Philip Morris’ CDIO on self-development, product IT and a smoke-free future

Philip Morris’ CDIO on self-development, product IT and a smoke-free future

Some could argue that moving from being the CIO of one of the largest sporting brands on the planet to the CTO of a cigarettes company is an unusual move, if only on the assumption that their ideals and objectives are surely in stark contrast. But try telling that to Philip Morris International’s forthright CDIO Michael Voegele, who made the jump from Nike in 2019 prior to being promoted to his current position earlier this…

Read More

Microservice Security: How to Proactively Protect Apps

Microservice Security: How to Proactively Protect Apps

Microservice Security: How to Proactively Protect Apps Serverless Security Microservices are growing in popularity—how can development teams embed seamless security into the entire pipeline? Fernando Cardoso, solutions architect at Trend Micro, breaks it down for you. By: Melanie Tafelski, Fernando Cardoso January 19, 2022 Read time:  ( words) Microservices Overview As many organizations moved to serverless functions to maximize agility and performance in the cloud, microservices became the new go-to design architecture for modern web…

Read More

Storage as a Service: More than Just On-Demand Consumption

Storage as a Service: More than Just On-Demand Consumption

Regardless of industry, if you’re a business or IT leader today, you’re seeing the emergence of the digital transformation divide: a gap between those organizations who’ve sprinted ahead and those being left behind. Despite major investment in digital transformation, 67% of CEOs feel they’re losing ground, according to KPMG, while top performers have doubled their profits in the last 12 months, according to McKinsey. In a word, digitalization has become ‘do or die.’ What’s driving…

Read More

How to Achieve Multi-Cloud Success Without Compromise – Cloud Blog – VMware

How to Achieve Multi-Cloud Success Without Compromise – Cloud Blog – VMware

Multi-cloud is here to stay. In fact, 73% of enterprises are using two or more public clouds today.1 The reality? Most organizations struggle to transform to this model and face many obstacles before they can fully reap its benefits. Multi-cloud for the win Why the move to multi-cloud? Successful multi-cloud organizations report a 35% revenue increase from faster modern app delivery; 41% fewer hours and costs spent on IT infrastructure; and 35% productivity savings across…

Read More

The why and how of AI-enhanced infrastructure – Cisco Blogs

The why and how of AI-enhanced infrastructure – Cisco Blogs

Part 2 of the Series: AI-Enhanced Infrastructure for AI Ops. In this blog, I’ll continue exploring how an AI-enhanced infrastructure can be used by IT operations teams today.  I’ll discuss the technologies that are involved and how they are powering an AIOps model for ITOps and NetOps teams. What are AI-enhanced technologies? I would like to establish a shared definition: When we talk about technologies powered by AI, we are referring to a set of…

Read More

Cisco UCS and Cisco MDS – Cisco Blogs

Cisco UCS and Cisco MDS – Cisco Blogs

Better together At a concert, few years ago, the director spoke to the audience and said something that resonated in my mind for long time. His words went like this: the value of the ensemble is greater than the sum of the value of the individual musicians. The meaning was clear. He wanted to illustrate the significance of playing together, as an orchestra, rather than a group of individual sound musicians. The same concept comes…

Read More

How DMARC can help prevent malicious email attacks

How DMARC can help prevent malicious email attacks

Today’s columnist, Deborah Watson of Proofpoint, writes that with the FBI reporting that business email compromises (BECs) and email account compromises (EACs) are even more costly than ransomware, companies really need to take a closer look at DMARC to secure email communications. (Credit: Getty Images) DMARC, short for Domain-based Message Authentication, Reporting and Conformance, determines the authenticity of email messages and makes it easier for ISPs to prevent malicious email practices. Now approaching its 10-year…

Read More

Batteries Included! Introducing Intersight Workload Engine – Cisco Blogs

Batteries Included! Introducing Intersight Workload Engine – Cisco Blogs

This blog post is a collaboration between Peter Kisich, Product Marketing Manager, Cisco Cloud & Compute & Co-authored by Puneet Konghot, Product Manager, Cisco Cloud & Compute. Recently, we launched Intersight Workload Engine (IWE)  as a simple way for customers to operate their infrastructure and easily run cloud native applications using Intersight Kubernetes Service (IKS) without the need to deploy an external virtualization solution like VMware ESXi. Why We Built It We heard you!  Customers…

Read More

How to Protect Your Social Media Accounts

How to Protect Your Social Media Accounts

Social media is part of our social fabric. So much so that nearly 50% of the global population are social media users to some degree or other. With all that sharing, conversing, and information passing between family and friends, social media can be a distinct digital extension of ourselves—making it important to know how you can protect your social media accounts from hacks and attacks. Beyond the sheer number of people who’re on social media,…

Read More

How to Protect Your Social Media Accounts

How to Protect Your Social Media Accounts

Social media is part of our social fabric. So much so that nearly 50% of the global population are social media users to some degree or other. With all that sharing, conversing, and information passing between family and friends, social media can be a distinct digital extension of ourselves—making it important to know how you can protect your social media accounts from hacks and attacks. Beyond the sheer number of people who’re on social media,…

Read More
1 3,290 3,291 3,292 3,293 3,294 4,049