New Readers

Home Awards Welcome Industry Voices Become Sponsor Banquet Tickets Be A Judge Merchandise Previous Winners About GBA
Remy deTonnac: The ABC's of Mobile Security
The best, or the most appropriate security solution depends on the value of what is being protected and on the business implications for the platform vendors, whether media companies, mobile device manufacturers or operators, financial institutions, or providers of IoT solutions. Whether one is protecting content, transactions or identities, the range of possible security solutions is vast and can go from embedding a simple piece of software all the way to a combination of embedded hardware, IP and software. All depends on the value of the content, the transactions and identities. Continue Reading»
Jay O’Brien: How BPM Helps Companies Become More Competitive
Customers in Healthcare, Pharma and Life Sciences, Financial Services/Insurance Manufacturing, Hospitality, Advertising, Utilities, Government and Education have all achieved dramatic results. BPM helps manufacturers manage and optimize their inventory and supplies – as well as manage, track and respond to key customer relationships. It helps government agencies, financial institutions, pharma/healthcare and life sciences companies increase insight and ensures transparency across business operations, comply with complex regulations and more effectively manage risk. With business processes that span multiple departments, roles and systems, the need for efficiency and speed demand greater integration of these systems – and near real-time responses. Continue Reading»
Jeff Williams: Advice for securing venture capital during a tough economy
Make sure your company is capable of attracting and securing venture capital prior to approaching venture capitalists. Too many CEOs approach venture capitalists too early in the process and then receive a rejection from the venture capital firm. The company must be able to demonstrate it is pursuing a large (preferably >$1 Billion) and rapidly growing (preferably >15%) market, the product or service will meet a need, and the company will be able to ultimately generate significant positive cash flows, i.e. the cost of goods will be low enough to enable a sufficient gross margin to cover all operating expenses and have a significant operating profit left over. Continue Reading»
Linda Taddonio: Meeting the eCommerce Imperative
Company executives are starting to understand the strategic value of eCommerce. It’s no longer being viewed as an “initiative”, it’s the future of their business. New research recently released indicates suppliers' websites aren't capable of handling the evolving demands of younger B2B buyers. It revealed that most (90%) of B2B buyers age 18-35 now make company purchases online, compared with 45% of those age 45-60 and 29% of those age 60+. Because their current suppliers aren't offering an online purchase channel, 45% of survey respondents used Amazon Supply to make a purchase in the last year, and 25% of respondents who used Amazon Supply make purchases on a regular basis. Continue Reading»
Chris Fedde: Big Data Security Challenges
The talk of Big Data security challenges needs to be taken VERY seriously. Enterprises spend billions of dollars every year on new perimeter defense systems and yet still the headlines are littered with stories of major corporations suffering breaches by advanced threats. Why? Because no perimeter defense can be 100% effective if the threat has the resources, patience, and determination to get in. We believe the only way to effectively detect and defend against these threats requires the use of Big Data approaches. Continue Reading»
Robert Donat: The Road to Success for a Growing Technology Business
Listen to your customers, your employees, and your prospective customers. They are the ones closest to the business requirements which are most important, and if you pay attention and implement their requirements into your product offering, you will beat the competition every time. It’s like free research! Also, make sure to roll up your sleeves and do many of the jobs in your organization -- if you live your company, you will know best how to lead those who work in it and keep it on track every day. Continue Reading»
Yair Levin: Are you spending too much time on social media?

Users need a way to aggregate and filter all of the information they are receiving on their various social media feeds. Slim is simplified, no-nonsense content - we like to call it “fat-free social media” - so our users never miss out, saving time and avoiding dissatisfaction. Slim is the perfect tool for active social media users who need a “safety net” to ensure they don’t miss an important update from one of their networks, to the infrequent user who just wants the highlights from social media. Continue Reading»

