Tag Archives: security

IT and HR: Not such an odd couple

How businesses perform has always depended on how well their employees perform. Yet never before has the relationship between how well employees work and the digital technology that they use been so complex. At the same time, companies are grappling … Continue reading

Posted in application transformation, Citrix, Cloud computing, Cyber security, Data center transformation, Deloitte, Enterprise architect, machine learning, Mobile apps, mobile computing, Security, social media, User experience | Tagged , , , , , , , , , , , , , , , | Leave a comment

For a UK borough, solving security issues leads to operational improvements and cost-savings across its IT infrastructure

The next BriefingsDirect enterprise IT productivity discussion focuses on solving tactical challenges around security to unlock strategic operational benefits in the public sector. For a large metropolitan borough council in South Yorkshire, England, an initial move to thwarting recurring ransomware attacks ended … Continue reading

Posted in Bitdefender, Cloud computing, Cyber security, machine learning, risk assessment, Security, User experience, Virtualization | Tagged , , , , , , , , , , , | Leave a comment

How IT can fix the broken employee experience

Learn how IT can elevate the game by delivering simpler, more intelligent experiences that enable people to work consistently at their informed best. Continue reading

Posted in artificial intelligence, BYOD, Citrix, Cloud computing, Cyber security, data center, Data center transformation, Deloitte, Enterprise transformation, machine learning, Microsoft, multicloud, Security, User experience, vdi, Virtualization | Tagged , , , , , , , , , , , | Leave a comment

Architectural firm attains security and performance confidence across virtualized and distributed desktops environment

A discussion on how BLDD Architects gains better overall security, management, and data center consolidation from being nearly 100 percent virtualized across multiple distributed offices. Continue reading

Posted in application transformation, Bitdefender, Cyber security, Data center transformation, Hewlett Packard Enterprise, risk assessment, Security, server, storage, User experience | Tagged , , , , , , , , , , | Leave a comment

Happy employees equal happy customers — and fans. Can IT deliver for them all?

A discussion on how new breeds of intelligent digital workspace technologies can deliver a superior employee — and ultimately customer — experience that boosts engagement, productivity, and business results. Continue reading

Posted in application transformation, Citrix, Cyber security, Data center transformation, enterprise architecture, Mobile apps, mobile computing, Security, User experience, vdi, Virtualization | Tagged , , , , , , , , , , , | Leave a comment

How enterprises like McKesson digitize procurement and automate spend management to slash waste

A discussion on how leading enterprises are digitizing procurement and automating spend management to reduce inefficiencies, cut manual tasks, and streamline the entire source-to-pay process. Continue reading

Posted in Ariba, artificial intelligence, Business intelligence, electronic medical records, ERP, healthcare, Internet of Things, machine learning, procurement, RPA, Spot buying, supply chain | Tagged , , , , , , , , , , , , , , , | Leave a comment

CEO Henshall on Citrix’s 30-year journey to make workers productive, IT stronger, and partners more capable

Learn how Citrix is charting a new future of work that abstracts productivity above apps, platforms, data, and even clouds to empower, energize, and enlighten disaffected workers while simplifying and securing anywhere work across any deployment model. Continue reading

Posted in application transformation, artificial intelligence, Citrix, Cloud computing, Cyber security, Data center transformation, Enterprise architect, Enterprise transformation, machine learning, multicloud, Security, User experience, Virtualization | Tagged , , , , , , , , , , | Leave a comment