Subscribe to our Newsletter!
By subscribing to our newsletter, you agree with our privacy terms
Home > Cristina De Luca
Cristina de Luca is a journalist with a masters' degree in Marketing. The last 30 years of her career, Cristina dedicated to multi platform content within the IT and communication areas. De Luca was a reporter, editor and content director for News organisations such as the braziilain media Group Globo, IDG (IDC in Brazil), JB Media Group, O Dia and the internet news portal Terra. Cristina has been awarded six times the Comunique-se award in the categories IT and Specialists.
Since March last year, the 14,000 students at the Pontifical Catholic University of Rio Grande do Sul (PUC-RS) in Brazil have come to depend on online classes. As in many other institutions around the world, in recent months users have experienced a hybrid context, in which activity has had to be carried out partly remotely, partly in physical environments. This configuration has further increased the demand for network monitoring services, as well as for the entire digital environment responsible for local and remote access.
In a market that reached USD 24.7 billion of investments in 2020, no less than 90,000 new digital health apps were launched, covering the most varied functions, from monitoring, diagnosis, drug injection control, and even clinical trial tracking.
IT asset management (ITAM) is arguably more important to organizations than ever before. Along with IT monitoring and IT governance, it forms the priority tripod for CIOs in 2021. Some define it as a set of business practices that combine financial, inventory, and contractual functions to optimize spend and support lifecycle management and strategic decision-making in the IT environment. The ITAM process typically involves collecting an up-to-date and detailed inventory of an organization’s hardware, software, and network assets, and then using that information to make informed business decisions about IT-related purchases and redeployment. And increasingly, to help them assess threats, vulnerabilities, and incidents highlighted by monitoring.