article thumbnail

Sustainability: Real progress but also thorny challenges ahead

CIO

She often writes about cybersecurity, disaster recovery, storage, unified communications, and wireless technology. She has extensive experience both as a researcher and a business and technology journalist, covering a broad range of issues and topics. Karen holds a Bachelor of Arts degree from UCLA.

article thumbnail

Making your enterprise architecture framework work for you

CIO

She often writes about cybersecurity, disaster recovery, storage, unified communications, and wireless technology. She has extensive experience both as a researcher and a business and technology journalist, covering a broad range of issues and topics. Karen holds a Bachelor of Arts degree from UCLA.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Evaluating the relative cost of edge computing

CIO

She often writes about cybersecurity, disaster recovery, storage, unified communications, and wireless technology. She has extensive experience both as a researcher and a business and technology journalist, covering a broad range of issues and topics. Karen holds a Bachelor of Arts degree from UCLA.

article thumbnail

Can you have too many security tools?

CIO

She often writes about cybersecurity, disaster recovery, storage, unified communications, and wireless technology. She has extensive experience both as a researcher and a business and technology journalist, covering a broad range of issues and topics. Karen holds a Bachelor of Arts degree from UCLA.

Tools 312
article thumbnail

Competition is stiff, but retailers know what it takes to compete

CIO

She often writes about cybersecurity, disaster recovery, storage, unified communications, and wireless technology. She has extensive experience both as a researcher and a business and technology journalist, covering a broad range of issues and topics. Karen holds a Bachelor of Arts degree from UCLA.

Retail 162
article thumbnail

Dow makes production more efficient through IT-OT collaboration

CIO

Now, they access that information in a secure cloud via a safety-hardened device connected to a site-wide private 4G wireless network. For now, Dow’s private wireless network uses LTE, a 4G technology, but it will be ready for 5G when 5G is ready for it. Using an older and slower wireless technology hasn’t hurt the project, though.

Chemicals 246
article thumbnail

Cybersecurity for Energy and Utility Operations

Getronics

Apple/IOS security protector – advanced protection for IOS devices over wired, wireless and cellular networks. Identity management – visibility and dynamic control of users and devices accessing wired, wireless and VPN connections. Mobility management – single sign-on access to business applications, based upon the user’s persona.

Energy 40