Dynatrace Perform 2024: Making Waves While Navigating the Future of Cloud Innovation

By Ken Buckler on Mar 15, 2024 3:19:56 PM

The Dynatrace Perform 2024 conference delivered a plethora of insights and forward-looking perspectives this month. Throughout the conference, the event encompassed keynotes, breakout sessions, customer panels, and hands-on training, offering a holistic view of the latest trends and innovations in the tech industry. The overarching theme, "Make Waves," encapsulates the imperative for transformation and disruption in the tech industry. It underscores the need to drive substantial change and progress amidst evolving trends.

Continue Reading

How DDI Engineers Earn a Seat at the Cloud Strategy Table

By Shamus McGillicuddy on Feb 20, 2024 11:53:05 AM

More than 41% of DDI (DNS, DHCP and IP address management) teams lack sufficient influence over their companies’ cloud strategies, according to my research. This stat was published in my market research report, “DDI Directions: DNS, DHCP, and IP Address Management Strategies for the Multi-Cloud Era.” The report was based on a survey of 333 DDI-focused IT professionals.

Continue Reading

EMA Asked Network Pros: What Do Network Automation Vendors Need to Know About Your Challenges?

By Shamus McGillicuddy on Feb 15, 2024 9:34:49 AM

I will soon publish new market research about enterprise network automation strategies. The report is based on a survey of 350+ IT professionals and one-on-one phone interviews with a dozen experts from a variety of well-known enterprises, universities, and government entities. 

Continue Reading

HPE to Acquire Juniper Networks

By Shamus McGillicuddy on Jan 11, 2024 10:27:44 AM

HPE announced this week its intent to acquire Juniper Networks for $14 billion. When this deal closes, Juniper will combine with HPE's Aruba Networks division, which is itself a product of multiple acquisitions by HPE, including Aruba Networks (Wi-Fi and switching) and Silver Peak (SD-WAN and WAN optimization). 

Continue Reading

From AI to Zero Trust: Decoding Cybersecurity Trends for 2024

By Chris Steffen on Dec 22, 2023 4:09:04 PM

In 2024, we will continue to see globally significant advancements in information security and regulatory compliance spending for organizations of all sizes. From zero trust architecture to the integration of AI-driven solutions and the growing emphasis on regulatory alignment, 2024 will redefine how organizations safeguard sensitive information, navigate compliance complexities, and fortify their API ecosystems. Understanding and adapting to these transformative trends will be pivotal for businesses aiming to stay resilient, secure, and compliant in a time noted for rapid technological advancements and stringent regulatory landscapes. Here are our predictions for information security in 2024.

Continue Reading

Black Hat Europe 2023: Navigating the Evolving Landscape of Cybersecurity

By Ken Buckler on Dec 22, 2023 3:47:45 PM

The Black Hat Europe 2023 conference, a gathering of cybersecurity professionals and experts, delved into the intricate world of cybersecurity, exploring emerging threats, innovative defense strategies, and the pressing need for collaboration between the private sector and government entities. Here's a breakdown of the key takeaways and highlights from a few of the conference sessions.

Continue Reading

Tech at the Gap Decoded: A Look at Maryland’s “Best-Kept Secret” Technology Conference

By Ken Buckler on Oct 23, 2023 1:38:19 PM

Every year, technology enthusiasts and industry leaders gather at the serene Rocky Gap in Western Maryland for Tech at the Gap, an event that has earned the reputation of being one of the hidden gems of Maryland's tech conference scene. This year, the conference's theme, "Decoding Intelligence," promised to unveil the mysteries behind artificial intelligence and its transformative potential. With an impressive lineup of keynote speakers and breakout presenters, the event did not disappoint.

Continue Reading

CMDB is alive and on the rise; cloud found innocent of its demise

By Valerie O'Connell on Aug 21, 2023 2:39:42 PM

Articles proclaiming the death of CMDB started appearing with regularity as early as 2010. Cloud was named as the likely killer. The problem with this bit of folk wisdom is that it isn’t true.

EMA experience and field research consistently find that CMDB use not only continues but is on the rise. In a 2022 EMA initiative on the rise of ServiceOps, 400 global IT leaders stated that CMDB use was central to major functions. For many of those respondents, CMDB use was viewed as increasing in importance for automation of complex processes.  

Where is the disconnect?

Topics: cloud CMDB
Continue Reading

Playing to Win: Generative AI, Cloud Security, and More at Black Hat 2023

By Ken Buckler on Aug 18, 2023 11:48:34 AM

The stage was set, the players were ready, and Black Hat USA 2023 delivered a cybersecurity spectacle that left no doubt—this was a game-changing event. As we unpack the highlights, one overarching theme emerges: a united front against ever-evolving threats. From generative AI to cloud security and a glimpse into the future of defense, this year's conference illuminated the power of collaboration and innovation. Amidst these pivotal discussions, one revelation—the TETRA:BURST vulnerabilities—took center stage, leaving an indelible mark on the field.

Continue Reading

IT Nation Secure Conference Highlights Solutions to the People Problem in Cybersecurity

By Ken Buckler on Jun 13, 2023 6:39:53 AM

Last week, I had the privilege of attending ConnectWise’s IT Nation Secure conference. The three-day conference focused on managed service providers (MSPs) – specifically, how those MSPs can better secure and protect small businesses and midmarket companies. If you haven’t attended this conference in the past but have attended others, I highly recommend attending the ConnectWise IT Nation Secure conference due to the unique perspective they provide for the cybersecurity industry.

Continue Reading

RSA Conference 2023: A “Stronger Together” Moment for Cybersecurity

By Ken Buckler on May 8, 2023 1:15:00 AM

The 2023 RSA Conference was one of the largest and most impactful cybersecurity events of the year. The conference brought together a large number of exhibitors, training sessions, and sponsor briefings and generated a lot of buzz on social media platforms, such as Twitter and LinkedIn. We took some time to analyze the data from social media and the conference and found some interesting trends.

Continue Reading

Star Wars Day – How Security Failures Led to the Empire’s Downfall

By Chris Steffen on May 4, 2023 9:58:11 AM

To celebrate Star Wars Day, I thought I would share a few ways in which the Empire did not adhere to information security best practices, and that enabled the Rebels to win.

To be clear: I do not support the Empire, the Sith Lords, or any other types of scum and villainy. Nor am I trying to portray the Rebel Alliance as a weird, Force-wielding, Galactic hacker consortium or something. But had the Empire not been so lax in their security controls, Emperor Palpatine and his buddies might have been able to bring their “order and peace” to the galaxy.

Continue Reading

What is ServiceOps? A research-based look at why it’s on the rise

By Valerie O'Connell on Mar 20, 2023 3:23:32 PM

A working definition: ServiceOps is a technology-enabled approach to unifying IT service and IT operations management for excellence in delivery of digital business services.

Although the two teams have different charters and skillsets, IT service and IT operations are inextricable. There is no service without effective IT operations.

Continue Reading

How to Mitigate Multi-Cloud Networking Complexity

By Shamus McGillicuddy on Feb 22, 2023 1:08:03 PM

This is a sponsored blog post.

With most companies now operating in multiple cloud providers, network and security complexity are increasing. For instance, 96% of multi-cloud enterprises are using more than one networking vendor across their cloud estates, according to new research from Enterprise Management Associates (EMA).

Continue Reading

The Harsh Truth About Layoffs in the Tech Industry

By Chris Steffen on Feb 14, 2023 10:48:37 AM

Seemingly every day, we hear about the next batch of layoffs from the household-name tech companies: 10,000 here, 1,700 there. As we continue into earning seasons for these publicly traded (and some not publicly traded) companies, we will likely hear more. The substory is that unemployment is at an all-time low, with the job market adding over 500,000 jobs in January. 

Topics: techlayoffs
Continue Reading

A Valentine's Day Wakeup Call: The Heartbleed Vulnerability and the Urgent Need for Improved Cybersecurity

By Ken Buckler on Feb 14, 2023 6:05:20 AM

As of January 2023, Over 194,000 Systems on Internet Still Vulnerable to Heartbleed

The Bleeding Heart of the Internet

In April 2014, the Heartbleed vulnerability was publicly disclosed, sending the information technology world into a panic and rushing to patch this critical vulnerability in OpenSSL, which was allowing the theft of information directly from the memory of vulnerable systems, including private keys and other secrets. This vulnerability featured extremely easy exploitation by attackers, leaving no trace of attacks. Heartbleed ultimately resulted in many late nights for most of the information technology industry, who worked to implement and validate patches for open and closed source products that have integrated the OpenSSL libraries – which accounts for an extremely large percentage of technologies connected to the internet.

Continue Reading

Graphiant: A Vendor to Watch

By Shamus McGillicuddy on Sep 8, 2022 12:16:28 PM

The WAN edge is becoming more distributed and dynamic, which is overburdening IT organizations that are already at a breaking point. Software-defined WAN technology has solved some of the issue, but they haven’t gone far enough. The cloud, the Internet of Things (IoT), and the work-from-home (WFH) revolution demand something more.

Continue Reading

RSAC 2022 Closing Thoughts - Return of Cybersecurity Conferences to the Wild, Wild West Coast

By Ken Buckler on Jun 16, 2022 9:43:34 AM

It’s time to circle the wagons and defend the data and users

As the world reopens, the conference booths light with excitement and empty expo halls are once again filled with hustle and bustle. I thought it important to take a moment and look at what changed in the past two years and where the security industry has room for improvement. This was the first in-person RSA Conference, and likely the first major security conference at all for that matter, with large in-person attendance after the peak of the COVID-19 pandemic. While the conference looks very similar to conferences before the pandemic, the cybersecurity industry landscape has drastically changed.

Continue Reading

Reflection on Informatica World 2022

By Will Schoeppner on Jun 9, 2022 3:45:15 PM

Recently, I had the opportunity to attend Informatica World 2022 (IW22) in Las Vegas. Returning to the in-person conference scene caused some apprehension; however, reflecting on takeaways and engaging in discussions around data integration made this trip a worthwhile experience. I want to thank IW22 for a thought-provoking week of discussions centered on data management, data integration, interoperability, artificial intelligence, and navigating a complex, hybrid, multi-cloud digital environment with Informatica experts, sponsors, and customers.

Continue Reading

Intelligent Mice, Intelligent Mouse Traps – The Future of Cybersecurity and AI

By Ken Buckler on May 31, 2022 6:27:37 AM

Long gone are the days of simple, signature-based defenses against cyber-threats.

Cyber-threats are growing at an exponential rate in the perpetual cat-and-mouse game of cybersecurity, and traditional approaches to cybersecurity are struggling to keep pace. In 2021, anti-malware vendors estimated that they detected between 300,000 and 500,000 new pieces of malware every day. That means than in 2021 alone, over 100 million new pieces of malware were created. Even if cybersecurity vendors can keep up with the sheer volume of new pieces of malware, traditional signature-based and even heuristic-based detection algorithms will struggle to keep up – and that’s only for known malware.

Continue Reading

How to Identify the Ideal Network Automation Solution

By Shamus McGillicuddy on Apr 27, 2022 9:00:18 AM

Data center network automation delivers four primary benefits to a business, according to Enterprise Management Associates research: operational efficiency, reduced security risk, improved compliance, and network agility.

Continue Reading

Not so Quiet on the Cyber Front: Why Your Organization is Still a Target

By Ken Buckler on Mar 4, 2022 2:27:34 PM

It's been quite an interesting couple of weeks. What started off with rising tensions as Russia amassed troops at the Ukraine border evolved into a full invasion of the country. Our newsfeeds are filled with stories and images of ace fighter pilots, brave soldiers making their final stands, and farmers stealing Russian tanks by hooking them up to farm equipment – but another battle has been taking place behind the scenes for many years.

Continue Reading

Cybersecurity Asset Management for Vulnerability Management: Key Capabilities, Benefits

By Chris Steffen on Feb 28, 2022 8:46:39 AM

This is the last in a three-part blog series by Enterprise Management Associates for Axonius discussing how vulnerability management can be expanded and simplified by using a cybersecurity asset management solution. In Part 1, we looked at how cybersecurity asset management can simplify vulnerability management and Part 2  focused on how a cybersecurity asset management solution improves an organization’s vulnerability management program. Part 3 of the series provides a brief summary and some perspectives on the benefits of a cybersecurity asset management solution as it relates to vulnerability management.

