The Business Value of Red Hat JBoss Enterprise Application Platform [OG Partner]
IDC interviewed four organizations leveraging Red Hat JBoss Enterprise Application Platform (JBoss EAP) to standardize and improve their application development efforts.
Swedish Government Agency Provides Business-Critical Information Efficiently with Red Hat JBoss EAP [OG Partner]
Bolagsverket, a Swedish government agency, has been a Red Hat customer since 2008, when the organization replaced its existing IBM WebSphere solution with Red Hat® JBoss® Enterprise Application Platform.
A Strategic Decision for Stretching Public Sector IT Budgets [OG Partner]
Public sector IT organizations across the board — federal, state, local, the U.S. Department of Defense and higher education — are under intense pressure to do more with less. Diminished tax revenues and powerful political imperatives are putting the squeeze on budgets.
Red Hat JBoss Middleware [OG Partner]
Government innovation isn’t an oxymoron. Agencies at every level of government are responding to expanding mission requirements and rising citizen expectations by developing new applications and services that take advantage of mobile, cloud, data analytics, and other emerging technologies.
EXCLUSIVE – Enhancing criminal intelligence and law enforcement through collaborative, innovative ICT
“At a federated level, we have a vision for law enforcement agencies to use a single data entry point to feed in and out of ACIC systems where operational data and intelligence will ultimately provide a national view of law enforcement information including imminent threats.”
EXCLUSIVE- High Value Open data in Australia – Quality, Availability and Use
“I hope that the government will be an exemplar in this space, and that data is being used to underpin all key government practices, whether in service delivery, policy development or programme evaluation.”
How DCIM Fits in Every Data Center [OG Partner]
In any walk of life, you don’t want to take a sledge hammer to crack a nut, or as my colleagues in some parts of Europe say, shoot sparrows with a cannon. We’re wired up not to take drastic approaches to solving simple problems, until it comes to things like technology.
Opportunities and Threats for Colocation Providers [OG Partner]
Colocation providers are dealing with market forces that represent both great opportunity and significant challenge – in some cases from the same development. Providers have to deal with an ever-changing set of buyers, with CFOs and COOs playing an increased role in the decision-making
Simplify the Data Center Planning Process with Reference Designs [OG Partner]
It probably should go without saying that the planning phase is crucial to any data center project. But the specific planning process you use will go a long way toward how successful the data center will ultimately be in delivering on the requirements it was intended to meet.
Empower Your Digital Workforce [OG Partner]
As technology breakthroughs permit greater choice and empowerment among government employees, Information Technology (IT) has a golden opportunity to proactively enable their progress.
Seven Pillars for Becoming a Digital Government Organisation [OG Partner]
Digital transformation is driving new business models and disrupting long-standing norms. Innovative startups such as Uber, Airbnb, and Waze are harnessing digital technologies.
A New Approach to Securing the Enterprise Network [OG Partner]
Much has been said and written about the challenges that enterprises face today in light of the increased level of threat activity and the level of sophistication of the threats themselves. With disclosure of yet another high profile data breach happening with alarming regularity, what can an enterprise do to protect itself? Is technology unable to respond to these new threats?
Protecting Your Network From the Inside-Out [OG Partner]
For the last decade organizations have been trying to protect their networks by building defenses across the borders of their network. This includes the Internet edge, perimeter, endpoint, and data center (including the DMZ).
Fortinet Security Fabric and the Threat Landscape [OG Partner]
The irony of the evolution of the network is that we make applications, data and services flow faster across an increasingly diverse landscape of users, devices, and domains, we have compounded the complexity of securing this new environment.
Introduction of Digital Investigation Method [OG Partner]
The digital revolution is disrupting the traditional way of conducting business across public sector and private enterprises.
The New Security Paradigm for Digital Government [OG Partner]
Security in the digital environment will be increasingly fine-grained, broad-based, targeted, convenient, and intrinsic to products and applications.
EXCLUSIVE – Dialogue Session on embracing digital disruption and delivering citizen-centric services in Malaysia
Discussion by international panel on how to design and deliver citizen-centric digital government services and the challenges involved
How to Avoid Common Mistakes in Data Center Planning and Design [OG Partner]
I recently had occasion to read a white paper that Schneider Electric put out some years ago about the mistakes companies make in data center planning and was surprised at how little has changed over the years.
Change Is on the Horizon in Data Center Cooling Refrigerants [OG Partner]
The data center industry is poised for significant change in the refrigerants which are used in cooling systems, changes that you’d do well to pay attention to in order to understand the implications for your own data center.
The Top 9 Mistakes in Data Center Planning [OG Partner]
Many businesses are operating outside of safe capacity thresholds with little or no room to expand. According to the IDC, the average data center is 9 years old. However, Gartner states that any site more than 7 years old is obsolete.
Fundamentals of Managing the Data Center Life Cycle for Owners [OG Partner]
Just as good genes do not guarantee health and wellbeing, a good design alone does not ensure a data center is well-built and will remain efficient and available over the course of its life span. For each phase of the data center’s life cycle, proper care and action must be taken to continuously meet the business needs of the facility. This paper describes the five phases of data center life cycles, identifies key task and pitfalls, and offers practical advice to facility owners and management.
Economizer Modes of Data Center Cooling Systems [OG Partner]
The rising cost of energy and the drive to be green are resulting in greater demand to conserve energy. The energy savings potential of operating in economizer mode in certain climates makes it attractive for use in IT environments.
For Large Data Centers, Indirect Economizer Cooling Makes Sound Business Sense [OG Partner]
At this point in the evolution of data centers, use of economizer mode cooling technology is pretty much standard, at least for large data centers such as those owned by colocation and cloud providers as well as Internet Giants like Microsoft and Facebook.
Security Is Dead. Long Live Security. [OG Partner]
Cybersecurity is dead. …that is, the way it was originally designed and is currently deployed. Whether measured by the billions of dollars wasted trying implement it, or the almost-daily breach notifications from organizations around the world, the core premise of old security models is failing society every day.
Solving The Big Data Challenge [OG Partner]
Along with tremendous opportunity, today’s rapid growth of data also presents agencies with a daunting challenge that is pushing the limits of existing Information Technology (IT) infrastructure. Agencies hoping to reap the proven value of big data through effective use of their IT investments must contend with a wide range of new and rapidly-shifting technologies.
Safety app for drone users from Civil Aviation Safety Authority Australia
The mobile app’s “Can I fly there” section displays information about the safety regulations to help drone operators fly safely and responsibly
Kaspersky Cybersecurity Training Program [OG Partner]
IT Security staff need to be skilled in the advanced techniques that form a key component of effective enterprise threat management and mitigation strategies. But, as people are the weakest link in the security chain, organizations should also consider the provision of Cybersecurity Awareness training for their employees.
Cybersecurity for Electric Power Infrastructure [OG Partner]
The high level of openness and integration of electric power systems, combined with the pervasiveness of IT and Internet technologies in daily life, has raised new challenges for the electric power sector.
SOC powered by Kaspersky Lab [OG Partner]
While businesses learn to better protect themselves, criminals are simultaneously devising ever more sophisticated techniques to penetrate their security walls
Advanced Threat Defense and Targeted Attack Risk Mitigation [OG Partner]
Unlike regular malware, advanced, targeted threats are actively controlled and managed by the perpetrators.