Understanding Network-as-a-Service from Alcatel-Lucent Enterprise

Today’s digital enterprises require IT infrastructure that is agile and dynamic. Popular digital technologies like mobility, the Internet of Things (IoT), and cloud applications can rapidly disrupt the status quo. The network must be responsive to change, with the ability to scale capacity, expand coverage, and implement new network technologies that support and enable the unique needs of disruptive digital services. Unfortunately, most enterprises take a static approach to building and operating networks. Network hardware requires expensive capital outlays, and enterprises usually sweat network assets for as long as possible, sometimes beyond a typical depreciation cycle. They overbuild capacity and hope ...

Read More

Businessman working and plan strategy of target on network connection investment with digital icon on laptop background, business concept

What is Advanced Network Analytics? Cutting Through the Hype

Everyone wants to talk about how analytics is the future of network engineering and operations. The phrase “network analytics” is used by vendors of various stripes to imply that a particular technology is smarter and better than the average solution. But what is it? What does the term network analytics mean to the enterprise network infrastructure professionals? Enterprise Management Associates (EMA) recently published survey-based research on this topic. We sought out individuals who were actively involved in so-called network analytics initiatives. To find these people, we presented random IT professionals with a broad definition of a network analytics initiative. The implementation of technologies ...

Read More

Cloud computing big data online storage and The Internet of things (IoT) network of physical devices, vehicles,

Solve the Cloud Networking Conundrum With SD-WAN

Enterprise networking professionals have a cloud problem, even if they don’t know it. Software-defined WAN (SD-WAN) solutions can help them solve this problem. Many network managers are unaware that their enterprises are consuming IaaS infrastructure and SaaS applications until someone comes to them with a cloud-related problem. In some cases, users can’t connect to the cloud and they want network operations to figure out why, a tall order for a networking team that didn’t even know the company was using such a cloud service. Or a line of business manager will come to the networking team with the unhappy news that ...

Read More


The evolution of data prep


There is no valid argument against the value of good data preparation as part of an analytics and data management strategy. Organizations require self-service access to valid and reliable data that can be leveraged to make better decisions. Historically, organizations have separated out business and technology decisions and development of business analytics applications. But effective [...]



By | July 29th, 2016|Business Intelligence, Lyndsay Wise|0 Comments

Tips on Getting the Most Out of Your 1:1 iPad Education Program


There is no greater investment we can make in the future than to prepare our children to successfully navigate the challenges of tomorrow. Of course, predicting the workforce requirements of the future is a bit like trying to capture a fly with a cargo net—just when you think you have it, it slips through the [...]



By | July 5th, 2016|IT Management, Steve Brasen, Systems Management|0 Comments

Microsoft Reverses March to Irrelevance with LinkedIn Acquisition


Over the past several years, the impact of “the cloud” on traditional ISVs has been made abundantly clear. Blindsided by the runaway growth of hosted technologies which were simply glints in the eyes of the open source community in 2000, virtually all ISVs have scrambled to stay relevant. At this point, the move from on-premise [...]



By | June 15th, 2016|IT Management, Julie Craig|0 Comments

Best Practices for Innovating Through Cloud Technologies – Dev/Ops, Cloud Provisioning


A recent Enterprise Management Associates (EMA) blog, Best Practices for Innovating Through Cloud Technologies discusses the results of EMA’s 2014 research on open cloud orchestration. It examines the pros and cons of a variety of cloud form factors and the business benefits of cloud computing in general. EMA has also done a great deal of research [...]



By | June 15th, 2016|IT Management, Julie Craig|0 Comments

For Enterprise IT, Continuous Delivery is about more than just continuously delivering


As I write this piece, EMA’s survey team is in the final stages of launching my latest research, “Automating for Digital Transformation: Tools-Driven DevOps and Continuous Software Delivery.” Preliminary data should be in (and shared with survey sponsors) around the beginning of November 2015, with my research paper on the topic out by November 26 [...]



By | June 15th, 2016|IT Management, Julie Craig|0 Comments

IBM InterConnect 2015: “Have it Your Way” Hybrid Cloud Delivery with IBM PureApplication Options


Every year, IBM hosts multiple customer conferences and technical events worldwide. In past years, IBM Pulse, Impact, and Innovate have attracted thousands of IT professionals as separate events focusing on application delivery, middleware, and Dev/Ops respectively. Over time, however, it has become increasingly difficult to divide the IT Pie into such neatly-delineated slices. Application delivery [...]



By | June 15th, 2016|IT Management, Julie Craig|0 Comments

Linux on Power—Poised for Greatness


For two decades, IBM’s Power Systems family of high-performance servers has been considered the premier alternative to x86-based systems. Combining fast processing, high availability, and rapid scalability, Power Systems are optimized to support big data and cloud architectures. Popularly deployed to run IBM’s AIX and IBM i operating systems, the platform has seen stiff competition [...]



By | April 22nd, 2016|IT Management, Steve Brasen, Systems Management|0 Comments

The Desperate Need for Accuracy and Efficiency in Security for Detecting Network Intruders and Other Threat Actors Quickly


According to 2015 research reports published by Ponemon, Mandiant, and others, median intruder dwell time in a target network prior to detection ranges from just under to just over 200 days. That is a little over six months and as everyone agrees, totally unacceptable. How is it that an intruder can get into a network [...]



By | April 14th, 2016|David Monahan, IT Management, Scott Crawford, Security|0 Comments

5 Reasons to Transition From the Dark Ages to the Digital Age With a Document Management System


We live in the digital age—or at least many of us do. Today’s IT-savvy users expect to be able to access any data, form, or record from any device at any location and at any time. However, some organizations seem to be perpetually stuck in the dark ages, relying on antiquated paper documents and physical [...]



By | April 11th, 2016|IT Management, Steve Brasen, Systems Management|0 Comments
Load More Posts