IT pros need to weigh in on that ‘sassy’ security model
SASE model developed by Gartner ties into SD-WAN, edge computing and SD-Branch, so it warrants attention from networking teams.
SASE model developed by Gartner ties into SD-WAN, edge computing and SD-Branch, so it warrants attention from networking teams.
Everyone is talking about the transformation that enterprises must undergo. However, the gap between ambition and execution is widening as transformations stall or flail.
Tech chiefs have an opportunity to use certain technology to tap into the talent pool among the 17.7 per cent of Australians living with some type of disability, says Gartner research vice president, Brian Prentice.
Investments in modern business intelligence (BI), augmented analytics and robotic process automation (RPA) will help drive IT spending in the banking and securities sector, according to Gartner.
Forecasting long-range IT technology trends is a little herding cats – things can get a little crazy.
When a bad CEO goes down, the CIO often goes down with him. The way to save yourself, and your company, is to invest in the analytics technology that gives the CEO the data necessary to make smart business decisions. It doesn't hurt that it also shows why the CIO is more valuable to the CEO than other C-level executives.
1.The concept is still quite new. The term data lake, credited to Pentaho CTO James Dixon, has been bandied about for several years. But the idea of data lakes as corporate resources is still in its infancy, according to IDC analyst Ashish Nadkarni. A data lake is defined as a massive--and relatively cheap--storage repository, such as Hadoop, that can hold all types of data until it is needed for business analytics or data mining. A data lake holds data in its rawest form, unprocessed and ungoverned.
1. Bi-modal IT is real, and it's likely to be embraced by your company
Microsoft's Windows 10 will not have a fragmentation problem, analysts argued, even though its rapid development tempo and a host of update cadences will spin off so many versions that not everyone will be running the same code, or even have the same features, at any one time.
Cybersecurity firm <a href="http://www.fortinet.com/press_releases/2015/fortinet-announces-agreement-to-acquire-meru-networks.html">Fortinet's purchase last week of wireless network manufacturer Meru Networks</a> for $44 million is the second major acquisition of a Wi-Fi hardware vendor in three months and, potentially, the start of a broader pattern.
Google is expected to reveal details about Android Pay at its annual I/O conference this week, even as Samsung readies its own separate mobile payment service.
Vulnerabilities and their exploitation are still the root cause of most breaches. IT security leaders should refocus their attention on how vulnerabilities are being managed and should track this metric to provide visibility as to how to reduce the biggest risks of being breached.