they should be able to help you measure and report results using their services.
- Hire the right talent and hold them accountable – Whether you use a 3rd party provider for staffing or hire full time, every person needs to be held accountable for meeting expectations within timelines.
Now that you know just a few ways to be relevant, always remember the best leaders are the ones heavily engaged at all levels of the organization, working hand in hand to solve problems and provide solutions to the overall strategy of the business. Being relevant provides high impact results for your organization, and ultimately career satisfaction and longevity for you.
Are there ways you are providing impact to your business? How are you staying relevant? Let us know your feedback and comment below!
Ryan Carter is an experienced industry expert in Telecom Management and Enterprise Account Manager at Renodis.
May 31, 2013 4:21 PM
Posted by: MarcJacocks
, Document Automation
In today’s information-driven business world, I’m not going to blow anyone’s mind by extolling the virtues of enterprise data. We all grasp the notion that the information an organization collects and utilizes can be extremely valuable. Whether this data is being used to drive strategic Business Intelligence (BI) analysis, or to dynamically populate the mission critical communications any organization requires, smarter business practices are contingent upon efficient data capture, manipulation, and application. However, here at Ecrion, we’re seeing that at the top, the most-savvy organizations are thinking about enterprise data differently and gaining a competitive advantage by combining workflows in different areas.
By turning to innovative platforms that integrate advanced reporting and BI analytics in new and logical ways, Fortune 500 companies are utilizing the same enterprise data to dynamically populate communications and power BI analytics. Rather than processing and ingesting the data twice into two different systems (which is time-consuming, costly, redundant, and inefficient, just to mention a few), utilizing one comprehensive platform that includes a data aggregation tool saves an immense amount of time, resources, and money. And this is just process control!
The real value of integrated document automation and BI lies not only in the way in which outputs are created, but more so in the strength, accessibility and impact your communications have both internally and externally. Where most organizations see documents (statements, invoices, forms, and more) as a resource-consuming necessity of business, more and more Fortune 500 companies instead look at these communications as additional opportunities for growth, heightened consumer confidence, and increased revenues. How?
- Smarter documents – Integrated document automation and BI platforms facilitate more intelligent communications. Users can easily incorporate triggers into the data that assess specific customer habits, trends, and demographics, and then include pertinent highly-targeted marketing messages within the document automatically. Stimulating and powerful BI visualizations can be incorporated directly into documents to enhance customer experience.
- Two-way communication – With an integrated platform, fostering productive two-way communication becomes a breeze. Customers have the capability to see exactly what they want to see, how they want to see it, so they can access information in a manner that best suits them. As well, consumers can populate online forms that provide immediate and accurate feedback, and can even generate customized reports based off of interactive dashboards with the click of a mouse. Then, with the ability to track how customers access data, how long they spend on particular pages, or what visuals and messages work or don’t, companies can build better strategy and make better business decisions.
- Consistency across platforms –As customers access communications across mediums (print, online, email, SMS, tablet, smartphone) it is increasingly important to maintain a consistent look and feel. Centralizing and unifying data into a single source that powers both BI and document production ensures accurate formatting and content. Moreover, employing a single comprehensive system means that users can freely customize the documents they receive on any supported device and get the output they want.
Ultimately, Fortune 500 companies are tapping into the immense value that lies within an integrated document automation and BI platform, but this kind of streamlining makes sense for companies of any size that need to generate interactive and customized reports or respond to multiple platform demands. Bringing these traditionally independent processes together provides for significant cost and time savings, simplified workflow management and more productive, empowered communications that provide tangible value to any organization. Are you ahead of the curve?
BIO: Marc Jacocks is the Marketing Coordinator for Ecrion Software. Following undergraduate studies at Wake Forest University, he completed his MBA at the University of Miami, where he concentrated his efforts in Computer Information Systems and Marketing. It was here that Marc fostered his fascination for enterprise data and the strategic value it can provide. Marc firmly believes in the power of data, and continues to explore new and interesting opportunities to leverage information for better decisions and better business.
May 30, 2013 9:35 AM
Posted by: PremioOscar
In the past ten years there’s been a lot of talking about fibre optic cables and fibre optic technology and almost everyone has heard of them. Reality is that not everyone actually knows what they are or how they work or the reason why they are considered a proper revolution.
To make it simple, a fibre optic cable is just a cable made of glass or plastic; a very thin and delicate fibre of glass/plastic within a plastic sheath.