Robert J. Latino: What is ‘proaction’ as opposed to ‘reaction’ and why is it not more widely accepted?
True RCA will seek to understand why the person who made the bad decision felt it was the right decision at the time.  This exploration usually uncovers deficient management systems that fed poor information (e.g. – inadequate, insufficient, obsolete or nonexistent) to decision makers.  If we seek ‘Reliability’ of our organization, we need to have steady operations which will require consistency in our decision-making capabilities.  True Reliability means ‘no surprises’.  To have no surprises means you have to be able to control your failure rates by focusing on risk and prevention. Continue Reading»
Sanjay Sathe: Why job seekers must be careful with how they present themselves on social networking sites
Using Facebook, Twitter and LinkedIn in your job search can be an easy way to network with your connections and fashion an image online, but job seekers must be careful with how they present themselves on these social networking sites. You must choose your connections wisely. As more companies become social media savvy, using such sites to connect with them can be a valuable asset. It’s an easy way to research the organization and keep track of new positions available. Be wary of over-connecting, however. Connecting with too many irrelevant companies and people can overload your newsfeed and cause you to miss important information. Continue Reading»
Mary Siero: Recommendations for improving the security posture of your organization
Security and compliance are “always on” type of activities. Typically organizations perform a “point in time” check of their security and compliance requirements and then fix whatever problems they find at that time. Innovative IT performs programmatic assessments that look at the processes and governance of your organization to determine if those “point in time” checks are being maintained throughout daily operations. Based on our assessment results, we work with you to create an Action Plan to implement best practices and controls in a prioritized fashion to remediate issues and concerns. Continue Reading»
Mike Giuffrida: How HR based technologies and solutions can play an important role in federal organizations
The most important and central fact that organizations must remember is that Technology can never fix a process problem. The journey always begins with understanding current processes, and also understanding how the introduction of Technology can streamline and improve the efficiency of those processes. And therein lies the most fundamental role that Technology can play. Technology is the enabler for an organization to automate, streamline, increase the efficiency of the hiring process. This fundamental role that technology can play is just that, fundamental, and is the first step in the process of introducing technology into an organization. Continue Reading»
Lewis Wu: The next big "things" in wireless networking
The latest new technological standard in wireless networking is called 802.11ac. It can theoretically provide up to three times the throughput and data transfer speeds of the previous standard of 802.11n. This makes it even better suited for bandwidth-intensive tasks such as streaming HD videos, online gaming and downloading large files. 802.11ac also extends the range of the network a bit as well. Continue Reading»
Vladimir Chernavsky: Emerging trends in small business communications
The latest new technological standard in wireless networking is called 802.11ac. It can theoretically provide up to three times the throughput and data transfer speeds of the previous standard of 802.11n. This makes it even better suited for bandwidth-intensive tasks such as streaming HD videos, online gaming and downloading large files. 802.11ac also extends the range of the network a bit as well. Continue Reading»
Bookmark and Share  
Jimme' Peters: How an external agency can really shine and pay exponential dividends for the thriving small to medium entity

Most often, small and medium sized companies do not have copious staff resources and wear many hats as a result. Being spread too thin is not conducive to promotion and marketing strategy as it requires daily management and creativity. General marketing staff cannot keep up with all the various mediums, frequent editorial beat changes, short deadlines, and stories that pop up randomly. An external agency provides media relationships, strategic counsel, candid feedback, prior expertise with similar client issues, and most importantly focus to maximize opportunities and garner available exposure. This is where an external agency can really shine and pay exponential dividends for the thriving small to medium entity. Continue Reading»

Peter Schmitt: Here are the most important things that predictive analytic can accomplish

Dialogue Marketing uses predictive analytics to anticipate the profile of a consumer which allows us to intelligently route a phone call to the agent that is mostly likely to convert based on life style attribute matching. Another important thing that predictive analytics can accomplish is its ability to identify trends or anomalies and automatically trigger events to capitalize or improve on the real time event.   An entirely different predictive result can be found by using data from social media where we can predict if consumer perception is creating a trend that is either negative or positive and if it requires immediate action. Continue Reading»

James Varga: How identity fraud may be impacting your online business

As the industry continues to shift to online distribution of regulated products and services, high risk, data-driven background checks are being used to increase acquisition and onboard customers more efficiently. The result is increasing fraud rates caused by identity theft due to personal information being widely available through data bureaus, public records and social networks. With trust online at the heart of business, we need to change the way personal information is used for consumer verification and to enable greater protection and security for our online identities. Continue Reading»

