Articles under the topic  Technology

Six Problems with Enterprises' Digital Dream

digital-dream-e1397313309290.png

The information and communication technologies and paradigms supporting an enterprise to become digitally led are emerging. But there are challenges too, which needs to be understood, addressed and solved before the new technologies can be adopted. Here, I have listed six challenges that are resulting into a hurdle for enterprises to become digitally driven and use IT as a real business enabler and a differentiator. 

Indian Banks Not Shy of Social Media Anymore

ID-10090133.jpg

Social media is slowly and steadily becoming a critical part of the strategy, and a new channel for Indian banks who are engaging customers on social platforms, to carry out numerous activities. Over the next five years, banks are expected to focus more on synergies that can be generated by social media and other key channels, rather than calculating RoI in the social landscape. 

Will Social Media, Big Data Prove To Be Game-Changers in 2014 Elections?

ID-100207185.jpg

Ahead of India's General Elections 2014, major political parties in the country are going all out to woo the electorate on various social media platforms and use Big Data to influence voters. Reports suggest that there could be a vote swing of 3 to 4 percent in as many as 24 states, which constitute a large chunk of Internet users. Will these platforms influence voters ahead of the polls? 

IT's Role in Creating a Student-Centred Learning Environment

ID-100189010.jpg

New and emerging technologies challenge the traditional process of teaching and learning, and the way education is managed. Teaching with technology is fairly different from teaching in a typical classroom. It requires a different pedagogical approach. The strategy should be to transform school education from a largely teacher-centered approach to a more interactive and learner-centered approach. 

CIOs Can Play an Effective Role in Tech Startups

ID-10025043.jpg

CIOs can play an important role especially in the evolution of startups wanting to provide solutions to enterprises. Their understanding of the business context coupled with their technology expertise gives them the ability to craft architectures that positively impact business outcomes. They should adopt a few fledglings depending on their interest and inclination. 

Software Asset Management: What's in it for CIOs?

ID-100184027.jpg

Software licenses are bought in varied forms, box packs, paper licenses, and enterprise agreements, downloads, handed over on a disk or thumb drive. Until the industry learns and decides to work with CIOs on managing licenses, the onus shall remain with the IT teams to stay compliant with process driven provisioning and frequent internal assessments that rationalize use. 

Real World Mobility: Filling the Gaps

ID-100183455.jpg

Organizations are still a bit confused about mobility. Companies and IT groups still see a dichotomy between seamless mobility for their employees and rigid and robust security for the enterprise. A well developed strategy for enterprise mobility should be able to reduce the gap between security, mobility and productivity without undue challenges. 

Cyber Security Tops Intelligence Community's 2014 Threat Assessment

ID-100206731.jpg

The Worldwide Threat Assessment Report released for 2014 indicates that cyber-related threats are still the top concern for securing the nation and private industry. In response to these and similar developments, countries are creating cyber defense institutions within their national security establishments, and several of these will likely be responsible for offensive cyber operations as well. 

Incorporating Mobility into Your Technology Strategy

ID-100161655.jpg

A robust strategy for BYOD and mobility requires a re-thinking of the entire enterprise strategy. While re-thinking doesn't equate to re-working, it does mean a complete end-to-end revisit of the enterprise strategy to ensure BYOD and mobile devices are well represented in everything from security to backup to accessibility. Introduce mobility as a key cornerstone to your business technology strategy. 

Key Focus Areas for Planning a Social Engineering Assessment Strategy

ID-100217229.jpg

In my previous blog, I discussed how a social engineering assessment is a very valuable tool in understanding the security exposure of most organizations. It is imperative that the InfoSec professionals know how to architect, organize and carry out a successful assessment. This article serves as a starting point for planning basic activities and proactive measures to protect the safety of all involved and ensure best results! 

  • <<
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • Dynamic Newsletter

    Sign up for our newsletter and get news and articles right in your inbox: