Content Vault : Blog entry | Sort by Top Rated
Business Issues, Applications, Cloud, Services

Cloud skills shortage continues

Grow your own? Get IT staffers cloud certified? Migration and integration in demand

Blog-post by,
Community Manager
,

Earlier this year, an IDC report revealed that 1.7 million cloud jobs went unfilled in 2012. It's hard to imagine that the situation is any better now.

In fact, Microsoft cited IDC figures predicting a shortage of  "cloud ready" pros by 26% annually that could result in 7 million unfilled jobs worldwide (such an astronomical number of open jobs always rings a bit hollow when so many people around the world are desparate to find jobs.)  

(6) (6)

Technology, Big Data, Services

The next big thing (maybe): social analytics

If nothing else, social analytics puts a little flesh on the bones of big data.

Blog-post by,
Community Manager
,

Social analytics is latest term getting some buzz. And it has some real meaning - at least in concept.

According to a CIO.com story on the topic, social analytics examines things like e-mail and social media to determine where work time is being wasted.

(5)
   
(6) (6)

CIO Leadership, Security

Some Companies Regularly Thwart Insider Theft

Key to preventing these types of threats is understanding when the line has been crossed from legitimate business operation to risky behavior.

Blog-post by,
Jim Ricotta

We're in the midst of our annual survey of our customers -- leaders in automotive, financial services, aerospace, insurance, oil & gas, healthcare, entertainment, manufacturing and technology. We specialize in privileged user monitoring and control to stop IP theft. And we know from two years of survey data that our customers thwart malicious insider attacks at least once or twice every year.  This number is typical at almost all mid-size and large organizations – but most of the time the theft goes unnoticed by security teams unless alerted by a third party or an employee.

(6) (6)

CIO Leadership, Big Data

How deep is the impact of Big Data across industries?

Question is: How is your enterprise impacted by Big Data's presence in your industry?

Blog-post by,
HP Blogger
,

While Big Data has impacted enterprises from multiple perspectives, there are certain characteristics that stand out more than the others within a given industry. Enterprises looking to leverage Big Data to be competitive in the future can do so more effectively if they factor in the business drivers and nuances specific to their industry. Let’s see how:

(5)
   
(6) (6)

Technology, Security

Weakest links are greatest opportunities to enforce application security

Application security must be addressed across all phases of the Software Development Life Cycle

Blog-post by,
HP Blogger
,

“By and large, most successful attacks today, approximately greater than 70 percent, are targeted at applications where inherently, most vulnerabilities reside,” says HP Distinguished Technologist, John Diamant in his interview on SecuritySolutionsWatch.com.

(13)
   
(6) (6)

Technology, Cloud

Software: A New World Order

Application development changes as access to the Internet does.

Blog-post by,

Your world is about to change.

The world is always changing, of course.  New technologies emerge as old ones die away. Demographics and social mores drive new values and new behavior.  Circumstance and providence conspire to befuddle prognosticators and corporate strategists alike.  Change drives the adoption of new technology; it is the holy grail of corporate America.  Innovation is rewarded, and stagnation is punished.

(4)
   
(6) (6)

CIO Leadership, Mobility

CIOs and IT are finally getting a grip on who calls the BYOD shots

At some point, 'digital natives' will be charged with the same BYOD challenges that face us who grew with pencil and paper.

Blog-post by,
Community Manager
,
jdodge

CIO.com's Tom Kaneshige's "5 BYOD pitfalls and how you can avoid them" is a must-read for CIOs who want to take control of smart devices, apps and mobility. 

Before I expound on Kaneshige's five pitfalls, let me expose a myth about BYOD: that enterprises must let employees have any device and app they want. I have yet to hear of an employee who quit their job because IT would not let them have an app of their Angry Birds.

(1)
   
(6) (6)

CIO Leadership, Applications

BYOD gets a new definition — Be Your Own Device

Reducing layers of interaction to increase Return on Innovation

Blog-post by,
HP Blogger
,

Over the years, size and form factor have defined the emergence of innovative devices people use to interface with computers. From punch-card readers to terminals to desktop computers to laptops to BYOD to wearable devices and flexible displays — the focus has been on reduced layers of interaction. The growing omnipresence of our devices of engagement ensures information is available to us where we want it, when we want it.

(8)
   
(6) (6)

Technology, Applications

The Wonders of Augmented Reality

Mobile technology to "help humans"

Blog-post by,
HP Blogger
,

While I was at Mobile World Congress this year, I spent quite a bit of time looking at augmented reality solutions.

(3)
   
(6) (6)

CIO Leadership, Converged Infrastructure

ROI gets a third definition - Return on Infrastructure

Maximizing the Return on your Infrastructure

Blog-post by,
HP Blogger
,

ROI gets a third definition – Return on Infrastructure

I had recently discussed ROI taking on a new definition — Return on Information — making the point that enterprises need to take action on Big Data in order to realize the business value of their most valuable asset.

(8)
   
(6) (6)