Continue Reading

Accelerate Network Automation by Pivoting From Homegrown to Commercial Software

By Shamus McGillicuddy on Feb 24, 2022 8:11:24 AM

Sponsored post for Gluware

Continue Reading

Improving Vulnerability Management With Cybersecurity Asset Management

By Chris Steffen on Feb 17, 2022 10:08:25 AM

This is the second in a three-part blog series by Enterprise Management Associates for Axonius discussing how vulnerability management can be expanded and simplified by using a cybersecurity asset management solution. In Part 1, we looked at how cybersecurity asset management can simplify vulnerability management. Part 2 of the series focuses on how a cybersecurity asset management solution improves an organization’s vulnerability management program.

Continue Reading

Simplify Vulnerability Management With Cybersecurity Asset Management

By Chris Steffen on Feb 10, 2022 9:41:39 AM

This is the first in a three-part blog series by Enterprise Management Associates (EMA) for Axonius discussing how vulnerability management can be expanded and simplified by using a cybersecurity asset management solution. Part one of the series focuses on defining the cybersecurity asset management solutions category and includes a summary definition of vulnerability management.

Continue Reading

NetOps and SecOps Partnerships Flourish With Modern DDI Technology

By Shamus McGillicuddy on Nov 17, 2021 8:50:01 AM

More than 75% of enterprises are reporting increased collaboration between their NetOps teams and SecOps teams , according to EMA's new research on NetSecOps partnerships. Digital transformation is a significant driver of this collaboration. About four out of five enterprises reported that NetSecOps collaboration is in response to public cloud adoption, work-from-anywhere initiatives, data center modernization, the internet of things, and edge computing.

Continue Reading

Data Security in a Multi-Cloud World...

By Chris Steffen on Jul 22, 2021 8:24:36 AM

 

Continue Reading

Five Key Identity Governance Features That Your Identity and Access Management Solution Does NOT Support

By Steve Brasen on Mar 18, 2021 9:23:32 AM

Since the start of the COVID-19 pandemic, identity management has taken center stage as the key enterprise security practice for enabling remote workforces while protecting company data and IT services. Though much of the media hype has focused on evolving technologies in enterprise identity and access management (IAM)—such as enabling passwordless and multifactor authentication—it is often overlooked that identity governance and administration (IGA) is experiencing its own renaissance not only due to pandemic-related access requirements, but also in support of recently-enacted compliance regulations, such as the European Union’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA).

Continue Reading

F5 / AWS Integration Podcast...

By Chris Steffen on Oct 20, 2020 9:35:31 AM

I had the opportunity to participate in a podcast with the team at F5. Christine Puccio – VP of Global Cloud Alliances and Heath Parrott – Senior Global Solutions Architect for Cloud discussed their latest announcement: the integration between F5 Essential App Protect, a web application firewall (WAF) SaaS solution and Amazon CloudFront, a content delivery network (CDN) solution from Amazon Web Services (AWS).

Topics: AWS F5 CDN WAF
Continue Reading

F5 WAF / AWS CloudFront Integration...

By Chris Steffen on Oct 20, 2020 8:00:00 AM

Recently, I had the opportunity to participate in a podcast with the team at F5. Christine Puccio – VP of Global Cloud Alliances and Heath Parrott – Senior Global Solutions Architect for Cloud discussed their latest announcement: the integration between F5 Essential App Protect, a web application firewall (WAF) SaaS solution and Amazon CloudFront, a content delivery network (CDN) solution from Amazon Web Services (AWS). Before discussing the announcement specifically, I thought it would be best to provide a bit of insight into these complementary technologies.

Continue Reading

Why Consumer IAM is Fundamentally Different From Traditional IAM

By Steve Brasen on Oct 6, 2020 9:34:58 AM

Identity and access management (IAM) has been an integral part of IT since the early days of computing. Foundational to the security of IT resources is the need to identify who may access them, and placing limits on what they can do with them. Since these requirements were principally established to support internal business processes, IAM practices and technologies evolved to specifically support business employees. Following the introduction of the internet, however, new security challenges evolved in support of ecommerce. Rather than having to support a limited number of employees, businesses now must ensure the secure delivery of digital engagements with an expansive range of customers and marketing prospects. These challenges greatly accelerated over the last two decades due to the rise in popularity of consumer-focused cloud services and increasing user mobility.

Continue Reading

Three Opportunities to Create Positive Experiences with Consumer IAM

By Steve Brasen on Sep 10, 2020 2:53:42 PM

One-half of one second—that is how brief of a time-span it seemingly can take for a business to lose a customer. Gaining and retaining consumer attention is something of a nuanced art form and science that can be completely undone by an easily misplaced word or a cumbersome process. Businesses frequently lose customers not because they have an inferior product or service but simply because, for some reason, the customers had a brief negative experience. While it is impossible to control what customers are thinking and feeling at any given time, it is clear that many of these negative impressions are self-inflicted by businesses that fail to create welcoming environments. Unfortunately, many organizations find it difficult to adopt CIAM approaches that enable favorable consumer experiences without violating security requirements. After all, the primary purpose of CIAM is to protect a business’s intellectual property, secure private customer information, and prevent account misuse or fraud.

Continue Reading

Entrants in the Unified Analytics Warehouse Race

By John Santaferraro on Aug 26, 2020 2:59:08 PM

As the race to deliver the UAW heats up, EMA sees the following vendors working toward a convergence of the data warehouse and data lake: Ahana, Amazon, Cloudera, Databricks, Dremio, Google, HPE Ezmeral, Incorta, isima.io, Oracle, SAP, Starburst, Teradata, and Vertica. EMA also anticipates that vendors that successfully deliver a unified analytics warehouse will quickly eclipse data warehouse and data lake vendors, making them obsolete, except for targeted use cases and analytical projects.

Continue Reading

The Requirements for a Unified Analytics Warehouse

By John Santaferraro on Aug 21, 2020 12:38:29 PM

To assess the likely winners in the race for the unified analytics warehouse, it is important to understand the various requirements of modern analytics programs and the unified analytics warehouse.

Continue Reading

The Emergence of the Unified Analytics Warehouse

By John Santaferraro on Aug 21, 2020 12:37:39 PM

The race for a unified analytics warehouse is on. The data warehouse has been around for almost three decades. Shortly after big data platforms were introduced in the late 2000s, there was talk that the data warehouse was dead—but it never went away. When big data platform vendors realized that the data warehouse was here to stay, they started building databases on top of their file system and conceptualizing a data lake that would replace the data warehouse. It never did.

Continue Reading

Five Reasons Consumer IAM is Indispensable in the New Normal

By Steve Brasen on Aug 19, 2020 11:33:19 AM

When regional stay-at-home orders in response to the COVID-19 pandemic were first issued in early 2020, the general expectation was that societal changes would only be temporary. As people hunkered down in homes around the world, they expressed a collective confidence that life would eventually (perhaps after only a few weeks) return to normal. Over time, the realization that the pandemic has, in many ways, changed the world forever has slowly been gaining acceptance. Of course, it seems likely that at some point medical science will discover the means to control and perhaps even eradicate the illness, and eventually people will feel free to emerge from their homes. However, many of the fundamental changes to day-to-day activities and lifestyles that have been adopted are likely to persist well into the future.

Topics: IBM CIAM Akamai
Continue Reading

Digital Marketing - Find the Right Media to Create a Dialogue

By John Santaferraro on Apr 22, 2020 2:21:33 PM

Syndicate, Syndicate, Syndicate

We are a multi-media generation that offers unlimited media choices to information consumers. Buyers can choose from mobile apps, videos, websites, podcasts, or printed media. They consume infographics, eBooks, whitepapers, slide shares, webinars, interactive sites, and e-learning systems. They can find their media via search, social streams, mashups, or journalistic consolidation sites.

Continue Reading

Digital Marketing - Understand How People Buy

By John Santaferraro on Apr 22, 2020 2:12:48 PM

The Magic of the Buying Cycle

Increasing sales and revenue with digital marketing involves far more than generating leads. Too many marketers have focused their efforts almost entirely on demand generation at the expense of proactively moving leads through the funnel and closing more deals. EMA supports a balanced digital marketing approach that focuses on moving buyers forward at all points in their buying journey.

Continue Reading

Digital Marketing - Know the Person You Want to Target

By John Santaferraro on Apr 22, 2020 1:42:22 PM

The Search for the Right Persona

Savvy marketers want to better understand buyer personas relevant to the products and solutions in their portfolio. However, not every marketer understands the importance of prioritizing the search for the right persona. Persona creation can be laborious and getting agreement on personas can be even more challenging, but it is worth the effort. Once you create a persona, it becomes the guide for every person in your organization entering a dialogue with a customer or potential buyer.

Continue Reading

How Knoa’s User Experience Management can Optimize RPA for Value

By Dennis Drogseth on Apr 16, 2020 11:21:20 AM

UEM for user experience management and RPA for robotic process automation are two IT acronyms that continue to elude well-understood definitions, albeit for somewhat opposite reasons. UEM goes back decades, first emerging out of primarily network-centric management, becoming a cornerstone of business service management, and later being consumed by application performance management (APM) much to its own detriment. RPA is comparatively recent, evolving out of screen scraping into far richer technical options that are diverse in nature, with many RPA vendors contending with and replacing the more consultancy-driven platforms for business process management (BPM).

Continue Reading

Prioritizing Security When Selecting A Video Conferencing Solution...

By Chris Steffen on Apr 10, 2020 9:08:08 AM

Before the recent COVID -19 pandemic, most companies looked at unified communications and collaborations (UC&C) solutions as important technology often used by sales and marketing teams as part of their process, but not necessarily a critical part of the business infrastructure. With work from home (WFH) becoming the mandated norm, businesses have come to look at UC&C solutions as mission-critical tools, allowing managers and leaders to communicate with their employees and employees to conduct some semblance of normal business.

Continue Reading

FBI Warns of Coronavirus Scams

By Chris Steffen on Mar 23, 2020 11:08:03 AM

On Friday, the FBI released an alert warning of increased scams related to the Coronavirus outbreak. From the FBI announcement:

Continue Reading

Righting a Wrong: IBM is a Leader in the Cloud...

By Chris Steffen on Mar 13, 2020 11:38:19 AM

A article was recently released by Bloomberg news discussing the market share of various cloud providers, and their methods and rankings need  to be re-examined.

Continue Reading

Creating Personalized, Targeted Webinars

By John Santaferraro on Mar 10, 2020 6:55:41 PM

The best webinars are personalized and targeted. They are personalized by carefully considering and engaging those who will be attending the webinar. They are targeted by understanding the buying phase and persona of the audience. In other words, a webinar created with the audience in mind maps perfectly into digital marketing strategies created and carefully considers the different stages of the buying cycle. This is the way we do webinars here at EMA.

Continue Reading

10 Creative Options for Your 2020 Webinars

By John Santaferraro on Mar 10, 2020 6:44:31 PM

Webinars are boring…until you think outside the box and utilize creative ideas to wake up the minds of your attendees. Pick one of these ten creative options to revitalize your webinars in 2020.

Continue Reading

Engaging, Inspirational Webinars Drive the Most Leads

By John Santaferraro on Mar 10, 2020 6:34:01 PM

“Webinars are boring!” I’ve heard those exact words from both marketing leaders and webinar attendees. And for the most part it’s true. If you are still doing webinars in which the third-party pundit speaks first, then your company spokesperson gives a product pitch, your audience is probably mumbling those same words.

Continue Reading

Security Awareness - Tax Scams 2020

By Chris Steffen on Mar 10, 2020 3:00:02 PM

Few people like the process of completing their taxes every year. But no one wants to be scammed out of the monies owed to them by the government. Be especially careful about those that contact you regarding your taxes, and confirm the sources of those emails and calls whenever possible.

Continue Reading

Cisco becomes a Merchant Silicon Vendor, Launches a Disaggregated Super-Router

By Shamus McGillicuddy on Dec 12, 2019 10:44:41 AM

Five years and $1 billion in R&D investment has led to this. Cisco has positioned itself to be a jack-of-all trades routing supplier to network service providers and web-scale data center operators.

