Mandatory or Optional, Privacy Is Coming. Don’t Be Caught Unprepared

Remember the old days, when a great way to start an article was to quote a dictionary definition?  “Webster’s defines privacy as ‘freedom from unauthorized intrusion.’” You know, that sort of thing. Sometimes with a pronunciation guide. And we do love the modern touch – like a real-time voiceover or a Google Trends graphic showing […]

Read More

CCPA Is Coming January 1. Is Your Bank Ready?

When the first customer calls from California on Jan. 1, 2020, to inquire about personal data, will your bank know what to do? For most, the answer is no. Banks and financial services firms around the world are grappling with compliance challenges as the start date draws closer for the California Consumer Privacy Act (CCPA). […]

Read More

Data Privacy: Now Comes the Hard Part

Our personal data has become currency in the ever expanding digital economy. This shift has become most  apparent among tech companies whose business models pivot around the monetization of customer data. The ensuing uproar over the use and abuse of personal data has academics, industry leaders, politicians, the media and policy experts calling for a […]

Read More

Has IIoT Become a ‘Four-Letter Word’? Unlocking IIoT Value (Part 2 of a multi-part series)

The Industrial Internet of Things (IIOT), as well as conventional IoT deployments, often remain in “pilot purgatory” because they fail to deliver significant business outcomes. Part 1 of this series revealed that to succeed, manufacturers should utilize IoT to reshape key operating  processes and experiences into end-to-end journeys that unlock trapped business value. As history […]

Read More
GUEST POST

Why New Hires Alone Can’t Solve Your Security Troubles

Major data breaches are headline news. When criminals steal corporate data or personally identifiable information (PII), it can create a public relations nightmare with long-lasting business consequences. But well-publicized breaches are only the tip of the iceberg. In “Today’s State of Vulnerability Response: Patch Work Demands Attention,” we explore how and why security breaches happen. […]

Read More

Making the Most of Your Hybrid Infrastructure with a Cloud Management Platform

Cloud has endured high and low points in its relatively short lifecycle. Earlier this decade, it faced misgivings if not outright opposition from many major enterprises that refused to believe a cloud platform could ever replace an on-premises infrastructure. This was followed by a period of euphoria, when companies couldn’t wait to move their data […]

Read More

A Step-by-Step Approach to Digitizing Trade Finance

Looking across the complexity of trade finance, the notion of a problem child comes to mind from another era. Today, however, the industry’s methodologies are starting to become agile.  With the abundance of technology, we can link activities, end to end, across the parties involved in every trade. The arrival of standard application programming interfaces (API), used […]

Read More

2019: the Year of Social Determinants of Health and Whole-Person Care

The healthcare industry has been a champion of whole-person care for decades, yet we seem no closer to a solution for proactive health management than we were in the early days of nurse advice lines and disease management programs. In the past, public and private healthcare organizations looked toward Maslow’s Hierarchy of Needs to help […]

Read More

From ‘Ensuring Customer Experience’ to ‘Assuring Trust’: Rethinking the Role of QA

Imagine a short circuit triggers a fire in your building while you’re at work, and the smoke detector in your smart home fails to raise an alarm. Or you receive a notification that your bank account was compromised because the bank’s mobile application had experienced a cyber attack. Or the insulin-monitoring digital pill miscalculates your […]

Read More