IT vendor selection and management
Successful IT vendor selection and management can help you control costs and mitigate risk in IT projects. Weighing the pros and cons of various vendors and weighing them against one another to make the best choice is no easy task. Get guidance with IT vendor selection and management news, tips and other resources in this section.
Top Stories
-
Tip
14 Jun 2022
How to create a proof of concept with 6 free templates
What is a proof of concept and how does it help an organization? Here we dive into the importance of writing a POC and provide a list of free templates to help get you started. Continue Reading
-
News
24 Jun 2021
House Judiciary Committee advances 6 antitrust reform bills
Six antitrust reform bills made it through the House Judiciary Committee review and will now be considered by the House of Representatives. Continue Reading
-
Blog Post
09 Oct 2009
The challenge of managing risk when IT budgets tighten
I see an interesting sea change when it comes to risk: Thanks to the recession, as IT risk management is constrained by tightening IT budgets, the risk of doing business goes up. As part of my ... Continue Reading
-
Tip
08 Oct 2009
How to decide if changing technology vendors is worth the time, risk
The cost savings offered by a second-tier vendor may or may not be worth the risk and expense of migration. Here's how to decide when to make a switch. Continue Reading
-
Tip
06 Oct 2009
Threat management for information systems relies on categorization
Every information system faces threats, but not all threats should be treated equally. ISO 27005 offers a guide on how to categorize threats to your organization. Continue Reading
-
News
06 Oct 2009
GPS devices, geolocation data create privacy, security risks
Emerging technologies that allow users to broadcast geographic locations raise many issues for companies, CIOs, while legislatures and the FTC consider legal aspects. Continue Reading
-
News
06 Oct 2009
Software vendor evaluation criteria: Sample scorecard templates for IT projects
Need a hand in evaluating prospective vendors or managing your current crop? Here's a sampling of software vendor scorecards and requirements to help you create your own. Continue Reading
-
Blog Post
05 Oct 2009
CIO weekly wrap-up: CIO mistakes, qualities of a good leader and ITIL
In a few hours, I'll be bound for Chicago to learn more about IT services and sourcing, but don't think I would leave you without your weekly wrap-up of CIO content! Check out the latest pieces to ... Continue Reading
-
Tip
01 Oct 2009
HIPAA-covered entities' first step should be a quality assurance plan
HIPAA-covered entities must leverage or install a good QA team, an effort that should be driven from the top down and be part of the strategic plan of the technology organization. Continue Reading
-
Blog Post
24 Sep 2009
How Google and Yahoo improved data center energy efficiency
Running large data centers is expensive and getting worse. No one knows that more than Google and Yahoo. At a panel on green data centers at MIT’s Emerging Technologies Conference this week, ... Continue Reading
-
Blog Post
21 Sep 2009
CIO weekly wrap-up: Service portfolio management, ITSM, email scandal
Good afternoon! This past week, SearchCIO.com looked at the importance of service portfolio management and culture management as part of ITSM and ITIL implementations. We also took a look at an ... Continue Reading
-
Blog Post
18 Sep 2009
Three ways to reach out to women in IT: Mentor, advocate, encourage
A dinner this week on women in IT focused on midlevel women in technology and their challenges in getting ahead, given their frequently high family responsibilities and their own perceptions ... Continue Reading
-
Tip
15 Sep 2009
10 must-have steps for an effective SMB information security program
No information security program would be complete without these security tips from the NIST, which has compiled advice just as security threats to smaller businesses are on the rise. Continue Reading
-
Blog Post
28 Aug 2009
IT services outsourcing: Do you have an ‘India-plus-one’ strategy?