Continue Reading

Top 5 Reasons You’re Spending Way Too Much Time, Energy, and Money on Modern Endpoint Management

By Steve Brasen on Nov 26, 2019 9:47:50 AM

Continue Reading

Enterprises Must Adapt Network Performance Management to Next-Generation Technology

By Shamus McGillicuddy on Oct 9, 2019 10:00:23 AM

Continue Reading

The Transformational Promise of Per-Application ADCs

By Shamus McGillicuddy on May 23, 2019 11:09:45 AM

Today’s cloud-centric enterprises require agile infrastructure that can scale up and down as capacity requirements evolve. Nowhere is this shift in infrastructure requirements more apparent than in the world of application delivery controllers (ADCs) and load balancers. Today’s enterprises are shifting away from monolithic ADC appliances in favor of lightweight, per-application software ADCs and load balancers.

Continue Reading

SAP Set to Revolutionize Cloud Intelligence for Business Professionals

By John Santaferraro on May 23, 2019 9:27:33 AM

At SAPPHIRE Now 2019, SAP introduced new cloud services that reach far beyond their installed base and make them a solid option for anyone looking for application or analytics solutions in the cloud. The new data and analytics offerings are not a departure from their commitment to current customers; they extend increased business value for all medium and enterprise companies looking for rapid return on their cloud investments. 

Continue Reading

Datastax Ready for Next-Generation Cloud and Mobile Application Delivery

By John Santaferraro on Jan 28, 2019 1:53:12 PM

Two primary streaks of innovation drive the need for more flexible, scalable technology at the start of the 2020s. First, digital and mobile business models continue to push organizations to expand their use of data far beyond traditional, structured, and centralized data management. The promise of big data platforms to easily allow for global data collection and analysis has never been realized. Second, modernization and innovation cycles that used to recur every five to seven years have been condensed. Most organizations trying to stay ahead of digital transformation are not ready for the speed and agility necessary to maintain a competitive advantage in a digital world.

In summarizing the teachings of Charles Darwin, Louisiana State University business professor Leon C. Megginson said the following at a convention of the Southwestern Social Science Association:

“It is not the strongest of the species that survives, nor the most intelligent that survives. It is the one that is the most adaptable to change.”

Continue Reading

Celonis Process Mining: A Modern Value Creation Engine for the Digital World

By John Santaferraro on Dec 12, 2018 8:18:10 PM

We have come a long way from the days of theoretic business process optimization. A massive wave of digital transformation is leaving electronic footprints and fingerprints that enable the ongoing optimization of business processes based on facts and figures. As a result, we are seeing a wave of new vendors in the business optimization market, which includes process mining and robotic process automation (RPA).

Process mining technology extracts business application data, tags it based on time and location within a business process, visualizes the business processes, logs variations, and makes recommendations for process improvement based on built-in advanced analytics. RPA technology identifies repetitive business processes with potential for automation and codifies the logic necessary to take intelligent action without human intervention. In some more critical areas, the RPA engine makes recommendations for validation by human decision-making.
Continue Reading

Tableau Sets the Tone for Business Intelligence 2019

By John Santaferraro on Nov 7, 2018 11:57:56 AM

From community to consumers of data, Tableau Conference 2018 (TC18) set the tone for the business intelligence market in 2019.

Continue Reading

Salesforce Honors Customers, Boosts Sales Productivity: Gleanings from an Industry Analyst Observer

By John Santaferraro on Oct 9, 2018 12:44:15 PM

I could spend pages and days talking all about the new technology that was released at Dreamforce 2018, but I am going to take the higher road and discuss what Dreamforce 2018 means to customer organizations. Salesforce demonstrated that it cares about its customers and is committed to increasing the productivity of customer-facing teams around the world. Of course, if customer-facing teams are more productive, that will mean increased revenue, higher customer satisfaction, and a palpable competitive advantage.

The C-Suite Should see Gains in Productivity and Profitability

Many sales leaders complain about the challenge of getting sales representatives to enter information into their sales automation systems. The results are incomplete information and the inability to properly forecast and manage sales teams for success. The introduction of Einstein Voice allows sales teams to interact with Salesforce products over their morning coffee or handsfree on their drive home, freeing them to do more of what they are paid to do: sell.

Continue Reading

Cyber Attackers Turn Their Sight to ERP Applications

By Paula Musich on Sep 26, 2018 7:58:29 AM

In late July, the Department of Homeland Security issued a warning about a growing number of malicious cyberattacks aimed at ERP systems based on a research project conducted by Digital Shadows and Onapsis. This warning comes at the heels of the first-ever DHS CERT Alert focused on SAP Business Applications released in May of 2016. According to the report, hackers exploited old, unpatched vulnerabilities to successfully hack multiple organizations, including government agencies, energy businesses, and financial services companies. Onapsis and Digital Shadows found significant evidence of increased interest on ERP applications, including bad actors in criminal forums on the dark web asking for exploits specifically targeting ERP technology vulnerabilities. The study, “ERP Applications Under Fire: How Cyberattackers Target the Crown Jewels,” found that the attackers do not need to use advanced techniques to breach their targets because the current state of ERP application security across organizations is such that old vulnerabilities still affect these systems. This means that attackers don’t need to develop new zero-days or advanced exploitation techniques.

Continue Reading

EMA Perspectives – Informatica Makes Sparks Fly in the Cloud

By John Santaferraro on Sep 18, 2018 11:54:08 AM

On September 12, 2018, at Strata NYC, Informatica announced a data management solution for Apache Spark-based cloud environments, including Google Cloud Dataproc, Qubole, and Azure Databricks. Touting new advancements in CLAIRE™, a metadata intelligence technology powered by artificial intelligence (AI) and machine learning, this new release is targeted at increasing the efficiency and reach of data management organizations. To expand efficiency, Informatica is releasing more than 50 new algorithms and functions for automated data discovery and preparation, as well as machine learning focused on industrializing data operations.

Continue Reading

Public Clouds Are Disrupting Enterprise Network Management

By Shamus McGillicuddy on Sep 14, 2018 3:31:41 PM

Network managers who are supporting the migration of critical applications to the public cloud will need a new set of tools for engineering and operations.

Continue Reading

3 Key Lessons from DockerCon 2018: Strategic Analysis of the Container Market Place

By Torsten Volk on Jun 26, 2018 5:21:30 AM

Today, where there are almost as many approaches to digital transformation as there are enterprise software vendors, Docker refocuses its strategy on providing the best unified container management platform for DevOps. Docker’s key value proposition is to enable developers to build an application once and then deploy it to any Kubernetes-driven private or public cloud, where DevOps teams and IT operations can manage it throughout its lifecycle and move it to another location at any point in time. However, Docker also aims to absorb traditional enterprise applications, edge and IoT workloads, big data apps, blockchain, and serverless functions, both on Windows and on Linux.

Continue Reading

Future-Proofing Your EDR Solution

By Steve Brasen on Jun 19, 2018 5:16:04 PM

EMA recently published primary research on the topic of “Adopting Effective Solutions in Endpoint Detection and Response,” which included a detailed comparison of two of the most popular platforms on the market today: Tanium and 1E Tachyon. Put simply, Endpoint Detection and Response (EDR) solutions represent a classification of management tools designed to proactively provide the holistic visibility and rapid automation necessary to respond to endpoint security threats and administration requirements in real-time. The purpose of the evaluation was to provide an example of how to conduct a side-by-side comparison of EDR solutions in order to determine the optimal platform for meeting current endpoint management requirements.

Continue Reading

Cisco Live 2018: Forget Hardware, Cisco Is All About Software

By Shamus McGillicuddy on Jun 14, 2018 4:17:51 PM

For years network engineers have built lucrative careers upon their wizardly knowledge of things like network protocols, hardware specifications, and the Cisco command line interface (CLI). These skills are still essential to network engineering, but they are emblematic of a highly manual, box-by-box era of network engineering and operations. Today’s enterprises need agile, programmatic networks that leverage software, automation, and more

Continue Reading

Putting the User into “User Experience Management”

By Dennis Drogseth on May 31, 2018 8:05:11 AM

In the course of researching, documenting and advising on user experience management needs and directions for more than a decade, I’ve found myself waging a quiet (and sometimes not so quiet) war with several industry assumptions. Chief among these is the notion that user experience management (UEM) is purely a subset of application performance management (APM). This APM-centricity misses some of UEM’s most critical value points, and in a basic sense fails to recognize what UEM is truly about.

Continue Reading

Thoughts and Lessons Learned From an Analyst and CISO Conference

By David Monahan on May 15, 2018 8:52:00 AM

The week of April 30, 2018, I spent a few days in the great city of London at “The IT security Analyst and CISO Forum,” a small, invitation-only event hosted by Eskenzi PR and Marketing. It was my first year at the event, so I wasn’t sure what to expect. After I arrived, it was obvious the Eskenzi PR team had this event down. It was well orchestrated and executed, and the entire team was very professional.

Continue Reading

Top 10 from Dell Technologies World in 2018 – Quick Edition

By Torsten Volk on May 4, 2018 10:11:25 AM

OpenManage Enterprise is a big deal, but underrated: OpenManage Enterprise is the new infrastructure automation platform that could unlock the private and hybrid cloud for Dell. Deploying Dell infrastructure through a simple YAML file is within reach.

Continue Reading

EMA Digital Attacker Scorecard

By Torsten Volk on Apr 18, 2018 10:59:58 AM

Topics: Uncategorized
Continue Reading

Artificial Intelligence Delivered WYSIWYG-Style

By Torsten Volk on Apr 12, 2018 10:22:33 AM

Companies who manage to put AI capabilities into the hands of each and every business employee will be vastly successful in the marketplace. Enabling business employees to back up their decisions with data will dramatically increase staff productivity. At the same time, employees will feel empowered by their new ability to make much more informed decisions and automating certain tasks, based on intelligence derived from operations and market data that is now available to them.

Continue Reading

IBM’s Differentiation in 10 Quotes from Think 2018 – Let’s Put Smart to Work

By Torsten Volk on Mar 27, 2018 7:29:10 AM

Here are the 10 quotes that best sum up #Think2018. Inspired by Think 2018, I came up with my own ideas for AI bots and posted them here.

Continue Reading

Understanding Network-as-a-Service from Alcatel-Lucent Enterprise

By Shamus McGillicuddy on Mar 19, 2018 10:44:00 AM

Editor’s note: This blog post was sponsored by Alcatel-Lucent Enterprise, but the sentiments are entirely my own.

Continue Reading

11 Golden Rules to De-stress Your DevOps Process

By Torsten Volk on Mar 14, 2018 9:44:08 AM

With development teams working on 3-4 releases in parallel and releasing at least once a quarter, we often see release overhead consuming an average of 20-30% of development and operations resources. Enterprises releasing every month, week, or even day suffer from even larger overhead. Here is what you can do to free up most of these 20-30% for the faster creation of new critical software features: to enhance customer value:

Continue Reading

How an EMA Top 3 Product Is Selected – Quick Overview by the Example of Chef Habitat and InSpec

By Torsten Volk on Mar 2, 2018 10:56:35 AM

The EMA Top 3 report for Container Management and DevOps in Production and at Scale is a curated collection of a large number of data points that reflect individual priorities, pain points, technology adoption patterns, requirements, opinions, and so on, of 300 enterprises. It then dives deeper into these individual data points to provide readers with enough context to inform their technology selection process to some degree. However, each reader needs to pick out the nuggets that are the most relevant to him or her and then draw her own conclusions. Look at it this way: the EMA Top 3 polls 300 of your peers on 58 container and DevOps related questions and you can learn from the answers without having 300 separate conversations.

Continue Reading

What is Advanced Network Analytics? Cutting Through the Hype

By Shamus McGillicuddy on Feb 19, 2018 10:26:00 AM

Everyone wants to talk about how analytics is the future of network engineering and operations. The phrase “network analytics” is used by vendors of various stripes to imply that a particular technology is smarter and better than the average solution.

Continue Reading

Solve the Cloud Networking Conundrum With SD-WAN

By Shamus McGillicuddy on Jan 9, 2018 2:41:04 PM

Enterprise networking professionals have a cloud problem, even if they don’t know it. Software-defined WAN (SD-WAN) solutions can help them solve this problem.

