Rewarding Impatience with User Self-Service

Rewarding Impatience with User Self-Service

There seems to be a direct correlation between how successful business professionals are and their level of impatience. While I am not familiar with any studies on this particular subject, it is simple logic that the most productive employees are those who most frequently demand rapid response to service requests. From my past experience managing and providing IT administrative support, I can attest that these individuals are usually the most irritating—constantly requesting access to new applications, data, and other business resources with expectations of an immediate response. Begrudgingly, I must acknowledge that these are the folks who are also most ...

Read More

Business Process Management in the Real World — Why It’s Important to Govern Both Automated and Manual Processes

Business Process Management in the Real World — Why It’s Important to Govern Both Automated and Manual Processes

In a perfect world, all business processes would be automated and all work tasks would be accomplished with the click of a button. This idyllic work experience seems to be the realization of Plato’s utopia…or, if you prefer, the world of the Jetsons. Regrettably, however, we clearly do not live in a perfect world. Put simply, while any repeatable process can be automated, not every process is repeatable, so automation is not a practical solution in all cases. This is particularly a problem for enterprises since business productivity is almost entirely dependent on the rapid and accurate performance of business ...

Read More

Vectra Provides Pervasive Visibility & Analysis to Detect Cyber Attacks

Vectra Provides Pervasive Visibility & Analysis to Detect Cyber Attacks

Though cyber attacks have been around for years, in 2014 there was an explosion in the volume of attacks and a marked increase in the losses and damages they inflicted. In 2015, this does not seem to be lightening up. In February, Anthem health care insurers were compromised, putting 80 million current and former customers and employees at risk, followed in March by Primera Blue Cross, which added another 11 million records of the same. The full extent of these breaches may not be determined for months to over a year. Along with cyber attacks, cyber-hack insurance policy issuance is also climbing. ...

Read More

posted by    | February 24, 2012 | 0 Comments
“Too many tools!” That’s how IT managers feel. The systems needed just to run IT can cost millions to acquire and operate. Yet without appropriate tools, how can you run a service desk, IT operations center, or a project management office? Undoubtedly, it’s critical that your IT management tools approach be well thought out. You...

Read More »



RSA2012-US-logo

One of the major themes that will stand out at RSA next week revolves around the trend I’ve been following closely over the last several months: the evolution of security centered on a data-driven approach.  There will be many opportunities for you to learn and benefit from this trend that is having an impact on...

Read More »



posted by John Myers   | February 22, 2012 | 0 Comments

INFAFeatureGraphic-300x189

Informatica Goal: Maximize Return on Data The theme of last week’s Informatica Analyst Conference was utilizing the “secular megatrends” of information technology to energize data integration across organizations at an enterprise scale.  These megatrends, described as trends we can all agree upon, are the following: Cloud Computing Social Media Mobile Big Data Informatica’s message is...

Read More »



Healthcare-Data-Quality-300x185 - edited 2

A combination of escalating healthcare costs and the desire to improve healthcare quality is driving both healthcare providers and payers to seek more innovative remedies to attack the problem.  Meanwhile, technological advances in natural language processing (NLP) and predictive analytics now offer relief to caregivers and administrators who have enormous amounts of potentially lifesaving patient...

Read More »



posted by Scott Crawford   | February 14, 2012 | 0 Comments
Happy Valentine’s Day, etc.  But enough chitchat. Herewith a short compendium of some of the articles and blogs about data-driven security I’ve been mentioning or have otherwise referenced recently – thought it would be worthwhile to pull these together into a single post. I’ll add to this list in future updates. We’ll begin with the...

Read More »



See Torsten’s guest blog at Parallels. Torsten will be attending Parallels Summit 2012 (February 14th-16th) in Orlando,...

Read More »



posted by John Myers   | February 9, 2012 | 0 Comments

noSQLFeatureGraphic2-300x154

If you look at the history of Big Data requirements (volume, velocity and variety), and the NoSQL platforms supporting those requirements, you see a history of organizations and development teams breaking the mold of traditional information technology (IT) programs. Instead of following the traditional IT methodologies to solve the Big Data issues, these teams pushed...

Read More »



posted by    | February 9, 2012 | 0 Comments

crystal_ball2-217x300

Here is my yearly prediction column, a bit delayed. Topic of the day is next generation IT management. (Not next generation IT; plenty of folks are covering that!) The tools market for IT service management is glutted. My friend Jan van Bon has been curating a list.ly list of “ITIL tools” that is now up...

Read More »



posted by Dennis Drogseth   | February 9, 2012 | 0 Comments
On the one hand, many in the industry have begun todismiss the CMDB as well past its prime, at least in terms of industry hype and attention. For this rather significant population, the CMDB has evolved into a complex and demanding data store with tangible but difficult-to-justify benefits, with questionable relationships to cloud computing and...

Read More »



posted by Torsten Volk   | February 8, 2012 | 0 Comments

iStock_000015096562XSmall-300x261

Why pay $1,500 per virtual desktop, if you can have a physical machine of the same performance-level at half the cost. While the functional and maintenance advantages of virtual desktop computing are evident, the per machine CAPEX often is the key stumbling block for this type of project. It is very hard to convince your...

Read More »



Page 19 of 37« First...10«1718192021»30...Last »