By Alison Watterson, Enterprise Services WW Marketing
Here is a summary of the Enterprise Services blog topics for this past week:
This month’s Innovation INSIGHT webcast focuses on a topic that should be at the forefront of every company’s mind - the applications side of enterprise security. Here are the details…
You probably already know all the official bullet point reasons why a Health Information Exchange (HIE) is important; improve quality, lower costs... I want to take a more visionary and holistic view to address the ‘why’ of HIE, and reduce the confusion which the typical business case analysis often imposes.
Historically, service levels are put in place to measure the operational performance of the service provider. This helps you ensure your provider is responding appropriately at an operational level. They are important, obviously, but do service levels alone really ensure the outcomes you are looking for?
Range Technology Development Co. Ltd. turned to HP when they decided to build a world-class data center. They believe their new data center will help them realize their business goal to become the No. 1 cloud and data storage service provider in China within the next five years.
Smart Metering as an example of things to come by Charlie Bess
Earlier this month HP announced a smart meter cloud service for the utility industry. This service underpins HP’s strategy to help utilities improve operational efficiency and accelerate transformation to a more customer- and service-centric delivery model.
5 Simple Steps to Better Information Security by Neil Passingham
From my experience over the years as an HP Information Assurance Consultant, here are my 5 suggested steps or activities (in no particular order) that should move you substantially along the road to "a better place" when it comes to enterprise security.
Disruptive megatrends demand dynamic enterprise and IT by Jeff Wacker
The fourth wave of information technology has untethered computing from the desktop, catapulting the enterprise to the cusp of dramatic change. Information is available everywhere, on most any device, and it’s always on. (Shift innovation to ‘always on.’)
The world has changed, I feel it in the clouds by Charlie Bess
Recently I was sitting with a group of technologists talking about cloud, its deployment and the implications on their business. What became clear during the discussion is that what most needs to be discussed when contemplating cloud has little to do with what the analysts or technologists wring their hands about. It is not about hardware.
Can Cyber Attacks be considered Cyber Warfare? By Chris Cooper
In a very short period of time, Cyber Attacks have become the “accepted norm” in the world of information security, but these attacks are becoming increasingly complicated and targeted.
Disruptive innovation is infiltrating the traditional world of IT outsourcing and customers have several options that they did not have before. Outsourcing providers who plan to "sit back, relax and enjoy the ride" -- or so, they thought -- must get up and be ready to compete with renewed vigor.
Frustrated by the risks of shipping tapes off-site? by Tim Bowers
I’ve been thinking a lot about how critical it is to get backed-up data sent off-site to ensure business continuity in case of a disaster, either manmade or natural. It seems simple enough, but sending physical tapes off-site has its downsides … including a high level of manual intervention and tracking.
Are the underlying technology details a distraction for the CIO? by Charlie Bess
CIOs must set the technology strategy, so they can't afford to spend time on day to day technology buying and pricing decisions. The CIO team needs to focus on the strategic job of using information and insight to run companies.
Top 5 Enterprise Security Challenges with "Bring Your Own Device" by Paul Schwarzenberger
There is a fast growing trend amongst HP’s enterprise customers towards a “Bring Your Own Device” or BYOD model for mobile and portable devices. Here is my view of the top 5 enterprise security challenges with the BYOD approach.