China Hidden Competitive Advantage – China Owns Key Technology Media Firms
China Hidden Competitive Advantage – Should the US be concerned that key technology firms and publications are now owned by China? In March of 2017, China Oceanwide completed its acquisition of IDG. China Oceanwide is an international conglomerate founded by Chairman Zhiqiang Lu. Headquartered in Beijing, China and include operations in financial services, real estate, media, technology and strategic investment. Following the acquisition, China Oceanwide has nearly 20,000 employees worldwide.
Within two months of the acquisition, there were extensive layoffs in the IDG’s US staffs of both writers and editors. It has been estimated that between 90 t0 100 seasoned professionals were laid off.
IDG was founded in 1964 and the publications that were included in this acquisition were CIO, Computerworld, PCWorld, and Macworld. IDG also has its own international news agency, IDG News Service. It is headquartered in Boston and has bureaus in cities such as New York, Beijing, Amsterdam, and Brussels. It provides news, images, video and other editorial content to IDG’s web sites and print publications worldwide.
The insight that IDG has in the technology market is very high. With this level of access to the technology market, should US based corporations be concerned? Will China based enterprises get a competitive advantage over US based enterprises?
Wet objects (electronic) – Disconnect from the power source and do not turn it on. In the case of disk drives or other electronic storage devices – inventory all of them and label them.
Mobile Devices – cell phones – Small items like cell phones and mobile devices can be put in rice. The rice absorbs the moisture and after a day or two, they can be turned on. In most cases, this works.
Wet objects (non-electronic) – Rinse with clear water or a fine hose spray. Clean off dry silt and debris with soft brushes or dab with damp cloths. Try not to grind debris into objects; overly energetic cleaning will cause scratching.
Drying Objects – Air dry objects indoors if possible and use portable fans to move the air. Sunlight and heat may dry certain materials too quickly, causing splits, warping, and buckling. If possible, remove contents from wet objects and furniture prior to drying. Storing damp items in sealed plastic bags will cause mold to develop.
Mold Prevention and Cleanup – Exposure to molds can have serious health consequences such as respiratory problems, skin and eye irritation, and infections. The use of protective gear, including a respirator with a particulate filter, disposable plastic gloves, goggles or protective eye wear, and coveralls or a lab coat, is therefore essential. In order to inhibit the growth of mold and mildew, you must reduce humidity. Increase air flow with fans, open windows, air conditioners, and dehumidifiers. Moderate light exposure (open shades, leave lights on in enclosed areas) can also reduce mold and mildew. Remove heavy deposits of mold growth from walls, baseboards, floors, and other household surfaces with commercially available disinfectants. Avoid the use of disinfectants on historic wallpapers. Follow manufacturers’ instructions, but avoid splattering or contact with objects and wallpapers as disinfectants may damage objects.
Broken Objects – If objects are broken or begin to fall apart, place all broken pieces and detached parts in clearly labeled, open containers. Do not attempt to repair objects until completely dry or, in the case of important materials, until you have consulted with a professional conservator.
Paper Materials – Documents, books, photographs, and works of art on paper are extremely fragile when wet; use caution when handling. Free the edges of prints and paper objects in mats and frames, if possible. These should be allowed to air dry. Rinse mud off wet photographs with clear water, but do not touch surfaces. Wet books and papers should also be air dried or kept in a refrigerator or freezer until they can be treated by a professional conservator.
Office Furniture – Furniture finishes and painting surfaces may develop a white haze or bloom from contact with water and humidity. These problems do not require immediate attention; consult a professional conservator for treatment. Textiles, leather, and other “organic materials will also be severely affected by exposure to water and should be allowed to air dry. Shaped objects, such as garments or baskets, should be supported by gently padding with toweling or unlinked, uncoated paper. Renew padding when it becomes saturated with water. Dry clean or launder textiles and carpets as you normally would.
Art Work – Remove wet paintings from the frame, but not the stretcher. Air dry, face up, and away from direct sunlight.
Metal Objects – Rinse metal objects exposed to flood waters, mud, or silt with clear water and dry immediately with a clean, soft cloth. Allow heavy mud deposits on large metal objects, such as sculpture, to dry. Caked mud can be removed later.
Minimize breach response cost with operational strategy
While the costs of a data breach can vary widely on a case-by-case basis, CIOs who understand the drivers behind the expense will be better positioned to take steps needed to protect their organization.
Here are 6 way to minimize breach response cost:
Eliminate data you do not need.
You can potentially dramatically reduce your exposure by destroying records of past customers. You cannot lose data if you do not save it. In 2015 one company served 69 million customers, yet when they were breached that year, they exposed 78 million records. The extra nine million records most likely come from former customers. Each of these individuals had to be notified and offered credit monitoring, driving up costs.
