Category Archives: mobile computing

IT and HR: Not such an odd couple

How businesses perform has always depended on how well their employees perform. Yet never before has the relationship between how well employees work and the digital technology that they use been so complex. At the same time, companies are grappling … Continue reading

Posted in application transformation, Citrix, Cloud computing, Cyber security, Data center transformation, Deloitte, Enterprise architect, machine learning, Mobile apps, mobile computing, Security, social media, User experience | Tagged , , , , , , , , , , , , , , , | Leave a comment

Happy employees equal happy customers — and fans. Can IT deliver for them all?

A discussion on how new breeds of intelligent digital workspace technologies can deliver a superior employee — and ultimately customer — experience that boosts engagement, productivity, and business results. Continue reading

Posted in application transformation, Citrix, Cyber security, Data center transformation, enterprise architecture, Mobile apps, mobile computing, Security, User experience, vdi, Virtualization | Tagged , , , , , , , , , , , | Leave a comment

Price transparency in healthcare to regain patient trust requires accuracy via better use of technology

A discussion on how new transparency on costs in healthcare provides both a step toward more educated choices as well as an opportunity to use technology to inform and instruct throughout increasingly complex payer-provider-patient processes. Continue reading

Posted in artificial intelligence, big data, Business intelligence, electronic medical records, Enterprise transformation, Government, healthcare, Information management, machine learning, mobile computing, multicloud, Networked economy, procurement, Security, supply chain, User experience | Tagged , , , , , , , , , | Leave a comment

Industrial-strength wearables combine with collaboration cloud to bring anywhere expertise to intelligent-edge work

Learn about the new high-water mark for wearable augmented collaboration technologies. Continue reading

Posted in artificial intelligence, Cloud computing, Enterprise transformation, Hewlett Packard Enterprise, Internet of Things, machine learning, mobile computing | Tagged , , , , , , , , | Leave a comment

Path to client workspace automation paved with hyperconverged infrastructure for New Jersey college

The next BriefingsDirect hyperconverged infrastructure (HCI) use case discussion explores how a New Jersey college has embarked on the time-saving, virtual desktop infrastructure (VDI) modernization journey. We will now learn how the combination of HCI and VDI makes the task of deploying and … Continue reading

Posted in Citrix, Cloud computing, Cyber security, Data center transformation, disaster recovery, Enterprise architect, enterprise architecture, Enterprise transformation, Hewlett Packard Enterprise, hyperconverged infrastructure, mobile computing, professional services, Security, VMware | Tagged , , , , , , , , , , , | Leave a comment

Retail gets a makeover thanks to data-driven insights, edge computing, and revamped user experiences

The next BriefingsDirect Voice of the Customer vertical industry disruption solutions interview explores how intelligence, edge computing, and a rethinking of the user experience come together to give retailers a business-boosting makeover. We’ll now learn how Deloitte and Hewlett Packard … Continue reading

Posted in application transformation, artificial intelligence, big data, Business intelligence, Business networks, Cloud computing, CRM, data analysis, Deloitte, Enterprise architect, enterprise architecture, Enterprise transformation, Hewlett Packard Enterprise, Internet of Things, Mobile apps, mobile computing, Networked economy, retail, social media, User experience | Tagged , , , , , , , , , , , | Leave a comment

Kansas Development Finance Authority gains peace of mind, end-points virtual shield using hypervisor-level security

Implementing and managing IT security has leaped in complexity for organizations ranging from small and medium-sized businesses (SMBs) to massive government agencies. Once-safe products used to thwart invasions now have been exploited. E-mail phishing campaigns are far more sophisticated, leading … Continue reading

Posted in Bitdefender, Citrix, Cloud computing, Cyber security, data center, Data center transformation, Enterprise architect, machine learning, Microsoft, mobile computing, Security, server, Virtualization, VMware | Tagged , , , , , , , , , , , , , , | Leave a comment