Bound to Fail
The crash of a critical legacy system at Comair is a classic risk management mistake that cost the airline $US20 million and badly damaged its reputation.
View ArticleYour World. . . Hacked
The call to Bob Bailey, an IT executive with a major US government contractor, came on an otherwise ordinary day in October 2003. "Why are you attacking us?" demanded the caller, an IT leader with a...
View ArticleEmerging Offshore Outsourcing Markets You Can't Miss
Egypt has the most market potential among emerging providers of global IT services, according to a recent study by the London School of Economics Outsourcing Unit.
View ArticlePort of Los Angeles Fights Crime Fighting With Mobile Video
The Project: Deploy mobile communications software to enable transmission of live video to and from the Port of Los Angeles' control centers and harbor police in the field. The project is part of a...
View ArticleEgypt unrest threatens status as rising outsourcing star
What happens if the country you outsource to suddenly goes dark? Early adopters of Egyptian IT and business process services are finding out today. Egypt's government reportedly blocked all Internet...
View ArticleMitigating the risk of cloud services failure
One of CIOs' biggest concerns about the infrastructure-as-a-service model has been the loss of control over assets and management that enterprises might experience upon moving into a multi-tenant...
View ArticleIT outsourcing in China and data privacy guidelines
China's data privacy protection has long been considered one of the world's weakest. But the government's proposed data security guidelines may go too far in the opposite direction.
View Article10 questions to ask before using a startup
Using a little-known tech firm can produce big benefits, but it requires doing your homework.
View ArticleMobile Emergency Response App Keeps College Ready for Crisis
A mobile app for smartphones and tablets delivers step-by-step procedures for responding to incidents from hurricanes to on-campus shooters, serving as Cliffs Notes for Miami-Dade College faculty and...
View ArticleHow to build cybersecurity into outsourcing contracts
IT outsourcing customers must take greater care in building cyber-risk protection into their IT services and cloud computing deals.
View Article
More Pages to Explore .....