IT Operations
Feature
Inside Cisco's IT monitoring makeover
When Cisco’s IT team set out to replace a homegrown monitoring system, changing minds was as much of a challenge as changing code.Revenue Accountability
3 things digital health developers can learn from the Industrial Internet of Things
The second in a series on my insights into best practices for IoT solution development after working with developers and product managers across multiple industries.IDG TECHtalk Voices
What is the California Consumer Privacy Act of 2018? Influencers in the know break down the details
The California Consumer Privacy Act of 2018 is a bill intended to enhance online privacy rights and consumer protection for residents of California, United States. But the bill has national and global implications. Here’s how to prepare your organization for compliance and protect your customers.The Next Generation of Health IT
Take the training wheels off your vendor-management office
Why you’re not getting the most out of your third-party relationships.Feature
8 tips for dealing with IT project pushback
Technical initiatives are often met with resistance from business leaders, IT pros and end users alike. Here’s how to transform friction into feedback that can help push your project forward.Feature
CDO resumes: 4 tips for landing a chief data officer role
Chief data officers are on the rise as businesses embrace data-driven strategies. But you’ll want to follow these four tips to write the perfect CDO resume to get the job.Truth from the Trenches
Application proliferation – the lurking crisis
There are literally thousands of SaaS applications that can be used to manage almost every aspect of a company’s internal operations. On a bad day it may seem as if your company has purchased all of them! Here are some tips on how IT organizations can provide responsible application oversight even in the absence of direct application ownership.Revenue Accountability
3 practices Industrial IoT can learn from digital health and the Internet of Medical Things
The human-centric focus of healthcare has given digital health developers a different perspective on how they deploy IoT technology. Industrial developers can learn from these practices – patient first, the Quadruple Aim and the Nudge – to accelerate the success of their operation-centric efforts.I’ve Been Thinking – So Should You
Why are most organizations late to change?
The pace of change continues to escalate, and the saying “if you snooze you lose” has never been more relevant. Here are four ways to help your organization avoid being late to change.Feature
The chief data officer: The CIO’s newest ally
As organizations shift to data-driven strategies, the CDO role is rising. But to succeed as an entity, the CIO and CDO must work in concert — with clear delineations in responsibilities.Tech Policy Decoded
Rethinking government use of commercial exploit tools after WhatsApp spying
The recent WhatsApp lawsuit shows the significant risk to individuals, as well as public trust, that comes from allowing commercial systems to remain exploitable.The Tech Mindset
5 ways cybersecurity awareness trainings can strengthen your organization
As efforts to implement comprehensive security engineering frameworks and policies grow across various enterprises, it makes sense to implement a hands-on training program focused on educating your employees with basic cybersecurity best practices – so they don’t fall for phishing scams.Navigating the Digital Universe
Why corporate boards put their digital transformation at risk
Despite increasing cybercrime and dependency on digital revenues, many CEOs operate in the dark. A stunning 63 percent of CISOs don’t regularly report to their board, research by Ponemon Institute finds.Divergent CIO
The culture shift in your DevOps environment
Incorporating best security practices into DevOps is not only good for your company and your product – it's good for your teams.Feature
Data preparation tools: Your analytics strategy’s secret weapon
Data preparation is frequently cited as the leading roadblock to leveraging data within an organization. Getting the right tool for your organization can help you breakthrough.Navigating the Digital Universe
Poor cyber resilience: an organization’s Achilles' heel
Research reveals a marked disconnect between the concern over cyber-risk concerns and the overall approach to managing it.The Tech Mindset
5 practical ways your organization can benefit from DevSecOps
Behind the buzzword, is there a real need of and value for organizations in exploring DevSecOps? It’s important to understand why DevSecOps matters in this day and age of security breaches and what the pragmatic benefits are for your organization.Digital Policy Outlooks
European Court of Justice 'right to be forgotten' ruling likely to be relitigated
Love it or hate it, it’s clear that whether the EU can apply the GDPR’s “right to be forgotten” globally is in question.Driving Digital Transformation
5 technical capabilities required in modern enterprise data strategies
Becoming data-driven requires an ongoing commitment to excellence. It's not simple, but it shouldn't be daunting, either.Divergent CIO
Have you dusted off your incident response plan?
As security incidents are more prevalent these days, we are seeing organizations that aren't sufficiently prepared because their incident response plan was outdated or non-existent.News
Microsoft expands Dynamics 365 with e-commerce, in-store modules
Microsoft is tailoring its CRM tool for retail, and tuning it to deliver more insights from data.Straight Talk from a CIO’s Perspective
How much cybersecurity funding is enough – is it a bottomless pit?
