- Budgeting, Planning & Forecasting
- Enterprise Accounting Software
- Financial Management Solutions
- Small and Medium Sized Business Accounting Software
- Treasury, Cash and Risk Management
- Business Activity Monitoring (BAM)
- Business Intelligence Software
- Business Process Management (BPM)
- Enterprise Performance Management
- Reporting and End-User Query Tools
- RFID-- Radio Frequency Identification
- Warehouse Management Software
- Customer Experience Management (CEM)
- Customer Information Management
- Sales and Marketing Software
- Enterprise Asset Management (EAM)
- Facilities Management and Maintenance
- Electronic Medical Billing Systems
- Healthcare Inventory Management
- Employee Benefits Administration
- Employee Relationship Management (ERM)
- Learning Management Systems (LMS)
- Workforce Planning and Management
- Human Resources and Payroll Software
- Enterprise Content Management
- Information Lifecycle Management
- Advanced Planning and Scheduling
- Manufacturing Enterprise Resource Planning (MERP)
- Integrated Manufacturing Solutions
- Product Life Cycle Management (PLM)
- Project Management Solutions
- Resource Planning and Scheduling
- Web, Video and Audio Conferencing
- Database Planning and Implementation
- Cloud Computing Applications
- Enterprise Application Integration
- Enterprise Application Integration Middleware
- Service Oriented Architecture (SOA)
- Business Service Management (BSM)
- Business Technology Optimization
- Enterprise Architecture Management (EAM)
- Enterprise Resource Management
- Enterprise Resource Planning (ERP)
- Information Technology Infrastructure Library (ITIL)
- IT Service Management (ITSM)
- Project Portfolio Management (PPM)
- Technology Planning and Analysis
- BYOD (Bring Your Own Device)
- Managed Service Provider (MSP)
- Network Configuration Management Software
- Fraud Detection & Prevention
- Intrusion Detection and Prevention
- IT Security Frameworks and Standards
- Threat and Vulnerability Management
- Virtual Private Network Security
- Data Center & Storage Solutions
- Network Attached Storage (NAS)
- Remote and Offsite Data Storage
- SAN Virtualization and Consolidation
- Application Lifecycle Management (ALM)
- Application Performance Management (APM)
- Enterprise Systems Management
- Systems Modeling and Analysis
- Performance Monitoring Tools
- Software Configuration Management (SCM)
- Software as a Service (SaaS)
- Web Applications Architecture
- Wireless Application Development
- Electronic Catalog Management
- Electronic Commerce Interchange (EDI-XML)
- Data Center Power Management
- Software-Defined Data Center (SDDC)
Posted by Martin Veitch
on June 24 2016
Politico reports that Apple CEO Tim Cook will co-host a fundraising event with House Speaker Paul Ryan next week, suggesting this is part of the company’s attempts to stay tight with the Republican party. The strategy, it says, is complicated by Apple’s reportedly recent distancing itself from presidential candidate Donald Trump. But a bigger question looms above all of this manoeuvring and glad-handing: what on earth are technology companies doing by aligning themselves with political figures?
Companies tend to play down political donations by sometimes paying both major parties and sometimes the spending comes from wealthy individuals within the company. But that doesn’t take away from the main point here: it’s a murky practice that shouldn’t go on. One person, one vote is at the heart of the democratic system. By providing significant sums in funding political interests the tech sector is effectively gaming that system in order to win favour and shade influence.
Almost as bad, many tech companies stand accused of not being transparent in their disclosure of donations, often given from so called PACs – political action committees. Perhaps they think it’s unimportant as the sums donated are trivial compared to their vast treasure troves, but contributions can run to millions of dollars, not including lobbying spending.
At the very least this practice casts doubts on the motives of corporate donors and politicians. If, say, a security software company donates to a politician who then becomes an influential purse holder and decision maker on cybersecurity, how can we know that person is acting out of conviction or with one eye on the desires of his or her benefactor?
Of course businesses lining the pockets of politics is nothing new but technology, as befits its reputation for dynamism, innovation and change, should take a leading role here. One action might be a simple concord among the rich and powerful tech elite. And that is that it stops here - no more political donations.
Also read:
US border control wants more drones
PREVIOUS ARTICLE
«VR ‘gimmick’ trap: How can businesses identify their VR ‘gaps’?NEXT ARTICLE
The real meaning of…3G and 4G»
Phil Muncaster reports on China and beyond
wishful thinking, I guess
great article. as a CIO with over 20 years experience, best test any CIO can do before transitioning to another job, take a vacation for two...
Salah Shakir on Handling the transitional period when leaving your job as a CIO
It's been a joy, honor and adventure supporting David over the last few decades. Vision - creativity - work ethic - integrity - and perspective......
Technology changes every day... no, every second. So, I respect those companies which could survive among the other.
Anna Evans on From the 1800s to today: The world’s oldest technology companies
I agree with the every word! Machine learning have already changed our world!
Anna Evans on Human security teams can’t manage the new threat landscape alone
Insightful read on cyber security in the IoT space...
Wings2i on Cyber security: Is the honeymoon period over for the IoT?
IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.
Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.
Should the government regulate Artificial Intelligence?
Comments
dawnMG on July 18 2016
No, I'm sorry but political donations are speech. Political speech is one thing that our founders fought to guarantee for all citizens and groups of citizens. We heard stupid rants from Reed daily on how awful it is that two brothers give to the GOP.. when in reality many other give way more to the DNC and to Reed specifically. The only donations that should be illegal are foreign donations...They have no right to speak in the US political arena. Influence peddling can be bad. George Soros for instance buy unrest in order to tear down markets and national solvency..that is criminal.
dawnMG on July 18 2016
No, I'm sorry but political donations are speech. Political speech is one thing that our founders fought to guarantee for all citizens and groups of citizens. We heard stupid rants from Reed daily on how awful it is that two brothers give to the GOP.. when in reality many other give way more to the DNC and to Reed specifically. The only donations that should be illegal are foreign donations...They have no right to speak in the US political arena. Influence peddling can be bad. George Soros for instance buy unrest in order to tear down markets and national solvency..that is criminal.