For quite awhile, many U.S. companies have focused their IT services outsourcing strategies on India due to its market share, low cost of labor and robust vendor market. But now, some companies are ... Continue Reading
-
Blog Post
24 Aug 2009
CIO weekly wrap-up: Pros and cons of outsourcing, ITIL framework, PPM
Good morning! This past week, SearchCIO.com looked into the pros and cons of outsourcing in several countries in Asia, put out our latest FAQ on the ITIL framework and put your project and ... Continue Reading
-
Blog Post
21 Aug 2009
Beware of rising server room temperatures
When you’re cranking the A/C during these final hot days of summer, don’t forget about data center cooling as well. The consequences for not monitoring server room temperatures could burn you well ... Continue Reading
-
News
18 Aug 2009
Pros and cons of IT outsourcing in popular Asian countries
The benefits and challenges of IT outsourcing in India, China, the Philippines and Vietnam range from pricing to intellectual property barriers. Learn more here. Continue Reading
-
Blog Post
10 Aug 2009
CIO weekly wrap-up: IT outsourcing, PPM vs. SharePoint, cloud risks
Welcome back from the weekend! Ease yourself into your Monday morning by checking out the latest content from SearchCIO.com on IT outsourcing, using project and portfolio management (PPM) software ... Continue Reading
-
Blog Post
03 Aug 2009
CIO weekly wrap-up: Leveraging talent, change management, cloud trends
Good afternoon! This past week on SearchCIO.com, we highlighted tips for leveraging employee talent, looked at ways to avoid IT project failures using change management strategies, and examined ... Continue Reading
-
Blog Post
31 Jul 2009
A disaster recovery plan meets cloud computing
David Shacochis, vice president, research and development at IT provider Savvis Inc., reminded me the other day that there is a big difference between a disaster recovery (DR) plan and business ... Continue Reading
-
Blog Post
23 Jul 2009
How will IT outsourcing play out in companies’ recovery plans?
As IT outsourcing is one of the core areas I cover for SearchCIO.com, I am, of course, interested in how both offshoring and onshoring will fare in the coming months. According to some ... Continue Reading
-
Blog Post
17 Jul 2009
With PPM software, don't always throw in the kitchen sink
Project and portfolio management (PPM) software is definitely not overlooked in the midmarket. According to a recent SearchCIO-Midmarket.com survey, 17% use some form of PPM software. But how many ... Continue Reading
-
Blog Post
17 Jul 2009
What is transparency, and how is it relevant to IT?
We’ve all heard about Obama’s promise for government transparency, but what about IT transparency? First, what is transparency? Transparency is basically defined as openness and accountability in ... Continue Reading
-
Blog Post
08 Jul 2009
Is Google Chrome OS a turning point or yawner?
Nothing fuels the tech press like wars. So I have no doubt that we will see an endless string of reports from the battlefield over the next many months on the struggle between Google and Microsoft ... Continue Reading
-
Tip
02 Jul 2009
Even with a PPM solution, IT project and portfolio challenges remain
A PPM solution can help you allocate resources among IT projects and calculate ROI, but it's no panacea for organizational issues. Here's why. Continue Reading
-
Blog Post
25 Jun 2009
Satyam scandal: Has it affected your IT outsourcing and offshoring?
For those keeping an eye on IT outsourcing and offshoring, there were a couple of noteworthy pieces of news this week regarding the artist previously known as Satyam Computer Services Ltd. First, ... Continue Reading
-
Feature
22 Jun 2009
Chapter excerpt: Decision-making processes and IT governance
Find out how sound decision-making processes form the foundation of IT governance policies by allocating decision rights and accountability. Continue Reading
-
News
19 Jun 2009
Twitter security risks, popularity spark regulatory concerns
Twitter can be used for social good, business and journalism, but the potential for exploitation by cybercriminals and noncompliance with regulatory requirements is real and growing. Continue Reading
-
Blog Post
15 Jun 2009
CIO weekly wrap-up: BI strategy, PPM software, compliance in the cloud
This past week, SearchCIO.com looked at developing a business intelligence (BI) strategy, implementing project and portfolio management software, practicing innovation in a time of economic crisis, ... Continue Reading
-
Blog Post
12 Jun 2009
Five key questions about cloud computing
It seems every time I ask someone what they think about cloud computing, I’m asked five or more questions in return: Isn’t what cloud providers offer pretty cookie cutter? Translate that as, “They ... Continue Reading
-
Blog Post
11 Jun 2009
PPM projects: If portfolio management works, why is it so rare?
