News Stay informed about the latest enterprise technology news and product updates.

Assessing hyper-converged architectures; next-gen security strategies

Hyper-convergence, a system that allows integrated technologies to be managed as a single system through a common toolset, is set to shake up the enterprise and how we think of data center economics. How should CIOs respond to the emergence of hyper-converged infrastructures? These four articles delve into the concept and explore the CIO imperative:

•Mike Matchett, senior analyst and consultant at The Taneja Group, details five key considerations for CIOs when evaluating hyper-converged architectures.

•CTO and SearchCIO columnist Niel Nickolaisen shares the five critical questions he asked before making the move to hyper-converged architectures.

•CIOs and IT executives outline the benefits and drawbacks of hyper-converged infrastructures.

•CIOs and IT executives examine the question of hardware cost savings.

Apple’s latest earnings report shows something that hasn’t happened in 13 years: a decline. Does it signal a great fall for the tech giant? In this week’s Searchlight, Features Writer Jason Sparapani explores the earnings decline and what it means for the company and enterprises at large. Plus: Amazon and Facebook revenues soar, and ‘Snowden’ trailer goes online.

In this four-part webcast on enterprise security architecture, Johna Till Johnson, CEO at Nemertes Research, touches on next-generation security strategies and best practices, business risk portfolio management, emerging technologies and more:

Part 1: Using next-gen enterprise security to combat cyber-weaponry

Part 2: Five steps for developing an enterprise security roadmap

Part 3: Delving into business risk portfolio management and determining the product classes that should be considered

Part 4: A photo story detailing the technology areas to consider when crafting an enterprise security roadmap

Is your organization invested in mobile and cloud computing? It should be, according to consultant Bob Egan. In this Q&A, he explains why spending money on mobile cloud is not only beneficial to productivity but also to business competitiveness.

CEOs: Are you being held hostage by IT? In this tip, IT executive Kevin McDonald describes why it’s important that company leaders know what IT is up to when it comes to cybersecurity, and why IT process documentation is a must-have best practice.

In this TotalCIO blog post, Senior News Writer Nicole Laskowski explores an interesting workplace redesign that’s taken right from cruise ships and hotels: beach toweling. What is it? If employees leave a desk unoccupied for more than two hours, they are to take everything with them. Laskowski goes through the reasoning and potential benefits.

Over on SearchCompliance…

In this two-part feature covering a recent privacy forum hosted by the Massachusetts Attorney General’s Office, Site Editor Fran Sales first explores why a lack of adequate privacy legislation is putting consumers at risk and how a consumer bill of rights could be a first step in addressing the problem. In part two, the panelists at the privacy forum ponder whether U.S. states can fill the gaps in consumer privacy regulation and share tips for fostering transparency.

Add cybersecurity to the list of insurance options to consider. In today’s risk-laden business environment, more companies are turning to liability coverage to protect data assets. But a number of questions about this emerging market still remain.

On the IT Compliance Advisor blog, Sarah Holland, senior analyst of public policy and government relations at Google, explains why maintaining a certain company culture is key to assuring consumer privacy.

Please follow @SearchCIO, @SearchCIOSMB and @ITCompliance for our new stories throughout the week.