System News
back6 7 8 9 10 11 12 13 14 15 16 next
Articles for the keywords: Management
04 Jun 2017 AI's Ability To Process Big Data Will Shake Up Insurance [63883]
Information Management, May 23rd 2017

Pat Speer writes in Information Management, "Despite how easy computing has become for the end user, the insurance industry is facing more technology-related challenges than ever. As a result, the expectations around technology advancements have reached an all-time high. These challenges - and expectations - don't have their roots in the technology itself, but in the ramifications of its use.

I admit to being a true technology geek, not by education but by interest, and was one of the first to purchase The Driver in the Driverless Car, a new book written by Vivek Wadhwa and Alex Salkever about how emerging technologies will impact our society and economy..."
(Get More Information . .) open to premium members only

04 Jun 2017 Calculate The Cost Of Downtime [63882]
CIO, May 22nd 2017

"IT projects, especially infrastructure projects can be challenging to get approved," opines Mike Sisco in CIO. "Discuss the 'cost of downtime' in your proposal so senior management can visualize and understand the risk implications, and you will get many more of your projects approved.

IT projects, especially infrastructure projects can be challenging to get approved.

Discuss the 'cost of downtime' so senior management can understand the financial or risk implications, and you will get many more of your projects approved..."
(Get More Information . .) open to premium members only

04 Jun 2017 Why Organizations Must Co-Opt Shadow IT [63885]
Information Management, May 25th 2017

"Denial has proven futile. Once just a worrisome trend, shadow IT has grown into a monster," opines Kris Lahiri in Information Management. "The aptly named phenomenon, a known risk of data breaches and financial liabilities, pits information technology professionals against end users in an endless battle for control of the digital workplace environment.

The 'number of unauthorized cloud apps being used in the enterprise' is up to 20 times higher than CIOs predicted, according to a Cisco survey. Attempts to suppress the infiltration of user apps with strict controls have done little more than exacerbate the face-off between 'stodgy' IT departments and freedom-loving end users..."
(Get More Information . .) open to premium members only

04 Jun 2017 Top Ten Articles for last few Issues [63841]
Vol 231 Issues 1, 2, 3 and 4 ; Vol 230 Issues 1, 2, 3 and 4

We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

  • 7 Ways To Secure Cloud Storage
  • 3 Things To Think About Before Firing An Employee
  • New Drone Technologies You Do Not Want To Miss
  • Tales In Tech History: Unix
  • How The CISO Moved From The Basement To The Boardroom
  • 22 Free Tools For Data Visualization And Analysis
  • 15 Tricky Job Interview Questions -- And How To Nail Them
  • Calculate The Cost Of Downtime
  • Understanding The Benefits And Threats When Building An Iot Strategy
  • AI's Ability To Process Big Data Will Shake Up Insurance

The longer version of this article has list of top ten articles for the last 8 weeks.
(Get More Information . .) open to premium members only

04 Jun 2017 Security Pros Reveal How They Cope With Rising Tide Of Cyber-Attacks [63876]
eWeek, May 19th 2017

"With new software vulnerability exploits in the news on a regular basis, the daily challenges of cyber-security professionals are as high as ever before," writes Sean Michael Kerner in eWeek.

"A report released on May 17, from security risk vendor Bay Dynamics, based on a survey of 400 cyber-security professionals conducted by Enterprise Management Associates reveals some of the challenges these professionals face on a daily basis. Among the big challenges is the simple fact that while the total number of security threats continues to rise, there is not a corresponding rise in staffing levels. Another key challenge is figuring out how to prioritize threat alerts, with 52 percent of respondents reporting that automated system improperly prioritize threats. In this slideshow eWEEK looks at some of the highlights of the Bay Dynamics/Enterprise Management Associates Day in the Life of a Cyber Security Pro report..."
(Get More Information . .) open to premium members only

 
back6 7 8 9 10 11 12 13 14 15 16 next






!-- end archive_section.tpl -->