Best Practices


CIO_Career_Coach
video

CIO Career Coach: Become an Enterprise Leader

Martha Heller offers advice for how to develop the courage to become an enterprise leader.

CIO_Career_Coach
video

CIO Career Coach: Be A Good Story Teller

Stories are the most powerful communication devices available. Tell better stories, and you’ll become a better CIO.

chromebook chrome os

A Chromebook can increase the protection of air-gapped computers

Thanks to WikiLeaks, we now know air gapping is insufficient. But all is not lost, a Chromebook can pump up the protection of air-gapped computers.

ciocc 06
video

CIO Career Coach: Creating an IT Investment Culture

Martha Heller showcases what it takes to create an IT investment culture.

Martha Heller
video

CIO Career Coach: Rethink Shadow IT

How CIOs can shift their approach to shadow IT.

ciocc se2 004 titlefix.00 00 02 09.still001
video

CIO Career Coach: Driving Operational Change

CIO.com blogger Martha Heller discusses how it is the CIO’s job to create change at the operational layer so that systems deliver their expected value.

ciocc pt3.00 00 02 05.still001
video

CIO Career Coach: Bringing a product management mindset to IT

In a world where software drives revenue for many organizations, CIO.com blogger Martha Heller demonstrates the importance of bringing a product management mindset to IT.

traceroute double nat

Bookmarking some IP addresses now provides easy DNS debugging later

DNS is a world-wide system that translates the name of computers on the Internet into their underlying IP address. A problem with DNS can make an otherwise functional Internet connection appear to be broken. It's easy to test an...

screen shot 2017 05 01 at 1.50.42 pm
video

CIO Career Coach: Changing the culture in IT

If you don't own your organization's culture, one will manifest itself. And changes need to come from the top. CIO.com contributor Martha Heller discusses the challenges IT leaders face when shaping the culture.

finger on keyboard with email icons floating out of monitor

Defensive Computing for email attachments

Email attachments are the modern Trojan Horse and need to be treated as such.

Load More