This series examines today’s most pressing business issues from many angles. The Debates offer a healthy discussion of options, immediate impacts and long-term consequences. The following Debates address some of your technology-related concerns.
CIOs have been hearing about the importance of adopting IPv6 for so long that some have become desensitized to the issue. Yet, with some parts of the world already running out of available IP addresses, can they continue to put off the migration to IPv6?
As increasingly advanced mobile technologies, sophisticated user expectations, and innovative usages continue to emerge, could utilizing traditional IT approaches – and skill sets – cause companies to miss out on the mobile revolution?
If your organization is hit by a cyber-attack, turning the matter over to the authorities is the appropriate course of action. But, if you’re able to stop the attack yourself by taking out the hacker’s servers, should you hit back at the hackers?
Visualization offer individuals an analytical window into rapidly expanding Big Data sets. Yet, given that analytics and other automated data management tools can analyze more data efficiently, is human analysis of data still worth the effort?
As analytics, mobile, social business and other digital forces continue to grow and evolve, some view them as interesting additions to the IT toolkit. For others, they herald the advent of the “postdigital” enterprise. Who is right?
Employees are expecting access to ever-more-sophisticated technologies in the workplace. Empowering users with such tools can generate value, but is there a point where CIOs should put the brakes on continual technology disruption?
Outside-in architecture connects partners, suppliers and other external parties to a company’s ecosystem. But does the ability to share information with third parties justify the cost of replacing your current centralized architecture?
The hybrid cloud — a catalog of cloud services created and provisioned both inside and outside the enterprise — is a model growing in popularity among large companies. But how solid is the business case?
An inadvertent social media post containing sensitive information can inflict considerable damage on the business. Given this exposure, is it possible for organizations to govern social media in ways that effectively manage risk?