Friday, February 8, 2013

P&G CEO On Analytics | Where Does Dell Go From Here

If you have trouble viewing this email, read the online version.

Global CIO
  Friday, February 08, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
CIO Columnist P&G CEO Shares 3 Steps To Analytics-Driven Business
By Chris Murphy
CEO Bob McDonald makes the case that analytics needs to move from the periphery of operations to the "center of how business gets done."

7 Moves Dell Must Make Now
Dell's decision to go private was a bold step, but the company must continue making aggressive decisions to succeed.

Size Doesn't Matter In IaaS Game, ElasticHosts Says
Small infrastructure-as-a-service provider cobbles together a global system of leased spaces to compete with Amazon, Rackspace and other major cloud services.

Wanted: Apps With Data Science Baked In
Data scientists too hard to find? Business-oriented applications with data science capabilities might be the solution.

CIO Profiles: Ken Harris Of Shaklee
Hands-on attention from higher-ups key to IT project success, says CIO for natural nutrition company Shaklee.

Even Grandmothers Can Be Online Trolls
U.K. company Saga shutters its social media site for seniors after online trolls produce a stream of abuse and mayhem.

ALSO SEE
CIO Profiles: Ken Harris Of Shaklee
Even Grandmothers Can Be Online Trolls
IT Pro Ranking: Unified Threat Management
Big Data: Lessons From The Leaders
10 Best Android Apps Of 2012
Mobile Security -- A Holistic Approach
2013 InformationWeek 500: Nominations Now Accepted

Download our iPad App

JOIN THE CONVERSATION
Posted By Doug Henschen:
"This firm has turned all the big buzz phrases into a reality. It's truly taking action based on predictive insight across every aspect of the business."
In reply to: "P&G CEO Shares 3 Steps To Analytics-Driven Business"
View Entire Response | Post Your Own Reply

  Digital Issue  
DOWNLOAD DARK READING'S LATEST DIGITAL ISSUE
Wily attackers are using shape-shifting malware to fool your defenses. Are you ready?

Also in the new, all-digital issue of Dark Reading: The shift in hacking requires a new defense mindset.


DOWNLOAD NOW FREE (Registration Required)

 

 
REPORTS & WHITEPAPERS
FEATURED REPORTS
IT Pro Ranking: Unified Threat Management
Unified threat management appliances combine multiple security functions into a single device to provide a streamlined security infrastructure with a compelling operational cost model. IT pros who use or have used or evaluated UTM appliances assess five vendors -- Check Point Software, Cisco Systems, Dell SonicWall, HP and Juniper Networks -- on critical features such as malware detection, intrusion prevention and throughput.
Download Now (Registration Required)

Featured Report
Strategy: How to Conduct An Effective IT Security Risk Assessment
Assessing an organization's security risk is an important element of an effective enterprise security strategy. It's also a key way to justify future security spending to upper management. In this Dark Reading report, we recommend how to conduct an IT security risk assessment--and how to translate the results into terms that make sense in dollars.
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Big Data: Lessons From The Leaders
Financial performance, competitive advantage, operational efficiency, strategic decision making - every business goal can extract value from big data, and the time for doubt or inaction has long passed. In this Economist Intelligence Unit report, in-depth interviews with data pioneers reveal the link between the effective use of big data and the bottom line among other results.
Download Now (Registration Required)


Decision-Driven Data Management: 3 Key Areas of Focus
There is a crucial need for operational data quality upon which to base their analytical and decision support systems. This white paper examines three areas of focus when considering the implementation of an operational data quality process.
Download Now (Registration Required)


MORE WHITEPAPERS
 
MOST POPULAR NEWS
10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

7 Moves Dell Must Make Now
Dell's decision to go private was a bold step, but the company must continue making aggressive decisions to succeed.

FDA Approves RFID Tags For Humans
VeriChip says its RFID chip could save lives and prevent medical mistakes.

BlackBerry Touts 'Record' Z10 Sales
BlackBerry says sales of its Z10 smartphone are off to a strong start in Canada and the U.K., but doesn't offer hard data.

Samsung Galaxy S IV: What To Expect
Samsung's Galaxy S phones have become the closest thing to the mythical "iPhone killer" of Android fans' dreams. Here's a look at the next version's likely features.





MORE NEWS  
 
WEBCASTS
Mobile Security -- A Holistic Approach
Managing and securing the mobile enterprise requires taking a holistic approach to defending the end-to-end scope of each mobile engagement. Security and management are highly intertwined and prerequisites to one another. Get more details during our webcast on Wednesday, February 6, 2013. More Information & Registration

Click here
 
RESOURCES AND EVENTS
2013 InformationWeek 500: Nominations Now Accepted
It's that time of the year again: Nominate your company for the 2013 InformationWeek 500 -- It's our 25th annual ranking of the country's most innovative users of business technology. Organizations with $250 million or more in revenue may pre-register now to receive more information.
Deadline is April 12



This e-mail was sent to sojo.blo@gmail.com

Global CIO
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of Global CIO go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment