Category Archives: Cyber security

Three generations of Citrix CEOs on enabling a better way to work

Learn how one company has not only reinvented itself but made major and correct bets on the future direction of global information technology. Continue reading

Posted in application transformation, artificial intelligence, big data, Business intelligence, Citrix, Cloud computing, Cyber security, data center, Data center transformation, Enterprise transformation, Information management, machine learning, Microsoft | Tagged , , , , , , , , , , , , , , | Leave a comment

How Unisys and Dell EMC head off backup storage cyber security vulnerabilities

Learn how data from one end of its life cycle to the other needs new protection and a means for rapid recovery. Continue reading

Posted in AIOps, big data, Cloud computing, Cyber security, Dell, DevOps, disaster recovery, Information management, Security, storage, Unisys | Tagged , , , , , , , , , , , , , , , , , | Leave a comment

How Unisys and Microsoft team up to ease complex cloud adoption for governments and enterprises

The path to cloud computing adoption persistently appears complex and risky to both government and enterprise IT leaders, recent surveys show. This next BriefingsDirect managed cloud methodologies discussion explores how tackling complexity and security requirements upfront helps ease the adoption of cloud … Continue reading

Posted in AIOps, application transformation, artificial intelligence, Cloud computing, containers, Cyber security, data center, Data center transformation, DevOps, Enterprise architect, Enterprise transformation, Microsoft, multicloud, Unisys | Tagged , , , , , , , , , , , , , , , | Leave a comment

IT and HR: Not such an odd couple

How businesses perform has always depended on how well their employees perform. Yet never before has the relationship between how well employees work and the digital technology that they use been so complex. At the same time, companies are grappling … Continue reading

Posted in application transformation, Citrix, Cloud computing, Cyber security, Data center transformation, Deloitte, Enterprise architect, machine learning, Mobile apps, mobile computing, Security, social media, User experience | Tagged , , , , , , , , , , , , , , , | Leave a comment

For a UK borough, solving security issues leads to operational improvements and cost-savings across its IT infrastructure

The next BriefingsDirect enterprise IT productivity discussion focuses on solving tactical challenges around security to unlock strategic operational benefits in the public sector. For a large metropolitan borough council in South Yorkshire, England, an initial move to thwarting recurring ransomware attacks ended … Continue reading

Posted in Bitdefender, Cloud computing, Cyber security, machine learning, risk assessment, Security, User experience, Virtualization | Tagged , , , , , , , , , , , | Leave a comment

Qlik’s top researcher describes new ways for human cognition to join forces with augmented intelligence

The next BriefingsDirect business intelligence (BI) trends discussion explores the latest research and products that bring the power of people and machine intelligence closer together. As more data becomes available to support augmented intelligence — and the power of analytics platforms increasingly goes to … Continue reading

Posted in artificial intelligence, big data, Business intelligence, Cloud computing, Cyber security, data analysis, machine learning, Qlik, RPA, Security, Software, User experience | Tagged , , , , , , , , , , , | Leave a comment

How IT can fix the broken employee experience

Learn how IT can elevate the game by delivering simpler, more intelligent experiences that enable people to work consistently at their informed best. Continue reading

Posted in artificial intelligence, BYOD, Citrix, Cloud computing, Cyber security, data center, Data center transformation, Deloitte, Enterprise transformation, machine learning, Microsoft, multicloud, Security, User experience, vdi, Virtualization | Tagged , , , , , , , , , , , | Leave a comment