cio

Results 1 - 25 of 1438Sort Results By: Published Date | Title | Company Name
Published By: IO     Published Date: Dec 31, 2015
These are all marketing terms being used to describe data center colocation offerings. (IO is no exception.) But what do these terms really mean to an organization? What does “next-generation” or “2.0” or “future proof” or “hybrid” do for those people who are responsible for data center operations? Why should a CIO or data center manager care if his data center is “next-generation”? Why look for a provider with an “enterprise hybrid solution”? In this Solution Guide, we cut through the marketing hype and answer those questions.
Tags : 
    
IO
Published By: Compass Datacenters     Published Date: Mar 02, 2016
The demand for more efficient and cost effective computing has driven organizations large and small to reevaluate their strategies. This examination can incorporate many aspects, encompassing system architecture and software platforms, as well as the IT hardware, and of course the data center facility. Moreover, there are many strategic options for the enterprise CIO and CTO to consider, such as the possibility of direct or indirect ownership and operation of their own data center facility, as well as colocation, cloud, or hybrid combinations thereof. Nonetheless, the IT hardware must ultimately reside in a physical data center that will provide conditioned power and safe environmental conditions for the IT equipment.
Tags : 
    
Compass Datacenters
Published By: Verne Gloabal     Published Date: Mar 30, 2016
Today’s CIO faces a host of challenges and new trends. Budgets are tight and in many cases decreasing. At the same time, IT is becoming more strategic as the amount of data created is exploding and the value of accessing that data in real time is continuously increasing. Much of this data must be mined and acted upon instantaneously while it is still of value, requiring the application of bigger and more powerful data centers.
Tags : 
    
Verne Gloabal
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way today’s modern business operates. They’ve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware.¹ While malware’s pervasiveness may not come as a surprise to many people, what’s not always so well understood is that automating app attacks—by means of malicious bots —is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with bots—good and bad—has become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, it’s clear that bots are a driving force of technological change, and they’re here to stay.¹ As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are malicious—and the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed- breach world. Over 6,500 publicly disclosed data breaches occurred in 2018 alone, exposing over 5 billion records—a large majority of which included usernames and passwords.1 This wasn’t new to 2018 though, as evidenced by the existence of an online, searchable database of 8 billion username and password combinations that have been stolen over the years (https://haveibeenpwned.com/), keeping in mind there are only 4.3 billion people worldwide that have internet access. These credentials aren’t stolen just for fun—they are the leading attack type for causing a data breach. And the driving force behind the majority of credential attacks are bots—malicious ones—because they enable cybercriminals to achieve scale. That’s why prioritizing secure access and bot protection needs to be part of every organ
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with bots—good and bad—has become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, it’s clear that bots are a driving force of technological change, and they’re here to stay.1 As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are malicious—and the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: SES     Published Date: Aug 01, 2019
Descubra cómo una empresa de comunicaciones está llevando conectividad a las zonas más remotas de Perú. Desde una flota de pesca costera hasta un poblado al que solo se puede acceder en avión, Axesat está entregando soluciones por satélite y cubertura 4G a zonas a las que antes era imposible llegar. El CEO de Axesat describe cómo, en asociación con SES Networks, la empresa puede aumentar el comercio y la conectividad en Perú.
Tags : 
    
SES
Published By: SES     Published Date: Aug 01, 2019
La brecha digital está obstaculizando el uso del potencial de las regiones de pocos recursos en todo el mundo. Este artículo explora cómo una red 5G puede reducir drásticamente la brecha digital y mejorar las condiciones económicas en todo el mundo. Descubra cómo la tecnología satelital puede aumentar la conectividad en regiones de pocos recursos y tener un impacto positivo en la telemedicina, el empleo a distancia y las oportunidades de educación.
Tags : 
    
SES
Published By: SES     Published Date: Aug 01, 2019
Este blog de nuestro vicepresidente de Desarrollo Tecnológico e Innovación ofrece la opinión de un experto sobre la revolución 5G. Descubra el impacto que tendrá la arquitectura 5G sobre nuestra futura sociedad «hiperconectada». Además, explore casos de uso que incluyen comunicaciones masivas tipo máquina, comunicaciones mejoradas de banda ancha móvil y baja latencia.
Tags : 
    
