1. Articles from CIO.com

    cio.com

  2. 385-408 of 435 « 1 2 ... 14 15 16 17 18 19 »
    1. 4 ways businesses can close the legacy tech skills gap

      As older IT professionals age out of the workforce, companies need to ensure they have the right knowledge and skills to keep their legacy tech running smoothly. Changing that perception requires companies to recruit young technology pros through culture, integration with new technologies and premium pay for talent that learns these skills, and through developing knowledge transfer programs that can help seasoned, experienced IT pros pass their knowledge down to the next generation.

      Read Full Article
    2. How digital transformation is disrupting IT outsourcing

      Digital transformation is the business goal du jour. And while the increased adoption of social, mobile, analytics, cloud, autonomics, robotics and Internet of Things technologies is creating tremendous opportunities for the enterprise, it’s also introducing new risk. Most notably, these emerging technologies are impacting on how IT organizations interact with their IT service providers. 

      Read Full Article
    3. How to do software rationalization right

      From a high-level perspective IT budgets have two parts: maintenance and strategic initiatives. Maintenance tends to grow at the expense of strategic initiatives and, left unchecked, ultimately stifles innovation. In mid to large IT organizations, this has resulted in the emergence of Application Portfolio Management or APM. APM is a disciplined approach to aligning enterprise applications to maximize business value while minimizing lifecycle ownership costs.

      Read Full Article
    4. What will the CISOs of 2020 look like?

      Ever since its inception in the late 1990s, the CISO job has tended to be a very technical job. The CISO would likely report to the CIO and have a varied background as a system or network administrator, or perhaps as a security analyst in a security operations center (SOC). Almost all CISOs were male, with either experience in computer science or perhaps as a senior manager in the military.

      Read Full Article
    5. CIOs must collaborate with a new ‘digital champion’ – the CEO

      It's well-established that some CIOs are ceding control of certain IT assets, as CMOs and other executives purchase technologies to accelerate growth. But CEOs running companies conducting digital transformations are also spending more on technology that drives innovation, according to new research from PwC. For CIOs, that means working with all of their fellow C-suite stakeholders to demonstrate their value to the business. Those who don’t risk marginalization.

       

      Read Full Article
    6. Gartner’s top 10 emerging trends

      The No. 1 problem, or trend, facing IT departments today is nonstop demand, according to Gartner. As more devices connect to the Internet, the need for more computing capability, storage and networking is increasing at a rapid rate. For instance, 39 million terabytes of storage is currently deployed globally; by 2019, that figure will more than double to 89 million terabytes.

      Read Full Article
    7. Google, NASA using quantum computing to push A.I., machine learning

      Google and NASA are continuing to test quantum computers and this week entered into a new agreement to work with a series of updated systems. D-Wave Systems, a quantum computing company based in Burnaby, British Columbia, announced this week that it had signed a deal to install a succession of D-Wave systems at NASA’s Ames Research Center in Moffett Field, California. NASA and Google on Wednesday also confirmed the deal.

      Read Full Article
    8. How Applebee's uses gamification to retain staff, boost sales

      Retaining staff and preventing constant turnover are two of the most significant challenges in the restaurant business. For the second largest franchisee of Applebee's restaurants, turnover was a costly problem. At one point, the franchisee experienced 120 percent annual turnover, and it cost $400 to $10,000 to replace individual employees, depending on seniority. The franchisee also didn't have any sort of modern rewards and recognition program to motivate its largely millennial employee base.

      Read Full Article
    9. Developers find themselves in hackers’ crosshairs

      Attackers have long targeted application vulnerabilities in order to breach systems and steal data, but recently they’ve been skipping a step and going directly after the tools developers use to actually build those applications. Consider the news that broke earlier this year that entailed how the CIA allegedly attempted to compromise Apple’s development software Xcode.

      Read Full Article
    10. Companies need to hire IT pros – fast

      Companies will continue to focus on IT hiring, according to a survey of human resources professionals and hiring managers in Chicago and south Florida. The study was conducted between July 21, 2015 and August 5, 2015 by Richard Curtin at the University of Michigan at Ann Arbor and Brilliant, a staffing firm that worked with Curtin to collect information on current hiring trends in IT as well as accounting and finance.

      Read Full Article
    11. CIO seeks to build the ‘killer app’ for logistics

      It didn't take long for Tim Kutz to shake things up at Echo Global Logistics. Within a month of joining the freight broker as CIO in May, he moved the IT managers out of their offices and into an open seating arrangement. The move was as much a mind game as it was a practical solution to foster better collaboration. Kutz, who typically arrives at the company's Chicago office at 6:30 a.m. and doesn't leave until 6:30 p.m., wanted his colleagues to see his work ethic.

