Microsoft Reverses March to Irrelevance with LinkedIn Acquisition

Microsoft Reverses March to Irrelevance with LinkedIn Acquisition

Over the past several years, the impact of “the cloud” on traditional ISVs has been made abundantly clear. Blindsided by the runaway growth of hosted technologies which were simply glints in the eyes of the open source community in 2000, virtually all ISVs have scrambled to stay relevant. At this point, the move from on-premise software delivery to consumption of cloud-hosted options such as SaaS and PaaS appears to have stabilized. IT organizations have sorted out which types of solutions are best hosted off-premise and which to keep in house. And to be fair, enterprise-sized companies—the “bread and butter” of ISVs ...

Read More

Linux on Power—Poised for Greatness

Linux on Power—Poised for Greatness

For two decades, IBM’s Power Systems family of high-performance servers has been considered the premier alternative to x86-based systems. Combining fast processing, high availability, and rapid scalability, Power Systems are optimized to support big data and cloud architectures. Popularly deployed to run IBM’s AIX and IBM i operating systems, the platform has seen stiff competition in recent years from x86-based Linux systems. In 2013, IBM responded to this challenge by investing a billion dollars into the development of enhancements to the Power line that would support Linux operating systems and open source technologies. This bold move was hailed as a ...

Read More

The Desperate Need for Accuracy and Efficiency in Security for Detecting Network Intruders and Other Threat Actors Quickly

The Desperate Need for Accuracy and Efficiency in Security for Detecting Network Intruders and Other Threat Actors Quickly

According to 2015 research reports published by Ponemon, Mandiant, and others, median intruder dwell time in a target network prior to detection ranges from just under to just over 200 days. That is a little over six months and as everyone agrees, totally unacceptable. How is it that an intruder can get into a network and remain active for over six months before being discovered?  As a quick point of reference, it is important to note that these statistics include both external attackers and internal attackers. The latter are much more difficult to detect by normal/traditional means because they are supposed ...

Read More

Businessman-IT_Solution-300x190

It’s fascinating how the meaning for just about every term relevant to service management can be a matter of debate—including IT Service Management itself (a discussion for another time).  However, what’s sparking this blog centers around the three other terms in the headline—“service desk,” “Operations” and “Analytics,” plus a fourth—“cognitive computing.” In reading Brian Jeffrey’s...

Read More »



SAP-Head-of-Ideas_300x190

NGDATA, a small but rapidly growing applied big data analytics solution vendor, just released the latest version, Lily 3.0, of its big data personalization platform on May 13, 2014.  Before delving into NGDATA’s unique and effective approach for advancing a company’s understanding of its customers through more accurate and in depth customer intelligence, and before considering...

Read More »



Posted in Evan Quinn

Integration-Block-300x190

In late April, 2014, Informatica (INFA – NASDAQ) boasted another sterling quarter from a financial perspective for Q1-FY14, with revenues up 13%, and deferred revenues up 14%.  What makes INFA’s Q1-FY14 results particularly impressive is that Q1-FY13 was an important comeback quarter for INFA, thus Q1-FY14’s 13% growth rate was over a strong baseline.  INFA’s...

Read More »



Vulnerability-Mgmt-Lifecycle-300x190

On April 23rd, 2014 Dell announced its new Vulnerability Threat Monitoring and Prioritization service delivered through the SecureWorks Counter Threat Platform.  This managed service was created to expand the current Vulnerability Management offerings and increase customer value by creating the ability for customers to integrate their own vulnerability management systems.  With the additional context provided...

Read More »



posted by David Monahan   | April 22, 2014 | 0 Comments

BYOE-300x190

What’s the issue with BYOD? Data Control… What’s the issue with Data Sharing? Data Control! Let’s face it, though it took an evolution of about 15 years, industry figured out that Data Management and Control are the underlying security issues.  Data is power, knowledge, money, control.  If you have it you’re in control.  If you...

Read More »



SAP-Head-of-Ideas_300x190

Despite the SMAC (social, mobile, analytics, cloud) trends being in plain sight for the past half decade, and SaaS Customer Relationship Management (CRM) apps being available for well over a decade, the business value proposition of SaaS CRM apps has only just recently made progress.  First generation SaaS CRM apps enabled small and medium businesses...

Read More »



posted by Evan Quinn   | March 26, 2014 | 0 Comments

Two-Clouds-300x190

For those that think that cloud is mainly about Amazon Web Services (AWS), Salesforce.com, Google, IBM, Microsoft Azure, Rackspace, and a list of smaller SaaS and PaaS vendors, think again.  After several years of investment, in the form of their own R&D, M&A, re-educating their channel, and changing internal systems to better support the cloud-style...

Read More »



posted by Torsten Volk   | March 17, 2014 | 0 Comments

fighting-300x190

Evan Quinn and I have been collecting popular customer questions for a while and wanted to share our thoughts on these questions in the form of a new format: EMA CLOUD RANTS. Each week we will discuss one of the hot topics in enterprise IT to provide the viewer with rapid analyst insights, without any...

Read More »



posted by admin   | March 17, 2014 | 0 Comments

Climbing-to-the-Cloud-300x190

An Overview of Oracle Cloud Strategy, Tactics, and Value If you track the large wave motions of the major providers in enterprise cloud computing, with the exception of Oracle, all the major providers have made loud recent splashes: SAP dove in headfirst with its HANA cloud platform at the October, 2013 TechEd conference. Amazon Web...

Read More »



posted by Evan Quinn   | March 17, 2014 | 0 Comments

Data-Model-High-300x190

For as long as memory serves, the world’s leading independent data modeling tool has been ERwin.  Tracing its roots to 1988, part of the original LogicWorks line-up from the early and mid-1990s, sold to Platinum Technology, which was then acquired by CA Technologies (“CA”) in 1998, ERwin has been a leader if not the leader...

Read More »



Page 10 of 41« First...«89101112»203040...Last »