cioinsight.com
Home > RSS Feeds > Networking
  • Smart devices are at the core of a growing universe of machines, sensors and systems that redefine business processes. But success requires vision and planning.

  • By 2017, there will be five connected devices for every Internet user, according to industry projections. This puts a lot of pressure on IT teams setting up WiFi networks that provide outstanding performance and uninterrupted availability. Rising to the challenge, however, doesn't always involve an expensive IT upgrade. In fact, WiFi network capabilities are often greatly influenced by non-tech considerations, such as building design. Fortunately, you don't need a degree in architecture to prevent major issues, as Randstad Technologies has come up with a list of top reasons why WiFi networks fail, along with best practices for avoiding these problems. The following slides were adapted from Randstad's list of potential problems and solutions. They range from conflicting access points to frequency overload to towering ceiling heights to obstructions as small as a leaf on a tree. When investigating a disruption, you may even discover that the office kitchen's microwave—or the nearby dishwasher or refrigerator—is the culprit.

  • Deloitte Vice Chairman Paul Sallomi offers his perspective on the evolving state of IT consumerization and a growing countertrend toward 're-enterprization.'

  • The age of the Internet of things has arrived: More than two out of five enterprises are either currently leveraging IoT technologies or plan to do so this year, according to research from ISACA. But these organizations will invite huge risks if they don't confront the potential cyber-security issues that are commonly associated with IoT deployments. To provide some guidance, ISACA has published a report, "Internet of Things: Risk and Value Considerations," which features a list of nine questions that IT departments should ask before pursuing IoT initiatives. While the IoT era has only begun, the report indicates that its impact will be transformational. However, that transformation will be problematic for companies that don't proactively initiate protective policies. "Connected devices are everywhere—from obvious ones like smart watches and Internet-enabled cars to ones most people may not even be aware of, such as smoke detectors," says Robert Stroud, international president of ISACA and vice president of strategy and innovation at CA Technologies. "Often, organizations [use] IoT without even realizing it, which means their risk management stakeholders are not involved and potential attack vectors are going unmonitored." ISACA (previously known as the Information Systems Audit and Control Association) is an independent, nonprofit association that provides guidance, benchmarks and other resources for more than 115,000 IT industry members worldwide. The following questions are adapted from the report.