You might not have noticed it, but cloud implementation consultants and contractors have been acting increasingly stupid over the last couple of years. If you think this doesn’t affect you and your project, you’re wrong.
Cloud Computing / Opinions
The US Social Security Administration does a poor job of computer security. Surprised?
While private cloud proponents have spent the last five years focusing on getting their IaaS offerings working, Amazon, Microsoft and Google have moved way beyond core computing services. And you don’t have to strain to hear the death knell sounding for the private cloud.
Michael Sampson’s latest book, Re-Imagining Productive Work with Office 365, is a “must read” if you are currently using or planning to use Office 365. Michael is a brilliant author and approaches his overview of Office 365 not from the perspective of the individual technology elements, but from the perspective of the activities that “information workers” do every day.
IT as we know it is on the brink of massive disruption. Enterprise IT groups will struggle to rebalance skills while vendors struggle for survival. How will your organization fare in the new cloud-centric world?
Cloud computing is remaking the entire IT stack, from the foundation to the customer level. The application layer is no different.
CIO.com’s Bernard Golden looks into the near future of cloud computing. Here’s what he sees.
Why would an organization adopt bimodal IT? It says an IT group needs to move both quickly and slowly for an effective digital workplace. I recommend that CIOs embrace DevOps – the jewel in the crown in the cloud world – and apply its principles of agile, elastic thinking to their legacy world.
Amazon Web Services’ signature conference continues to show how customers both large and small are solving their real IT challenges, which is one of the reasons it’s evolved into a must-attend conference.
It’s hard enough really trusting your own employees these days. So when it comes to employees of cloud service providers, columnist Rob Enderle writes you definitely shouldn’t trust them.
Wi-Fi can be done securely, even at a hacker conference like DEF CON. Just avoid open networks and Android.
Can you explain to your business colleagues what Google for Work is? If so, you're miles ahead of Google. The company's foray into the enterprise has been little more than a hodgepodge of silos, delineated by products and their respective teams. The company is doing a poor job marketing the entirety of Google for Work because the initiative overlaps with individual product sales and leads to operational confusion.
Last week, blogger Aidan Finn posted an excerpt from a Microsoft email announcing 13 percent price hikes in the European region. Reaction from the trade press was immediate, predicting that this action presaged ongoing price hikes.
In 1865, the English economist William Stanley Jevons published The Coal Question, a book with a prosaic title that contained profound implications. Jevons set out to establish the size of England's coal reserves, a critical question for industrial and naval power. During his research, he stumbled upon a curious paradox: As coal use became more efficient due to the advent of better quality steam engines, coal consumption rose rather than fell.
In my last blog with Stephen Gold, EVP of Business and Technology Operations and CIO of CVS Health, we discussed Gold's approach to continuity of value, a process that Gold uses to make sure he and his business partners make the right IT investments.
While the technological world increasingly renders geography meaningless, no one appears to have informed lawmakers of this fact. Data can move easily and seamlessly from Uruguay to Spain to the United States, but in doing so, three separate <a href="http://www.computerworld.com/category/data-privacy/?nsdr=true">data privacy</a> and protection regimes are implicated. As more companies, individuals and even governments place their data in the cloud, both customers and providers of cloud computing services must become acutely aware of the burgeoning laws and regulations restricting the collection, storage, disclosure and movement of certain categories of information.
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.
Migrating to Office 365 is becoming increasingly popular among businesses both large and small. The upside of moving from an on-premises environment to one hosted online by Microsoft offers compelling benefits. But switcher beware: Early Office 365 adopters have come back from their migration path battle-worn by a slew of unexpected perils they encountered along the way.
The lists below summarize which tasks need to be done at standard intervals, including a pro-forma time budget. While the terminology and specifics focus on Salesforce.com specifically, the general administrative principles apply to any modern CRM system.
CIO spoke to Don Williams, VP Asia Pacific & Japan at Veeam about calculating the cost of downtime, automating backup and recovery, and moving disaster recovery services into the cloud.
- How to Use Metadata to Make Data-Driven Decisions - Download NOW!
- The Future is Encrypted. Manage It.
- Start your cloud journey. Register now and learn a wide range of AWS cloud solutions covered in the monthly AWS Webinar Series.
- Harnessing the Power of Metadata for Security: FIND OUT MORE
- AISA 2016 | Hear from Bruce Schneier, David Lacey, Rik Ferguson and many more | 18-20th October Register Today
- The Future is Encrypted. What's your defense?
- Check your Future Risk
- See Your Traffic for What It Really Is
- ABS points finger at IBM over Census outage
- Telstra augments field tech team to improve installation times
- Optus Business partners with Palo Alto Networks in cyber-security play
- Committee recommends greater scrutiny of WA Govt IT contracts
- Perception vs. Reality - Are Australian partners prepared for the next wave of security?
- How terahertz radiation could help brands identify consumers in future
- Hackers have a treasure trove of data with the Yahoo breach
- IAB appoints News Digital Networks MD as chair
- IGA marketing leader: Purpose and personalisation are critical to competitive success
- CMO's top 10 martech stories for the week - 22 September