Redefining IT risk in post-pandemic world

Antonio Vázquez sees the potential for problems everywhere. Vázquez, who started in January 2021 as the first CIO at tech company Bizagi, offers a lengthy list of areas where something could go wrong: security, data privacy, compliance, vendor relationships, cost management, employee access to systems, staffing, and IT projects. [ Learn from your peers: Check…

BrandPost: EPISODE 5: Edge Network

Organizations are moving network resources closer to the customer  to deliver low latency, and intrinsically secure applications. In this podcast episode, we’ll explore the challenges and benefits of edge networking, and discuss key components, strategies and tactics for edge networking. To read this article in full, please click here Read More from This Article:…

How CareSource ditched its data silos

As companies re-evaluate current IT infrastructures and processes with the goal of creating more efficient, resilient, and intuitive enterprise systems, one thing has become very clear: traditional data warehousing architectures that separate data storage from usage are pretty much obsolete.   The basic structure of current data platforms inhibits strategic outcomes by creating data silos and…

How to choose RPA software: 10 key factors to consider

RPA (robotic process automation) promises to rescue business users from performing boring, repetitive tasks. Hence the term “robotic”: The nature of the jobs performed by RPA tend to be rote and low-level. Businesses use RPA software to create software bots that perform pre-defined, structured jobs that typically involve filling in electronic forms, processing transactions, or…

Summer 2021: Hybrid work hurdles

Welcome to the Summer 2021 digital issue of CIO. In these pages, you’ll learn how CIOs are turning COVID quick fixes into lasting business value, what it takes to build a high-performance IT culture, and what to do when trust between business and IT has broken down. Our cover story takes a deep dive into…

BrandPost: EPISODE 4: Edge and Security

With processing and storage placed outside traditional information security visibility and control, edge computing creates new security challenges that need to be addressed in depth. This episode will explore best practices for governing and securing a distributed data architecture. To read this article in full, please click here Read More from This Article: BrandPost:…