Tag: security

Getting Your Business Ready for the Internet of Things (IoT)

Getting Your Business Ready for the Internet of Things (IoT)

According to an Information Week report, Internet Protocol Version 4 (IPv4)[i] has almost run out of addresses for devices. That’s why IPv6 had to be introduced: to ensure that we can move from the 10 billion connected devices today (more than the population of the world) to over 50 billion connected devices in 2020, according […]

Ready or Not, The Internet of Things is Here

Ready or Not, The Internet of Things is Here

Remember, back in the day, when we thought the smartphone was the ultimate in connectivity? At last, we were “unchained from our desks,” armed with a portable email inbox, calendar and a boatload of apps to make our personal and business lives better. Of course, we still had to wake up for that early morning […]

Privacy Concerns and the Monetization of Big Data

Privacy Concerns and the Monetization of Big Data

It is easy to get caught up in the greatness of Big Data analytics. It’s a marketer’s dream: tracking customer activity; understanding what he or she is thinking, doing—using this information to transform every interaction into unexpected delight. To know the customer is to love the customer, and companies everywhere are showing that love through […]

Cloud Platforms and Hacktivism: Have you secured your cloud today? | Article

Cloud Platforms and Hacktivism: Have you secured your cloud today? | Article

Hacktivism is one of the single-biggest threats to cloud adoption. Verizon’s latest Annual Data Breach Investigations looked at 855 data breaches in 2011 and reported that 3 percent of the breaches could be attributed to hacktivists[1]. The number may appear insignificant and may not elicit stress from CIOs. However, the fact that 56 percent of […]

By August 21, 2012 Read More →
IT Security Professionals and Compliance Officers at Odds Over Cloud Security | Article

IT Security Professionals and Compliance Officers at Odds Over Cloud Security | Article

Enterprise IT and compliance groups agree on one thing for certain: their cloud environments could use some work on the security front. Less than half of the 1,018 IT security practitioners and enterprise compliance officers surveyed by the Ponemon Institute, which conducts independent research on privacy, data protection and information security policy, believe their organizations […]

Managing Enterprise Mobility in a Bring-Your-Own-Device World: Trends, Challenges and the Role of Outsourcing | Article

Managing Enterprise Mobility in a Bring-Your-Own-Device World: Trends, Challenges and the Role of Outsourcing | Article

It is the era of the 24/7 employee – but no one seems to be complaining. Cloud computing, collaboration convergence and the need for access-on-the-go have driven a surge in mobility technologies. Instead of wanting to “get away from it all,” people want to take it all with them – accessible through the lightweight devices […]

CIO Roundtable Results in Cloud Breakthroughs | Article

CIO Roundtable Results in Cloud Breakthroughs | Article

A recent CIO Roundtable sponsored by Alsbridge, Inc. resulted in several breakthroughs on adopting and implementing cloud computing. Every IT executive in the room had two things in common: (1) a driving need to explore and leverage cloud solutions and (2) lack of a clear way to validate the cloud offerings in the market and […]

Allied Digital Services, LLC – Think Beyond Boundaries | Service Provider

Allied Digital Services, LLC – Think Beyond Boundaries | Service Provider

Allied Digital Services (Allied) is a global IT services and solutions company that partners with customers to make IT an enabler of positive change in the organization. We accomplish this by providing end-to-end IT solutions for customers across multiple industries and geographies. With over two decades of proven experience in technology and enterprise IT infrastructure, […]

Eight Biggest Areas of Risk for Buyers of Outsourcing Services | Article

Eight Biggest Areas of Risk for Buyers of Outsourcing Services | Article

New delivery models, new pricing models, service providers’ new marketing strategies, moving up the value chain to intellectual arbitrage, new technologies, real-time customer interaction, globalization, and new standards and regulations – these factors set the stage for risks for buyers of outsourcing services in the next two to five years. (Read Forces of Change Shaping […]

Cloud Computing: Hackett Study Identifies Emerging Best Practices and Experiences of Early Adopters | White Paper

Cloud Computing: Hackett Study Identifies Emerging Best Practices and Experiences of Early Adopters | White Paper

The Hackett Group recently conducted a study to understand what companies are doing in the area of cloud computing, where the greatest areas of opportunity and risk are, and early lessons learned that may make adoption easier and more successful for those still on the sidelines. Study findings are segmented into two groups of participants […]

Buyers Face Decisions around New Opportunities and Risks in Outsourced IT Solutions | Article

Buyers Face Decisions around New Opportunities and Risks in Outsourced IT Solutions | Article

Charlie Bess, HP Fellow, HP Enterprise Services, says the outsourcing industry is facing “a different kind of IT and support environment than what we had just a few short years ago.” Here’s how he describes this new environment: More sensors deployed in more parts of a customer’s business giving organizations a deeper understanding of their […]

Syntel – Small Enough to Listen, Big Enough to Deliver<sup>TM</sup> | Service Provider

Syntel – Small Enough to Listen, Big Enough to DeliverTM | Service Provider

Syntel, Inc. is a NASDAQ-listed, global provider of IT services and KPO solutions, aiming to enhance clients’ business efficiency and reduce operational costs. Our portfolio of solutions includes a wide range of technology solutions and services, with an elite clientele of Global 2000 organizations in the BANKING & FINANCIAL SERVICES, HEALTHCARE & LIFE SCIENCES, INSURANCE, MANUFACTURING, and RETAIL, LOGISTICS, TRAVEL & TELECOM INDUSTRIES. History […]

Latisys – Meeting Clients’ Infrastructure Challenges | Service Provider

Latisys – Meeting Clients’ Infrastructure Challenges | Service Provider

Latisys was founded in June, 2007 as Managed Data Holdings LLC (MDH), in conjunction with two high-quality private equity investors: Great Hill Partners and Catalyst Investors. Strategically, Latisys is aimed at the operation of enterprise-class data centers across Tier I and Tier II markets in the United States to meet the increasing demand for managed […]

Crossing the Chasm to Mission Critical Workloads in the Cloud | Event

Crossing the Chasm to Mission Critical Workloads in the Cloud | Event

Tuesday, November 30, 2010 | 11:00 a.m. CST; 12:00 noon EST; 9:00 a.m. PST This webinar has ended. Download the handout from the webinar. Early adopters of cloud solutions have focused mostly on email and collaboration solutions; ERP, CRM, and SCM standalone applications; testing environments and systems management tools. The promise of speed, predictable cost […]

Application Management Outsourcing Services Provide Bigger Bang for the Buck | Article

Application Management Outsourcing Services Provide Bigger Bang for the Buck | Article

Companies are placing more focus on ensuring software products deliver real impact to business needs and also growth to the business, observes Mohammed Haque, Genpact’s Vice President and Head, Enterprise Solutions Service practice. It’s more than just acquiring software for operations; the focus is now on getting the most value out of software assets and […]

Managing Outsourced Data Securely | Article

Managing Outsourced Data Securely | Article

“We will see a dramatic change in security becoming a prevalent component of outsourcing contracts over the next five years,” says Jim Motes, Chief Information Security Officer for Dell Perot Systems. As virtualized services in cloud and utility computing technologies become more ubiquitous, they will drive an even deeper focus on security. A virtualized environment […]