Gaining Data Control with BYOD and Bluebox

Gaining Data Control with BYOD and Bluebox

What’s the issue with BYOD? Data Control… What’s the issue with Data Sharing? Data Control! Let’s face it, though it took an evolution of about 15 years, industry figured out that Data Management and Control are the underlying security issues.  Data is power, knowledge, money, control.  If you have it you’re in control.  If you don’t, you’re not. If you lose it… you’re in trouble. There are many ways for data to exfiltrate in the BYOD/mobile device world.  It can be (un)intentionally released by employees, extracted by malware, stolen or leaked by malicious apps, you get the idea.  Firewalls aren’t stopping it ...

Read More

SAP Aims to Help Its Customers Engage Their Customers Engagingly

SAP Aims to Help Its Customers Engage Their Customers Engagingly

Despite the SMAC (social, mobile, analytics, cloud) trends being in plain sight for the past half decade, and SaaS Customer Relationship Management (CRM) apps being available for well over a decade, the business value proposition of SaaS CRM apps has only just recently made progress.  First generation SaaS CRM apps enabled small and medium businesses [...]

Read More

Cloud Rant:  Oracle Cloud versus SAP Cloud

Cloud Rant: Oracle Cloud versus SAP Cloud

For those that think that cloud is mainly about Amazon Web Services (AWS), Salesforce.com, Google, IBM, Microsoft Azure, Rackspace, and a list of smaller SaaS and PaaS vendors, think again.  After several years of investment, in the form of their own R&D, M&A, re-educating their channel, and changing internal systems to better support the cloud-style [...]

Read More

posted by Torsten Volk   | August 16, 2012 | 0 Comments

Fish_eating_fish_300x190

The ultimate goal of the Software-Defined Datacenter (SDD), a term coined only a few months ago by VMware’s Steve Herrod, is to centrally control all aspects of the data center – compute, networking, storage – through hardware-independent management and virtualization software. This software will also provide the advanced features that currently constitute the main differentiators...

Read More »



data-explosion_300x190

For the last several months, I’ve been heads-down on a research project that culminates over a year of investigation into the rise of what I have been calling “data-driven security”: security efforts informed and defined by their reliance on insight – and increasingly enabled by emerging technologies for large-scale data management, as well as by...

Read More »



posted by Torsten Volk   | August 1, 2012 | 0 Comments

Fake-Elvis_300x190

When I picked “The Journey to the Cloud” as the working title for one of my fall research projects, I triggered some immediate reactions from colleagues and customers, whose opinions I value. And while I typically do not place too much importance on selecting a working title and also did not intend to just warm...

Read More »



cloud_sunset_300x190

Looking back over this year’s blog posts reminds me that I’ve been heavy on Cloud – and Integration-related topics. And a review of my recent “Cloud Integration” survey has convinced me that I’m not finished yet.  As a matter of fact, from an Application Management perspective, the conversation is just beginning. Four of today’s hottest...

Read More »



posted by Torsten Volk   | July 18, 2012 | 0 Comments

Lab_300x190

Cloud is still a rapidly evolving discipline, with currently many organizations thinking about how to get started or how to take their limited cloud environment to the next level. These organizations are faced with two general challenges. They have to a) get their own house – data center – in order and b) identify a...

Read More »



posted by Torsten Volk   | June 14, 2012 | 0 Comments

Mainframe Computer

During this year’s research for the 2012 EMA Workload Automation (WLA) Radar Report, we encountered a number of very interesting core findings. These research results mostly originated from dozens of conversations with end customers, who have been using WLA software for many years and sometimes even for decades. WLA, by definition, is a mature discipline,...

Read More »



posted by    | June 4, 2012 | 0 Comments

Data_Information_HIGH-SPEED_300x190

I want to outline briefly some ideas I’ve had recently about our fundamental models for understanding IT management. In 1968, Melvin Conway proposed an insightful law, basically stating that our systems are copies of our communication structure (how we interact as human beings). And while this law is often applied in discussions of computer program structure,...

Read More »



posted by Julie Craig   | June 2, 2012 | 0 Comments

Motorola-Droid_300x190

I finally replaced my aging Blackberry recently, mainly because of T-Mobile’s decision to lay off a big hunk of their workforce. I chose T-Mobile several years ago because of high-quality customer service, after dealing with virtually every other carrier (except Sprint) for way too long. So I called Verizon (whose customer service has proven to...

Read More »



posted by Shawn Rogers   | May 31, 2012 | 0 Comments

data_300x190

Recently, when asked what the “next big thing” was, Ann Winblad, renowned venture capital investor, responded: “Data is the new oil.” http://www.forbes.com/sites/perryrotella/2012/04/02/is-data-the-new-oil/ I agree with Ann but to get value from crude oil it must be processed.  And that is often what is lost in the buzz surrounding the Volume, Velocity and Variety (3Vs) attributes of...

Read More »



posted by Julie Craig   | May 22, 2012 | 0 Comments

Man_box_shelves_300x190

My latest research found that only about 65% of commercial enterprise management products purchased are currently in use– the rest are languishing on a shelf somewhere, just waiting to be dusted off and deployed. Here are a few tips to ensure that your purchases don’t end up in a back room collecting dust. Define your...

Read More »



Page 10 of 32« First...«89101112»2030...Last »