Tableau Sets the Tone for Business Intelligence 2019

By John Santaferraro on Nov 7, 2018 11:57:56 AM

From community to consumers of data, Tableau Conference 2018 (TC18) set the tone for the business intelligence market in 2019.

Continue Reading

Salesforce Honors Customers, Boosts Sales Productivity: Gleanings from an Industry Analyst Observer

By John Santaferraro on Oct 9, 2018 12:44:15 PM

I could spend pages and days talking all about the new technology that was released at Dreamforce 2018, but I am going to take the higher road and discuss what Dreamforce 2018 means to customer organizations. Salesforce demonstrated that it cares about its customers and is committed to increasing the productivity of customer-facing teams around the world. Of course, if customer-facing teams are more productive, that will mean increased revenue, higher customer satisfaction, and a palpable competitive advantage.

The C-Suite Should see Gains in Productivity and Profitability

Many sales leaders complain about the challenge of getting sales representatives to enter information into their sales automation systems. The results are incomplete information and the inability to properly forecast and manage sales teams for success. The introduction of Einstein Voice allows sales teams to interact with Salesforce products over their morning coffee or handsfree on their drive home, freeing them to do more of what they are paid to do: sell.

Continue Reading

Cyber Attackers Turn Their Sight to ERP Applications

By Paula Musich on Sep 26, 2018 7:58:29 AM

In late July, the Department of Homeland Security issued a warning about a growing number of malicious cyberattacks aimed at ERP systems based on a research project conducted by Digital Shadows and Onapsis. This warning comes at the heels of the first-ever DHS CERT Alert focused on SAP Business Applications released in May of 2016. According to the report, hackers exploited old, unpatched vulnerabilities to successfully hack multiple organizations, including government agencies, energy businesses, and financial services companies. Onapsis and Digital Shadows found significant evidence of increased interest on ERP applications, including bad actors in criminal forums on the dark web asking for exploits specifically targeting ERP technology vulnerabilities. The study, “ERP Applications Under Fire: How Cyberattackers Target the Crown Jewels,” found that the attackers do not need to use advanced techniques to breach their targets because the current state of ERP application security across organizations is such that old vulnerabilities still affect these systems. This means that attackers don’t need to develop new zero-days or advanced exploitation techniques.

Continue Reading

EMA Perspectives – Informatica Makes Sparks Fly in the Cloud

By John Santaferraro on Sep 18, 2018 11:54:08 AM

On September 12, 2018, at Strata NYC, Informatica announced a data management solution for Apache Spark-based cloud environments, including Google Cloud Dataproc, Qubole, and Azure Databricks. Touting new advancements in CLAIRE™, a metadata intelligence technology powered by artificial intelligence (AI) and machine learning, this new release is targeted at increasing the efficiency and reach of data management organizations. To expand efficiency, Informatica is releasing more than 50 new algorithms and functions for automated data discovery and preparation, as well as machine learning focused on industrializing data operations.

Continue Reading

Public Clouds Are Disrupting Enterprise Network Management

By Shamus McGillicuddy on Sep 14, 2018 3:31:41 PM

Network managers who are supporting the migration of critical applications to the public cloud will need a new set of tools for engineering and operations.

Continue Reading

3 Key Lessons from DockerCon 2018: Strategic Analysis of the Container Market Place

By Torsten Volk on Jun 26, 2018 5:21:30 AM

Today, where there are almost as many approaches to digital transformation as there are enterprise software vendors, Docker refocuses its strategy on providing the best unified container management platform for DevOps. Docker’s key value proposition is to enable developers to build an application once and then deploy it to any Kubernetes-driven private or public cloud, where DevOps teams and IT operations can manage it throughout its lifecycle and move it to another location at any point in time. However, Docker also aims to absorb traditional enterprise applications, edge and IoT workloads, big data apps, blockchain, and serverless functions, both on Windows and on Linux.

Continue Reading

Future-Proofing Your EDR Solution

By Steve Brasen on Jun 19, 2018 5:16:04 PM

EMA recently published primary research on the topic of “Adopting Effective Solutions in Endpoint Detection and Response,” which included a detailed comparison of two of the most popular platforms on the market today: Tanium and 1E Tachyon. Put simply, Endpoint Detection and Response (EDR) solutions represent a classification of management tools designed to proactively provide the holistic visibility and rapid automation necessary to respond to endpoint security threats and administration requirements in real-time. The purpose of the evaluation was to provide an example of how to conduct a side-by-side comparison of EDR solutions in order to determine the optimal platform for meeting current endpoint management requirements.

Continue Reading

Cisco Live 2018: Forget Hardware, Cisco Is All About Software

By Shamus McGillicuddy on Jun 14, 2018 4:17:51 PM

For years network engineers have built lucrative careers upon their wizardly knowledge of things like network protocols, hardware specifications, and the Cisco command line interface (CLI). These skills are still essential to network engineering, but they are emblematic of a highly manual, box-by-box era of network engineering and operations. Today’s enterprises need agile, programmatic networks that leverage software, automation, and more

Continue Reading

Putting the User into “User Experience Management”

By Dennis Drogseth on May 31, 2018 8:05:11 AM

In the course of researching, documenting and advising on user experience management needs and directions for more than a decade, I’ve found myself waging a quiet (and sometimes not so quiet) war with several industry assumptions. Chief among these is the notion that user experience management (UEM) is purely a subset of application performance management (APM). This APM-centricity misses some of UEM’s most critical value points, and in a basic sense fails to recognize what UEM is truly about.

