Why data is key to ensure AI isn’t just a more intelligent ‘garbage in, garbage out’ process

Today, enterprises are going through challenging times. Customers are increasingly demanding personalised experiences and ‘predictive’ service quality. Enterprises need to be speedy, adaptable, agile and lean to deliver these experiences. As a result, artificial intelligence (AI) comes to the rescue of these organisations as they enable them to simplify complex operations, empower humans, create unified experiences, build smart, efficient processes and provide effective service orchestration to...

By Kalyan Kumar, 30 May 2018, 0 comments. Categories: Applications, Big Data, Productivity.

CIO job responsibilities in 2018: Driving business transformation and innovation

According to a Forrester report, CIOs are now viewed as the most important senior leaders in driving business transformation and innovation, and many believing they have more input than a CEO. Forrester highlights the CIO’s key role in supporting business change with technology playing a key part in breaking down barriers in the structure of organisations. These and more comprise the CIO's job...

By Nick Pike, 29 May 2018, 0 comments. Categories: CIO, Development, Employee Education, Employees, Enterprise Mobility.

P is for productivity: How Android 9.0 focuses on enterprise mobility

Did you catch any of the Google I/O coverage earlier this month? While Google’s developers discussed several impressive new technologies, none were more important for enterprise mobility than Android 9.0.

Believe it or not, some users have piloted tests dating as far back as March. As soon as this year’s annual developer conference came to a close, however, the company officially kicked off Android P—Android 9.0’s...

By Chris Koeneman, 25 May 2018, 0 comments. Categories: Android, Development, Enterprise Mobility, Productivity.

The real state of DevSecOps: Checking on automation, speed, and accuracy

Synopsys commissioned 451 Research to conduct a study on the state of DevSecOps. As described in the report “DevSecOps Realities and Opportunities,” it was found that only half of DevOps teams include application security testing (AST) in their continuous integretion and continuous deploypment (CI/CD) workflows. DevOps teams face both challenges and opportunities as they apply application security tools and...

By Meera Rao, 24 May 2018, 0 comments. Categories: CIO, Development, Security.

For enterprise cyber defence, there should be more than one solution

Enterprises face a dilemma when it comes to defence against today’s modern DDoS attacks: do they trust the surgical precision of an on-premise DDoS protection solution or go with a DDoS cloud scrubbing solution? It’s a tough decision for IT managers to make, as whichever option chosen will be the companies way of protecting themselves from cyberattacks. But, why even choose between the two? 

When it comes to defending from cyberattacks, enterprises need all the help they can get, so why not...

By Ronald Sens, 23 May 2018, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Security.

How to handle digital transformation and collaboration at large enterprises

You’ve got a team of 500 and some of them have been with the business more than thirty years. They are still thriving, as is the business, and, overall, you are doing really well. It’s a promising time, but not one without its challenges, because large companies don’t work the same way that they used to.

One of the biggest but often overlooked challenges for large, legacy enterprises, is how to collaborate effectively at scale and how to move on from older systems. If you're seeking to...

By Johann Butting, 22 May 2018, 0 comments. Categories: Collaboration, Employee Education, Employees, Productivity.

Five secrets of successful CISOs: Communication, regulation, and more

Today’s CISO is bombarded by jargon. Vendors want them to believe that everything from artificial intelligence, machine learning to blockchain is the silver bullet that will solve all their problems. Far from all the marketing and hype the reality is very different. At the end of the day all CISOs really care about is getting the basics of security right.

More often than not they are caught between a rock and a hard place. Attacks and threats get ever more sophisticated yet senior management...

By Matt Middleton-Leal, 22 May 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Employee Education, Employees, Security.

Dealing with insider threats and keeping your enterprise secure: A guide

There are many threats to enterprise cyber security with most coming from external threat actors. One of the most overlooked threats that companies are not safe from is insider threats. Security professionals are constantly being warned about insider threats and in A10 Networks AIR report earlier this year almost half (48 percent) of IT leaders say they agree or strongly agree that their employees do not care about its security practices. With companies aware of the issue, what...

By Ronald Sens, 21 May 2018, 0 comments. Categories: Employee Education, Employees, Security.

To maximise existing tech talent, it’s important to facilitate innovation skills

It’s no secret that IT talent is in short supply. With the ever-increasing number of technological channels, data sources and platforms, the demand for tech-savvy talent is innumerable. Randstad Technologies, a tech jobs specialist company, indicated that they have seen a 104 percent year-over-year increase in demand for skills in technologies such as iOS, Android, HTML5, Angular, Java and...

By Johan den Haan, 18 May 2018, 0 comments. Categories: CIO, Collaboration, Employee Education, Employees.

Organisations continue to report security concerns after implementing BYOD policies

For many small and medium sized business, bring your own device (BYOD) is always going to be an attractive option – reducing overheads, greater collaboration, and so forth. But security concerns simply will not go away – and according to new research from Paymentsense, more than half of small firms surveyed said they had experienced a breach since opening up the policy.

Six in 10 (61%) SMEs said they had experienced a cybersecurity incident. According to the more than 500 small business owners...

By James Bourne, 18 May 2018, 0 comments. Categories: BYOD, Enterprise Mobility.

GamEffective raises $11 million in series B funding to help improve workplace learning

GamEffective, a New York and Israel-based productivity software provider, has raised $11 million in a series B round of funding to help grow its platform.

