How IT innovation and mobility empower Unilever
- 21 August, 2012 20:54
If you're a CIO worried about enabling your company's expansion and success in emerging markets or if you're trying to capitalize on cloud and mobile technologies to improve speed to market and shorten cycle times, you'd do well to make the acquaintance of Rod Hefford. Hefford is CIO for Global Customer Development and Supply Chain at Unilever, the joint British-Dutch company whose 400-plus products are used daily by some 2 billion consumers in nearly 200 countries.
In this installment of the IDG Enterprise CIO Interview Series, Hefford talked to Chief Content Officer John Gallant about how IT at Unilever is organized to drive innovation globally -- leveraging tech talent around the world -- and helping improve execution in local markets from Brazil and India to Europe and the U.S. He also explains how mobility is empowering 'feet on the street' everywhere to respond to changing market conditions and customer needs, and fostering a virtuous cycle of improvement.
Hefford is a member of the CIO Executive Council -- IDG Enterprise's peer-based global community of leading CIOs. For more information on the Council, click here.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
New Demands for Real-time Threat Management
Many organisations are evaluating a new security model based upon IT risk management best practices. This is a good idea, but not enough for today’s dynamic and malevolent threat landscape. To keep up with IT changes and external threats, large organisations need to embrace two new security practices: real-time risk management for day-to-day security adjustments and real-time threat management to detect and remediate sophisticated, stealthy, and damaging security breaches (i.e., advanced persistent threats, or APTs). Learn more.
BYOD and Beyond - Implementing a Unified Access Solution
The rise of BYOD programs is the single most radical shift in the economics of client computing for business since PCs invaded the workplace. Whether you are contemplating the creation of a BYOD program or currently trying to establish one, this fact cannot be overstated. Find out how to overcome these challenges.
NetApp FAS6240 Clustered SAN Champion of Champions
Storage systems today must match agility with diversified I/O performance to satisfy an enterprise’s changing needs. In their review, Silverton Consulting ranks the NetApp FAS6240 Clustered SAN, as an Enterprise OLTP “Champion of Champions.” Read the results of their benchmark testing and the features that impressed them the most.