Microsoft Reverses March to Irrelevance with LinkedIn Acquisition

Microsoft Reverses March to Irrelevance with LinkedIn Acquisition

Over the past several years, the impact of “the cloud” on traditional ISVs has been made abundantly clear. Blindsided by the runaway growth of hosted technologies which were simply glints in the eyes of the open source community in 2000, virtually all ISVs have scrambled to stay relevant. At this point, the move from on-premise software delivery to consumption of cloud-hosted options such as SaaS and PaaS appears to have stabilized. IT organizations have sorted out which types of solutions are best hosted off-premise and which to keep in house. And to be fair, enterprise-sized companies—the “bread and butter” of ISVs ...

Read More

Linux on Power—Poised for Greatness

Linux on Power—Poised for Greatness

For two decades, IBM’s Power Systems family of high-performance servers has been considered the premier alternative to x86-based systems. Combining fast processing, high availability, and rapid scalability, Power Systems are optimized to support big data and cloud architectures. Popularly deployed to run IBM’s AIX and IBM i operating systems, the platform has seen stiff competition in recent years from x86-based Linux systems. In 2013, IBM responded to this challenge by investing a billion dollars into the development of enhancements to the Power line that would support Linux operating systems and open source technologies. This bold move was hailed as a ...

Read More

The Desperate Need for Accuracy and Efficiency in Security for Detecting Network Intruders and Other Threat Actors Quickly

The Desperate Need for Accuracy and Efficiency in Security for Detecting Network Intruders and Other Threat Actors Quickly

According to 2015 research reports published by Ponemon, Mandiant, and others, median intruder dwell time in a target network prior to detection ranges from just under to just over 200 days. That is a little over six months and as everyone agrees, totally unacceptable. How is it that an intruder can get into a network and remain active for over six months before being discovered?  As a quick point of reference, it is important to note that these statistics include both external attackers and internal attackers. The latter are much more difficult to detect by normal/traditional means because they are supposed ...

Read More

Microsoft-Linkedin-300x190

Over the past several years, the impact of “the cloud” on traditional ISVs has been made abundantly clear. Blindsided by the runaway growth of hosted technologies which were simply glints in the eyes of the open source community in 2000, virtually all ISVs have scrambled to stay relevant. At this point, the move from on-premise...

Read More »



A recent Enterprise Management Associates (EMA) blog, Best Practices for Innovating Through Cloud Technologies discusses the results of EMA’s 2014 research on open cloud orchestration. It examines the pros and cons of a variety of cloud form factors and the business benefits of cloud computing in general. EMA has also done a great deal of research...

Read More »



As I write this piece, EMA’s survey team is in the final stages of launching my latest research, “Automating for Digital Transformation: Tools-Driven DevOps and Continuous Software Delivery.” Preliminary data should be in (and shared with survey sponsors) around the beginning of November 2015, with my research paper on the topic out by November 26...

Read More »



Every year, IBM hosts multiple customer conferences and technical events worldwide. In past years, IBM Pulse, Impact, and Innovate have attracted thousands of IT professionals as separate events focusing on application delivery, middleware, and Dev/Ops respectively. Over time, however, it has become increasingly difficult to divide the IT Pie into such neatly-delineated slices. Application delivery...

Read More »



posted by Steve Brasen   | April 22, 2016 | 0 Comments

Linux on Power-300x190

For two decades, IBM’s Power Systems family of high-performance servers has been considered the premier alternative to x86-based systems. Combining fast processing, high availability, and rapid scalability, Power Systems are optimized to support big data and cloud architectures. Popularly deployed to run IBM’s AIX and IBM i operating systems, the platform has seen stiff competition...

Read More »



hiding security image_300x190

According to 2015 research reports published by Ponemon, Mandiant, and others, median intruder dwell time in a target network prior to detection ranges from just under to just over 200 days. That is a little over six months and as everyone agrees, totally unacceptable. How is it that an intruder can get into a network...

Read More »



Laptop image_resized

We live in the digital age—or at least many of us do. Today’s IT-savvy users expect to be able to access any data, form, or record from any device at any location and at any time. However, some organizations seem to be perpetually stuck in the dark ages, relying on antiquated paper documents and physical...

Read More »



posted by Dan Twing   | March 16, 2016 | 0 Comments

EMA_Radar

Earlier today I presented findings from my recent EMA Radar for Workload Automation (WLA): Q1 2016 report. The recording for the webinar is now live here. A number of questions were asked that we did not have time to address on the live event. These are presented in this blog post with my answers. Last...

Read More »



Data Driven Strategy Automation_300x190

More and more organizations are increasing the use of data in their decision making. EMA describes this as having a data-driven strategy. Recent research has revealed that almost 63% of respondents included data-driven strategies in their organization at a significant level. EMA has been tracking the growth of big data with annual research since 2012....

Read More »



posted by Dennis Drogseth   | January 22, 2016 | 0 Comments

Bet_300x190

I thought I’d begin the year by making some predictions about what to look for in 2016 in the area of IT service management (ITSM).  For those of you who have been following my blogs with any regularity, and particularly for those who sat in on our webinar for the research report “What Is the...

Read More »



Page 1 of 4112345»102030...Last »