HPE Acquires Simplivity – A $650 Million Data Virtualization Play

Today, HPE paid $650 to acquire Simplivity. HPE paid this sizeable amount mainly to acquire OmniStack, Simplivity’s data virtualization software platform. OmniStack’s central value proposition is OPEX reduction through the elimination of traditional infrastructure management tasks. In short, Simplivity enables customers to manage their infrastructure at the virtual machine (VM) – level. Please note that there will be a separate EMA Impact Brief covering this topic in much more detail. Strategic Analysis Today, HPE already offers its HPE HyperConverged Operating Environment 2.0 and numerous Hyper Converged hardware solutions. In addition, HPE just launched its “composable infrastructure” offering. Then why spent $650m on Simplivity’s ...

Read More

Machine Learning and Artificial Intelligence for the Masses

Recently, I’ve been thinking about why we haven’t come all that far in machine learning and artificial intelligence over the previous decade. Today, Keen Browne, Bonsai’s Co-founder and Head of Product, summed it up for me in a concise manner: “The tools really suck and are meant for scientists and mathematicians, not for people who work for the line of business.” The reason I needed this wakeup call is simply that I’ve been thinking about the problem the wrong way. It baffled me that there is so little progress in terms of mainstreaming machine learning (ML) and artificial intelligence (AI), and ...

Read More

The Truth Behind the Scope of the Endpoint Problem in the Enterprise

The Evolution of the “Endpoint” Over the past few years, the perception of what an “endpoint” is, and therefore the definition, has changed. The original perception was a user workstation independent of operating system. With the expansion of functionality, data persistence, Internet connectivity, and ultimately the threats against them, that definition no longer applies. Laptops became included, then smartphones, servers, tablets, internal file shares, and dedicated or special function devices such as point of sale terminals and processors. This change in perception is actually a great awakening on the part of IT and business personnel. They are more willing to accept that ...

Read More


A new analyst on the block


Hello world. I am the new senior analyst for the network management research practice at Enterprise Management Associates (EMA).  My name may be familiar to some of you. Prior to 2015, I led the news team for TechTarget’s networking and telecommunications publications for seven years. Now I’m making the transition from journalist to analyst. The [...]



Hybrid Cloud & Infrastructure Management – Making the Switch


The New Year is always a good time for new beginnings, and 2015 is no exception.  With the start of 2015, my coverage focus at EMA is shifting and evolving.  After 22+ years in the network management space, including over six years as an industry analyst, I am starting a new chapter by shifting my [...]



Leveraging Security Policy Orchestration to “Bake Security in” to SDDC Environments


I have a new guest blog just posted at for Tufin around Security Policy Orchestration.  You can check it out here. It discusses the benefits to using Security Policy Orchestration when defining software-defined data centers (SDDCs).  By supporting a centralized security policy across physical and virtual networks via a single interface. Security  change management provides many benefits including: Application [...]



By | January 27th, 2015|David Monahan, IT Management, Scott Crawford, Security|0 Comments

Flash or HDD for the Best Price/Performance?


Flash technology has proven to be a disruptive force in the storage marketplace. Server and network performance gains over the last decade have been substantial, but the hard drive performance needle has hardly moved. This situation has resulted in server utilization being reduced while waiting on storage input output (I/O) operations to be completed. Server [...]



By | January 9th, 2015|Jim Miller|0 Comments

The Changing Game of IT Service Management


If you think that ITSM is static and old hat, think twice. A huge number of innovations are just emerging—some have been a long time in coming; while others are unexpected surprises—as analytics and automation are changing the ITSM game dramatically. Here are some trends that I’ve seen in 2014 that I expect will grow [...]



By | January 5th, 2015|Dennis Drogseth, IT Management, Service Management|0 Comments

Automating Change: The Key to Proactive IT Management


Reflecting on my earlier career in IT management, I have to confess to a level of astonishment at how naïve IT administrative practices were just a decade or two ago. Failure events were common, and most organizations just accepted as immutable fact the reality of systemic firefighting. IT services critical to business operations were all [...]



By | December 30th, 2014|IT Management, Steve Brasen, Systems Management|0 Comments

Breach Detection, Sony Entertainment and Vectra Networks…


Working in information security for the past 20 years, I have seen a lot. Though there have been many multi-million dollar impact breaches, the recent Sony Pictures hack and subsequent data exposure and extortion is probably the most impactful to a company out of the previous breaches this year. Recent articles revealed that some employees [...]



By | December 19th, 2014|David Monahan, IT Management, Scott Crawford, Security|0 Comments

Allgress Insight Risk Management Suite Brings Flexibility and Functionality to IT-GRC


When I started out in security, only very large organizations with a mature set of business processes dared to talk about implementing some form of governance, risk, and compliance (GRC) or enterprise program (e-GRC). They generally did it in an attempt to get ISO or similar certification, or to “move their programs to the next [...]



By | December 19th, 2014|David Monahan, IT Management, Scott Crawford, Security|0 Comments

Service Automation: Key for Maximizing IT and Business Efficiency


The dual revolutions of consumerization and cloud have certainly caused much disruption within and around IT. And universally they have also increased the expectations of IT end users. IT-enabled workers and the lines of business they represent are looking for a fast response to new technology needs combined with high levels of service quality—all at [...]



By | December 10th, 2014|IT Management, Jim Frey, Network Management|0 Comments

Is EMV an Expensive Security Misstep for the Payments Industry?


There is no disagreement that the current mag-stripe technology used in the USA and other countries outside of the EU is antiquated and lends itself to fraud. The data is easily copied using various methods from manual card data copying and shoulder surfing, to database compromise and POS terminal malware.  Cards can be reproduced with [...]



By | December 8th, 2014|David Monahan, IT Management, Scott Crawford, Security|0 Comments
Load More Posts