Rewarding Impatience with User Self-Service

Rewarding Impatience with User Self-Service

There seems to be a direct correlation between how successful business professionals are and their level of impatience. While I am not familiar with any studies on this particular subject, it is simple logic that the most productive employees are those who most frequently demand rapid response to service requests. From my past experience managing and providing IT administrative support, I can attest that these individuals are usually the most irritating—constantly requesting access to new applications, data, and other business resources with expectations of an immediate response. Begrudgingly, I must acknowledge that these are the folks who are also most ...

Read More

Business Process Management in the Real World — Why It’s Important to Govern Both Automated and Manual Processes

Business Process Management in the Real World — Why It’s Important to Govern Both Automated and Manual Processes

In a perfect world, all business processes would be automated and all work tasks would be accomplished with the click of a button. This idyllic work experience seems to be the realization of Plato’s utopia…or, if you prefer, the world of the Jetsons. Regrettably, however, we clearly do not live in a perfect world. Put simply, while any repeatable process can be automated, not every process is repeatable, so automation is not a practical solution in all cases. This is particularly a problem for enterprises since business productivity is almost entirely dependent on the rapid and accurate performance of business ...

Read More

Vectra Provides Pervasive Visibility & Analysis to Detect Cyber Attacks

Vectra Provides Pervasive Visibility & Analysis to Detect Cyber Attacks

Though cyber attacks have been around for years, in 2014 there was an explosion in the volume of attacks and a marked increase in the losses and damages they inflicted. In 2015, this does not seem to be lightening up. In February, Anthem health care insurers were compromised, putting 80 million current and former customers and employees at risk, followed in March by Primera Blue Cross, which added another 11 million records of the same. The full extent of these breaches may not be determined for months to over a year. Along with cyber attacks, cyber-hack insurance policy issuance is also climbing. ...

Read More

posted by Steve Brasen   | April 27, 2015 | 0 Comments

App Store

There seems to be a direct correlation between how successful business professionals are and their level of impatience. While I am not familiar with any studies on this particular subject, it is simple logic that the most productive employees are those who most frequently demand rapid response to service requests. From my past experience managing...

Read More »



Easy Button_300x190

In a perfect world, all business processes would be automated and all work tasks would be accomplished with the click of a button. This idyllic work experience seems to be the realization of Plato’s utopia…or, if you prefer, the world of the Jetsons. Regrettably, however, we clearly do not live in a perfect world. Put...

Read More »



Womens head image_300x190

Though cyber attacks have been around for years, in 2014 there was an explosion in the volume of attacks and a marked increase in the losses and damages they inflicted. In 2015, this does not seem to be lightening up. In February, Anthem health care insurers were compromised, putting 80 million current and former customers...

Read More »



Procrastination_300x190

IT operations managers are cringing all around the world – desperately trying to avoid those inevitable words from their executive management: “You need to support enterprise mobility.” Their concerns are understandable. After all, IT administrators are already overtaxed with supporting desktop, server, application, and infrastructure management requirements. Asking them to layer a whole new management...

Read More »



Innovation_300x190

Cultural transformation and eliminating IT silos may sound like an impossible dream—and indeed, perhaps “eliminating” is too strong a word. But the reality is that IT organizations must change toward a more responsive, business-aligned culture, as well as toward a more service-aware (versus siloed) way of working. So how do you begin? A lot depends,...

Read More »



Data_Integration

Enterprise Management Associates (EMA) has recognized that big data implementers and consumers rely on a variety of platforms to meet their big data requirements. These platforms include new data management technologies such as Hadoop, MongoDB, and Cassandra, but the collection also includes traditional SQL-based data management technologies supporting data warehouses and data marts; operational support...

Read More »



posted by Jim Miller   | March 5, 2015 | 0 Comments

blocks_300x190

I had the opportunity to attend the SolidFire analyst day in my hometown of Boulder, Colorado on February 25. It was a well-attended event, with the day split into SolidFire and customer presentations in the morning, and small, intimate conversational sessions with SolidFire executives and customers in the afternoon. SolidFire is one of a growing...

Read More »



Circuit board and lock_300x190

Historically, many organizations and personnel have been concerned about user activity monitoring (UAM). Certain business cultures feel that these activities are an invasion of privacy or are distrustful. However, in today’s Internet connected, data driven world, having specific information or data means the difference in being a market leader and being out of business. Identifying...

Read More »



Networking container_300x190

Docker Inc. acquired networking startup SocketPlane today, indicating that Docker wants to accelerate the development of networking APIs and software that will help network managers operationalize production Linux containers. Docker is a suite of open source software that helps developers and admins manage and scale their use of Linux containers. Containers offer the same resource...

Read More »



dv067003

A few weeks ago, I briefed with a new company called PFP Cybersecurity, also known as Power Fingerprinting, Inc., and was so intrigued by the concept alone that I wrote a Vendor to Watch about them. They officially launched on January 26, , and currently their claim to fame is their physics-based scanning technology which...

Read More »



Page 1 of 3712345»102030...Last »