IT News and Events
Jun 17th, 2013 — Jun 23rd, 2013 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 184, Issue 3 << Previous Issue | Next Issue >>
IT News - CxO
Why Innovation Fails: The Past vs. Future Problem
"Having worked with business leaders for years in the pursuit of innovation, I have come to realize that there is a fundamental reason for failure," comments Douglas Stone in "InformationWeek".

"Companies have two modes of operation that often are viewed as incompatible. One mode focuses on the past and one focuses on the future, and the inability to integrate the two explains why companies find it so hard to innovate.

Established businesses are great at maintaining value through greater efficiency and effectiveness, but over time these businesses become irrelevant. Start-ups are great at spotting unmet needs and driving a relentless charge -- only to find that they have an unsustainable business model..."

InformationWeek, June 11, 2013
(Get More Information . .) open to premium members only

Make Your Employees Happier: Limit Multitasking
"Did you ever have one of those days where you were so busy from 9 to 5 that the day just blew by? But at quitting time, you looked back and realized nothing really got done?" asks Christopher Null in "IT World".

"That's the dilemma that multitasking has long presented to the individual. But now it seems that employers are driving their employees crazy as well--causing them to hate coming to work--thanks to the hefty demands of multitasking, according to Maura Thomas, a productivity guru who runs the website"

IT World, June 10, 2013
(Get More Information . .) open to premium members only

Eight Is Enough! IT's Biggest Frenemies
"You probably have a good idea about who your enemies are. But what about your frenemies?" asks Dan Tynan in "InfoWorld".

"These are people you deal with on a regular basis, largely because you have no choice. But even when their intentions are good, they can still cause you all manner of grief. They range from BYOD Betty, who insists on using her iPhone at work (but wants you to support it) to Cloudy Claudette, who's running her own shadow IT organization with the help of public cloud providers..."

  • Legacy Larry
  • BYOD Betty
  • Pedro de las Pajamas
  • Leaky Louise
  • Slippery Sam
  • Cloudy Claudette
  • HR Harriet
  • Frightened Frank

Read on for details.

InfoWorld, June 10, 2013
(Get More Information . .) open to premium members only

CEOs: Five Reasons Your CIO Quits
"Sometimes it is because a better job comes along, and sometimes it is because no other job could be worse," writes John Friscia in "Accelerating IT Success".

"Whatever the reason, when a CIO quits, it should be less of a mystery to a CEO why this has happened. Scott Lowe writes a blog post addressed to CEOs about five reasons why CIOs quit:"

  • Relegating IT to 'keeping the lights on'
  • Locking the CIO out of strategy sessions
  • Ignoring governance
  • Ignoring critical advice from the CIO
  • Making no effort to understand what IT can do

Read on for details.

Accelerating IT Success, June 12, 2013
(Get More Information . .) open to premium members only

6 Emerging Technologies and What They Mean to CIOs
The editorial staff of "Government Technology" offers, "six Emerging Technologies and a brief discussion of what they mean for CIOs:"

  • Mobile Robots
  • 3-D Printing
  • Online Electric Vehicles
  • Remote Sensors
  • Virtual Currency
  • Video Facial Recognition

Read on for details.

Government Technology, June 11, 2013
(Get More Information . .) open to premium members only

3 Lessons Learned From a Failed Customer Feedback Test
"Things didn't go exactly as planned when we gave three retail businesses a customer feedback system to test for a customer service software buyers' guide," writes Ashley Verrill in "IT World".

"The goal was to see how the features worked in a real-life setting. However, we discovered that testing customer service software in a real-life setting involves more than simply installing and using. It requires a certain amount of planning, and there were several key issues we realized we should have addressed before beginning to test.

From our experience came three important lessons, here's a look at what those lessons were and what they taught us about how CIOs and other technology buyers should go about evaluating customer feedback systems..."

IT World, June 11, 2013
(Get More Information . .) open to premium members only

IT News - Security
Those Meters That Rate Password Strength Work, Until They Don't
"We know the limitations of passwords: They are difficult to scale, and managing truly secure passwords is a headache for administrators and end users," reports William Jackson in "GCN".

"We also know that although there are alternate technologies for online authentication, passwords probably are here to stay. 'Passwords are not going to disappear overnight, or in the next 10 years or 20 years,' said Lujo Bauer, assistant research professor in Carnegie Mellon University's Electrical & Computer Engineering Department.

So how to make the best of what we are stuck with? ..."

GCN, June 12, 2013
(Get More Information . .) open to premium members only

PRISM Program Gives NSA Direct Access To Tech Companies' Servers
"The Guardian is reporting that the U.S. National Security Agency, as part of a secret program called PRISM, has been directly accessing the systems of leading technology companies, including Google, Facebook and Apple, for several years," says Jeff Goldman in "eSecurity Planet".

"A top secret 41-slide PowerPoint presentation apparently details the program's capabilities, including "collection directly from the servers" of U.S. service providers.

