Category Archives: Security

IT and HR: Not such an odd couple

How businesses perform has always depended on how well their employees perform. Yet never before has the relationship between how well employees work and the digital technology that they use been so complex. At the same time, companies are grappling … Continue reading

Posted in application transformation, Citrix, Cloud computing, Cyber security, Data center transformation, Deloitte, Enterprise architect, machine learning, Mobile apps, mobile computing, Security, social media, User experience | Tagged , , , , , , , , , , , , , , , | Leave a comment

HPE’s Erik Vogel on what’s driving success in hybrid cloud adoption and optimization

The next BriefingsDirect Voice of the Innovator discussion explores the latest insights into hybrid cloud success strategies. As with the often ad hoc adoption of public cloud services by various groups across an enterprise, getting the right mix and operational coordination … Continue reading

Posted in AIOps, artificial intelligence, Cloud computing, Data center transformation, enterprise architecture, Hewlett Packard Enterprise, machine learning, multicloud, Security, User experience | Tagged , , , , , , , , , , , , , | Leave a comment

How total deployment intelligence overcomes the growing complexity of multicloud management

The next BriefingsDirect Voice of the Innovator discussion focuses on the growing complexity around multicloud management and how greater accountability is needed to improve business impacts from all-too-common haphazard cloud adoption. Stay with us to learn how new tools, processes, and methods are … Continue reading

Posted in AIOps, artificial intelligence, Cloud computing, containers, data center, Data center transformation, DevOps, Enterprise architect, enterprise architecture, Hewlett Packard Enterprise, machine learning, multicloud, Security | Tagged , , , , , , , , , , , , , | Leave a comment

For a UK borough, solving security issues leads to operational improvements and cost-savings across its IT infrastructure

The next BriefingsDirect enterprise IT productivity discussion focuses on solving tactical challenges around security to unlock strategic operational benefits in the public sector. For a large metropolitan borough council in South Yorkshire, England, an initial move to thwarting recurring ransomware attacks ended … Continue reading

Posted in Bitdefender, Cloud computing, Cyber security, machine learning, risk assessment, Security, User experience, Virtualization | Tagged , , , , , , , , , , , | Leave a comment

Qlik’s top researcher describes new ways for human cognition to join forces with augmented intelligence

The next BriefingsDirect business intelligence (BI) trends discussion explores the latest research and products that bring the power of people and machine intelligence closer together. As more data becomes available to support augmented intelligence — and the power of analytics platforms increasingly goes to … Continue reading

Posted in artificial intelligence, big data, Business intelligence, Cloud computing, Cyber security, data analysis, machine learning, Qlik, RPA, Security, Software, User experience | Tagged , , , , , , , , , , , | Leave a comment

How IT can fix the broken employee experience

Learn how IT can elevate the game by delivering simpler, more intelligent experiences that enable people to work consistently at their informed best. Continue reading

Posted in artificial intelligence, BYOD, Citrix, Cloud computing, Cyber security, data center, Data center transformation, Deloitte, Enterprise transformation, machine learning, Microsoft, multicloud, Security, User experience, vdi, Virtualization | Tagged , , , , , , , , , , , | Leave a comment

Architectural firm attains security and performance confidence across virtualized and distributed desktops environment

A discussion on how BLDD Architects gains better overall security, management, and data center consolidation from being nearly 100 percent virtualized across multiple distributed offices. Continue reading

Posted in application transformation, Bitdefender, Cyber security, Data center transformation, Hewlett Packard Enterprise, risk assessment, Security, server, storage, User experience | Tagged , , , , , , , , , , | Leave a comment