Articles under the topic Technology
Software licenses are bought in varied forms, box packs, paper licenses, and enterprise agreements, downloads, handed over on a disk or thumb drive. Until the industry learns and decides to work with CIOs on managing licenses, the onus shall remain with the IT teams to stay compliant with process driven provisioning and frequent internal assessments that rationalize use.
Organizations are still a bit confused about mobility. Companies and IT groups still see a dichotomy between seamless mobility for their employees and rigid and robust security for the enterprise. A well developed strategy for enterprise mobility should be able to reduce the gap between security, mobility and productivity without undue challenges.
The Worldwide Threat Assessment Report released for 2014 indicates that cyber-related threats are still the top concern for securing the nation and private industry. In response to these and similar developments, countries are creating cyber defense institutions within their national security establishments, and several of these will likely be responsible for offensive cyber operations as well.
A robust strategy for BYOD and mobility requires a re-thinking of the entire enterprise strategy. While re-thinking doesn't equate to re-working, it does mean a complete end-to-end revisit of the enterprise strategy to ensure BYOD and mobile devices are well represented in everything from security to backup to accessibility. Introduce mobility as a key cornerstone to your business technology strategy.
In my previous blog, I discussed how a social engineering assessment is a very valuable tool in understanding the security exposure of most organizations. It is imperative that the InfoSec professionals know how to architect, organize and carry out a successful assessment. This article serves as a starting point for planning basic activities and proactive measures to protect the safety of all involved and ensure best results!
The trigger has been wilder than earlier predicted adoption of social media websites, applications and mobile apps by all age groups across geographies and social strata. Every new innovation, fad or me-too has caught the fancy of not just consumers, but also investors. We see a new trend emerging that now has many players vying for attention; the corporatization of social media.
In the past, flexibility wasn't exactly a feature that was touted by many vendors, but in recent years, we've seen more folks highlight their solutions as being flexible, customizable and able to do multiple functions for a business. If designed and implemented correctly, flexibility is ideal for technology solutions and is wonderful for IT groups since we are constantly being asked to do more with less.
From Hollerith cards to Phablets and wearable technology, the pace of evolution has kept everyone guessing on the next shift. Unsettling yet consistent, the change has created an expectation that does not accept what is, but wants the unreasonable until it becomes reality. Do users of technology not know what they want or IT fails to connect to the need?
India's first 'School in the Cloud' facility, a learning lab where children can explore and learn from each other by tapping into online resources, is off to an auspicious start. The Kalkaji facility in New Delhi is the first of five new Self-Organised Learning Environments or SOLEs to open in India. It has been described as a doorway to 21st century learning skills which should be introduced in all schools in the future.
The CEO hunt at Microsoft finally comes to an end with the appointment of company veteran and cloud expert, Satya Nadella. But, do the nuances of his appointment mean something for the CIOs. Here's a look at what CIOs and enterprise customers can expect from the newly appointed chief, and also what are some of the issues that need him to address.