Profile of James M. ConnollyExecutive Managing Editor, InformationWeekEditor in Chief
Member Since: 11/18/2013
News & Commentary Posts: 245
Jim Connolly is a versatile and experienced technology journalist who has reported on IT trends for more than two decades. As Executive Managing Editor of InformationWeek, he oversees the day-to-day planning and editing on the site. Most recently he has been editor of UBM's All Analytics. He has written about enterprise computing, data analytics, the PC revolution, the evolution of the Internet, networking, IT management, and the ongoing shift to cloud-based services and mobility. He has covered breaking industry news and has led teams focused on product reviews and technology trends. Throughout most of his tech journalism career, he has concentrated on serving the information needs of IT decision-makers in large organizations and has worked with those managers to help them learn from their peers and share their experiences in implementing leading-edge technologies through such publications as Computerworld. Jim also has helped to launch a technology-focused startup, as one of the founding editors at TechTarget, and has served as editor of an established news organization focused on technology startups and the Boston-area venture capital sector at MassHighTech.
Articles by James M. Connolly
posted in August 2017
Measuring the end-to-end DevOps value stream is the key to delivering value and tracking its ROI and allocating resources.
As hackers continue ramping up their attacks everyone involved in IoT -- manufacturers, integrators, and customers -- has to improve their defenses.
The evolution of artificial intelligence promises massive changes in how commerce gets done and customer relationships.
Organizations love metrics, particularly those that show success, but it's crucial to define metrics that truly track progress toward corporate goals.
Beware the overly optimistic ROI estimate when it comes to an automation initiative.
CIOs need to help leaders understand how AI will really impact their spaces and take steps to using AI to help achieve long-term business objectives.
Transforming to a microservices architecture requires coordination across all disciplines. It won't be easy, but it promises plenty of benefits.
The experience of Angelina Jolie highlights how cloud computing can help address cancer by cutting the cost of genomic sequencing and enabling data sharing.
It makes sense to involve IT security with DevOps, but the integration isn't as easy as it sounds.
There are three keys to embarking on a successful OpenStack initiative.
The likelihood of a company suffering a breach is worse than most believe. Here's a checklist for building out a plan to deal with a breach.
As more enterprises discover AI-based business applications, the concept of transfer learning could help to level the playing field.
Every technology initiative -- in fact many business changes -- will run into resistance from people. Here are three steps to overcoming that resistance.
IT organizations are quick to talk about hardware failures, software failures, and outages, but so often the cause of IT failures can be pinned on people.
For all of the talk about IT playing a key role in innovation, those maintenance tasks that "keep the train running" don't leave much time for innovation.
The journey to digital transformation isn't just a technology initiative, it's about remaking the business.
In any IT project scope creep can act as a noxious weed, leading to project bloat, extra costs and time delays.
Yes, user feedback about an app is useful, but only to a degree. Here are some other ways to evaluate an app.
Getting ready for GDPR now will allow ample time for testing and assessing the new protocols, hiring the right data protection officer and ensuring they are operating effectively.
Today’s business challenges require diverse teams with new competencies, including the ability to collaborate effectively across organizational borders.
High dimensional data is our greatest asset in learning from data sets with hundreds, even thousands, of variables.
With cyberattacks becoming more common, and natural and man-made disasters not going away, disaster recovery programs are more important than ever.