WIRELESS 2013 Wireless LAN Survey: The Need for Security, Reliability It's a mobile world, and Wi-Fi is displacing wired Ethernet: 89% use 802.11 as a client network access method, up from 76% in 2010. Still, IT must meet high expectations for network speed, security and reliability. Perhaps that's why 45% have plans to deploy 802.11ac gear in production. CLOUD COMPUTING Cloud ID Management Approaches Sponsored by HP Identity management is tricky, especially for cloud and SaaS applications. The four approaches available: full or partial Active Directory synchronization, federation or identity-as-a-service. Gain insight into the upsides and downsides of each option.
Moving Legacy Apps to the Cloud Can you run that old ERP system on Amazon Web Services or CloudStack? Yes, and it just may save you money. However, CIOs need to ensure that teams set expectations, employ the right tools for the right use case and test before leaping. Oh, and don't get stopped by the application lifecycle police. SECURITY Building and Maintaining Database Access Control Provisions Sponsored by IBM Knotted and complex database access permissions are among the biggest threats to enterprise data security. We examine the problems associated with granting permissions to sensitive data, and recommend solutions that will help organizations effectively grant privilege when and where it is needed.
DATA CENTER Data Center Debate: Benefits of Standardization vs. Reality of Specialization Most IT pros like uniformity: 60% have explicit policies to ensure consistency, and 57% of these respondents have enforcement mechanisms. But there's something to be said for systems purpose-built for a specific task, given that 45% err on the side of looser standardization. There's also the hard fact that in the age of BYOD and cloud, you're often fighting a losing battle.
MOBILITY Mobile Commerce: State of the Market Every business needs a plan for what's projected to be a $1 trillion market by 2017. Here's how to future-proof mobile commerce investments and strategies, and weigh the pros and cons of various approaches and architectures.
UNIFIED COMMUNICATIONS The UC Identity Crisis Sponsored by Mitel Judging by our InformationWeek Unified Communications Survey, vendors looking to sell IT on unified communications systems aren't making as much headway as they'd like. In response, restless marketing executives are tacking on new capabilities and adding modifiers, like "collaboration" and "social business," in an effort to gain traction while abandoning the "UC" terminology. So what does that mean for enterprise IT teams that just want to get everyone talking?
InformationWeek Reports is brought to you by HP, IBM, Mitel, Schneider Electric and UBM TechWeb. You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter. If you received this newsletter from a friend and want to join. Read about and join other InformationWeek Newsletters here. UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy
| |
No comments:
Post a Comment