Joanie Wexler

Writer

Joanie Wexler is an independent writer and editor who has spent 20+ years writing about computer networking technologies, their business potential, and implementation considerations. She serves clients at technology companies and industry publications writing educational materials on all aspects of IT.

Supply Chain Modernization: Overcoming Visibility Obstacles

Supply Chain Modernization: Overcoming Visibility Obstacles

Supply chain integration challenges are keeping some enterprises from accurately forecasting demand and predicting and mitigating risk, according to a recent IDG survey of IT and supply chain professionals. Respondents indicated...

Preparing for the next disruption: How a flexible data architecture improves business agility

Preparing for the next disruption: How a flexible data architecture improves business agility

As the volume and types of data continue to grow, businesses need to integrate, manage, and secure in new ways that enable agility and more accurate decision-making.

Quality Data: The Foundation of a Resilient Procurement Operation

Quality Data: The Foundation of a Resilient Procurement Operation

Building a strong and resilient procurement system has never been more important, given the current economic downturn. And starting with quality data can give companies a strong foundation for weathering uncertain times like...

Balancing Processes, Goals, and Technology for Supply Chain Resilience

Balancing Processes, Goals, and Technology for Supply Chain Resilience

Today’s global, complex supply chains have been rocked by the current economic downturn. Companies are quickly seeking new and creative ways to achieve short-term sustainability—but they can also apply those processes to help...

Analytics: The  Cornerstone of a Resilient Supply Chain

Analytics: The Cornerstone of a Resilient Supply Chain

In today’s struggling economy, developing an enterprise data strategy for your supply chain might seem like the last priority on your list. Yet moving away from traditional spreadsheets and manual processes, which 67.4% of...

Security Implications of the ‘Mobile First’ Workplace

Security Implications of the ‘Mobile First’ Workplace

Creating apps optimized for mobile platforms requires more robust safeguards across the entire network.

Moving Legacy Applications to the Cloud? Make Sure You Do It Right

Moving Legacy Applications to the Cloud? Make Sure You Do It Right

Bloated or inefficient on-premise applications will still be bloated and inefficient in the cloud if you don’t take the time up front to clean them up or throw them out entirely.

Cloud-Based Backup and Disaster Recovery Is a Win-Win for Business

Cloud-Based Backup and Disaster Recovery Is a Win-Win for Business

Cloud-based disaster recovery services eliminate the need for site-to-site replication – as well as the cost of additional DR infrastructure and real estate.

6 Reasons to Deploy a Hybrid Cloud

6 Reasons to Deploy a Hybrid Cloud

Mixed cloud environments are on the rise as organizations balance public and private data needs. Here’s what to consider before going hybrid.

‘Shadow’ Spending and Its Impact on the Cloud

‘Shadow’ Spending and Its Impact on the Cloud

Shadow IT serves a useful purpose in the enterprise, and it is important for IT to understand and support that purpose.

The Cloud as Business Incubator

The Cloud as Business Incubator

As cloud deployments mature, organizations have an opportunity to evolve from cost-cutting initiatives toward a whole new level of innovation.

Make Sure Collaboration is part of your Mobile Workspace Strategy

The ability of employees to access all the apps and data they need, regardless of their location, device, and network, has grown quite sophisticated since the introduction of mobile workspace technology. In addition to accessing...

Sharing Security Responsibilities with your Cloud Provider

Sharing Security Responsibilities with your Cloud Provider

If you’re using a public cloud service, you’ve relinquished some measure of physical control of your computing platforms to a third party. But you still must be involved in security.

Getting Mobility Right – Real Users, Real Solutions

Perhaps the biggest advances in mobile workspaces – environments that allow mobile users to access their business apps and data from anywhere – have been on the integration front. A mobile infrastructure has myriad components, and...

Order from Chaos: Five Steps for Reining in Runaway Mobility

Mobile computing has blazed through many organizations as a powerful grass-roots movement, often unguided by IT’s hand. The big-bang nature of mobility’s genesis made it tough for IT leaders to integrate the many facets of...

Are Your Apps Cloud Candidates?

Are Your Apps Cloud Candidates?

Not all applications are created equal – and not all are viable candidates for cloud deployment. Here’s what to look for – and what to guard against with your migration strategy.

Wanted: 20-20 Vision into Mobile Networks

One of the IT manager’s most important jobs is to understand how well IT assets are performing. The mobile infrastructure is no different. To ensure optimal user experiences and productivity, IT needs real-time visibility into how...

Selling the Value Proposition of Mobility

In the 14th annual State of the CIO survey, released in January, mobility investments ranked #1 in importance with line-of-business (LOB) managers and #2 with CIOs. It seems organizations are facing a fair number of mobile...

Who Needs an Enterprise App Store?

Does every organization with an enterprise mobility program need an enterprise app store (EAS)? Well, a very savvy wireless industry analyst once told me: “If the enterprise needs control [over mobile app distribution and...

Mobile Workspaces and the IT Decision Maker

The aim of the mobility game is empowering employees to work from anywhere with full access to the applications and data they need. IT must balance this open access with enterprise-grade security and uncompromised user...

Load More