The True Value Proposition of BI Solution Providers In Today’s Market: Information Builders Commitment to Its Customers

The business intelligence market is saturated with data management and analytics vendors, and the reality is that vendors cannot compete on capabilities alone. Whether out of the box or through professional services, organizations can generally get the features they require from many different solution providers. Time to value, ease of use, maintenance requirements, and level of service now trump general product capabilities. Obviously, interoperability, scalability, and the ability to effectively integrate data and develop apps are important. At the same time, the main way to ensure customer satisfaction is to provide strong customer support and to focus on quality customer engagements. ...

Read More

White wavy lines on dark blue background.

Optimizing the Business With Network Analytics

Some network operations teams are discovering that they possess a critical asset that can transform enterprises: network data. As businesses become more digitized, networks are emerging as an ultimate source of operational insight. Finance, healthcare, and retail are just some examples of industries where nearly everything critical to a business crosses the wire. Packets and flows can reveal not only the health and performance of IT infrastructure, but business processes, too. The network can provide a record of who is connecting to the network and when, how and why they do. With the right analytical technologies, this data can provide value to the business. For instance, ...

Read More

Q&A From How Digital Business is Shaping the Next Wave of Automation Webinar

I recently presented findings from my Workload Automation (WLA) research and other EMA research on a webinar with Tim Eusterman, Sr. Director Solutions Marketing at BMC in a webinar titled “How Digital Business is Shaping the Next Wave of Automation”. The recording of the webinar is now live here, and the slides are available here. A number of questions were asked that we did not have time to address on the live event. These are presented in this blog post. Q: Can you elaborate on what you mean by IT bringing a digital vision to the business folks? A: Don’t wait for them to ...

Read More


Who Owns User and Customer Experience Management?


There is growing industry attention to user, customer, and digital experience management—often condensed by the acronym UEM for “user experience management.” This attention is more than justified, but most of the buzz leaves out critical questions like, “What is user experience management?”, “Who really runs (or who should run) the UEM show in the digital [...]



By | January 22nd, 2016|Dennis Drogseth, IT Management, Service Management|0 Comments

PODCAST: Discussing Qlik unSummit and QlikView 12


This week in the Analytics Exchange “weekly” podcast,  Alison Jepsen chats with Lyndsay Wise and I about: Our recent trip to the Qlik unSummit in Austin Texas Release announcement of QlikView 12 Upcoming developments for Qlik Sense in 2016 Growth of Qlik into an analytics platform company Listen to the entire podcast (approx 9mins)



By | January 5th, 2016|Business Intelligence, John Myers|0 Comments

Business Continuity in the Age of the Cloud


The cost of downtime varies significantly across various industries. Estimates range from as much as $6,000,000 an hour for a brokerage business to $90,000 per hour for media services. Backup and disaster recovery or business continuance enable an IT organization to recover from the loss of a file, object, data set, application, or an entire [...]



By | January 4th, 2016|IT Management, Jim Miller|0 Comments

HEAT Software Meets the Need for Endpoint Protection Head-On


In many organizations, endpoints see virtually constant change. Users access, download, and utilize applications, data, drivers, files, toolbars, widgets, etc., introducing both new security threats and undocumented changes in systems and processes. For better or for worse, all of these activities leave their mark on the endpoint. HEAT has engaged in endpoint security at a [...]



By | December 11th, 2015|David Monahan, IT Management, Scott Crawford, Security|0 Comments

Best Practices for Innovating Through Cloud Technologies – Utilizing Public, Private, and Hybrid Cloud


Cloud computing can speed up deployment, reduce costs, and increase efficiency and connectivity. It can open up new ways to get computing work done, but more importantly, the inherent connectivity can change the way employees interact with each other and with customers. It can also change the way companies interact with suppliers and partners. The [...]



By | November 25th, 2015|Dan Twing, IT Management|0 Comments

The Rise of Thingbots in the Internet of Things (IoT)


The Internet can be a pretty scary place. Places like the dark web exist in the form of trading houses with stolen personal information from credit cards and social security numbers, to health records and full identities being obtained for a price. Malware development and deployment and other attack services such as DDoS and botnets [...]



By | November 20th, 2015|David Monahan, IT Management, Scott Crawford, Security|0 Comments

EMA Research Shows that Cyber Security is Achieving Executive Visibility in a Big Way


One of the services that EMA provides to the tech industry is research. During the course of the year, numerous projects are launched to help IT consumers and vendors understand market perceptions. EMA then provides analysis and forecasts on trends based upon those perceptions. These projects have been continued in 2015. EMA has already had [...]



By | November 20th, 2015|David Monahan, IT Management, Scott Crawford, Security|0 Comments

Why Analytics and Automation Are Central to ITSM Transformation


In research done earlier this year, we looked at changing patterns of IT service management (ITSM) adoption across a population of 270 respondents in North America and Europe. One of the standout themes that emerged from our findings was the need for the service desk to become a more automated and analytically empowered center of [...]



By | November 9th, 2015|Dennis Drogseth, IT Management, Service Management|0 Comments

Digital Transformation and the New War Room


In August EMA surveyed 306 respondents in North America, England, France, Germany, Australia, China and India about digital and IT transformation. The goal was in part to create a heat map around just what digital and IT transformation were in the minds of both IT and business stakeholders. We targeted mostly leadership roles, but also [...]



By | November 3rd, 2015|Dennis Drogseth, IT Management, Service Management|0 Comments

User Experience Matters in Self-Service Provisioning


If you’re like me, you are increasingly becoming reliant on online shopping to replace the more arduous task of physical in-store shopping. I find this is particularly true during the holiday season when the idea of fighting traffic and elbowing crowds to desperately search numerous shops in order to find just the right gift for [...]



By | October 26th, 2015|IT Management, Steve Brasen, Systems Management|0 Comments
Load More Posts