Integrate New Systems Gracefully with Request Management
One of the many questions that companies face when introducing new enterprise
systems either to provide new functionality or incorporate legacy systems
from a merger or acquisition is "How do we identify and manage access
Not only do new access approval processes need to be established, but a
common platform to define and execute processes, reliably document approvals
and provide users with an acceptable user experience is often not in place to
handle the additional workload. Corporate IT is also faced with the challenge
responding quickly to changes in access rules or approval chains.
To ease the pain of integrating new systems into a unified corporate IT
structure, required approval processes not only need to be established but
executed through a common system. By adopting technology that can provide... (more)
With 2016 crossing the half way point, let’s take a look at some technology
trends thus far.
Breaches: Well, many databases are half empty due to the continued rash of
intrusions while the crooks are half full with our personal information.
According to the Identity Theft Resource Center (ITRC), there have been 522
breaches thus far in 2016 exposing almost 13,000,000 records. Many are health
care providers as our medical information is becoming the gold mine of stolen
info. Not really surprising since the health care wearable market is set to
explode in the coming years. Many of... (more)
2020 seems to be an important milestone for the Internet of Things. That’s
the year that Cisco says there will be 50 billion connected devices and also
the year Gartner notes that over 50% of major new business processes and
systems will incorporate some element of the Internet of Things.
That’s the good news.
A recent Symantec Internet Security Threat Report says there are 25 connected
devices per 100 inhabitants in the US. Minimum 25 entry points to your
personal information, not counting your front door, personal computers,
compromised ATMs and other data sources. As your con... (more)
A few years ago, those little iHome alarm clocks started to appear in hotel
rooms. Cool gadgets that you could mount your mobile phone to battery charge
or play the music on the device. We also had a few in our home. They worked
perfectly for the iPhone 4 since the connector was that 1 inch protruding
plug. When I got the iPhone6, those clocks instantly became useless.
Obsolete. At least the phone connector part lost its value.
I’ve been thinking about this for a while.
The rate of obsolescence. The state when an object, technology, service or
practice is no longer needed or wan... (more)
No modern enterprise stands alone; each is dependent upon a network of
trading partners to remain competitive in today's global marketplace. But
in most cases, the lack of business to business (B2B) integration is holding
back efforts to evolve into a true digital business.
A high-performing supply chain is essentially a dynamic digital network, and
every link in the supply chain is vital for business. But, remarkably, "over
50 percent of the information exchanged among business partners is still done
so manually - not automatically - via email, phone calls and faxes."1
Many ent... (more)
SYS-CON Events announced today that Pythian, a global IT services company
specializing in helping companies adopt disruptive technologies to optimize
revenue-generating systems, has been named "Bronze Sponsor" of SYS-CON's 18th
Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in
New York, New York.
Founded in 1997, Pythian is a global IT services company that helps companies
compete by adopting disruptive technologies such as cloud, Big Data, advanced
analytics, and DevOps to advance innovation and increase agility.
Specializing in designing, implementi... (more)