HPE Acquires Simplivity – A $650 Million Data Virtualization Play

Today, HPE paid $650 to acquire Simplivity. HPE paid this sizeable amount mainly to acquire OmniStack, Simplivity’s data virtualization software platform. OmniStack’s central value proposition is OPEX reduction through the elimination of traditional infrastructure management tasks. In short, Simplivity enables customers to manage their infrastructure at the virtual machine (VM) – level. Please note that there will be a separate EMA Impact Brief covering this topic in much more detail. Strategic Analysis Today, HPE already offers its HPE HyperConverged Operating Environment 2.0 and numerous Hyper Converged hardware solutions. In addition, HPE just launched its “composable infrastructure” offering. Then why spent $650m on Simplivity’s ...

Read More

Machine Learning and Artificial Intelligence for the Masses

Recently, I’ve been thinking about why we haven’t come all that far in machine learning and artificial intelligence over the previous decade. Today, Keen Browne, Bonsai’s Co-founder and Head of Product, summed it up for me in a concise manner: “The tools really suck and are meant for scientists and mathematicians, not for people who work for the line of business.” The reason I needed this wakeup call is simply that I’ve been thinking about the problem the wrong way. It baffled me that there is so little progress in terms of mainstreaming machine learning (ML) and artificial intelligence (AI), and ...

Read More

The Truth Behind the Scope of the Endpoint Problem in the Enterprise

The Evolution of the “Endpoint” Over the past few years, the perception of what an “endpoint” is, and therefore the definition, has changed. The original perception was a user workstation independent of operating system. With the expansion of functionality, data persistence, Internet connectivity, and ultimately the threats against them, that definition no longer applies. Laptops became included, then smartphones, servers, tablets, internal file shares, and dedicated or special function devices such as point of sale terminals and processors. This change in perception is actually a great awakening on the part of IT and business personnel. They are more willing to accept that ...

Read More


Top 5 Indications It’s Time to Transition to a Hybrid Cloud


A core precept in cloud computing is that it must deliver the illusion of infinite scalability.  That is, it must fulfill the expectation that any and all workloads will continuously operate at peak performance regardless of the size and number of jobs being added.  In reality, however, private cloud deployments are finite with limited compute, [...]



By | June 11th, 2014|IT Management, Steve Brasen, Systems Management|0 Comments

Turning to the Network to Solve Application Performance Issues


What’s your plan of action when faced with a thorny application performance issue?  Where do you turn?  Does everyone jump to the conclusion that it must be the network?  Or do you get the team together and have everyone say, “It’s not me?” These are typical approaches, and in the end, it sometimes becomes a [...]



By | June 9th, 2014|IT Management, Jim Frey, Network Management|0 Comments

Advanced Operational Analytics (AOA) – Transformative Use Cases from EMA Research


Steve Smythe discusses how IT Operations is transformed by big data solutions in his latest blog, “Transformation of IT operations with big data solutions.” Is this a reality? The answer—agreed upon here—is almost certainly “yes.” However, it should be pointed out that “big data,” or “IT Operations Analytics,” or as EMA calls it, “Advanced Operational [...]



Postgres-XL Enters the Big Data Backstretch


PostgreSQL (“Postgres”) ranks as the 4th most popular database according to DB-Engines, and excels as a candidate for most OLTP apps and as a hub for data federation.  Its weakness in Massively Parallel Processing (MPP), however, often keeps it out of the running for advanced analytics and high-end OLTP use cases. The MPP limitation [...]



By | May 27th, 2014|Evan Quinn|0 Comments

Riverbed Steels for Battle


When a pure play vendor knocks it out of the park and effectively becomes the defacto gold standard, to which all other products are compared, the product brand develops a strong identity in the market. Riverbed took the WAN Optimization market by storm, leading the charge with its Steelhead product line.  The Steelhead line established [...]



By | May 19th, 2014|IT Management, Network Management, Tracy Corbo|0 Comments

Integrated ITSM—the Service Desk + Operations + Analytics


It’s fascinating how the meaning for just about every term relevant to service management can be a matter of debate—including IT Service Management itself (a discussion for another time).  However, what’s sparking this blog centers around the three other terms in the headline—“service desk,” “Operations” and “Analytics,” plus a fourth—“cognitive computing.” In reading Brian Jeffrey’s [...]



Truly Understanding Your Customers with NGDATA’s Lily 3.0


NGDATA, a small but rapidly growing applied big data analytics solution vendor, just released the latest version, Lily 3.0, of its big data personalization platform on May 13, 2014.  Before delving into NGDATA’s unique and effective approach for advancing a company’s understanding of its customers through more accurate and in depth customer intelligence, and before considering [...]



By | May 14th, 2014|Evan Quinn|0 Comments

Informatica Reflects the Expanding Integration Imperative


In late April, 2014, Informatica (INFA – NASDAQ) boasted another sterling quarter from a financial perspective for Q1-FY14, with revenues up 13%, and deferred revenues up 14%.  What makes INFA’s Q1-FY14 results particularly impressive is that Q1-FY13 was an important comeback quarter for INFA, thus Q1-FY14’s 13% growth rate was over a strong baseline.  INFA’s [...]



By | May 1st, 2014|Evan Quinn|0 Comments

Dell SecureWorks and Risk I/O team up to deliver a better kind of Vulnerability Management


On April 23rd, 2014 Dell announced its new Vulnerability Threat Monitoring and Prioritization service delivered through the SecureWorks Counter Threat Platform.  This managed service was created to expand the current Vulnerability Management offerings and increase customer value by creating the ability for customers to integrate their own vulnerability management systems.  With the additional context provided [...]



By | April 29th, 2014|David Monahan, IT Management, Scott Crawford, Security|0 Comments

Gaining Data Control with BYOD and Bluebox


What’s the issue with BYOD? Data Control… What’s the issue with Data Sharing? Data Control! Let’s face it, though it took an evolution of about 15 years, industry figured out that Data Management and Control are the underlying security issues.  Data is power, knowledge, money, control.  If you have it you’re in control.  If you [...]



By | April 22nd, 2014|David Monahan, IT Management, Scott Crawford, Security|0 Comments
Load More Posts