Do not store street address if there is no real business requirement.
When a breach occurs, companies are typically required to notify affected individual via old-fashioned, handwritten “snail mail.” But they can use alternative methods of notification, such as email or public announcement if they do not have a valid mailing address. Physical, written notifications can cost up to $2 per person, and the cost quickly adds up. It may be worth asking twice what the business need for those customer addresses is and considering not capturing these addresses to reduce the exposure to notification requirements.
Utilize logs to prove proof a breach or data loss did not occur.
One industry study shows that in 44% of incidents, public notification is not required. To avoid notification, companies must prove that, even if they were attacked, no records were improperly accessed. To do so, they use systems logs. Without logs, a company may be forced to assume a breach occurred because it cannot prove otherwise.
Follow PCI rules and protect credit card data.
For breaches that involve credit card data, reimbursing card companies for fraudulent transactions can amount to a staggering cost, from $3-$30 or more per card. New chip cards are designed to reduce fraud, and early data show they are having the intended effect – MasterCard reported a 54% reduction in counterfeit card fraud costs at retailers who have switched to chip cards.
Use experts who know the breach response landscape.
Your breach response effort is not a good time to reinvent the wheel. Missteps happen fast and have serious consequences. Credit monitoring alone can cost $5 to $30 per person. Data breach specialists, such as PR consultants or data privacy lawyers, often have seen as many as hundreds of data breaches and are highly practiced at helping you craft a genuine story that keeps confusion – and costs – down.
Be prepared for additional audits and compliance reviews.
In the wake of a breach, a company may be audited and investigated by a number of regulatory agencies. While it’s not guaranteed to occur, it is likely, and there are simple steps you can take to prevent sensational fines if it does. To start, CIOs and CFOs should be strong advocates for the implementation of the security controls recommended by external auditors or by regulators themselves.
eCommerce obsoleting traditional retail – Infrastructure needs to change
eCommerce obsoleting traditional retail with brick and mortar businesses impacted the most.
eCommerce is changing the way both business and consumers shop. Retailing is changing at lightning speed coupled with an ever-tightening decision horizon, changing consumer expectations and an unrelenting flood of data. eCommearace is disrupting classic retail models.
Traditional infrastructure models for merchandising, supply chain, and store operations are now triggered autonomously by novel and unexpected sources that are facilitated by artificial intelligence, machine learning, and voice and IoT sensors connected to a digital core.
Consumer wearables, smart appliances and homes, driverless vehicles, drones, virtual reality headsets, and online games are becoming points of brand interactions – from demand to execution. What has served retailing well in the past now is a serious liability with it being unable to drive business success.
By 2020, 83% of mobile users globally will use their device to access the Internet
By 2020, there will be 75 billion connected devices
By 2025, the Internet of Things (IoT) will have potential economic impact of $4 trillion – $11 trillion a year, with impact in retail up to $1.2 trillion
By 2025, augmented reality (AR) and virtual reality (VR) will represent up to $182 billion market opportunity
Chief Digital Office (CDO) & Chief Mobility Officer (CMO) Hot C-Level Jobs
Top 5 Hot Jobs – CDO & CMO Hot C-Level Jobs that are not only new but also hot. In the case of Chief Digital Officer (CDO), we have found that one in five companies now have some in that role. In addition, half of those enterprises hired the incumbent in the last 12 months. The case is not quite as strong for the Chief Mobility Officer (CMO) as we found that only one in ten organizations have an individual other that the CIO assuming those responsibilities.
Many of the hot new jobs often report to the operational side of the business, instead of the traditional IT organization under the authority of the CIO. Part of the reason for that is that almost half of all IT functions report up thru the financial side of the enterprise, not the operational side.
The five hot new jobs are listed below and have links to pages describing the major roles and responsibilities they have:
All of these jobs have one thing in common. They are addressing the issues, roles, and responsibilities of the new age marketplace. Without the Internet, e-commerce, and mobile users there would be no need for these positions.
But, as it is these are the new jobs that have been created by these new technologies and changes that have taken place.
FCC anti-net neutrality results in thousands robo-comments
FCC anti-net neutrality – Now that FCC has announced they plan to roll back an Obama-era framework for net neutrality, their website is being flooded with several thousand duplicate comments.
The FCC asked Americans to leave comments in favor of keeping the rules. These robo-comments make any meaningful analysis of the responses next to impossible. Including those comments, well over half-a-million comments have been posted.
What does this all mean to small businesses and individuals who are using the web to conduct business and gather information. Only time will tell.
