Stories by Kim S. Nash

  • A secure BYOD policy at MasterCard? Priceless

    More than a year into its bring-your-own-device program, MasterCard Worldwide continuously assesses the security technology and policies that allow 30 percent of its employees worldwide to use their personal iPhones, iPads and Android devices at work.

  • Top CIOs predict future of the CIO role

    Five years from now, the CIO will be a better, faster, stronger version of today's top IT leader, practically running the company single-handedly. Or maybe other business executives will become more educated about IT and decide to hire cloud companies to do it all, leaving the poor CIO to wither, enforcing service-level agreements for a living. For almost as long as there have been CIOs, we've heard breathless speculation about whether the position will last, and if so, in what form.

  • H&R Block shifts from PCs to virtualized thin clients

    H&R Block's (HRB) virtualization project -- a CIO 100 Award winner this year -- is putting thin clients in the tax preparer's thousands of retail stores in an effort to simplify its operating environment and cut expenses. The change should also help it to better compete with chains such as Jackson Hewitt, as well as with independent tax preparers and software-only rivals such as TurboTax and Intuit (INTU).

  • How social networking creates a collaboration culture

    Remember knowledge management? In the 1990s, KM emerged as a way to collect and share expertise across a company. Employees would fill out profiles for a database about their skills and knowledge. Colleagues could query the system to find the best person to help with a project.

  • Using BI, BPM Data to Change Business Processes Fast

    Actions reveal more than words, we know, and companies are watching carefully, using <a href="http://www.cio.com/article/523013/Using_Predictive_Analytics_to_Tap_More_Profitable_Customers">business intelligence and analytics</a> tools to figure out what's happening in their markets. But it isn't just what makes a consumer buy a product or respond to an e-mail promotion that companies want to understand. They're also putting business operations-where efficiency can make the difference between profit and loss-under the microscope.

  • Disaster Recovery in the Cloud Yields ROI

    The promise of cost savings derived from cloud computing is attractive, but concrete financial returns are not always quickly achieved. Except, perhaps, when it comes to disaster recovery.

  • How Videoconferencing Improves Decision Making

    Decreasing expenses isn't Genworth Financial CIO Scott McKay's top priority when he evaluates new IT. Rather, he says, it's how the new technology can improve Genworth's competitive position. When, in 2008, the company spent about US$500,000 on videoconferencing systems to cut down on travel, it wasn't just trying to save money. Executives wanted to make business decisions faster.

  • Green IT: CIOs Can Demand Sustainability from Vendors

    Pamela Rucker doesn't want to spend money with IT vendors that waste water or energy, or that have large carbon footprints. After all, she says, as vice president of IT for environmental services firm PSC, it would be hypocritical to not hold vendors to high standards.

  • Sharing Data Securely to Foster Product Development

    Boston Scientific wants to tear down barriers that prevent product developers from accessing the research that went into its successful medical devices so that they can create new products faster. But making data too easily accessible could open the way to theft of information potentially worth millions or billions of dollars. It's a classic corporate data privacy problem.

  • Leadership Lessons from ... Eleanor Roosevelt

    Years before she helped Franklin D. Roosevelt win four presidential campaigns and became "reluctant First Lady" in the 1930s and 1940s, Eleanor Roosevelt was an outspoken social reformer. Her legacy includes fighting for women's, civil and human rights in the U.S. and, via the fledgling United Nations, the world. J. Edgar Hoover considered her dangerous; the FBI file on Roosevelt is one of its thickest.

  • New worm targets unprotected Linux systems

    Security analysts warned this week that another worm is hunting the Internet for Linux systems left unprotected against several well-publicised vulnerabilities, including one commonly found in Version 7.0 of Red Hat's Linux release.