Disruptive technology News
October 13, 2017
Disruptive business models in the world today will be the ones that are the norm in Mars tomorrow.
October 06, 2017
The term "Uber moment" now be taken to mean the point at which a digital disrupter finds its business model needs to change to tow the line
July 27, 2017
PwC names supply chain disruption among three areas of uncertainty; data aggregation and skills gap are challenges to IoT adoption, according to new survey of IEEE members.
June 01, 2017
Conceived in 2014, Singapore’s National Health IT Masterplan is coming to fruition, with key projects such as the National Electronic Health Record (NEHR) system already in place. This was revealed ...
Disruptive technology Get Started
Bring yourself up to speed with our introductory content
With digital transformations underway in many industries, CIOs aren't the only ones who need to have the next big thing on their radar. What security innovations should you follow to ready your organization's information security programs?
The internet of things is both a security threat and potentially a security boon. Big data, machine learning and a growing number of systems with pseudo artificial intelligence may help ease the workloads of security analysts. Bitcoin's distributed database technology known as blockchain can add security to a variety of systems, but scalability remains an early concern. Quantum computing? That one may be too far out -- five years at least -- to be considered a near-term technology disruptor to enterprise information security programs.
Whether your organization is focused on manufacturing and infrastructure -- such as industrial control systems -- or consumer and information technology -- such as the internet of things -- everything is rapidly becoming connected and potentially accessible from the internet. Many information security programs are not on track for the internet of things, complex clouds and other technology disruptors. We dust off the crystal ball in this issue of Information Security magazine and ask infosec experts and venture capitalists to look into the future.Continue Reading
When we asked CISOs and venture capitalists about disruptive technologies that could transform enterprise security models -- and how to prepare for them -- a few trends stood out. Continue Reading
Cybersecurity and blockchain received a lot of attention in 2016, and both trends are expected to remain on the radars of healthcare executives in 2017. Continue Reading
Evaluate Disruptive technology Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Traditional application architectures are limited in their ability to scale and meet the demands of today's fast-growing data, cloud and IT environments. Containerization -- with its support for Agile design, development and deployment methodologies -- promises to overcome these challenges. Containers weren't originally designed to implement full-stack applications or any application that needs persistent storage. With containers gaining support from storage array makers, we're starting to see arrays allowing containerized applications to take advantage of primary storage. Find out how storage vendors are bringing persistent storage to the world of containerized applications.
Nonvolatile memory express (NVMe) replaces SCSI at both the device and network levels to deliver greater bandwidth and lower latency to internal storage devices. And with the development of NVMe over Fabrics, the NVMe command set can work across the network via external storage. Discover the benefits of NVMe over Fabrics, when to deploy the technology, how to implement it and which vendors are making it happen.
Copy data management (CDM) protects production data and improves the management of production data copies, with the aim of cutting storage costs, improving data visibility and compliance, and speeding up data access. Until last year, it was the province of point products. But the market is changing, and the technology has gone mainstream as the largest data protection and storage vendors have joined the CDM fray. Find out which CDM capabilities companies value most and what is being done to meet growing demand. What advantages can CDM bring to your IT data storage environment?Continue Reading
After all of the playboy antics of the CEO, along with the unethical practices of fingerprinting and geofencing, the term 'Uber developer' is a stain on any professional resume. Continue Reading
Turning to more than one supplier can be critical in a business landscape marked by disruption and complexity. Here's what you should know. Continue Reading
Manage Disruptive technology
Learn to apply best practices and optimize your operations.
In the face of burgeoning digital disruption, startups and established companies alike are responding with changes to their big data architectures and data engineering processes. Continue Reading
IT can't remain a reactive cost center and cheerful help desk, but must become a competitive, cutthroat service provider and powerful champion of emerging disruptive technology. Continue Reading
Information security managers and venture capitalists weigh in on which digital trends are changing security operations and how IT teams should deal with the fallout. Continue Reading
Problem Solve Disruptive technology Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Digital disruption has become a catch-all term used indiscriminately to telegraph that digital technologies have turned businesses upside down. That's about right. Now, how will your business survive the journey to digital transformation? Continue Reading
Businesses used to rely on partnerships between companies to get the different top products but now hyper-converged vendors have expanded to offer more products of their own. Continue Reading
No one clings to hierarchy like the data center team, but with DevOps and cloud architectures, SDWTs are finding their way into the racks. Continue Reading