Hedge IT Blog Awards-400th post

  • 212 views
Uploaded on

In honor of our 400th post on the Hedge IT blog, we are celebrating with our annual blog awards. So, we've gathered the most popular articles according to our readers, as well as a few of our personal …

In honor of our 400th post on the Hedge IT blog, we are celebrating with our annual blog awards. So, we've gathered the most popular articles according to our readers, as well as a few of our personal favorites.

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
212
On Slideshare
0
From Embeds
0
Number of Embeds
9

Actions

Shares
Downloads
3
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. HEDGE IT BLOG AWARDS In honor of our 400th post on the Hedge IT blog, we are celebrating with our annual blog awards. So, we've gathered the most popular articles according to our readers, as well as a few of our personal favorites.
  • 2. BEST VIDEO Our 60-Second Answer to Why Go Eze Private Cloud? “Cloud computing is becoming a standard IT deployment method for the investment management industry.”
  • 3. FAVORITE WEBCAST OR PRESENTATION Managing Your Applications in the Cloud: Webinar Recap & Replay “When it comes to implementing applications, there are many considerations to think about, some of which include addressing investor due diligence concerns, addressing regulatory requirements, and supporting client service demands. The most importance goal for many firms, however, is mitigating risk.”
  • 4. SOCIAL MEDIA STANDOUT SEC’s Social Media Guidance Is Changing, Here's What You Need to Know “As your firm moves forward with incorporating social media into its business strategy, it’s important to develop a written social media usage policy to outline acceptable and unacceptable use of social media for employees. This is a highly recommended best practice for managing effective social media campaigns, especially given the uptick in discovery audits administered by the SEC.”
  • 5. APPLICATION AWARENESS Snapchat "Disappearing" Messages: What it is and why you should care “While the app itself is primarily intended for use in the social sphere, the technology that powers Snapchat has caught the attention of some developers in the business world. Companies that regularly send and receive emails with highly sensitive or proprietary information are interested in having the ability to make those messages disappear after they’ve been read.”
  • 6. CRAZY ABOUT THE CLOUD The Antidote for IT Headaches: Eze Private Cloud
  • 7. SOUND SECURITY Best Practices for Managing Security Risks (Webinar Recap) “So, what should you be aware of to help protect your firm from an intrusion? There are a variety of sources from which cyber attacks can originate including: • Phishing scams • USB media devices • Universal Plug & Play • Malware via Drive-by Download”
  • 8. OUTSTANDING SURVEY Cloud Adoption Survey Results Revealed: Part 1 Diary of a Happy Cloud User: Cloud Survey Results Part 2 Cloud Survey Sneak Peek: 2013 Results (Infographic)
  • 9. Feel GOOD FUN Reflecting on What We're Thankful For This Thanksgiving
  • 10. STAY SAFE In Business Continuity Planning, Employee Communication is Vital Why a Disaster Recovery Activation is So Much More Than a “Test” A Best Practices Guide to Business Continuity Planning Taking Disaster Recovery Replication to a Virtual Level in the Cloud
  • 11. HOTTEST TOPIC SEC to Examine Cybersecurity Policies at a Hedge Fund Near You Phishing: How Not to Get Hooked! Cybersecurity Insurance Evolving to Protect Businesses From Increasing Threats