Wednesday, September 1, 2010

The Role of Information Technology and Media in Sustainability

The mainstream media is catching onto key ideas about sustainability that have existed within the environment mainstream for the last thirty years, and have put a fresh glossy spin onto sustainable ideas and action.




This forum will discuss the current formats of the current media landscape, as well as the less seen but vibrant independent sphere and the spread of sustainable ideas viral media strategies.





--------------------------------------------------------------------------------



Brett Solomon, Marcus Westbury, Andrew Lowenthal, Sriram Reddy

Marcus Westbury

Marcus is best known as the presenter of the popular ABC TV show, 'Not Quite Art'. Marcus has also been involved in many festivals across Victoria and New South Wales, including Artistic Director of the Melbourne’s Next Wave Festival, and Creative Manager of the Noise Media Festival. He has had a range of roles in various media projects, in particular ABC Local Radio.



Brett Solomon

Brett is the Executive Director of the online activist group GetUp! Getup is pioneering a new kind of political activism, and with more than 180,000 members across the country is targeting some of nations’ biggest concerns, from climate change, to David Hicks, to a people-powered federal budget. He is also the co-ordinator and founder of Oxfam Australia’s International Youth Parliament, an international network of young social justice activists tacking global issues.



Andrew Lowenthal

Andrew is involved in social justice media initiatives and is co-founder and project manager of EngageMedia. EngageMedia is a video sharing website focused on social and environmental issues in Southeast Asia, Australia and the Pacific and also a free software project producing online video distribution tools.



Sriram Reddy

Ram is the ICT development Officer of Engineers Without Borders. This organisation pioneers and implements sustainable engineering projects across the developing world. He is also Programs Officer with the Grassroots Networking Team at Infoxchange Australia. He manages the coordination of the Language Factory social enterprise initiative that teaches resident of public housing estates to manage the interpreting and translation challenges of community agencies and service providers.



Tim Parish (MC)

Tim is an artist and the co-editor and art director of undergrowth.org Undergrowth publishes a print and online media magazine with work from emerging and established artists and writers

The Information Technology practice addresses the needs of CIOs and IT executives in running flexible and secure IT environments that provide measurable business value and innovation. Coverage areas include: outsourcing, managed services, security solutions, IT architecture, IT management, IT services, storage, networking, operating systems, integration, data capture, mobile devices, information management, portal technology and content management systems, risk management, governance, compliance (CRG), corporate social responsibility and business intelligence (BI).
The evolution of RFID as an enabling technology has prompted retailers to investigate the value of the technology across four primary goals: process efficiency, product and demand visibility, shrink management, and increasing profits. As a result, retailers across all segments of the industry are implementing RFID solutions, measuring the results of their initiatives, and searching for ways to leverage the technology in every part of their business. Retailers are now approaching RFID with confidence, seeking ways to minimize their risks while maximizing their returns and making core business processes, in-store operations, and customer-facing activities cheaper, faster, and more accurate.


Aberdeen's fourth annual study on data loss prevention shows that the companies achieving top results successfully use content-aware technologies to identify sensitive data across multiple channels, and to invoke a range of remediation options to enforce their established security policies. In doing so, they reap the substantial benefits of fewer incidents of data loss or data exposure, fewer audit deficiencies, and lower operational cost. Compared to all others, Best-in-Class companies in the study support 48% higher scale based on the number of employees, and 15% higher scale in terms of the volume of data at rest in back-end systems. The top performers experienced 75% fewer incidents of data loss / exposure and more than 80% fewer audit deficiencies. At the same time, the top performers are spending 24% less for their data protection initiatives on a per-employee basis, a cost savings of about $40 per person per year. Said another way, Best-in-Class companies are establishing a cost-based business case for their data loss prevention initiatives by being not only more effective, but also more efficient.


