ADS BY GOOGLE

David Rubinstein's post "Industry Watch: Be resilient as you PaaS" makes a very good point about underutilized hardware in IT data-centers. Millions of enterprise workloads remain in data centers, where servers are 30% to 40% underutilized, and that's if they're virtualized. If not, t...
There are two pieces of good news to come out of Heartbleed. First, we haven’t heard of any significant security breaches, which mean that the industry as a whole is getting better at fixing problems as they arise. The second is that, because Heartbleed presented every single cloud pr...
Virtualization obscures the lines with storage and it becomes intractably complex to manage the macro-level supply and demand of resources occurring across the stack. Traditional management tools – storage- and virtualization-related – are running into the limitations of their stats-ba...
In the five years since I co-founded Bonitasoft with Miguel Valdes Faura and Rodrigue Le Gall, our organization has come a long way. We started with seven developers. We now have 17 dedicated full time to Bonita BPM – along with a systems architect, a QA team, a documentation team, a...
Arlington Computer Products improved their financial processes and operations using the new AribaPay cloud-based B2B payment service. Agile business services are entering into a new era, an integrated and on-demand approach to ordering, billing, and settlement processes between buyers...
The words location based services (LBS) immediately brings to mind mobile marketing apps and other location based sales and marketing services based upon GPS coordinates. If we have an enterprise IT perspective we may think of fleet management, asset management and equipment tracking....
A look into ITIL's Continual Service Improvement (CSI) model and the Application Performance Management (APM) framework indicates they are both focused on improvement. If you’re thinking about how to build a sustainable APM solution and how it can be anchored into the IT culture, cons...
Companies are quickly finding new and innovative ways to recognize value by integrating real time mapping applications into their business processes. Real-time mapping is the GIS process of tracking changes on the earth’s surface and displaying that information on a computer screen. Th...
So what does real-time mean anyway? An example is, what are referred to as, “hard-real-time systems” [2], where computation must meet stringent timing constraints and one must guarantee that those computations must be completed before specified deadlines. Failure to do so can lead to i...
Learn how MedicAlert automated the functional, security, and performance testing for new APIs – enabling them to become an increasingly agile and valued provider of new healthcare information services. MedicAlert pioneered the use of medical ID products and delivers the most dependabl...
No matter how often you deploy your application or how sophisticated your delivery pipeline is, you always need to know the quality status of the software you are building. That can only be done if you measure it; but measure what exactly? In Part 1 we introduced the Concept of Quality...
One challenge more and more enterprises are grappling with as they plan to adopt the cloud is data residency & sovereignty. They are finding that if they want to use a cloud service hosted outside of their borders, life can become quite complex. Perhaps it is a result of the often disc...
The power of data-driven business networks is increasing, but how do enterprises best leverage that intelligence as they seek new services, products and efficiency? The next BriefingsDirect thought-leader panel discussion focuses on the future of business and how companies can benefit...
As Eric Reis, pioneer of the lean startup movement notes, a software startup’s ability to succeed depends solely on how quickly and inexpensively they can try new features. The challenge is if you are a typical startup, you are your ops team and development resources are the biggest de...
Ben Franklin often said that "by failing to prepare, you are preparing to fail." Not preparing for who your actual enterprise mobility management (EMM) customer is may have dire consequences as mobile devices (both personal and corporate-issued) access more corporate data. Before you c...
The New Finance Meet-up group is currently running a 6 part series over a period of 6 months to determine what could disrupt the Insurance industry. In the most recent meet-up the focus was on how the quantified-self could disrupt the insurance industry. I came away from the meet-up wi...
Every company worries about competition. When I ran a large enterprise solutions organization, I took steps every day to ensure we were outpacing the competition. Frequently this involved making “build” vs “buy” decisions for the various product parts or services we needed to drive our...
As recent events have confirmed once again, no single company, organization or government is up to the task of securing the Internet. The never-ending cat and mouse game of exploits chasing vulnerabilities continues. The stunning Heartbleed discovery has shaken the online security esta...
VisionMobile recently published one of the best reports on apps for vehicles that I have read. It is frustrating with how difficult it is to actually get an app approved for use in a car. Here are some of the unique challenges: Safety first considerations (like driver distraction) Lo...
Printing and the cloud are seemingly at opposite ends of an organization’s infrastructure spectrum. Printing remains one of the last bastions of an organization’s infrastructure that cannot be completely virtualized since the whole point of printing is to take something virtual and mak...
