Risk
1/17/2010
02:58 PM
Bob Evans
Bob Evans
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Global CIO: IBM Iowa's Birthday: IBM Gets $52M, But What Does Iowa Get?

IBM promised 1,300 jobs for incentives of $52M but isn't releasing hiring figures. That's not right.

Employment is always a serious subject worthy of serious consideration, particularly in these times when more than one out of 10 Americans is out of work. So it is puzzling at best and troubling at worst to see that IBM, after demanding and receiving $52 million in tax breaks and other incentives from Iowa in return for creating 1,300 jobs at a new global service center in Dubuque, will not release specific hiring figures.

What the company will say is that hiring is underway and that various projections are being met. But the concern arises from what IBM will not say, as indicated in a huge story today on the Dubuque Telegraph Herald's website. Under the headline "IBM In Dubuque, 1 Year Later", the article says:

"IBM, along with local and state leaders, all have stated employment at the Dubuque IBM center is on track with the numbers promised in the development agreement, but firm employment numbers have not been released since the location's opening," the article says.

"According to figures relayed to the TH last year, IBM planned to have the first wave of 350 to 400 employees working by the end of June 2009. The second wave of 350 to 400 workers was supposed to begin at the end of August and the full work force was set to be in place by 2010.

"In exchange for those jobs, state and local leaders agreed to a development package with $52 million in incentives for the company."

However, while the Greater Dubuque Development Corp.'s president gushed in the article about the volume of applications IBM had received—more than 8,000—he admitted he does not have specific figures on how many positions have been filled at the new global service center.

Global CIO
Global CIOs: A Site Just For You
Visit InformationWeek's Global CIO -- our new online community and information resource for CIOs operating in the global economy.

Even more odd is that the state's Economic Development Department, which played a big hand in structuring and doling out the $52 million incentive package, has also not received specific job figures from IBM, according to the article:

Iowa Economic Development Department spokeswoman Kay Snyder said IBM's annual reporting date is June 30. At the reporting date last year, she said the contract was still in negotiation and was not signed.

"We definitely are in communication with IBM and we do understand ... they are on schedule, if not ahead of schedule, and we're pleased with that," she said. Snyder said the department has project managers who keep in touch with companies throughout the year to monitor staffing levels.

So let's see what we've got here: the head of the Greater Dubuque Development Corp., who lavishes praise on IBM and its efforts as if he gets paid per compliment, doesn't have any details on hiring levels, and he's got a whole lotta skin in this game.

The state agency overseeing economic development says it doesn't have any concrete details from IBM but is nevertheless "pleased" with "communication" indicating that IBM is on or even ahead of schedule. That's quite a trick—must be something they teach only in economic-development classes.

And what does IBM itself have to say about its staffing-up progress in Dubuque? From the TH article:

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4594
Published: 2014-10-25
The Payment for Webform module 7.x-1.x before 7.x-1.5 for Drupal does not restrict access by anonymous users, which allows remote anonymous users to use the payment of other anonymous users when submitting a form that requires payment.

CVE-2014-0476
Published: 2014-10-25
The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.

CVE-2014-1927
Published: 2014-10-25
The shell_quote function in python-gnupg 0.3.5 does not properly quote strings, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "$(" command-substitution sequences, a different vulnerability than CVE-2014-1928....

CVE-2014-1928
Published: 2014-10-25
The shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "\" (backslash) characters to form multi-command sequences, a different vulner...

CVE-2014-1929
Published: 2014-10-25
python-gnupg 0.3.5 and 0.3.6 allows context-dependent attackers to have an unspecified impact via vectors related to "option injection through positional arguments." NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.