Understanding Network-as-a-Service from Alcatel-Lucent Enterprise

Today’s digital enterprises require IT infrastructure that is agile and dynamic. Popular digital technologies like mobility, the Internet of Things (IoT), and cloud applications can rapidly disrupt the status quo. The network must be responsive to change, with the ability to scale capacity, expand coverage, and implement new network technologies that support and enable the unique needs of disruptive digital services. Unfortunately, most enterprises take a static approach to building and operating networks. Network hardware requires expensive capital outlays, and enterprises usually sweat network assets for as long as possible, sometimes beyond a typical depreciation cycle. They overbuild capacity and hope ...

Read More

Businessman working and plan strategy of target on network connection investment with digital icon on laptop background, business concept

What is Advanced Network Analytics? Cutting Through the Hype

Everyone wants to talk about how analytics is the future of network engineering and operations. The phrase “network analytics” is used by vendors of various stripes to imply that a particular technology is smarter and better than the average solution. But what is it? What does the term network analytics mean to the enterprise network infrastructure professionals? Enterprise Management Associates (EMA) recently published survey-based research on this topic. We sought out individuals who were actively involved in so-called network analytics initiatives. To find these people, we presented random IT professionals with a broad definition of a network analytics initiative. The implementation of technologies ...

Read More

Cloud computing big data online storage and The Internet of things (IoT) network of physical devices, vehicles,

Solve the Cloud Networking Conundrum With SD-WAN

Enterprise networking professionals have a cloud problem, even if they don’t know it. Software-defined WAN (SD-WAN) solutions can help them solve this problem. Many network managers are unaware that their enterprises are consuming IaaS infrastructure and SaaS applications until someone comes to them with a cloud-related problem. In some cases, users can’t connect to the cloud and they want network operations to figure out why, a tall order for a networking team that didn’t even know the company was using such a cloud service. Or a line of business manager will come to the networking team with the unhappy news that ...

Read More


Turning to the Network to Solve Application Performance Issues


What’s your plan of action when faced with a thorny application performance issue?  Where do you turn?  Does everyone jump to the conclusion that it must be the network?  Or do you get the team together and have everyone say, “It’s not me?” These are typical approaches, and in the end, it sometimes becomes a [...]



By | June 9th, 2014|IT Management, Jim Frey, Network Management|0 Comments

Advanced Operational Analytics (AOA) – Transformative Use Cases from EMA Research


Steve Smythe discusses how IT Operations is transformed by big data solutions in his latest blog, “Transformation of IT operations with big data solutions.” Is this a reality? The answer—agreed upon here—is almost certainly “yes.” However, it should be pointed out that “big data,” or “IT Operations Analytics,” or as EMA calls it, “Advanced Operational [...]



Postgres-XL Enters the Big Data Backstretch


PostgreSQL (“Postgres”) ranks as the 4th most popular database according to DB-Engines, and excels as a candidate for most OLTP apps and as a hub for data federation.  Its weakness in Massively Parallel Processing (MPP), however, often keeps it out of the running for advanced analytics and high-end OLTP use cases. The MPP limitation [...]



By | May 27th, 2014|Evan Quinn|0 Comments

Riverbed Steels for Battle


When a pure play vendor knocks it out of the park and effectively becomes the defacto gold standard, to which all other products are compared, the product brand develops a strong identity in the market. Riverbed took the WAN Optimization market by storm, leading the charge with its Steelhead product line.  The Steelhead line established [...]



By | May 19th, 2014|IT Management, Network Management, Tracy Corbo|0 Comments

Integrated ITSM—the Service Desk + Operations + Analytics


It’s fascinating how the meaning for just about every term relevant to service management can be a matter of debate—including IT Service Management itself (a discussion for another time).  However, what’s sparking this blog centers around the three other terms in the headline—“service desk,” “Operations” and “Analytics,” plus a fourth—“cognitive computing.” In reading Brian Jeffrey’s [...]



Truly Understanding Your Customers with NGDATA’s Lily 3.0


NGDATA, a small but rapidly growing applied big data analytics solution vendor, just released the latest version, Lily 3.0, of its big data personalization platform on May 13, 2014.  Before delving into NGDATA’s unique and effective approach for advancing a company’s understanding of its customers through more accurate and in depth customer intelligence, and before considering [...]



By | May 14th, 2014|Evan Quinn|0 Comments

Informatica Reflects the Expanding Integration Imperative


In late April, 2014, Informatica (INFA – NASDAQ) boasted another sterling quarter from a financial perspective for Q1-FY14, with revenues up 13%, and deferred revenues up 14%.  What makes INFA’s Q1-FY14 results particularly impressive is that Q1-FY13 was an important comeback quarter for INFA, thus Q1-FY14’s 13% growth rate was over a strong baseline.  INFA’s [...]



By | May 1st, 2014|Evan Quinn|0 Comments

Dell SecureWorks and Risk I/O team up to deliver a better kind of Vulnerability Management


On April 23rd, 2014 Dell announced its new Vulnerability Threat Monitoring and Prioritization service delivered through the SecureWorks Counter Threat Platform.  This managed service was created to expand the current Vulnerability Management offerings and increase customer value by creating the ability for customers to integrate their own vulnerability management systems.  With the additional context provided [...]



By | April 29th, 2014|David Monahan, IT Management, Scott Crawford, Security|0 Comments

Gaining Data Control with BYOD and Bluebox


What’s the issue with BYOD? Data Control… What’s the issue with Data Sharing? Data Control! Let’s face it, though it took an evolution of about 15 years, industry figured out that Data Management and Control are the underlying security issues.  Data is power, knowledge, money, control.  If you have it you’re in control.  If you [...]



By | April 22nd, 2014|David Monahan, IT Management, Scott Crawford, Security|0 Comments

SAP Aims to Help Its Customers Engage Their Customers Engagingly


Despite the SMAC (social, mobile, analytics, cloud) trends being in plain sight for the past half decade, and SaaS Customer Relationship Management (CRM) apps being available for well over a decade, the business value proposition of SaaS CRM apps has only just recently made progress.  First generation SaaS CRM apps enabled small and medium businesses [...]



By | April 8th, 2014|Evan Quinn|0 Comments
Load More Posts