University of Wisconsin, Madison, CIO Bruce Maas offers pointers on why CIOs and information technology leaders shouldn’t shy away from scaling opportunities. CIOs and information technology leaders should embrace and initiate scaling projects to thrive in the evolving world of IT.read more
Did you feel a sudden loss of Internet freedom in February 2015? That’s when the Federal Communications Commission imposed net neutrality rules that prevent Internet service providers from discriminating against websites and other online services. And that’s when Americans lost their Internet freedom—according to the current FCC chairman, Ajit Pai.read more
What began as a straightforward software contract with Epic resulted this week in the U.S. Coast Guard starting its entire EHR acquisition process over some seven years after it began. EHR implementations are notorious budget-busters often fraught with missed deadlines and other unforeseen complications, but for an organization to abandon the project altogether and embark on a new beginning is uncommon.read more
Cybercriminals use sophisticated technology to rake in millions of dollars in scammed and stolen money across the globe, and cost their victims millions more to clean up the messes they leave behind. When police try to break up these online rings, they find a whole set of obstacles that are different from crimefighting in the physical world. Cybersecurity researchers Frank Cilluffo and Alec Nadeau, along with Europol Director Rob Wainwright, reviewed the multinational effort to take down a massive cybercrime network. What they learned is both surprising and immediately useful.read more
Net-A-Porter didn’t know how much money it was leaving on the table when the Web site failed to keep up with traffic. New microservices captured it.
Luxury fashion might seem to be an unlikely space to suffer from sudden onslaughts of high traffic, given the non-mass marketing approach that luxury by definition implies. If millions of consumers are involved, then how luxurious can it beread more
The first mistake companies make while trying to protect their digital assets is to believe they can be secure. “Forget aspiring to full protection. Hacking is black magic engaged in by a ton of bad guys from Russia to Romania whose citizens do not necessarily view them as the bad guys,” Eric Cornelius shared at Fusion 2017.read more
The deputy director of the New Jersey Office of Homeland Security and Preparedness, Steve Gutkin, explains how building strategic public and private partnerships can help protect a country’s critical infrastructure and offers pointers on nurturing such alliances.read more
Wearables are now a significant part of corporate wellness and remote patient monitoring programs. However, long-term investment from seniors remains a challenge, despite an increasing need for seniors to have better healthcare options.
Garmin and Tactio Health Group, two major companies involved in telehealth and wearable technology, are combining forces to provide a telehealth solution specially designed to monitor the daily health and well-being of seniors.read more
A couple of weeks ago I met with the email management and security vendor Retarus. While I was unfamiliar with the company (and it had a reasonably standard portfolio, I thought at first glance), my interest was piqued because it was German, and the country is very particular about such questions as personal data, privacy and so on.read more
State of Wisconsin CIO David Cagigal and CISO Bill Nash offer pointers on how a strategic CIO-CISO partnership can help drive and prioritize cybersecurity. They enumerate the elements that help drive an optimal CIO-CISO partnership and offer pointers on how to evade tensions in their relationship. They stressed that communication between their roles is vital to prioritizing cybersecurity efforts.read more
Microsoft is launching IoT Central today, a new Internet of Things (IoT) service that gives enterprises a fully managed solution for setting up their IoT deployments without needing the in-house expertise necessary for deploying a cloud-based IoT solution from scratch. It’s basically IoT-as-a-Service.
In addition, the company is bringing its Azure Stream Analytics to edge devices, making it easier to provision new IoT devices, and it’s launching a completely new analytics service for time series data.read more
When it comes to keeping confidential data locked down, it turns out that even employees trained in cybersecurity best practices still don’t always know how to protect sensitive information, according to the Dell End-User Security Survey 2017 released today.
While employees don’t want their companies to fall victim to a security breach, they also prefer to avoid security policies that limit their workplace productivity and daily activities, the survey found.read more
The rapid advancement of mobility in the enterprise has often outpaced the development of mobile data security best practices, and this obstacle is made more complicated by the fact that mobile devices now include emerging technology such as the internet of things. The trend has left companies — and their IT leaders — scrambling to develop mitigating mobile security technology and processes necessary to protect data.read more
Chinese internet giant Baidu has said it will share much of the technology it has created for its self-driving cars.
The firm predicted that the move would help drive the development of autonomous vehicles.
Called Apollo, the project will make a range of software, hardware and data services available to others, especially carmakers.read more
Facebook on Wednesday pulled aside the curtain on a secretive unit headed by a former chief of the Pentagon’s research arm, disclosing that the social media company is studying ways for people to communicate by thought and touch.read more