IT Environment and Net Neutrality
The IT environment is too complex to rely on outmoded ways to keep the business functioning and thriving flawlessly. That is one of the reasons that the net neutrality rules are important.
To balance the many crucial and changing enterprise demands to move the organization forward, an effective IT strategy is required. Without that, there are increases risks in expectations of IT — the growth of the Internet, compliance concerns, mobile computing and advanced security risks. Instituting a effective Internet and digitization strategy can serve as a catalyst that can effectively bring together the dynamics of cross-enterprise communication and summarize key, relevant data to provide critical metrics to make informed decisions.
ISO 31000 Compliance – Risk Management ISO 31000 Compliance – Risk Management Cloud processing and outsourcing add external risks to a business’ operation. The International Standards Organization (ISO) has implemented a...
Security Architect – The one position that CIOs and C-Level executives are looking to fill. With all of the recent cyber-attacks and negative publicity they have generated there is a need for this proactive position.
Most of the other positions are focused on “after the fact” monitoring. This one looks at what could happen and creates an architecture which address potential cyber-attacks and hacks. The individuals operate on a philosophy that is easier to prevent something from happening versus trying to address problems after they occur.
The individual in this position assumes responsibility for data security including the planning, design and implementation of security measures which safeguard access to enterprise terminal files and data elements. The administrator provides rapid response to user community’s request for security assistance.
They secure enterprise information by determining security requirements; planning, implementing, and testing security systems; preparing security standards, policies, and procedures; mentoring team members.
The full job description for this position has just been released.
10 Certifications for Cloud Professionals 10 Certifications for Cloud Professionals Hear are 10 certifications for Cloud professionals. Some are hardware and software specific and others are independent of hardware and...
Tenure of Telecom pros exceeds that of CIOs by 18 months
Tenure of Telecom pros – In the process of preparing for our mid-year IT salary survey, we have started to review the impact of the baby boomers who are now starting to to retire in droves. The issue that CIOs and CSOs face is wither they have the resources in place to fill those positions as these professionals retire.
Added to this is the fact that over the last several quarters the total number of job in the telecom field has shrunk significantly. This has also dampened the number of new entrants into that job market.
Preliminary data that we have seen shows that telecom salaries are not keeping up with the rest of the IT industry.
CIOs and CSOs are going to have to address succession planning for not only the telecom pros retiring, but also for the rest of the baby boomers that they have on their staffs.
When the CIOs and CSOs discuss common security concerns these five topics always seem to appear:
Surfing the web anonymously is a thing of the past – As online tracking systems become more sophisticated and harder to shake, the likelihood of private, anonymous browsing is becoming a long-ago memory. Take into account the latest ISP changes, where the U.S. government allows providers to not only track, but sell your browsing history without your consent. These changes in “net neutrality rules” require users to be more vigilant about their own browsing patterns. You can guard your activity by logging out of search engines before browsing, clearing your cache and search history, and switching to a private browser to minimize the various ways your browsing history is catalogued.
Anyone gain access your webcam – Hackers can and do target cameras by disabling the light that notifies of access, and keeping tabs in order to commit some sort of crime. Many users have responded by putting dark tape or coverings over their computer’s webcam. But as more smart devices are created and purchased, the surface area for webcam hacking only expands. Think, for example, of all the places you take your smartphone, with its built-in camera almost always pointing in your direction. The malware used to hack webcams, known as RAT (remote access Trojan), is often spread through spam email. Once clicked, the software is capable of disabling your light so you’re never made aware of anyone watching.
How to protect against identity theft – Be wary of sites asking for personal information to complete a basic task, such as subscribing to a newsletter. When submitting personal information, such as your address or payment method, check for https versus http and never submit this information to a party you’re not familiar with or for a request you don’t remember making.Protecting your identity, at its core, always comes back around to common sense behavior online. Understand risks, practice careful consuming, and taking precaution to diversify passwords and watch out for phishing schemes.
Free antivirus software is not free – You get what you pay for in the area of antivirus and malware protection. If it is free a lot of people use it and when there is a security hole – hackers will attack. That is opposed to paid programs were vendors constantly update the software to address new issues as the occur.
Are tablets, Smartphones and Macs safe without antivirus software? – Though the Android and Mac OS X boast of operating systems that claims they are tough to breach, they still contains weak access points. Just like any tool that surfs the web or connects to wireless routers, security is needed to scan all those items you click. (Recent research suggests Macs are now more vulnerable than PCs.)While these devices have often carried around the title of most-secure operating system, it doesn’t hurt to back up your devices with the latest antivirus security protection.
Wearable Device Security Concerns Wearable Device Security Concerns Wearable Device Security – Over 300,000,000 wearable devices are going to be deployed in the next several years Wearable Device Security –...
