Microsoft Reverses March to Irrelevance with LinkedIn Acquisition

Microsoft Reverses March to Irrelevance with LinkedIn Acquisition

Over the past several years, the impact of “the cloud” on traditional ISVs has been made abundantly clear. Blindsided by the runaway growth of hosted technologies which were simply glints in the eyes of the open source community in 2000, virtually all ISVs have scrambled to stay relevant. At this point, the move from on-premise software delivery to consumption of cloud-hosted options such as SaaS and PaaS appears to have stabilized. IT organizations have sorted out which types of solutions are best hosted off-premise and which to keep in house. And to be fair, enterprise-sized companies—the “bread and butter” of ISVs ...

Read More

Linux on Power—Poised for Greatness

Linux on Power—Poised for Greatness

For two decades, IBM’s Power Systems family of high-performance servers has been considered the premier alternative to x86-based systems. Combining fast processing, high availability, and rapid scalability, Power Systems are optimized to support big data and cloud architectures. Popularly deployed to run IBM’s AIX and IBM i operating systems, the platform has seen stiff competition in recent years from x86-based Linux systems. In 2013, IBM responded to this challenge by investing a billion dollars into the development of enhancements to the Power line that would support Linux operating systems and open source technologies. This bold move was hailed as a ...

Read More

The Desperate Need for Accuracy and Efficiency in Security for Detecting Network Intruders and Other Threat Actors Quickly

The Desperate Need for Accuracy and Efficiency in Security for Detecting Network Intruders and Other Threat Actors Quickly

According to 2015 research reports published by Ponemon, Mandiant, and others, median intruder dwell time in a target network prior to detection ranges from just under to just over 200 days. That is a little over six months and as everyone agrees, totally unacceptable. How is it that an intruder can get into a network and remain active for over six months before being discovered?  As a quick point of reference, it is important to note that these statistics include both external attackers and internal attackers. The latter are much more difficult to detect by normal/traditional means because they are supposed ...

Read More

posted by John Myers   | February 11, 2013 | 0 Comments
Edward de Bono, a noted expert on creative thinking, once said: The purpose of science is not to analyze or describe but to make useful models of the world. A model is useful if it allows us to get use out of it. Business Analytics is very similar to this concept of science, and specifically,...

Read More »



posted by Shawn Rogers   | February 8, 2013 | 0 Comments

magnifying-glass-300x190

I am a big fan of data discovery solutions. They enable a wider group of users to enjoy the benefits of business insights and break away from the platform driven traditional solutions that can be difficult to use, extremely expensive and limited to only a few users within an organization. At MicroStrategy World last week...

Read More »



posted by Scott Crawford   | January 29, 2013 | 0 Comments

data-explosion_300x190

In my last post, I noted that I expect intelligence and the coordination and integration of defense technologies to be key drivers of the IT security market in 2013.  This is not just about some major vendors who have acknowledged their need for a wake-up call on these fronts. These are larger trends that are...

Read More »



posted by John Myers   | January 28, 2013 | 0 Comments

Data_Management

When Aesop created the fable about the shepherd boy who cried wolf, the message was clear: “How liars are not rewarded: even if they tell the truth, no one believes them” If analysts like myself and others as well as the mainstream press (ie Forbes, Harvard Business Review, Economist ) continue to shout about Big Data...

Read More »



Binoculars-in-grass_300x190

I’ve happily managed largely to avoid getting entangled in the New Year’s ritual of security predictions, since these can, frankly, be fairly boring. But for those who expect such, here you go: Attackers will continue to succeed. Determined adversaries will become even more so. Moving one set of playing pieces does not alter the objectives...

Read More »



Juniper_Networks

Juniper’s SDN strategy is well thought out and is not dissimilar to Cisco’s approach in that they are looking to make their network equipment less rigid and more flexible and adaptable. Oh and I do look forward to hearing more about the plans for “centralizing the appropriate aspects of the management, services and control software...

Read More »



Data_Integration

“Back in the day”, Pablo Picaso once said: Give me a museum and I’ll fill it. Data Integration in 2013 seems to follow along similar lines – Give us a Platform and we will fill it with data. This is part two of a series of blog postings on important topics for the world of...

Read More »



posted by John Myers   | January 17, 2013 | 0 Comments

BI_DW_graphic

I have always loved the song “88 Lines about 44 Women” by the Nails.  And based on some recent success with a blogging topic relating to the songs of the 80s, I thought that I would continue that theme with “100 Lines about 25 Business Intelligence Topics”. Think of this list, or series of lists,...

Read More »



posted by Jim Frey   | January 9, 2013 | 0 Comments

network_management_300x190

For the third year in a row, I will resist the temptation to predict the future of network management, and instead will recommend key focus points that network engineering, management, and operations professionals should keep in mind looking ahead. Last year’s resolutions dealt with cloud, converged infrastructure, VDI, application awareness, and making the shift from...

Read More »



posted by Julie Craig   | January 7, 2013 | 0 Comments

HybridCloud

I believe that 2013 will be the year that hybrid Cloud application deployments go mainstream. This prediction is based on EMA IT-facing Integration research conducted in mid-2012, which found that: • 45% of companies surveyed had already deployed at least one “ hybrid Cloud” application, defined as “applications integrating to at least one public Cloud...

Read More »