Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:32 AM
Bob Evans
Bob Evans

Global CIO: The 50 Top Tech Quotes For 2009, Part II

"Take two of the five most-profitable businesses in China: they don't pay for their software." We've got 24 more great quotes in Part II of our best of 2009.

Try this excerpt on for size: "The real understanding of critical business issues among too many CIOs is just poor. And that's not cause they want it to be poor but it's the weight of all this other stuff and the time and budget it consumes."

And you think *your* processing and storage problems are bad? Check this out: "In its first hour alone, the [telescope] will generate more information than that currently held in the entire World Wide Web."

From the geopoliticotechno front, there's this beauty (and I couldn't agree more with the sentiment): "It also is clear that this is an attempt to use MySQL as a cover-up to a political agenda. It is protectionism at its worst. The EU is entering deep water here, water that it clearly does not adequately understand."

Global CIO
Global CIOs: A Site Just For You
Visit InformationWeek's Global CIO -- our new online community and information resource for CIOs operating in the global economy.

As these snippets demonstrate, our two-part collection of the Top 50 Tech Quotes Of 2009 isn't just a patchwork of snazzy put-downs but instead serves as a Rohrshach image of how the CIO profession and the IT business in general stand here on the verge of 2010.

In selecting these 50 verbal images and offering them in chronological order, we also hope to provide you with a sense of context for the year that is about to end: the key issues, challenging questions, emerging trends, and even Bill Gates doing a bit of on-stage comedy (believe it).

We hope you enjoy this list, and as I mentioned with our first batch yesterday, please feel free to send in your own favorites and we'll be sure to publish them. Enjoy Part II.

Aug. 13: Chrevron CIO Louie Ehrlich: "One example I always like to give is about our Pascagoula refinery, where every second more than 60,000 valves are controlled by IT. It's a complex manufacturing plant that requires significant automation. Yet another example is the role IT plays in optimizing our supply, all the way down to automating the refilling logistics on storage tanks at our retail facilities. There is not a single piece of business that doesn't have some kind of technology enablement. In some cases, without technology there simply is no other way to do it."

From Global CIO: Chevron's IT Transformation: A Tech Company In The Energy Business


Sept. 3: Citrix CEO Mark Templeton: "But I think we're getting to the point where the confluence of technologies like virtualization and data centers and the cloud and networks and client devices are intersecting with flat IT budgets, and those two things are intersecting with the consumerization of IT where your experience with technology at home is so much better than it is at work, and on top of that you've got the situation where the real understanding of critical business issues among too many CIOs is just poor. And that's not cause they want it to be poor but it's the weight of all this other stuff and the time and budget it consumes—I just don't think that model can last," Templeton says.

From Global CIO: Citrix CEO Templeton On Killing IT Inertia Before It Kills You


Sept. 12: IBM VP and Global Leader for IBM's Institute for Business Value Peter Korsten: "These transformative CIOs in the top one-third are all about innovation, and by that I don't mean they like to talk about it—they really do it. They make it very real," said Korsten in a phone interview. "They also know they are competing, often very aggressively, for investment dollars from the company with other executives in the company—they know this is an investment game, so they've got to be all about ROI in order to get the funding for their transformative projects. They need to be able to prove what they can deliver, and then deliver it."

From Global CIO: IBM's Massive Study Says Future Belongs To High-Growth CIOs


Sept. 14: Last year, CIO Michael Harte earned $2.8 million at Commonwealth Bank. This year, 40% of his total compensation—based on $2.8 million, that would be $1.12 million—will be tied to customer satisfaction. . . . Executive general manager Nick "At the end of the year if I haven't achieved my targets in that respect then potentially 40 per cent of my pay will disappear. As an individual that helps to focus the mind on a daily basis around understanding what needs to be done to deliver the right outcome, not just go through the motions and see the service level agreement as something that 'oh as long as we're operating at the service level, we're ok'," [Commonwealth Executive general manager Nicholas] Holdsworth said. From Global CIO: Why CEOs Must Tie CIO Pay To Customers And Growth


Sept. 17: Oracle president Safra Catz said Oracle's database revenue grew more slowly than normal in Q1 in large part because of slumping sales via some Oracle resellers, "most notably SAP, who is selling less database because its applications business is down 40%." Yikes—you don't often see Oracle spank its own customers, but then again SAP is no doubt a very special case.

From Oracle Zaps SAP's Apps Slump


Sept. 20, on the computer system IBM is developing for an enormous new telescope: "In its first hour alone, the SKA [telescope] will generate more information than that currently held in the entire World Wide Web," said the commerce minister for Australia, which along with South Africa is competing for the Square Kilometer Array telescope to be supported by the ultra-powerful computer IBM is charged with developing.

(Same item:) "IBM is researching an exaflop machine with the processing power of about one billion PCs. The machine will be used to help process the Exabyte of data per day expected to flow off the Square Kilometre Array (SKA) telescope project. The company is also researching solid state storage technology called 'racetrack memory' which is much faster and denser than flash and may hold the secret to storing the data from the SKA. The story also says that the SKA is unlikely to use grid computing or a cloud-based approach to processing the telescope data due to challenge in transferring so much data (about one thousand million 1Gb memory sticks each day)."

From IBM System Must Handle Each Hour More Data Than In World Wide Web

1 of 3
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.