Rewarding Impatience with User Self-Service

Rewarding Impatience with User Self-Service

There seems to be a direct correlation between how successful business professionals are and their level of impatience. While I am not familiar with any studies on this particular subject, it is simple logic that the most productive employees are those who most frequently demand rapid response to service requests. From my past experience managing and providing IT administrative support, I can attest that these individuals are usually the most irritating—constantly requesting access to new applications, data, and other business resources with expectations of an immediate response. Begrudgingly, I must acknowledge that these are the folks who are also most ...

Read More

Business Process Management in the Real World — Why It’s Important to Govern Both Automated and Manual Processes

Business Process Management in the Real World — Why It’s Important to Govern Both Automated and Manual Processes

In a perfect world, all business processes would be automated and all work tasks would be accomplished with the click of a button. This idyllic work experience seems to be the realization of Plato’s utopia…or, if you prefer, the world of the Jetsons. Regrettably, however, we clearly do not live in a perfect world. Put simply, while any repeatable process can be automated, not every process is repeatable, so automation is not a practical solution in all cases. This is particularly a problem for enterprises since business productivity is almost entirely dependent on the rapid and accurate performance of business ...

Read More

Vectra Provides Pervasive Visibility & Analysis to Detect Cyber Attacks

Vectra Provides Pervasive Visibility & Analysis to Detect Cyber Attacks

Though cyber attacks have been around for years, in 2014 there was an explosion in the volume of attacks and a marked increase in the losses and damages they inflicted. In 2015, this does not seem to be lightening up. In February, Anthem health care insurers were compromised, putting 80 million current and former customers and employees at risk, followed in March by Primera Blue Cross, which added another 11 million records of the same. The full extent of these breaches may not be determined for months to over a year. Along with cyber attacks, cyber-hack insurance policy issuance is also climbing. ...

Read More

posted by Torsten Volk   | June 20, 2013 | 0 Comments

Janus-300x190

At EMA, we constantly receive inquiries regarding what OpenStack means to the VMware portfolio. Is it a competing technology? Are OpenStack and vCloud complementary? Why did VMware join OpenStack? What are the typical use cases for OpenStack as opposed to vCloud? To address these questions, let’s take a step back and take a look at what...

Read More »



posted by Julie Craig   | June 10, 2013 | 0 Comments

NSA-PRISM-Program-for-Spying

Who can watch the PRISM fiasco and NOT wonder about its impact on public Cloud computing? If the government can monitor your phone calls, it can certainly force SaaS, IaaS, and PaaS vendors to provide access to your financials, your sales records, your data, and anything else you do or store “in the Cloud”.  And...

Read More »



posted by Steve Brasen   | June 6, 2013 | 0 Comments

Businessman_tablet_300x190

IT marketing hype has generated quite a few ridiculous and sometimes outright bizarre phrases to describe trends in technology adoption, but few on the list of the absurd top the insistence that we live in a “post-PC” era.  The concept of “post-PC” derives from the (correct) fact that mobile device adoption has broadly accelerated, but...

Read More »



posted by Jim Frey   | May 15, 2013 | 0 Comments

EMC_World_2013-300x190

During the week of May 5th, EMC held its fast-growing user conference in Las Vegas, while just down the strip the Interop 2013 event was also underway.  Lacking an ability to clone myself, I did my best to attend both, in the process actively supporting the local contingent of taxi drivers and putting in more...

Read More »



posted by Torsten Volk   | May 8, 2013 | 0 Comments

Emerging monarch

Breaking News: Dell Acquires Enstratius to Further Complete Its Cloud Story Today, on May 6, 2013, Dell acquired Enstratius, a company aimed at deploying, automating and managing applications in complex hybrid cloud environments. Enstratius enforces governance and security in the cloud, offering automated scaling, disaster recovery and cloud bursting. The Enstratius solution supports all popular...

Read More »



posted by Jim Frey   | May 7, 2013 | 0 Comments

CAWorld_2013_300x190px

This year’s theme for CAWorld 2013 was “Go Big: IT with Impact.”  So I thought what the heck – let’s go big.  I stepped back and took a much broader look across the CA Technologies portfolio than I normally would.  Usually, I focus on the network management solutions, which live primarily within CA’s Service Assurance...

Read More »



posted by Tracy Corbo   | May 1, 2013 | 0 Comments

APIs_300x190

Long ago and far away I used to cover programming languages called 4GLs, which have long since been relegated to the technology graveyard. Nice idea, but took way too long to deploy. Since then I have moved over to cover networking, but I often miss the world of programming. I was lucky enough to be...

Read More »



posted by Torsten Volk   | April 22, 2013 | 0 Comments

Revolution_button_300x190

OpenStack’s huge momentum is undeniable. IBM, RedHat, NetApp, Rackspace, HP, Dell, Cisco, Intel and even VMware have committed significant funds and human resources to this project. But why would companies, that are otherwise competing rather fiercely, sit on one table to build an OpenSource cloud platform? The answer is certainly not “altruism”, as this is...

Read More »



posted by Tracy Corbo   | April 12, 2013 | 0 Comments

glass_maze_300x190

In recent months both Cisco and Juniper have been talking about Puppet. In February, Juniper announced an early adopter release of Puppet for Junos OS. At the Network Field Day event, Cisco demonstrated onePK + Puppet. When I hear Puppet, I think sys admin not network operator. Why then the growing buzz around Puppet and...

Read More »



arrows_opposite_directions_300x190px

In my last post, I talked about the frustration that enterprises have with the lack of integration among security tactics – an egregious gap attributable in no small way to the extremely fragmented nature of the IT security industry itself. I offered a few examples of approaches that seek to close these gaps and equip...

Read More »



Page 11 of 37« First...«910111213»2030...Last »