Content Vault : Recommended Content
Technology, Applications, Mobility, Security

Fashion first, function second in smart watches, wearables

We #CIOchat about this at 2-3 p.m. ET, Thursday.

Blog-post by,
Community Manager
,

It's simple. Most people won't don a smart watch or wearble device that's ugly. Consumers will not buy the new Apple Watch or forthcoming HP Luxury Smartwatch unless they are sharp and fashionable.

Our weekly #CIOchat will center on this fun question: Is fashion as important as function with smart watches and wearable devices? We chat 2-3 p.m. ET on Thursday, hashtag #CIOchat .

(1) (1)

Business Issues, Applications, Mobility, Security

Imperfect Security: something will always get through

The weak link is employees.

Blog-post by,
Community Manager
,
jdodge

Our #CIOchat yesterday looked at security through the lens of recent credit card hacks via payment systems.

First the numbers: 23 participants spewing out 333 Tweets! We chat every Thursday 2-3 p.m. p.m. ET, hashtag #CIOchat . 

All agreed that no security is foolproof and that something is going to get through. Several did not envy being a retail CIO given these high profile hacks at Target, Home Depot and most assuredly others.

What's more, employees are the point of the most vulnerability to cyber attacks.

(2) (2)

Business Issues, Technology, Applications, Cloud

Will public cloud market just be served by big vendors?

I don't think so although some do.

Blog-post by,
HP Blogger
,

I don't agree with David Linthicum's post in InfoWorld that contends the IaaS and PaaS markets will no longer support smaller providers. He also argues that the little guys will have to exit those markets and find something else to do. 

(1) (1)

CIO Leadership, Cloud

Shadow IT—the good, the bad, and the ugly. How to deal with it?

Blog-post by,
HP Blogger
,

The debate over shadow IT is like a three-man standoff in a spaghetti Western. On one side you have the business leaders and developers, who view external cloud resources as a quick and inexpensive way to get a project up and running. On the other you have IT, who feels it’s losing control when the business turns to external service providers. And in the middle you have the CIO, who faces pressure to meet the needs of the business, but who also has to weigh the risks involved with using an external service provider.

(1) (1)

Technology, Big Data

Changing styles of IT driven by the fashionable world of IoT

A cool bracelet from – wait for IT – Intel!

Blog-post by,
HP Blogger
,

“For most wearable makers, it would be in their best interest to stop worrying about the gizmos inside, and start worrying about the look and feel of their products -- says Nick Bilton in this New York Times article that refers to various wearables including the MICA –bracelet recently announced by Intel.&

(1) (1)

Technology, Cloud

The importance of cloud computing in manufacturing

Blog-post by,
RickBlaisdell

Because lately we kept discussing about the Internet of Things, we should perhaps mention that this trend is part of a larger industry, cloud manufacturing. With a large impact over the industries of aerospace, healthcare, education and financial services, here is another industry that cloud computing is highly influencing lately: manufacturing.

(1) (1)

CIO Leadership, IT Performance

Five meeting disrupters CIOs must recognize and confront.

“A meeting is an event where minutes are taken and hours wasted.” - Captain James T. Kirk

Blog-post by, ,

We all spend a lot of time in meetings.  Leading productive meetings is an executive skill that is unfortunately in short supply.  Over the past couple of years I have written several posts about meetings.  These have included subjects such as leading productive meetings, meetings with direct reports, and

(2) (2)

Business Issues, Mobility, Security

Mobile access to the enterprise essential

CIO must evaluate security implications.

Blog-post by,
Community Manager
,

Yesterday's Twitter chat focused on the balancing act between mobile access and security. Most agree that mobile workers must be given acccess to perform their jobs. Others weighed mobile access in terms of business value: if there's value in access, it must be given. 

With that in mind, the Tweets of the week came from CIO Wilfredo Lasalle (@wlassalle). There's two: 

"The attention to BYOD mattered when it was wanted by the users/business. Now the CIO needs to manage its security implications."

(2) (2)

Business Issues, CIO Leadership, Security

The healthcare industry needs a new security prescription

What recent high profile PHI data breaches can teach other industries

Blog-post by,

It’s not just hospital gowns that are exposing things best left private – it’s also data breaches.

(1)
   
(3) (3)

Business Issues, CIO Leadership, Technology, Cloud, IT Performance, Security

Disaster Recovery: Key Takeaways for the CIO

Blog-post by,
SteveLyerly

Discussion about an IT disaster isn't if but when — yet 70 percent of companies have only snapshot-based disaster recovery (DR) solutions in place. More disturbing is the fact that as of last July, 7 percent of all businesses surveyed had no DR solution.

(2) (2)