2017 Resolution 5: Start small – get quick wins with plans for expansion

The best way to ensure analytics success is to make sure you take an iterative approach to development and design. Starting small and building up an analytics environment is the best way to make sure that you are getting requirements and applications right, without having to go back and redesign parts of your solution, wasting time and money. Organizations that get ahead of themselves and try to take on more than they can handle, end up getting overwhelmed and suffer from scope creep and potential project failure.  I’m sure you’ve heard this time and time again – it’s important to start ...

Read More

Artificial Intelligence and Machine Learning as the Guardians of Your Hybrid Data Center

Serverless computing, containers, IoT, DevOps, mobile workspaces and of course hybrid cloud are all technologies -and of course excellent buzzwords- with immediate impact on your organization’s security. Each one of these technologies increases the speed and agility of corporate IT, enabling your company to beat the competition. As enterprise IT complexity is exploding, this year’s RSA Conference attracted over 400 exhibitors and 45,000 attendees which makes it one of the largest IT events of the year, even bigger than the 2016 Amazon Re:Invent show. How Machine Learning and Artificial Intelligence Enhance Security Simply put, machine learning and artificial intelligence aim at enabling ...

Read More

The Four Horsemen of the Hybrid Cloud Apocalypse – Vision of the Business Defined Data Center

EMA estimates that enterprises today waste over 50% of their IT budgets on inefficient application workload placement, configuration and management. As a side effect, they introduce tremendous operational risk in terms of security, regulatory compliance, performance and reliability. EMA’s 2017 hybrid cloud, software-defined data center (SDDC) and machine learning-related research projects (take a look at our prospectus) aim at helping customers address this waste and risk by slaying the four horsemen of hybrid cloud (listed below). Keep in mind that you may need to slay each horsemen hundreds of times—once for each application you need to deploy and manage—before he remains ...

Read More


Innovation Explosion Sets the Stage for New Wave of “Hybrid” Applications


In the past, technology evolution was quantified as generational. So the first generation of computing was based on the vacuum tube, followed by the transistor, integrated circuits, and microprocessors. Even today, multi-generational software and hardware systems are very much alive in many modern data centers. The interesting thing about the generational approach is that it [...]



By | December 8th, 2014|IT Management, Julie Craig|0 Comments

Riverbed Tees Up for Hybrid Computing at 2014 FORCE User Conference


During the first week of November, Riverbed held its first combined OPNET and Riverbed user conference at the San Jose Convention Center. Held in tandem with the Riverbed industry analyst event, this conference was an opportunity for Riverbed to share with both customers and industry analysts the company’s vision for becoming the go-to vendor for [...]



By | December 2nd, 2014|IT Management, Network Management, Tracy Corbo|0 Comments

Cloud Security Alliance Hack-A-Thon and the Software Defined Perimeter


The Cloud Security Alliance (CSA) is a not-for-profit think tank of volunteers that spend their time trying to better the internet. These people are the antithesis of cybercriminals; they spend their energy trying to figure out ways to make our data safer. They create best practices for providing security assurance within cloud computing, or in [...]



By | November 7th, 2014|David Monahan, IT Management, Scott Crawford, Security|0 Comments

Damballa and Bit9 + Carbon Black Collaborate to Deliver Better Security with More Context


  In looking at the solutions available for threat protection (and detection), there are quite a few options out there. Some, like Damballa Failsafe, are network-based, vigilantly watching packets across the network and looking for indications of undesirable activities/behaviors and content.  Others are host-based, like Bit9 + Carbon Black, using an agent on the endpoint, [...]



By | October 28th, 2014|David Monahan, IT Management, Scott Crawford, Security|0 Comments

Citrix Stakes Software-Defined Ground; Network Remains Critical to Success


Last week, I attended a Citrix analyst relations summit program to learn about the company’s direction and strategy.  While the main-tent program was longer on vision than it was on execution details, there were some aspects of the proceedings that I found compelling. First off, there weren’t a lot of net new things being introduced, [...]



By | September 26th, 2014|IT Management, Jim Frey, Network Management|0 Comments

Simplify with Software Defined Storage


There was a time at the height of my home video and audio craze that the number of devices I needed to watch a movie could no longer be counted on one hand. Amplifier, preamplifier, tuner, CD player, DVD player, TV, cable box . . .you get the idea. As I organized my vast array [...]



By | August 28th, 2014|Jim Miller|0 Comments

Return on Investment (ROI) of Data Science as a Service


In skiing, the “black diamond” run or ski slope is often referred to as “high risk/high reward.” You receive lots of “reward” skiing the black diamond slopes, but you have a significant amount of “risk” associated with variable terrain, such as the presence of trees and the possibility of injury. However, the black diamond slopes [...]



By | August 18th, 2014|Business Intelligence, John Myers|0 Comments
Load More Posts