Pointers: Recommended reading 11-03-08

LinkedIn: How much is too much?
Source: CIO magazine

A LinkedIn spokeswoman recently said users should think more about the quality rather than the quantity of their LinkedIn connections, CIO magazine reports.

Ideally, you should be able to ask a current connection for a note of introduction to any of that person’s connections. But if you don’t know that person well, how do you know whether that introduction will carry any weight — or worse yet, that it won’t have a negative impact?

Also, you run the risk of having a boss or colleague find noncredible contacts on your list. “Being connected with someone you don’t know won’t give you much credibility with the people you do know and are connected with,” the spokeswoman said.

IT budgets in tough times
Source: NetworkWorld

Network World asked experts for tips on how information technology departments can reduce costs during tough economic times. Some tips would not be practical for agencies, such as flattening the organization, but others would.

One idea is to take a fresh look at contractors’ invoices. “An example would be if your wireless vendor agreed to give you free shipping when it sends new cell phones to remote workers,” the article states. “A few months later, shipping charges might start appearing on your cell phone bill, and if you don’t check, you’ll never know.” Another idea is to buy a telecommunications expense management service, “which pays for itself and more.”

IT and the transition
Source: Navy CIO blog

Navy Chief Information Officer Robert Carey discusses how federal information technology leaders can contribute to the upcoming change in administrations.

Besides addressing the necessary IT management challenges that come with the transition, Carey encourages readers to consider how technology might help people who must manage the process.

“Collaboration sites, such as wikis, offer a place to collect an agency’s pertinent information,” Carey writes. “This information can then be made available (in a controlled way) to a broad audience, which affords a smoother and faster transition.”

The state CIO priority list
Source: NASCIO

The National Association of State Chief Information Officers released its annual list of policy and technology priorities based on a survey of state CIOs.

The three top priorities have a common theme: saving money. The first priority is consolidation, which includes centralizing services, operations and resources. The second is the use of shared services across organizations. Priority No. 3? It’s budget and cost control.

Along hose lines, the top technology priority is virtualization. Othe technologies on the list include document/content/e-mail management, Web 2.0, green IT and identity management.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.


  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group