Continue Reading

Why Machine Learning Diagnoses Cancer but Can’t Run our Hybrid Cloud

By Torsten Volk on Jan 9, 2018 10:05:16 AM

Why Machine Learning Diagnoses Cancer but Can’t Run our Hybrid Cloud

Continue Reading

Limitations of Neural Network Learning and How They Should Be Attacked in 2018

By Torsten Volk on Jan 3, 2018 2:00:53 PM

Neural Networks Are Key in 2018

Neural networks are back, but please don’t think they are able to emulate the context awareness of the human brain. Don’t get me wrong, I believe that the neural network approach is a viable one, but we do need to be clear about its limitations. All of these limitations are rooted in the limited 'worldview' the neural network is able to take in. This worldview is limited as it relies on a human being with limited time and knowledge creating the neural network topology by providing the following components and enough sample data for the machine to determine how input should be processed.

Continue Reading

Top 3 Coding Toys and Apps for Kids that Are as much Fun for Parents

By Torsten Volk on Dec 29, 2017 12:55:37 PM

My constant search for the next ‘cool’ tech toy or app is inspired by my obsession for automation. Trying to teach my 4 and 6 year old kids to think of creative solutions for their repetitive problems (no, there’s not yet a robot that cleans their rooms) surfaced the following 3 top toys and top apps in 2017.

Continue Reading

7 IT Operations Challenges to Attack in 2018 – EMA Punch List

By Torsten Volk on Dec 28, 2017 12:46:11 PM

Digital attackers in 2018 need to focus on one key challenge: “how do I deliver the best possible value to my clients, without significantly increasing cost.“

Continue Reading

6 Recommendations for Machine Learning and Artificial Intelligence in 2018

By Torsten Volk on Dec 26, 2017 12:20:52 PM

In 2017, CEOs arrived at the conclusion that machine learning and artificial intelligence (ML / AI) will be critical to unlock competitive advantages in the future. However, most enterprises had very little understanding of exactly what is possible today and how much value the investment in various ML / AI technologies can bring. Here are my six key recommendations for 2018:

Continue Reading

The Frustrations of Applied Machine Learning – A Not So Common Case Study

By Torsten Volk on Dec 17, 2017 1:33:54 PM

Now that I’ve predicted that in 2018 machine learning will be available to ‘average Joe developer,’ let me share my experience from this weekend. Note that I’m not trying to be a ‘cool geek’ by doing some hands on work (I’m way too old to still be cool), but based on all the machine learning and artificial intelligence buzz in 2017, I thought my use case should be quick, simple, and most importantly solving a problem that could otherwise not be solved.

Continue Reading

Top 10 enterprise IT Predictions for 2018 – Release Faster, Cheaper, and at Higher Quality – Everything Is about Becoming a Digital Attacker

By Torsten Volk on Dec 10, 2017 2:26:13 PM

For readers who would like to see what happened to our 2017 predictions, please take a look. Jens Soeldner and the EMA Team sat down again this month to look into the crystal ball for 2018.

Continue Reading

10 Priorities for Container Management in Production and at Scale in 2018 – EMA Top 3 Report and Decision Guide for Enterprise – Sneak Peak

By Torsten Volk on Dec 5, 2017 3:15:15 PM

Here's the Sneak Peak to the EMA Container Management in Production and at Scale research project that so many of you have been asking about over the previous 2 months.

Continue Reading

AWS Re:Invent 2017 – Two Big Time Machine Learning Highlights

By Torsten Volk on Dec 4, 2017 9:33:31 AM

“We want everyday developers (...) to be able to use machine learning much more extensively.” This is Andy Jassy’s mantra targeted at making AWS the company that turns machine learning into a commodity, similar to what the company achieved for IaaS before. Within this context, the following two new offerings stood out of the glut of machine learning and IoT news at Re:Invent 2017.

Continue Reading

AWS Re:Invent 2017 – Serverless Containers, Managed Kubernetes, Bare Metal, Machine Learning, and IoT

By Torsten Volk on Dec 1, 2017 9:56:21 AM

Breaking the Triangle of Cost, Quality, and Speed

This year’s AWS Reinvent delivered major announcements in DevOps, machine learning and IoT. All of the announced capability aim to eliminate infrastructure as the bottleneck for enterprises to become ‘digital attackers’. Observing the nearly 50.000 developers, architects, and software operators that came to Reinvent showed us a significant degree of genuine excitement about Amazon helping enterprises release new software faster, at a higher quality and lower cost.

Continue Reading

Intent Driven DevOps – A New Journey to NoOps

By Torsten Volk on Nov 27, 2017 6:07:38 PM

First Came Autonomic Computing
‘Autonomic Computing’ was the original concept of providing systems and apps with the power autonomously responding to unpredictable challenges. ‘Autonomic Computing’ came with all the right ideas (IBM deserves a good share of credit for defining this concept), but failed due to the same cultural and technological barriers DevOps is struggling with today. There simply was not enough ‘pressure to innovate.' This allowed inertia to prevail, leading to 'business as usual,' instead of magical self-healing and self-optimizing datacenter infrastructure.

Continue Reading

DevOps Enterprise Summit 2017 in SFO – Real Life DevOps Demystified

By Torsten Volk on Nov 17, 2017 1:39:24 PM

This year’s DevOps Enterprise Summit (DOES) in San Francisco was carried by the enthusiasm of 1500 practitioners who were genuinely enthusiastic about how DevOps can transform their enterprises into a ‘digital attacker.’ Digital attackers rely as DevOps as their innovation engine to rapidly release high quality software that offers measurable business value. In short, digital attackers bully their competition by offering best in class customer value on an continuous basis and in a cost effective manner.

Continue Reading

CA Technologies Pushes for Diversity in Tech Industry

By Shamus McGillicuddy on Nov 16, 2017 2:41:03 PM

Despite what you hear from trolls, bigots, and misogynists, diversity in the technology industry is a good thing. But the philosophy of diversity needs more champions. Tech companies and IT organizations need to expand their workforce beyond the herds of white men that have dominated the industry for decades.

Continue Reading

SDDC 2.0 with Kubernetes, Apigee, and Istio – Cisco’s Collaboration with Google Follows a Grander Vision

By Torsten Volk on Oct 27, 2017 10:13:23 AM

On October 25, Cisco and Google announced their hybrid cloud partnership, where Google brings the container runtime (Kubernetes), the platform to provide, manage, and consume APIs (Apigee), and of course a wide range of consumable cloud services (visual recogngition, machine learning, text to voice, etc.). Cisco contributes the hyperconverged infrastructure (Hyperflex) with Kubernetes management (Harmony), networking (Nexus 9k), and hybrid cloud management software (CloudCenter) to integrate Google’s public cloud services with the customer’s local data center.

Continue Reading

Microsoft Pulling ahead of Amazon with its fully Managed Kubernetes Offering

By Torsten Volk on Oct 25, 2017 9:00:55 AM

Azure Container Service (now AKS where the K stands for Kubernetes) is now offers managed Kubernetes as Tech Preview. This new service provides single-line install (az aks create –n myCluster –g myResourceGroup), automated upgrades, self-healing, and scaling. Microsoft promises that the Azure control plane for Kubernetes will remain free (AWS charges for management servers), with customers only paying for worker nodes running applications. Like all other major vendors, Microsoft declares Kubernetes the winner of the container orchestrator and scheduler race and stresses its contribution to the open source project (only 37 commits, compared to 114 by IBM, 668 by Red Hat, and 1543 by Google as of October 25, 2017). Microsoft also stresses the importance of its Draft project (acquired through Deis) to make Kubernetes accessible to developers without any container experience. Today, Amazon does not offer managed Kubernetes, but it is expected that there will be an announcement in this regard at re:Invent in November.

Continue Reading

The Scheduler Race is Over – Why Kubernetes Won and What it Means to the Market

By Torsten Volk on Oct 19, 2017 11:51:23 AM

What Happened?

Continue Reading

Struggling to Turn Around – Finally Docker Announces Kubernetes Support

By Torsten Volk on Oct 18, 2017 9:27:18 AM

Docker used the picturesque setting of its Copenhagen DockerCon event to announce Kubernetes support for both, Docker Enterprise Edition and Docker Community Edition. The company plans to deliver betas for end of 2017.

Continue Reading

SDN and the Data Center of the Future

By Shamus McGillicuddy on Oct 16, 2017 12:42:17 PM

Despite some recent obituaries published by my peers, software-defined networking is not dead. But perhaps certain aspects of it are dead or dying. If that’s the case, I say: “SDN is dead. Long live SDN.”

Continue Reading

EMA Enterprise Decision Guide: Container Management in Production and at Scale

By Torsten Volk on Oct 9, 2017 11:09:24 AM

I’m excited to kick off this project, as no other topic in IT seems to have so many different aspects to consider and so many points to attack it. As, hopefully, in all our EMA research projects, we will look at this topic from all angles without any predetermined outcomes. The project will be exclusively guided by what’s best for the customer when it comes to ramping up a container strategy.

Continue Reading

Top 3 Guidelines for Leveraging Machine Learning and Artificial Intelligence to Lower OPEX and Increase Competitiveness

By Torsten Volk on Oct 2, 2017 11:40:35 AM

“Machine learning (ML) today is frustrating. There is so much potential and the algorithms are all there, but I just do not know how I can leverage it for my organization,” says the CTO of a major professional services firm. “My CEO wants me to ‘leverage ML to lower OPEX and differentiate our service offerings, but there is nothing out there in the market that would allow me to get this done in a manner that has a high probability of success.” Then of course he asks me what I would do and where I would start, because the guy with “Machine Learning and AI” in his job title must know for sure…

Continue Reading

Transforming End-User Support – What Does It Mean and What Is It Really About?

By Dennis Drogseth on Sep 26, 2017 3:03:33 PM

I admit, “end-user support” sounds kind of old-fashioned. But in many respects just the opposite is true. In the digital age the need for easy access to new services is on the rise, and even with a much ‘hipper’ (and increasingly impatient) end-user population, the need for support and guidance remains. It is just taking different forms than in the past.

Continue Reading

Machine Learning and Artificial Intelligence: The Promised Land for Lowering IT OPEX, Decreasing Operational Risk and Optimally Supporting Business Goals

By Torsten Volk on Sep 26, 2017 11:37:40 AM

What should machine and artificial intelligence (ML/AI) do for IT operations, DevOps and container management? The following table represents my quick outline of the key challenges and specific problem ML/AI needs to address. The table is based on the believe that ML/AI needs to look over the shoulder of IT ops, DevOps, and business management teams to learn from their decision making. In other words, every virtualization administrator fulfills infrastructure provisioning or upgrade requests a little bit differently. Please regard the below table as a preliminary outline and basis for discussion. At this point, and probably at no future point either, I won't claim to know the 'ultimate truth.'

Continue Reading

Machine Learning and Artificial Intelligence: The Promised Land for Lowering IT OPEX, Decreasing Operational Risk and Optimally Supporting Business Goals

By Torsten Volk on Sep 26, 2017 10:44:15 AM

What should machine and artificial intelligence (ML/AI) do for IT operations, DevOps and container management? The following table represents my quick outline of the key challenges and specific problem ML/AI needs to address. The table is based on the believe that ML/AI needs to look over the shoulder of IT ops, DevOps, and business management teams to learn from their decision making. In other words, every virtualization administrator fulfills infrastructure provisioning or upgrade requests a little bit differently. Please regard the below table as a preliminary outline and basis for discussion. At this point, and probably at no future point either, I won't claim to know the 'ultimate truth.'

Continue Reading

EMA Quick Take: Why Puppet Acquired Distelli – Kubernetes Management Is Key

By Torsten Volk on Sep 21, 2017 4:50:38 PM

 

Continue Reading

Prologue for EMA Research Project: Machine Learning and Artificial Intelligence in Enterprise IT and DevOps

By Torsten Volk on Sep 18, 2017 2:29:07 PM

Why are there still so many repetitive tasks in data center and cloud management today? Why does application management still contain so many manual steps? Why do most organization still suffer from automation and monitoring silos that prevent them from avoiding preventable application outages and service degradations?

Continue Reading

VMworld 2017 – vRealize 2017 Announcement

By Torsten Volk on Sep 12, 2017 8:14:29 AM

Accelerated Deployment and Lower OPEX

Faster time to value, lower OPEX and deeper multi cloud support are the key elements of VMware vRealize Suite 2017, as it was presented at VMworld 2017
in Barcelona. The new vRealize Suite Lifecycle Manager (vRSCLM) provides
one central user interface tying together the formerly fragmented and complex deployment process for new vRealize environments. Additionally, vRSCLM enables health monitoring, product con guration, IAM integration, and simpli ed upgrades.

[embed width=500]https://youtu.be/Mk3b5UVaFIU [/embed]
Should You Care about the Release of vRealize Suite Lifecycle Manager?