My story this week on the University of Utah's project and portfolio management (PPM) program stood out from other PPM pieces I've reported because, in this case, the portfolio piece of the program ... Continue Reading
-
Tip
09 Jun 2009
How AML compliance applies to remote deposit capture
Financial institutions rushing to deploy remote deposit capture (RDC) need to consider how the Bank Secrecy Act and anti-money laundering regulations apply to the technology. In this tip, Dan Fisher explains what measures institutions need to take to ensure compliance with BSA/AML laws in their RDC implementations. Continue Reading
-
Blog Post
02 Jun 2009
Don't be like GM: How a BPM strategy can help you avoid bankruptcy
Midmarket CIOs who think of a business process management (BPM) strategy in its basic form as a tool for putting processes around purchase orders, claims or employee onboarding and offboarding ... Continue Reading
-
Blog Post
28 May 2009
Twitter for business: A help or a hassle at IT conferences?
I'm still reflecting on last week's MIT Sloan CIO Symposium, where my colleagues and I gathered a lot of good information on CIO leadership, IT outsourcing, health care, CIO innovation and more -- ... Continue Reading
-
Blog Post
22 May 2009
Why don’t connected healthcare information systems work?
In a perfect world, connected healthcare information systems would be easy to use, offer doctors a way to effectively communicate with their patients without any barriers or restrictions and give ... Continue Reading
-
Tip
19 May 2009
Why it may not be ideal for your lawyer to be your compliance officer
While lawyers bring a certain expertise to the table, business leaders need a broader range of technical, security and communications skills in their compliance officers. Continue Reading
-
Blog Post
08 May 2009
Open source cloud computing: The future midmarket sweet spot?
What happens when open source and cloud computing collide? Cost savings, flexibility and (at least one open source vendor hopes) midmarket CIOs checking it out. Open source CRM provider SugarCRM ... Continue Reading
-
Blog Post
07 May 2009
Adding a 'business downturn' clause to your telecom contracts
Telecom providers will do whatever it takes to keep your business, even in a business downturn. And that’s not just lip service. Did you know that you can insist on a “business downturn” contract ... Continue Reading
-
Blog Post
04 May 2009
CIO weekly wrap-up: Challenges of a state CIO, BPM, SOA and ROI
This past week, SearchCIO.com was all over business process management, from BPM and service-oriented architecture (SOA) and how they work together to how to find fast ROI using BPM. We also ... Continue Reading
-
Blog Post
22 Apr 2009
Oracle buys Sun: When strategic vendors go bye-bye
This decade has seen a lot of consolidation among both software and hardware vendors. Sun bought StorageTek, Sun bought MySQL. Oracle bought Sun, Oracle bought BEA (one of many midsized middleware ... Continue Reading
-
Blog Post
16 Apr 2009
Is cloud computing a platform or a stage?
Cloud computing is at that early stage where there’s much discussion of taxonomy: Is it infrastructure? Is it Software as a Service? Is it a platform? All well and good, but little discussed so far ... Continue Reading
-
Blog Post
30 Mar 2009
CIO weekly wrap-up: Private cloud, ID management, security compliance
Welcome back from the weekend! Here are the latest stories from SearchCIO.com, dealing with the private cloud, identity and access management, and some very newsy security standards for compliance ... Continue Reading
-
Blog Post
25 Mar 2009
IBM layoffs: India Business Machines Corp.?
