New Survey Reveals The Top Issue CIOs Overlook In The IT Industry (The Answer May Surprise You)

CIO, IT Industry

If you ask a CIO what is keeping him or her up at night, you will probably hear things like cyber security, cloud migrations, and shadow IT. Talent acquisition would likely not make even the top 10. And that may be a problem, because perhaps it should be causing some CIO insomnia. In fact, according to a recent survey commissioned by Sungard Availability Services*, 50% of the 276 respondents said they believe talent acquisition is overlooked in the IT industry. There are several reasons why CIOs might not be giving appropriate priority to talent acquisition. First, they might figure that bringing in new talent is simple and straightforward: “What’s the beef? If we need someone, we’ll hire s … Read more

Not Ready For Six Sigma? Try These 3 Steps First For Successful Business Transformation

business transformation process, six sigma

Six Sigma may seem excessive, yet you know you need to determine a new business transformation process to meet the demands of a digital marketplace and better respond to the the rapidly changing needs of customers today Before you dive in, consider a simple analogy. Have you ever opened up the package of a seemingly “easy to assemble” new toy for your child, and think to yourself, “This seems pretty easy. I see the picture on the box and there aren’t too many pieces. I don’t need the instructions.” However, when you get halfway through it, you realize that while you’ve been putting things in the right places, you’ve done so out of sequence. You have to disassemble the toy and start over, … Read more

How Frederick’s Of Hollywood Used Migration To The Cloud To Spice “IT” Up

migration to the cloud

When Frederick Mellinger founded Frederick's of Hollywood in 1946, he believed that incredible lingerie could make a woman feel beautiful from the inside out. Little did he know that a legend was born. Founded in Hollywood and based there today, Frederick’s of Hollywood is a multi-channel brand with 96 stores across the U.S., as well as a digital flagship, fredericks.com. In 2011, Frederick’s of Hollywood decided to migrate to the cloud to enhance the scalability, resiliency, and flexibility of its IT infrastructure while elevating the ability to address company-wide business objectives. The company was facing a myriad of challenges: a shifting retail landscape a change in their bus … Read more

When It Comes To The Cloud And Technology, CIOs Should Understand What Got You Here, Will Get You There

the cloud and technology

Marshall Goldsmith, an executive coach to the corporate elite, is the author of the very popular book called What Got You Here Won’t Get You There. And while the title may be true as it relates to your individual career path, I have news for C-suite executives everywhere: it is not true when it comes to adopting the cloud and technology. In fact, what got you here – to your current state of success – is precisely what will get you to the next level. The problem is, as CIOs and IT professionals, we sometimes allow ourselves to be pressured into acting contrary to what we know is the right thing to do. Here’s what happens. A CEO approaches a CIO and says (in a nutshell), “What’s our cloud stra … Read more

A Movement Is Needed To Improve Cyber Security For Medical Devices

cyber security

At the 2011 Black Hat cyber security conference, a diabetic man named Jerome Radcliffe showed how someone could hack into a wireless insulin pump. Medical devices are just the latest in a growing list of Internet of Things that are at risk for potential hacks. On the surface, it may seem almost foolish to worry that some stranger will want to control a person’s insulin dosage or shut off a pacemaker or manipulate health data, but we also wondered why anyone would want to hack into cloud storage to steal compromising photos of actresses or someone would stage a major attack on an entertainment company in retaliation for a movie. If something can be hacked, it will be hacked. If for no other … Read more

How To Understand Your Disaster Recovery Services Bill

disaster recovery services

I got my electric bill today and read the line “Total Current Charges” (which, when I think about it, is a terrible pun!). Did you ever flip the bill over to read what goes into those “current charges?” For instance, there’s the generation charge, transmission charge, carbon offset fee, energy efficiency fee, working capital fee, governments taxes and fees. There are even more factors that contribute to the bill, but that’s enough to make my point: when I pay for electricity, I’m paying for a lot more than just the kilowatts of energy necessary to light and heat my home. The same is true when it comes to disaster recovery services, but companies sometimes forget that fact. They want a back … Read more

The Top 5 Traits of Successful Digital Enterprises

digital enterprise

Ecommerce is expanding significantly, with U.S. online sales expected to grow from $263 billion in 2013 to $414 billion in 2018, a compound annual growth rate of 9.5 percent, according to Forrester research. This is pushing the need for businesses to continue to transform their business processes, technologies and even organizational structures, and to become “digital enterprises.” Digital enterprises are those organizations who integrate new technology and business models that engage digital customers at every point in the customer experience lifecycle. Now, it’s becoming essential that organizations embrace digital changes to stay competitive. “For businesses to be competitive durin … Read more

9 Cyber Security Buzzwords And Jargon Definitions We Can All Understand

cyber security buzzwords

Hybrid cloud. BYOD. Big Data. Internet of Things. These are terms that have become part of the daily lexicon, not only within the information technology (IT) and cyber security world but also in the main stream. Jargon is integral to IT. They make complicated terms more accessible to the non-technical person, even if they aren’t easier to understand. Buzzwords are commonplace in IT security, as well, but are they truly understood? As Frank Ohlhorst writes in Tech Republic, “it seems that IT security managers are giving too much power to terms and buzzwords, letting them dictate security best practices.” Ohlhorst goes on to point out that while BYOD is just an acronym that means, simply, Brin … Read more