Service Automation: Key for Maximizing IT and Business Efficiency

Service Automation: Key for Maximizing IT and Business Efficiency

The dual revolutions of consumerization and cloud have certainly caused much disruption within and around IT. And universally they have also increased the expectations of IT end users. IT-enabled workers and the lines of business they represent are looking for a fast response to new technology needs combined with high levels of service quality—all at a minimum cost. How is it possible for IT to accommodate such demands? Two themes that emerge from both EMA research and practitioner dialogue are “automation” and “service awareness.” Taking a service-centric approach to automation allows the IT organization to both accelerate delivery and improve the ...

Read More

Is EMV an Expensive Security Misstep for the Payments Industry?

Is EMV an Expensive Security Misstep for the Payments Industry?

There is no disagreement that the current mag-stripe technology used in the USA and other countries outside of the EU is antiquated and lends itself to fraud. The data is easily copied using various methods from manual card data copying and shoulder surfing, to database compromise and POS terminal malware.  Cards can be reproduced with off-the-shelf plastic blanks and a simple machine you can buy on the Internet. Card fraud worldwide is on track to grow by approximately 19% over 2013. In one recent article, the author that the US accounted for 51% of the credit card fraud by dollars lost, ...

Read More

Innovation Explosion Sets the Stage for New Wave of “Hybrid” Applications

Innovation Explosion Sets the Stage for New Wave of “Hybrid” Applications

In the past, technology evolution was quantified as generational. So the first generation of computing was based on the vacuum tube, followed by the transistor, integrated circuits, and microprocessors. Even today, multi-generational software and hardware systems are very much alive in many modern data centers. The interesting thing about the generational approach is that it has always been associated with linear progression and evolutionary growth. However the rapid technology evolution we are seeing today is more revolutionary than evolutionary, and IT is bearing the brunt of its impact. Emerging from the financial doldrums of the 2008 – 2012 “downturn”, business and IT ...

Read More

posted by Jim Frey   | December 10, 2014 | 0 Comments

NetMan Image_300x190

The dual revolutions of consumerization and cloud have certainly caused much disruption within and around IT. And universally they have also increased the expectations of IT end users. IT-enabled workers and the lines of business they represent are looking for a fast response to new technology needs combined with high levels of service quality—all at...

Read More »



Credit Card_300x190

There is no disagreement that the current mag-stripe technology used in the USA and other countries outside of the EU is antiquated and lends itself to fraud. The data is easily copied using various methods from manual card data copying and shoulder surfing, to database compromise and POS terminal malware.  Cards can be reproduced with...

Read More »



Lightbulb Explosion_300x190

In the past, technology evolution was quantified as generational. So the first generation of computing was based on the vacuum tube, followed by the transistor, integrated circuits, and microprocessors. Even today, multi-generational software and hardware systems are very much alive in many modern data centers. The interesting thing about the generational approach is that it...

Read More »



Hacker-Security_300x190

The Cloud Security Alliance (CSA) is a not-for-profit think tank of volunteers that spend their time trying to better the internet. These people are the antithesis of cybercriminals; they spend their energy trying to figure out ways to make our data safer. They create best practices for providing security assurance within cloud computing, or in...

Read More »



Damballa-Bit9_300x190

  In looking at the solutions available for threat protection (and detection), there are quite a few options out there. Some, like Damballa Failsafe, are network-based, vigilantly watching packets across the network and looking for indications of undesirable activities/behaviors and content.  Others are host-based, like Bit9 + Carbon Black, using an agent on the endpoint,...

Read More »



posted by David Monahan   | October 24, 2014 | 0 Comments

SecurityImageEye_300x190

This week, Las Vegas hosted some 3500 people at the MGM Grand to mark Splunk .conf14, the annual user gathering for Splunk customers, referred to as “Splunkers”. For those of you not in the tech industry, spelunking, or the act of exploring caves, may come to mind. The theme of the conference was not cave...

Read More »



posted by Jim Frey   | October 7, 2014 | 0 Comments

NetworkManagementEntIT_300x190

It’s sometimes difficult to differentiate between hype and reality when it comes to topics such as cloud, ITaaS, SDN, DevOps, hybrid this and hybrid that. But there are a few certainties in the IT universe and one of them is that IT doesn’t function if all of the pieces can’t talk to one another, and...

Read More »



NetworkManagementWorldView_300x190

Last week, I attended a Citrix analyst relations summit program to learn about the company’s direction and strategy.  While the main-tent program was longer on vision than it was on execution details, there were some aspects of the proceedings that I found compelling. First off, there weren’t a lot of net new things being introduced,...

Read More »



posted by Jim Miller   | August 28, 2014 | 0 Comments

RemoteControls300x190

There was a time at the height of my home video and audio craze that the number of devices I needed to watch a movie could no longer be counted on one hand. Amplifier, preamplifier, tuner, CD player, DVD player, TV, cable box . . .you get the idea. As I organized my vast array...

Read More »



posted by John Myers   | August 18, 2014 | 0 Comments

AnalyticsText300x190

In skiing, the “black diamond” run or ski slope is often referred to as “high risk/high reward.” You receive lots of “reward” skiing the black diamond slopes, but you have a significant amount of “risk” associated with variable terrain, such as the presence of trees and the possibility of injury. However, the black diamond slopes...

Read More »



Page 1 of 3512345»102030...Last »