Mark Austin: Security threats that enterprises might not immediately consider

As regulatory bodies continue to dictate security initiatives within heavily-regulated industries, such as finance and healthcare, least privilege management will play a key role in ensuring companies are in line with internal and external compliance. Several compliance mandates, including the Monetary Authority of Singapore (MAS TRM) now place much greater emphasis on desktop and server security, particularly with regard to access privileges. In fact, MAS TRM has one section dedicated entirely to least privilege, encouraging tight restriction of privileged accounts and only granting them on a ‘need-to-have’ basis. Continue Reading»

Gavin Kim: Current state of mobile security
The proliferation of inexpensive devices coupled with the low-cost, unlimited data plans means consumers are downloading more apps, surfing the web more often, and increasingly using social media forms of communications. From a malware developer’s perspective, this means more opportunities and more channels to push out malware. Cybercriminals will always go where the money is, so we expect to see more infections in markets outside of China and Eastern Europe, simply because the financial rewards are greater. Continue Reading»
Patrick McBride: Key requirements of next generation privileged identity management (PIM)
Hybrid environments extend the management plane and the associated risk surface area organizations must protect. They also introduce new systems and network management models, and powerful new management consoles providing customers with optics into and control over their infrastructure like never before. However, these new management consoles, and their associated APIs, also concentrate power and therefore risk like never before. With these new tools a super user can “spin up”, copy or delete hundreds or thousands of new servers with a few mouse clicks or a few calls from a script to the cloud provider’s management API. Continue Reading»
Marko Lehtimaki: New methodologies make HTML5 hybrid app development accessible to everyone
When targeting multiple platforms, a developer typically needs to know many programming languages, use different tools for each platform and even use different operating systems to utilize those tools. This is a very inefficient and expensive to develop. When a developer wants to extend an HTML5 hybrid app with native SDKs, it typically requires technical knowhow that most web developers don’t have. Besides having to install the SDKs in the native wrapper code base, the developer also needs to maintain these native libraries as they are updated over time. Continue Reading»
Greg Brashier: Emerging Trends in Small Business Communications
With cutting-edge technology like hosted VoIP, small businesses can benefit from all of the great features that advanced phone systems offer at a fraction of the cost. Cloud-based PBX systems are the golden ticket for small businesses seeking to lower their bottom line since there are little or no up-front costs for installation and deployment or maintenance and upkeep. By reducing entry and service costs, while providing a low-cost way to scale service as the business grows, hosted PBX phone solutions even out the network services playing field and allow small businesses a chance to succeed alongside large enterprises. Continue Reading»
Tom Hance: What are Advanced Persistent Threats?
It takes a special talent with a highly focused agenda to launch a targeted attack. Many of the individuals and organizations behind APTs, Trojans and botnets are highly paid professionals. And they are good at covering their tracks and their geographic source. China, Russia, Eastern Europe, are often home of the originators.  The creators of APTs may have goals in writing their destructive code such as industrial espionage, monetary theft or disabling an organization’s networks for financial or political gain. Continue Reading»
Jordan Glazier: How Eventful is changing the way people discover, share and promote local events and entertainment
Demand it!, Eventful’s proprietary social media service gives passionate fans an opportunity to demand live events and entertainment comes to their town. For example, when fans demand favorite music artists, free advance movie screenings or one-of-a-kind experiences comes to their city; they are so passionate they further engage with the event by posting their demand, attendance plans, event reviews and event pictures on traditional social media channels that in turn, escalate the event’s exposure, increase ticket sales and put fans in seats. Continue Reading»
Chris Neal: Is the cloud ready for mission critical apps?
Today’s application systems are growing in complexity. Even a simple “Login” to a system may cross 10 to 20 different servers and systems. Throw multiple operating systems, middleware, and hybrid-cloud into the mix and IT Operations has their hands full. This complexity has led to management screens in the Operations Center being peppered with warning and error messages (sometimes thousands per minute). Honestly, Operations staff really have no idea where to even start when that happens. A transaction-centric approach allows warnings and alerts to be prioritized by showing which transactions specific systems and messages are tied to, and whether the transaction or application is experiencing any slow transactions. Continue Reading»


Georgette Pascale: Fine-Tuning the Virtual Workplace - Managing a Business From Afar

When leading a virtual firm, first and foremost, you have to hire the right staff, people who understand and embrace the business model you’ve envisioned and are self-motivated and comfortable working on their own. You’ll often be hiring these people over the phone, sight unseen, so it’s up to you to develop a well thought-out list of interview questions and a superior set of listening skills. Whenever possible, even if it costs you a bit more, hire senior level adults. While young freelancers may cost less and may be enthusiastic about the prospect of working from home in their pajamas, they most probably have not yet developed the skills that allow them to focus on work and prioritize without face-to-face interaction and supervision. Continue Reading»

Paul Goodison: What truly is DCIM?

