Citrix Stakes Software-Defined Ground; Network Remains Critical to Success

Citrix Stakes Software-Defined Ground; Network Remains Critical to Success

Last week, I attended a Citrix analyst relations summit program to learn about the company’s direction and strategy.  While the main-tent program was longer on vision than it was on execution details, there were some aspects of the proceedings that I found compelling. First off, there weren’t a lot of net new things being introduced, other than some roadmaps shared under NDA and a truly cool multi-station mobile work experience demo. But that’s ok.  Too often, tech companies feel compelled to forever be pushing “something new,” when in reality IT pros need vendors to stick to existing story lines, execute, and ...

Read More

Simplify with Software Defined Storage

Simplify with Software Defined Storage

There was a time at the height of my home video and audio craze that the number of devices I needed to watch a movie could no longer be counted on one hand. Amplifier, preamplifier, tuner, CD player, DVD player, TV, cable box . . .you get the idea. As I organized my vast array of remote controls on the coffee table, I was blissfully unaware of any issues. That was the case until my wife just wanted to watch a movie one night while I was gone, and she had a conniption fit trying to figure everything out. There ...

Read More

Return on Investment (ROI) of Data Science as a Service

Return on Investment (ROI) of Data Science as a Service

In skiing, the “black diamond” run or ski slope is often referred to as “high risk/high reward.” You receive lots of “reward” skiing the black diamond slopes, but you have a significant amount of “risk” associated with variable terrain, such as the presence of trees and the possibility of injury. However, the black diamond slopes are very fun to experience, and you can mitigate the risks with preparation, practice, and a really good skiing helmet. Data science is one of those “high risk/high reward” concepts in technology. An organization can gain huge financial rewards by being able to create competitive advantage ...

Read More

posted by Dennis Drogseth   | February 9, 2012 | 0 Comments
On the one hand, many in the industry have begun todismiss the CMDB as well past its prime, at least in terms of industry hype and attention. For this rather significant population, the CMDB has evolved into a complex and demanding data store with tangible but difficult-to-justify benefits, with questionable relationships to cloud computing and...

Read More »



posted by Torsten Volk   | February 8, 2012 | 0 Comments

iStock_000015096562XSmall-300x261

Why pay $1,500 per virtual desktop, if you can have a physical machine of the same performance-level at half the cost. While the functional and maintenance advantages of virtual desktop computing are evident, the per machine CAPEX often is the key stumbling block for this type of project. It is very hard to convince your...

Read More »



Legal-Tech-New-York-2012-287x300

My introduction to LegalTech New York 2012 (LTNY) began not with last Monday morning’s keynote session but with a chance meeting, over the paper recycling bin, with a recently hired CIO of a mid-size national law firm who, like me, was unburdening himself of extraneous event announcements and other unwanted sheaves of written materials prior...

Read More »



posted by Tracy Corbo   | February 7, 2012 | 0 Comments
On September 6, Nicira, a startup network virtualization company, unveiled its Network Virtualization Platform (NVP). NVP is a software-based system that creates a distributed virtual network infrastructure in cloud data centers that is completely decoupled and independent from physical network hardware. Nicira has announced that well known entities such as AT&T, eBay, Fidelity Investments, NTT...

Read More »



posted by Shawn Rogers   | February 6, 2012 | 0 Comments

Virtual_Data

As we move into 2012 analytics and business intelligence continue to be top of mind for C-level executives. Discovering new ways to leverage our existing systems coupled with the need to access new and dynamic data sources has exposed a lack of flexibility in traditional data management infrastructures. This lack of agility curtails innovation and...

Read More »



Another report of a breach at a technology vendor much of the industry depends upon for security and trust; this time, Verisign. The most immediate concern about this incident was that the attacks in question occurred in 2010, and were not widely known until Reuters discovered the disclosure in the company’s reporting as required to...

Read More »



posted by Scott Crawford   | February 2, 2012 | 0 Comments

NoSharkJumping

There’s no question that the intersections of Big Data and security have grabbed a lot of attention in the year-plus since I’ve been blogging on this topic. Indeed, it seems that Big Data will be one of the major focus areas at the RSA Conference a month hence: I count at least three sessions and...

Read More »



posted by    | February 2, 2012 | 0 Comments

ManClipboard-cropped

So, I’ve implemented a couple CMDBs. One even before I’d heard of ITIL. We called it a metadata repository, but it was essentially a CMDB. Making the business case for such systems is never easy. ITIL and the various CMDB authors provide a number of what I call “motherhood and apple pie” justifications: Reduce downtime...

Read More »



posted by Tracy Corbo   | February 2, 2012 | 0 Comments
There is no question WAN optimization technology was a game changer. It took away a major pain point for the most popular and common protocols that suffered noticeable performance degradation over WAN connections. While the technology has been very successful in optimizing specific traffic types, there are others that have remained underserved, most notable are...

Read More »



posted by    | January 31, 2012 | 0 Comments
I’ve been reading Mastering the Unpredictable: How Adaptive Case Management will Revolutionize the Way That Knowledge Workers Get Things Done. This interesting book brings several current topics together, including complexity theory, business process management (BPM), and the evolving practices around knowledge work. Adaptive Case Management (ACM) argues that in knowledge work, processes need to be...

Read More »



Page 17 of 34« First...10«1516171819»2030...Last »