Tablets, especially iPads, have become a way of life at the University of California, Irvine Medical Center, which now issues the tablets to incoming medical students and just last month, the hospital's Department of Emergency Medicine said ...
Tags: tablets, iPads, security, hospital tablet
The extension of the Solvency II compliance deadline from November of this year to January 2014 can be seen as both reassuring and concerning from a data management perspective. The European Union directive, aimed at regulating insurance ...
Tags: Solvency II, data management, European Union directive, insurance firms
Donald Farmer, VP for Product Management at business intelligence (BI) technology provider QlikTech, spoke with MIS Asia recently about the new face of business analytics. Find below the expurgated transcript of the first part of our ...
Tags: Donald Farmer, BI, QlikTech, business analytics
The technique of using deception and manipulation to gain sufficient knowledge to dupe an unwary individual, employee or company into revealing personal information has the potential to be one of the biggest security threats in 2013 ...
Tags: big data, cloud, Gartner, social engineering, Windows
Outsourcing is becoming an increasingly complex task for CIOs – especially if you want it to be successful. Originally, the idea of handing all or parts of your IT infrastructure to a third party was to exploit economies of scale ...
Tags: outsourcing, CIO, IT infrastructure, IT, IT service
Microsoft Windows 8 support for TPM Tipping point for TPM TPM gathers momentum The end of the password? TPM in action across all devices Since 2006, many new computing devices have been sold with a built-in trusted platform module ...
Tags: Microsoft Windows 8, TPM, password
By Clive Longbottom and Rob Bamforth When attempting to maximise the overall value of IT assets through the application of a suitable IT lifecycle management (ITLM) process, the one issue that is found time and time again is how best to ...
Tags: IT assets, IT lifecycle management, risk profile, ITLM strategy
Dell mapped out the next phase of its data centre strategy on Thursday with new hardware and software that it says will make it faster and cheaper for customers to deploy new hardware and applications. The new products include the Active ...
Tags: active systems, applications, cloud, Dell, desktop, hardware
According to Karl-Heinz Streibich, CEO of software tools company Software AG, the time for big IT transformation is over. People no longer buy exciting IT. Rather, IT must compete for investment. The question is, where will this investment ...
Tags: Gartner Symposium, Barcelona, Digitisation
When economic times are hard there is always pressure on budgets in every area of business operations. Indeed justifying any spend at all has become subject to ever more intense scrutiny and in IT this has been reflected by vendors ...
Tags: impact, private cloud, IT service delivery
Cloud computing is a potential game-changer for SMEs, according to IT consortium, the Open Group. But most SMEs find the technology confusing and are unsure how to implement it, said the group of suppliers, users and academics. ...
Tags: cloud computing, SMEs, IT consortium
Consumer goods giant Unilever is looking at how it can optimise its global operations using SAP’s HANA in-memory database. The company has been consolidating its SAP systems over the past 20 years and now runs 4 regional systems. ...
Tags: Unilever, Global HANA
Microsoft has warned that a piece of malware known as "Necurs" is on the rise, with variants reported on 83,427 machines in November. The malware is usually distributed by drive-by download, meaning simply visiting an infected website is ...
Tags: Microsoft, malware, cyber security, IT department
The Fedora Project on Tuesday announced the long-awaited beta release of Fedora Linux 18, complete with numerous improvements for users, developers and systems administrators. Several delays beset the project during this release cycle ...
Tags: The Fedora Project, Fedora Linux 18, installer, installer interface
Kent Police has revamped its backup systems with Acronis Back-up & Recovery software that has allowed it to cut backup windows from several days long to 16 hours. Data recovery times on the mixed physical and virtual server backup ...
Tags: Kent Police, Recovery software, Back-up software, data recovery