Forget the territorial battles being fought at other companies between marketing and technology executives. At renowned athletic gear maker Adidas Group, the digital marketing approach is built on a real alliance between the two disciplines.
Security / Interviews
Smartphones aren't cheap, but they've become our window to the world. We use them to run our lives, stay plugged in and even get some work done. We can't live without 'em. And so we dig into our pockets every month to pay a huge phone bill despite our shoestring budget.
<em>The problem with signature based security tools is you are vulnerable until the signature is released and distributed. Palo Alto Networks takes a different approach with Traps, so Network World Editor in Chief John Dix tracked down Palo Alto VP of Product Marketing Scott Gainey for an inside look at how Traps works.</em>
Bill Clinton's run for presidency nearly derailed when rumors surfaced that he had smoked marijuana during his time in England. In an effort to control the damage, Clinton admitted that he indeed experimented with the illegal drug but "didn't inhale." Imagine how history might have changed if a video of a glassy-eyed Clinton with a joint between his lips had shown up on Youtube (which, of course, didn't exist at the time).
With a number of high-profile security breaches making headlines of late, organizations are increasingly realizing they must beef up their security teams or risk catastrophe. Matt Comyns, global co-head of the Cybersecurity practice at Russell Reynolds Associates, an executive leadership and search firm, sat down with CIO.com to discuss the changing role of the Chief Information Security Officer (CISO), the global cybersecurity landscape and why finding and retaining elite security talent is critical.
Canadian airline company WestJet is one of the earliest customers of VMware's NSX network virtualization tools, which initially reached for the tech to address a security issue. Network World Editor in Chief John Dix recently sat down with WestJet technologist Richard Sillito to learn what the company is learning about network virtualization and its broader NSX plans.
Catbird Networks Director of Product Management, Malcolm Reike, talks about how virtualization changes the security game with Network World Editor in Chief John Dix.
Jeff Schilling, who joined cloud hosting startup FireHost this week as chief security officer, knows a thing or two about cybersecurity.
Michael Keithley has more than two decades of experience as a CIO. However, the IT veteran says he's seeing more change now than ever before. CIO.com's Tom Kaneshige sat down with Keithley to talk about the challenges he and his colleagues face, the need to speak the same language as the business side and the reality of what lies ahead for CIOs who refuse to change their approach.
The terms "Internet of Things" (IoT) and "connected home" are two of the trendiest buzzwords in the technology world today. And while both clearly offer very real potential, they also introduce their own share of risk, particularly if they're not approached with caution, according to Jerry Irvine, an owner and CIO of IT outsourcing services firm, Prescient Solutions.
The INFORMS code of ethics requires analytics professionals to report unbiased answers, not just what the client wants to hear.
Apple's first rule about enterprise features: 'You don't talk about enterprise features.' While you may not hear it from Cupertino, BYOD features abound in iOS 7 and, according to AirWatch's Blake Brannon, they are 'as innovative as we've seen from Apple.'
Good Technology has become one the leaders in mobile management, amassing more than 4,000 customers, including many in government and highly regulated industries.
Cloud computing gives organisations the opportunity to rethink many traditional IT practices, but it may be a particularly good fit for disaster recovery and business continuity.
As the evasion of consumer tech changes IT, it makes sense that support for consumer devices would start to reflect the retail experience. Think Apples Genius Bar. Mike Burgio of Inergex, an IT services firm, talks about why IT leaders need to think about hitting the bar.
Cloud storage, text messaging, poor accountability and the "Bad Leaver" open the doors to data breaches in a BYOD environment, says a cyber-crime expert in this CIO.com interview.
At Energy Future Holdings, CEO John Young emphasizes the human factors behind IT, supports standardization and expects the CIO to work with business partners.
A "bring your own support" movement is sprouting up within BYOD programs as employees become more self-sufficient. Is this a death knell for the IT help desk? One possible savior: an enterprise Genius Bar.
There's no easy path to iPad adoption and a bogged-down iPad pilot program can spell disaster. Apple could be more helpful to businesses, but there are ways to simplify complicated iPad migrations. Here's what a tech services firm learned while helping Cablevision configure 3,000 iPads.
For Dell Software CIO Carol Fawcett, "BYOD" is not about being an expert on every mobile device in the world; it's about giving workers secure access to the apps and data they need on whatever device they are using.
- USA beckons for expanding Melbourne-based AWS cloud partner
- Defence hunts for IT partners to fill internet services panel
- Harris Technology hones cloud capabilities through Hosted Network
- Vocus inks deal with Alcatel-Lucent for $228 million Australia Singapore Cable
- How partners can accentuate the vertical
- Predictions: 17 digital marketing trends for 2017
- How iflix used consumer intent data to gain 1 million subscribers in six months
- Mercer's marketing and customer chief promoted to global role
- Twitter gets new product head and team from app startup Yes
- Review of 457 visa scheme raises questions about local versus imported marketing skills