Top 10 CIO concerns Top 10 CIO concerns for the New Year Top 10 CIO concerns – Janco Associates has just completed an informal survey of 75 CIOs and...
IT related fraud and alware infections cause a number of problems. Machines become unresponsive or sluggish resulting in users become frustrated and administrators spending precious time trying to find the problem.
Once an attacker is on the inside, his or her work is significantly easier since on most networks, systems on the inside are trusted. To that end, in a review of over 300 security audits Janco has found a list of the greatest security weaknesses.
The weaknesses are:
Using only single level verification for access to sensitive data
Having public workstations or access point is connected to a secure network
Sharing login credentials
Connect to network from an unsecure access point
Corporate web site is encrypted but the login process is not
Using weak encryption for back end management
Using unencrypted or weak encryption for Web site or Web server management
Password Requirements and Management Issues Password Requirements and Management Issues The passwords should not be reused across many accounts, but should preferably be unique to each account. (single-sign-on services & password...
Women CIOs hold over 20% of all CIO roles according to data analyzed by Janco Associates
Women CIOs – In the process of capturing public data on CIO compensation, Janco has found that well over 1 out of 5 CIOs is a women.
According to the CEO of Janco Associates, at least two thirds of large public companies doing CIO searches require the recruiter to include women in the candidate pool. Further, when “all else is equal”, between a male candidate and a female one, companies are tending to choose the latter specifically to enhance the diversity of perspectives on the management team.
Unfortunately, even with this data, there are still too few women in senior, experienced roles to populate the candidate pools of all diversity-minded companies. So it’s not enough to decide at the CIO level to hire a woman. The relevant decisions must be made and opportunities offered earlier, at the developmental stage of potential finance leaders.
Companies need to provide more mentors who can share wisdom about things like where to invest time and ways to be motivated.
For those with leadership potential who prioritize family and stability over always making the best career move, the path to the C-suite may be inherently more difficult in CEO and finance than in other functions, like IT and human resources.
Number of employed rises by over 1/2 of million individuals
The initially reported number of employed individuals rises by almost 300,000 in February. At the same time, there are now over 650,000 newly employed individuals since the election.
When the data is analyzed over a long term the trend recent trend does not stand out as much.
However all of the indicators are that this is the start of an upward progression in the number of individuals employed. This is in line with the other data that we have analyzed.
“Everything you need to respond and hire as demand for IT Professionals increases” – CIO Fortune 500″
Simplify Recruiting While Making
Sure You Hire The Best IT Staff Possible
In today’s economy, nearly every organization faces pressure to reduce waste, run at peak efficiency and “do more with less”. While the economy has shown signs of improvement and the unemployment rate has dropped modestly, organizations are still extremely cautious when it comes to hiring. When it is necessary to hire, it is critical to make every hire count. There is little room for error. It is crucial for senior-level leadership, human resources and hiring managers to all be on the same page and do the right thing.
Unemployment Levels over 6% in 12 states Unemployment Levels over 6% in 12 states State Unemployment Levels Unemployment Levels by State — The National unemployment data provides a measure of the health...
Tech savy young hires talent Shortage is real for many enterprises
Tech savy young hires talent shortage is widely discussed among CIOs. The shrinking unemployment rate has drained the talent pool in many corporate IT functions and industries, and companies continually complain that they can’t find qualified staff. For Information Technology departments, the problem is different: If they were looking solely for the technical skills they wanted years ago, they would be overwhelmed with candidates. Today, though, such skills are table stakes, and the focus is on finding people who stand out because they have other desired qualities as well.
Given companies’ increasing reliance on data in decision-making, demand is soaring for a demonstrated aptitude for analytics. Even more important for the long-term success of new hires, however, are assorted “soft” skills that allow them to communicate and collaborate with others, as well as influence others’ attitudes and behaviors.
According to some CIO, there is not a shortage of finance talent per se, but there is a shortage of people who have both technical expertise and these additional skills that will enable them to work well inside an organization.
Given this shortage, IT departments are aggressively positioning themselves as employers of choice. And they can’t allow themselves the luxury of easing up on that quest, since their competitors are doing the same thing.
What are CIOs and CFOs looking for
CIOs and CFOs are telling Janco Associates they want Information Technology students who know how important application strategy will be in any IT function and who show a willingness to embrace and explore analytical tools and methods. Students don’t necessarily need to know how to code. Many companies that are successfully hiring young candidates with prowess in analytics are looking beyond traditional sources like business schools and accounting firms.
The problem is that demand for those candidates far outpaces supply. CIO should be looking for people who may not have the desired business background or professional experience but who possess the analytical skills IT pros need now and in the future.