The news today from The Wall Street Journal that IBM is expected to cut a large number of U.S. workers in its global services unit and move that work to IBM employees in India reminded me that IBM, ... Continue Reading
-
Blog Post
20 Mar 2009
Cost savings on IT contractors: How to get the best rates
I was talking to IQNavigator the other day. They have software that helps companies manage what they spend on contingent workforces, such as IT contractors, and on vendor services, among other ... Continue Reading
-
Blog Post
16 Mar 2009
CIO weekly wrap-up: BI strategy, sourcing contracts and IT governance
This past week, SearchCIO.com homed in on business intelligence strategy, IT transformation, cost reduction tips for your strategic sourcing contracts and IT governance in an economic recession. ... Continue Reading
-
Tip
11 Mar 2009
Cost reduction tips for your strategic sourcing contracts
CIOs should revisit their strategic sourcing contracts and work closely with their suppliers to analyze current spending and achieve maximum cost reductions. Continue Reading
-
Blog Post
20 Feb 2009
Qualities of a good leader: Avoid layoffs at all cost?
An article on our sister site, SearchCIO.com, this week highlighted the qualities of a good leader during a recession, culling advice from leadership experts and CIOs. The list includes qualities ... Continue Reading
-
News
18 Feb 2009
Eight qualities of a good leader during a recession
These qualities of a leader during a recession show how CIOs can guide their organization in tough times, making the right IT budget cuts and inspiring employees. Continue Reading
-
Blog Post
13 Feb 2009
IT centralization grows as approach to IT consolidation
Of interest to me this week: stories of how CIOs are approaching IT consolidation not just in the data center, but also in their organizations. It’s no surprise that flat or reduced budgets impel a ... Continue Reading
-
Blog Post
09 Feb 2009
CIO weekly wrap-up: SaaS contracts, vendor management, data protection
Welcome back, readers! This past week at SearchCIO.com, we covered desktop virtualization, Software as a Service (SaaS) contract negotiations, IT vendor management offices and data protection ... Continue Reading
-
Blog Post
06 Feb 2009
Desktop virtualization tradeoffs and benefits: What did I miss?
A couple of recent stories, "VDI vs. fat clients: The tradeoffs," and "Virtual desktops and virtualized applications: An FAQ for IT executives," caused a few readers to reach out to tell me I ... Continue Reading
-
Blog Post
30 Jan 2009
The Super Bowl and server virtualization: Don’t drop the ball!
Are you ready for some server virtualization? This year, the Super Bowl will be running on one of IBM's smallest systems, the BladeCenter S. The system will support security and credentialing for ... Continue Reading
-
Blog Post
26 Jan 2009
Hyper-V update: Yes, it works with Linux
The Hyper-V experiment continues. My three Server 2008 VMs are extremely stable -- no crashes at all, nine days continuous running. I made a number of restarts to address various upgrades and all ... Continue Reading
-
Blog Post
16 Jan 2009
Windows 7 migration: First thoughts
OK, there’s no getting around it. This year is going to be the Year of Reading Endless Speculation and Lightly Informed Commentary About Windows 7. Feature Bingo, Shipping Date Roulette – you’re ... Continue Reading
-
Blog Post
12 Jan 2009
CIO weekly wrap-up: 2009 IT trends, network access control, CPM and BI
Post-holidays, we're back in full swing here at SearchCIO.com. Here are our latest stories and briefings: Looking forward: Trends in IT management and budgeting for 2009 - Consider this your ... Continue Reading
-
Blog Post
19 Dec 2008
Vendor gifts: Holiday cheer or ethical dilemma?
