From community to consumers of data, Tableau Conference 2018 (TC18) set the tone for the business intelligence market in 2019.
I could spend pages and days talking all about the new technology that was released at Dreamforce 2018, but I am going to take the higher road and discuss what Dreamforce 2018 means to customer organizations. Salesforce demonstrated that it cares about its customers and is committed to increasing the productivity of customer-facing teams around the world. Of course, if customer-facing teams are more productive, that will mean increased revenue, higher customer satisfaction, and a palpable competitive advantage.
The C-Suite Should see Gains in Productivity and Profitability
Many sales leaders complain about the challenge of getting sales representatives to enter information into their sales automation systems. The results are incomplete information and the inability to properly forecast and manage sales teams for success. The introduction of Einstein Voice allows sales teams to interact with Salesforce products over their morning coffee or handsfree on their drive home, freeing them to do more of what they are paid to do: sell.
In late July, the Department of Homeland Security issued a warning about a growing number of malicious cyberattacks aimed at ERP systems based on a research project conducted by Digital Shadows and Onapsis. This warning comes at the heels of the first-ever DHS CERT Alert focused on SAP Business Applications released in May of 2016. According to the report, hackers exploited old, unpatched vulnerabilities to successfully hack multiple organizations, including government agencies, energy businesses, and financial services companies. Onapsis and Digital Shadows found significant evidence of increased interest on ERP applications, including bad actors in criminal forums on the dark web asking for exploits specifically targeting ERP technology vulnerabilities. The study, “ERP Applications Under Fire: How Cyberattackers Target the Crown Jewels,” found that the attackers do not need to use advanced techniques to breach their targets because the current state of ERP application security across organizations is such that old vulnerabilities still affect these systems. This means that attackers don’t need to develop new zero-days or advanced exploitation techniques.
On September 12, 2018, at Strata NYC, Informatica announced a data management solution for Apache Spark-based cloud environments, including Google Cloud Dataproc, Qubole, and Azure Databricks. Touting new advancements in CLAIRE™, a metadata intelligence technology powered by artificial intelligence (AI) and machine learning, this new release is targeted at increasing the efficiency and reach of data management organizations. To expand efficiency, Informatica is releasing more than 50 new algorithms and functions for automated data discovery and preparation, as well as machine learning focused on industrializing data operations.
Network managers who are supporting the migration of critical applications to the public cloud will need a new set of tools for engineering and operations.
Today, where there are almost as many approaches to digital transformation as there are enterprise software vendors, Docker refocuses its strategy on providing the best unified container management platform for DevOps. Docker’s key value proposition is to enable developers to build an application once and then deploy it to any Kubernetes-driven private or public cloud, where DevOps teams and IT operations can manage it throughout its lifecycle and move it to another location at any point in time. However, Docker also aims to absorb traditional enterprise applications, edge and IoT workloads, big data apps, blockchain, and serverless functions, both on Windows and on Linux.
EMA recently published primary research on the topic of “Adopting Effective Solutions in Endpoint Detection and Response,” which included a detailed comparison of two of the most popular platforms on the market today: Tanium and 1E Tachyon. Put simply, Endpoint Detection and Response (EDR) solutions represent a classification of management tools designed to proactively provide the holistic visibility and rapid automation necessary to respond to endpoint security threats and administration requirements in real-time. The purpose of the evaluation was to provide an example of how to conduct a side-by-side comparison of EDR solutions in order to determine the optimal platform for meeting current endpoint management requirements.
For years network engineers have built lucrative careers upon their wizardly knowledge of things like network protocols, hardware specifications, and the Cisco command line interface (CLI). These skills are still essential to network engineering, but they are emblematic of a highly manual, box-by-box era of network engineering and operations. Today’s enterprises need agile, programmatic networks that leverage software, automation, and more
In the course of researching, documenting and advising on user experience management needs and directions for more than a decade, I’ve found myself waging a quiet (and sometimes not so quiet) war with several industry assumptions. Chief among these is the notion that user experience management (UEM) is purely a subset of application performance management (APM). This APM-centricity misses some of UEM’s most critical value points, and in a basic sense fails to recognize what UEM is truly about.
The week of April 30, 2018, I spent a few days in the great city of London at “The IT security Analyst and CISO Forum,” a small, invitation-only event hosted by Eskenzi PR and Marketing. It was my first year at the event, so I wasn’t sure what to expect. After I arrived, it was obvious the Eskenzi PR team had this event down. It was well orchestrated and executed, and the entire team was very professional.