CIO Symmetry

December 11, 2009  3:02 PM

Paying the price for server uptime

Karen Guglielmo Karen Guglielmo Profile: Karen Guglielmo

What’s the price for server uptime? How much would you be willing to invest to maintain five 9s of availability on your mission-critical line of business applications? With limited budgets and resources, many midmarket companies are investing an average of $20,000 in fault-tolerant servers and high-availability clusters to maximize uptime, according to a recent survey by the Information Technology Intelligence Corp (ITIC). Continued »

December 4, 2009  3:24 PM

What’s going on in IT as the CIO role changes?

Kristen Caretta Kristen Caretta Profile: Kristen Caretta

As the role of the CIO evolves to include more of the business and strategic decision making and less of some of the techy details, the CIO may be missing what’s going on across IT in some situations. But is that a bad thing? Continued »

November 20, 2009  4:21 PM’s Chatter: A collaboration tool worth talking about

Kristen Caretta Kristen Caretta Profile: Kristen Caretta has announced that it has developed a collaboration platform that brings social networking into the enterprise — Salesforce Chatter. And for the more than 60,000 customers, Chatter should be something to talk about. Continued »

November 19, 2009  7:54 PM

Experts: Role-based access to apps can improve productivity, training

Karen Guglielmo Karen Guglielmo Profile: Karen Guglielmo

The hardest part of implementing business process management (BPM), ERP or even customer relationship management (CRM) can be training users to do their jobs using the new tool. To trim that learning curve and improve productivity with the new software, some vendors are offering role-based access or persona-based interface design.
Continued »

November 13, 2009  2:54 PM

What is transparency, and how can Agile practices help?

Karen Guglielmo Karen Guglielmo Profile: Karen Guglielmo

As I was interviewing experts and practitioners this week on the uses of Agile practices, the term transparency kept popping up in comments about the benefits of using this type of software development methodology. So I started thinking: What is transparency, and how does Agile help achieve it?

Transparency is about openness and accountability in all areas of the business. In today’s economy, transparency is more important than ever, as companies are forced to strictly manage costs and resource utilization. And for midmarket companies that have smaller budgets and fewer resources to complete projects, using Agile practices to effectively develop and deliver software can help with transparency. It’s even known as agile transparency. Continued »

November 6, 2009  2:21 PM

Droid does, but will IT support it?

Kristen Caretta Kristen Caretta Profile: Kristen Caretta

Verizon’s first Android phones, the Droid Eris by HTC and Motorola Droid, are being released today. The commercials highlight a string of new features not currently available on some other (iPhone!) phones (“Everything iDon’t Droid does“).

Although this new generation of smartphones seems to be a tech geek’s dream, IT might actually be most resistant to new technology when it will impact the business. IT has to decide early on if it’s going to support yet another new smartphone. The BlackBerry was once the standard, and RIM paid a lot of extra attention to enterprise IT support capabilities. IT spent a lot of time getting applications to work on BlackBerry, only to be faced with the iPhone a few years down the road.

Continued »

October 29, 2009  6:57 PM

2009 IT Geek Halloween costume ideas

Kristen Caretta Kristen Caretta Profile: Kristen Caretta

Another year, another list of truly geeky Halloween costume ideas that say IT 2009 all the way. (Eye rolls, please!) Continued »

October 23, 2009  2:56 PM

What will net neutrality mean for SMBs?

Kristen Caretta Kristen Caretta Profile: Kristen Caretta

After five long years of debate, lobbying and political posturing, the FCC finally voted yesterday to begin crafting net neutrality rules. With differing opinions across the board as to what this means to the Internet, privacy and the businesses affected — the question is, what does this mean for you?

The proposed rules would restrict how broadband providers such as Verizon and Comcast manage their networks, so that users could send and receive any legal or legitimate content over the Internet without worrying whether it’s going to be blocked or slowed down by the service provider. Comcast, for instance, actively interfered with file sharing online, controlling what kind of traffic and data could use its bandwidth and giving priority to some types of content and traffic while slowing down other traffic. Continued »

October 16, 2009  1:47 PM

Pervasive BI scenarios, from search technology to the cloud

Christina Torode Christina Torode Profile: Christina Torode

Whenever I go to a show related to business intelligence or speak with an expert in the field of BI, there are endless opinions on how to get more out of BI and get that data out to more users. One answer that keeps coming up is search technology; another is cloud computing.

Back in June at BI vendor Information Builders’ user show, many attendees spoke of the benefits of marrying search technology and business intelligence. At the time, the Royal Bank of Canada was beginning to look at search technology to mine unstructured data in dead repositories. The 70,000-plus-employee company has unstructured data all over its enterprise, but the main target for now is archived enterprise content management repositories. Continued »

October 9, 2009  2:10 PM

The challenge of managing risk when IT budgets tighten

Linda Tucci Linda Tucci Profile: Linda Tucci

I see an interesting sea change when it comes to risk: Thanks to the recession, as IT risk management is constrained by tightening IT budgets, the risk of doing business goes up.

As part of my security, compliance and disaster recovery coverage this year, I’ve listened to a lot of experts talk about the how-tos of risk management, such as, how CIOs need to stop taking a checklist approach to regulatory mandates and forge a risk-based strategy for compliance. Or how security officers still taking a buy-another-gadget approach to security will lose their jobs if they don’t focus on risk management. All this sounds good, as it implies that a rational scrutiny of risk can save companies money by focusing the available dollars on the most likely scenarios. But the reality is much worse. Continued »

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: