enterprisesecuritymag

big

Data is the Lifeline of Today's Businesses; But Why Are So Many Business Leaders Still Making Guesswork?
Enterprisesecuritymag >> cxoinsights

Eric Thain, General Manager, HK Express

There is no doubt on the importance of data in today’s businesses. The C-Suite recognizes the need to focus on data and in fact, data and analytics ranks the highest of the top five investment priorities for CEOs today (according to the...

Innovate business models with SophiaTX: a revolutionary enterprise blockchain platform pushing adoption in the ASEAN
Enterprisesecuritymag >> cxoinsights

KUALA LUMPUR – A successful enterprise blockchain event dubbed BUSINESS REDEFINED 2018 was held on September 25 at Suntec City, Singapore and September 27 at Connexion, Malaysia, representing the first step in building an ecosystem...

Data is King! But are you treating it as one?
Enterprisesecuritymag >> cioviewpoint

Madhu Maganti, Director-IT Assurance & Security Services, Doeren Mayhew

Evolution of Data Everyone and their big brother (no pun intended) is talking about data and more specifically, Big Data. Big Data is a technology buzzword that describes the current ecosystem in which there is significantly more data, and...

Edge Computing: Does it support customer intimacy and the race to digitization
Enterprisesecuritymag >> cxoinsights

Mark Thiele, CIO & CSO, Apcera and President & Founder, Data Center Pulse

Does Edge Computing Matter to Enterprise IT? Edge computing, like IoT, AI/ML, drones, Augmented Reality (AR), etc. is all the rage these days. What does edge computing matter to my enterprise though? We have public cloud, colocation, private...

Exploring the Capability of Blockchain and Big Data Collaboration
Enterprisesecuritymag >> cxoinsights

Blockchain seems to be the buzzword around all thing technology and to endorse this modern technology even big data is embracing its decentralized feature. Companies are scrambling to assimilate the utilization of big data in their day-to-day...

Benefits of Merging AI with Blockchain
Enterprisesecuritymag >> cioviewpoint

Big Data giants are accumulating huge chunks of data currently, wherein consumer data is being collected into the data pool. Artificial Intelligence (AI) platforms are enabling the big players to take control of the situation, owing to their...

Make Manufacturing Cool Again
Enterprisesecuritymag >> cxoinsights

Oliver Perez, EMI Manufacturing Technology Director, BD

Moving out of the Industrial Revolution, the mental image of Manufacturing was a cluttered shop floor with large machines and people in greasy overalls working around them. The machine production replaced craftsmanship and large factories were...

The Cloud- First Approach
Enterprisesecuritymag >> cxoinsights

Arjun Chopra, Partner, Floodgate

Could you give me an overview of the types of opportunities you pursue as a Partner at Floodgate? I believe that the public cloud represents a generational platform shift that has delivered not only the fastest growing enterprise software...

Artificial Intelligence-Journey towards the Center of the Enterprise
Enterprisesecuritymag >> cxoinsights

Raman Mehta, SVP & CIO, Fabrinet [NYSE: FN]

Marc Andreessen had famously said software is eating the world. He probably had Artificial Intelligence (AI) in the back of his mind. In its simplistic form, AI enables a machine to perform human-like tasks, such as image, voice and text...

Empowering the Next Wave of Innovation
Enterprisesecuritymag >> cioviewpoint

Chris Patterson, VP-Product Management, NaviSite

Rendezvous of Big Data and CDN In the past, CDNs have proven to be somewhat of a challenge for data analysis as they often produce an immense amount of data. The latest developments in big data, however, have directly addressed the issue of...

Security Advantages of Software Defined Networking (SDN)
Enterprisesecuritymag >> cioviewpoint

Dr. Edward Amoroso, Member of the Board of Directors, M&T Bank

Perhaps the defining aspect of wide-area routing over Internet infrastructure has been decentralized control. Routers are manufactured to support protocols as stand-alone entities that accept, process, and route packets independently based on...

The Future Belongs to the Informed
Enterprisesecuritymag >> cioviewpoint

Anthony J. Scriffignano, SVP-Worldwide Data

Anthony J. Scriffignano, SVP-Worldwide Data & Insight, Dun & Bradstreet Much like the cortex of the brain and frontal lobes associated with self-control, planning, reasoning and abstract thought, Big Data synthesis is central to the...

Embracing the Perks of Cloud Computing
Enterprisesecuritymag >> cxoinsights

Yaron Turpaz, Ph.D., MBA, CIO, Human Longetivity, Inc.

Human Longevity, Inc. was launched in March 2014 with a mission to transform healthcare and accelerate the practice of personalized, preventive healthcare via detailed and comprehensive genomics analysis and risks assessment, in integration with...

Weaving Robust Identity Systems Into The University's Security Infrastructure
Enterprisesecuritymag >> cxoinsights

Dr. Jan I.Fox, SVP- IT & CIO, Marshall University

Innovative ways to foster growth within their organizations Growth within the Marshall University IT organization means utilizing existing team members in new, innovative ways while reaching out to new collaboration partners. University...

Higher Education Challenges: Big Data; Cloud Computing; Information Security
Enterprisesecuritymag >> cxoinsights

Elias G. Eldayrie, VP & CIO, University of Florida

Big Data Integral to University Missions While universities mine data to tailor student advising and educational experiences, there are other vitally important higher education issues involved. As big data becomes increasingly important in the...

Smart Phones Have Not So Smart Security
Enterprisesecuritymag >> cxoinsights

Dan Ross, President & CEO, Promisec

Smartphones. They have spurred a global revolution in how we work, play, shop, and relate to one another. They fuel innovation and productivity in astonishing ways, reaching even the most distant and underdeveloped corners of the world. They have...

A New Vocabulary for the Digital Age
Enterprisesecuritymag >> cxoinsights

Trevor Hughes, CEO and President, International Association of Privacy Professionals

It’s no secret that the English language has already begun expanding rapidly to keep up with the Digital Age. Words like “selfie,” “wearable,” “hash tag” and “Bitcoin” have all entered main...

Big Data Analysis and Thought Diversity: Lessons From Anscombe's Quartet
Enterprisesecuritymag >>

Aaron Ferguson, Technical Director-Cyber & Information Analytics Office, National Security Agency

According to Gartner Incorporated, the world's leading information technology research and advisory company, Big Data is defined as “high volume, high-velocity and high-variety information assets that demand cost-effective, innovative...

A New Vocabulary for the Digital Age
Enterprisesecuritymag >>

Trevor Hughes, CEO and President, International Association of Privacy Professionals

It’s no secret that the English language has already begun expanding rapidly to keep up with the digital age. Words like “selfie,” “wearable,” “hash tag” and “Bitcoin” have all entered main...

Developing Technology to Address Big Data and Cyber-Security Challenges
Enterprisesecuritymag >>

Paul Liebman, CCO, The University of Texas at Austin

Process Related and Substantive Risk Challenges There are many emerging challenges in compliance. Some are process related and others relate to substantive risk areas. On the process front, the principle concerns facing most organizations are...