VMware vRealize Suite has received much criticism in the past for its complicated and too brittle deployment, con guration, and integration process. Considering that vRSCLM addresses exactly this critical issue by offering a uni ed installation wizard and a centralized operations dashboard for one or multiple vRealize Suite environments, Enterprise Management Associates (EMA) can only conclude that this new release is signi cant and deserves a close look.

New Deployment Wizard

The new vRS deployment process has been simplified and reduced to the following few steps:

Select whether to import an existing vRS environment or install a new one.

The “import” option lets enterprises manage and upgrade existing vRS environments. The installation process begins as follows:

  • Review the compatibility matrix
  • Select the target version for each component
  • Pick a deployment sizeSelect target data center for new deployment
    Select the vRealize Suite license to apply directly from MyVMware.com Provide the required network details, certi cates and product parametersReview the summary and start the installation process. Due to the new pre-checks it is now less likely for the installation process to fail and in the event of failure, the installation can be resumed from the administration panel, once the root cause has been addressed.

New Operations Management Dashboard

The vRLCM admin panel provides provides a UI to manage, upgrade, and con gure all corporate vRS environments, even across data centers or clouds, through a single pane of glass. vRLCM leverages vRealize Operations (vROps) for health monitoring and root cause analysis and enables administrators to set alerts in case of con guration drift.

Upgrade preparation: Before an upgrade, admins can create a complete snapshot of the environment and view the compatibility matrix.

Upgrades through GUI or Con g File: While the rst upgrade will often be done through the UI, future upgrades could simply leverage the con guration le created through the UI-driven process.

Best practice con guration: vRLCM tracks con guration drift, enables admins to restore previous con gurations, and apply best practice architectural principles.

Leverage VMware Identity Manager: Admins can either leverage an existing installation of VMware Identity Manager or use vRLCM to install a new one.

Final Words

After the initial private cloud hype died down, the race for market leadership is on once again. EMA research shows that in 2017 private cloud is high up on the list of investment priorities for enterprises
of all verticals and sizes. Vendors who will succeed in capturing a signi cant market share have to check the following boxes:

Support any cloud, offer developer friendly APIs and provide customers with a near turn-key deployment experience. With its recent announcements –Vmware Cloud Services, VMware Cloud on AWS, and Pivotal Container Service- Vmware is doing all the right things to be successful.

And then there’s of course one thing that’s needed to juggle apps between clouds and data centers: software de ned networking, where VMware is strategically well positioned with its NSX solution.

Continue Reading

Network Operations and Analytics from CA Technologies has Won the EMA Innovator Award

By Shamus McGillicuddy on Sep 5, 2017 12:42:17 PM

Network Operations and Analytics from CA Technologies has been named a winner of Enterprise Management Associates’ Innovator Award, which recognizes products and services that demonstrate true innovation in the IT industry and address the most critical challenges IT organizations face today.

Continue Reading

VMware Goes SaaS-Ops and Multi Cloud: Launch of VMware Cloud on AWS and Six VMware Cloud Services for Consistent Data Center and Cloud Management

By Torsten Volk on Aug 28, 2017 7:45:57 AM

At VMworld 2017, VMware announced the availability of VMware Cloud on AWS and of the six initial VMware Cloud Services. VMware Cloud on AWS offers customers the long expected capability of deploying VMware's Cloud Foundation Suite of SDDC products (vSphere, NSX and vSAN) to AWS. VMware Cloud Services enable operators, developers, security experts and compliance staff to consistently deploy and operate application infrastructure across today's most popular clouds: AWS, Google, Azure and vSphere. Today, both offerings, VMware Cloud on AWS and VMware Cloud Services are available from AWS U.S. West (Oregon Region), but can be used worldwide. VMware and Amazon are planning to roll out both offerings worldwide during 2018.

Continue Reading

VMworld 2017 – The Container Story Will be Key for VMware’s Future

By Torsten Volk on Aug 23, 2017 10:45:10 PM

VMware’s container management strategy should be seen as the key to success for this year’s VMworld. VMware needs to conclusively convince its customers that instead of doing their own thing the company is able to offer a strong value proposition based  on the fact that Kubernetes and Amazon ECS are the key container technologies to embrace. DockerCon has shown that VMware admins have realized that it is time to “learn about containers,” but VMware’s challenge today is to convince customers that Kubernetes management will not happen entirely separately from virtualization management. Even worse, Kubernetes management may not even require virtualization at all.

Continue Reading

VMworld 2017 Prologue 2 – Where Are the APIs

By Torsten Volk on Aug 22, 2017 10:08:25 AM

“vRealize Automation really doesn’t have an API,” says a reputable partner of a VM-ware centric consulting firm, “they say that it does, but it still does not, so I won’t tell my customers that it does.” Then he goes on in a slightly agitated manner “,also, there is no easy-to-implement orchestrator and no central queueing system to tie together all the VMware components based on dynamically changing policy-defined app requirements.” “Then finally,” he continues, “I have yet another client who asked me to come back with ‘an alternative to vRA, as my developers just don’t want vRA."

Continue Reading

Cisco Announces Intent to Acquire Springpath for $320 Million

By Torsten Volk on Aug 21, 2017 10:12:51 AM

Cisco’s Springpath Acquisition Will further Boost Its EMA Top 3 Winning Hyperconverged Portfolio

Continue Reading

VMworld 2017 – Prologue

By Torsten Volk on Aug 18, 2017 4:18:34 PM

“Oh, I’m not coming to VMworld this year, we are at Jenkins instead.” This is a sentence I’ve heard quite a few times now from vendors that I’m used to seeing at VMworld and it makes me wonder what’s going on.

Continue Reading

The Internet of Things will Drive Network Management Evolution

By Shamus McGillicuddy on Jul 26, 2017 3:34:24 PM

EMA research has determined that network managers will need to upgrade, expand, and adapt their network monitoring and management tools and practices if they are going to support the Internet of Things (IoT).

Continue Reading

EMA Top 3 Product Selection Process

By Torsten Volk on Jun 16, 2017 5:14:24 PM

(You can read more about the content of the EMA Top 3 - Enterprise Decision Guide in my first Post)

Continue Reading

The EMA Top 3 Report: Ten Priorities for Hybrid Cloud, Containers, and DevOps in 2017

By Torsten Volk on Jun 15, 2017 4:34:31 PM

(Click here to jump to the next part and read about how EMA selected its Top 3 products)

Continue Reading

HPE Project New Stack – It’s a “Free Play”

By Torsten Volk on Jun 8, 2017 1:32:07 PM

At its Discover event this week, HPE announced its own multi cloud management platform: HPE Project New Stack.

Continue Reading

Optimizing the Business With Network Analytics

By Shamus McGillicuddy on Jun 7, 2017 3:36:32 PM

Some network operations teams are discovering that they possess a critical asset that can transform enterprises: network data.

Continue Reading

Q&A From How Digital Business is Shaping the Next Wave of Automation Webinar

By Dan Twing on Jun 5, 2017 8:14:06 AM

I recently presented findings from my Workload Automation (WLA) research and other EMA research on a webinar with Tim Eusterman, Sr. Director Solutions Marketing at BMC in a webinar titled “How Digital Business is Shaping the Next Wave of Automation”. The recording of the webinar is now live here, and the slides are available here.

Continue Reading

An Easy Button for Serverless Functions: Back& Turns Average Joe Developer into Serverless Super Hero

By Torsten Volk on May 17, 2017 10:36:52 AM

Backand provides a simplification layer that makes serverless functions approachable for the average Joe developer
Continue Reading

Dell EMC World – The Easy Button for Digital Transformation

By Torsten Volk on May 15, 2017 8:44:12 AM

“It feels like magic but it is technology,” and “we will help transform every company into a software company,” were the two quotes by Michael Dell that best summed up the spirit of  Dell EMC World 2017. These statements show the genuine excitement of a seasoned tech executive to attack the next challenge of his career: merging the Dell EMC brands -Pivotal, VMware, RSA, SecureWorks, and Virtustream- into one highly differentiated IT powerhouse.

Continue Reading

ExtraHop Addy applies cloud-based machine learning to network data

By Shamus McGillicuddy on May 7, 2017 3:36:29 PM

IT analytics vendor ExtraHop unveiled a cloud-based service that applies machine learning heuristics to the metadata that its appliances generate from packet stream analysis. The service should give users better visibility into IT service problems and security threats.

Continue Reading

The Open Networking Foundation’s New Direction: We Live in a Post-OpenFlow World

By Shamus McGillicuddy on May 6, 2017 3:36:32 PM

The Open Networking Foundation (ONF) recently unveiled plans to redefine itself for the post-hype phase of software-defined networking (SDN). I welcome the ONF’s reset and believe it bodes well for the industry’s future.

Continue Reading

Redefining the Branch Office With SD-WAN

By Shamus McGillicuddy on May 5, 2017 3:36:32 PM

Editor’s Note: This blog post is sponsored by Citrix. The ideas and analysis are entirely the authors own.

Continue Reading

New EMA Research: 68% of Enterprises are Evaluating Containers TODAY

By Torsten Volk on Apr 27, 2017 12:59:03 PM

EMA's latest research shows that 68% of enterprises are in the process of evaluating container technologies. Why is everyone today so fascinated by containers? It reminds me of the OpenStack-mania in 2013. At the time I was convinced that VMware had set out to crush the hype, while IBM, Rackspace and a ton of VC funded startups oversold OpenStack to the highest degree. I still have my collection of USB sticks with OpenStack distributions from Piston, Mirantis and friends. Claiming that all I had to do was plugging these sticks into any piece of metal and I'd have Amazon EC2 running right under my desk was not a great idea and ultimately lead to a degree of frustration that made the Microsoft and VMware tax look attractive and ultimately turned Amazon Web Services into a $4.5 billion business.

Continue Reading

Full Stack Container Monitoring – A Whole New Animal

By Torsten Volk on Apr 19, 2017 11:52:20 PM

Traditional IT infrastructure monitoring focuses on hypervisor hosts, storage and VMs. Application impact is tracked through vSphere resource tagging. This simple and mostly static drilldown approach to full-stack monitoring no longer works for modern microservices based computing.

Continue Reading

VMware Goes DevOps: Wavefront Acquisition Brings Massive Data Analytics Capabilities for IT Operations

By Torsten Volk on Apr 18, 2017 5:21:03 PM

Wavefront could be seen as the Swiss Army knife of IT Ops Analytics tools, which makes this VMware acquisition so interesting. Infusing vRealize, Cloud Foundation and even vSphere, vSAN and NSX with Wavefront analytics would enable VMware to run, not walk, toward the Business-defined Data Center (BdDC).

Continue Reading

Advanced IT Analytics: Making it Simpler to Optimize What’s More Complex

By Dennis Drogseth on Apr 13, 2017 3:03:33 PM

The growing market for analytics in IT is one of the more exciting areas to watch in the technology industry. Exciting because of the variety and types of vendor innovation in this area. And exciting as well because our research indicates the adoption of advanced IT analytics supports data sharing and joint decision making in a way that’s catalytic for both IT and digital transformation.

Continue Reading

Microsoft Challenges Amazon and Google with Deis Acquisition

By Torsten Volk on Apr 10, 2017 1:26:33 PM

One week after the GA of Azure Container Registry and only two months after the availability of Kubernetes on Azure Container Service, Microsoft acquires Deis, the guys who make open source Kubernetes management software (Helm, Steward and Workflow), from PaaS Cloud Provider Engine Yard. The Deis slogan is “making Kubernetes easy to use.” With the Deis acquisition Microsoft obtains talent and technologies to successfully compete in the container arena. Infusing Windows, Visual Studio, Azure and OMS with easy container management capabilities is key for Microsoft to catch up with AWS and stay ahead of Google Cloud Platform.

Continue Reading

InterConnect 2017 – Showing off a whole New IBM

By Torsten Volk on Apr 10, 2017 1:19:45 PM

“Today, a dev team leveraging Kubernetes containers can get a cloud app up in minutes.” This statement by Arvind Krishna, IBM’s GM for Hybrid Cloud, at the beginning of his InterConnect 2017 keynote should have received a lot more recognition than it did. This one sentence shows the fundamental shift in IBM’s strategy, away from the old Tivoli-centric IT ops company and toward a modern DevOps-focused organization that is looking for differentiation up the stack. Today’s IBM encourages developers to deploy entire application environments without IT administrators even being aware.

