Business Intelligence

IBM Continuum

IBM & Continuum Squeeze Complexity and Risk Out of Cognitive Development

Reducing or eliminating complexity and risk are critical issues in the IT industry, especially when it comes to emerging technologies. Doing so is important for both short and long term strategies since success often leads customers into trying on new […]

IBM & Continuum Squeeze Complexity and Risk Out of Cognitive Development Read More »

Brexit

Article 50: Can Legacy Forecasting Systems Prepare Us for the Impact of Brexit?

Late last month the United Kingdom filed Article 50, officially notifying Europe of its intent to leave the European Union. This will most certainly impact the global economy, but can we trust our current forecasting systems to prepare us for

Article 50: Can Legacy Forecasting Systems Prepare Us for the Impact of Brexit? Read More »

Lenovo DX8200D

Lenovo and DataCore: Partnering to Make SDS Simple and Affordable

Lenovo’s new DX8200D software-defined storage (SDS) appliance with DataCore’s SANsymphony is interesting technologically but also underscores the workings of the Lenovo Data Center Group’s (DCG) partner strategy. In essence, Lenovo designed the DX8200D to exploit the capabilities of existing SAN

Lenovo and DataCore: Partnering to Make SDS Simple and Affordable Read More »

emergency room communications

Bad Communications Technology Is Causing Errors in Emergency Rooms

New research into the communications challenges that emergency room employees face every day in our nation’s hospitals and medical facilities reveals patient care suffers when manual processes are used. A new report “Care Communication Gaps in U.S. Hospital Emergency Departments”

Bad Communications Technology Is Causing Errors in Emergency Rooms Read More »

cyber risk weakest link

10 Tips to Limit Third-Party Cyber Risk

To compete in a global marketplace, enterprises are outsourcing business processes and other services at an increasing rate. This trend has created the attack vector “du jour” for cyber criminals and experts estimate 50-plus percent of major breaches involve a

10 Tips to Limit Third-Party Cyber Risk Read More »

sensitive data binary

If Security and IT Aren’t Talking, Your Sensitive Data is Suffering

I live near an intersection ruled by four-way stop signs. Driving through it often becomes an awkward experience. Some people stop for longer than necessary, disrupting the usual order while gesturing for other drivers: “No, you go.” Others blow through

If Security and IT Aren’t Talking, Your Sensitive Data is Suffering Read More »

Scroll to Top