article thumbnail

CIOs rise to the ESG reporting challenge

CIO

Even for more straightforward ESG information, such as kilowatt-hours of energy consumed, ESG reporting requirements call for not just the data, but the metadata, including “the dates over which the data was collected and the data quality,” says Fridrich. The complexity is at a much higher level.”

Report 232
article thumbnail

ODC-Noord: The Netherland’s northernmost government data center is committed to a zero carbon future

CIO

“We provide scalable ICT services in accordance with the National Institute of Standards and Technology (NIST) cloud computing reference architecture for business applications,” says Jaap Jansma, manager at ODC-Noord. ODC-Noord’s agile teams are comprised of skilled personnel.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Meet the 50 CISOs to Watch in 2024

Lacework

Marine and White House cyber executive, is an expert in aligning IT strategy with security and data protection and managing IT and security teams, covering operations to cryptography. Elin excels in guiding teams towards pragmatic solutions that generate tangible value. LinkedIn Chris Mellen Ginkgo Bioworks Chris, a former U.S.

Security 132
article thumbnail

How architecture evolves into strategy

O'Reilly Media - Ideas

A look at the roles of architect and strategist, and how they help develop successful technology strategies for business. I should start by saying this section does not offer a treatise on how to do architecture. By 2012, Harvard Business Review published an article by Thomas Davenport and D.J. Solid doesn't mean inflexible.

article thumbnail

Thwarting Cybercrime with Infinidat

Infinidat

The fact of the matter is that the problem is broad and we can create more secure internets and intranets by being diligent and aware! The 2021 attack on one of the largest energy companies in the United States, which provides bout 45% of the U.S. You can learn more about ways to help at the National Cyber Alliance Website.

Storage 71
article thumbnail

A Guide to Evaluating Closed- and Open-Source Libraries

Atomic Spin

Proprietary libraries usually have the backing of an entity with a monetary incentive to maintain it, but because the source code is closed, the community can’t help out with development. This means that development might be slow or that it won’t change to adopt popular features–situations that can weaken the cash flow potential.

article thumbnail

A Guide to Evaluating Closed- and Open-Source Libraries

Atomic Spin

Proprietary libraries usually have the backing of an entity with a monetary incentive to maintain it, but because the source code is closed, the community can’t help out with development. This means that development might be slow or that it won’t change to adopt popular features–situations that can weaken the cash flow potential.