GIS technology is being used in the healthcare industry today for patient care and preventative medicine among other things. Hospitals and other organizations, with GIS and big data resources now have the ability to collect geographic information from their patients and study trends in...
Twitter is fun for me, if for no other reason than I “meet” many wildly interesting people through it. I've developed deep professional relationships through initial contacts on Twitter. But like many of you, I'm sure, I also have numerous Twitter friends whom I've never met, and so...
Enterprises are moving more and more applications to the cloud. Gartner predicts that the bulk of new IT spending by 2016 will be for cloud computing platforms and applications and that nearly half of large enterprises will have cloud deployments by the end of 2017.1 The far-reaching...
Some people really want Google to be a wireless carrier. The most recent speculative episode was early in April when The Information published an exclusive suggesting that Google might be thinking about an MVNO deal with Verizon or AT&T, based on comments by people who were unnamed (bu...
In my previous blog I contrasted the latest net neutrality developments in the EU with the situation in the U.S. Neither decision will settle the argument and the two camps will continue to debate the topic for the foreseeable future. On both sides of the argument and the ocean, believ...
Poorly performing websites, like Twitter’s recent fiasco with Ellen’s selfie, are a constant source of irritation for users. At first you think it’s your computer, or maybe someone on your block is downloading the entire “Game of Thrones” series. But, when nothing changes after refresh...
The cloud computing revolution is well underway and there are lots of benefits to be realized. According to Awesome Cloud research the industry will be worth more than $150 billion this year, compared to $46 billion just six years ago. Mirroring the general trend for SaaS solutions, cl...
Recently Google acquired the home automation company Nest. Nest is a company that sells IoT (Internet of Things) enabled devices that allow homeowners to control the temperature of their homes through their smartphones, plus it sends notifications if it detects dangerous levels of smok...
Cloud computing security can be a conundrum. The point of using the public cloud is to outsource certain infrastructure and application needs to third party providers, after all. How can you secure your data once it leaves your perimeter and your control? As puzzling as it may seem, th...
There has been a lot of media attention on Heartbleed and as always that means a lot of bizarre and often conflicting advice. I sat down (for a very long time) to find the truth of the matter and bring it together in one single article for those involved in enterprise mobility. "The ...
With HP's Adoption Readiness Tool (ART), EVRY, based in Oslo, has gained new advantages in the adoption and understanding of both new and existing technology. Nordic IT solutions provider EVRY has taken automation and agility to new heights in its training and documentation of IT prod...
While Big Data and the cloud are often thought of as going hand in hand, some enterprises still hesitate to place large amounts of proprietary data online. Enterprises decide to keep their large data sets stored locally for a variety of reasons including the possibility of security bre...
Have you seen this error message before “java.sql.Exception: ORA-00060: deadlock detected while waiting for resource”? This is caused when parallel updates require locks on either rows or tables in your database. I recently ran into this exception on an instance of an IBM eCommerce Se...
There are things we tend to take for granted in our everyday lives. We have certain expectations that don’t even have to be spoken, they’re just a given. If you walk into a room and turn on the light switch, the lights will go on, it’s assumed. If you turn the water faucet on, water wi...
The selfie that changed the world, or at least Twitter, has been in the news for the past month. On March 2, 2014, the infamous Oscar selfie of Ellen and her celebrity friends broke a record of 2 million retweets before midnight the same night. That record was previously set by Preside...
The world of enterprise applications, such as enterprise resource planning (ERP), customer relationship management (CRM) and billing, can seem boring to people who are more interested in what is going on at Amazon, Facebook, Google and Twitter, or the latest iPhone or Android applicati...
We all want usability, that’s a given right? We exist in an enterprise world, but we want to behave as naturally as possible with all of the technologies and devices that we come into contact with every day. The co-called ‘consumerization of information technology’ suggests that we as...
Over the last six months I met with a wide range of customers and prospects in order to understand how they understand enterprise mobility, and especially to learn whether they see it as a business opportunity or just another piece of technology. It's no secret that the past few years ...
Zetta.net is an enterprise-grade backup and disaster recovery provider. We have been in business for over five years, and we have over 800 enterprise customers and managed service providers (MSPs) that use or resell our product, as is the case with MSPs. In terms of the IT challenges,...
Companies in many different industries are realizing that applications of GIS (geospatial information systems) can provide competitive and strategic advantages, productivity increases and efficiencies in operations. GIS, when combined with mobile devices like smartphones, tablets, lapt...


ADS BY GOOGLE