Are you prepared for a shift from a business-driven technology strategy to a technology-driven business strategy? It’s happening now, and happening fast. Read what a CIO of a multibillion insurance company believes are the five drivers behind this shift to technology-driven business strategies and what he’s doing to take advantage of them.
The next big thing in data curation just might be Tamr Inc., a tool created by the duo behind the Vertica analytic database. The tool acts like a Web search engine for enterprise data; in this week’s Data Mill, we provide an introduction to Tamr, plus JSON as the next SQL and why agile doesn’t always work.
The Internet of Things (IoT) got you down? Check out IT and business strategist Harvey Koeppel’s humorous and informative take on the meaning and disruptive nature of IoT and the 10 things CIOs can do to prepare for IoT dominance.
Traditional analytics have become so ubiquitous that interest in other, more complex analytics technologies is increasing. For those looking to bring text analytics in-house, there are several factors to consider before you take the next steps — including social media use and the pick-prove-sell process.
Even the White House isn’t immune to cyberhacks: Earlier this week, an intruder breached the White House’s unclassified computer networks but didn’t do any damage or obtain any classified information. With so many threats out there, does your organization stand a chance? The PricewaterhouseCoopers 2014 U.S. State of Cybercrime Survey offers some tips and tricks to outmaneuvering cyber foes.
Public application programming interfaces (APIs) are popping up like weeds, according to Gartner analyst Gary Olliffe. Learn four ways to manage this new API abundance — and the new complications that come with it — in Senior News Writer Nicole Laskowski’s coverage of Olliffe’s API information session from the recent Gartner Catalyst conference.
Another 2015 prediction poll is in, this one from advisory firm CEB, and the outlook is positive. Decreased maintenance budgets and a shift in funding to more customer-centric technologies are highlighted in Executive Editor Linda Tucci’s TotalCIO blog post.
Don’t be blindsided by cloud contracts — before striking a deal, read through these six basic issues this IT lawyer encounters on a regular basis when he reviews cloud options with his clients. Speaking of cloud service commitments, watch the latest SearchCompliance webcast installment on cloud technology, in which information governance expert Jeffrey Ritter explains why companies must know their own specific governance and e-discovery needs before entering a cloud service agreement.
Following the recent string of high-profile data breaches, data security and the Payment Card Industry Data Security Standard (PCI DSS) are back in the spotlight. In SearchCompliance’s latest #GRCChat, Twitter offered its take on PCI DSS standards, whether they’re sufficient to protect credit card data and the importance of improved audit processes in pinpointing security flaws.
In our latest news roundup on SearchCompliance’s IT Compliance Advisor blog, read about some seeming compliance leniency around Apple Pay; plus the Federal Communications Commission took its first steps toward data security enforcement, Google cracked down on online piracy, and Verizon is in hot water with privacy advocates.
Finally: Information security was named one of the top three IT projects for 2015 in TechTarget’s IT Salary Survey. Want to know if your information security strategy is strong enough to handle today’s digital curveballs? Take our quiz to find out.
Follow @SearchCIO, @SearchCIOSMB and @ITCompliance for our new stories throughout the week.