The most important news for free via email

Programming language COBOL - with a bedrock into the digital future?

Programming languages form important frameworks in the expansion of digitization. Developers use them to build programs and systems for the future. But does this work with an old language? The programming language Cobol ("Common Business Oriented Language") has been used for decades to formulate calculation rules for business applications and is used worldwide in business. It celebrated its 60th birthday this year. This article shows how to maintain COBOL-based programs and migrate portfolios according to modern standards. ...more

Webinar: Simplify PC Lifecycle Management with PC as a Service

In this webinar, you'll learn more about ... ... the benefits of automated PC lifecycle management ... Dell's end-to-end lifecycle management Strategy ... the 4 phases of the PC's life cycle: - Plan and design - Deploy and integrate - Manage and support - Optimize and retire ... PC as a service Learn more about Dell solutions powered by Intel®. ...more

Secure Access to Field Device Data Holds the Key to Digitization and Optimized Maintenance

The digitization of field devices offers plant operators a huge potential to reduce operating costs while increasing productivity. With over 40 million field devices installed, the HART communication protocol is the most widely used digital communication technology in the process industry. This Whitepaper shows how the HART signal can be used for continuous device monitoring and diagnosis to provide considerable added value over the complete plant lifecycle – from planning and installation through to operation and maintenance. If you re ...more

Companies are registering rising threat levels

A recent Ponemon study paints a disturbing picture of the current IT threat situation. More than 50% of the companies registered a security incident in the last 12 months. In an international comparison, Germany is even still in a good position: In the USA it was just under 90%. Almost all respondents expect further incidents in the next two years....more on

IT basic protection alone does not cover all security risks - Interview with Jens Westphal from msg

Jens Westphal, expert for information security at msg, explains in this interview with BusinessIQ how companies successfully implement basic IT protection - and why templates alone are not enough.  ...more

Men are suspicious, older people careless.

IT security is one of the central challenges of our time - there is actually a broad consensus on this. A recent BullGuard study shows that there is nevertheless a statistical imbalance between the sexes and age groups. On average, men are more suspicious than women when it comes to protecting their personal data. In the older semesters, on the other hand, online usage behaviour shows a certain carelessness....more on

The Business Value of VMware Hybrid Cloud

Interviewed VMware customers benefit from the ease of efficient, secure, and lower cost migrations to VMware Hybrid Cloud environments, and realize significant value from having a more cost-effective, efficient, and agile hybrid IT platform for their business operations. ...more

Taneja Report Vmware Cloud Alternatives TCO Analysis

In this paper we examine the relative costs and other advantages of four different cloud infrastructure approaches, two based on private or on-premises clouds and two on public clouds. These public and private approaches can in turn be combined to create a hybrid cloud deployment. The objective is to enable businesses to evaluate which cloud approach makes the most sense for them, based on differences in TCO and other relevant factors. ...more

How to Migrate from Oracle Access Manager to ForgeRock Identity & Access Management

Migrating from Oracle Access Manager (OAM) to ForgeRock Identity & Access Management (IAM) Looking for an Oracle Access Manager alternative? Legacy Web Access Management (WAM) systems like Oracle Access Management (OAM) have fundamental gaps that inhibit your business value and impede digital transformation. Fortunately, you can have a modern IAM system co-exist with the current legacy Oracle system, adding immediate value to your business, as you then plan a phased approach to migrate off of the old platform. In this paper, we d ...more

Evaluating Digital Identity Providers for Customer Identity and Access Management

Evaluation Framework for Customer Identity and Access Management Today, six digital transformation trends are directing how you conduct business. These trends necessitate a different approach to customer identity and access management - one that is all-encompassing for any identity and built for the future. This highly informative paper helps decision-makers navigate how to evaluate digital identity providers for customer identity and access management (CIAM) based on the six trends. This guide includes definitions and use cases for the mod ...more
Actual survey
Which topics are you interested in?