Twas the night before deadline and all through the office, we worked with our heads down, appeasing our bosses. But what to my weary eyes should appear? The USPS delivery, bringing vendor-purchased ... Continue Reading
-
Blog Post
09 Dec 2008
Recent FBI vishing scam warning an old issue
Last Friday, the FBI issued a warning about a security vulnerability that could be used by cybercriminals to make vishing telephone scams. Vishing (combining phishing and voice) uses Voice over IP ... Continue Reading
-
Blog Post
08 Dec 2008
CIO weekly wrap-up: Cutting IT costs, virtualization and more
In case you missed it, we've had a very active discussion on FatWire's sex-site demo at a Boston Web 2.0 conference. Feel free to add your own views and, while you're at it, check out our stories ... Continue Reading
-
Blog Post
04 Dec 2008
Social networking sites, credit fears leading to new spam attacks
Symantec has released its MessageLabs Intelligence 2008 Annual Security Report, and social networking sites and the credit crisis are providing new platforms and fears upon which new spam attacks ... Continue Reading
-
Blog Post
01 Dec 2008
A top 10 list for how to be a successful CIO
The Society for Information Management recently asked a panel of CIOs to talk about the attributes of a successful CIO. For CIO Karan Sorensen, an emphasis on the greater good is a must --from ... Continue Reading
-
Blog Post
25 Nov 2008
SaaS integration easier said than done
Questions for you Software as a Service (SaaS) devotees about SaaS integration: Did your vendor give you enough information up front about the potential difficulties of integrating the SaaS ... Continue Reading
-
Blog Post
14 Nov 2008
The Web 2.0/social media revolution inches along
More evidence this week that the Web 2.0/social media revolution may be advancing, but it ain’t here yet: Instant messaging hasn’t become the preferred method of communication among IT staff; nor ... Continue Reading
-
Blog Post
06 Nov 2008
Google Chrome: How secure is your information?
Google is growing. From Chrome to G1, it’s not just for searching anymore. As the Google giant is creating new breeds of consumers (“cross-consumers,” I call them -- spanning email, news, mobile ... Continue Reading
-
Blog Post
31 Oct 2008
Gmail apps: Text your contacts
Google Gmail users now have the option to send text messages to mobile phones. The experimental app, found in Gmail Labs, was made available to all users Thursday night. The feature is very similar ... Continue Reading
-
Blog Post
31 Oct 2008
Tech warriors on the offensive
Downturn, shmownturn. Your peers at technology companies apparently don't need a global recession to get their juices flowing. A new survey of 151 U.S. technology company executives by Deloitte ... Continue Reading
-
Blog Post
30 Oct 2008
Halloween costumes for techies
In honor of Halloween, Kristen Caretta, associate editor of SearchCIO-Midmarket.com, and I decided to get a bit silly and dream up our top 10 Halloween costumes for the IT set. Wear these to your ... Continue Reading
-
Blog Post
27 Oct 2008
Information technology ‘down but not out’ this time around?
Forrester Chairman and CEO George Colony has a reassuring blog out this morning on the impact of a global recession on tech. His take? Technology had its Great Depression in 2001-2003, and this ... Continue Reading
-
Blog Post
24 Oct 2008
Sunrise, sunset: Sun Microsystems’ Bechtolsheim decamps to take on Cisco
Sun Microsystems co-founder, early Google backer and computer engineer extraordinaire Andreas von Bechtolsheim is leaving his job as chief architect at Sun to apply his considerable talents to ... Continue Reading
-
Blog Post
17 Oct 2008
Top 10 strategic IT technologies: Boo!
Virtualization -- the ghost in the machine -- won top place in Gartner's annual list of IT technologies that will likely impact your business in the next three years. Cloud computing came in No. 2. ... Continue Reading
-
Blog Post
15 Oct 2008
How Microsoft takes stock of your online experience
At the Web Experience Forum in Boston yesterday, Mark Hydar, principal group manager for global quality of service (QoS) initiatives for Microsoft, discussed "Microsoft Live: Reinventing the MS ... Continue Reading
-
Blog Post
02 Oct 2008
Three men arraigned in alleged IT kickback scheme
Three Boston-area men have been arraigned in connection with allegedly setting up kickbacks from a vendor in exchange for securing computer software and service contracts for Partners Healthcare. ... Continue Reading
-
Blog Post
29 Sep 2008
I’m a PC, and I don’t necessarily like Microsoft
After the annoyingly strange Jerry Seinfeld/Bill Gates commercials promoting Microsoft, a new batch of adverts surfaced featuring the slogan “I’m a PC.” It goes something like this: Microsoft ... Continue Reading
-
Blog Post
25 Sep 2008
Work email: When it just can’t wait until morning
With the growing popularity of smartphones and business VPNs, it's getting tougher and tougher to let an email just sit in your inbox unread for any period of time - even in what are technically ... Continue Reading
-
Blog Post
25 Sep 2008
Are we all too busy?
