Joanna Martinez describe en esta entrevista con Janet Schijns, la importancia del nuevo alcance del departamento de compras en el entorno actual empresarial.
Search Results: ai data (4912)
Tony Uphoff makes a case for cybersecurity as a growth driver, and offers five ways that CEOs can capitalize on it today.
The Biden-Harris administration unveiled an updated National Cybersecurity Strategy to standardize cybersecurity practices across agencies and encourage market accountability.
There are many benefits to using the zero trust maturity model as a framework for cybersecurity planning and implementation, say Rob Wood.
Kenny Mullican escribe las múltiples ventajas y beneficios de una estrategia multi-nube sobre la operación de la cadena de suministro.
Google Cloud has introduced a simple, powerful online tool to help businesses optimize their data-sovereignty initiatives, namely titled Sovereignty Explorer.
Wayne Sadin outlines why an overreliance on Microsoft Excel models is increasingly a problem for companies of all sizes and industries.
How does Google Cloud plan to simplify data sovereignty? With its latest product, Digital Sovereignty Explorer, explains Bob Evans.
New data from NetApp shows that even with the benefits of multi-cloud, this increasingly popular architecture introduces various forms of complexity for tech leaders.
IBM and the Cleveland Clinic are joining forces to attack deadly diseases, disrupting medical research with quantum computing.
Multi-cloud incident response is more complex than traditional incident response. Frank Domizio explains how and why organizations need to adapt.
Though it makes for complex sourcing, healthcare cloud migration can be successfully approached with some classic procurement techniques, writes Joanna Martinez.
Maturity models serve as roadmaps to help organizations successfully navigate their zero-trust journey. Rob Wood breaks down the benefits of one model’s iterative approach.
Bill Doerrfeld aporta valiosos consejos para gestionar y administrar el cumplimiento legal de privacidad de datos considierando los distintos marcos.
There is a perception that ERP automation is focused primarily on financial systems, but as Kenny Mullican writes, it can deliver value in many other functions, too.
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Every company today is — or is on its way to becoming via digital transformation — a technology company, but where does all the technology come from? Partners ecosystems.
Frank Domizio shares his thoughts on cybersecurity’s place in the C-suite today, as well as the value of customer stories on software and other technology solutions.
SAP is now offering another powerful go-to-market engine aimed at what customers want most – ease in deploying and optimizing enterprise apps in the cloud.
Multi-cloud computing allows organizations to tailor their cloud strategies, reduce costs, and avoid vendor lock-in, but it also brings unique cybersecurity challenges.
Our Securing Multi-Cloud Ecosystems guidebook is a comprehensive resource demonstrating the why & how of secure multi-cloud computing.