Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:32 AM
Bob Evans
Bob Evans

Global CIO: The 50 Top Tech Quotes For 2009, Part II

"Take two of the five most-profitable businesses in China: they don't pay for their software." We've got 24 more great quotes in Part II of our best of 2009.

Try this excerpt on for size: "The real understanding of critical business issues among too many CIOs is just poor. And that's not cause they want it to be poor but it's the weight of all this other stuff and the time and budget it consumes."

And you think *your* processing and storage problems are bad? Check this out: "In its first hour alone, the [telescope] will generate more information than that currently held in the entire World Wide Web."

From the geopoliticotechno front, there's this beauty (and I couldn't agree more with the sentiment): "It also is clear that this is an attempt to use MySQL as a cover-up to a political agenda. It is protectionism at its worst. The EU is entering deep water here, water that it clearly does not adequately understand."

Global CIO
Global CIOs: A Site Just For You
Visit InformationWeek's Global CIO -- our new online community and information resource for CIOs operating in the global economy.

As these snippets demonstrate, our two-part collection of the Top 50 Tech Quotes Of 2009 isn't just a patchwork of snazzy put-downs but instead serves as a Rohrshach image of how the CIO profession and the IT business in general stand here on the verge of 2010.

In selecting these 50 verbal images and offering them in chronological order, we also hope to provide you with a sense of context for the year that is about to end: the key issues, challenging questions, emerging trends, and even Bill Gates doing a bit of on-stage comedy (believe it).

We hope you enjoy this list, and as I mentioned with our first batch yesterday, please feel free to send in your own favorites and we'll be sure to publish them. Enjoy Part II.

Aug. 13: Chrevron CIO Louie Ehrlich: "One example I always like to give is about our Pascagoula refinery, where every second more than 60,000 valves are controlled by IT. It's a complex manufacturing plant that requires significant automation. Yet another example is the role IT plays in optimizing our supply, all the way down to automating the refilling logistics on storage tanks at our retail facilities. There is not a single piece of business that doesn't have some kind of technology enablement. In some cases, without technology there simply is no other way to do it."

From Global CIO: Chevron's IT Transformation: A Tech Company In The Energy Business


Sept. 3: Citrix CEO Mark Templeton: "But I think we're getting to the point where the confluence of technologies like virtualization and data centers and the cloud and networks and client devices are intersecting with flat IT budgets, and those two things are intersecting with the consumerization of IT where your experience with technology at home is so much better than it is at work, and on top of that you've got the situation where the real understanding of critical business issues among too many CIOs is just poor. And that's not cause they want it to be poor but it's the weight of all this other stuff and the time and budget it consumes—I just don't think that model can last," Templeton says.

From Global CIO: Citrix CEO Templeton On Killing IT Inertia Before It Kills You


Sept. 12: IBM VP and Global Leader for IBM's Institute for Business Value Peter Korsten: "These transformative CIOs in the top one-third are all about innovation, and by that I don't mean they like to talk about it—they really do it. They make it very real," said Korsten in a phone interview. "They also know they are competing, often very aggressively, for investment dollars from the company with other executives in the company—they know this is an investment game, so they've got to be all about ROI in order to get the funding for their transformative projects. They need to be able to prove what they can deliver, and then deliver it."

From Global CIO: IBM's Massive Study Says Future Belongs To High-Growth CIOs


Sept. 14: Last year, CIO Michael Harte earned $2.8 million at Commonwealth Bank. This year, 40% of his total compensation—based on $2.8 million, that would be $1.12 million—will be tied to customer satisfaction. . . . Executive general manager Nick "At the end of the year if I haven't achieved my targets in that respect then potentially 40 per cent of my pay will disappear. As an individual that helps to focus the mind on a daily basis around understanding what needs to be done to deliver the right outcome, not just go through the motions and see the service level agreement as something that 'oh as long as we're operating at the service level, we're ok'," [Commonwealth Executive general manager Nicholas] Holdsworth said. From Global CIO: Why CEOs Must Tie CIO Pay To Customers And Growth


Sept. 17: Oracle president Safra Catz said Oracle's database revenue grew more slowly than normal in Q1 in large part because of slumping sales via some Oracle resellers, "most notably SAP, who is selling less database because its applications business is down 40%." Yikes—you don't often see Oracle spank its own customers, but then again SAP is no doubt a very special case.

From Oracle Zaps SAP's Apps Slump


Sept. 20, on the computer system IBM is developing for an enormous new telescope: "In its first hour alone, the SKA [telescope] will generate more information than that currently held in the entire World Wide Web," said the commerce minister for Australia, which along with South Africa is competing for the Square Kilometer Array telescope to be supported by the ultra-powerful computer IBM is charged with developing.

(Same item:) "IBM is researching an exaflop machine with the processing power of about one billion PCs. The machine will be used to help process the Exabyte of data per day expected to flow off the Square Kilometre Array (SKA) telescope project. The company is also researching solid state storage technology called 'racetrack memory' which is much faster and denser than flash and may hold the secret to storing the data from the SKA. The story also says that the SKA is unlikely to use grid computing or a cloud-based approach to processing the telescope data due to challenge in transferring so much data (about one thousand million 1Gb memory sticks each day)."

From IBM System Must Handle Each Hour More Data Than In World Wide Web

1 of 3
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
SOC 2s & Third-Party Assessments: How to Prevent Them from Being Used in a Data Breach Lawsuit
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC,  12/5/2019
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "This is the last time we hire Game of Thrones Security"
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-09
An unsafe deserialization vulnerability exists in CA Release Automation (Nolio) 6.6 with the DataManagement component that can allow a remote attacker to execute arbitrary code.
PUBLISHED: 2019-12-09
The CreateID function in packet.py in pyrad before 2.1 uses sequential packet IDs, which makes it easier for remote attackers to spoof packets by predicting the next ID, a different vulnerability than CVE-2013-0294.
PUBLISHED: 2019-12-09
mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.
PUBLISHED: 2019-12-09
SQL injection vulnerability in Accentis Content Resource Management System before the October 2015 patch allows remote attackers to execute arbitrary SQL commands via the SIDX parameter.
PUBLISHED: 2019-12-09
Cross-site scripting (XSS) vulnerability in Accentis Content Resource Management System before October 2015 patch allows remote attackers to inject arbitrary web script or HTML via the ctl00$cph_content$_uig_formState parameter.