THANK YOU FOR SUBSCRIBING
Apac CIOOutlook: Contributors
Technology in Utilities
By Alberto Ruocco, AEP VP & CIO, American Electric Power
Usage Based Insurance: The Five Must-Haves
By Jake Diner, Co-founder and CEO, Driveway Software
Is Network Monitoring Keeping Pace with Data Center Growth and Virtualization?
By Richard Rauch, President & CEO, APCON
Augmented Reality to Improve Urban Mobility
By Gregory G. Curtin, Founder and CEO, Civic Resource Group
Where is the Augmented Reality Revolution within the Healthcare Industry?
By Ivan George, Director, The James And Sylvia Earl Sail Center, Anne Arundel Medical Center
Mobility x Security
By Daniel Sobral, CSO, JBS USA
Managing Security At The Speed Of Business
By Nimmy Reichenberg, VP-Marketing and Business Development, AlgoSec
The Employee-An Organization's Security Downfall or a Hidden Security Gem
By Gordon MacKay, EVP and CTO, Digital Defense
Viewing Security With A Service Perspective
By Gary Eppinger, Global CISO, Carnival Corporation
Inaccurate Data Creating a False Sense of Security
By Larry Hurtado, President & CEO, Digital Defense, Inc.
Bringing in Virtual Reality to Stadiums
By Brendan Reilly, Co-Founder and CEO, EON Reality
Technology Differentiators in Customer Experience
By Sue Kurian, Customer Experience Strategist, Business Concepts & Solutions
Flight Simulators Allow Crew Training to Aim for Perfection
By Dan Littmann, Flight Dynamics Manager, FlightSafety International
Enhancing Nursing Education through Simulation
By Kellie Bryant, Director of Simulation Learning and Assistant Clinical Professor, New York University
Digital Developments Impact on Customer Experience
By Peter Kelly, CTO of KAR Auction Services & President of KAR’s Digital Service Group
Simulating the Future of Making Things
By Scott Hudson, Director of the Simulation and Skills Center, The University of Texas at Austin
Enterprise Security Strategies in Todays Threat Environment
By Mike Convertino, VP and Chief Information Security Officer (CISO), F5 Networks
Technology and CEM - A Blessing or a Curse?
By Ben Saitz, CCO, Rocket Fuel
Simulating the Future of Making Things
By Greg Fallon, VP of Simulation Products, Autodesk
Healthcare Simulation-A Multi-Billion Dollar Solution to Safer Healthcare
By Jill Sanko, Academic & Research Director of Simulation/Assistant Professor, University of Miami
How Customer Experience is Getting in the Way of a Great Customer Experience
By Yasminka Nemet, Chief Marketing and CCO, MV Transportation
Connecting People and Technology to Deliver the Best Customer Experience
By Bill Schimikowski, VP, Customer Experience, Fidelity Investments
Systematizing Knowledge for Better Outcomes
By Yossi Caspi, CEO, KMS Lighthouse
Maximizing the Power of Salesforce
By Kurt Andersen, CMO, SAVO
7 Insights for Salesforce Success
By Azmi Jafarey, CIO & SVP Technology Architecture, Intralinks [NYSE: IL]
Software as a Service (Saas)
By Tom Bland, Director, Business Technology Services, Cobb EMC
SaaS Loyalty Technology Platforms Offering Advantages
By Phil Britt, Owner, S&P Enterprises, Inc.
The BPM Cloud SaaS Revolution
By Gregory Zupan, Founder of Zupan eSystematic Solutions
The Question is No Longer Build or Buy. It's Build, Buy, or Subscribe
By Lori MacVittie, Principal Technical Evangelist, F5 Networks
Opportunities and Challenges of SaaS in the Government Sector
By Gary Gorson, CTO, Lake County
The UNICEF Cloud: A Journey beyond the O365 SaaS
By Thierry Beniflah, Chief of Technical Architecture, UNICEF
Balancing In-House And Hosted SaaS Solutions
By Stuart Scott, CIO, Tempur-Pedic
CIOs: How to Make Your Mark with SaaS Solutions
By Ray Grady, Executive Vice President of CloudCraze
Growing E-Commerce Tech Talent In Southeast Asia
By Tim Rath, Chief People Officer, Lazada Group
Virtualised Security Orchestration for Telcos
By Roger Carvosso, Portfolio and Marketing Director, FirstWave Cloud Technology
Cyber Security Breaches - Know it and Prevent it
By Ms Evelyn Tan, Assistant Director, Marketing, Cybersite Services Pte Ltd
Mobile Application Security Testing: The Unique Characteristics of Device Security Models
By Sanjay Zalavadia, VP of Client Services, Zephyr
Innovative Hackers make Reactive Cyber Security a Thing of the Past
By Michael Sentonas, VP of Technology, CrowdStrike
Industry Collaboration; Key to Enhancing Payment Security
By Todd Aadland, SVP, Federal Reserve Bank of Chicago
Cyber Security in an all-digital world
By Effendy Ibrahim, VP, Asia & Japan, Veeam Software
I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info