Microsoft Reverses March to Irrelevance with LinkedIn Acquisition

Microsoft Reverses March to Irrelevance with LinkedIn Acquisition

Over the past several years, the impact of “the cloud” on traditional ISVs has been made abundantly clear. Blindsided by the runaway growth of hosted technologies which were simply glints in the eyes of the open source community in 2000, virtually all ISVs have scrambled to stay relevant. At this point, the move from on-premise software delivery to consumption of cloud-hosted options such as SaaS and PaaS appears to have stabilized. IT organizations have sorted out which types of solutions are best hosted off-premise and which to keep in house. And to be fair, enterprise-sized companies—the “bread and butter” of ISVs ...

Read More

Linux on Power—Poised for Greatness

Linux on Power—Poised for Greatness

For two decades, IBM’s Power Systems family of high-performance servers has been considered the premier alternative to x86-based systems. Combining fast processing, high availability, and rapid scalability, Power Systems are optimized to support big data and cloud architectures. Popularly deployed to run IBM’s AIX and IBM i operating systems, the platform has seen stiff competition in recent years from x86-based Linux systems. In 2013, IBM responded to this challenge by investing a billion dollars into the development of enhancements to the Power line that would support Linux operating systems and open source technologies. This bold move was hailed as a ...

Read More

The Desperate Need for Accuracy and Efficiency in Security for Detecting Network Intruders and Other Threat Actors Quickly

The Desperate Need for Accuracy and Efficiency in Security for Detecting Network Intruders and Other Threat Actors Quickly

According to 2015 research reports published by Ponemon, Mandiant, and others, median intruder dwell time in a target network prior to detection ranges from just under to just over 200 days. That is a little over six months and as everyone agrees, totally unacceptable. How is it that an intruder can get into a network and remain active for over six months before being discovered?  As a quick point of reference, it is important to note that these statistics include both external attackers and internal attackers. The latter are much more difficult to detect by normal/traditional means because they are supposed ...

Read More

posted by Tracy Corbo   | October 22, 2012 | 0 Comments

Citrix-Cisco

In Barcelona, Spain at the Citrix Synergy conference, Cisco and Citrix announced an expansion of their current partnership, built around desktop virtualization, into three new areas including:  cloud networking, cloud orchestration, and mobile workstyles. The expanded partnership will include a significant investment in people and resources to develop the technology, provide integration, and validation of...

Read More »



posted by Jim Frey   | October 11, 2012 | 0 Comments

Network_threads

(Author’s note:  Thanks to Tracy Corbo for contributions to this post!) I’ve just returned from Interop in New York, and it seemed like every other sentence spoken there include “SDN.” The networking community is abuzz with talk about Software Defined Networks (SDN), but what does this really mean, in terms of what we should expect...

Read More »



Dialogue_Illustration_300x190

After talking about the “grand vision” of the Software Defined Datacenter (SDD) in part 1 of this series and discussing the individual components required to build out the SDD in part 2, this third part will be all about the three core challenges and controversies: Blades vs. Pizza Boxes The miniaturized design of blade servers,...

Read More »



Veggies_300x190

In part 1 of this series of four posts, we examined the grand vision of the software-defined datacenter (SDD). In this second post of the series, we will take a look at the core components of the SDD (see Figure 1) and provide a brief evaluation of how mature these components currently are. Figure 1...

Read More »



posted by Torsten Volk   | August 16, 2012 | 0 Comments

Fish_eating_fish_300x190

The ultimate goal of the Software-Defined Datacenter (SDD), a term coined only a few months ago by VMware’s Steve Herrod, is to centrally control all aspects of the data center – compute, networking, storage – through hardware-independent management and virtualization software. This software will also provide the advanced features that currently constitute the main differentiators...

Read More »



data-explosion_300x190

For the last several months, I’ve been heads-down on a research project that culminates over a year of investigation into the rise of what I have been calling “data-driven security”: security efforts informed and defined by their reliance on insight – and increasingly enabled by emerging technologies for large-scale data management, as well as by...

Read More »



posted by Torsten Volk   | August 1, 2012 | 0 Comments

Fake-Elvis_300x190

When I picked “The Journey to the Cloud” as the working title for one of my fall research projects, I triggered some immediate reactions from colleagues and customers, whose opinions I value. And while I typically do not place too much importance on selecting a working title and also did not intend to just warm...

Read More »



cloud_sunset_300x190

Looking back over this year’s blog posts reminds me that I’ve been heavy on Cloud – and Integration-related topics. And a review of my recent “Cloud Integration” survey has convinced me that I’m not finished yet.  As a matter of fact, from an Application Management perspective, the conversation is just beginning. Four of today’s hottest...

Read More »



posted by Torsten Volk   | July 18, 2012 | 0 Comments

Lab_300x190

Cloud is still a rapidly evolving discipline, with currently many organizations thinking about how to get started or how to take their limited cloud environment to the next level. These organizations are faced with two general challenges. They have to a) get their own house – data center – in order and b) identify a...

Read More »



posted by Torsten Volk   | June 14, 2012 | 0 Comments

Mainframe Computer

During this year’s research for the 2012 EMA Workload Automation (WLA) Radar Report, we encountered a number of very interesting core findings. These research results mostly originated from dozens of conversations with end customers, who have been using WLA software for many years and sometimes even for decades. WLA, by definition, is a mature discipline,...

Read More »



Page 19 of 41« First...10«1718192021»3040...Last »