No matter how much you spend on cybersecurity, there’s no guarantee you won’t have a significant incident. How do senior management and the board know what makes sense?News
11 key takeaways from Oracle OpenWorld 2019
Autonomous Linux, digital assistants, and closer work with Microsoft, VMware and others were among the highlights from this year’s conference.Digital Policy Outlooks
Why it’s time for a strong federal privacy law
A federal privacy statute can harmonize privacy law, leave room for states to regulate/enforce and enable American global tech policy leadership.Feature
Raytheon’s cloud-based test bed takes risk out of innovation
Implementing new technology in the defense industry comes with a lot of considerations. Here’s how Raytheon development a virtual environment for experimentation without risk.Healthcare Technology Trends
Healthcare data’s moment of lift
The unlocking of patient data is leading us to a future when health care will be a vastly improved experience with superior outcomes. However, there will be guard rails around consumer access to personal health records.Founder’s Corner
5G is critical to the competitiveness and future success of America’s small businesses
5G represents an exciting range of new possibilities, but it's also important not to let the hype overwhelm the need for security, privacy and safety.Navigating the Digital Universe
Almost all cyberattacks in 2018 were preventable
New research shows cyber-security incidents that exposed 5 billion records cost an estimated $45 billion last year.Feature
10 change management mistakes to avoid
Poor change management can be a transformation killer. Here’s how change initiatives can and do fail, and what can be done to course-correct.The Mobile Enterprise
3 ways WiFi 6 can revolutionize your network
Lofty proclamations for what the emerging wireless standard will do for IoT don’t matter much to CIOs caring for the carpeted enterprise. But they will care about three new ways they can leverage WiFi 6 to retool for a much more reliable and cost-effective network.Taming Enterprise Complexity
Effective data modeling
Understanding data is a prerequisite to gaining control of any enterprise. But understanding is only useful if that knowledge can be shared and transmitted. Effective data modeling should be a primary focus of any enterprise architect.Feature
7 secrets of high-performing IT teams
Getting staff to move beyond simply meeting basic goals is an art only select IT leaders possess. Here are seven performance-boosting techniques top IT pros rely on.Feature
What is process improvement? A business methodology for efficiency and productivity
A broken business process can cost your business time and money. But pinpointing exactly where a process breaks down — and where it can be improved — isn’t an exact science.The Adaptive CIO
The end of project management?
IT project management as a discipline has been around for many years. However, is it relevant in the age of digital products? Or can it become a valuable adjunct to IT digital product management?Navigating the Digital Universe
Lack of cybersecurity is the biggest economic threat to the world over the next decade, CEOs say
As digital transformation continues apace, CEOs see cybersecurity as the number one threat to the global economy in the next decade.Feature
Autodesk brings automation to its IT help desk
To handle demand for support from a growing workforce without adding helpdesk staff, CIO Prakash Kota has brought in a bot take over some of the busy-work.Healthcare Technology Trends
The new innovation model: monetizing healthcare data
Healthcare enterprises are launching programs to monetize patient medical data by offering access to researchers and innovators. How these initiatives can benefit all stakeholders (or leave out some).Dangerous Thinking
Data privacy is the new strategic differentiator
Pioneering corporations have an estimated nine to 18 months to “compete on data privacy” before it becomes table stakes.Feature
6 tips for ITIL implementation success
ITIL adoption requires more than software and tools. You need a bold strategy that aligns IT service with corporate goals and encourages employee and stakeholder buy-in.Digital Policy Outlooks
Enhancing trust in artificial intelligence: Audits and explanations can help
There are a lot of tools available to help with AI audits and explanations and more will be available in the coming years.Feature
6 reasons why AI projects fail
Data issues are among the chief reasons why AI projects fall short of expectations. But if you can learn from the mistakes and commit to the long term, your AI efforts are more likely to pay off.Feature
10 customer experience strategies IT should target next
CIO are increasingly being asked to help attract, manage and support customers. These technologies and practices can help enhance your company’s CX and fuel revenue for your digital transformation.Taming Enterprise Complexity
It’s all about the data
Gaining control of an enterprise’s data is a key element in taming enterprise complexity. But control without understanding is a recipe for trouble. Understanding data is an obligation of every enterprise architect.Divergent CIO
Kubernetes security: Best practices for enterprise deployment
A well-laid plan, with all the stakeholders involved upfront, is the first step in building a more secure container environment.Feature
Business requirements: Tracing project deliverables to business goals
Any successfully executed IT project is guided by pre-defined business requirements. Here’s how to ensure project deliverables and resource allocation trace back to business needs.Feature
UNTS focuses on culture, governance to make data work
Drowning in data it couldn't use, the University of North Texas System adopted an ambitious strategy to build a data-driven culture and the ability to apply analytics to every aspect of its operations.Truth from the Trenches
How to establish a security culture within IT
It’s impossible to establish a security culture within a modern enterprise if it doesn’t already exist within IT. IT organizations should have pervasive and conspicuous security cultures that can serve as examples to all other parts of a corporation. Here are six management triggers that IT leaders can use to build such cultures.News Analysis
As MENA moves to cloud, CIOs look to keep data in-country, study shows
Companies particularly in the UAE are quickly implementing cloud solutions, but with GDPR in play, data sovereignty is now top of the IT agenda.
BrandPosts
Learn More
×
BrandPosts are written and edited by members of our sponsor community. BrandPosts create an opportunity for an individual sponsor to provide insight and commentary from their point-of-view directly to our audience. The editorial team does not participate in the writing or editing of BrandPosts.
-
Sponsored By NTT & Palo Alto Networks
-
Sponsored By Broadcom Software
-
Sponsored By Broadcom Software