Content Vault : Sort by Most Recent
CIO Leadership, Big Data

Big Data and the Information Governance Imperative

New CIGO Role Positioned to Meet Challenges

Blog-post by,
RobertSmallwood

Think Big Data is here?  Just wait – it’s only beginning.

According to IDC, the digital universe is doubling in size every two years, and will reach 44 trillion gigabytes by 2020. Estimates and projections vary, but it has been stated that 90 percent of the data existing worldwide today was created in the last two years and that every two days more information is generated than was from the dawn of civilization until 2003. That’s a lot of information.


CIO Leadership, Big Data

Annual Report: State of the Information Governance Industry

New IG Initiative Study Advocates New Chief IG Officer (CIGO) Role

Blog-post by,
RobertSmallwood

The IG Initiative (IGI) is a consortium and think tank made up of 15+ information governance (IG) software providers, leading analysts, and active practitioners. The first annual report from the IGI on the state of the information governance industry was released yesterday. “2014 IGI Annual Report: Information Governance Goes to Work” is chocked full of distilled insights based on a wide-ranging survey of IG practitioners, providers, and analysts.


Business Issues, Technology, Big Data, Cloud, Converged Infrastructure

Converged infrastructure: how much does it cost?

We #CIOchat Thursday, 2-3 p.m. ET. What's converged infrastructure ROI?

Blog-post by,
Community Manager
,

What is the tipping point to invest in converged infrastructure? And when should you stand pat in your data centers?

We're going to try and figure that out in our Thursday Twitter chat this week. We chat 2-3 p.m. ET and the hashtag is #CIOchat .

Much has been written about the benefits of converged infrastructure - reduced complexity, faster deployments, ease of management, greater capacity and how it's more geared for cloud, Big Data and mobile.

But how much does it cost and how can you figure out the ROI?

(2) (2)

CIO Leadership, Big Data

what is IOE

I: IBM; O: Oracle; E: EMC

Blog-post by,
zhenzhuhua

   what is IOE? in China we call it IOE: I: IBM; O: Oracle; E: EMC. why do we call it? Because for Tranditional IT and most Enterprise Company, IOE is core for their business, customers really reply on IOE. But now Cloud, Big data, Open Source  technology become more popular and Chinese Government is more focused on country Security and aslo Company has lower and lower bugdet on IT investment, so in China Geting rid of IOE is becoing more imporant and more important, and more obvious and more obvious.   


Technology, Services

Social Media & CRM - A Relationship of Brand

Social Media & CRM, a Relationship of Brand, Business, Technology, Innovation & Customer Satisfaction

Blog-post by,

One of the leading MNC tried doing something differently, & managed to enhance their sales by 400% in the first quarter itself. This initiative earned the company, 300 followers on LinkedIn, helping them reach out to these 300 followers, and people on their individual networks. They also got connected across 54000 to 1.3 million people. These results, of reaching out to customers, were not marginalized; rather they were accepted as a prominent and an inseparable activity. How did all this happen? What did they do different?


CIO Leadership, IT Performance

CIOs share on their key challenges

How well do you think they have captured their go forward challenges?

Blog-post by,

If you ask a CIO today about their challenges, several things would clearly make the list. CIOs that I know personally are feeling a bit of Future Shock. They say that things are changing a lot faster these days than they did in the past. One CIO said to me in exasperation, “things are changing every 18 months”.

(6)
   

Business Issues, Technology, Mobility, Security

5 Ways Employees Create Security Risks for Businesses

Blog-post by,

The Target, Inc. data hack, the Heartbleed Bug---these and other security breaches serve as stark reminders for businesses of the very real risks of doing business in a web-connected world. On the upside, these high-profile hacks reinforce the dangers of cyber-attacks from without. But on the downside, they tend to distract organizations from focusing on mounting security risks caused by their own employees from within.

(6)
   
(1) (1)

Business Issues, Technology, Cloud, Security

Giant hack by Russian group sounds the alarm

CIOs and CISOs: Better safe than sorry

Blog-post by,
Community Manager
,

"Do not panic! Try to strategize."

This alarming advice was about two thirds of the way down in a post Aug. 5 from Hold Security, the Milwaukee firm which disclosed that a Russian group of hackers had stolen on the order of 1.2 billion email addresses and passwords. Being told not to panic gives most mortals a very panicky feeling. 

From the post:


Technology, Applications

How To Track Facebook Chat Using Cell Phone Spy Software

Blog-post by,

Facebook is one of the best online social networking service, that started its journey on desktops, and has widen up the boundaries by being active on smartphones as well, in short one can easily use Facebook through their sma