Tag: Cybersecurity
Nearly all emerging technologies have followed a normal lifecycle. This lifecycle usually starts with a unique technology innovation coming to market, then moves to inflated expectations as the promised value of the technology exceeds reality, followed by disappointment as expectations are dashed. It then moves into a period of awakening as a true understanding of…
Read MoreOver the past several years, the tension has grown between corporate IT and the departments it serves throughout the organization. This tension exists for many reasons, but is escalating as departments are increasingly acquiring their own technology to meet their specific business needs. Corporate IT departments often refer to this as “Shadow IT.” While the…
Read MoreWhen you hear the phrase, “shadow IT”, what comes to mind? Visions of ominous, dark, or secretive information technology pockets operating outside of the CIO’s control or visibility? Worries that the software purchased or developed by these rogue IT groups will end up in the CIO’s lap when support becomes a challenge? For many CIO’s,…
Read MoreIs your organization considering a move from on-premise systems to the cloud, but concerned about information security? Are you already using the cloud, but uncertain about how well your networks and data are protected? The transition to cloud computing is transforming businesses and IT departments worldwide, yet all too often, security is an afterthought. It…
Read MoreWe are at an inflection point – the digital economy has added complexity and cost to the process of delivering exceptional customer experiences (CX), while at the same time, technology innovations have raised customer expectations regarding how that experience should unfold. The challenge of providing high quality CX is complicated by policies, processes and regulatory…
Read MoreIf you’re trying to catch up with the digital economy while maintaining old, legacy systems and watching your competitors embrace digital transformation, machine learning, artificial intelligence and other emerging technologies, you may be running out of time. If you are concerned that you’re so far behind that your company’s survival is at stake, much like…
Read MoreA major credit-reporting company recently disclosed that hackers possibly gained access to the personal information of 143 million US consumers, or roughly half the US population. In a statement made on the day of the public disclosure of the breach, the company’s chairman and CEO vowed to increase cybersecurity spending. Of course, this is the…
Read MoreIf you are a manufacturer, you are likely investigating use cases where the Internet of Things (IoT) can enhance your products’ capabilities, provide more insights on how your products are used by your customers and, of course, increase product sales. As IoT-enabled products become more and more mainstream, your customers will come to expect smart…
Read MoreIs IT a function, an organization or a vocation? Going forward, the answer is yes to all three. As a function, the selection, deployment and use of information technology will become the responsibility of the lines of business (Customer Service, Operations, Engineering, Supply Chain) and support functions (Finance, HR, Legal, Sales, Marketing). Information technology will…
Read MoreCompanies, divisions and departments alike have created a boom in cloud-based Software as a Service (SaaS) applications provisioned through providers such as Salesforce.com, Workday, Marketo and many others. The attraction of SaaS vs. the traditional on-premise model of provisioning applications is compelling for almost any size organization or team that wants to deploy new business…
Read More