Category Archives: Security

How IoT and OT collaborate to usher in the data-driven factory of the future

The next BriefingsDirect Internet of Things (IoT) technology trends interview explores how innovation is impacting modern factories and supply chains. We’ll now learn how a leading-edge manufacturer, Hirotec, in the global automotive industry, takes advantage of IoT and Operational Technology … Continue reading

Posted in application transformation, big data, Business intelligence, Cloud computing, data analysis, data center, Enterprise architect, enterprise architecture, Enterprise transformation, Hewlett Packard Enterprise, Internet of Things, machine learning, Security, Software-defined storage, storage | Tagged , , , , , , , , , , , , , , | 1 Comment

How a Florida school district tames the wild west of education security at scale and on budget

Bringing a central IT focus to large public school systems has always been a challenge, but bringing a security focus to thousands of PCs and devices has been compared to bringing law and order to the Wild West. For the … Continue reading

Posted in big data, Cloud computing, Cyber security, disaster recovery, Enterprise architect, Government, Help desk, Identity, Microsoft, Security, social media | Tagged , , , , , , , , , , , , , | Leave a comment

How Imagine Communications leverages edge computing and HPC for live multiscreen IP video

The next BriefingsDirect Voice of the Customer HPC and edge computing strategies interview explores how a video delivery and customization capability has moved to the network edge — and closer to consumers — to support live, multi-screen Internet Protocol (IP) … Continue reading

Posted in application transformation, big data, Cloud computing, Cyber security, data analysis, disaster recovery, Enterprise architect, enterprise architecture, Hewlett Packard Enterprise, Internet of Things, machine learning, Security, server, storage | Tagged , , , , , , , , , , , | Leave a comment

How The Open Group Healthcare Forum and Health Enterprise Reference Architecture cures process and IT ills

The next BriefingsDirect healthcare thought leadership panel discussion examines how a global standards body, The Open Group, is working to improve how the healthcare industry functions. We’ll now learn how The Open Group Healthcare Forum (HCF) is advancing best practices … Continue reading

Posted in big data, Cloud computing, Cyber security, data analysis, Data center transformation, Enterprise architect, enterprise architecture, Enterprise transformation, Government, Information management, Platform 3.0, Security, The Open Group | Tagged , , , , , , , , | Leave a comment

Advanced IoT systems provide analysis catalyst for the petrochemical refinery of the future

The next BriefingsDirect Voice of the Customer Internet-of-Things (IoT) technology trends interview explores how IT combines with IoT to help create the refinery of the future. We’ll now learn how a leading-edge petrochemical company in Texas is rethinking data gathering … Continue reading

Posted in application transformation, big data, Business intelligence, Cloud computing, Cyber security, data analysis, data center, Data center transformation, Enterprise architect, Enterprise transformation, Hewlett Packard Enterprise, HP, Information management, Internet of Things, Security | Tagged , , , , , , , , , , | Leave a comment

India Smart Cities Mission shows IoT potential for improving quality of life at vast scale

The next BriefingsDirect Voice of the Customer Internet-of-Things (IoT) transformation discussion examines the potential impact and improvement of low-power edge computing benefits on rapidly modernizing cities. These so-called smart city initiatives are exploiting open, wide area networking (WAN) technologies to … Continue reading

Posted in application transformation, artificial intelligence, big data, Business networks, Cloud computing, data analysis, data center, Data center transformation, enterprise architecture, Enterprise transformation, Government, Hewlett Packard Enterprise, HP, Information management, Internet of Things, machine learning, Mobile apps, mobile computing, Networked economy, Security, storage, User experience | Tagged , , , , , , , , , | Leave a comment

The next line of defense—How new security leverages virtualization to counter sophisticated threats

When it comes to securing systems and data, the bad guys are constantly upping their games — finding new ways to infiltrate businesses and users. Those who protect systems from these cascading threats must be ever vigilant for new technical … Continue reading

Posted in application transformation, big data, Bitdefender, Citrix, Cloud computing, Cyber security, data analysis, data center, DevOps, Enterprise architect, enterprise architecture, Enterprise transformation, Government, Identity, risk assessment, Security, Virtualization | Tagged , , , , , , , , , , , , | Leave a comment