Thoughts on Splunk .conf 2014

Thoughts on Splunk .conf 2014

This week, Las Vegas hosted some 3500 people at the MGM Grand to mark Splunk .conf14, the annual user gathering for Splunk customers, referred to as “Splunkers”. For those of you not in the tech industry, spelunking, or the act of exploring caves, may come to mind. The theme of the conference was not cave exploration, but data exploration; however, the analogy of cave exploration actually aligns very well. “Splunkers” are diving into their data, delving deep into places that many have never explored before. Each of them finding new and cool ways to use the data that they have ...

Read More

Network Management: Still a ‘Must-Have’ for Enterprise IT

Network Management: Still a ‘Must-Have’ for Enterprise IT

It’s sometimes difficult to differentiate between hype and reality when it comes to topics such as cloud, ITaaS, SDN, DevOps, hybrid this and hybrid that. But there are a few certainties in the IT universe and one of them is that IT doesn’t function if all of the pieces can’t talk to one another, and that means the network needs to be rock solid. Some of that is under the control of enterprise IT teams as internal network infrastructure, but some of it isn’t, such as WAN or Internet. Because connectivity is so essential, no one questions the need for ...

Read More

Citrix Stakes Software-Defined Ground; Network Remains Critical to Success

Citrix Stakes Software-Defined Ground; Network Remains Critical to Success

Last week, I attended a Citrix analyst relations summit program to learn about the company’s direction and strategy.  While the main-tent program was longer on vision than it was on execution details, there were some aspects of the proceedings that I found compelling. First off, there weren’t a lot of net new things being introduced, other than some roadmaps shared under NDA and a truly cool multi-station mobile work experience demo. But that’s ok.  Too often, tech companies feel compelled to forever be pushing “something new,” when in reality IT pros need vendors to stick to existing story lines, execute, and ...

Read More

posted by John Myers   | February 9, 2012 | 0 Comments

noSQLFeatureGraphic2-300x154

If you look at the history of Big Data requirements (volume, velocity and variety), and the NoSQL platforms supporting those requirements, you see a history of organizations and development teams breaking the mold of traditional information technology (IT) programs. Instead of following the traditional IT methodologies to solve the Big Data issues, these teams pushed...

Read More »



posted by    | February 9, 2012 | 0 Comments

crystal_ball2-217x300

Here is my yearly prediction column, a bit delayed. Topic of the day is next generation IT management. (Not next generation IT; plenty of folks are covering that!) The tools market for IT service management is glutted. My friend Jan van Bon has been curating a list.ly list of “ITIL tools” that is now up...

Read More »



posted by Dennis Drogseth   | February 9, 2012 | 0 Comments
On the one hand, many in the industry have begun todismiss the CMDB as well past its prime, at least in terms of industry hype and attention. For this rather significant population, the CMDB has evolved into a complex and demanding data store with tangible but difficult-to-justify benefits, with questionable relationships to cloud computing and...

Read More »



posted by Torsten Volk   | February 8, 2012 | 0 Comments

iStock_000015096562XSmall-300x261

Why pay $1,500 per virtual desktop, if you can have a physical machine of the same performance-level at half the cost. While the functional and maintenance advantages of virtual desktop computing are evident, the per machine CAPEX often is the key stumbling block for this type of project. It is very hard to convince your...

Read More »



Legal-Tech-New-York-2012-287x300

My introduction to LegalTech New York 2012 (LTNY) began not with last Monday morning’s keynote session but with a chance meeting, over the paper recycling bin, with a recently hired CIO of a mid-size national law firm who, like me, was unburdening himself of extraneous event announcements and other unwanted sheaves of written materials prior...

Read More »



posted by Tracy Corbo   | February 7, 2012 | 0 Comments
On September 6, Nicira, a startup network virtualization company, unveiled its Network Virtualization Platform (NVP). NVP is a software-based system that creates a distributed virtual network infrastructure in cloud data centers that is completely decoupled and independent from physical network hardware. Nicira has announced that well known entities such as AT&T, eBay, Fidelity Investments, NTT...

Read More »



posted by Shawn Rogers   | February 6, 2012 | 0 Comments

Virtual_Data

As we move into 2012 analytics and business intelligence continue to be top of mind for C-level executives. Discovering new ways to leverage our existing systems coupled with the need to access new and dynamic data sources has exposed a lack of flexibility in traditional data management infrastructures. This lack of agility curtails innovation and...

Read More »



Another report of a breach at a technology vendor much of the industry depends upon for security and trust; this time, Verisign. The most immediate concern about this incident was that the attacks in question occurred in 2010, and were not widely known until Reuters discovered the disclosure in the company’s reporting as required to...

Read More »



posted by Scott Crawford   | February 2, 2012 | 0 Comments

NoSharkJumping

There’s no question that the intersections of Big Data and security have grabbed a lot of attention in the year-plus since I’ve been blogging on this topic. Indeed, it seems that Big Data will be one of the major focus areas at the RSA Conference a month hence: I count at least three sessions and...

Read More »



posted by    | February 2, 2012 | 0 Comments

ManClipboard-cropped

So, I’ve implemented a couple CMDBs. One even before I’d heard of ITIL. We called it a metadata repository, but it was essentially a CMDB. Making the business case for such systems is never easy. ITIL and the various CMDB authors provide a number of what I call “motherhood and apple pie” justifications: Reduce downtime...

Read More »



Page 17 of 35« First...10«1516171819»2030...Last »