CIO Magazine: April 15, 2007
Emphasize Results in Budget Presentations
CIOs should speak about results rather than costs convey the value of their budget presentations.
CIOs Need Business Partners To Achieve Security Controls
CIOs need to work collaboratively with business executives to make IT security projects successful.
IT Value Methodologies: Do They Work?
Three experts weigh in on whether IT Value Methodologies can help a CIO's never-ending quest to prove IT's worth.
5 Steps to a Smart Outbound Content Management Strategy
No one should treat outbound content management as a panacea. But it is a good first-line defense.

Boost Security With Outbound Content Management
Sensitive data slides out your company's door every day. New outbound content management tools can help you identify problem spots and bolster security.

Segway Inventor Dean Kamen on Risk-Taking and Innovation
Segway inventor Dean Kamen explains why it's essential to take risks in order to innovate.
Newspapers Turn Readers Into Content Contributors
To generate more content online, newspapers are encouraging readers to post comments and upload images and video.
When Companies Violate the Rules
A list of the 15 companies the Federal Trade Commission has cited for security breaches since 2002.
The ROI of Noncompliance in the Mid-Market
Mid-market companies cite cost when they don't comply with government rules like Sarbanes-Oxley. Affordable IT tools could limit that excuse.
Your Guide To Good-Enough Compliance
Decisions about complying with Sarbanes-Oxley, HIPAA and other rules is often an exercise in risk management and negotiation.
-
Video/Webcast
Sponsored -
Video/Webcast
Sponsored -
White Paper
-
White Paper
-
White Paper
BrandPosts
Learn more-
Sponsored by DataStax
-
Sponsored by NTT
-
Sponsored by Dell Technologies and Intel®