The round was led by Jerusalem Venture Partners (JVP), alongside existing investors 2B Angels, CE Ventures, Lipman, Chomski, Yaniv Tal and Eshbol among others, as well as new investor La Maison.

GamEffective’s modus operandi is around ‘engagement automation’. While gamification is an important part of how the company creates engagement...

By James Bourne, 17 May 2018, 0 comments. Categories: Collaboration, Enterprise Mobility, Gamification, Productivity.

Focusing on the customer experience at a software organisation – from the service desk onwards

As a team leader, I always strive to build strong relationships between our team and our customers. That's done, in part, by making sure the software product is always up to standard, but that's not always enough. Customer success is incredibly relevant to the service your organization provides, through the service desk and to offer better services, you must know what your customer wants from you, and what you can do to make customer relationships successful. 

To do this, consider the...

By Nancy Van Elsacker Louisnord, 17 May 2018, 0 comments. Categories: Collaboration, Employee Education, Employees.

How zero trust security is fuelling new business growth

Bottom line: Zero Trust Security (ZTS) strategies enabled by Next-Gen Access (NGA) are indispensable for assuring uninterrupted digital business growth, and are proving to be a scalable security framework for streamlining onboarding and systems access for sales channels, partners, patients, and customers of fast-growing businesses.

The era of Zero Trust Security is here, accelerated by NGA solutions and driven by the needs of digital businesses for security strategies that can keep up with the rapidly expanding...

By Louis Columbus, 15 May 2018, 0 comments. Categories: Enterprise Mobility, IoT, Security.

Connecting IoT and personal devices to enterprise networks invites massive security risk, finds Infoblox

Research by network control company Infoblox found that connecting IoT and personal devices to enterprise networks expose the networks to massive security risk including malware injection, phishing and social engineering hacks.

In the research, 35% of enterprises in the US, UK and Germany stated that every day their networks see over 5,000 personal device connections. On the contrary, only 16% of enterprises in the UAE report to have over 500 personal devices connected to their networks. On a typical day,...

By Enterprise CIO, 14 May 2018, 0 comments. Categories: Data & Analytics, Data Loss, IoT, Malware, Security.

Microsoft trumpets progress at Build 2018: IoT, AI, mixed reality, and more

The Company Has Moved on from Its Windows and Office Silos

CEO Satya Nadella kicked off the event by highlighting Microsoft's vision for developers, which focused on the "intelligent cloud and intelligent edge", terms he first introduced at Build 2017.

This was followed by two days of announcements. Here we focus on just a few. For a full report on the event please see Event Report: Microsoft Build 2018.

Developer vision: The world as a...

By Nicholas McQuire, 14 May 2018, 0 comments. Categories: Cloud , Enterprise Mobility, IoT, Microsoft.

Slack boasts eight million daily active users – and more than three million paid users

Collaboration software provider Slack has cleared its throat, taken the mic and given an update on its customer base.

The company now has more than eight million daily active users (DAUs), more than three million paid users, equating to more than half a million companies around the world being on board. Almost two thirds of the Fortune 100 are paid Slack customers, the company added, with more than 70,000 paid teams signed up.

Alongside this, various customer testimonials were put up. Oracle said employees...

By James Bourne, 09 May 2018, 0 comments. Categories: Collaboration, Enterprise Mobility, Social.

Sapho announces deep Windows 10 integration to boost consistent micro app approach

Sapho, a San Bruno-based enterprise software provider, has announced a deep integration with Windows 10, enabling users to act upon tasks from various enterprise data points through the same system.

The company is best known for its micro app approach to solving the enterprise productivity puzzle. As this publication explored last year, Sapho’s main product offers a...

By James Bourne, 08 May 2018, 0 comments. Categories: Applications, App Platforms, Enterprise Mobility, Microsoft, Productivity.

Analysing the ‘what’ and ‘how’ of developing a future-proof manufacturing 2020 strategy

The pace of digital transformation in the manufacturing industry is relentless. But digital transformation is not just about deploying emerging technologies – it’s about using the data collected to create new business opportunities, better understand and meet customer expectations, and put in place a future-proof digital strategy.

The Columbus Manufacturing 2020 report, released in March, brought together industry leaders, academics and end users for...

By Kevin Bull, 04 May 2018, 0 comments. Categories: CIO, Enterprise Mobility, IoT, Productivity.

It’s time to ditch the password – and start to appreciate the evolving needs of enterprises

Today, May 3, is World Password Day. It’s a ‘celebration’ to promote better password habits. We’ve long viewed the password as a critical gatekeeper to our digital identities, safeguarding our online shopping, banking, social media, sensitive data, and business communications.

But has the password had its day? Best practise recommends the use of complex passwords that include upper and lower case letters, symbols and numbers put together randomly. The password should be at a minimum 8...

By Ojas Rege, 03 May 2018, 0 comments. Categories: Authentication, CIO, Employees, Identity, Security.

Mendix, OutSystems, Salesforce and ServiceNow top Gartner hpaPaaS Magic Quadrant

Mendix, OutSystems, Salesforce and ServiceNow sit atop the summit of Gartner’s latest Magic Quadrant for enterprise high productivity application platform as a service (hpaPaaS).

The report marks Gartner’s second in the rather complicated-sounding ‘hpaPaaS’ category. To translate, the category covers rapid application development in the cloud with both low-code and no code capabilities; but as Gartner adds, their functionality is expanding to cover the Internet of Things (IoT),...

By James Bourne, 01 May 2018, 0 comments. Categories: Applications, Enterprise Mobility, RMAD.