Effective Security Requires a Change in Mindset and the Protection Paradigm

Effective Security Requires a Change in Mindset and the Protection Paradigm

Nearly every day another successful breach is reported. In 2016 alone, organizations from major governmental agencies such as the IRS and Department of Defense, to major retailers including Wendy’s, have succumbed to attack. These organizations are not alone; every major business and governmental sector has been compromised. Large tech companies such as LinkedIn and Oracle, healthcare providers including Premier Healthcare (as well as numerous hospitals), manufacturers, major educational institutions, and large financial organizations have all succumbed to either internal or external threats. What do all of these organizations have in common? Quite a lot, actually: Dedicated manpower for cyber security defense and ...

Read More

Windows 10…One Year Later

Windows 10…One Year Later

Time flies when you’re upgrading operating systems. It has officially been a year since Microsoft introduced Windows 10 to much fanfare and approbation. Acceptance of the platform was almost immediate, with many users simply grateful to migrate away from the much-maligned Windows 8 environment. At the core of the problems with the previous edition of Microsoft’s flagship OS was that the GUI was designed to function more effectively on a tablet than on a PC, which infuriated users who had grown used to the Windows 7 look and feel on their laptops and desktops. The release of Windows 10 gave ...

Read More

The beginnings of IoT related business value

The beginnings of IoT related business value

At EMA, we recently finished IoT research to identify trends and adoption of device related implementations. The research identified projects, industry adoption, business drivers for IoT adoption, and types of devices leveraged for different types of analytical applications. All of the data supports the increasing adoption of IoT and a focus on data driven organizations that understand that effective data management will help support their overall business and competitive advantage.  With big data implementations that are more likely to support analytics, organizations are more apt to take advantage of technology to support better business processes. IoT is the most direct example ...

Read More

Robot-in-data-center1-300x190

The term, “workload automation,” often conjures images of an army of robots zipping around an enterprise performing arduous tasks while the IT manager sits comfortably in a lounge chair at the back of the data center sipping a Mai Tai. Well, it’s not quite that Jetsonesque just yet – we’ll have to wait a few...

Read More »



cloud-datacenter-300x190

A core precept in cloud computing is that it must deliver the illusion of infinite scalability.  That is, it must fulfill the expectation that any and all workloads will continuously operate at peak performance regardless of the size and number of jobs being added.  In reality, however, private cloud deployments are finite with limited compute,...

Read More »



Businessman_global_network-300x190px

What’s your plan of action when faced with a thorny application performance issue?  Where do you turn?  Does everyone jump to the conclusion that it must be the network?  Or do you get the team together and have everyone say, “It’s not me?” These are typical approaches, and in the end, it sometimes becomes a...

Read More »



IBM_logo_CMYK

Steve Smythe discusses how IT Operations is transformed by big data solutions in his latest blog, “Transformation of IT operations with big data solutions.” Is this a reality? The answer—agreed upon here—is almost certainly “yes.” However, it should be pointed out that “big data,” or “IT Operations Analytics,” or as EMA calls it, “Advanced Operational...

Read More »



posted by Evan Quinn   | May 27, 2014 | 0 Comments

Horserace-image_300x190

PostgreSQL (“Postgres”) ranks as the 4th most popular database according to DB-Engines, and excels as a candidate for most OLTP apps and as a hub for data federation.  Its weakness in Massively Parallel Processing (MPP), however, often keeps it out of the running for advanced analytics and high-end OLTP use cases. The MPP limitation...

Read More »



Posted in Evan Quinn

posted by Tracy Corbo   | May 19, 2014 | 0 Comments

riverbed_300x190

When a pure play vendor knocks it out of the park and effectively becomes the defacto gold standard, to which all other products are compared, the product brand develops a strong identity in the market. Riverbed took the WAN Optimization market by storm, leading the charge with its Steelhead product line.  The Steelhead line established...

Read More »



Businessman-IT_Solution-300x190

It’s fascinating how the meaning for just about every term relevant to service management can be a matter of debate—including IT Service Management itself (a discussion for another time).  However, what’s sparking this blog centers around the three other terms in the headline—“service desk,” “Operations” and “Analytics,” plus a fourth—“cognitive computing.” In reading Brian Jeffrey’s...

Read More »



SAP-Head-of-Ideas_300x190

NGDATA, a small but rapidly growing applied big data analytics solution vendor, just released the latest version, Lily 3.0, of its big data personalization platform on May 13, 2014.  Before delving into NGDATA’s unique and effective approach for advancing a company’s understanding of its customers through more accurate and in depth customer intelligence, and before considering...

Read More »



Posted in Evan Quinn

Integration-Block-300x190

In late April, 2014, Informatica (INFA – NASDAQ) boasted another sterling quarter from a financial perspective for Q1-FY14, with revenues up 13%, and deferred revenues up 14%.  What makes INFA’s Q1-FY14 results particularly impressive is that Q1-FY13 was an important comeback quarter for INFA, thus Q1-FY14’s 13% growth rate was over a strong baseline.  INFA’s...

Read More »



Vulnerability-Mgmt-Lifecycle-300x190

On April 23rd, 2014 Dell announced its new Vulnerability Threat Monitoring and Prioritization service delivered through the SecureWorks Counter Threat Platform.  This managed service was created to expand the current Vulnerability Management offerings and increase customer value by creating the ability for customers to integrate their own vulnerability management systems.  With the additional context provided...

Read More »



Page 10 of 42« First...«89101112»203040...Last »