The paper examines the business use of web 2.0 – what is web 2.0 and what makes it different from both business and technological perspectives? What is the value proposition of web 2.0 and how businesses can best leverage it?
This report identifies 10 trends that are defining the open source movement and best practices to migrate your organization to open source platform(s).
This research report introduces the core building blocks of cloud computing thereby laying the foundation for a deeper and more meaningful discussion on the "cloud revolution".
Volume 3 focuses on The Cloud Effect, describing the impact the cloud is having on IT and business tactically and strategically.
A Workbook for Cloud Computing in the Enterprise, provides practical guidance for transitioning to the cloud.
eThreats and Countermeasures: Just When You Thought It Was Safe to Go Out. Volume 6 of Digital Trust: IT security as a Technology Strategy series.
Transparency and Assurance: Putting a Measure on Digital Trust. Volume 7 of the Digital Trust: IT security as a Technology Strategy series.
Digital Trust: Epilogue and Strategic Roadmap. Volume 8 of the Digital Trust: IT security as a Technology Strategy series.
Digital Trust examines IT security as a technology strategy that plays both offense and defense, recognizing enhanced business value and cost savings, while minimizing information risk exposure.
Identity Management: Digitizing Your DNA. Part of the Digital Trust examines IT security as a technology strategy series (Volume 2)