According to a PowerPoint slide printed by the Guardian, PRISM collection began for Microsoft in September 2007, for Yahoo in March 2008, for Google in January 2009, for Facebook in June 2009, for Paltalk in December 2009, for YouTube in September 2010, for Skype in February 2011, for AOL in March 2011, and for Apple in October 2012. The presentation also states that Dropbox will soon be added to the program..."

eSecurity Planet, June 7, 2013
(Get More Information . .) open to premium members only

Gartner reveals Top 10 IT Security Myths
Writing in "Network World", Ellen Messmer reports that, "When it comes to information security, there are a lot of 'misperceptions' and 'exaggerations' about both the threats facing businesses and the technologies that might be used to protect their important data assets, according to Gartner analyst Jay Heiser.

These false assumptions all add up to 'security myths' that have gained wide credence among security pros, the employees they're trying to protect from data loss and the business managers apt to blame chief information security officers (CISO) for breaches and other mishaps. Heiser, in his presentation on this topic at the Gartner Security & Risk Management Summit held in National Harbor, Md., held forth on his 'Top 10 Security Myths':"

  • It won't happen to me
  • Infosec budgets are 10% of IT spend.
  • Security risks can be quantified
  • We have physical security (or SSL) so you know your data is safe
  • Password expiration and complexity reduces risk
  • Moving the CISO outside of IT will automatically ensure good security
  • Adhering to security practices is the CISO's problem
  • Buy this tool <insert tool here> and it will solve all your problems
  • Let's get the policy in place and we are good to go
  • Encryption is the best way to keep your sensitive files safe

Read on for details.

Network World June 11, 2013
(Get More Information . .) open to premium members only

Careless Employees Are .Greater Security Risk. Than Cybercriminals
"A report published this week by Check Point has revealed that, for two in three companies, their own employees carry a greater security threat than cybercriminals," writes James Bourne in "Enterprise Apps Tech".

"The startling finding, from the latest mobile security report polling nearly 800 IT professionals, comes amidst the continued rise of BYOD, with more and more methods of compromising company networks being found.

Indeed, it's not the devices that are the main asset, but the information stored on them. 63% of survey respondents do not manage corporate information on their personal devices, whilst a whopping 94% admitted that lost or stolen information was a 'grave concern'..."

Enterprise Apps Tech, June 13, 2013
(Get More Information . .) open to premium members only

IT News - Cloud
To Cloud or Not to Cloud
"Why that is NOT the question for your contact center or customer engagement solutions?" asks Max Ball in "Business 2 Community".

"Across the enterprise software industry we have seen many different software functions move to the cloud CRM, HR, ERP and many other functions have seen significant movement towards the cloud; ever heard of a little company called It's different in the contact center world however; there are just enough telephony complications, and privacy and security requirements that most contact centers have not yet migrated to the cloud. In fact according to a Nemerets study published in 2012, only 14 percent of companies had leveraged cloud platforms for customer service and contact centers..."

Business 2 Community, June 12, 2013
(Get More Information . .) open to premium members only

IT News - Networks
IBM Shows Off Nickel-Sized Chip That Backs Gb/Sec Wireless Data-Rates, Cutting Edge Radar Images
"IBM says it has packed an integrated circuit about the size of a nickel with technology that can enable gigabit/sec mobile data-rate and clutter-cutting radar image applications," reports Michael Cooney in "Network World".

"The integrated circuit takes advantage of millimeter-wave spectrum which spans the 30 GHz to 300 GHz range, 10 to 100 times higher than the frequencies used for mobile phones and Wi-Fi. Frequencies in the range of 90-94GHz are well suited for short and long range, high-resolution radar imaging, IBM said..."

Network World, June 4, 2013
(Get More Information . .) open to premium members only

IT News - Careers
The 12 Most Controversial Facts in Mathematics
Walter Hickey writes in "Business Insider", "Mathematics has little surprises that are designed to test and push your mental limits. The following 12 simple math problems prove outstandingly controversial among students of math, but are nonetheless facts.

They're paradoxes and idiosyncrasies of probability. And they're guaranteed to start an argument or two.

If you're looking for a mathematical way to impress your friends and beguile your enemies, here's a good place to start..."

Business Insider, March 25, 2013
(Get More Information . .) open to premium members only

IT News - Encryption
How to avoid Big Brother's gaze
"Deciding on the level of encryption you should be using requires careful consideration," opines Kenneth van Wyk in "ComputerWorld".

"The revelations about the National Security Agency's Prism program have had many people thinking about George Orwell's dystopian novel, 1984. A lot of pixels and ink have been devoted to questions about the rightness or wrongness of Edward Snowden's decision to unmask the program and the relative importance of privacy vs. security. I'll leave those questions to others and instead focus on what we all can do to better protect our online activities from prying eyes..."

ComputerWorld, June 13, 2013
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section