SES
Published By: SES     Published Date: Aug 01, 2019
Descubra como uma empresa de comunicações está levando conectividade às áreas mais remotas do Peru. De uma frota de pesca offshore a uma vila acessível apenas por avião, a Axesat está levando soluções de satélite e cobertura de rede 4G a áreas que eram impossíveis de alcançar antes. O CEO da Axesat descreve como a empresa, em parceria com a SES Networks, consegue ampliar o comércio e a conectividade no Peru
Tags : 
    
SES
Published By: KPMG     Published Date: Jun 10, 2019
Today’s customers want 24/7 access, mobile availability, quality, low prices, fast shipping, easy returns and instantaneous service. These expectations demand that every business function be customer-centric, including operations. Read this report to find out: • how to create customer-centric operations to deliver the customer experience • the eight essential components of a connected, customer-centric enterprise • why alignment between the COO and CIO is essential • five key steps to start transforming operations to drive growth and create value.
Tags : 
    
KPMG
Published By: Google     Published Date: Nov 04, 2019
"McKinsey conducted a study of CIOs and CTOs of large enterprises from 17 industries. 80% said they hadn’t reached the agility their business needs due to costly trade-offs like sacrificing speed for security or preferred tools for uniformity. Get the report, “Unlocking business acceleration in a hybrid cloud world,” to discover the top perceived trade-offs and how some CIOs have avoided them and steps to unlock the next stage of your IT modernization journey
Tags : 
cloud as a service, cloud computing, enterprise security, cloud infrastructure, cloud providers
    
Google
Published By: Citrix     Published Date: Oct 02, 2019
The CIO’s guide to building the unified, digital workspace for today’s hybridand multi-cloud strategies.
Tags : 
    
Citrix
Published By: Citrix     Published Date: Oct 02, 2019
Ein Leitfaden für CIOs, um konsolidierte, digitale Arbeitsplätze für die Hybrid- und Multi-Cloud-Strategien von heute zu entwickeln.
Tags : 
    
Citrix
Published By: Citrix     Published Date: Oct 03, 2019
Co?mo un espacio de trabajo digital seguro puede ayudar a su organizacio?n a liberar todo el valor de su inversio?n en la nube.
Tags : 
    
Citrix
Published By: Citrix     Published Date: Oct 03, 2019
Guiar, automatizar y optimizar el trabajo con un espacio de trabajo inteligente
Tags : 
    
Citrix
Published By: Citrix     Published Date: Oct 03, 2019
La guía del CIO para construir el espacio de trabajo digital unificado para las estrategias híbridas y multinube de hoy.
Tags : 
    
Citrix
Published By: Citrix     Published Date: Oct 03, 2019
Satisfaga las expectativas de los empleados, acelere la innovacio?n y mejore la productividad, sin aumentar el riesgo
Tags : 
    
Citrix
Published By: Citrix     Published Date: Oct 03, 2019
Migre, actualice, proteja y administre datos, aplicaciones, dispositivos y nubes, desde un solo panel
Tags : 
    
Citrix
Published By: Citrix     Published Date: Oct 03, 2019
Cómo un espacio de trabajo digital seguro puede agilizar su paso a nuevos mercados.
Tags : 
    
Citrix
Published By: Citrix     Published Date: Oct 03, 2019
Gids voor de CIO: hoe creëert u een uniforme digitale workspace voor de hybride cloud en multicloud.
Tags : 
    
Citrix
Published By: Citrix     Published Date: Oct 21, 2019
As workloads rapidly move to the cloud and users become more dependent on SaaS applications, reliable access on any device, anytime, anywhere becomes a demand IT must meet. That means organizations like yours need a new security approach — one provides a fine level of control over access and adjusts to contextual factors like location and user behavior. Unlike the multi-access and point solutions of the past, this modern approach must provide a broad and integrated view of distributed IT to help you identify and stay ahead of both internal threats and malicious external actors.
Tags : 
    
Citrix
Published By: Infinidat EMEA     Published Date: May 14, 2019
Digital transformation is a business enabler, one that also translates to an increase in the demand for greater storage capacity and performance. This increasing demand requires IT organizations to re-examine their data storage strategy as the growth in capacity doesn’t align with a shrinking IT budget. To support the growth of the business and remain competitive in a global digital market, CIOs are asked more than ever to “do more with less,” while improving performance and availability at the same time.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com