Opinion stories - Page 228
Infosys: How businesses can overcome the artificial barriers to AI
Mon, 3rd Jul 2017
#
ai
#
opinion
#
stem
Roles which require emotional intelligence, imagination and human interaction will continue to be relevant and must be filled by human beings.
Securing assets and applications in the cloud
Mon, 3rd Jul 2017
#
devops
#
cloud security
#
iaas
Hard-coding and embedding credentials in the code or a script can initially make them easy to use – but this represents a significant vulnerability.
The age of containerisation and its impact on security
Fri, 30th Jun 2017
#
devops
#
application security
#
devsecops
A major concern is that enterprise adoption and deployment of DevOps and containers is outpacing the approach used to secure them.
How to build culture-driven digital transformation from the top down, across the board
Thu, 29th Jun 2017
#
digital transformation
#
capgemini
#
opinion
A Capgemini study exposes corporate culture as the main barrier to digital transformation, highlighting a crucial misalignment between leaders and staff.
Millennials: How they drive a workforce with their heads in the cloud
Wed, 28th Jun 2017
#
iot
#
f5 networks
#
workforce technology
The rise of millennials indicates the need for more mobile-savvy engagement as app-centric work environments become the norm for today's employees.
Cognizant: The future of intelligent transport in Australia
Wed, 28th Jun 2017
#
iot
#
smart home
#
intelligent systems
NSW's move towards intelligent transport embraces a future of driverless vehicles, revolutionising road safety and urban mobility.
Going rogue: The challenges of AI in customer service
Tue, 27th Jun 2017
#
crm
#
uc
#
cx
AI technologies are becoming increasingly sophisticated, and can add immense value to organisations — but they are by no means foolproof.
How to go threat hunting: The thrill of the hunt
Tue, 27th Jun 2017
#
threat intelligence
#
carbon black
#
opinion
Let's go threat-hunting. When the hunters and tools have been assembled, let us explore the thought processes that prepare them for a successful hunt.
Did you know your superyacht can be cyber-pirated?
Mon, 26th Jun 2017
#
malware
#
ransomware
#
cybersecurity
A white-hat hacker at a recent super-yacht investor conference demonstrated how he took control of a super-yacht's satellite communications system.
Free the network: Four reasons to build your network with SD-WAN
Mon, 26th Jun 2017
#
uc
#
firewalls
#
network infrastructure
SD-WAN revolutionises Aussie IT, promising cost-efficient, high-performance networking for an edge in the digital era.
In pursuit of productivity: Top technologies SMBs are adopting
Mon, 26th Jun 2017
#
productivity
#
smb
#
opinion
Technological development is changing expectations of SMBs and pushing them to find more ways to be more productive.
The doomsayers of Apple
Fri, 23rd Jun 2017
#
apple
#
ipad
#
opinion
Amidst a narrative of decline, Apple jockeys for tech supremacy but faces grumblings over innovation and identity.
Five steps to build a business case for enterprise mobility
Fri, 23rd Jun 2017
#
open source
#
red hat
#
mobility
Paving the path to profit with mobile tech: Key steps outlined for a solid business case for enterprise mobility amidst IT challenges.
Who's ready for augmented intelligence? The AI investment gap
Thu, 22nd Jun 2017
#
ai
#
ar, vr & metaverse
#
bluewolf
The AI Investment Gap – a discrepancy between C-Level executives who understand AI and those who have yet to deploy it into their business.
Rackspace presents five ways to reduce your ransomware risk
Tue, 20th Jun 2017
#
malware
#
ransomware
#
encryption
Rackspace reveals key strategies to combat ransomware, emphasizing robust backups and vigilant patch management.
CyberHawk: Your protection against a new generation of hackers
Tue, 20th Jun 2017
#
malware
#
ransomware
#
cybersecurity
The odds that your organisation's security will be compromised are very high. So why not protect yours with the eyes of a hawk?.
Arbor Networks digs deep into the Lazarus Group's DDoS attacks
Mon, 19th Jun 2017
#
ddos
#
cybersecurity
#
arbor networks
It is not clear whether the IPs listed in the report were part of a command and control infrastructure or simply bots - or both.
Commvault: Make your data work for you - it's the heartbeat of business
Mon, 19th Jun 2017
#
hyperscale
#
dc
#
cloud services
Having a better understanding of what data is available and where it is, means organisations can empower their staff to make better decisions.
Sennheiser: 'Why your unified communications solution needs us'
Thu, 15th Jun 2017
#
uc
#
headsets
#
contact centre
So you deployed your world class, award winning, enterprise transforming, non-covfefe unified communication solution….but something's not quite right.
Security training – a vital first step, but not a solution
Thu, 15th Jun 2017
#
edutech
#
phishing
#
email security
Educating employees to protect themselves against phishing and credential theft is necessary, but is it sufficient?.