The CIO Paradox by Martha Heller – a book review

CIO Paradox book cover 3D

Note: I received a reveiw copy of The CIO Paradox.  The review below made up of PR material provided to me as well as my reading of the book. Martha Heller was kind enough to reach out to me to offer me an advance copy of her new book titled “The CIO Paradox: Battling the […]

Staying flexible in a complex world


This post sponsored by the Enterprise CIO Forum and HP. Complex can be good. Processes can be complex and still work just fine. Complex is often the answer. But staying flexible in a complex world is one of the toughest things a CIO and IT Professional can do. Enterprise Security is complex…as it should be.  Take a look […]

More on Education for Enterprise Security


This post sponsored by the Enterprise CIO Forum and HP. In my last post, Education – the key for Enterprise Security, I wrote about the need to educate the organization on the need to think about IT Security. In that post, I included a photo of a door. A door that had no walls around it. That door with […]

Education – the key for Enterprise Security


This post sponsored by the Enterprise CIO Forum and HP. You’ve spent years and millions of dollars on your IT Security systems, processes and people. Your systems are as impenetrable as you, your team and your partners can make them. Your processes are amazing.  They follow all the industry standards and your audits always come back 100% ‘secure’. […]

Can Twitter Sentiment be used to generate buy / sell signals?


This is a cross-post from Before we get started…its VERY easy to look back and say “yes…that would have been a buy signal”.  If the market worked with hindsight, we’d all be millionaires. For this approach, I’m going to use the thought that the masses are ‘wrong’.  That is…when Sentiment gets extremely bearish or […]

Shadow IT and Enterprise Security – The boogeyman and the shadows


This post sponsored by the Enterprise CIO Forum and HP. First off…if you aren’t familiar with the boogeyman, its the bad person in stories that are normally told to kids to keep them in line. The boogeyman is also used by adults to scare other adults to make them stay in line. IT Professionals use the boogeyman to […]

Comparing Market Sentiment – Twitter vs the “Professionals”


If you’ve been following me for more than a few months, you probably know that I’m researching Twitter Sentiment related to the market for my doctoral dissertation. A few previous posts on the topic: Using Twitter Sentiment for predicting stock price movement Will Twitter make you a better investor? Understanding Twitter Sentiment for Investing Decisions […]

Shadow IT and Information Optimization


This post sponsored by the Enterprise CIO Forum and HP. Following up my Data Disconnect and Shadow IT post from yesterday, I wanted to talk about the 2nd area that is often overlooked when people undertake their own Shadow IT initiatives. In my previous post, I talked about the Data Disconnect. That space where the data in your […]

Data Disconnect and Shadow IT

Disconnected by By Bee-Brilliant on Flickr

This post sponsored by the Enterprise CIO Forum and HP. Yes Shadow IT again. But…rather than rehash the things I’ve talked about before, I wanted to take some time to walk through a few issues that aren’t always discussed when we talk about Shadow IT. The first is Data Disconnect, which I’ll talk about here. The 2nd is…well…you’ll […]

Revisiting Shadow IT…again.


This post sponsored by the Enterprise CIO Forum and HP. The topic of Shadow IT is making the rounds again. A quick Google search finds more than a few new posts on the topic in last few days/weeks with more than just a few pointing to the “good” that can come from Shadow IT.  I don’t know that […]