Click to Visit

Click to Visit

Contributed Articles

How to Avoid BYOD Disasters

Imagine an organization where employees are given several consecutive months of vacation every year. It sounds like a dream, but in the era of BYOD, it could also be an IT exec's worst nightmare.
[Full Article]   Mar-17-2013

 

IT's Rising Stars: Next-gen Leaders Transform the Enterprise

Tomorrow's CIOs are already transforming enterprise IT as we know it, bringing their fresh, sometimes radical visions of how technology can enable business now and in the years ahead.
[Full Article]   Mar-17-2013

 

Well-Tailored IT

A sophisticated, strategically oriented IT function is a desirable goal for any company. Itís especially desirable when the businessís distinctive capabilities rely heavily on information technology. If you are a chief information officer (CIO), a chief technology officer (CTO), or any other senior IT leader, you need to make the same kinds of disciplined choices for your department that the CEO and top leadership team are making about the strategic direction of the enterprise.
[Full Article]   Mar-17-2013

 

Helping Employees to Be Healthier: How About a Sweepstakes?

More and more companies are implementing wellness programs to foster healthier workforces, from smoking-cessation coaching to weight-loss plans. But to design such programs effectively, employers need to know a lot about the health of each of their workers, so they can figure out where the greatest needs for improvement exist.
[Full Article]   Mar-10-2013

 

The Threat From Within: What CIOs Need To Do To Protect The Company From The IT Department

As CIO the rest of the company is relying on you to keep them safe. They expect you to lead the IT team in defending the corporate castle from hackers and attackers. The importance of information technology requires us to spend time doing this Ė itís really part of the CIO job. However, it turns out that no matter how thick you make the virtual fences that you put around the companyís IT assets, you may be dealing with an even bigger threat from within your own IT department.
[Full Article]   Mar-10-2013

 

<< Prev1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 Next >>
Page: 66/104   Articles: 518