Continue Reading

InterConnect 2017 – Showing off a whole New IBM

By Torsten Volk on Mar 24, 2017 10:31:12 AM

"Today, a dev team leveraging Kubernetes containers can get a cloud app up in minutes." This statement by Arvind Krishna, IBM’s GM for Hybrid Cloud, at the beginning of his InterConnect 2017 keynote should have received a lot more recognition than it did. This one sentence shows the fundamental shift in IBM’s strategy, away from the old Tivoli-centric IT ops company and toward a modern DevOps-focused organization that is looking for differentiation up the stack. Today’s IBM encourages developers to deploy entire application environments without IT administrators even being aware.

Continue Reading

The Business Defined Hybrid Cloud – Or Why the Software Defined Data Center Needs a Brain

By Torsten Volk on Mar 15, 2017 10:49:46 AM

Let us look at a hypothetical example to better understand the difference between the traditional bottom-up approach to hybrid cloud management and the new business-driven paradigm. In Q4 of 2016, a bank wants to gain a 3% market share in North America with its trading tools directed toward savvy end customers that are between 30 and 40 years old, have an average household income of over $100k, and live in California. After reaching the Q4 goal, this same bank sets itself the new objective of defending its IRA market share against aggressive competition in California.

Continue Reading

Cisco Is Turning Enterprise Pets into Scale Out Cattle

By Torsten Volk on Mar 7, 2017 11:01:31 AM

When we think back to why everyone’s favorite child named OpenStack failed so miserably to catch on in all but the largest enterprises, the conversation comes back to one central topic: OPEX. This topic consists of multiple dimensions:

Continue Reading

EMA Innovators of Cisco Live 2017 in Berlin

By Torsten Volk on Feb 27, 2017 1:12:26 PM

Jens Soeldner writing for iX Magazin, the largest German IT publication, and Torsten Volk of Enterprise Management Associations (EMA) have selected the two most outstanding and innovative vendors (out of 150 exhibitors) at last week’s Cisco Live event in Berlin. This EMA Innovators award crowns vendors that dare stepping outside the box to help their customers solve hard IT problems in a simpler, faster and often more cost effective manner.

Continue Reading

EMA Innovators of IBM Connect 2017

By Torsten Volk on Feb 23, 2017 4:43:29 PM

After three fascinating days at IBM Connect 2017, EMA crowned a very short list of vendors with the “EMA Innovators of IBM Connect 2017” award. These vendors are true game changers because they look at a traditional IT challenges from a whole new angle, which enables them to drive highly differentiated customer value. Please note that some of these vendor products might still be in an early or even experimental stage, but Enterprise Management Associates (EMA) believes that they are absolutely worth any IT professional’s time to check out.

Continue Reading

Artificial Intelligence and Machine Learning as the Guardians of Your Hybrid Data Center

By Torsten Volk on Feb 16, 2017 8:42:38 AM

Serverless computing, containers, IoT, DevOps, mobile workspaces and of course hybrid cloud are all technologies -and of course excellent buzzwords- with immediate impact on your organization’s security. Each one of these technologies increases the speed and agility of corporate IT, enabling your company to beat the competition. As enterprise IT complexity is exploding, this year’s RSA Conference attracted over 400 exhibitors and 45,000 attendees which makes it one of the largest IT events of the year, even bigger than the 2016 Amazon Re:Invent show.

Continue Reading

The Four Horsemen of the Hybrid Cloud Apocalypse – Vision of the Business Defined Data Center

By Torsten Volk on Feb 15, 2017 9:53:09 AM

EMA estimates that enterprises today waste over 50% of their IT budgets on inefficient application workload placement, configuration and management. As a side effect, they introduce tremendous operational risk in terms of security, regulatory compliance, performance and reliability.

Continue Reading

Cisco introduces “Digital Building” Catalyst switches for IoT

By Shamus McGillicuddy on Feb 10, 2017 5:03:17 PM

Cisco recently announced a new series of Catalyst “Digital Building” switches. These Catalyst switches are designed for connecting and powering Internet of Things (IoT) devices and systems in smart buildings and other related environments. For example, one design innovation is the use of a separate power plate for Power over Ethernet (PoE), so even when an administrator reboots the device or updates its software, the switch will continue to deliver power to peripheral devices such as smart lighting and surveillance cameras.

Continue Reading

Juniper founder steps away to run new startup Fungible: What is Fungible?

By Shamus McGillicuddy on Feb 10, 2017 10:45:30 AM

What is Fungible, Inc., the new startup created by Juniper Networks’ founder Pradeep Sindhu, working on?

Continue Reading

Unified Endpoint Management: Bringing Multi-Device Support to the Next Generation of Business Professionals

By Steve Brasen on Jan 31, 2017 4:16:42 PM

It’s hard to believe there was actually a time before mobile devices. It wasn’t even all that long ago. In fact, this month Apple is celebrating the 10th anniversary of the iPhone. While the iPhone was not the first smartphone, its introduction is credited with kick-starting the mobile revolution and initiating the “consumerization of IT,” forever changing how technology is developed, marketed, and utilized in business environments. In trying to relate these historical milestones to Millennials, I find myself more and more sounding like a crotchety old man: “Back in my day, we only had PCs—and we were glad to have ‘em, too!” Today, three-quarters of all business workers regularly use mobile devices to perform job tasks, so my nostalgic recollections of PC-only business environments are increasingly falling on disinterested ears.

Continue Reading

Dell EMC Opens Door to Bare-Metal Campus Switching

By Shamus McGillicuddy on Jan 26, 2017 2:02:37 PM

Back when Dell EMC was still just known as Dell, its networking business staked out a leadership position by becoming the first mainstream switch manufacturer to embrace bare-metal data center switching. Now it’s moving into the bare-metal campus switching market, too.

Topics: Featured
Continue Reading

Avaya’s Chapter 11 bankruptcy filing points to a sale of its networking business

By Shamus McGillicuddy on Jan 26, 2017 2:02:37 PM

Avaya will restructure its debt under the protection of a Chapter 11 bankruptcy filing. The company aims to emerge from this action intact with minimal impact on customers. However, it is very possible that Avaya will sell its network infrastructure business.

Topics: Featured
Continue Reading

The Software-Defined Future of the WAN

By Shamus McGillicuddy on Jan 26, 2017 2:02:36 PM

Software-defined networking (SDN) exploded onto the scene five years ago with a tremendous amount of hype, but the transition from hype to reality has been a little less explosive. Most enterprises are still in evaluation mode with SDN.

Topics: Featured
Continue Reading

How Network Infrastructure Teams Support the Internet of Things

By Shamus McGillicuddy on Jan 26, 2017 2:02:36 PM

[Editors Note: This blog post is sponsored by Infosim®, but the ideas expressed here are entirely my own]

Topics: Featured
Continue Reading

EdTech Networkers: Be Ready for Cloud, SDN, and IoT this Year

By Shamus McGillicuddy on Jan 26, 2017 2:02:35 PM

This sponsored blog post was originally published at at HelpSystems.com

Topics: Featured
Continue Reading

Cisco DNA is Marchitecture, But Also a Shift Away From CLI

By Shamus McGillicuddy on Jan 26, 2017 2:02:35 PM

The industry has seen plenty of marchitectures from Cisco and its peers over the years. Its newest one, Digital Network Architecture (DNA), feels different, especially after I spent a week at Cisco Live 2016. DNA is different because underneath all the slideware and demos is an apparent commitment to changing the way enterprises do networking. In other words, Cisco wants network engineers to rely less on their skills with its command line interface (CLI).

Topics: Featured
Continue Reading

Preparing Network Management for SDN and NFV

By Shamus McGillicuddy on Jan 26, 2017 2:02:34 PM

[Editor’s note: This blog is sponsored by Infosim®, but the content is entirely my own]

Topics: Featured
Continue Reading

Network Managers Should be Monitoring Servers

By Shamus McGillicuddy on Jan 26, 2017 2:02:33 PM

Editor’s Note: This article was originally published by HelpSystems on February  2, 2016.

Topics: Featured
Continue Reading

Early Adopters Define SDN

By Shamus McGillicuddy on Jan 26, 2017 2:02:33 PM

Greg Ferro recently blogged about how attempts to define software-defined networking (SDN) are a waste of time. He wrote:

Topics: Featured
Continue Reading

The Benefits of Leveraging MSPs for Performance and Security Monitoring

By Shamus McGillicuddy on Jan 26, 2017 2:02:32 PM

[Author’s Note: This post is sponsored by Edgeworx. The content is entirely mine.]

Topics: Featured
Continue Reading

Machine Learning and Artificial Intelligence for the Masses

By Torsten Volk on Jan 18, 2017 1:35:25 PM

Recently, I’ve been thinking about why we haven’t come all that far in machine learning and artificial intelligence over the previous decade. Today, Keen Browne, Bonsai’s Co-founder and Head of Product, summed it up for me in a concise manner: “The tools really suck and are meant for scientists and mathematicians, not for people who work for the line of business.”

Continue Reading

HPE Acquires Simplivity – A $650 Million Data Virtualization Play

By Torsten Volk on Jan 17, 2017 9:10:26 PM

Today, HPE paid $650 to acquire Simplivity. HPE paid this sizeable amount mainly to acquire OmniStack, Simplivity’s data virtualization software platform. OmniStack’s central value proposition is OPEX reduction through the elimination of traditional infrastructure management tasks. In short, Simplivity enables customers to manage their infrastructure at the virtual machine (VM) – level. Please note that there will be a separate EMA Impact Brief covering this topic in much more detail.

Continue Reading

The Truth Behind the Scope of the Endpoint Problem in the Enterprise

By David Monahan on Jan 12, 2017 6:41:06 PM

The Evolution of the “Endpoint”
Over the past few years, the perception of what an “endpoint” is, and therefore the definition, has changed. The original perception was a user workstation independent of operating system. With the expansion of functionality, data persistence, Internet connectivity, and ultimately the threats against them, that definition no longer applies. Laptops became included, then smartphones, servers, tablets, internal file shares, and dedicated or special function devices such as point of sale terminals and processors.

Continue Reading

Analytical Resolutions for Technologists and Tech Teams in 2017

By John Myers on Jan 5, 2017 9:03:35 AM

Ahhh, the annual resolutions list! A time-honored tradition when we all look at the new year as an opportunity for a fresh start.

Continue Reading

PODCAST: Discussing Big Data, Integration and Security

By John Myers on Jan 5, 2017 9:03:34 AM

Continue Reading

Dos and Don’ts for the Data Scientist

By John Myers on Jan 5, 2017 9:03:34 AM

Review of Statistics Done Wrong by Alex Reinhart

Since the advent of the big data era, organizations have been crying out for data scientists. Initially it was finding the true data scientist. But as these resources were considered scarce, it was a search for people who could hand-code analytical models in a Hadoop environment.  As statistical tools such as R, Alteryx, and RapidMiner augmented Hadoop environments, we started to include traditional tools such as SAS and SPSS. These data scientists, or data scientists in training, were asked to take large amounts of data and divine the nuggets that would create a “cross-sell/up-sell” recommendation engine that would launch the next Netflix or link two disparate data sets that explain how markets interact and find the next groundbreaking investment opportunity.

Continue Reading

PODCAST: Cloud Data Warehousing

By John Myers on Jan 5, 2017 9:03:34 AM

Continue Reading

Big Data and the Data-Driven Enterprise

By John Myers on Jan 5, 2017 9:03:34 AM

 

Continue Reading

How the EMA HDE Information Management Layer Impacts the Growth of Analytical Platforms

By John Myers on Jan 5, 2017 9:03:32 AM

The ability to execute in a low latency time frame is a core component of the concept of next generation data management architectures such as the Enterprise Management Associates Hybrid Data Ecosystem (HDE). One of the key business drivers of the HDE is speed of response,  which stems from an organization’s drive to execute faster than their competitors to create an advantage or to be on par with those competitors to simply “keep up with the Joneses.” You see this in workloads such as cross-sell/up-sell opportunities for revenue generation. You see this in opportunities to limit costs with asset logistics and labor scheduling optimization. You see this in opportunities to limit exposure to risk in fraud management and liquidity risk assessment.

