Tuesday December 24, 2024

User Departments Often Drive IT Infrastructure Excesses

Often a departmental business manager submits a request to the IT organization for a new server to host a critical business-intelligence application. The request itself is unremarkable; after all, it is common for a business unit to ask IT to deploy additional hardware infrastructure to support their application requirements. However the company may have multiple […]

Will Google violate your privacy in the future?

Google Goggles could violate your privacy without your knowing it. Goggles lets you send photos of a business card, book cover or even bar code from your Android-based smartphone to Google for quick identification and data manipulation. Now if that software is extended to include photos your personal privacy could be impacted. The way it […]

Massachusetts information security requirements

As of January 1, 2010, all organizations with operations and/or customers in the state of Massachusetts are required to follow comprehensive information security requirements regarding both paper and electronic records containing personal information. These requirements include enforcing password security, encrypting all personal information stored on laptops and removable devices and ensuring up-to-date firewall protection, operating system […]

Personal and Professioal Bonuses Cut By Most Enterprises

Fringe benefits are cut by most entetprises.  Health insurance is the only benefit that has reamined.   Companies have started to cut back on the fringe benefits provided to IT Professionals.  For example in January of 2008 95% of IT professionals had health insurance supplied by their employers while in June 2009 only 88% did.  […]

IT Job Descriptions HandiGuide 2010 Version Released by Janco

The IT job descriptions contained within the Internet and Information Technology Position Descriptions HandiGuide® was updated in 2010 and contains over 650 pages; which includes sample organization charts, a job progression matrix, over 231 job descriptions, best practices for resume screening and best practices for phone screening.  The author of this book has extensive experience […]

Google personal lead sensitive data in error

It was reported in Computerworld that Google apologized after it mistakenly e-mailed potentially sensitive business data last week to other users of its business listings service. The company’s Local Business Center allows businesses to create a listing for Google’s search engine and Maps application, as well as add videos, coupons or photos. Google then provides […]

Almost 200,000 jobs lost in IT during this recession

 Job cuts in technology were fierce in 2009, but 2010 is expected to see modest growth in a number of subsectors. The last time layoffs were this bad was in 2005. Job cuts in technology were fierce in 2009. Last year saw 174,629 jobs lost in the sector, catapulting up 12.3 percent from the 2008 […]

Obama administration to ask for more 1984 Big Brother powers

Everyone knows that police can peek inside an email account it if they have a paper search warrant But cybercrime investigators are frustrated by the speed of traditional methods of faxing, mailing, or e-mailing companies these documents. They’re pushing for the creation of a national Web interface linking police computers with those of Internet and […]

Oursouring continues

U.S. defense contractors’ growing use of offshore (outsource) subsidiaries from 2003 to 2008 allowed the Defense Department to save money on contracts but also resulted in the loss of U.S. tax revenue and unemployment benefits for some U.S. workers, according to a new report from the Government Accountability Office. Practical Guide for IT Outsourcing a […]

IT service management issues that CIOs face

The key service management business questions facing CIOs and senior IT managers today are: What are the service management impacts with the ever-increasing technical complexity on margins and customer satisfaction? Where are the areas where margin-improvement opportunities exist? How can IT minimize the maintenance-contract price pressure to drive new service-revenue opportunities to the bottom line? […]