Articles

Tag: information managememt (page 4)

  • SAP Starts Enterprise Store - With a Twist

    SAP Starts Enterprise Store - With a Twist

    When you hear a term like SAP Store, a place to buy branded merchandise probably comes to mind. A web site where enthusiasts can get logo-wear like baseball caps, polo shirts, coffee mugs, you name it … After all, Oracle has one, so does Tableau, ditto for Cloudera. But

    Continue reading...


  • If Desktops Go Away, Will Admins Follow? #MSIgnite

    On the final day of Microsoft’s first Ignite conference in Chicago, a standing-room-only crowd made up entirely of admins listened to independent consultant, author and lecturer Mark Minasi as he led them on a discussion of the forthcoming benefits and near-term headaches (at least hopefully near-term) of administrating users of

    Continue reading...


  • Why You Need to Scan for Open Source Vulnerabilities

    Remember the good old days of open source, when your main concern was whether you might have inadvertently violated a license or piece of intellectual property? And if you did, well then at worst you'd have to turn over a piece of that software code to the open source community?

    Continue reading...


  • Who Is Your Weakest Link? The Risks of Cloud Partners

    Who Is Your Weakest Link? The Risks of Cloud Partners

    Think your organization is safe if it minds its own security? Think again. You’ve also got to worry about security at all those companies you associate with, from suppliers and consulting firms to PR agencies, systems integrators, event planners and even heating and cooling vendors.

    Continue reading...


  • Businesses Committed to SharePoint, Despite Stalled Deployments

    Since Microsoft unveiled SharePoint back in 2001, it has been one of the fastest growing products in the software giant's history. Along with billions of dollars in revenue, the platform now boasts 125 million users and counting.

    Continue reading...


  • A Yelp for Enterprise Analytics? Alation Emerges from Stealth

    Why is the distance from data to discovery so long? Show me someone who works with big data, and I’ll show you someone who has asked the question.

    Continue reading...


  • We're All In This Together: Share Your Cybercrime Stories

    We're All In This Together: Share Your Cybercrime Stories

    What's the best defense against cybercrime? Surprisingly, it might be a big mouth. Sharing information about threats and risks is quickly becoming the expected starting point for any credible defense. And as proof, you need look not further than recent examples in the public, private and non-profit sector.

    Continue reading...


  • How to Be Smart with Your Corporate Data

    How to Be Smart with Your Corporate Data

    The cyber attack against Sony Pictures revealed a treasure trove of titillating sensitive corporate data: emails that revealed the true feelings of certain producers for certain movie stars, sensitive compensation data for employees up and down the company's food chain, and scripts of future movies.

    Continue reading...


  • Cleaning Up File Shares: Bloody Footprints and Zombie Projects

    Cleaning Up File Shares: Bloody Footprints and Zombie Projects

    File share projects don't culminate in casual review of file extensions. The fun is just beginning. The next steps should include 'easy deletes', baseline statistical capture, and thoughtful project management.

    Continue reading...


  • IT Gets Strategic (Again)

    IT Gets Strategic (Again)

    The CIO of a global Medical Device manufacturing company recently said to me, "I don't want to have to install another piece of software at this company unless I absolutely have to." "You want to hear something that will really blow your mind?" he followed.

    Continue reading...


Displaying 43-52 of 52