|
Interviews, commentary and conversations with today's IT leaders |
|
|
|
Beyond Code
Taking a decidedly different approach to IT career advice, Rajesh Setty, author of Beyond Code, urges IT professionals to distinguish themselves in the job market not only by learning new skills but, even more importantly, by investing in relationships. In this interview, Setty discusses his book and how IT professionals can jumpstart stalled careers.
Listen now | Read article
|
More Executive Edge programs
Putting the soft into software
One night I missed the bus. I had walked most of the way to the bus stop before I had a horrible thought. I could not be absolutely sure that I had unplugged the soldering iron in the office! My imagination full of flames and pink slips, I walked back to check on it and subsequently missed the bus. An expensive taxi-ride for a penniless student ensued.
Listen now | Read article | More McGrath's Musings
Extreme programming explained
In recent years, Extreme Programming (XP) has come of age. Its principles of transparency, trust and accountability represent a change of context that is good not only for software development but for everyone involved in the process. In this interview, Kent Beck and Cynthia Andres, co-authors of Extreme Programming Explained: Embrace Change (2nd Edition) discuss how XP makes improvement possible.
Listen now | Read transcript | More Cutter Edge programs
Software configuration management - Strengths and weaknesses
Software configuration management is kind of like cleaning your teeth or getting the car serviced, says Tom Welsh, senior consultant with Cutter Consortium, it's not something you enjoy, but you know the consequences of not doing it may be frightful. In this interview, Tom discusses how organizations view software configuration management, and what's at risk if it's not implemented.
Listen now | Read transcript | More Analyst Views
Web Services and Service-Oriented Architectures: Where and how to start
Critical factors for implementing a successful service-oriented architecture (SOA) are different for every organization. One real issue to overcome is the reluctance to adopt yet another technology silver bullet. To meet this challenge, you'll need to hone your storytelling skills, says Mike Rosen, Senior Consultant with Cutter Consortium, and have some real data to back up your argument. Listen to Mike discuss SOA, ways to craft your story, and some rules for success.
Listen now | Read transcript | More Best Practices
Transforming the CIO
According to a recent report from the IT Leadership Academy, 16 percent of CIOs are world-class, 23 percent are good, and the rest span the spectrum of averageness – and that's being generous. Just how did this happen? Thornton May, a self-described "CIO groupie" and long-time industry observer, speaks candidly about the challenges facing today's CIOs, and why what some of them are doing just isn't working.
Listen now | Read transcript |
More Executive Edge programs
12 behaviors for creating a healthy risk culture
"One of the key maxims of risk management is that assumptions made are risks that you have accepted," says Dr. Robert Charette, a Fellow of the Cutter Consortium and Director of its Enterprise Risk Management and Governance practice. In this interview, Dr. Charette outlines 12 key organizational behaviors that can help IT leaders create and manage a risk culture in their organizations.
Listen now | Read transcript |
More Strategy programs
|
Four Points of Network Convergence |
|
The convergence of networking technologies today is creating powerful new ways for enterprises to improve their performance. Access a series of white papers to learn how developing a roadmap can benefit your enterprise.
|
|
|
GroundWork - From OpenView to Open Source |
|
Find out why companies are moving from proprietary IT management tools to open source products such as Nagios, OpenNMS, Syslog NG and MRTG. Learn when it makes sense to deploy open source to manage your network, and how to get started.
|
|
|
Identify, Visualize, and Quantify Security Risks |
|
Get your FREE guide 5 Questions for Every CISO: Managing Risk Exposure and learn more about how you can now better identify, visualize, and quantify information security risks to optimize security investments. VeriSign(R) Managed Security Services
|
|
|
Find IT Consultants |
|
Post Your Project for Free. Get Bids from Thousands of Pre-Screened Consultants.
|
|
|
Fast, Easy Remote Support Solutions from LogMeIn |
|
Whether you need temporary or permanent access to remote PCs, LogMeIn has your solution: LogMeIn IT Reach for automatic maintenance of remote and mobile systems, and LogMeIn Rescue for instant, web-based remote access without pre-installing software.
|
|
|
» Buy a link now
|
|
|
| |
|
|
Advertisements |
|
|
|