Cognitive security

For almost a century, we’ve programmed computers to help solve complex problems. We can now simulate weather, sequence genomes and instantly share data across the world. But ask a computer to do something humans do every day—recognize an image, read a book or explain the meaning of a poem—and it’s a different story. Traditional systems fall short.

Enterprise mobility management, the big bang theory

The boundaries between working “in the office,” “on the road,” or “at home” have been blurred by the untethered power of smartphones, tablets, and other portable devices. Employees expect the flexibility to work on the devices they choose, and employers have come to expect always-on availability. The universe of mobility is a complex thing, and it

Best practices for mobile application lifecycle management

Mobile devices are now a reality in most organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. But to achieve these benefits, it is imperative that mobile security best practices

Mapping the cloud maturity curve. The fundamental five

What businesses must have in place to extract maximum value from the cloud identifies and explores the core foundational elements of a mature cloud strategy. It is the central piece in the first phase of a research programme, Mapping the cloud maturity curve, sponsored by IBM. The second phase will examine the degree to which

Mapping the cloud maturity curve. Adapting to the new era

“Think cloud, talk business.” This is how one global CIO describes his new approach to IT: using cloud computing as a platform to engage with the business on its own terms. He is not alone. A new and unique quantitative analysis of cloud computing and its business impact so far shows that it is helping