Evelyn de Souza
Downtime Recovery Today’s society relies heavily on being connected to service providers. The ability of a business to transact or provide services online is now just as important as the products they offer, or the price they advertise. Retail shopping,
Time To Move To The Cloud Ancient cultures all over the world relied on the phases of the moon and the stars in the night sky to time the planting of seeds and harvesting of crops. We have all heard
VMware Workloads Provider Most of the cloud fanfare we see in today’s media is focused on application development, specifically, the services that cloud providers offer to support development of new applications on their platforms (IaaS). For new companies that are
Improving IT efficiency, delivery, and cost structure There’s no question that customers are embracing cloud for all types of workloads. Whether the workloads are mission-critical, third-tier applications, or somewhere in between, the cloud has become the destination of choice for
The best disaster recovery strategies are baked into your digital infrastructure from the very beginning The 1986 nuclear disaster at Chernobyl in the Soviet Union has been on people’s minds a lot lately, following the groundbreaking HBO series that examined
Compliance and Business Innovation When the U.S. based non-profit organization RHD | Resources for Human Development decided to move its operations into the cloud, one of its top priorities was compliance. As a company that prides itself on delivering compassionate,
The Digital Stampede As the transfer of digital assets to the cloud gathers momentum, we examine the fundamental reasons why it’s happening Many organizations have been contemplating moving some or all their assets to the cloud for at least a
Cellphone Provider Switches to Acumatica, Implements ERP in 90 Days Open Mobile is a mobile telecommunications provider that serves tens of thousands of customers across Puerto Rico, and which enjoys direct relationships with major cellphone suppliers such as Samsung and
In the highly competitive world of IT service companies, it can be hard to find one you trust. But to find one you both trust and love would be quite remarkable. Love is not a term that echoes very often
Breached Data When Uber’s massive data breach made it to the public’s ears recently, it became a member of an infamous group of companies who not only had vital customer data stolen, but who sat on the story and did
ISV Payment Integration Proofing When a consumer walks into a store, or browses an online ecommerce site, very little thought is given over to the “paying” part until the time comes. At that moment, a fast and convenient point-of-sale or
Security Certification Helps Cloud Service Providers If you are a cloud service provider (CSP), you know your customers have a choice as to who to work with, but do you know what will help tip the scales in your favor?
Microservices Sprawl at Sea Why would anyone want to talk about microservices when they can talk about cruise ships? Taking a cruise is a popular life event for hundreds of thousands of vacationers every year. The image of a huge
Certification for Cloud Service Providers The concept of “cloud” has become more of a norm for companies and organizations worldwide. Most now use cloud service providers (CSPs) for some part of their business, and cloud has grown from simply being
Microservices Management Loosely coupled. This term appears frequently when describing microservices architecture, but is it a term that can be applied with equal gusto to management? And should it? Our answer is yes, both within IT operations and the executive.
Cloud Data Safety This year has certainly been troublesome for businesses when it comes to data security. Numerous cyber attacks have plagued the normal business continuity, thereby triggering an outflow of customers on one hand, and potential legal implications on
Recessions, Big Data, Data Science There, I said it. I said the “R” word. And no, I’m not talking the political “R” word. I’m talking about the potential of a… r-e-c-e-s-s-i-o-n. There are many indicators pointing to the potential of a worldwide recession, and
Digital is redefining cybercrime and cyberwarfare Cyberattacks today are multi-stage, hard to discover and highly targeted. Some security threats are accidental, stemming from unauthorized employee access. As much as 38% of attacks come from internal breaches. In other instances, hackers
Are you a CxO or Thought leader working with a reputable company and looking for free profile exposure? If so, get in touch!