Business Process Management in the Real World — Why It’s Important to Govern Both Automated and Manual Processes

Business Process Management in the Real World — Why It’s Important to Govern Both Automated and Manual Processes

In a perfect world, all business processes would be automated and all work tasks would be accomplished with the click of a button. This idyllic work experience seems to be the realization of Plato’s utopia…or, if you prefer, the world of the Jetsons. Regrettably, however, we clearly do not live in a perfect world. Put simply, while any repeatable process can be automated, not every process is repeatable, so automation is not a practical solution in all cases. This is particularly a problem for enterprises since business productivity is almost entirely dependent on the rapid and accurate performance of business ...

Read More

Vectra Provides Pervasive Visibility & Analysis to Detect Cyber Attacks

Vectra Provides Pervasive Visibility & Analysis to Detect Cyber Attacks

Though cyber attacks have been around for years, in 2014 there was an explosion in the volume of attacks and a marked increase in the losses and damages they inflicted. In 2015, this does not seem to be lightening up. In February, Anthem health care insurers were compromised, putting 80 million current and former customers and employees at risk, followed in March by Primera Blue Cross, which added another 11 million records of the same. The full extent of these breaches may not be determined for months to over a year. Along with cyber attacks, cyber-hack insurance policy issuance is also climbing. ...

Read More

Avoiding Enterprise Mobile Management: A Futile Exercise in Procrastination

Avoiding Enterprise Mobile Management: A Futile Exercise in Procrastination

IT operations managers are cringing all around the world – desperately trying to avoid those inevitable words from their executive management: “You need to support enterprise mobility.” Their concerns are understandable. After all, IT administrators are already overtaxed with supporting desktop, server, application, and infrastructure management requirements. Asking them to layer a whole new management discipline on top of that can be a daunting prospect. IT managers who find themselves in this predicament often recognize it as an opportunity to practice the fine art of procrastination. Particularly skilled procrastinators will employ one or more of the following excuses: We don’t have ...

Read More

posted by Tracy Corbo   | November 30, 2012 | 0 Comments

continental-divide

Well I have spent days slogging through what I can find about SDN and the role management will play as we plan out our research calendar for the coming year.  On the topic of management there is nothing.  Management as always is going to be an after thought, period. There is still a huge gap...

Read More »



puffy-clouds

In part 1 of this blog, I provided a broad outline of my Hybrid Cloud Integration Radar research paper, recently completed. I detailed the reasons why EMA chose to undertake this research and listed the vendors/products included in the study. With this entry, I’m following up with additional details regarding the key premises of the...

Read More »



Over the past year, I have extensively researched hybrid Cloud applications and related enterprise management technologies. In late 2011, I published research on Application Performance management for hybrid Cloud. In July, 2012, I published the results of a survey of IT integration experts who identified the types of integrations used at their companies and the...

Read More »



Citrix

It’s been a long time since I have had time to actually sit down and write a blog entry.  Between travel, projects, and my “Hybrid Cloud Integration Technologies” Radar Report, I’ve been running full speed to keep on top of things. I have been intending, however, to write a few lines inspired by a recent...

Read More »



silvertail_logo

This morning, EMC’s RSA Security Division announced its intent to acquire Silver Tail Systems. The press release is here. I’ve written about Silver Tail before, going back to one of my first posts on the rise of data-driven security. In a five-part blog series introduced by that post, I described how data-driven security is evolving...

Read More »



Circles

This week, I’m at a big vendor’s big conference – a conference which, on the surface, may not appear to be primarily about security: IBM’s Information on Demand event in Las Vegas. “But you’re a security analyst.  Why are you going to IOD?” you ask. (And if you didn’t, let me explain:) With over 12,000...

Read More »



posted by Tracy Corbo   | October 22, 2012 | 0 Comments

Citrix-Cisco

In Barcelona, Spain at the Citrix Synergy conference, Cisco and Citrix announced an expansion of their current partnership, built around desktop virtualization, into three new areas including:  cloud networking, cloud orchestration, and mobile workstyles. The expanded partnership will include a significant investment in people and resources to develop the technology, provide integration, and validation of...

Read More »



posted by Jim Frey   | October 11, 2012 | 0 Comments

Network_threads

(Author’s note:  Thanks to Tracy Corbo for contributions to this post!) I’ve just returned from Interop in New York, and it seemed like every other sentence spoken there include “SDN.” The networking community is abuzz with talk about Software Defined Networks (SDN), but what does this really mean, in terms of what we should expect...

Read More »



Dialogue_Illustration_300x190

After talking about the “grand vision” of the Software Defined Datacenter (SDD) in part 1 of this series and discussing the individual components required to build out the SDD in part 2, this third part will be all about the three core challenges and controversies: Blades vs. Pizza Boxes The miniaturized design of blade servers,...

Read More »



Veggies_300x190

In part 1 of this series of four posts, we examined the grand vision of the software-defined datacenter (SDD). In this second post of the series, we will take a look at the core components of the SDD (see Figure 1) and provide a brief evaluation of how mature these components currently are. Figure 1...

Read More »



Page 14 of 37« First...10«1213141516»2030...Last »