Continue Reading

A Tribute to IoT Device Security Researchers

By David Monahan on Jan 3, 2017 9:34:22 AM

This blog in the Internet of Things (IoT) series comes as a tribute to security researchers everywhere. The autumn’s largest security-focused show is the Black Hat Security conference. If you are not familiar with Black Hat, it is a tech conference that started in 1997 and covers numerous security topics in various presentations that are fairly to highly technical. As mentioned in the first blog in the series, IoT-like systems have been around a long time. However, researchers began paying more public attention to IoT around 2011. Visibility on the subject of the security, or lack thereof, of IoTincreased in 2011, when researcher Jay Radcliffe demonstrated that medical devices; in this case, his own automated insulin pump, could be hacked to deliver a lethal dose of insulin.1 Since that time, there were numerous other IoT hacks in various fields, including:

Continue Reading

Enterprise IT Predictions for 2017 – Journey to a Business-Defined Hybrid Cloud

By Torsten Volk on Dec 29, 2016 8:15:34 AM

Customers in 2017 will demand solutions to claim back today’s massive CAPEX and OPEX waste of over 50% of their total IT spend. All our 2017 predictions are directly derived from the rapidly increasing pressure to reclaim these resources and leverage them to achieve direct business advantages in today’s highly competitive and fast moving marketplace.

Continue Reading

IoT Enterprise Risk Report

By David Monahan on Dec 21, 2016 2:47:12 PM

ForeScout recently released an IoT Enterprise Risk Report based on research from ethical hacker Samy Kamkar. Based on Kamkar’s findings, the report on IoT security issues could readily be renamed something like, “IoT: the bane of the enterprise environment,” or “IoT brings new meaning to the term ‘Enterprise Risk’.”

Continue Reading

Acronym Acrobatics: Relating UEM to UEM

By Steve Brasen on Dec 6, 2016 11:14:30 AM

An unfortunate side effect of maintaining a vibrant technology subculture is an over-reliance on acronyms to describe basic concepts and solutions. For instance, to be ITIL compliant a CTO may need to invoke the ARP of a TCP or UDP IPv6 WAN to determine the DNS entry of an SMTP server for a POS system to prevent GIGO and ensure WYSIWYG. Now, if you understood that statement, you are certainly among the lucky few “in the know” and probably use these terms on a regular basis. However, if you are unfamiliar with or had to look up any of those terms, you likely recognize the core problem. While acronyms are intended to simplify complex technical conversations, they actually impede successful communication if any participants are unaware of their meaning. Sometimes acronyms are introduced to shorten long-winded technobabble; sometimes they are developed as marketing devices to create unique sounding products; and often they evolve simply because they make techno-elitists sound more knowledgeable.

Continue Reading

How to Unleash the Full Value of Hybrid Cloud

By Torsten Volk on Nov 9, 2016 4:03:28 PM

In an ideal world, customers would be able to fully take advantage of the benefits of hybrid cloud by rationally matching infrastructure parameters -cost, performance, reliability, availability, security, regulatory compliance, scalability- with the requirements and dependencies of each application.

Continue Reading

VMware and OpenStack: A Marriage Made in Heaven?

By Torsten Volk on Nov 9, 2016 4:00:28 PM

As we -Evan and I- were ranting last week about how OpenStack and VMware fit together (see #EMACloudRants), we were mainly focusing on the central conundrum that VMware faces within this context: “Should we support an open platform that could commoditize away a substantial part of our profitable infrastructure business or should we ignore the threat and do our own thing”

Continue Reading

Software Defined Storage: The Vendor Landscape – Part 2 of 2

By Torsten Volk on Nov 9, 2016 4:00:27 PM

As promised in my previous post on “Software Defined Storage – Why Customers Should Care”, I want to follow-up with a brief overview of the competitive landscape.

Continue Reading

EMA Cloud Rants – Pilot Episode

By Torsten Volk on Nov 9, 2016 4:00:27 PM

Evan Quinn and I have been collecting popular customer questions for a while and wanted to share our thoughts on these questions in the form of a new format: EMA CLOUD RANTS. Each week we will discuss one of the hot topics in enterprise IT to provide the viewer with rapid analyst insights, without any fluff. Here goes the first one:

Continue Reading

The State of the Software Defined Data Center

By Torsten Volk on Nov 9, 2016 4:00:26 PM

Of course, I always encourage practitioners to carefully study the full EMA research report on the “Obstacles and Priorities on the Journey to the Software-Defined Data Center” or at least read the research study summary or at the very least join the EMA SDDC Research webinar on February 18, but I still want to briefly summarize the key findings here.

Continue Reading

EMA Research: Enabling Enterprise IT Management to Optimally Support Big Data

By Torsten Volk on Nov 9, 2016 4:00:26 PM

What does Big Data mean to traditional enterprise IT? Organizations of any size and industry are becoming more and more aware of the incredible importance of capturing, managing and analyzing the data available to them. The more comprehensively companies are able to tap structured and unstructured data sources, the quicker they can refresh this data and the more successfully they make this body of data available to all business units, the better they can develop advantages in the market place. Today’s business units are demanding the rapid implementation of these big data use cases, as well as optimal resiliency, cost efficiency, security and performance.

Continue Reading

Software Defined Storage: Why Customers Should Care – Part 1 of 2

By Torsten Volk on Nov 9, 2016 4:00:26 PM

Much marketing hype and heated discussions should be seen as excellent indicators for the fact that Software Defined Storage (SDS) is one of the hottest topics in today’s data center. Naturally, every vendor defines SDS based on their own product range, sometimes leaving customer out of the equation.

Continue Reading

Highlights from IBM Analyst Insights 2013

By Torsten Volk on Nov 9, 2016 3:59:25 PM

As every year, IBM invited the analyst community to Stamford, CT, for a deep dialogue on today’s most important topics in enterprise IT. Here is a short overview for everyone interested in IBM’s current world view.

Continue Reading

Rapid Evolution – OpenStack Is Growing Up

By Torsten Volk on Nov 9, 2016 3:59:24 PM

The Havana release of OpenStack was launched on October 17, about three weeks prior to the OpenStack Summit in Hong Kong.  As always, there are many new features -high availability, load balancing, easier upgrades, plugins for development tools, improved SDN support, fiber channel SAN support, improved bare metal capabilities- and even two new core components, Ceilometer -metering and monitoring- and Heat -orchestration of the creation of entire application environments- to admire. Without any doubt, OpenStack is becoming more enterprise ready with each new release .

Continue Reading

War of the Stacks: OpenStack vs. CloudStack vs. vCloud vs. Amazon EC2

By Torsten Volk on Nov 9, 2016 3:59:23 PM

When it comes to cloud technologies, discussions often get passionate or even heated. It’s all about the “war of the stacks”, where much Cool Aid is dispensed to get customers to buy into the respective cult. This discussion reminds me of the old days of enterprise IT, where everything was about technology instead of business value. You either bought one thing or the other and then you were locked in for a half decade. Dark times.

Continue Reading

Making Your Service Desk Less Vocal Actually Tells You Things Are as They Should Be

By Dennis Drogseth on Nov 4, 2016 3:03:32 PM

Optimizing the end-user experience has many dimensions to it, and one key element of them is ensuring that any issues from password reset, to application access, to support for multiple endpoints by a single user—are all addressed without your users feeling that they’re queuing up at the Department of Motor Vehicles. This blog leverages EMA research to examine how a truly efficient service desk can make itself all the more effective by becoming more transparent, less verbally visible, and yet ultimately far more end-user empowering.

Continue Reading

How to Unleash the Full Value of Hybrid Cloud

By admin on Oct 25, 2016 1:37:52 PM

In an ideal world, customers would be able to fully take advantage of the benefits of hybrid cloud by rationally matching infrastructure parameters -cost, performance, reliability, availability, security, regulatory compliance, scalability- with the requirements and dependencies of each application.

Topics: Uncategorized
Continue Reading

How to Unleash the Full Value of Hybrid Cloud

By Torsten Volk on Oct 24, 2016 12:26:50 PM

In an ideal world, customers would be able to fully take advantage of the benefits of hybrid cloud by rationally matching infrastructure parameters -cost, performance, reliability, availability, security, regulatory compliance, scalability- with the requirements and dependencies of each application.

Continue Reading

The Magnificent Seven ITSM 2.0 Challenges

By Dennis Drogseth on Oct 11, 2016 3:03:31 PM

This is my second blog targeting the next generation of IT service management, or ITSM 2.0. The first blog described the characteristics I see as defining ITSM 2.0. Here we’ll look more closely at the key challenges you might face in getting there from a more traditional ITSM background.

Continue Reading

Introducing IT Service Management (ITSM) 2.0: A Cornerstone for Digital and IT Transformation

By Dennis Drogseth on Sep 27, 2016 3:38:11 PM

Over the course of numerous deployment dialogs and multiple research projects starting with last year’s work on “ITSM futures,” I have been tracking a still largely unheralded phenomenon: ITSM teams in many organizations are evolving to take a leadership role in helping all of IT become more efficient, more business aligned, and ever more relevant [...]

Continue Reading

The Real Reason Apple Users Are Treated Like Second-Class Citizens

By Steve Brasen on Sep 26, 2016 3:03:15 PM

(With apologies to Jeff Foxworthy) You might be an Apple user if…

Continue Reading

The Top 5 IoT Lessons I Learned From Hollywood

By David Monahan on Sep 23, 2016 12:07:46 PM

In my last IoT blog, I talked about the history of IoT and the evolution of issues surrounding IoT devices. In this part of the series, we will expand on the issues around IoT and the data it collects.

Continue Reading

Endpoint Management and Security – More Effective as Partners than Adversaries

By Steve Brasen on Sep 2, 2016 10:59:52 AM

The primary function of enterprise IT management is to empower end users with access to technology resources that will boost their productivity and job performance. However, this focus is at odds with the core precepts of IT security which are adopted to minimize the exposure of enterprise systems, applications, and data. I recall that in a number of IT operations management adventures throughout my career, I often joked with colleagues that the most effective way to create a secure environment is to simply shut down all computers in the data center. Naturally, management executives dependent on the IT infrastructure to generate revenue were not amused by my flippancy…and even less happy that their workers had to “jump through hoops” to gain access to IT resources.

Continue Reading

Increased Focus on Digital Experience Management Prompts New Research- Done Jointly by Dennis Drogseth and Julie Craig

By Dennis Drogseth on Aug 26, 2016 9:11:12 AM

Digital and user experience management has been the focus of multiple EMA research studies throughout the years, both as a stand-alone topic and as part of EMA’s ongoing examination of critical trends such as digital and operational transformation, IT performance optimization, and of course application performance management (APM).  In many respects, optimizing the digital experience [...]

Continue Reading

The Enterprise Service Catalog—Unifying IT Services for the Digital Age

By Dennis Drogseth on Aug 26, 2016 9:11:11 AM

While service catalogs are not new, they are becoming increasingly critical to enterprises seeking to optimize IT efficiencies, service delivery and business outcomes. They are also a way of supporting both enterprise and IT services, as well as optimizing IT for cost and value with critical metrics and insights. In this blog we’ll look at [...]

Continue Reading

How Is Cloud Changing the Face of IT Service Management?

By Dennis Drogseth on Aug 26, 2016 9:11:11 AM

Cloud is no longer a new topic for IT, or for IT service management (ITSM). But its impact on how ITSM teams work, as well as on how IT works overall, has probably never been greater. Indeed, more and more IT organizations have been “moving to the cloud.” But understanding its relevance can’t be achieved [...]

Continue Reading

Effective Security Requires a Change in Mindset and the Protection Paradigm

By David Monahan on Aug 24, 2016 11:05:53 AM

Nearly every day another successful breach is reported. In 2016 alone, organizations from major governmental agencies such as the IRS and Department of Defense, to major retailers including Wendy’s, have succumbed to attack. These organizations are not alone; every major business and governmental sector has been compromised. Large tech companies such as LinkedIn and Oracle, healthcare providers including Premier Healthcare (as well as numerous hospitals), manufacturers, major educational institutions, and large financial organizations have all succumbed to either internal or external threats.

