Karen Avery

How to Improve Your IT Security Policy: A Six Sigma Approach

You have a security policy. But is it effective? For many companies, chances are the answer is no; more likely, it is slowing down service, increasing costs and disrupting...

How to Improve Your IT Security Policy: A Six Sigma Approach – 2

You have a security policy. but is it effective? For many companies, chances are the answer is no; more likely, it is slowing down service, increasing costs and disrupting...

Latest Posts

How Dell’s OEM Strategy Addresses the Current Market

Although the concept of original equipment manufacturers (OEMs) is deeply embedded in tech industry and culture, most people focus on the OEM relationships between...

4 Benefits of Digital Transformation

The benefits of digital transformation derive from the combination of its two key building blocks, technology and people, though there's debate about which plays...

IBM Cloud’s Hillery Hunter on Trends in Multicloud Computing

I spoke with Hillery Hunter, CTO of IBM Cloud, about why multicloud computing has become such a dominant strategy; we also covered the challenges...

Hybrid Cloud Isn’t Enough: You Need a Compatible Data Strategy

It’s becoming a hybrid cloud world, as more enterprises move to deploy workloads across multiple public cloud providers as well as private clouds. Of...

Digital Transformation Examples: Business Use Cases

To fully understand digital transformation, it helps to look at examples of this emerging tech trend. Examples can inspire businesses considering investment in this...