Wednesday, February 6, 2013

A CIO's First 100 Days | Unlock Value Of Data

If you have trouble viewing this email, read the online version.

Global CIO
  Wednesday, February 6, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
CIO Columnist Unlock The Value Of Data: Share It
By Imre Kabai
How can your business open up data to others? It's more than time to ask.

Your First 100 Days As CIO: Must-Do Items
New CIOs should start preparing during the interview process, say two McKinsey consultants. How good are your listening skills?

U.S. And U.K. Show Cloud Adoption Divide
More Brits than Yanks understand cloud concepts, but more cloud projects are getting done in the U.S.

10 Mobility Trends CIOs Should Watch
Tablets will lose steam, BYOD will become ubiquitous and mobile rollouts will get less expensive, says Yankee Group analyst.

Patent Trolls Pursue Midsize Companies
Non-practicing entities, also known as patent trolls, find midsize companies make ideal targets for infringement claims. Online retailer Ashford.com is fighting back.

Why Soliciting LinkedIn Endorsements Is A Bad Idea
LinkedIn's nagging automated requests to endorse others' skills are too generic to be useful to anyone. You're better served by staying in personal touch with your network.

ALSO SEE
Patent Trolls Pursue Midsize Companies
Why Soliciting LinkedIn Endorsements Is A Bad Idea
IT Pro Ranking: Unified Threat Management
Understand Your Mobile Vulnerability Risks
Samsung Galaxy S IV: What To Expect
Mobile Security -- A Holistic Approach
2013 InformationWeek 500: Nominations Now Accepted

Download our iPad App

JOIN THE CONVERSATION
Posted By Michael Endler:
"Dealing with this stuff has to feel like living in a neighborhood where everyone's forced to pay off the local mob. Such a baffling loophole in the system, and such an impediment to innovation."
In reply to: Patent Trolls Pursue Midsize Companies
View Entire Response | Post Your Own Reply

  Digital Issue  
DOWNLOAD DARK READING'S LATEST DIGITAL ISSUE
Wily attackers are using shape-shifting malware to fool your defenses. Are you ready?

Also in the new, all-digital issue of Dark Reading: The shift in hacking requires a new defense mindset.


DOWNLOAD NOW FREE (Registration Required)
 

 
REPORTS & WHITEPAPERS
FEATURED REPORTS
IT Pro Ranking: Unified Threat Management
Unified threat management appliances combine multiple security functions into a single device to provide a streamlined security infrastructure with a compelling operational cost model. IT pros who use or have used or evaluated UTM appliances assess five vendors -- Check Point Software, Cisco Systems, Dell SonicWall, HP and Juniper Networks -- on critical features such as malware detection, intrusion prevention and throughput.
Download Now (Registration Required)

Featured Report
Strategy: How to Conduct an Effective IT Security Risk Assessment
Assessing an organization's security risk is an important element of an effective enterprise security strategy. It's also a key way to justify future security spending to upper management. In this Dark Reading report, we recommend how to conduct an IT security risk assessment--and how to translate the results into terms that make sense in dollars.
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Understand Your Mobile Vulnerability Risks
Do you know how to protect your company data against mobile vulnerabilities? Watch Rapid7's where Dirk Sigurdson, Director of Engineering for Mobilisafe at Rapid7 discusses the importance of understanding mobile vulnerabilities and risks and best practices for mitigation.
Download Now (Registration Required)


Gartner: Magic Quadrant for Enterprise Backup/Recovery Software
Backup is among the oldest, most performed tasks in the data center, but enhancements and alternatives are becoming available. The industry is undergoing significant change as organizations embrace new technologies and show a propensity to augment or switch legacy vendors and backup techniques. Download this white paper to see how the vendors in the market are evaluated.
Download Now (Registration Required)


MORE WHITEPAPERS
 
MOST POPULAR NEWS
Samsung Galaxy S IV: What To Expect
Samsung's Galaxy S phones have become the closest thing to the mythical "iPhone killer" of Android fans' dreams. Here's a look at the next version's likely features.

Anonymous Claims Wall Street Data Dump
Hacktivist group publishes 4,000 passwords as part of Operation Last Resort campaign seeking revenge for the treatment of Internet activist Aaron Swartz.

10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

Dell Goes Private: What's Next?
Dell is going private with the help of $2 billion from Microsoft. Going forward, how much will Microsoft influence operations?

12 Best iPhone, iPad Apps Of 2012
You already know about Skype, Instagram and Angry Birds. Check out these business-friendly iPhone and iPad apps you may not have tried, plus an amusing diversion or two.

MORE NEWS  
 
WEBCASTS
Mobile Security -- A Holistic Approach
Managing and securing the mobile enterprise requires taking a holistic approach to defending the end-to-end scope of each mobile engagement. Security and management are highly intertwined and prerequisites to one another. Get more details during our webcast on Wednesday, February 6, 2013. More Information & Registration

Click here
 
RESOURCES AND EVENTS
2013 InformationWeek 500: Nominations Now Accepted
It's that time of the year again: Nominate your company for the 2013 InformationWeek 500 -- It's our 25th annual ranking of the country's most innovative users of business technology. Organizations with $250 million or more in revenue may pre-register now to receive more information.
Deadline is April 12



This e-mail was sent to sojo.blo@gmail.com

Global CIO
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of Global CIO go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment