Content Vault : Sort by Most Recent
Technology, IT Infrastructure

A DevOps Story

Blog-post by Fil Zanasi,
HP Blogger
, Tue, 06/16/2015 - 16:18
Fil Zanasi

When I go for a meal in a nice restaurant, I expect a good customer experience. The ingredients that constitute this (pardon the pun) are quite obvious. For example; I expect good food and service from the waiting staff.

(1) (1)

Technology, Mobility

Speedup Your Website to Speedup Your Sales

Blog-post by Helios Solutions, Tue, 06/16/2015 - 05:25

Today most of the people prefer to purchase things over internet rather than visiting malls or shops in the market. Regular online shopper know which ecommerce sites perform better in terms of speed and security and they prefer to buy from those stores. if you are also running an ecommerce website to sell goods, then you must consider the points user is looking while shopping from the website. Speed is the main factor that plays an important role and it directly affects your sales too.

Business Issues, Mobility

Solutions For snapbacks hats Considered

Blog-post by Greg Lawrenson, Tue, 06/16/2015 - 00:22
Rich Kids Brand's Spring 2012 collection available these days - Seattle menswear The most precious possession in every single woman's wardrobe is sure to be multiple brands of supreme cosmetics. No woman wishes to step out of home without their favorite make-up on and also, since this can be this type of important section of their lifestyle, nobody is likely to compromise using the quality of cosmetics that certain uses.

CIO Leadership, Applications

CIOs: Have you had your annual application checkup?

Blog-post by Myles Suer, Mon, 06/15/2015 - 18:02

Many of us do a physical with our doctor on yearly or biennial basis. The question that I pose today to CIOs is why don’t you have a checkup for your applications on a regular cadence too. Now, it is worth noting that CIOs tell me that they ask their enterprise architecture team to be the forward, business facing component of their organizations. And architects clearly do need to create a regular structure for IT based on the service and product line functions/capabilities.

Business Issues, Cloud, Security

Are cloud security fears overblown?

#CIOchat topic 2-3 p.m. ET Thursday

Blog-post by John Dodge,
Community Manager
, Mon, 06/15/2015 - 15:45

Are fears about cloud security warranted or overblown? That is our #CIOchat question for this Thursday #CIOchat from 2-3 p.m. ET and comes from ECF editorial director Bill Laberis.

To put this in perspective, one could argue you can never exagerrate security fears. Vigilance is paramount, but is the cloud unfairly singled out as a security risk versus other ways of storing and managing information?

(1) (1)

CIO Leadership, Cloud

Clouds, People, and Organizational Impact

This video explores the critical people and organizational considerations you must take into account when moving to a cloud-based, IT-as-a-service operating model. Featuring Michael Krieger, Technology Analyst, HP and Lee Kedrie, Managing Partner, Advanced Technologies, HP

(1) (1)

Technology, Applications

Enterprise Mobile Apps - The Future, Now

Blog-post by Kaushal Shah, Mon, 06/15/2015 - 12:34

The breath-neck speed at which consumer market for mobile apps has boomed in recent years is an excellent sign of where the software industry is heading. With a few swipes or taps, you can order a cab, make hotel reservations, or find alternate routes to avoid heavy traffic. Apps have made life easier. This is why enterprise apps are expected to deliver similar innovations, instant results, and simple user experiences. Enterprises need to consider these expectations along with critical parameters such as security, scalability, and flexibility.

CIO Leadership, Security

Constructing Your Information Governance Framework

Investing Time in Building Your IG Foundation is Key to Success

Blog-post by Robert Smallwood, Sat, 06/13/2015 - 22:10

"It is not the beauty of a building you should look at; its the construction of the foundation that will stand the test of time."
                                   - David Allan Coe


Technology, Services

Workgroup Server From IBM: X3550 and X3650

Blog-post by CRG Soft, Sat, 06/13/2015 - 10:38

IBM Computer System x3550 M2, which is a descendant of the x3550, absorbed from their all the best predecessors and has the features that meet the modern requirements of the server.

X3550 M2 server has a quad-core processor to provide continuous and error-free system, has a great configuration capabilities, flexible architecture and power saving characteristics, and this differs from the previous generation of servers.

The new computer has the ability to integrate up to 6 HDD SAS total - 1.8 terabytes, the ability to service without stopping the server work.

Tags: IBM

Business Issues, CIO Leadership, Technology, Security

Bigger than BAD (Basic attacks that will destroy)

Blog-post by HP Security Strategists, Fri, 06/12/2015 - 13:05

By HP Security Strategist Dan Schulte

BAD (Basic Attacks that will Destroy) is a new term I discovered at Showmecon this week in St. Louis.  A great conference with opportunities to visit old friends, network and hear stories from the attacker’s point of view.  There was one talk that stood out to me on Monday. An excellent presentation with great stories, with the message: we should abandon all of this APT and Advanced Threat Talk to focus solely on ‘Low Hanging Fruit’ or ‘BAD’ (in this case, social engineering). 

(1) (1)