Posts Tagged CIO
I will be the first to admit that I can be kind of picky about certain things. Hey, everyone has his quirks! Although I try not to take political correctness to an extreme – a fact that those who know me will attest to – I do cringe when I hear certain words used in a certain context or see grammar issues clouding up the intended meaning of a message. That said, I do have actually reasons behind my thinking; I’m not just some word-hating sociopath that wants to see Webster’s knocked down a peg or two. Here are a few examples of words and phrases that I believe have the potential to create the wrong kind of environment and the word or phrase that I would use in its place and why.
There are two hard facts that every CIO will face as some point as data growth continues:
- Storage performance will become an exceedingly important metric, if it hasn’t already.
- Flash storage alone will not solve an organizations storage problems due to the high $/TB cost.
As I state these two facts, I’m not including in the group of CIOs those that have what many consider to be niche needs. Instead, I’m including those mainstream SMB and midmarket CIOs that run “real world” data centers.
Last week, I attended and participated in the Next Generation Storage Symposium and listened to a number of vendors and community participants discuss the future of storage and how the storage revolution will come to change IT as we know it. However, during one segment of the discussion, the conference organizer and a panel participant – Stephen Foskett – made what to me, was a profound statement.
“Scale doesn’t necessarily mean ‘big’.”
Why do I think this was an important statement?
For months now, Microsoft and its partners have been promising a late October blitz that includes the official release of the much-anticipated Windows 8 operating system along with a series of tablets from across the vendor spectrum, including a tablet from Microsoft itself.
Windows 8 is a radical departure from earlier versions of Windows. With Windows 8, Microsoft is attempting to unify the user experience across a variety of device form factors while also enabling apps to run across that platform spectrum, from phones to tablets to traditional PCs and laptops.
Everywhere you look, there are articles and analysts celebrating the “post PC” era that we’re entering. After all, with PC sales in decline and tablet shipments rising, we must be entering a new era, right? Quite possibly, but I don’t see the new era as being one in which PCs are relegated to the sidelines as has-been devices. In fact, I see the PC-experience as taking on new life in a multitude of new forms in what I prefer to call the PC+ Era.
Network security forensics is often overlooked or lightly regarded when composing an overall security strategy. Be it forecasting a budget for forensic tools, or planning of an all-new green-field environment, the protection that proper forensics strategy provides in an environment can save countless resources when it comes to restoring a stable state, ensuring integrity, analyzing an intrusion or outage event, and learning information that can be used in the future. Forensic concepts also aid in reinforcing that secure data remains confidential. Forensic tools buttress the elements of a network that ensure integrity and availability. Sometimes this means a secure chain of custody or access, touching on the administrative model, it is often affected or in compliance with legal assertions or mandate.
CIOs today have a top operational and strategic priority (not technology priority) to support the mission of the business through the application of technology. While they are under pressure to reduce costs, CIOs must deliver agility and efficiency to the organization. The CIO is also VERY concerned about risk. CIOs don’t want to disrupt what’s working while chasing new opportunities. Think of the CIO as managing a portfolio of applications, technologies, people and processes. The technology portfolio is allocated to initiatives that are designed to 1) Run the business 2) Grow the business and 3) Transform the business. Like a good portfolio manager, the CIO must balance risk and reward by allocating resources in a balanced manner. The degree of risk is a function of the objectives of the board of directors and the strategic plan and operating plans of the companies.
Well, not really. It’s no secret that email archiving and eDiscovery are broken– and as my colleague Gary MacFadden points out, the vendors aren’t the only ones to blame.
I had the pleasure recently of hosting a Wikibon Peer Incite and we invited Michael McCreary, the COO of Rational Retention to present. Mike used to be a client when he was the head of Pfizer’s Legal Technology Group and has forgotten more about this topic than I’ll ever know. Participating on the call we had Mike Versace from the Financial Services Technology Consortium, Dave B. from a giant financial organization, Martin Tuip from Mimosa Systems and a number of others from the Wikibon community.