Skip navigation
Log in to follow, share, and participate in this community.

Recent Activity

Jill Ross
In part 1 of this vlog series , you learned about what RegTech (Regulatory Technology) is and why it’s important for financial services. This is also a good time to look at the biggest achievements in RegTech over the past year, what the future holds for RegTech, and the next steps your organization should be taking in order to be successful,… (Show more)
Nirvana Farhadi
RegTech (Regulatory Technology) isn’t new, but it’s becoming more critical as the landscape of global financial regulations is constantly changing. With the spread of critical information across business units, geographies and IT systems, the cost and challenge of ensuring that your organization is compliant with increasingly complex and stringent… (Show more)
Jill Ross
Guest Contributor: Carrie MacGillivray, Group Vice President, Internet of Things, IDC     For many organizations, the inability to scale their IoT programs is becoming acute and is affecting their ability to make a digital shift that moves their company forward. This blog, authored by Carrie MacGillivray, IDC Group Vice President, Internet of… (Show more)
Jill Ross
Guest Contributor: Carrie MacGillivray, Group Vice President, Internet of Things, IDC   The oceans of data we swim through are already having profound impacts on the way we make decisions and process information. This blog, authored by Carrie MacGillivray, IDC Group Vice President, Internet of Things & Mobility, explores key actions organizations… (Show more)
Jill Ross
Guest Contributor: Carrie MacGillivray, Group Vice President, Internet of Things, IDC   One of the most important – and often overlooked – aspects of IoT program implementation is the experience of the vendors you select and their willing to collaborate. This blog, authored by Carrie MacGillivray, IDC Group Vice President, Internet of Things,… (Show more)
Vinod Subramaniam
Traditionally Fiber channel networks have been considered more secure than Ethernet networks. This is owing to the fact that it is hard to snoop traffic on a fiber channel network since one needs a tap to analyze traffic on a fiber channel network.   Basic security in fiber channel networks starts with zoning. Essentially every server that has… (Show more)
in Innovation Center