Inside the Briefcase
with Dave Elliott,
SymantecIn this interview, Dave Elliott from Symantec offers expert advice for organizations interested in safely transitioning to the Cloud, and overcoming security challenges associated with BYOD.
Read More >>>
with Dormain Drewitz,
Riverbed TechnologyIn this interview, Dormain Drewitz from Riverbed Technology outlines ways in which organizations can overcome data challenges and effectively transition to Cloud Computing.
Read More >>>
with Dodi Glenn,
GFI VIPRE AntivirusIn this interview, Dodi Glenn from GFI's VIPRE Antivirus outlines steps that organizations can take to prevent malware attacks, and emphasizes the importance of effective patch management in keeping valuable business information...
By Jorge A. Lopez,
Syncsort IncorporatedBig Data is everywhere and the buzz keeps getting louder and louder. Take, for example, a simple Google search. If you were to Google “Big Data,” your search would net over 1.18...
Enterprises increasingly seek to deploy complex branch networks and services while having minimal infrastructure and IT personnel onsite. Riverbed's Steelhead and Granite products show that, with time, many of the enabling capabilities that have led to datacenter efficiencies –...
Organizations have achieved significant benefit from virtualizing servers and storage environments, and now face the daunting task of deploying new network architectures to keep pace. Software-defined networking holds significant promise to deliver a new network architecture that is abstracted...
By John Mesberg,
IBM Commerce SolutionsIn the below interview, John Mesberg from IBM Commerce Solutions outlines ways in which social media, mobile apps, and cloud computing play significant roles in the growth and transformation of e-commerce.
Gilt Groupe, the US leader in flash sales, built our initial infrastructure like many fast growing start-ups - we used Ruby on Rails. Ruby on Rails did everything, from displaying products to managing the entire lifecycle of inventory, purchasing...
By Patrick Burke,
Rackspace HostingThe OpenStack Summit, which recently wrapped up in San Diego, covered a slew of topics for developers and end users of the OpenStack community.
Read More >>>
By Patrick Burke,
Rackspace HostingAccording to a recent cloud computing industry survey, cloud is currently in the early stages of having its enormous potential realized, which may be a few years before its effect is fully felt...
Miko Matsumura, Kii CorporationIn this interview, Miko Matsumura from Kii Corporation defines the relationship between mobile and cloud, and outlines key benefits that MBaaS (Mobile Backend as a Service) can offer organizations today.
Read More >>>
Matt Wallach, Veeva SystemsIn this interview, Art Landro offers expert advice for effectively growing with Cloud Computing, and emphasizes the importance of having a wide range of capabilities when helping organizations move into the Cloud.
Read More...
Steve Leonard, BandwidthThere is no doubt that modern technology has helped to facilitate the rapid growth of the telecom industry. Telecom has redefined itself and taken on a presence that cannot be denied. In the interview below,...
Big data is altering how providers manage information, according to the chief executive of a major West Coast academic healthcare organization.
When it comes to the implementation of an Enterprise Data Warehouse (EDW), there is a tendency to believe large health care systems stand to benefit the most. Community hospitals, however, face the same challenges as larger health care systems,...
Darren Cunningham, VP of
Informatica CloudAlthough Cloud Computing is no longer a new concept, the ability to optimize Cloud capabilities within your organization is invaluable. In the below interview, Darren Cunningham from Informatica outlines ways in which...
In the below interview, Scott Kitlinksi from Akibia describes the impacts associated with data center modernization, and how taking a “holistic” approach can help companies safely maximize the benefits of BYOD today.
Read More >>>
By: Mike Urbonas Director, Product Marketing at AttivioA dramatic shift is under way in the increasingly interdependent worlds of enterprise information management and business intelligence. Demand for information is booming, with business leaders, managers and line-of-business users all clamoring...
To design, build, and deploy secure applications, you must integrate security into your application development life cycle by including specific security-related activities in your current software engineering processes.
The evolution of Application Performance Management is more apparent today than ever before. In the below interview, Thad Eidman from Knoa Software outlines some of the biggest APM changes that have occurred over the past few years, and how...
Today's top priorities for hospitals and health systems include cost reduction, demonstrating meaningful use of technology and increased regulatory complexity.
Why does SaaS CRM technology offers a better alternative for pharmaceutical and biotechnology companies than traditional client/server systems.
Health-system CEOs, CMOs, CIOs and CMIOs face a connectivity conundrum
Yum! Brands is the world’s largest restaurant company in terms of system restaurants, with more than 38,000 restaurants globally in over 120 countries and territories and more than 1 million associates. Join us to hear about the business drivers,...
By: Dawn AltmanSales, management and other business departments have always had a mind of their own (as have, admittedly, IT departments). Lately, more and more departments are going behind IT's back to implement technical solutions "on their own" (sort...
LaSalle deployed Adeptia’s Enterprise Business Integration Management Platform into its contract management infrastructure in order to expand the breadth and quality of its service offering to both customers and vendors.
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. This guide will de-mystify the technology involved and give you the...
Symantec EV SSL turns address bars green in high-security browsers for an extra layer of website security that customers can see and trust.
The goal of this white paper is to help enterprises make pragmatic decisions about where and when to use cloud solutions by outlining specific issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting...
As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years.