
Mary Shacklett
Writer at Freelance
CEO, Transworld Data--IT industry research and analysis firm Prior: VP, Technology, FSI Intl VP Software, Summit Systems MA, USC; BS, Univ of Wisconsin
Articles
-
2 days ago |
informationweek.com | Mary Shacklett
More enterprises have moved to pay-for-performance salary and promotion models that measure progress toward goals -- but how do you measure goals for a maintenance programmer who barrels through a request backlog but delivers marginal value for the business, or for a business analyst whose success is predicated on forging intangibles like trust and cooperation with users so things can get done?
-
1 week ago |
networkcomputing.com | Mary Shacklett
Enterprises are realizing they might need more ammunition in their never-ending battle against ransomware. Enter network forensics, a branch of digital forensics. Network forensics practitioners are the detectives of network security, focused on monitoring and evaluating all the digital traffic on a network. Their goal is to uncover information about intrusions, such as malware, and to gather legal evidence in the event of a court case.
-
1 week ago |
informationweek.com | Mary Shacklett
The average age of a CIO is 55, so most have already had some thoughts about retirement and what they want their legacy to be. What do CIOs value for their lasting career contributions? I’ve had this conversation with many CIOs, and I’ve considered the matter myself. Predictably, the answers are not of a one-size-fits-all variety. Here is what I’ve learned from other CIOs about what they wanted to feel they achieved: 1.
-
2 weeks ago |
informationweek.com | Mary Shacklett
An AI integration modifies a business process and how employees work, but it also requires an integration with IT infrastructure and systems. This is where some of IT’s most technically savvy staff will be working, and they will want to discuss technology integration approaches and ideas.
-
2 weeks ago |
informationweek.com | Mary Shacklett
In February 2024, CNN reported, “A finance worker at a multinational firm was tricked into paying out $25 million to fraudsters using deepfake technology to pose as the company’s chief financial officer in a video conference call.” In Europe, a second firm experienced a multimillion-dollar fraud when a deepfake emulated a board member in a video allegedly approving a fraudulent transfer of funds. “Banks and financial institutions are particularly at risk,” said The Hack Academy.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →X (formerly Twitter)
- Followers
- 350
- Tweets
- 179
- DMs Open
- No

Writing a disaster recovery plan has been the responsibility of IT departments for years--but now these plans must be recalibrated to failover for edge and cloud environments.

The digital twin is the grandchild of early flight simulation models that were first used by the NASA Flight Search Division before the start of the space program. It is a product of data scientists, subject matter experts, IT, big data and analytics.

The use of drones and IoT in field operations has enormous potential. The technology is there, but the legal and regulatory fields still need to catch up.