Do your users pay attention to dialog box pop-ups? If you’re thinking, “yes, of course,” read on. A recent study by members of the psychology department at North Carolina State University shows ... Continue Reading
-
Blog Post
25 Sep 2008
A CIO by way of Jack Welch
I recently interviewed Carole Cotter, CIO of Lifespan Corp., a health care system affiliated with Brown Medical School in Providence. R.I. Cotter talked about how her IT department balances the ... Continue Reading
-
Blog Post
05 Sep 2008
Think like a hacker (and other World of Warcraft-inspired musings)
Yesterday, I attended Forrester's security forum in Boston. In one of the morning sessions, "Exploiting Online Games," Gary McGraw, chief technology officer at Cigital (and co-author of a book by ... Continue Reading
-
Blog Post
05 Sep 2008
Don't ignore internal security (and don't write passwords on Post-it's)
Last year 8% of the IT budget went towards security. This year? 10%. Khalid Kark, principal analyst at Forrester Research, Inc., presented security statistics at Forrester’s Security Forum 2008. ... Continue Reading
-
Tip
27 Aug 2008
How to perform a cost/benefit analysis: Build a model, not a number
CIO Niel Nickolaisen recommends doing a cost/benefit analysis based on building a working model, not numbers. Continue Reading
-
Blog Post
26 Aug 2008
Joe Biden: RIAA stooge
Joe Biden, huh? Talk about strike three. 2000: Democratic vice-presidential nominee Joe Lieberman “loses” election. Flash forward to 2008 and this stuffy jerk – who spent part of his career going ... Continue Reading
-
Blog Post
21 Aug 2008
Seinfeld vs. Justin Long? Please, let's get someone with some funny.
Can we all agree that Jerry Seinfeld was never the funny one? For all his quirks and humorous relationships, Jerry was always the straight man to his consistently hilarious compatriots. Good at ... Continue Reading
-
Blog Post
21 Aug 2008
Google Reader has my vote
You may have noticed the new feature on the Google homepage. It reads: “New! Read what Barack Obama and John McCain are reading with Google Reader.” Yes, now you too can see what Senator John ... Continue Reading
-
Blog Post
12 Aug 2008
Press releases as prose
I don’t doubt that writing a press release that catches the eye is a tough job. But this is just dumb: “Dear Zach, “Will Shakespeare sure didn’t have to wrestle with the issues IT managers’ face ... Continue Reading
-
Blog Post
11 Aug 2008
Take this, viruses!
From the "tools you can use" file, CNN.com has a video report today on protecting yourself from unsavory e-mail attachments. CNN's computer expert Ken Colburn is a big proponent of the web site ... Continue Reading
-
Blog Post
08 Aug 2008
Save the data! How safe is our personal information?
The search for the missing Registered Traveler laptop is finally over. The laptop, belonging to Verified Identity Pass Inc.(VIP), was reported missing from a locked office in the San Francisco ... Continue Reading
-
Blog Post
04 Aug 2008
Forrester: No room for cowboy culture in IT
Just like Toby Keith, I should have been a cowboy. Alas, I went into journalism and never did get the hang of a lasso. If you’re in IT, a new Forrester report says, you should let those cattle ... Continue Reading
-
Tip
04 Aug 2008
Database security: Who should have access?
The only users who should be allowed full access to any data store should be your system administrators. What about everybody else? Continue Reading
-
Blog Post
31 Jul 2008
Driving while surfing?
As if having a computer at the office and at home - with a BlackBerry to tide you over when you're not at either of those places - weren't enough, now comes the AutoNet Mobile, which transforms ... Continue Reading
-
Blog Post
24 Jul 2008
Weekly wrapup
I think the “things that tick us off” theme of this blog is rubbing off on one of our contributors. Just yesterday, The Real Niel gave us a killer column about how bad your business will look if ... Continue Reading
-
Blog Post
24 Jul 2008
Maybe I should just keep my money under a mattress?