      Read Full Article
    12. Hack iOS 9 and get $1 million, cybersecurity firm says

      Zerodium, an exploit acquisition company, promises to pay $1 million to researchers who can provide it with an "exclusive, browser-based, and untethered jailbreak for the latest Apple iOS 9 operating system and devices." Zerodium extensively analyzes and documents all acquired vulnerability research and provides it, along with protective measures and security recommendations, to its clients as part of the Zerodium Security Research Feed (Z-SRF).

      Read Full Article
    13. How to fight denial of service - choose your battles, save your dollars

      Denial-of-service (DoS) attacks are probably the scariest online attack a business faces. Not because of the amount of damage done (data breaches are typically much more costly), but because there is so little you can do about them. Earlier this year, I surveyed my collegues to find out what they considered the number one critical security topic. DoS was the unanimous winner.

      Read Full Article
    14. Why enterprise digital transformation efforts stall

      Enterprises are likely to hit a roadblock after the initial stage of digital adoption, according to a recent survey by outsourcing consultancy and research firm Everest Group. In fact, 43 percent of organizations are going through what Everest has dubbed the “digital trough,” according to a survey of 120 business and IT leaders at North American companies that have embarked on significant digital adoption programs.

      Read Full Article
    15. Where does security fit in bi-modal IT departments?

      When restructuring an IT department, the recent trend has been to look at possibly breaking it into two factions. One group that handles the daily tasks by putting out fires, and one that looks ahead in trying to create a new landscape that is immune to those fires. The bi-modal idea has its benefits and its pitfalls but the determination seems to come down to the size of the enterprise. In the mid to smaller companies, there is not the luxury of splitting the security group out into subgroups. In the bigger companies the question becomes where do the security ...

      Read Full Article
    16. Cognitive technology and the automation of everything

      The automation of knowledge work has the potential to drastically change business by creating a new class of “digital labor." Automating key aspects of highly skilled knowledge work is primed to become one of the most disruptive forces since the Industrial Revolution. And the cost saving opportunity that cognitive-powered RPA (Robotic Process Automation) introduces can be enormous — in some cases cutting up to 75 percent. By not having to constantly retrain an entire workforce or hire more people, a company frees up assets.

      Read Full Article
    17. How to optimize requirements scope when purchasing enterprise software

      Deciding what requirements should be included when purchasing enterprise software can be tricky. New enterprise software project risks are significantly reduced when the scope of the requirements are well matched to potential software on the market. To achieve that match, it is sometimes necessary to adjust the scope of the requirements.With appropriate communication, employee expectations of the new software are well matched to what the software actually delivers, which also improves user buy-in.

      Read Full Article
    18. What makes a DevOps unicorn?

      An unknown person once said, "Sometimes the only thing that people see is what you did, when in fact they should be looking at why you did it." This is a critical perspective when it comes to understanding DevOps unicorns such as Netflix, Etsy, Amazon, Facebook, Google, LinkedIn, ING group and a handful of other companies that are known as leaders in their use of optimized DevOps practices, and organizational and business outcomes.

      Read Full Article
    19. Intel's latest IoT move heats up the race for low-power networks

      While mobile operators often claim bragging rights to the fastest smartphone connections, another rivalry is heating up around networks that aren't fast at all: Their claim to fame is that they don't suck up power.On Friday, Intel said it would work with cellular heavyweights Ericsson and Nokia to commercialize NB-LTE (Narrow-Band LTE), a variant of the latest cellular technology that uses a small amount of radio spectrum to efficiently carry small amounts of data.

      Read Full Article
    20. Clouds ahead: What an IT career will look like five years out

      IT pros who don't take the time to lift their heads and assess the likely IT landscape five years out may be asking for career trouble. Because one fact is clear: Organizations of all stripes are increasingly moving IT infrastructure to the cloud. In fact, most IT pros who've pulled all- nighters, swapping in hard drives or upgrading systems while co-workers slept, probably won't recognize their offices' IT architecture - or the lack thereof - in five years.

      Read Full Article
    21. Scrum’s co-creator talks about the framework’s transformational effect

      Jeff Sutherland is one of the inventors of the scrum development process. He also created, along with Alistair Cockburn, Ken Schwaber and others, the Agile Manifesto in 2001. He's currently CEO of Scrum, Inc., and a speaker, author and thought leader in software development. Sutherland sat down with CIO.com's Sharon Florentine at Agile Alliance 2015 to talk about the past, present and future of scrum and agile.

      Read Full Article
    385-408 of 435 « 1 2 ... 14 15 16 17 18 19 »