MAY 4, 2010 10:43pm ET

Related Links

FDA Opens Public Comment Period for New HIT Strategy
April 6, 2014
Always Carry Your ID: A Brief Overview of UDI Regulation
January 22, 2014
Poor Data Management Blinded Chase to Madoff Fraud: WSJ
January 13, 2014

Web Seminars

April 29: Create a data protection strategy with open, software-defined storage
April 29, 2014
New Best Practices To Manage Customer Information
May 7, 2014
May 13: Cost-effective, scale-out backup in 1 solution
May 13, 2014

Risky Business


While musing on the impact of the Iceland volcano last week, I reconnected with my old friend Bob Charette, a sometime contributor to Information Management who I've come to know as one of the best risk management experts in the field. He also deeply acquainted with technology and was a founder of lean software development.

Get access to this article and thousands more...

All Information Management articles are archived after 7 days. REGISTER NOW for unlimited access to all recently archived articles, as well as thousands of searchable stories. Registered Members also gain access to:

  • Full access to including all searchable archived content
  • Exclusive E-Newsletters delivering the latest headlines to your inbox
  • Access to White Papers, Web Seminars, and Blog Discussions
  • Discounts to upcoming conferences & events
  • Uninterrupted access to all sponsored content, and MORE!

Already Registered?


Comments (1)
Warfare. IT in government risks being 'hacked' each moment it shares information within and outside. It is a well deserved consequence for their inability to get to the root-cause of their inefficiency. When a given customer solicits their help, they should take their miopic lenses off and look at the landscape in a wide-angle view. No one has told them that they can not offer an enterprise approach, look for common needs among customers and offer a common solution; instead, they throd through the muck each and every time thus over populating architecture, infrastructure, data stores, etc. Another anomally plaging them is restricted-resources, why? Because they do not have own budget for the same reason. If an CIO would stand to his/hers CFO duffus and make them see that the lack of funding makes their systems vulnerable.

If IT professionals worth their 'salt' know, there are practices that can be exercised each time a project/application starts; these measures are preventative measures that will pay-off at the end when these systems are in production. Their viability will 'refund' them with the security that offsets risk but it has to be deliberate, right at the core. The Dupras and the Chopras can earn their money by not playing politics.

Posted by SAMUEL R | Wednesday, May 05 2010 at 6:30PM ET
Add Your Comments:
You must be registered to post a comment.
Not Registered?
You must be registered to post a comment. Click here to register.
Already registered? Log in here
Please note you must now log in with your email address and password.

Are you actively evaluating master data management technologies and their ability to scale and support emerging trends around big data, social and mobile?

Yes 61%
No 23%
Don't Know 9%
Not Applicable 6%


Login  |  My Account  |  White Papers  |  Web Seminars  |  Events |  Newsletters |  eBooks
Please note you must now log in with your email address and password.