Interconnection Can Create Millions of Dollars in Value: Study

October 2015
CFO Innovation Asia;10/15/2015, p1
The article discusses benefits offered by interconnection-dependent information technology (IT) strategy to enterprises, which includes a yield of 300 percent return on investment and millions of dollars in value. Topics discussed include the impact of organizational expansion, ubiquitous user access and cloud computing migration on interconnection adoption, the rate of interconnection adoption among survey respondents and the challenge presented by security.


Related Articles

  • Security Risks, Cost Hamper Adoption of Cloud Computing, Survey Finds. Eddy, Nathan // Channel Insider;7/27/2010, p1 

    The article reports on a survey by research firm Loudhouse that examines attitudes to cloud computing services among information technology (IT) decision makers in businesses in Great Britain and in the U.S. According to the survey, 51 percent of organizations are now using cloud computing but...

  • Losing Control of Public Cloud Performance. McCafferty, Dennis // CIO Insight;11/24/2015, p2 

    The article reports that the public cloud deployment among businesses is expected to rapidly grow in 2016 according to a ScienceLogic survey entitled "Trends in Global Cloud Adoption," which also revealed that organizations will soon lose control over their information technology (IT)...

  • CLOUD SECURITY FOR SMALL BUSINESSES. Srinivasan, Meena // Allied Academies International Conference: Proceedings of the Ac;Apr2010, Vol. 14 Issue 1, p72 

    Cloud computing is one of the latest developing technologies in virtualization that will eliminate the need of purchasing software or maintaining hardware. The users do not need to have expertise in the technology infrastructure to use cloud computing services. This research addresses the power...

  • Expanding Horizons. PUSHP, SOURABH CHANDRA // Dataquest;12/15/2012, Vol. 30 Issue 23, p44 

    The article focuses on the aspects of cloud-based enterprise resource planning (ERP) solutions. The author mentions that information technology (IT) executives are looking into the potential benefits of cloud-ERP, as they look to improve the infrastructure while reducing the costs associated...

  • How safe is cloud-really? O'Flaherty, Kate // SC Magazine: For IT Security Professionals (15476693);Sep2014, Vol. 25 Issue 9, p36 

    The article focuses on the data security issues related to cloud technology. Demands of European firms to remove their data from servers hosted in the U.S. in the view of a recent revelation from National Security Agency (NSA) whistleblower Edward Snowden about government surveillance of data...

  • Project 'Badal', a cloud computing platform for MSMEs launched.  // FICCI Business Digest;Jul2013, Vol. 10 Issue 4, p13 

    The article offers information on the "India SME Heroes Challenge" event organized by the Federation of Indian Chambers of Commerce and Industry (FICCI) and technology company Google, held at New Delhi, India on July 25, 2013. Topics discussed include the launched of project Badal, a cloud...

  • Thinking about CLOUD COMPUTING? A hybrid solution is best. MCGARRY, CAITLIN // Las Vegas Business Press (10712186);11/7/2011, Vol. 28 Issue 45, p14 

    The article discusses the aspects of cloud computing, as well as its advantages and disadvantages for business enterprises.

  • Sheltering in the Clouds. Sawyer, Tom // ENR: Engineering News-Record;3/2/2015, Vol. 274 Issue 6, p32 

    The article discusses protection offered by cloud-based web hosting and computer services, including the cloud computing provider's ability to build a more secure network compared to any business and their ability to encrypt data during transmission.

  • The Information Assurance Practices of Cloud Computing Vendors. Chakraborty, Rajarshi; Ramireddy, Srilakshmi; Raghu, T. S.; Rao, H. Raghav // IT Professional;Jul/Aug2010, Vol. 12 Issue 4, p29 

    The article provides a study on the assurance practices in cloud computing and various cloud computing initiatives employed by several companies. The study examined how different cloud computing vendors approach information assurance in practices related to security, privacy and business...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics