Following RIM's announcement that the sale of BlackBerry phone's are down, media attention has focused on how the iPhone has become more sophisticated and is 'smartening' up - Can Apple crush the BlackBerry or will Windows Mobile and RIM remain the business tools of choice?
One of the most read Q&As of this year was about the iPhone as a business tool. The iPhone is certainly on the agenda for many member organisations assessing whether this fashion icon can really hack it in the business arena...
During this workshop delegates examined the strengths and weaknesses between keeping SIEM tasks in-house and outsourcing them, as well as ways to manage the processes and achieve PCI compliance.
This one-day member workshop featured two case-study presentations and many varied opinions and views on Enterprise Architecture (EA), and how to successfully embed it into the organisation.
Meeting business demands for user access
Delivering user access to business systems has become increasingly challenging. Organisations are operating in expanding environments with high levels of mobile working and fluid business requirements, which presents a real challenge to IT.
So how does IT deliver value to its business customers through consistent provision of systems and applications to a diverse range of users with complex individual needs?
The 'Business Intelligence the Key to Survival' workshop was run by the Corporate IT Forum. The event was attended by 16 delegates from a wide cross section of 12 organisations with a variety of experiences within the BI sector.
This online session looked at reasons and ways to effectively rationalise your suppliers.
Mobile working is all about freedom and simplicity. New technologies are making it easier to access information and work regardless of location, but is this the experience of our members? Managing and provisioning your knowledge and field workers can be a challenge. What do you give them, how do you give it to them, how much does it cost to give it to them, and can you deactivate it if it gets lost or stolen?
The 'Vulnerability and Patch Management' workshop was run by the Corporate IT Forum's Information Security Service (tISS). The event was attended by 16 delegates from a wide cross section of 15 organisations with a variety of experiences within the vulnerability and patch management arena.
The Workshop covered different aspects of Social Networks in the workplace including management of employee access, monitoring and supervision of users. There were 15 workshop members and they were a mix of those who were looking to embrace the topic of monitoring in the future and those wishing to share their current experiences.
This report details the conversation from the Outsourcing: Surviving and Thriving workshop, held on the 15th September. The event was made up of a panel session, which four experienced and senior IT professionals shared their knowledge with the members, followed by 5 focused round table discussions.
The 'Benefits Realisation - Effective measurement & communication' workshop was designed to investigate the concept of benefits realisation and provide delegates with insight, ideas, guidance and the ability to share experiences, this report details the findings.
The workshop covered many aspects of the Project Management Office (PMO). It addressed issues such as what is a PMO, whether it is useful, what do the rest of the company think of it? Of major importance is how to measure success and with which parameters, this report documents the full discussion.