DevOps
Cathay Pacific embraces cloud in digital transformation gig
Regional airline Cathay Pacific embraced the cloud early on. Edwin Yapp finds out why and how it went about doing so.
Red Hat launches Open Innovation Labs in Asia Pacific
Reinforces commitment to accelerate innovation and digital transformation across the region.
Strateq re-engineers to meet new challenges
A 34-year-old homegrown IT shop reinvents itself to meet the digital revolution. Edwin Yapp reports.
Former Akamai Technologies APAC VP Malcolm Rowe joins Tenable Network Security
Cybersecurity leader in enterprise vulnerability management selects Malcolm Rowe to drive regional growth and optimize ongoing sales strategies
What lessons can enterprises learn from augmented reality games?
A succsesful AR game's success should extend beyond download figures
Building quality apps and ensuring user satisfaction is the key
So what does the CISO really do?
A CISO needs to connect the boardroom to the server room, while still allowing innovation to flourish – with security embedded in it!
Making DevOps a core competency
When companies set on a path for ‘agile’ IT and give up the safety and accuracy of traditional IT, this destabilises company transformation progress – the goal is to have a balance of both strategies in an organisation, writes Gavin Selkirk of BMC Software.
Digitisation vs digitalisation and why bimodal CIOs will be made redundant
Bimodal IT erroneously and counter-productively asserts that technology must be kept in silos, and that while one practice is focused on delivering IT services, maintaining stability and efficiency, the other takes on more experimental approach to deliver innovation.
Protecting your network requires TnT: Training and testing
Having seemingly secure code and the right security measures is not enough for a strong security stance if proper training is not implemented, writes David Sajoto of Ixia.
Deception and trust among Gartner’s top 10 infosec technologies
Gartner Inc has highlighted the top 10 technologies for information security and their implications for security organisations in 2016.