Defining The Business Value of Analytics

Defining The Business Value of Analytics

I have covered the business intelligence market for several years and have had the opportunity to work with organizations to help them get their business intelligence projects up and running. Behind all of the research, case studies, and consulting projects, the drivers are always similar – organizations need a way to gain insight into what is happening within their organization. Whether it is what is going right, what is going wrong, learning about customers, overcoming data silos, or governing access, the bottom line is the same. Organizations require a way to access secure, trusted, accurate, valid information in a way ...

Read More

Introducing IT Service Management (ITSM) 2.0: A Cornerstone for Digital and IT Transformation

Introducing IT Service Management (ITSM) 2.0: A Cornerstone for Digital and IT Transformation

Over the course of numerous deployment dialogs and multiple research projects starting with last year’s work on “ITSM futures,” I have been tracking a still largely unheralded phenomenon: ITSM teams in many organizations are evolving to take a leadership role in helping all of IT become more efficient, more business aligned, and ever more relevant [...]

Read More

The Top 5 IoT Lessons I Learned From Hollywood

The Top 5 IoT Lessons I Learned From Hollywood

In my last IoT blog, I talked about the history of IoT and the evolution of issues surrounding IoT devices. In this part of the series, we will expand on the issues around IoT and the data it collects. Research firms estimate that there will be between 20 billion and 30 billion IoT devices on Earth by 20201 and that they will have collectively produced over four zettabytes of data.2 These are virtually inconceivable volumes for the average person and dealing with volumes this high is effectively far more than a trivial matter. Given these factors, this blog is going to discuss how to deal with IoT using various (slightly ...

Read More

Credit Card_300x190

There is no disagreement that the current mag-stripe technology used in the USA and other countries outside of the EU is antiquated and lends itself to fraud. The data is easily copied using various methods from manual card data copying and shoulder surfing, to database compromise and POS terminal malware.  Cards can be reproduced with...

Read More »



Lightbulb Explosion_300x190

In the past, technology evolution was quantified as generational. So the first generation of computing was based on the vacuum tube, followed by the transistor, integrated circuits, and microprocessors. Even today, multi-generational software and hardware systems are very much alive in many modern data centers. The interesting thing about the generational approach is that it...

Read More »



GolfTee2_300x190

During the first week of November, Riverbed held its first combined OPNET and Riverbed user conference at the San Jose Convention Center. Held in tandem with the Riverbed industry analyst event, this conference was an opportunity for Riverbed to share with both customers and industry analysts the company’s vision for becoming the go-to vendor for...

Read More »



Hacker-Security_300x190

The Cloud Security Alliance (CSA) is a not-for-profit think tank of volunteers that spend their time trying to better the internet. These people are the antithesis of cybercriminals; they spend their energy trying to figure out ways to make our data safer. They create best practices for providing security assurance within cloud computing, or in...

Read More »



Damballa-Bit9_300x190

  In looking at the solutions available for threat protection (and detection), there are quite a few options out there. Some, like Damballa Failsafe, are network-based, vigilantly watching packets across the network and looking for indications of undesirable activities/behaviors and content.  Others are host-based, like Bit9 + Carbon Black, using an agent on the endpoint,...

Read More »



posted by David Monahan   | October 24, 2014 | 0 Comments

SecurityImageEye_300x190

This week, Las Vegas hosted some 3500 people at the MGM Grand to mark Splunk .conf14, the annual user gathering for Splunk customers, referred to as “Splunkers”. For those of you not in the tech industry, spelunking, or the act of exploring caves, may come to mind. The theme of the conference was not cave...

Read More »



posted by Jim Frey   | October 7, 2014 | 0 Comments

NetworkManagementEntIT_300x190

It’s sometimes difficult to differentiate between hype and reality when it comes to topics such as cloud, ITaaS, SDN, DevOps, hybrid this and hybrid that. But there are a few certainties in the IT universe and one of them is that IT doesn’t function if all of the pieces can’t talk to one another, and...

Read More »



NetworkManagementWorldView_300x190

Last week, I attended a Citrix analyst relations summit program to learn about the company’s direction and strategy.  While the main-tent program was longer on vision than it was on execution details, there were some aspects of the proceedings that I found compelling. First off, there weren’t a lot of net new things being introduced,...

Read More »



posted by Jim Miller   | August 28, 2014 | 0 Comments

RemoteControls300x190

There was a time at the height of my home video and audio craze that the number of devices I needed to watch a movie could no longer be counted on one hand. Amplifier, preamplifier, tuner, CD player, DVD player, TV, cable box . . .you get the idea. As I organized my vast array...

Read More »



posted by John Myers   | August 18, 2014 | 0 Comments

AnalyticsText300x190

In skiing, the “black diamond” run or ski slope is often referred to as “high risk/high reward.” You receive lots of “reward” skiing the black diamond slopes, but you have a significant amount of “risk” associated with variable terrain, such as the presence of trees and the possibility of injury. However, the black diamond slopes...

Read More »



Page 10 of 44« First...«89101112»203040...Last »