PFP CyberSecurity Breaks on to the Scene to Identify Malware at the Chip Level.

PFP CyberSecurity Breaks on to the Scene to Identify Malware at the Chip Level.

A few weeks ago, I briefed with a new company called PFP Cybersecurity, also known as Power Fingerprinting, Inc., and was so intrigued by the concept alone that I wrote a Vendor to Watch about them. They officially launched on January 26, , and currently their claim to fame is their physics-based scanning technology which monitors the electromagnetic frequency (EMF) emanations of a microchip while operating. It then compares those readings to either a previous reading or to an established manufacturer’s baseline to determine the state of the chip. There are numerous uses for the technology from supply chain chip ...

Read More

Redefining WAN in Light of Cloud

Redefining WAN in Light of Cloud

Thanks in large part to investor-driven demand for constant double-digit growth, the WAN optimization market has taken a substantial beating, and as a result the term “WAN optimization” has become something of a lament. Vendors looking to distance themselves from the term have latched onto the “software-defined” bandwagon, and the result is “SDN WAN” or “SD WAN.” However, the need for WAN optimization is not going away; in fact, it is only going to increase because the WAN is a critical component of cloud-based deployment models. Cloud is not a magic fix for all that ails IT. The laws of ...

Read More

Top 5 Trends in 2015 for Unifying PC and Mobile Management

Top 5 Trends in 2015 for Unifying PC and Mobile Management

Have you ever tried to create a major slide presentation on a tablet? Or edit a large spreadsheet? Or write a long document? Probably not. While it’s certainly possible to perform more substantial business tasks on a tablet, the small screen real estate and limited system resources (e.g., processing speed, memory, graphic support, etc.) are typically insufficient in current tablet form factors. However, carrying a laptop around with you everywhere you go just so you can access email is not very practical either. The reality is that we live in a multi-device world where the average worker employs 3 – ...

Read More

Legal-Tech-New-York-2012-287x300

My introduction to LegalTech New York 2012 (LTNY) began not with last Monday morning’s keynote session but with a chance meeting, over the paper recycling bin, with a recently hired CIO of a mid-size national law firm who, like me, was unburdening himself of extraneous event announcements and other unwanted sheaves of written materials prior...

Read More »



posted by Tracy Corbo   | February 7, 2012 | 0 Comments
On September 6, Nicira, a startup network virtualization company, unveiled its Network Virtualization Platform (NVP). NVP is a software-based system that creates a distributed virtual network infrastructure in cloud data centers that is completely decoupled and independent from physical network hardware. Nicira has announced that well known entities such as AT&T, eBay, Fidelity Investments, NTT...

Read More »



posted by Shawn Rogers   | February 6, 2012 | 0 Comments

Virtual_Data

As we move into 2012 analytics and business intelligence continue to be top of mind for C-level executives. Discovering new ways to leverage our existing systems coupled with the need to access new and dynamic data sources has exposed a lack of flexibility in traditional data management infrastructures. This lack of agility curtails innovation and...

Read More »



Another report of a breach at a technology vendor much of the industry depends upon for security and trust; this time, Verisign. The most immediate concern about this incident was that the attacks in question occurred in 2010, and were not widely known until Reuters discovered the disclosure in the company’s reporting as required to...

Read More »



posted by Scott Crawford   | February 2, 2012 | 0 Comments

NoSharkJumping

There’s no question that the intersections of Big Data and security have grabbed a lot of attention in the year-plus since I’ve been blogging on this topic. Indeed, it seems that Big Data will be one of the major focus areas at the RSA Conference a month hence: I count at least three sessions and...

Read More »



posted by    | February 2, 2012 | 0 Comments

ManClipboard-cropped

So, I’ve implemented a couple CMDBs. One even before I’d heard of ITIL. We called it a metadata repository, but it was essentially a CMDB. Making the business case for such systems is never easy. ITIL and the various CMDB authors provide a number of what I call “motherhood and apple pie” justifications: Reduce downtime...

Read More »



posted by Tracy Corbo   | February 2, 2012 | 0 Comments
There is no question WAN optimization technology was a game changer. It took away a major pain point for the most popular and common protocols that suffered noticeable performance degradation over WAN connections. While the technology has been very successful in optimizing specific traffic types, there are others that have remained underserved, most notable are...

Read More »



posted by    | January 31, 2012 | 0 Comments
I’ve been reading Mastering the Unpredictable: How Adaptive Case Management will Revolutionize the Way That Knowledge Workers Get Things Done. This interesting book brings several current topics together, including complexity theory, business process management (BPM), and the evolving practices around knowledge work. Adaptive Case Management (ACM) argues that in knowledge work, processes need to be...

Read More »



iStock_000018680764XSmaller

At the beginning of this month, EMA analysts were asked for their predictions about what 2012 might bring. Responses spanned management solutions across applications, systems, network, security, services, assets, desktops, and mobile devices, as well as business intelligence and content management. The results were surprisingly cohesive, and as a whole reflected core requirements in analytics,...

Read More »



posted by    | January 26, 2012 | 0 Comments

iStock_000016822421XSmall-300x199

Managing IT data is maddening. IT organizations are hamstrung right and left by lack of complete and high quality information, yet approaches to resolve this have been only partially successful – at best! One approach that has had less attention is the idea of a data warehouse for IT data. As big data and analytics get...

Read More »



Page 19 of 36« First...10«1718192021»30...Last »