MAY 4, 2010 10:43pm ET

Related Links

New Technology Promises Rewards, Poses Risk
June 23, 2014
FDA Opens Public Comment Period for New HIT Strategy
April 6, 2014
Always Carry Your ID: A Brief Overview of UDI Regulation
January 22, 2014

Web Seminars

Why Data Virtualization Can Save the Data Warehouse
September 17, 2014
Essential Guide to Using Data Virtualization for Big Data Analytics
September 24, 2014

Risky Business


While musing on the impact of the Iceland volcano last week, I reconnected with my old friend Bob Charette, a sometime contributor to Information Management who I've come to know as one of the best risk management experts in the field. He also deeply acquainted with technology and was a founder of lean software development.

Get access to this article and thousands more...

All Information Management articles are archived after 7 days. REGISTER NOW for unlimited access to all recently archived articles, as well as thousands of searchable stories. Registered Members also gain access to:

  • Full access to including all searchable archived content
  • Exclusive E-Newsletters delivering the latest headlines to your inbox
  • Access to White Papers, Web Seminars, and Blog Discussions
  • Discounts to upcoming conferences & events
  • Uninterrupted access to all sponsored content, and MORE!

Already Registered?


Comments (1)
Warfare. IT in government risks being 'hacked' each moment it shares information within and outside. It is a well deserved consequence for their inability to get to the root-cause of their inefficiency. When a given customer solicits their help, they should take their miopic lenses off and look at the landscape in a wide-angle view. No one has told them that they can not offer an enterprise approach, look for common needs among customers and offer a common solution; instead, they throd through the muck each and every time thus over populating architecture, infrastructure, data stores, etc. Another anomally plaging them is restricted-resources, why? Because they do not have own budget for the same reason. If an CIO would stand to his/hers CFO duffus and make them see that the lack of funding makes their systems vulnerable.

If IT professionals worth their 'salt' know, there are practices that can be exercised each time a project/application starts; these measures are preventative measures that will pay-off at the end when these systems are in production. Their viability will 'refund' them with the security that offsets risk but it has to be deliberate, right at the core. The Dupras and the Chopras can earn their money by not playing politics.

Posted by SAMUEL R | Wednesday, May 05 2010 at 6:30PM ET
Add Your Comments:
You must be registered to post a comment.
Not Registered?
You must be registered to post a comment. Click here to register.
Already registered? Log in here
Please note you must now log in with your email address and password.
Login  |  My Account  |  White Papers  |  Web Seminars  |  Events |  Newsletters |  eBooks
Please note you must now log in with your email address and password.