There have been a lot of scary bank-related headlines the past couple of weeks, but I have to say that this one frightened me more than most: "Security flaws in online banking sites found to be ... Continue Reading
-
Blog Post
23 Jul 2008
Does it matter who CIOs report to?
Gather the typical left-brain, articulate, umm-less group of CIOs around a conference lunch table and, guaranteed, the talk will eventually turn to reporting relationships. You answer to whom? ... Continue Reading
-
Blog Post
21 Jul 2008
Fighting for a Vista rebate. Because somebody has to.
Some people suffer the insufferable for piece of mind and for the good of all of us who want to live safe, comfortable lives. The mysterious uncle_benji is one of those people. Ben, as I’ll call ... Continue Reading
-
Blog Post
21 Jul 2008
TomorrowNow is so yesterday
SAP AG sends word today that it's putting subsidiary TomorrowNow, which provides third-party support for Oracle and other applications, out of its misery. The German software maker said it will ... Continue Reading
-
Blog Post
21 Jul 2008
Big green HP scheme
With polar bears balancing on ice cubes in the Arctic Circle and gas prices skyrocketing, we are all looking to be a bit more ‘green’ in our everyday lifestyle choices. Right? Well, we’re trying. ... Continue Reading
-
Blog Post
16 Jul 2008
Who wants to be a CIO Millionaire?
How's this for a headline: "Meet the Millionaire CIOs." In a study of the filings of the 1,000 biggest U.S. companies and their compensation, 47 top technology executives were listed at the top ... Continue Reading
-
Blog Post
16 Jul 2008
San Francisco IT hack story looks a bit too much like Chinatown
What the hell is going on in San Francisco? It’s like a freaking detective novel out there all of a sudden. One of the city’s top IT guys has been accused of locking other administrators out of the ... Continue Reading
-
Blog Post
07 Jul 2008
Boston Globe: Cognos contract with state “raises ethical issues”
News flash: The Boston Globe reports today that a representative of Cognos ULC, the business intelligence software maker, improperly offered a Massachusetts state official a job in 2006 when the ... Continue Reading
-
Blog Post
29 Jun 2008
All Ears: Susan Cramm on ITopia
Earlier, I wrote about Susan Cramm, former CIO of Taco Bell turned "leadership" coach, talking about how IT and the business could -- should! -- function in 2015. Cramm was the keynote speaker at ... Continue Reading
-
Blog Post
24 Jun 2008
Playing the numbers
Enterprise search stinks: Who doesn’t like a survey that corroborates a pet peeve? Data out today from the nonprofit AIIM finds that 50% of business users believe their company’s internal search ... Continue Reading
-
Blog Post
24 Jun 2008
Title Town – it’s all in the stats
I don't look anything like a basketball player, or even the stereotypical fan. I'm 4'11". I prefer high heels and dresses to jerseys and sneakers. Even some of my closest friends said they didn't ... Continue Reading
-
Blog Post
12 Jun 2008
Calling FedEx out
Sometimes you hear something and think: “Hey, that can’t be true.” Take this statement from FedEx Corp. CIO Rob Carter at his Enterprise 2.0 Conference keynote this week. “There's also a cool new ... Continue Reading
-
Blog Post
23 May 2008
Sarah Lacy says Facebook doesn't need my best friend. He doesn't seem to care.
Sarah Lacy, author of Once You’re Lucky, Twice You’re Good: The Rebirth of Silicon Valley and the Rise of Web 2.0, has blogged about me blogging about her book. So I feel compelled to respond. ... Continue Reading
-
Blog Post
07 May 2008
Will a Chief Blogging Officer get a Golden Parachute?
Excellent little news blurb on HealthLeaders Media this morning: “Chief Blogging Officer title catching on with corporations.” Chief Blogging Officer. Ok, one more time: Chief Blogging Officer. ... Continue Reading