System News
back1 2 3 4 5 6 7 8 9 10 11 next
Articles for the keywords: Management
08 Sep 2017 How Does AI and Regulation Play Into Fintech? [66167]
Business 2 Community, September 8th, 2017

"Fintech, or Financial Technologies, has proven that it's more than just an industry buzzword. Fintech represents many technologies that have already disrupted traditional financial services. One of Fintech's advances is enhancing everything from mobile payments, money transfers, loans, fundraising, and asset management. According to a report by Accenture, investment in Fintech has jumped from $930 million in 2008 to more than $12 billion by early 2015.

There's no question that Fintech is here to stay. But are two important components that are playing a role in where exactly Fintech is headed; AI and regulation..."
(Get More Information . .) open to premium members only

08 Sep 2017 Cover Your aaS Renewal Discussions [66171]
Forrester, September 8th, 2017

"Many of our clients are fast approaching their contractual renewal dates for Cloud and as-a-service (aaS) offerings. They have expressed concerns over vendors changing licensing models and pricing terms at the renewal point, usually to our clients' detriment. They feel almost powerless at the negotiation table and perceive that vendors are playing on their immaturity regarding effective aaS exit management strategies, making them reluctant to change vendor and in turn leading to uncomfortable budgetary discussions with their CIOs..."
(Get More Information . .) open to premium members only

07 Sep 2017 The 16 Biggest Data Breaches of the 21st Century [66154]
CSO Online, September 7th, 2017

"Security practitioners weigh in on the 16 worst data breaches in recent memory.

  • Yahoo -Adult Friend Finder
  • eBay
  • Equifax
  • Heartland Payment Systems
  • Target Stores
  • TJX Companies, Inc.
  • JP Morgan Chase
  • US Office of Personnel Management (OPM)
  • Sony's PlayStation Network

Data breaches happen daily, in too many places at once to keep count. But what constitutes a huge breach versus a small one?..."
(Get More Information . .) open to premium members only

07 Sep 2017 Red Hat Advances Enterprise and Network Automation with New Ansible Offerings [66178]
Red Hat, September 7th, 2017

Red Hat, Inc. introduced new innovations designed to advance IT automation as its strategic importance grows in the enterprise. Ansible is a game-changing open source automation technology for the management of IT environments at scale. Designed to be simple to adopt, use, and understand, Ansible has become one of the world's most popular open source IT automation technologies, with nearly 3,000 unique contributors, more than 32,000 commits to the upstream Ansible open source project, and a user base that spans industries and the globe. Red Hat acquired the company behind Ansible in 2015, with the aim of helping users drive down the cost and complexity of deploying and managing both cloud-native and traditional applications across hybrid cloud environments. With Ansible, organizations can make the automated enterprise a reality...
(Get More Information . .) open to premium members only

06 Sep 2017 How to Implement a Solid Identity and Access Management Strategy (Slideshow) [66140]
eWeek, September 6th, 2017

"Most enterprises select and implement technology to perform tasks better, deliver higher value to users, fulfill their business mission and become more agile as an organization. But it often happens that many IT initiatives, including identity and access management (IAM), deter new technology initiatives and hamstring a company's IT agility. This is largely because IAM can appear to be an unwelcome process for employees to learn. In this eWEEK slide show, One Identity Product Marketing Manager Todd Peterson explains 11 universal truths of IAM that provide common-sense guidance on how to implement a solid IAM strategy - without impeding business agility..."
(Get More Information . .) open to premium members only

back1 2 3 4 5 6 7 8 9 10 11 next

!-- end archive_section.tpl -->