The True Value Proposition of BI Solution Providers In Today’s Market: Information Builders Commitment to Its Customers

The business intelligence market is saturated with data management and analytics vendors, and the reality is that vendors cannot compete on capabilities alone. Whether out of the box or through professional services, organizations can generally get the features they require from many different solution providers. Time to value, ease of use, maintenance requirements, and level of service now trump general product capabilities. Obviously, interoperability, scalability, and the ability to effectively integrate data and develop apps are important. At the same time, the main way to ensure customer satisfaction is to provide strong customer support and to focus on quality customer engagements. ...

Read More

White wavy lines on dark blue background.

Optimizing the Business With Network Analytics

Some network operations teams are discovering that they possess a critical asset that can transform enterprises: network data. As businesses become more digitized, networks are emerging as an ultimate source of operational insight. Finance, healthcare, and retail are just some examples of industries where nearly everything critical to a business crosses the wire. Packets and flows can reveal not only the health and performance of IT infrastructure, but business processes, too. The network can provide a record of who is connecting to the network and when, how and why they do. With the right analytical technologies, this data can provide value to the business. For instance, ...

Read More

Q&A From How Digital Business is Shaping the Next Wave of Automation Webinar

I recently presented findings from my Workload Automation (WLA) research and other EMA research on a webinar with Tim Eusterman, Sr. Director Solutions Marketing at BMC in a webinar titled “How Digital Business is Shaping the Next Wave of Automation”. The recording of the webinar is now live here, and the slides are available here. A number of questions were asked that we did not have time to address on the live event. These are presented in this blog post. Q: Can you elaborate on what you mean by IT bringing a digital vision to the business folks? A: Don’t wait for them to ...

Read More


New Options for Lower Cost Object Storage


Object storage has become an optimal solution for the storing of persistent data and as a target for cloud storage. Object storage differs in that it is stored in a flat address space with the metadata, or “data about the data,” being flexible in length and co-resident with the object. It is the simplest of [...]



By | October 20th, 2015|Jim Miller|0 Comments

Top 5 Reasons IT Administrators Are Working Too Hard Managing Endpoints


IT administration is a thankless job. Let’s face it—the only time admins gain any recognition is when something goes wrong. In fact, the most successful IT administrators proactively manage very stable environments where very few failures and performance degradations occur. Unfortunately, though, this is rarely the case, and it is far more common for admins [...]



By | October 9th, 2015|IT Management, Steve Brasen, Systems Management|0 Comments

Running Containers Doesn’t Have To Mean Running Blind


The idea of containers has been around for a long time in various forms on various operating systems. It has been part of the Linux kernel since version 2.6.24 was released in 2008. However, containers did not become mainstream until a couple years ago when Docker was first released in March 2013. Docker introduced container management [...]



By | October 6th, 2015|Dan Twing, IT Management|0 Comments

Are Laptops Really Mobile Devices?


When people think of IT mobility, the images most immediately conjured regard smartphones and tablets. In truth, however the mobile device landscape could be considered broader than this. The basic definition of a mobile device is simply “any computing device designed principally for portability.” By that definition, laptops should clearly be included in that scope. [...]



By | September 25th, 2015|IT Management, Steve Brasen, Systems Management|0 Comments

Process, Dialog, and Workflow: A Formula for Interconnection and Automation


As a follow-up to my previous columns on change management, I’d like to step back a little and shine a light on an even broader landscape. Here I’ll touch briefly on process, dialog, and workflow as a triad that can help IT organizations move forward toward a more efficient and potentially more business-aligned way of [...]



By | September 24th, 2015|Dennis Drogseth, IT Management, Service Management|0 Comments

Why It’s Never Too Soon to Think about IPv6 Network Management


Most network managers are still many years away from turning on Internet Protocol version 6 (IPv6) in their enterprise local area networks (LANs). Private non-routable IPv4 address ranges can happily exist behind a network address translation (NAT) gateway for the foreseeable future. However, things could change. At any time, someone above your pay grade might [...]



By | September 9th, 2015|Featured, IT Management, Shamus McGillicuddy|0 Comments

Know when it’s time to replace open source and freeware infrastructure management tools


Many small and midsized IT organizations rely on a mix of freeware and open source software to manage their infrastructure. These free tools can be effective and economical choices for smaller networks. But how do you know when it’s time to upgrade to a commercial product? Scale is one of the first indicators that you [...]



By | August 28th, 2015|Featured, IT Management, Shamus McGillicuddy|0 Comments

InterMapper Application for Splunk Answers Need for Log Analytics in Network Management


You may not have noticed, but log analytics has become table stakes for network management toolsets. Last year, Enterprise Management Associates® (EMA™) surveyed network managers about the data sources that have become important to engineering and operations tasks. Log files consistently scored higher than anything else, including flow data, packet analysis, and SNMP metrics. Fifty-nine [...]



By | August 28th, 2015|Featured, IT Management, Shamus McGillicuddy|0 Comments

Top 5 Reasons Custom Scripts are Putting Your Business at Risk


IT administrators love to write scripts – at least, the most talented ones do. Scripting provides a powerful platform to automate simple and repeatable tasks. However, like with most powerful tools, there is an overwhelming temptation for scripting to be overused. When faced with a project deadline, a high-pressure failure event, or even just the [...]



By | August 25th, 2015|IT Management, Steve Brasen, Systems Management|0 Comments

The Limits of Packet Capture


In preparation for my new ‘Achieving Hi-Fidelity Security’ research project, I thought I would post a relevant blog I wrote for InformationSecurityBuzz.com. I have packet capture data for forensics, isn’t that enough? No! Of late, I have briefed with a number of companies that provide full network packet capture capabilities.  They tout its benefits and that [...]



By | August 19th, 2015|David Monahan, IT Management, Scott Crawford, Security|0 Comments
Load More Posts