The Legacy Shift: How to Accelerate Business Value with Mainframe Modernization

Global enterprises use mainframes to run mission-critical applications, especially core workloads and huge data processing tasks. Analysts reveal that up to 70% of Fortune 500 companies use mainframes, including 44 of 50 top banks and top 10 global insurers. These enterprises are now transitioning from mainframes to next-generation technologies for unlocking business value. Digitalization has…

2022 is the Year of the Edge

By Matthew Hausmann In the CIO.com article, Take Your Analytics into Hyperdrive in 2021, I predicted the four big data analytics trends of the year and what enterprises must do to stay competitive in a modern, hybrid world that spans from the edge to the cloud. I explained how Apache Spark would continue to dominate…

Shell sees AI as fuel for its sustainability goals

Energy giants are under significant pressure by governments and consumers to reduce carbon emissions. For multinational oil and gas company Shell, artificial intelligence may be a key catalyst for fulfilling that long-term goal. The London-headquartered energy company’s ongoing digital transformation, fueled by a hybrid cloud platform and Databricks data lake house, includes a mix of…

Succession planning: A CIO imperative

As far as professional development goes, Sarah Naqvi’s meteoric rise to executive vice president and CIO at Maryland-based food service company HMSHost probably didn’t go quite as she had imagined it. “I had a pretty traumatic … stressful experience,” she acknowledges. Naqvi was included in an undocumented succession plan with the company’s then-CIO, but saw…

Stopping ransomware in its tracks

According to the 2021 IDG Security Priorities Study, 44% of security incidents are still caused by employees, despite 53% of IT leaders prioritising security training for employees in the past year. Unpatched software and security lapses follow as the second leading causes of incidents. More concerningly, the sudden shift to hybrid work arrangements due to…

Can Security Really Be Open Source?

By Sunil James Cloud computing software and services universally use open-source software (OSS) such as Linux, Apache, MySQL, PHP, and Python. But while Linux has long included security capabilities, as did SNORT (a computer-based network intrusion detection system software), other OSS have seemingly had less impact on security—until now. Today, we see significant changes happening.…