Click to learn more about author Brad King. COVID-19 has dramatically increased the pace of digital transformation in the enterprise. Amid a headlong rush to cloud architectures, remote work, and distributed IT, we look at nine ways IT pros can remain relevant — and continue to deliver business value — during this profound transition in […]
Two Real-World Scenarios That Illustrate PCI Scope
Click to learn more about author Rob Chapman. When I find myself discussing PCI compliance, it always seems like the conversation goes in one direction. Whether I’m speaking with business leaders, IT executives, or the team responsible for deploying technology, everyone primarily just wants to know that a certain solution will check all the boxes […]
The Future of Online Data Collection Supercharged
Click to learn more about author Ron Kol. The digital community is growing by the minute. In fact, over the past eight months it’s grown by more than 30 percent. It’s no wonder, then, that data – online data, to be precise – has taken center stage. When the market is moving so rapidly and […]
CPRA and the Future of Enterprise Data Responsibility
Click to learn more about author Anne Hardy. On November 3, California voters passed the California Privacy Rights Act (CPRA). The new law expanded upon the existing California Consumer Privacy Act (CCPA) and brought its regulation closer to the gold standard of privacy regulation — the EU’s GDPR. The law’s focus on sensitive personal information, […]
The “Actionable” Metadata
Click to learn more about author Anand Govindarajan. During the days of building data warehouses and BI systems, all that was captured, as truly “metadata,” was the data about creation/access of the data structures for audits, data about the execution of data loads, and so on. Primarily, whatever supported the “operations” of the data warehouse. […]
The Next Normal: Business Continuity Relies on Data Availability
Click to learn more about author Steve Sullivan. Data is the most important asset of the modern organization. When staying “Always On” is a top priority, reactive responses to data threats and breaches are no longer enough. As what is considered mission-critical to a functioning business changes with the times, keeping all data safe and […]
What’s the Difference Between a Data Breach and Identity Theft?
Click to learn more about author Ben Hartwig. The most revolutionary contributions to the modern world have been made by technology. Today, we cannot imagine a world without digitization and automation. However, where technology has made life quicker and more convenient for us, it has also produced an unfortunate byproduct — fraud. With people sharing […]
Case Study: UMass Memorial Health Care Migrates onto New Storage Infrastructure
Click to learn more about author Michael Jack. Background UMass Memorial Health Care is the largest healthcare system in Central Massachusetts. It is the clinical partner of UMass Medical School, with access to the latest technology, research, and clinical trials. Its hospitals receive full accreditation by the Joint Commission, a national organization that sets quality […]
Converting Pirates to Paying Customers: Layered Software License Compliance
Click to learn more about author Victor DeMarines. Revenue leakage is detrimental to any business, even in the best of times. During challenging market conditions, as seen today when companies of all types are adjusting to the impact of the COVID-19 pandemic, shoring up that outflow is particularly important. Within the commercial software industry, piracy and […]
Case Study: Data Protection and HCI for Carrs Tool Data Architecture Upgrade
“Existing conditions” is a term for conditions that don’t last very long. Amazon changed the face of retail. Google democratized access to information. Facebook and pretty much every social media site has changed the way we interact with each other. Change came to Carrs Tool Steels, too. The U.K. supplier of tool steel and high-strength […]