Welcome!


Labor market analytics firm Wanted Analytics recently assessed the market for technology professionals and found that demand for people with proficient levels of Hadoop expertise had skyrocketed by around 33% since last year – it is true, Hadoop is hard technology to master and the lab...
General Electric (GE) has been a household name for more than a century, thanks in large part to its role in making households easier to run. Starting with the light bulb invented by its founder, Thomas Edison, GE has been selling devices (“things”) to consumers throughout its 122-year...
In 2013, there was increasing demand for cloud computing, with enterprise after enterprise committing to a rapid and vigorous redeployment of resources toward cloud-based solutions. Gigaom Research conducted surveys of both mainstream and leading-edge users in the second quarter of 201...
Isn’t it great to treat your girlfriend by cooking her favorite omelet every morning? In theory, sure, but in reality, chances are most of the time you end up with darn scrambled eggs instead. Let’s face it: you’re a great boyfriend but a terrible cook. Believe it or not, this is quite...
The key to securing your mobility is to understand how it is being used in your environment and what is potentially at risk. Taking stock of the mobile devices, applications and traffic in your network is critical to identifying how your data and resources are potentially vulnerable. ...
for storage and computing operations at scale. These capabilities allow organizations to store massive amounts of data, in disparate formats, and perform both batch and real-time analyses upon them. The forces driving Big Data into the mainstream are the ever-decreasing cost of storage...
While server virtualization has unprecedented advantages, it has thrown some challenges as well. Prior to server virtualization, each application used to run on a dedicated server with dedicated storage connected through dedicated switch ports. Needless to say, this approach had multip...
GSN Games exploits big data to effectively uncover game-changing entertainment trends for their audience. Oh, and it changes corporate cultures, too. It's a shame when the data analysis providers inside a company get the cold shoulder from the business leaders because the data keeps p...
Waste Management's IT organization began rebuilding their quality assurance processes from the ground up by making the appropriate choices and investments in technology, such as in people and processes -- and their scorecard is very good. It's only been a few years since Waste Managem...
The advancement of technology has led to widespread Cloud data and SaaS application usage throughout enterprises. And CIOs are unprepared for the (mostly unwelcome) implications - largely unaware of the "SaaS Sprawl" in their organizations. These Cloud applications are available for...
With $13 billion expected to be spent by American businesses alone in 2014, the cloud should no longer be considered an alternative IT model. The demand for hardware to run traditional infrastructures is in a nosedive. IBM is spending $1 billion this year, matching the amount it spent ...
One of the most appealing benefits of cloud deployment is the ease of use and the flexibility of adding or removing compute capacity. You can dynamically allocate resources based on the changing workloads, which give you the flexibility in managing your compute cost. AWS Auto Scaling ...
From the way legal teams prepare for trial to how they communicate with clients and other professionals, technology is quickly becoming an influential member of the practice. However, even in today’s technology-driven world, not all firms can label themselves tech savvy. To help those ...
When should High-Performance Computing (HPC) be considered an integral and essential part of the so-called ‘business transformation’ process? This is not a question often posed. We normally center our fascination with the business transformation process around any given firm’s path t...
It’s an oft-cited FEMA statistic that 40 percent of small businesses never reopen after a disaster. Almost certainly contributing to this eye-popping failure rate is the fact that an estimated 74 percent of small to mid-sized businesses (SMBs) lack a disaster recovery plan, while 84 pe...
In 2012, an IDG survey of enterprise cloud computing adoption showed that 70 percent of respondents said security was among their top three concerns, and two years later, not much has changed. The Everest Group Enterprise Cloud Adoption Survey released in March of 2014 shows that 70 pe...
In a hybrid world where will have some private-cloud solutions and multiple public clouds, the challenge is to have the right level of governance, and to be in a position to move the workloads, and adjust the workloads with the needs. The old model of just being an outsourcer or on-pr...
Digital transformation is often unnerving. Our morning newspaper shifts to the iPad. Our coffee is paid for on a mobile app. Our taxis are hailed via mobile apps. Our cars talk to us. Our jobs and careers change as a result of SMAC (social, mobile, analytics and cloud) solutions. How s...
Modern Application Performance Management (APM) solutions can be tremendously helpful in delivering end-to-end visibility into the application delivery chain: across all tiers and network sections, all the way to the end user. In previous blog posts we showed how to narrow down to vari...
This month, we released our latest MetraNet® 8.0 software. What makes this release particularly exciting is that it bridges the gap between the complex business models and customer and partner empowerment that is unique to MetraTech with the user experience typically found in consumer ...