The obvious and primary way to classify a fibre optic cable is by its material; cables‘core can be made of plastic or glass which will determine the final use of them.
Plastic Fibre Optics, are essentially used for decorative and aesthetic transmission of light (you definitely have seen toys, lamps or Christmas trees made of plastic fibre optics); however these cables aren’t suitable for data transmission because the plastic fibre isn’t pure enough and the light wouldn’t travel smoothly but it’d be scattered around and signal would be lost.
Fibre Optic cables made of glass are the ones that have revolutionised the world of telecom and datacom. In fact these cables have overpowered the usual copper cables and have improved the quality and reliability of data transmission ensuring a higher quality and a quicker data transmission.
Fibre Optic Cables (both plastic and glass) allow light to travel through the core which is the inner part of the cable. The light bounces within the core which is wrapped in an optical material called cladding that reflects the light back into the core without absorbing any to prevent any dispersion of light. Because of the cladding, the light can travel along long distances maintaining the quality of the signal and the quality of data transmitted.
The fibre optic cables made of glass ensure a reliable and high quality transmission as long as the core is made of pure glass. Any sort of impurities within the fibre may interfere with the data transmission causing disruption during the transmission.
There are a lot of different sort of fibre optic cables depending on how they will be used; out of all the different ones we can identify two main types: single-mode and multi-mode fibre.
- Single-mode fibre cables: these cables allow higher capacity to transmit information because it can retain the fidelity of each light pulse over longer distances, and it exhibits no dispersion caused by multiple modes. Single-mode also enjoys lower fibre attenuation then multi-mode fibre.
- Multi-mode fibre cables: use a much thicker core than single-mode. These cables can carry data encoded using multiple light paths, thus allowing for multiple data paths to travel over a single optical fibre. The downside of multi-mode is transmission distance and available data bandwidth. Multi-mode transmission is good over shorter distances and cannot support the high bandwidth of single-mode fibres.
There are different advantages in using fibre optic cables, but I believe the following ones could be enough to support this technology:
- Cost: fibre optic is cheaper than copper; production of fibre cables is cheaper even though is complex; the light weight reduces transportation costs and also, because the signal is transmitted over longer distances, fibre optic systems require less equipment such as repeaters at regular interval to ensure there aren’t any signal losses. All these details reduce the overall price of fibre optic systems over copper cabling systems.
- Reliability: data transmission through fibre optic cables is more reliable especially over long distances where data losses are exceptionally low.
- Electrical Immunity: fibre cables transmit light signals without involving any electrical element, which means that they are immune to electromagnetic interference between transmitting and receiving ends of the communication, especially if there is the possibility of different earth potentials. (Power industries, laboratories and medical companies take advantage of this feature to transmit data over any distance).
The disadvantage of Fibre Optics is the cost of the network interface cards for the PC and server and Telecommunication Equipment. When the cost drops with mass production Fibre Optics will become the norm and not just for high end applications.
May 2, 2013 1:15 PM
Posted by: Renodis
Are you in charge of recommending or deciding what technology your company provides for staff? How will you decide between smartphones, tablets or laptops? What criteria will you use? This decision carries a number of risks. Get it wrong and you may have unsatisfied and unproductive staff. But get it right… and there is nothing better than a happy and productive workforce.
It’s a big decision, but no need to panic. We’ll help guide you to the right solution for your environment. Just follow these 4 evaluation criteria to help you decide if you should get smartphones, tablets or laptops for your staff.
Smartphones, Tablets or Laptops: Evaluation Criteria #1 – Is the work conducted remotely?
This may determine whether the person or department should have a company mobile device at all. If this person’s duties are 95% based in the office – is there really a need for a smartphone or tablet? In this case a laptop is the best choice.
Identify who is working away from the office during business hours. Are they a road warrior working out of cabs and airports where information and responses are needed immediately? In this case a tablet might be a smart choice.
Smartphones, Tablets or Laptops: Evaluation Criteria #2 – What type of work is done remotely?
Once you have determined the staff working remotely, the next thing is to determine what they do and the environment they are working in. Are they simply answering the phone and responding to emails? Are they using an application which they need to enter and record information? Does the work they do require immediate feedback from any location?
I like to pay attention to the user on this one. Are they doing a lot of data entering (typing or selecting items from a drop down datawindow)? The reason this is important is because from our three device choices, typing is best done from a laptop. But if I’m selecting items from a drop down datawindow, this opens up certain smartphone and tablet options.
