Remove Applications Remove Architecture Remove Authentication Remove Retail
article thumbnail

Welcome to the trusted edge

CIO Business Intelligence

This is no small matter, as edge computing systems are often running critical applications. To help organizations better protect themselves against sophisticated cyber criminals, the National Institute of Standards and Technology (NIST) outlined a novel approach to security, called zero-trust architecture (ZTA).

Dell 121
article thumbnail

3 commandments that should drive every API strategy

CIO Business Intelligence

In the early 2000s, companies like Amazon, eBay, and Salesforce drove a trend toward standardizing interfaces among web applications. The result was a complete overhaul of how applications were developed and integrated, thanks to a growing network of open web APIs that anyone could consume.

Strategy 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO Business Intelligence

5G also includes secure identity management, enhanced authentication and a core network architecture that can support network slicing, continuous secure connectivity for mobile devices and lower latency.

article thumbnail

Securing the Digital-First Model for Retail

CIO Business Intelligence

Retailers continue to adopt a digital-first approach to customer experience, both in-store and online. To meet the customer demands of a digital-first business model, retailers need to address their critical digital infrastructure and rethink network design and cybersecurity. Retail-specific vulnerabilities.

Retail 97
article thumbnail

Two Reasons Why Apache Cassandra Is the Database for Real-Time Applications

CIO Business Intelligence

There are many statistics that link business success to application speed and responsiveness. second improvement in load times improved retail customer engagement by 5.2%, according to a study by Deloitte. Let’s explore what both of these mean to real-time applications and the businesses that build them.

article thumbnail

PepsiCo IT redefines direct-to-store business model success

CIO Business Intelligence

Christened SalesHub+, the application was custom built with state-of-the-art software, hardware, and connectivity enablement to facilitate order, delivery, and inventory management, as well as timecard, tasks, in-store activities, and passive tracking, all in one place. A full data sync used to take 20 to 30 minutes on an old device.

Retail 97
article thumbnail

The Importance of Identity Management in Security

CIO Business Intelligence

And while all organizations work hard to prevent attacks through traditional security measures such as multi-factor authentication, patching, training, and more, the bad guys increasingly find their way in through poorly thought-out, scattered access and identity management practices. Of course, there’s the issue of artificial intelligence.

Security 104