In this part of the Modernizing Your Infrastructure with Hybrid Cloud, we are focusing on of the great solutions we introduced with Windows Server 2012 and improved in Window Server 2012 R2, Storage Spaces. In Windows Server 2012 Storage became a first class citizen, from storage de...
Gartner's Hype Cycle 2014 is out and "gamification" has already peaked and is now heading downward on the cycle toward the trough of disillusionment. In this article my colleague and mobile expert Peter Rogers introduces the next emerging concept - shamification. Please forgive his man...
The cloud plays an integral role in enabling the agility required to take advantage of new business models and to do so in a very convenient and cost-effective way. However, this also means that more personal information and business data will exist in the cloud and be passed back and ...
With an ear to the ground and an eye on the sky, Gigaom's Barb Darrow chronicles the competitive factors shaping the bumpy journey that is cloud computing among the superpowers (AWS in fight of its life as customers like Dropbox ponder hybrid clouds and Google pricing). Wherever you st...
In the last decade, the “Internet of Things” has expanded from a small set of assets with first-generation radio frequency identification (RFID) tags to a proliferation of devices using a variety of wireless machine-to-machine (M2M) technologies. By some estimates, there are as many as...
Connected cars, factory equipment and household products communicating over the Internet is increasingly becoming a reality – one that might soon elicit headlines like “Is the Internet of Things a big bust?” That’s because it’s one thing to connect a device to the Internet and direct ...
“The cloud will transform everything about technology.” This statement is better suited for 20 years ago when the cloud was in its infancy. In 2014 the statement should be that “The cloud has taken over technology.” Cloud computing has been around since the sixties believe it or not, b...
Is it just me, or has there been an explosion of buzz words lately? Don’t get me wrong, the IT industry innovates at a crazy pace normally, but it seems that things have been evolving faster than ever and that a fundamental change in the way things are done is underway. We can attribut...
Transaction management is not just for technical geeks; it is very much a subject that ‘business suits’ should be focused on. But should it be seen as a business issue for technologists or a technology issue for business people? Or doesn’t it matter and should transaction management...
If you work in technology, you’d have to have been under a rock to have not heard about Docker. In a nutshell, Docker provides a lightweight container for code that can be installed onto a Linux system, providing both an execution environment for applications and partitioning to secure...
Ever since Eric Schmidt, the Chief Executive of Google Inc. mentioned the magical term - “Cloud Computing” - in the year 2006, a gale has been crowding over the Silicon Valley. Companies across the IT industry are competing against each other to associate themselves with the cloud comp...
We all feel it, data use and growth is explosive. Individuals and businesses are consuming -- and generating - more data every day. The challenges are common for nearly all businesses operating in every industry: ingest all the data, analyze it as fast as possible, make good sense o...
Security professionals are constantly negotiating the tension of balancing ease-of-use with data security. Savvy security professionals know that their users will often choose a less secure technology that makes getting things done easier over a more secure technology that makes gettin...
In Part 6, we dove into the Nagle algorithm – perhaps (or hopefully) something you’ll never see. In Part VII, we get back to “pure” network and TCP roots as we examine how the TCP receive window interacts with WAN links. Each node participating in a TCP connection advertises its avail...
When combining all data sources into one central location, decisions become more uniform. While there are many ways to integrate multiple sources into a data warehouse, attention to detail is key to avoid creating more problems than are being solved. Choosing when to adopt a data war...
In order to foster high levels of innovation that lead to adaptation to both internal and external disruption, you must foster an organization with low connectivity and furthermore, give them flexible, loosely coupled technology tools. In such environments, teams have the leeway to sel...
In the US Army they have a term called "Revolution in Military Affairs (RMA)." It is often associated with the use of modern data collecting technologies, communications technologies, information analysis and the use of these technologies to improve strategies, doctrines and organizati...
My friend and colleague, the Chief Technologist of Studio 13 at Cognizant, Peter Rogers, shares his insights on digital transformation and mobile strategies in this guest post. He digs deep into the technologies involved in a digital transformation and the role of mobility? This arti...
The ability to choose low-cost hardware, to manage across different types of storage, and radically simplify data storage via intelligent automation means a virtual rewriting of the economics of data. But just as IT leaders seek to simultaneously tackle storage pain points of scalabil...
If you Google “detachable computing” today you will mostly get a selection of links relating to removable storage media. It’s a trend that’s slowly changing, but detachable computing is also coming closer to meaning the use of laptop devices that function and fully working laptops wit...