Location Based Analytics: Where Everybody Knows Your Name


Do you remember the 90s sitcom “Cheers?” It was about an eclectic cast of characters that hung out at a Boston bar. Almost every scene was set in the bar, a familiar, comfortable place where your friends made you feel welcome when they called out your name as you walked through the door. 

Comments (0)

Creating the New Intelligent Enterprise

SAP_Sapphire_BLOG_900x310 (1)

As we head into next month’s annual SAP SAPPHIRE® NOW and Americas’ SAP Users’ Group (ASUG) Annual Conference, over twenty thousand attendees are looking forward to learning about new technologies, hearing success stories, best practices, and sharing ideas about what’s top of mind for businesses looking to pave the path to digital transformation.

Comments (0)

Cybersecurity: The Only Constant is Change


The technology universe is undergoing an unprecedented transformation. A proliferation of data coupled with strategic models such as cloud and hybrid IT create advanced possibilities for industries – re-defining the potential for agility and efficiency. But these great opportunities also introduce a new world of risk. Every day, the digital infrastructure is targeted with new cyberthreats – including advanced hacks, phishing or even DDoS. For those in cybersecurity, the only true constant is change.

Comments (0)

Mark Your Calendars – Digital Transformation is Coming


The message is coming through loud and clear: As digital technologies evolve, businesses must start aligning for an unprecedented transformation – or risk being left behind. Every segment of an organization is impacted by Digital Transformation, from business strategy to IT resources. And the shift goes beyond technology, as this evolution is key to accelerating revenue and advancing innovation.

Comments (0)

Make the Perfect Match: Aligning Key Workloads with Cloud


While making the perfect match is never easy, the answer is usually based on simple equations. The term “Matching Theory” is defined by a unique mathematical framework that results from ideal pairings. It’s the process of two elements coming together to advance their combined potential. This is becoming especially important as the world goes digital.

Comments (0)

What Companies Need to Learn About Cybersecurity


In this exclusive keynote delivered to a group of top Chief Information Security Officers, CenturyLink CSO Dave Mahon explains how security executives can work more effectively with senior business leaders and members of the Board to improve their company’s overall cybersecurity posture.   

Comments (0)

A Guide to Transforming Government IT


It is easy to see change as an event. Something happens and things are different, like you walked through a door into an entirely different environment. Government IT knows this type of change well. Change is predictable and has a calendar all its own based on elections and appropriation cycles. You know when to expect this type of change and after one or two cycles you learn how to deal with it.

Comments (0)

IT Security Enters the Boardroom

Cybersecurity. Business meeting security. Concept business illustration. Vector flat

Not too long ago, IT issues such as cybersecurity and data protection were reserved for the back office – and rarely considered by organizations in driving revenue and aligning market strategy. These efforts even ran independent of mainstream activities like increased bandwidth or advanced innovation.

Comments (0)