Content Vault : Sort by Most Recent
Business Issues, CIO Leadership, Technology, Big Data, Cloud, IT Infrastructure, Mobility, Security

Keeping up with Criminals: Reducing Cyber Security Cost and Complexity

Blog-post by Paul Lipman, Thu, 05/21/2015 - 17:02

Remember the good old days, when cybercrime was mostly about mischievous programmers wreaking a little havoc? Those were simpler times indeed. Today, cybercrime has become a global phenomenon, fueled by big money bounties, intensifying political unrest, and organized mobsters hiding in the nether regions of the deep web. 

Technology, Applications

Don’t Let Your App Store Optimization Process Go Wrong

Blog-post by Helios Solutions, Thu, 05/21/2015 - 07:32

Mobile apps is becoming a very common thing now a days. People are developing apps for every task in routine personal or business life. Developing attractive and fully functional apps is no more a difficult challenge. Rather marketing your app and reaching to the target audience is becoming a latest and most challenging task for the app developers. App store optimization is a process by which you can let your app be seen by target audience who visit the app store for downloading apps.

Business Issues, Big Data

Pearls of wisdom for digital disruptors

Listen up CIOs! You have role to play in digital disruption.

Blog-post by Myles Suer, Wed, 05/20/2015 - 18:30

I don’t know about you, but when I finish my time at a conference, I often feel a bit let down. Often, I find myself sorting through what I heard or learned, looking for one or maybe two pearls of wisdom. But last week, I was amazed when I actually got 10 great pieces of wisdom that could be useful to anyone trying to be digital disruptor at their firm. One thing before, I get started. To protect the innocent, I will only accredit names to those that would be fine with me sharing what they said publically. So let’s get started.

CIO Leadership, Security

Outthinking the Bad Guys in cyber security

Watch a video that examines HP's approach to thwarting the most "advanced" security. The expert commentary is from a January webcast with HP SVP and GM of Enterprise Security Products Art Gilliland. 

CIO Leadership, Security

Think Like a Bad Guy, Act Like a Good Guy

Watch now to learn more how the HP Enterprise Security products work together to fight off the bad guys.

Technology, Applications

Importance Of Integrating A Live Chat Application

Blog-post by David Michael, Wed, 05/20/2015 - 09:01

It is quite true that a brilliant web design, quicker loading speed, responsive, search analytics are some of the key requisites for your website when it comes to impressing your customers and tracking their shopping behavior. But the bitter truth is that despite all these, shopping cart abandonment/bounce rates do take place. Have you ever wondered why? Remember, customers are very impatient and you get hardly 2 seconds to convince him. The above mentioned aspects are the primitive stages in persuading a customer.

Technology, Cloud, IT Infrastructure

Investing in Current Infrastructure or Migrating to Cloud-Based Managed Services?

Blog-post by Orlando Bayter, Tue, 05/19/2015 - 19:48

In 2013, Scandinavian research group SINTEF announced that 90 percent of all data ever created was generated during the two previous years. That time frame continues shrink as the rate of data creation increases exponentially. Mobile devices, computers, gaming systems and even your car all produce terabytes and terabytes of data. Under these conditions, every business needs to think seriously about their cloud options. There’s simply too much data for a company to effectively manage on outdated systems alone. We are quickly moving into the Post-PC era.

CIO Leadership, IT Performance

Turning IT into a value creator

#CIOchat topic for Thursday. Join us.

Blog-post by John Dodge,
Community Manager
, Tue, 05/19/2015 - 15:28

How do you turn IT from a cost center into a verifiable value provider? This "perrenial favorite" question comes from J.D. Irving CIO Martin Davis.

The answer is obvious. Show quantifiable value. Of course, that's not always easy even when IT is producing value.

Anyhow, this "perrennial favorite" question as Martin calls it will be the topic in our #CIOchat this Thursday from 2-3 p.m. ET. I hope you can join us. Last week's #CIOchat generated 231 Tweets from 39 contributors.

(1) (1)

Business Issues, Security

Insider Fraud - How to Outsmart the Smart Ones

By Hagai Schaffer, VP of Products and Marketing, Bottomline Technologies CFRM

Blog-post by Hagai Schaffer, Tue, 05/19/2015 - 11:55

Fraud is an increasingly serious threat for businesses around the world, eroding data integrity and security, consumer confidence, and their bottom line.  According to the 2014 study of the ACFE (Association of Certified Fraud Examiners) organizations lose on average 5% of revenues each year to insider fraud.