Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:32 AM
Bob Evans
Bob Evans

Global CIO: The 50 Top Tech Quotes For 2009, Part II

"Take two of the five most-profitable businesses in China: they don't pay for their software." We've got 24 more great quotes in Part II of our best of 2009.

Try this excerpt on for size: "The real understanding of critical business issues among too many CIOs is just poor. And that's not cause they want it to be poor but it's the weight of all this other stuff and the time and budget it consumes."

And you think *your* processing and storage problems are bad? Check this out: "In its first hour alone, the [telescope] will generate more information than that currently held in the entire World Wide Web."

From the geopoliticotechno front, there's this beauty (and I couldn't agree more with the sentiment): "It also is clear that this is an attempt to use MySQL as a cover-up to a political agenda. It is protectionism at its worst. The EU is entering deep water here, water that it clearly does not adequately understand."

Global CIO
Global CIOs: A Site Just For You
Visit InformationWeek's Global CIO -- our new online community and information resource for CIOs operating in the global economy.

As these snippets demonstrate, our two-part collection of the Top 50 Tech Quotes Of 2009 isn't just a patchwork of snazzy put-downs but instead serves as a Rohrshach image of how the CIO profession and the IT business in general stand here on the verge of 2010.

In selecting these 50 verbal images and offering them in chronological order, we also hope to provide you with a sense of context for the year that is about to end: the key issues, challenging questions, emerging trends, and even Bill Gates doing a bit of on-stage comedy (believe it).

We hope you enjoy this list, and as I mentioned with our first batch yesterday, please feel free to send in your own favorites and we'll be sure to publish them. Enjoy Part II.

Aug. 13: Chrevron CIO Louie Ehrlich: "One example I always like to give is about our Pascagoula refinery, where every second more than 60,000 valves are controlled by IT. It's a complex manufacturing plant that requires significant automation. Yet another example is the role IT plays in optimizing our supply, all the way down to automating the refilling logistics on storage tanks at our retail facilities. There is not a single piece of business that doesn't have some kind of technology enablement. In some cases, without technology there simply is no other way to do it."

From Global CIO: Chevron's IT Transformation: A Tech Company In The Energy Business


Sept. 3: Citrix CEO Mark Templeton: "But I think we're getting to the point where the confluence of technologies like virtualization and data centers and the cloud and networks and client devices are intersecting with flat IT budgets, and those two things are intersecting with the consumerization of IT where your experience with technology at home is so much better than it is at work, and on top of that you've got the situation where the real understanding of critical business issues among too many CIOs is just poor. And that's not cause they want it to be poor but it's the weight of all this other stuff and the time and budget it consumes—I just don't think that model can last," Templeton says.

From Global CIO: Citrix CEO Templeton On Killing IT Inertia Before It Kills You


Sept. 12: IBM VP and Global Leader for IBM's Institute for Business Value Peter Korsten: "These transformative CIOs in the top one-third are all about innovation, and by that I don't mean they like to talk about it—they really do it. They make it very real," said Korsten in a phone interview. "They also know they are competing, often very aggressively, for investment dollars from the company with other executives in the company—they know this is an investment game, so they've got to be all about ROI in order to get the funding for their transformative projects. They need to be able to prove what they can deliver, and then deliver it."

From Global CIO: IBM's Massive Study Says Future Belongs To High-Growth CIOs


Sept. 14: Last year, CIO Michael Harte earned $2.8 million at Commonwealth Bank. This year, 40% of his total compensation—based on $2.8 million, that would be $1.12 million—will be tied to customer satisfaction. . . . Executive general manager Nick "At the end of the year if I haven't achieved my targets in that respect then potentially 40 per cent of my pay will disappear. As an individual that helps to focus the mind on a daily basis around understanding what needs to be done to deliver the right outcome, not just go through the motions and see the service level agreement as something that 'oh as long as we're operating at the service level, we're ok'," [Commonwealth Executive general manager Nicholas] Holdsworth said. From Global CIO: Why CEOs Must Tie CIO Pay To Customers And Growth


Sept. 17: Oracle president Safra Catz said Oracle's database revenue grew more slowly than normal in Q1 in large part because of slumping sales via some Oracle resellers, "most notably SAP, who is selling less database because its applications business is down 40%." Yikes—you don't often see Oracle spank its own customers, but then again SAP is no doubt a very special case.

From Oracle Zaps SAP's Apps Slump


Sept. 20, on the computer system IBM is developing for an enormous new telescope: "In its first hour alone, the SKA [telescope] will generate more information than that currently held in the entire World Wide Web," said the commerce minister for Australia, which along with South Africa is competing for the Square Kilometer Array telescope to be supported by the ultra-powerful computer IBM is charged with developing.

(Same item:) "IBM is researching an exaflop machine with the processing power of about one billion PCs. The machine will be used to help process the Exabyte of data per day expected to flow off the Square Kilometre Array (SKA) telescope project. The company is also researching solid state storage technology called 'racetrack memory' which is much faster and denser than flash and may hold the secret to storing the data from the SKA. The story also says that the SKA is unlikely to use grid computing or a cloud-based approach to processing the telescope data due to challenge in transferring so much data (about one thousand million 1Gb memory sticks each day)."

From IBM System Must Handle Each Hour More Data Than In World Wide Web


Recommended Reading:

1 of 3
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-12
A local, arbitrary code execution vulnerability exists in the SplitCompat.install endpoint in Android's Play Core Library versions prior to 1.7.2. A malicious attacker could create an apk which targets a specific application, and if a victim were to install this apk, the attacker could perform a dir...
PUBLISHED: 2020-08-11
A Cross-Site Request Forgery (CSRF) vulnerability was discovered in the System Management Interface Web component of Avaya Aura Communication Manager and Avaya Aura Messaging. This vulnerability could allow an unauthenticated remote attacker to perform Web administration actions with the privileged ...
PUBLISHED: 2020-08-11
An issue was discovered in certain configurations of GNOME gnome-shell through 3.36.4. When logging out of an account, the password box from the login dialog reappears with the password still visible. If the user had decided to have the password shown in cleartext at login time, it is then visible f...
PUBLISHED: 2020-08-11
django-celery-results through 1.2.1 stores task results in the database. Among the data it stores are the variables passed into the tasks. The variables may contain sensitive cleartext information that does not belong unencrypted in the database.
PUBLISHED: 2020-08-11
There is a possible out of bounds read due to an incorrect bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-152225183