The Twin Challenges of Succeeding as CIO

Throughout my career, I’ve made it a point to understand every aspect of the business I’m in, and understand what the customer wants from my business. Growing up in a small town in the South, I was fortunate to have been raised by my grandfather, who owned and operated a

When a Project’s ROI Can’t Be Pinpointed

We spend a lot of time at Baseline thinking about the business case—the often-sensible requirement that technology initiatives must be demonstrable winners, paying for themselves by returning more cash than they consume. These sorts of analyses not only let companies choose among technology initiatives, they put such initiatives on an

Bad Software Can “Enronize” Anyone

“Kenny Boy” Lay and his cohorts at Enron sold the world on a badly flawed company, whose innards were twisted beyond reclamation, but were beyond their responsibility. Or so they would claim. So, in the extreme, can it be with companies producing defective computer software. What is the difference between

Voice of Experience: Charles Irsch, Centex Homes

Charles IrschCentex HomesVice President, Information SystemsDallas, Texaswww.centexhomes.com Manager’s Profile: Irsch held a variety of information technology posts and worked as a consultant at Arthur Andersen & Co. before joining Centex in 1996. He holds B.A. and M.B.A. degrees from Southern Methodist University in Dallas. Why He’s Using CRM: Data consolidation.

Getting a Handle on Biometrics

What is it?In today’s usage, technology that uses unique biological attributes, such as fingerprints or iris patterns, to identify a person. How does it work?A system consists of an input or reader device, stored biometric data on known users and software that performs matches. Rather than storing a complete picture

Can Tech Protect Food from Terror Attacks?

American consumers may always have harbored a low-level worry that the produce they buy will be less than fresh, or the raw meat tainted with some naturally occurring bacteria. But now, in a world that suggests threats from terrorists almost anywhere, the food industry appears particularly vulnerable. Yet, only now

Upgrading from SAP R/3 to mySAP

This timeline and chart show the tasks and labor costs involved in upgrading a core enterprise application systemfrom a client/server architecture to a Web-based one. The example is based on a large manufacturing company that, like Osram Sylvania,is upgrading from SAP R/3 to mySAP. The project involves offering the new

How Allfirst Trader Fudged Data

Allied Irish Bank on Thursday spelled out its accusations against former Allfirst Financial currency trader John Rusnak in the wake of a scandal that lost the AIB subsidiary $691 million. AIB’s report of an internal investigation accuses Rusnak of “manipulating the weak control environment in Allfirst’s treasury; notably, he found

Inside WorldCom’s Billing Blunders

Four years after telecommunications giant WorldCom acquired long-distance sibling MCI for $34.7 billion, the company continues to face significant hurdles in providing large customers with a single, accurate bill for its services. While billing is a challenge for all top-tier telecommunications companies—a situation aggravated by mass mergers and the growing

Auditor or Consultant? Time to Choose

The Enron implosion seems to have proven that it’s not smart to use the same company as your auditor that you use for consulting work. But what if you’re already in that position—if your auditor is already your information technology consultant? Do you just boot it out? Some companies—such as