article thumbnail

Overcoming Common Data Privacy and Security Challenges in the Cloud

Dataversity

A recent survey of C-suite, information technology, and artificial intelligence practitioners offers interesting insights on the enablement of digital capabilities using cloud-based data capabilities. For instance, 68% of IT practitioners said they are using the cloud to store most of their data.

article thumbnail

IT Spending: The Value-Driven Approach

Dataversity

Advances in information technology (IT) are forcing businesses in all industries to evaluate their IT spend. Click to learn more about author Sachin Reja. The impetus here is to reduce staffing costs and other expenditures while investing more in digital tools and programing.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Three Strategies for Navigating the IT-OT Convergence Strategy

Dataversity

Operating technology (OT) and information technology (IT) share a common goal of driving new value and successes for enterprises, but their tactics, perspectives, and priorities for accomplishing those goals have historically differed. Click to learn more about author Bill Scudder. is creating a dramatically […].

article thumbnail

How Cloud Has Affected the Centralization vs. Decentralization of IT

Dataversity

In larger companies, we often talk to folks in the business unit that most people traditionally refer to as Information Technology (IT). The post How Cloud Has Affected the Centralization vs. Decentralization of IT appeared first on DATAVERSITY.

Cloud 52
article thumbnail

Shadow IT: Not a Problem or Worse Than Ever?

Dataversity

Also known as Stealth IT, this refers to information technology (IT) systems built and used within organizations without explicit organizational approval or deployed by departments other than the IT department. Click to learn more about author Jay Chapel. Shadow IT: you’ve probably heard of it.

article thumbnail

Customer Case Study: Cloud Migration Drives Global WAN Overhaul

CATO Networks

information technology manager,worksfor one of the worlds leading manufacturers and marketers of consumer goods. He has more than 20 years of experience in network security and information management, and specializes in enterprise infrastructure, security and project management. Background J., with offices across the globe.

WAN 52
article thumbnail

Balancing Vendor Lock-In and Business Advantage – Getting the Right Combination

Dataversity

Ever since the start of information technology and the first computers were invented, there has been vendor lock-in. From the very first mainframes through to modern cloud and data companies, the guidance has been to avoid lock-in where you can. Click to learn more about author Matt Yonkovit.