Smartphones, Tablets or Laptops: Evaluation Criteria #3 – Where is the work conducted?
Working remotely … it is the “remotely” that means many things to many employees. Is the work environment in a sewer underground doing inspection? Is it on a construction site? Is it in a hotel, car, or coffee shop? Is the employee setting up an electrical tower somewhere in the middle of Utah? Or perhaps the employee is working in a location without cellular connection. (Yes, there are still a few of these locations. I hit a big one driving from Denver CO to Flagstaff AZ.)
Smartphones, Tablets or Laptops: Evaluation Criteria #4 – Are there any physical limitations?
This one seems like a strange one, but it is very real and important. I worked with a company that provided really cool, new smartphones for their techs working on heating units, boilers and pipe lines. The biggest complaint was “MY FINGERS ARE TOO BIG FOR THIS &#&*!@# thing.” Did I mention some of the employees were ex sailors?
In addition, make sure the user can see the screen – is it visible in sunlight? Do they need to type on the device and cannot because of the size of the device? Also keep in mind that the device my need to be ruggedized or have an otter box provided.
Smartphones, Tablets or Laptops: The Summary
One you gather all your criteria, it’s a good idea to have details in a grid – this will give you a picture of employee’s real needs. As a rule of thumb, if a user has to collect and enter a lot of information, a smartphone is not the way to go. Users who mainly respond with short answers like “Yup”, “I approve”, or “No thanks” – a certain smartphone makes a lot of sense. Like the Galaxy S4 which has the larger screen.
Keep in mind sometimes there is a valid case for having any combination of laptop, tablet or smartphone. Of our choices the laptop will always be best for heavy information gathering where a lot of typing is involved and certain smartphones are good for short text and emails.
There are also some best of both worlds hybrid options like the MS Surface Pro or the Lenovo Thinkpad. If you’re still unsure, don’t force your decision. Allow your users to test a few devices and inform you which they like the best and why.
Reynaldo Lyles is a recognized expert in mobility thought leadership, new industry standards in Mobile Device Management and compliance, and the Mobility Practice Leader for Renodis.
April 26, 2013 12:27 PM
Posted by: Renodis
CIOs and IT leaders have a tough job. They need to deliver results, hire the right talent, make sure they have the right technology in place, and be relevant to the business. The worst thing in the world is when an IT organization has to use key resources and time to deal with a telecom issue that dramatically impacts their business.
Telecom is not perfect. In fact it can be chaotic. Most IT leaders don’t even like dealing with telecom. Unfortunately telecom problems will happen, issues will arise, and your business will be impacted. There are many things in the back of the IT leader’s mind, but some things are more dramatic than others. Let’s take a look at 5 Telecom Nightmares that Keep IT Leaders Up at Night:
5 Telecom Nightmares that Keep IT Leaders Up at Night – #1: Carrier Service Outages
Outages cause major disruption. It impacts customers, results in lost business and may lead to poor reputation. Service outages also result in critical IT resources spending valuable time trying to resolve these issues. Whether they are handling help desk calls or working with the carriers to get the issue resolved quickly, they are not spending time on more important IT initiatives.
As a preventative measure, it is important to have a disaster recovery plan in place or a backup connection. Make sure to do your due diligence to find the right provider who has a proven track record for uptime and getting issues resolved quickly.
5 Telecom Nightmares that Keep IT Leaders Up at Night – #2: Lost or Stolen Mobile Devices
The growth of mobility has spurred great opportunity for businesses, but it has also created potential nightmares for IT leaders. Critical customer data or company data can easily be lost if a mobile device is misplaced or stolen. BYOD has created many risks for companies who allow employees to bring their own mobile device (iPads, iPhones, tablets, etc).
Not having the right security policy or mobile device management platform in place creates risks to your organization, and a nightmare for IT leaders.
5 Telecom Nightmares that Keep IT Leaders Up at Night – #3: Fiber or Line Cut
Some things you can control, some things you can’t. When a backhoe goes through your fiber line, the only thing you can do is hope the problem is solved quickly and efficiently with little impact to the business (if that is even possible). Just as a carrier service outage causes a major disruption, so does a fiber line cut. Most companies have a plan in place to deal with this type of situation. Some companies do not, and they pay the price.