Last month, both Google and Apple made major product announcements: Google announced Nexus One, an "unlocked" Android-based smartphone manufactured for them by HTC; and Apple launched its new class of tablet computer, the iPad.




Although it's too early to tell what impact these specific devices will have in the enterprise, recent Aberdeen data reveals that the mobile platforms that each of these devices is based in, Google Android and Apple iPhone OS, have already made significant inroads.However both the Google and Apple platforms do not yet provide the tools necessary for truly robust and secure enterprise deployments.


Although data access and data protection often seem incompatible with one another, Aberdeen's research shows that Best-in-Class companies have successfully managed encryption to achieve both data access and data protection to a higher degree than their Industry Average and Laggard counterparts. Compared to a year ago, they have successfully deployed and managed encryption technologies to reduce data loss / data exposure incidents by 4%, and to reduce audit deficiencies related to data protection by 7%. Compared to all others in the study, they currently support encryption in about 40% more applications, with about 11.5-times more encryption keys under management. Most importantly, they have done so at a significantly lower total cost: 10% less in absolute terms; 36% less in terms of average cost per encryption-enabled application; and 92% less in terms of average cost per key under management.
 
Apple's iPhone 4 and iOS 4 were announced at the Apple Worldwide Developers Conference on June 7 in San Francisco. Apple claimed 1,500 incremental improvements to the new iOS operating system and over 100 new features for end-users. Many of these new capabilities address some the iPhone's essential shortcomings in terms of enterprise IT integration and security. They add advanced video capture and video calling capabilities and limited background multitasking to more robust security, as well as new Application Programmable Interfaces (APIs) for more comprehensive mobility management. Aberdeen has been tracking iPhone enterprise adoption for over two and a half years; despite imminent encroachment by Google Android, it is expected that enterprise iPhone adoption will continue unabated for the near-to-mid term. This Analyst Insight examines the iPhone's advances in multi-tasking, security, and software distribution in the context of Aberdeen's most research on enterprise mobility.


Information is the lifeblood of government enterprises. As the volume of information continues to grow every year, the ability to effectively manage and control this data becomes increasingly vital for effective operations. The trick, especially in the public sector, is to do it without breaking the bank. Aberdeen's research shows that through the use of proper data governance, Best-in-Class are achieving better results while spending 6.7 times less than their compatriots. By investing in a holistic, end-to-end lifecycle approach to information management, these organizations are able to avoid many of the pitfalls that cause inefficiencies, delays and errors in their data - as well as the resulting drop in revenue and performance. Through the appointment of proper leadership and the tactical adoption of technology for information capture, data integration, quality management and analytics, organizations are able to realize strong ROI, increased performance efficiency, faster time-to-information and more available employee time.


Using content-aware technologies to identify sensitive data that requires protection is necessary, but not sufficient: the goal is for the organization's policies regarding the protection of sensitive data to be successfully enforced. Accuracy in identifying and evaluating sensitive data on the front-end is a prerequisite for flexible, automated remediation and enforcement of security policies on the back-end, and leading solution providers for content-aware technologies have been busy in recent months with new releases, acquisitions and partnership activities to increase these synergies. The payoff for putting the P in DLP, based on Aberdeen's fourth annual DLP benchmark (June 2010): enhanced security and higher scale at lower cost.



$399 Value - Offer Expires 10/1/2010



Business Intelligence

Operational Performance Visibility: Improving Decision Timeliness and Accuracy

Contact David This e-mail address is being protected from spambots, you need JavaScript enabled to view it

Performance management metrics are traditionally accessed through technologies such as spreadsheets, scorecards, dashboards, operational reporting, analytics, and “automated alerting”. Operational and executive management increasingly demand visibility into day-to-day metrics to align business activity with corporate objectives. This requires gathering, tracking, analyzing and acting upon information and data that can change multiple times throughout the business day or week.

This report investigates how companies meet the challenge of defining, measuring and refining KPIs that drive performance.

No comments:

Post a Comment