On the IT side of the business. I see lots of talk about DCIM being facilities side, but the reality is the facilities side of the business is well served by management systems they have been using for years (for example most facilities managers can tell you power to their facility and information about the generator and cooling systems). What has been missing is a management system for the various groups working in, or having equipment in, the DC. These folks use spreadsheets today and need a better solution. In addition the facilities side has little visibility of what the business is planning in terms of equipment deployments and is therefore unable to offer advice or take action. Continue Reading»

Philip Lieberman: Common misconceptions hindering adoption of cloud computing

Many IT security professionals are still wary of moving to the cloud, according to our recent cloud security survey. This survey measured the attitudes of nearly 300 IT security professionals and it revealed that almost half of them are deterred from keeping sensitive data in the cloud because of fear of possible government and legal interference. There are several reasons why IT experts might be apprehensive about storing corporate data in the cloud. The key issues are data security, government surveillance and cloud legislation. Continue Reading»

Dan Chmielewski: Most cost effective way to spend marketing dollars

PR and social media are still among some of the most cost effective marketing dollars a small to mid-size client can spend. It’s about building and capturing mindshare, coming across as a credible resource and a good interview. Stories that run can put a client on the map. We’re fortunate to work with clients who are fearless when it comes to giving interviews. The more interesting the answers, the more likely reporters and editors include them in the story. I have one client in particular who has been given a nickname by certain reporters who call when they want a strong opinion on an issue. Small and midsize clients benefit most from agencies that specialize in those clients. The larger agencies put their best talent on the larger accounts. Wouldn’t you rather have the best talent an agency can offer? Continue Reading»

Ulf Ziske: What are Scrambled Secrets?

The idea behind the Scrambled Secrets is not only locking the door of your safe by using a simple “True-False-authentication-mechanisms” but rather protecting your “values” themselves by encrypting. Your values or secrets could be money or important business data, technical spoken that are files, like textual information, images, videos or other software. The idea to scramble your secrets means to encrypt each value separately. That means not only encrypting the whole hard disk rather encrypting each file or each banknote in your "safe". Continue Reading»

Dr. Nabil Abu El Ata: How businesses can make better critical forward-looking decisions

As businesses continue to morph to meet emerging market demands at a faster and faster rate, the millions of dy­namic system interactions that support global business are becoming too complex to manage using statistical meth­ods of predictive analytics. Statistical analytics take a point-in-time view of business and use past behavior patterns to infer what might happen in the future. These methods can be useful for low stake decisions or when outcomes continuously fol­low previously encountered patterns whereby only the parameters—like volumes and product mixes—change. Continue Reading»

Clint Harder: Should organizations be concerned about the security of cloud applications?

When it comes to the cloud, security is a high priority and concern for businesses—as it should be for all internal and external IT infrastructure. Really, securing cloud infrastructure is very similar to securing internal infrastructure. For instance, operating systems still need to be patched, logs still need to monitored, and passwords still need to be secure. This is not new for any IT manager. What can make securing the cloud tricky is the ease of deploying cloud resources. Sometimes organizations are unaware of deployments and don’t have a chance to apply their security controls and framework. Continue Reading»

Nils Rasmussen: How the Business Intelligence (BI) Market is evolving

Before BI solutions there were spreadsheets, and before spreadsheets there were paper. This evolution has first of all helped automate tasks in departments like accounting and finance, but with newer visualization technologies it has become much easier for managers to spot trends in their data and to quickly zoom in on exceptions and variances in their metrics. With web, mobile devices and cloud-based solutions it has also become much easier for any information worker to get the answers they need anywhere, any time. Continue Reading»