1. Articles in category: IT Management

    1-24 of 534 1 2 3 4 ... 21 22 23 »
    1. Looking Globally To Solve Local Health IT Problems

      Looking Globally To Solve Local Health IT Problems

      Interoperability may be a struggle in the US, but we’re not alone, says Mitch Josephson of KLAS, who believes there’s great potential for countries to collaborate to solve our most pressing health IT issues.

      Source: Looking Globally To Solve Local Health IT Problems on healthsystemcio.com - healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.

      Read Full Article
    2. Software-defined networking (SDN): What businesses need to know

      Software-defined networking (SDN): What businesses need to know

      The ever-increasing reach of cloud computing is resulting in more and more businesses adopting as-a-service models. Shares As more and more systems move to the cloud, so we’re becoming increasingly used to accessing all systems on an as-a-service model. Networking is no exception to this and by using software-defined networking businesses can break away from the restrictions imposed by old, inflexible static network architecture.

      Read Full Article
      Mentions: BYOD Services SDN
    3. IoT security guidance emerges

      IoT security guidance emerges

      More than a year ago, an eye-opening RAND study on cybersecurity comprehensively explored just how vulnerable the Internet of Things (IoT) is and was going to be.

      Afterthought-style patch-on-patch security, as well as significant vulnerability risks involved with slapping internet connectivity on previously non-connected objects, were among the startling findings and predictions in that report.

      Read Full Article
      Mentions: Security
    4. How companies can deal with insider data theft

      How companies can deal with insider data theft

      To learn that your company's confidential data was stolen -- not by any hacker, but by an employee -- is a nightmare scenario that no one wants to face.

      But it's also a risk that's very real. The recent arrest of a former NSA contractor suspected of stealing classified government files is just the latest high-profile example, and security experts say all companies need to be on guard against potential insider threats.

      Read Full Article
      Mentions: Security
    5. What #MadeByGoogle really means

      What #MadeByGoogle really means

      Google announced some cool consumer electronics devices at its San Francisco event yesterday hashtagged #MadeByGoogle: Google Home personal digital assistant, two new flagship phones under the new Pixel brand, Chromecast Ultra (capable of 4K video), Google Wi-Fi, and a VR headset for the Pixel phones. The usual sales channels—Verizon, Best Buy and Google Play—will distribute them.

      Read Full Article
      Mentions: Video Amazon Apple
    6. Here are 6 super security tips to help protect iPhone 7 users

      Here are 6 super security tips to help protect iPhone 7 users

      The launch of the iPhone 7 was Apple enthusiasts’ stand-out moment of 2016, with another swathe of new fans entering the iOS fold. But how can users truly be secure? In early September, Apple revealed what we called the “biggest overhaul to the iPhone line-up in three years”, with the iPhone 7 and iPhone 7 Plus bringing the line’s processing power and camera capabilities to a new level.

      Read Full Article
    7. The race to secure the smart connected future

      The race to secure the smart connected future

      Of the many challenges which stand in the way of digital transformation today, one of the most pressing is security, and failure to address cybersecurity could result in a slowdown in the adoption of smart, digital practices, according to Wael Mohamed, President and COO of Trend Micro. The security threat landscape is changing, Mohamed noted, both in terms of the range and number of systems that are potentially at risk, and the severity of the threats.

      Read Full Article
      Mentions: Security
    8. Higher Ed Cloud Adoption on the Rise

      Higher Ed Cloud Adoption on the Rise

      Cloud investment is mostly expected to grow next year in higher education; 81 percent of IT leaders or professionals said their institutions would be increasing spending on cloud computing in 2017. Sixty percent said they're integrating cloud thinking into their IT strategies. But it will take a few more years before the majority of applications in colleges are running in the cloud. Today 39 percent of apps are cloud-based; by 2021 it could be closer to 62 percent.

      Read Full Article
      Mentions: Education
    9. Emerging technologies are poking holes in security

      Emerging technologies are poking holes in security

      Accelerated change challenges change management, security DevOps and emerging technologies that enable business innovation and opportunities demand fast, frequent change from the enterprise. The speed and regularity as well as the kinds of change challenge change management and ultimately security.

      To secure the enterprise in environments of unwieldy change, the business needs to know how each new technology affects change management and the organization’s security defenses.

      Read Full Article
      Mentions: BYOD Security
    10. Make IT Simple

      Make IT Simple

      We have reached a complex and transformative stage in digital business. After more than a quarter century of random innovation and the entrenchment of legacy models, protocols and technologies, digital transformation is reaching hyper-speed, exposing the unsustainable avalanche of complexity faced by many IT organizations.

      Read Full Article
      Mentions: BYOD
    11. IT Security Experts Expecting Cyber Attacks

      IT Security Experts Expecting Cyber Attacks

      Okta’s recently-released "Security Business Agility" report shows that around two-thirds of the surveyed companies expect a data breach within the year, unless their legacy security solutions get upgraded. While hackers and cyber criminals are always upgrading and finding new ways to overcome security solutions, companies that fall behind in their own security become easier and easier targets.

      Read Full Article
      Mentions: BYOD Security
    1-24 of 534 1 2 3 4 ... 21 22 23 »
  1. Unified Access from Alcatel-Lucent Enterprise = seamless user experience
  2. Categories

    1. Industries:

      Education, Government, Healthcare, Hospitality, Manufacturing, Small Business, Transportation
    2. Technology Trends:

      Agile IT, Automation, Big Data, Business Intelligence & Analytics, Business Transformation, BYOD, Consumerization of IT, Digital Business, Digital Collaboration, Digital Transformation, Everything as a Service, Industry Reports, Internet of Things, IP Video, IT & Technology as a Service, IT Simplification, Mobility, Personal Cloud, Shift to Consumption Models, Tech Terms & Acronyms, Technology Evolution, The role of SIP, User Experience, WebRTC
    3. Business Strategies:

      Business Process, Business Strategy, Customer Service, Financial Models, IT as a Service, IT Management, IT Service & Support, Knowledge Management, Marketing & Sales
    4. ALE Technology Strategies:

      Application Fluent Network, Cloud, Convergence, Networking as a service, SDN, Security, Unified Access, Virtualization
    5. Technologies:

      DECT, Ethernet, Intelligent Fabric, IPv6, Link Aggregation, Network Access Control, Power over Ethernet, Smart Analytics, SPB, uNP, Virtual Chassis, Virtual Machine, Virtual Network Profiles, Voice over IP, Wireless LAN
    6. Solutions:

      Business Telephony, Cloud Communication, Customer Service, Data Center, Hardened Ethernet, Mobile Campus, Mobility, Network on Demand, Small & Medium Business, Unified Communications
  3. Popular Articles

  4. Organizations in the News

    1. (2 articles) HealthsystemCIO.com
    2. (2 articles) Amazon
    3. (1 articles) Apple
    4. (1 articles) Microsoft
    5. (1 articles) Education
    6. (1 articles) Security