Analysis

How to navigate the rise of data democratization: A guide for IT architects

In the face of data complexity, IT architects are responsible for making sure the backend data plumbing is well-conceived, so data teams across the organization can effectively leverage data. François Sergot, Dataiku o...

Methodist Health System gains cost predictability with Cohesity on Cisco UCS

Methodist Health System serves the metropolitan-Omaha area in Nebraska. The health network deployed the jointly developed Cohesity on Cisco UCS data management solution for modern backup as well as Disaster...

IT is challenged but will emerge stronger than ever

Jacqui Guichelaar, Senior Vice President and Chief Information Officer at Cisco, discusses the recent Cisco survey in which CIOs reveal their fears, strengths and strategies for coping with the pandemic. In my position as...

Mobile telecom industry making rapid progress towards 5G

A BPI Network survey found operators are rethinking security in light of 5G network traffic, a dramatic increase in connected devices and new mission-critical use cases. Mobile service providers say they are making...

Seven ways cyber criminals steal your passwords

One way or another, passwords are always in the news. They’re either being stolen in data breaches, or mocked for being too simple; derided as pointless, or lamented for being technologically backward. However, one t...

FireEye expert on cloud security misconceptions

FireEye Cloud CTO, Martin Holste discusses some misconceptions around security in the cloud.

Browse our latest issue

Intelligent CIO North America

View Magazine Archive