Contributor's stories - Page 4
The 5 essential pillars of big data GDPR compliance
Almost exactly one year from today, on May 25, 2018, the General Data Protection Regulation (GDPR) will come into effect in the European Union.
Australian food safety: Could blockchain be the unexpected solution?
The number one priority must be consumer safety and new technologies such as blockchain have the potential to shake up the global trade of food.
HPE: Stay on the cutting edge with software defined OT
As competition in the IoT and Intelligent Edge industries increases, companies are seeking new ways to stand apart and delight their customers.
Here's why WannaCry might be the tip of the iceberg
Much ink is still being expended trying to determine who was responsible for WannaCry and what their motives were. But there's a bigger lesson here.
Internet of Things / IOT
Financial services cybersecurity pain points security providers must consider
It is now paramount for financial services organisations to implement an architecture and strategy that has the capacity to support global trends.
Separating fintech noise from reality - Gartner
The ongoing hype around fintechs affects bank CIOs’ ability to engage with them.
Kiwis - too relaxed about cybercrime? Palo Alto tech ramps up NZ cybersecurity
Why do many Kiwis still ignore the real repercussions of not considering business continuity?
How to achieve a DevOps best practice in your organisation
Organisations globally are turning to DevOps to address the increasing pressure to deliver higher quality apps within a shorter period of time.
Internet of Things / IOT
Meeting the challenges of big data in the modern data centre
We’re in the midst of a communications revolution where enterprise data centre networks must keep pace with ever increasing capacity demands.
WannaCry, IoT and you: Securing your customers in an unsafe world
Ingram Micro’s Andrew Khan explains how ransomware like WannaCry can be mitigated by the 3As: Automation, analytics and artificial intelligence.
Security - It really is all or nothing if you want to know the enemy
“If you know the enemy and know yourself, you need not fear the result of a hundred battles.”
SDN & NFV
AT&T MD for A/NZ: "Take advantage of SDN and NFV to be more responsive in Asia"
AT&T managing director for A/NZ talks about how businesses can compete with speed and efficiency in fast-changing Asia.
Schneider Electric: Enhancing data center performance, gamefully
Since technology and cost aren’t a hurdle, I want to talk about the next lump in the road; people.
Data Centre Cooling
New data center cooling tech - crucial to achieving carbon reduction goals
Countries around the globe are taking definitive steps to reduce greenhouse gas (GHG) emissions and, consequently, their carbon footprint.
Take advantage of network function virtualisation & be more responsive in Asia
A one-size-fits-all approach to networking is no longer enough to help businesses compete.
Schneider Electric: The impact of the cloud on hybrid data center designs
"Cloud computing is driving the need to rethink the redundancy requirements of edge physical infrastructure equipment.”
The virtualisation architect: Top 6 must-haves of the modern data centre
Australian organisations are starting to find that most legacy architectures can’t support growing demands of speed, scale, and agility.
The connected campus: Meeting students’ #1 priority with edge solutions
To stay alive, human beings need air, food and water. If you are college student, add to this list of vital resources Internet access.
Digital tech - the answer to Aussie healthcare's biggest ailments?
The popularity of telehealth has been rising steadily as a viable option for medical consultation and diagnosis.
Digital Transformation / DX
The new-age CEO: three steps to effective digital leadership
Given the pace that digital innovation is disrupting industries, it’s not surprising that digital enablement is quickly becoming a top CEO priority.
Join the data revolution - How banks can change with the times
Making sense of data in a unified model is crucial. Without that, we end up with data but not information.
The three types of employees that can cause a data breach
More and more companies are realizing that trusted & trained employees can also pose an enormous threat. We have identified three types of employees.
SolarWinds: New challenges from hybrid IT despite cost benefits
IT professionals must be open to and agile in adopting the best-of-breed elements of cloud computing and hybrid IT.
Data Centre Cooling
DCIM’s improvement to workflow processes is key to eliminating data center challenges
But for me, the most interesting aspects of the research is in unpacking the impact of a range of data center problems on the business itself.