Speak with most IT leaders about their big picture strategies and goals these days and most will describe a cloud-like delivery model in which IT outcomes are provided rapidly, efficiently, and in many cases, via self-service. And these same leaders increasingly are looking to leverage multiple clouds to augment and/or replace existing application infrastructure. In […]
…while most IT executives and data management experts acknowledge that there isn’t one failsafe solution to protecting and recovering data, they agree that there are certain steps organizations should take. What are the necessary precautions companies should take to protect critical files and applications in the event of disaster? Dozens of data storage, data […]
October is National Cybersecurity Awareness Month, a campaign created by the U.S. Department of Homeland Security to reinforce the importance of Internet security. This year, we hardly need reminding. We have the history-making Equifax breach of late September to thank. The breach of the credit reporting company’s repositories compromised personal data of more than 145 million people, […]
We’re all aware of the impact that user experience and page speed have on business results for online shopping sites; much has been written about the correlation between web performance and business metrics such as conversions, revenue and brand image. Inside the enterprise, though, we don’t really talk about conversions or abandonment – we have […]
The concept of big data has been around for years; most organizations now understand that if they capture all the data that streams into their businesses, they can apply analytics and get significant value from it. But even in the 1950s, decades before anyone uttered the term “big data,” businesses were using basic analytics (essentially […]
The feeling of security and the reality of security don’t always match, says computer-security expert Bruce Schneier. In his talk, he explains why we spend billions addressing news story risks, like the “security theater” now playing at your local airport, while neglecting more probable risks — and how we can break this pattern.
Hacking, fake news, information bubbles … all these and more have become part of the vernacular in recent years. But as cyberspace analyst Laura Galante describes in this alarming talk, the real target of anyone looking to influence geopolitics is dastardly simple: it’s you.
Author: Margaret Gould Stewart Facebook’s “like” and “share” buttons are seen 22 billion times a day, making them some of the most-viewed design elements ever created. Margaret Gould Stewart, Facebook’s director of product design, goes over the thought process behind the design process and the impact that even small changes in design can have.