Contributor's stories - Page 2
Schneider Electric: What is Infrastructure Management as a Service?
Infrastructure Management as a Service – or IMaaS – is just such a game changer.
Aussie heath care & education: Transforming Govt. services with Big Data
Big Data can enhance student achievement by providing a wider view of the education system in Australia and increase institutions performances.
Cybersecurity starts with training your employees
At the end of an education and awareness initiative, all users should be able to understand how to identify security threats & how to respond to them.
When do you move your office to the cloud? – Gartner
While the adoption of cloud office is rising, it will never be universal due to many valid reasons that include security, privacy and vendor support.
Goodbye HDD: Why 2017 is set to be the year of all-flash storage
We might look back on 2017 as the year the hard disk era finally gave way to the brave new world of all-flash solid-state storage.
Studies find CEOs more confident about cyber security than CIOs
Australian CEOs are more confident about their organisations’ cyber preparedness as CIOs.
NSP & Extreme Networks - two powerhouses ramping up NZ's cyber security market
What do Super Bowl XLVIII, the London Exchange, and a number of New Zealand’s largest City Councils have in common?
Why smart contracts on the blockchain aren’t viable for businesses yet - Gartner
Smart contracts within blockchain platforms have a lot to offer, but the immaturity of the technology makes them a potential vulnerability for now.
Digital Transformation / DX
Breaking down digital transformation: Business model transformation
Now, a start-up can achieve in a few years what used to take decades, and with much less capital.
Interview: How CIOs can boost innovation & creativity
Looking for processes to improve creativity is the wrong place to start. This is exactly why most organisations completely fail at being innovative."
Advanced Persistent Threat Protection
The three Rs of enterprise security: Rotate, repave, and repair
No organisation regularly repaves their services or applications from a known, good state, leading to vulnerable servers for more than five months.
The psychology of workspace order: Boost productivity through decluttering
Research suggests that our workstations can play a huge role in how we feel emotionally and in turn how it affects our work productivity.
Digital Transformation / DX
Breaking down digital transformation: Process transformation
The best way to start a digital transformation is with projects that offer potential for more rewards and less risk.
Four cyber security principles that withstand the test of time
Information security can be a noisy place. As a career security guy my experiences have given me a deep understanding of attackers & the enterprise.
Identity and Access Management
Mitigating identity-related risks: The complete package or a one-man show?
Think of behaviour analytics as Iron Man and identity analytics as The Avengers and you have a powerful approach to identity access management.
You're invited to be a part of THE IT event of 2017!
The Australian CIO Summit is the premium forum bringing together leading IT professionals with the most renowned solution providers.
Internet of Things
How artificial intelligence can prevent machine failures
According to reports from McKinsey, predictive maintenance could save global businesses an incredible $630 billion a year by 2025.
Mobile Device Management / MDM
10 Reasons you can’t ignore the Android revolution
No matter your workplace, you need a rugged device that won’t fail in the face of drops, spills, extreme temperatures, or dust and dirt.
Internet of Things
Zebra: Digital businesses need smarter marketing & increased visibility
When it comes to digital business, the one thing you can count on is change, and marketers must move quickly to keep pace.
How advanced analytics and predictive simulation help data centers enhance performance
One benefit of incorporating both on-premise DCIM and IMaaS is the possibility of performing predictive maintenance.
Artificial Intelligence / AI
Infosys: How businesses can overcome the artificial barriers to AI
Roles which require emotional intelligence, imagination and human interaction will continue to be relevant and must be filled by human beings.
Securing assets and applications in the cloud
Hard-coding and embedding credentials in the code or a script can initially make them easy to use – but this represents a significant vulnerability.
Thinking outside of the rack: Designing and planning by pod
When commonly available voltages and breaker sizes are considered, optimum pod configurations emerge that make planning and design easier.
The age of containerisation and its impact on security
A major concern is that enterprise adoption and deployment of DevOps and containers is outpacing the approach used to secure them.