Linux on Power—Poised for Greatness

Linux on Power—Poised for Greatness

For two decades, IBM’s Power Systems family of high-performance servers has been considered the premier alternative to x86-based systems. Combining fast processing, high availability, and rapid scalability, Power Systems are optimized to support big data and cloud architectures. Popularly deployed to run IBM’s AIX and IBM i operating systems, the platform has seen stiff competition in recent years from x86-based Linux systems. In 2013, IBM responded to this challenge by investing a billion dollars into the development of enhancements to the Power line that would support Linux operating systems and open source technologies. This bold move was hailed as a ...

Read More

The Desperate Need for Accuracy and Efficiency in Security for Detecting Network Intruders and Other Threat Actors Quickly

The Desperate Need for Accuracy and Efficiency in Security for Detecting Network Intruders and Other Threat Actors Quickly

According to 2015 research reports published by Ponemon, Mandiant, and others, median intruder dwell time in a target network prior to detection ranges from just under to just over 200 days. That is a little over six months and as everyone agrees, totally unacceptable. How is it that an intruder can get into a network and remain active for over six months before being discovered?  As a quick point of reference, it is important to note that these statistics include both external attackers and internal attackers. The latter are much more difficult to detect by normal/traditional means because they are supposed ...

Read More

5 Reasons to Transition From the Dark Ages to the Digital Age With a Document Management System

5 Reasons to Transition From the Dark Ages to the Digital Age With a Document Management System

We live in the digital age—or at least many of us do. Today’s IT-savvy users expect to be able to access any data, form, or record from any device at any location and at any time. However, some organizations seem to be perpetually stuck in the dark ages, relying on antiquated paper documents and physical filing cabinets for document retention. Other businesses may have documents in electronic form but lack any method for organizing them beyond just saving them to a basic filesystem. I’ve even known business professionals who store critical records in archive folders in their email package because ...

Read More

posted by Steve Brasen   | April 22, 2016 | 0 Comments

Linux on Power-300x190

For two decades, IBM’s Power Systems family of high-performance servers has been considered the premier alternative to x86-based systems. Combining fast processing, high availability, and rapid scalability, Power Systems are optimized to support big data and cloud architectures. Popularly deployed to run IBM’s AIX and IBM i operating systems, the platform has seen stiff competition...

Read More »



hiding security image_300x190

According to 2015 research reports published by Ponemon, Mandiant, and others, median intruder dwell time in a target network prior to detection ranges from just under to just over 200 days. That is a little over six months and as everyone agrees, totally unacceptable. How is it that an intruder can get into a network...

Read More »



Laptop image_resized

We live in the digital age—or at least many of us do. Today’s IT-savvy users expect to be able to access any data, form, or record from any device at any location and at any time. However, some organizations seem to be perpetually stuck in the dark ages, relying on antiquated paper documents and physical...

Read More »



posted by Dan Twing   | March 16, 2016 | 0 Comments

EMA_Radar

Earlier today I presented findings from my recent EMA Radar for Workload Automation (WLA): Q1 2016 report. The recording for the webinar is now live here. A number of questions were asked that we did not have time to address on the live event. These are presented in this blog post with my answers. Last...

Read More »



Data Driven Strategy Automation_300x190

More and more organizations are increasing the use of data in their decision making. EMA describes this as having a data-driven strategy. Recent research has revealed that almost 63% of respondents included data-driven strategies in their organization at a significant level. EMA has been tracking the growth of big data with annual research since 2012....

Read More »



posted by Dennis Drogseth   | January 22, 2016 | 0 Comments

Bet_300x190

I thought I’d begin the year by making some predictions about what to look for in 2016 in the area of IT service management (ITSM).  For those of you who have been following my blogs with any regularity, and particularly for those who sat in on our webinar for the research report “What Is the...

Read More »



posted by Dennis Drogseth   | January 22, 2016 | 0 Comments
There is growing industry attention to user, customer, and digital experience management—often condensed by the acronym UEM for “user experience management.” This attention is more than justified, but most of the buzz leaves out critical questions like, “What is user experience management?”, “Who really runs (or who should run) the UEM show in the digital...

Read More »



posted by Jim Miller   | January 4, 2016 | 0 Comments

Cloud image within laptop screen_300x190

The cost of downtime varies significantly across various industries. Estimates range from as much as $6,000,000 an hour for a brokerage business to $90,000 per hour for media services. Backup and disaster recovery or business continuance enable an IT organization to recover from the loss of a file, object, data set, application, or an entire...

Read More »



posted by David Monahan   | December 11, 2015 | 0 Comments

Virus Alert_300x190

In many organizations, endpoints see virtually constant change. Users access, download, and utilize applications, data, drivers, files, toolbars, widgets, etc., introducing both new security threats and undocumented changes in systems and processes. For better or for worse, all of these activities leave their mark on the endpoint. HEAT has engaged in endpoint security at a...

Read More »



Private-Hybrid-Public-Cloud-graphic

Cloud computing can speed up deployment, reduce costs, and increase efficiency and connectivity. It can open up new ways to get computing work done, but more importantly, the inherent connectivity can change the way employees interact with each other and with customers. It can also change the way companies interact with suppliers and partners. The...

Read More »



Page 1 of 4112345»102030...Last »