This week on SearchCIO.com, we dished up expert advice pertaining to prescriptive analytics, cloud security and shadow technologies.
CIOs hoping to conquer the next business frontier should look no further than our e-zine on prescriptive analytics. In the April issue of CIO Decisions, learn how prescriptive analytics can revolutionize how work gets done and serve as an RX for CIOs aiming to optimize forecasted outcomes.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Last week’s rogue technology-themed tweet jam stirred up quite the discussion on Twitter, much of it revolving around how rogue and shadow are unfit terms to describe what’s going on with unsanctioned IT. Discussions also covered why communication is key in avoiding — or embracing — rogue implementations, as well as the benefits and pitfalls of going rogue.
Did you hear about the new wolf of Wall Street? The lead item in this week’s Searchlight column by Associate Editor Emily McLaughlin focuses on Michael Lewis’s revelations about high-frequency trading. Read the full column for more from the week, including Greenpeace on why Amazon’s cloud is the dirtiest and reasons why carrying two phones — one for personal use and one for business — might benefit users.
This week’s Data Mill column by Senior News Writer Nicole Laskowski outlined five tips for a secure cloud-first strategy, inspired by the Massachusetts Technology Leadership Council’s seminar on securing data, availability and reputation in the cloud. Bonus: Advice on crafting a hybrid cloud strategy.
Cloud chatter isn’t reserved for SearchCIO readers. On SearchCompliance, we held our #GRCchat tweet jam of the year, with a focus on cloud computing security. Read our first recap to learn who readers think is responsible for security in the cloud. Then, learn how GRC regulations force cloud service providers to rethink their security offerings in this tip by Site Editor Ben Cole. And while we’re swapping security tips: How can security professionals ensure privacy in a mobile device management (MDM) policy? Contributor Jeffery Ritter provides the answers.