5 Telecom Nightmares that Keep IT Leaders Up at Night – #4: Data Security Breach
Imagine this scenario. An employee was let go or leaves your company and in the process takes critical company data with them. Whether an employee steals data, your network is attacked by a virus or malware, or someone hacks into your system – the nightmare is made real for the IT leader. Having a secure network and the right platforms/processes in place to protect your company data will mitigate (not eliminate) the risk of your data being breached.
5 Telecom Nightmares that Keep IT Leaders Up at Night – #5: Carrier Implementation
So you feel good about that three year contract you just signed with your carrier. You have confidence in their ability to deliver and they tell you time and time again everything will be “fine”. Think again.
Now it’s implementation time. You may feel like you did your due diligence in selecting the right carrier and technology, but if you 1) don’t have the right resources and plan in place to manage the implementation process and; 2) have not identified the risks involved in the implementation, you are setting yourself and your company up for failure.
Let’s face it, dealing with carriers is not fun and implementations do go bad. Having the right plan in place, resources who know how to work with carriers, escalate issues, and have the resources needed to solve problems when they arise will help mitigate implementation nightmares.
Preventative Measures and Expert Partners Help IT Leaders Sleep Soundly
The fallout from these types of real-life nightmares result in lost customers, poor reputations, lost revenues, lost confidence, and sometimes… lost jobs.
But having the right disaster recovery plan in place, the right technology to protect and secure data and mobile devices, and a plan to implement carrier services will help mitigate these risks in the future and more importantly – you will get more sleep at night! Not sure where to start with preventative action? No need to procrastinate. Enlist the help of a trusted partner to get you started in the right direction.
April 22, 2013 1:16 PM
Posted by: Renodis
In today’s fast paced world we have limited time for absorbing information. The same is true for our social networks. Want to keep up with the latest IT trends and initiatives? Why not hear it straight from the CIO on Twitter!
The following is our list of the Top 5 Midwest CIOs to Follow on Twitter. Criteria included Klout score, number of followers, amount of outreach, other social channels/blogs, and discussions.
Without further ado, Renodis presents … The Top 5 Midwest CIOs to Follow on Twitter.
The Top 5 Midwest CIOs to Follow on Twitter: #5 – Brian Miller, Davenport University
Twitter handle: @suydam
Why do we like his tweets?
In addition to thoughtful commentary on IT, Mr. Miller is a self-professed web geek which accounts for all kinds of cool tweets on comet watching, drupal, and instagramming. On top of CIO responsibilities, Mr. Miller is also City Commissioner of East Grand Rapids, Michigan.
The Top 5 Midwest CIOs to Follow on Twitter: #4 – Bruce Maas, University of Wisconsin
Twitter handle: @uwmadisonCIO
Why do we like his tweets?
Mr. Maas offers a wealth of information about IT leadership, strategy and innovation through links to articles, videos, and opinion pieces. His Twitter background in two words? Professionally rockin’.
The Top 5 Midwest CIOs to Follow on Twitter: #3 – Joe Topinka, Red Wing Shoes
Twitter handle: @ciomentors
Why do we like his tweets?
Many talk. Mr. Topinka practices. Well liked for collaborative styles of thinking, he embodies the disciplines of a transformational IT leader, embracing innovation and new ideas. Expect forward thinking, educational tweets. Also, check out his blog at http://ciomentor.blogspot.com.
The Top 5 Midwest CIOs to Follow on Twitter: #2 – Will Weider, Ministry Health Care
Twitter handle: @CandidCIO
Why do we like his tweets?
Mr. Weider’s communication style is honest and real, intermixing a highly adept understanding of all things technology leadership with music, entertainment and volunteerism. It’s no wonder this CIO has almost 5k followers. His blog at http://candidcio.com is a must read.
The Top 5 Midwest CIOs to Follow on Twitter: #1 – Ben Grey, Oak Lawn-Hometown District 123
Twitter handle: @bengrey
Why do we like his tweets?
Can we say Twitter communication harmony? Mr. Grey represents the ideal when it comes to responding to all @ tweets and comments which makes him approachable and professional. Being a photo hobbyist, you can always expect an inspirational image or cute photo opp. His blog is also a great read at http://bengrey.com/blog.
Okay, what’s the next step? We encourage you to connect with these innovative, forward thinking CIOs to keep up with the latest top IT initiatives and trends.
Have a suggestion for a CIO we should add? Comment below!