News

News

  • July 28, 2015 28 Jul'15

    Mobile payment methods come of age

    Cattle, grain, shells, metal coins, paper bills, plastic cards. Don't see a pattern? Look again: All of them were or are forms of payment, and all of them are mobile. Mobile device technology-enabled payments are simply the latest, natural ...

  • July 27, 2015 27 Jul'15

    Will the role of the chief data officer eclipse that of the CIO?

    Chief data officers make the case why organizations need them; watch out CIOs: The Data Mill reports from the MIT Chief Data Officer and Information Quality Symposium.

  • July 24, 2015 24 Jul'15

    Open source, adaptable infrastructure key to Etsy platform business model

    How does Etsy keep its platform business model in tune? Deploying up to 60 code changes a day is par for the course.

  • July 24, 2015 24 Jul'15

    The platform business model: An introduction

    Airbnb does it; Uber does it. What about your organization? Sangeet Paul Choudary lays out the fundamentals of the platform business model.

  • July 24, 2015 24 Jul'15

    Sony bets on Drones as a Service

    Sony is launching a new Drones as a Service business unit that uses its image sensor technology. CIOs should prepare themselves for this growing market, experts say. Also in Searchlight: Hackers disable Jeep on highway; adultery website gets hacked.

  • Sponsored News

    • Is Your Active Directory Cloud Ready?

      Many companies today are considering a move to the cloud. Organizations may believe that a hosted service, such as Office 365, will be easier and or cheaper to maintain than on-prem email. Also, Microsoft and other industry leaders may have influenced a move. Whatever the reason, moving to the cloud isn’t as easy as it appears and results are often mixed if you haven’t adequately prepared your Active Directory. See More

    • Examining the Active Directory’s Role in Governance, Risk, and Compliance

      When it comes to governance and compliance, much of the IT staff’s effort is often focused on individual systems. Administrators work meticulously to ensure that mail servers, file servers, database servers, and other resources adhere to both internal security standards and regulatory requirements. The one thing that each of these systems has in common however, is its reliance on Active Directory. First introduced in 2000 as a replacement to the Windows NT domain structure, Active Directory was originally designed to manage network resources. Now, Active Directory works as a centralized authentication and access control mechanism, and consequently plays a vital role in the organization’s overall security. See More

    • How to Reduce Your Storage Footprint to Control the Cost of Data Growth

      Enterprise IT executives today are faced with the challenge of supporting ever-increasing data growth while at the same time trying to keep technology infrastructure costs under control. Can solutions like deduplication, compression and replication do it alone? See More

    • Avoid Downtime and Security Issues With These 5 Data Protection Best Practices

      In today’s ultra-competitive 24x7 business environment, downtime is not an option. Everyone—from employees to customers to business partners—expects systems and data to be available all the time. And they expect that data to be secure as well. See More

    View All Sponsored News
  • July 24, 2015 24 Jul'15

    Essential Guide: The changing role of the CIO

    In this Essential Guide, explore how business digitization, technology innovation and C-level engagement are changing the modern CIO's role.

  • July 23, 2015 23 Jul'15

    #CIOChat: Thriving in the age of digital disruption

    The digital revolution is in full swing. Who's winning and who's losing? Join #CIOChat on July 29 at 3 p.m. EST to discuss digital disruption and how to prosper in the information age.

  • July 23, 2015 23 Jul'15

    How big data broke the back of ETL and the rise of data curation

    In this Q&A, Michael Stonebraker explains why big data and ETL don't play well together and why CIOs should start thinking data curation rather than data integration.

  • July 20, 2015 20 Jul'15

    Five 'platform dichotomies': Challenges of a platform strategy

    A successful platform strategy can make or break a company in today's digital era, said Accenture's CTO at the MIT Platform Strategy Summit. He listed the five big challenges companies face as they shift to a platform business model.

  • July 17, 2015 17 Jul'15

    Adobe Flash vulnerabilities a tipping point for Mozilla, Facebook

    Mozilla, Google and Facebook united in dissent following the discovery of more Adobe Flash vulnerabilities. Why does it matter to CIOs? Also in Searchlight: Prime Day disappoints; Reddit resolves to clean up communities.

  • July 16, 2015 16 Jul'15

    How to survive cyberassaults: Seven steps to 'digital resilience'

    A new book from the World Economic Forum and McKinsey argues that cybersecurity, as currently practiced, is a recipe for disaster. The digital business requires digital resilience.

  • July 10, 2015 10 Jul'15

    McCormick spices up food market with digital platform business

    Former McCormick CIO Jerry Wolfe talks about his role as CEO of the spice company's new tech spinoff and why a digital platform is so essential to reaching today's foodies.

  • July 07, 2015 07 Jul'15

    Edge network key to IoT data collection and transmission

    IoT might be the next big thing, but the next big hurdle for CIOs will be figuring out ways to architect for it.

  • July 06, 2015 06 Jul'15

    Mobile payment systems can boost data security, but are not risk free

    Infosec professionals worry that mobile payment systems will increase the risk of data breaches, but experts argue their fears are overblown.

  • June 30, 2015 30 Jun'15

    Systems of engagement are ground zero for digital transformation

    "Crossing the Chasm" author Geoffrey Moore has developed a framework on how to talk digital investments with the business: The Data Mill reports.

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close