Content Vault : Sort by Most Recent
Technology, Mobility

IoT is opening the way for smart cities

Blog-post by,

Although there is not yet a formal and widely accepted definition of a “Smart City,” the final objective is to make better use of the public resources, increasing the quality of the services offered to the citizens, while reducing the operational costs of the public administrations.


CIO Leadership, Security

Take a Value Chain approach to secure your enterprise

Embed security in each activity performed by IT every day

Blog-post by,
Michael Garrett

We all know enterprise security is changing. It’s becoming imperative to integrate security into every aspect of IT. We call this approach Converged Security, and it fits into the way IT is evolving.

(2) (2)

CIO Leadership, Applications, Mobility, Security

"Shadow IT just is"

Shadow IT #CIOchat recap

Blog-post by,
Community Manager
,
jdodge

Last week, we tackled shadow IT in the #CIOchat and everyone agreed it's not going away anytime soon. This was the topic for our #CIOchat hour, which is every Thursday 2-3 p.m. ET.

If participation is any indication, shadow IT is of big interest to CIOs and IT personnel. We broke all records for participation and Tweets, 61 and 404 respectively! That's a lot of Tweets to wade through to find patterns and trends. So I took a different tack with this week's #CIOchat .

(1)
   
(1) (1)

Business Issues, Cloud

Cool Use Cases of Cloud Computing that Make Our Lives Better

Blog-post by,
HP Blogger
,

The business benefits of cloud computing—the ability to quickly scale resources to meet demand, respond rapidly to competitive pressures, and shift from a CAPEX to OPEX model—are well documented. What may be surprising is the degree to which companies integrate cloud into their everyday operations. From coordinating the delivery of pizzas, to developing new ways to make daily tasks simpler, to making sure our food supply remains safe, cloud computing plays a central role. Here are three ways that cloud computing works behind the scenes to make our lives better.

 

(1)
   
(2) (2)

CIO Leadership, Security

Banks and Insurance Companies - It’s Time To Enforce Security Protocols On All Your Third-Party Vendors!

Blog-post by,
ScottMeyerGhostery

“Third party calls are the single greatest potential point of failure for web pages.”
Tami Everts, Radware at O’Reilly Velocity New York, September 2014

(2) (2)

Technology, Cloud

ERP CRM Software Package Integration

There are various major benefits of the ERP, CRM package integration for the businesses of all sizes such as small, medium-sized and large-sized.

Blog-post by,
emmageorge91

ERP and CRM software solution, both are complimentary to each other. As an exclusive category, CRM normally includes sales team automated, marketing automated and client care. As part of ERP, CRM is one of the five ERP main branches, with the other categories such as financial accounting, distribution, manufacturing and supply chain management, human resources & payroll.


Technology, IT Performance

ERP Software Companies: Their Role & Importance

In this modern and competitive age, various organizations use ERP (Enterprise Resource Planning) to handle business process like manufacturing, sales, planning, development, inventory management, etc.

Blog-post by,
emmageorge91

In this modern and competitive age, various organizations use ERP (Enterprise Resource Planning) to handle business process like manufacturing, sales, planning, development, inventory management, etc. ERP is a very powerful application to maintain the resources of an organization such as purchases, orders, billing, HR, finance and payroll and the software application uses a databases managed by a database management system to offer a unified real-time view of core business processes.


CIO Leadership, IT Performance

Manage change to help your organization adapt to the ‘new normals’

Without widespread software adoption, you can’t transform IT — and you won’t deliver value

Blog-post by,
joshuabrusse

For quite some time, I’ve known that the only way to get true value from an IT project (or any project) is to carefully manage the change process. At HP Professional Services, we’ve developed change management into a repeatable, comprehensive methodology that recently garnered a 2014 Customer Value Award from analyst firm Frost & Sullivan.

The award is a point of pride, as it means the market agrees with an idea that I’ve long believed: You can’t get value from an IT project (or any project), unless you manage change.


Business Issues, CIO Leadership, Security

Six 'Spooky' Cyber Security Statistics

From the average cost per company lost, to the number of cyber security victims per day.

Blog-post by,

It’s Halloween, and the end of National Cyber Security Awareness Month (NCSAM). And we here at IDG and the Enterprise CIO Forum would like to end October leaving you with six ‘spooky’ cyber security statistics.

Take a look below.

(3)
   
(1) (1)

CIO Leadership, Security

Converged Security: Why we should integrate Security and IT Operations

Achieve benefits of scale by uniting teams for mutual benefit

Blog-post by,
Michael Garrett

The threat landscape is changing rapidly. It wasn’t so long ago that CISOs were worried about worms and viruses. Back then, the focus was on perimeter defense. But today’s high-profile security attacks exploit internal weaknesses. They’re often slow moving and hard to detect. Security is having to cover more ground, and in the process its activities are overlapping with those performed by IT Operations.

The good news is this overlap gives IT an opportunity to cut costs, improve efficiency, and reduce waste.

Monitor, detect, correct