Continue Reading

Windows 10…One Year Later

By Steve Brasen on Aug 18, 2016 1:58:29 PM

Time flies when you’re upgrading operating systems. It has officially been a year since Microsoft introduced Windows 10 to much fanfare and approbation. Acceptance of the platform was almost immediate, with many users simply grateful to migrate away from the much-maligned Windows 8 environment. At the core of the problems with the previous edition of Microsoft’s flagship OS was that the GUI was designed to function more effectively on a tablet than on a PC, which infuriated users who had grown used to the Windows 7 look and feel on their laptops and desktops. The release of Windows 10 gave Microsoft’s core audience exactly what it wanted—a unified code base that enables the same applications to be employed on all device architectures (desktops, laptops, tablets, and smartphones) while retaining the look and feel of the classic Windows 7 desktop that they had come to appreciate.

Continue Reading

IoT Devices in the Network: Can you find them?

By David Monahan on Aug 10, 2016 2:26:18 PM

In the last year or so, the topic of Internet of Things (IoT) received a lot of attention. Both the concept of the topic and scope of what should be included in IoT changed dramatically in that time. The first commercialization of IoT were wearables such as GoogleGlass. Shortly thereafter came the next wave, with devices such as smart watches. The first security concerns were focused on personal safety due to user distractions, similar to those voiced when smartphones became popular, and then came the invasion of privacy concerns. However, shortly after the first hackers got hold of them and identified attacks to gather data from them. At that point, the view on IoT expanded to recognize that the concept of IoT was actually much broader and had more significant impacts than privacy.

Continue Reading

Tips on Getting the Most Out of Your 1:1 iPad Education Program

By Steve Brasen on Jul 5, 2016 8:18:16 AM

There is no greater investment we can make in the future than to prepare our children to successfully navigate the challenges of tomorrow. Of course, predicting the workforce requirements of the future is a bit like trying to capture a fly with a cargo net—just when you think you have it, it slips through the holes and buzzes in a different direction. Nonetheless, it’s safe to assume that workforce mobility will be an essential aspect of the coming generation’s career experiences. Mobile technology is already an integral part of nearly every business role, and its use can only be expected to increase in the years to come. To help support this revolution, Apple has pledged to donate $100 million worth of teaching and learning technology to 114 underserved schools across the country and has offered special discount pricing and volume-purchase programs to all educational institutions. A large number of grade schools have embraced these financial enticements and introduced 1:1 iPad programs that provide every student with their own personal iPad to be used during the duration of a school term.

Continue Reading

Q&A from EMA Radar for Workload Automation (WLA): Q1 2016 Webinar

By Dan Twing on May 2, 2016 11:15:13 AM

I recently presented findings from my EMA Radar for Workload Automation (WLA): Q1 2016 report. The recording for the webinar is now live here.

Continue Reading

Linux on Power—Poised for Greatness

By Steve Brasen on Apr 22, 2016 11:12:45 AM

For two decades, IBM’s Power Systems family of high-performance servers has been considered the premier alternative to x86-based systems. Combining fast processing, high availability, and rapid scalability, Power Systems are optimized to support big data and cloud architectures. Popularly deployed to run IBM’s AIX and IBM i operating systems, the platform has seen stiff competition in recent years from x86-based Linux systems. In 2013, IBM responded to this challenge by investing a billion dollars into the development of enhancements to the Power line that would support Linux operating systems and open source technologies. This bold move was hailed as a strategy that would greatly improve the attractiveness of the platform and drive broader adoption.

Continue Reading

The Desperate Need for Accuracy and Efficiency in Security for Detecting Network Intruders and Other Threat Actors Quickly

By David Monahan on Apr 14, 2016 2:37:49 PM

According to 2015 research reports published by Ponemon, Mandiant, and others, median intruder dwell time in a target network prior to detection ranges from just under to just over 200 days. That is a little over six months and as everyone agrees, totally unacceptable.

Continue Reading

5 Reasons to Transition From the Dark Ages to the Digital Age With a Document Management System

By Steve Brasen on Apr 11, 2016 1:18:47 PM

We live in the digital age—or at least many of us do. Today’s IT-savvy users expect to be able to access any data, form, or record from any device at any location and at any time. However, some organizations seem to be perpetually stuck in the dark ages, relying on antiquated paper documents and physical filing cabinets for document retention. Other businesses may have documents in electronic form but lack any method for organizing them beyond just saving them to a basic filesystem. I’ve even known business professionals who store critical records in archive folders in their email package because they lack any other method for document organization. Electronic document management has never been more essential, and organizations that fail to provide adequate document support either will not be able to compete effectively against businesses that do or, even worse, will fail to meet compliance objectives and lose customers due to an inability to provide adequate support services.

Continue Reading

Q&A from EMA Radar for Workload Automation (WLA): Q1 2016

By Dan Twing on Mar 16, 2016 8:05:41 AM

Earlier today I presented findings from my recent EMA Radar for Workload Automation (WLA): Q1 2016 report. The recording for the webinar is now live here.

Continue Reading

Automation is Key to Staying in the Driver’s Seat of Your Data-driven Strategy

By Dan Twing on Feb 8, 2016 12:54:28 PM

More and more organizations are increasing the use of data in their decision making. EMA describes this as having a data-driven strategy. Recent research has revealed that almost 63% of respondents included data-driven strategies in their organization at a significant level. EMA has been tracking the growth of big data with annual research since 2012. From our 2015 research, you can see in the chart below how organizations are moving forward with their big data projects.

Continue Reading

2016: Looking Ahead at ITSM—Want to Place Any Bets?

By Dennis Drogseth on Jan 22, 2016 12:52:29 PM

I thought I’d begin the year by making some predictions about what to look for in 2016 in the area of IT service management (ITSM).  For those of you who have been following my blogs with any regularity, and particularly for those who sat in on our webinar for the research report “What Is the [...]

Continue Reading

Who Owns User and Customer Experience Management?

By Dennis Drogseth on Jan 22, 2016 12:52:28 PM

There is growing industry attention to user, customer, and digital experience management—often condensed by the acronym UEM for “user experience management.” This attention is more than justified, but most of the buzz leaves out critical questions like, “What is user experience management?”, “Who really runs (or who should run) the UEM show in the digital [...]

Continue Reading

PODCAST: Discussing Qlik unSummit and QlikView 12

By John Myers on Jan 5, 2016 9:03:35 AM

Continue Reading

HEAT Software Meets the Need for Endpoint Protection Head-On

By David Monahan on Dec 11, 2015 12:40:49 PM

In many organizations, endpoints see virtually constant change. Users access, download, and utilize applications, data, drivers, files, toolbars, widgets, etc., introducing both new security threats and undocumented changes in systems and processes. For better or for worse, all of these activities leave their mark on the endpoint.

Continue Reading

Best Practices for Innovating Through Cloud Technologies – Utilizing Public, Private, and Hybrid Cloud

By Dan Twing on Nov 25, 2015 9:15:12 AM

Cloud computing can speed up deployment, reduce costs, and increase efficiency and connectivity. It can open up new ways to get computing work done, but more importantly, the inherent connectivity can change the way employees interact with each other and with customers. It can also change the way companies interact with suppliers and partners. The ease of standing up new apps and connecting with users through mobile devices, as well as the minimal capital investment, can spur innovation.

Continue Reading

The Rise of Thingbots in the Internet of Things (IoT)

By David Monahan on Nov 20, 2015 12:50:39 PM

The Internet can be a pretty scary place. Places like the dark web exist in the form of trading houses with stolen personal information from credit cards and social security numbers, to health records and full identities being obtained for a price. Malware development and deployment and other attack services such as DDoS and botnets can be rented by the hour. Recent reports indicate that DDoS attacks are increasing in both frequency and size, and the problem of botnets being used as attack networks or launch points in DDoS and other malicious activities is significant. Indications are that it will only continue to get worse.

Continue Reading

EMA Research Shows that Cyber Security is Achieving Executive Visibility in a Big Way

By David Monahan on Nov 20, 2015 12:50:32 PM

One of the services that EMA provides to the tech industry is research. During the course of the year, numerous projects are launched to help IT consumers and vendors understand market perceptions. EMA then provides analysis and forecasts on trends based upon those perceptions.

Continue Reading

Why Analytics and Automation Are Central to ITSM Transformation

By Dennis Drogseth on Nov 9, 2015 11:12:00 AM

In research done earlier this year, we looked at changing patterns of IT service management (ITSM) adoption across a population of 270 respondents in North America and Europe. One of the standout themes that emerged from our findings was the need for the service desk to become a more automated and analytically empowered center of [...]

Continue Reading

Digital Transformation and the New War Room

By Dennis Drogseth on Nov 3, 2015 10:42:46 AM

In August EMA surveyed 306 respondents in North America, England, France, Germany, Australia, China and India about digital and IT transformation. The goal was in part to create a heat map around just what digital and IT transformation were in the minds of both IT and business stakeholders. We targeted mostly leadership roles, but also [...]

Continue Reading

User Experience Matters in Self-Service Provisioning

By Steve Brasen on Oct 26, 2015 12:08:22 PM

If you’re like me, you are increasingly becoming reliant on online shopping to replace the more arduous task of physical in-store shopping. I find this is particularly true during the holiday season when the idea of fighting traffic and elbowing crowds to desperately search numerous shops in order to find just the right gift for Aunt Phillis (who’s just going to hate whatever she receives anyway) gives way to the more idyllic setting of web-surfing multiple stores simultaneously from the privacy of your home while the dulcet tones of Nat King Cole playing gently in the background lull you into the holiday spirit (a little spiced eggnog on the side doesn’t hurt either). But have you ever stopped to consider why you shop at some websites and not at others? Certainly item prices have something to do with it, as does the breadth of product selection. However, there is almost certainly a third element involved—one of which you may not even be consciously aware: The quality of the online store shopping experience directly impacts the likelihood that you (and other consumers) will purchase items on it. Websites that are friendly, professional, and easy to use are far more likely to produce sales than those that are confusing and difficult to navigate.

Continue Reading

Top 5 Reasons IT Administrators Are Working Too Hard Managing Endpoints

By Steve Brasen on Oct 9, 2015 10:25:18 AM

IT administration is a thankless job. Let’s face it—the only time admins gain any recognition is when something goes wrong. In fact, the most successful IT administrators proactively manage very stable environments where very few failures and performance degradations occur. Unfortunately, though, this is rarely the case, and it is far more common for admins to get stuck in the break/fix cycle of reactive “firefighting” where problems are never truly resolved and are destined to occur again. Making matters worse, increasing requirements for mobility, business agility, high performance, and high availability have substantially increased IT administrator workloads. With this kind of pressure, it’s no wonder IT professionals are frustrated.

Continue Reading

Running Containers Doesn’t Have To Mean Running Blind

By Dan Twing on Oct 6, 2015 2:17:15 PM

The idea of containers has been around for a long time in various forms on various operating systems. It has been part of the Linux kernel since version 2.6.24 was released in 2008. However, containers did not become mainstream until a couple years ago when Docker was first released in March 2013. Docker introduced container management tools and a packaging format, which made container technologies accessible to developers without Linux kernel expertise. By doing so Docker led the way to making containers mainstream as well as one of the hottest trends in application development and deployment because it simplified the way applications are packaged. While this has big advantages, containers are still early in their lifecycle and lack operational maturity. The ease of use with which Docker images can be created leads to image sprawl, previously seen with VMs, and exacerbates the problem of managing security and compliance of these images. Container environments do not integrate well to existing developer tools, complicating team development due to a lack of staging and versioning for preproduction and production promotion. Also, containers do not integrate with existing monitoring tools, complicating management. However, new tools are being developed targeting Docker as an application delivery format and execution environment by an ever-growing Docker community. Many of the benefits are on the development side of the house, with the promise of DevOps benefits. Running in production can be a different story.

Continue Reading

Are Laptops Really Mobile Devices?

By Steve Brasen on Sep 25, 2015 10:39:16 AM

When people think of IT mobility, the images most immediately conjured regard smartphones and tablets. In truth, however the mobile device landscape could be considered broader than this. The basic definition of a mobile device is simply “any computing device designed principally for portability.” By that definition, laptops should clearly be included in that scope. However, some definitions state that a mobile device must be “handheld” indicating size is a factor without actually specifying how small a device must be to achieve that designation. Regardless of size limitations, those definitions still favor inclusion of laptops since many are available with a form facture that is smaller than some of the larger tablets. Therefore, the defining descriptor for a mobile device must fall to its portability, which also happens to be the key differentiator between a laptop and a desktop PC. Logically, therefor, a laptop is, in fact, a mobile device.

Continue Reading
  • There are no suggestions because the search field is empty.

Lists by Topic

see all

Posts by Topic

see all

Recent Posts