Content Vault : Sort by Most Recent
Business Issues, CIO Leadership, Technology, Applications, Big Data, Cloud, Converged Infrastructure, IT Performance, Mobility, Security, Services

2015 CIO and CISO Priorities: Cybersecurity, the Cloud and IT Budget

Blog-post by,
ThuPham

What are some of the top concerns of Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) today? According to a 2014 TechAmerica Federal CIO and CISO Survey – it’s improving cyber security. As new threats increase, risk management involves both educating users about security risks such as phishing attempts as well as building up network protection with continuous monitoring.

(4)
   

Business Issues, CIO Leadership, Technology, Applications, Big Data, Cloud, IT Performance, Mobility, Security, Services

Security in 2015: The Enterprise Begins to Favor Integrated Cloud Services vs. On-Premise Point Solutions

Blog-post by,
PaulLipman

Today’s Chief Information Security Officer (CISO) is faced with an over-load of point products (NAC, IDS, IPS, Endpoint Security, Web Gateway, Next Generation Firewall and APT to name just a few) provided by a plethora of vendors. These products are typically deployed in some on-premise configuration and tend to be difficult, if not impossible, to integrate together – resulting in severe visibility limitations across the organization’s security posture.

(1)
   
(1) (1)

Business Issues, Cloud

Cloud computing: what and where the jobs are

U.S. lags China in cloud jobs.

Blog-post by,
Community Manager
,

China has taken over the cloud jobs market. Well maybe not, but it's strongly suggested in a Forbes post entitled "Where cloud computing jobs will be in 2015."

Writes author Louis Columbus:

"Globally there are 18,239,258 cloud computing jobs, with the majority being in China (40.8%)." 

(2)
   
(1) (1)

Technology, Converged Infrastructure

Is the hypervisor era ending and welcoming containers?

Blog-post by,

How do we lower information technology (IT) costs amid escalating processing and storage requirements by consumers?  We can start with virtualization: although a proven technology from the mid 1960s, was introduced to the “x86 architecture” in the late 1990s.  For the past almost 2 decades, we have been operating with the “emulation of hardware” called a hypervisor, with all the associated “fat” that comes with the hypervisor.  Even if the hypervisor was absolutely optimal, there is a dependency upon the hypervisors software to operate (ie: HyperV, VMWare, KVM, XEN).  Fl

(1)
   

Business Issues, Security

5 Information Security Trends That Will Dominate 2015

Cyber criminals "often use 21st century tools to take on 20th century systems."

Blog-post by,
Community Manager
,

This five trends this CIO.com article looks at are cybercrime, privacy and increasing regulation, vulnerabilities created by third party suppliers and partners, BYOx or bring your own anything or device (hellooooo, mobility); and how to educate people about the importance of good security practices.

(5)
   
(1) (1)

Technology, Cloud

Healthcare in the Cloud

Blog-post by,

Cloud-based services are becoming more widely adopted by healthcare organizations. The past year has seen a surge of interest regarding the potential of cloud computing with many organizations set to start moving healthcare-related applications across to cloud platforms.


Business Issues, Mobility

Local Search & Mobile: Emerging Trends Small Business Should Know About

Blog-post by,

Local searches on mobile phone continue to grow day by day. People are using their smartphones to search local things and also look for services like doctors, hospitals, schools, restaurants, and much more. This article will let the small business owner know why their business should be locally optimized for mobile. This article includes the following:

  • Search trends on internet
  • Local search Trends
  • Search trends on local mobile search


Internet Search Trends


Technology, IT Performance

In Your Windows Phone

Blog-post by,

Computerized rights activists have since quite a while ago requested the greater organizations to assume responsibility of the IT amusement from the security viewpoint and empower their clients with solid peculiarities that could help them ensure themselves if there should be an occurrence of any accidents. In a few locales, even the laws have begun to oblige organizations to incorporate execute switch characteristics.


CIO Leadership, Big Data

Making business sense out of the Internet of Things

Blog-post by,

Recently, I got to speak to a CIO at a Global 500 Company about the challenges of running his IT organization. He said that one of his biggest challenges is getting business leaders to understand technology better. “I want my business leaders to be asking for digital services that support and build upon their product and service offerings”. I think that his perspective provides real insight to how businesses should be thinking about the so called Internet of Things (IoT), but let me get you there first.

(4)
   
(2) (2)