Social Icons

Sunday, September 11, 2011


Blogs

Define Your Social Ecosystem

 |   One of the many interesting topics of discussion we get into in our Social Business Strategy workshops is around the social ecosystem. This is the name I have given the collection of business capabilities potentially enhanced by one or more social technologies.

Job Search: Which LinkedIn Connections Are Most Valuable

 |   IT director Henry Hirschel has identified three kinds of LinkedIn connections, and of the three, which one is the most helpful and responsive in a job search.

Spiceworks Spices Up Interactions Between IT Pros

 |   Spiceworks impacts the IT professional community, and its users influence the companies they work for, whether management is on board or not. That is the essence of the consumerization of IT.

Leaders Have to Learn the Job, Just Like Everyone Else

 |   Buy yourself a didgeridoo and blow into it. The consequent auditory experience will be less than euphonic (although it might be helpful anyway if you suffer from sleep apnea, not that this has anything to do with anything).

Apple Gets Cozy with SF Police

 |   Like a George Orwell novel, it's getting hard to distinguish between Apple private investigators and police officers.

T-Mobile, Sprint Sell Out BlackBerry Bold 99xx Online: Strong Sales or Just Short Stock?

 |   Both T-Mobile U.S.A. and Sprint temporarily sold out of RIM's new BlackBerry Bold 9900/9930 smartphone last week, but CIO.com's Al Sacco says the brief sellouts aren't really an accurate indicator of strong sales.

Doing Business in the Cloud [in Real Time]

 |   The rapid spread of social media is the latest expression of a trend toward massive real time connectivity that is picking up momentum week by week in spite of all the economic uncertainty. There seems to be a primal urge in the DNA of our species to be connected and communicate with each other.

August Employment Figures Show Job Growth for IT Industry

 |   Consulting/professional services is the best place to find IT jobs today.

Hands On Video: The Toshiba Portege R835

 |   Toshiba is going all thin and light on us with the Portege R835 model, its lightest ultraportable laptop at 3.2 pounds with an amazing eight hours of battery life and an unbeatable price.

Conquering The Technology/Marketing Divide

 |   The new "it" couple is the CIO and CMO. Why? In the digital world we live in today, which Forrester defines as the Age of the Customer, empowered buyers demand a new level of customer obsession.

Browse CIO Blogs

Cloud computing has emerged as one of the most significant game changers to hit the technology landscape in the past 20 years. With this massive expansion of the cloud, the perception of the IT organization is shifting from a utility player to a change agent. This eBook breaks down five ways progressive organizations are using cloud-based IT Management solutions to help drive innovation and become more strategic, including: adding visibility and analytics, speeding up time-to-value, lowering costs, improving prioritization, and providing a blueprint for future cloud deployments.
Read the white paper to see how IBM helped Citigroup deliver new services and enhancements to their 200 million customers faster.
There are 3 ways to modernize legacy applications: rewrite completely, acquire packaged solutions or migrate existing code. This paper explains why it's best to migrate and how IBM® Rational® software can help.
Accommodating specific lines of business can result in a hybrid ecosystem of applications and servers. The resulting complexity of this architecture makes for an environment that is costly to maintain and difficult to change when addressing new challenges.
This whitepaper will help you to define a mobile device passcode policy. Security managers must attempt to reconcile two opposing goals. They must: 1) create a passcode policy that is strong enough to protect the device if it is lost or stolen, while: 2) not annoying users with needless length or complexity.
This whitepaper, authored by The Radicati Group, looks at the key reasons organizations should consider moving to a cloud-based archiving solution. Email archiving solutions enable organizations to store, monitor, and collect electronic data exchanged by their users to comply with internal policies and regulations.
ATERNITY will showcase a 30-minute demo on how Fortune 500 companies are leveraging its award-winning FPI Platform to deliver a user-centric approach to Proactive IT Management.
For businesses to move forward and tap into the ever-expanding universe of Internet users and network-enabled devices, it's critical to learn how to make the transition to IPv6. Learn the critical steps your organization must take to make a seamless transition-and keep your business world connected.
Learn how IT teams can protect against spear phishing tactics. Harry Sverdlove, chief technology officer of Bit9 offers a frank discussion about spear phishing - the most common technique used in today's advanced attacks.
Learn how to build a solid business case for your migration to Red Hat Enterprise Linux so you can run leaner, innovate faster, be more flexible and own the New Now.
Social media isn't about you; it's about everything around you. As you consider how your customers want to communicate with you, social media is something that can't be ignored. But what should your strategy be? Is social media "just another channel?" What kind of a plan makes sense for your contact center and for your customers? Join our experts as they share their insight and research results.
Hardware tokens were a popular method of strong authentication in past years but the cumbersome provisioning and distribution tasks, high support requirements and replacement costs have limited their growth. The additional log-in steps that hardware tokens require and the resulting user frustrations have limited adoption and make them impractical for larger scale partner and customer applications.

No comments: