June 10, 2021

BrandPost: Reinventing Business in Extraordinary Times

The pandemic has been the great disruptor, forcing companies of all sizes across the public and private sector to respond quickly to keep their businesses—and their people—up and running. All of it has required a degree of reinvention, which I define as occurring when an organization shifts responsibilities from traditional cost and complexity management to those that enable every company to become a tech-driven company while simultaneously running and reinventing the business.As part of a recent CIO roundtable, IT leaders discussed how they pivoted, what’s important to their organizations now, and how their learnings have shaped their path forward.To read this article in full, please click here

The Opportunities and Dangers of Decentralizing Finance

Decentralized Finance — or DeFi — has experienced explosive growth in the past year. But in order for DeFi to fulfill its promise as a disintermediated ecosystem that helps rather than harms, “now is the time to evaluate its benefits and dangers,” write Kevin Werbach and David Gogel.

BrandPost: NetApp is working hard every day to improve the customer experience. And it’s working.

At NetApp, our goal is to deliver a single clear and consistent customer experience across our products, services, and technologies, from on-premises to hybrid to cloud environments. We strive to maximize speed and responsiveness at every touchpoint, with minimal friction—from first contact to evaluation and purchase through deployment, use, support, and refresh.How do we continuously improve the customer experience? We evaluate multiple sources of customer data, then listen, evaluate, and take action. Every change we make is targeted to increase satisfaction with our products and support.How do we measure customer satisfaction? (Hint: It goes way beyond NPS.)To read this article in full, please click here

BrandPost: The Top Security Threats at the Edge, and How to Mitigate Them

Edge computing is one of the most important results to emerge from the rapid acceleration of digital transformation triggered by the COVID-19 response. Driven by the need to connect people and devices wherever they are, edge computing is growing. Leveraging cloud computing and breakthroughs in networking, edge computing, like all emerging trends, is causing growing pains for IT leaders. One area in particular that’s getting a lot of attention is edge security.IDG’s State of the Network survey for 2020 showed 61% of organizations are either actively researching edge computing tools or have them in production. As edge deployments proliferate, securing edge devices and networks is emerging as a top priority.To read this article in full, please click here

BrandPost: Outlining the Ingredients for a Successful Edge Security Strategy

As companies continue their digital transformation journeys, they are moving more IT resources out of the data center and closer to end users, making security even more critical and complicated. In fact, 77% of organizations associate edge computing with security concerns. [1]It’s a given that security must be integrated and embedded with network, compute and storage systems to be most effective. But that’s a challenge in an edge computing ecosystem.“Instead of securing a majority of resources in a handful of core locations, the distributed nature of edge computing means that infrastructure, data, and applications could be spread across hundreds or thousands of locations,” says Dave McCarthy, a research director with IDC’s worldwide infrastructure practice focusing on edge strategies, in CSOonline.com.To read this article in full, please click here

Big Tech could be the answer to broadband affordability

The digital divide cut deeper during the pandemic, as doors closed and services, classrooms, and jobs moved online. For most Americans, much of life went virtual, but for the tens of millions of people who live where broadband service is not offered, much of it disappeared. No school, no work, no social activities. To read this article in full, please click here

CIO Portal