Continue Reading

Thoughts and Lessons Learned From an Analyst and CISO Conference

By David Monahan on May 15, 2018 8:52:00 AM

The week of April 30, 2018, I spent a few days in the great city of London at “The IT security Analyst and CISO Forum,” a small, invitation-only event hosted by Eskenzi PR and Marketing. It was my first year at the event, so I wasn’t sure what to expect. After I arrived, it was obvious the Eskenzi PR team had this event down. It was well orchestrated and executed, and the entire team was very professional.

Continue Reading

Top 10 from Dell Technologies World in 2018 – Quick Edition

By Torsten Volk on May 4, 2018 10:11:25 AM

OpenManage Enterprise is a big deal, but underrated: OpenManage Enterprise is the new infrastructure automation platform that could unlock the private and hybrid cloud for Dell. Deploying Dell infrastructure through a simple YAML file is within reach.

Continue Reading

EMA Digital Attacker Scorecard

By Torsten Volk on Apr 18, 2018 10:59:58 AM

Topics: Uncategorized
Continue Reading

Artificial Intelligence Delivered WYSIWYG-Style

By Torsten Volk on Apr 12, 2018 10:22:33 AM

Companies who manage to put AI capabilities into the hands of each and every business employee will be vastly successful in the marketplace. Enabling business employees to back up their decisions with data will dramatically increase staff productivity. At the same time, employees will feel empowered by their new ability to make much more informed decisions and automating certain tasks, based on intelligence derived from operations and market data that is now available to them.

Continue Reading

IBM’s Differentiation in 10 Quotes from Think 2018 – Let’s Put Smart to Work

By Torsten Volk on Mar 27, 2018 7:29:10 AM

Here are the 10 quotes that best sum up #Think2018. Inspired by Think 2018, I came up with my own ideas for AI bots and posted them here.

Continue Reading

Understanding Network-as-a-Service from Alcatel-Lucent Enterprise

By Shamus McGillicuddy on Mar 19, 2018 10:44:00 AM

Editor’s note: This blog post was sponsored by Alcatel-Lucent Enterprise, but the sentiments are entirely my own.

Continue Reading

11 Golden Rules to De-stress Your DevOps Process

By Torsten Volk on Mar 14, 2018 9:44:08 AM

With development teams working on 3-4 releases in parallel and releasing at least once a quarter, we often see release overhead consuming an average of 20-30% of development and operations resources. Enterprises releasing every month, week, or even day suffer from even larger overhead. Here is what you can do to free up most of these 20-30% for the faster creation of new critical software features: to enhance customer value:

Continue Reading

How an EMA Top 3 Product Is Selected – Quick Overview by the Example of Chef Habitat and InSpec

By Torsten Volk on Mar 2, 2018 10:56:35 AM

The EMA Top 3 report for Container Management and DevOps in Production and at Scale is a curated collection of a large number of data points that reflect individual priorities, pain points, technology adoption patterns, requirements, opinions, and so on, of 300 enterprises. It then dives deeper into these individual data points to provide readers with enough context to inform their technology selection process to some degree. However, each reader needs to pick out the nuggets that are the most relevant to him or her and then draw her own conclusions. Look at it this way: the EMA Top 3 polls 300 of your peers on 58 container and DevOps related questions and you can learn from the answers without having 300 separate conversations.

Continue Reading

What is Advanced Network Analytics? Cutting Through the Hype

By Shamus McGillicuddy on Feb 19, 2018 10:26:00 AM

Everyone wants to talk about how analytics is the future of network engineering and operations. The phrase “network analytics” is used by vendors of various stripes to imply that a particular technology is smarter and better than the average solution.

Continue Reading

Solve the Cloud Networking Conundrum With SD-WAN

By Shamus McGillicuddy on Jan 9, 2018 2:41:04 PM

Enterprise networking professionals have a cloud problem, even if they don’t know it. Software-defined WAN (SD-WAN) solutions can help them solve this problem.

Continue Reading

Why Machine Learning Diagnoses Cancer but Can’t Run our Hybrid Cloud

By Torsten Volk on Jan 9, 2018 10:05:16 AM

Why Machine Learning Diagnoses Cancer but Can’t Run our Hybrid Cloud

Continue Reading

Limitations of Neural Network Learning and How They Should Be Attacked in 2018

By Torsten Volk on Jan 3, 2018 2:00:53 PM

Neural Networks Are Key in 2018

Neural networks are back, but please don’t think they are able to emulate the context awareness of the human brain. Don’t get me wrong, I believe that the neural network approach is a viable one, but we do need to be clear about its limitations. All of these limitations are rooted in the limited 'worldview' the neural network is able to take in. This worldview is limited as it relies on a human being with limited time and knowledge creating the neural network topology by providing the following components and enough sample data for the machine to determine how input should be processed.

Continue Reading

Top 3 Coding Toys and Apps for Kids that Are as much Fun for Parents

By Torsten Volk on Dec 29, 2017 12:55:37 PM

My constant search for the next ‘cool’ tech toy or app is inspired by my obsession for automation. Trying to teach my 4 and 6 year old kids to think of creative solutions for their repetitive problems (no, there’s not yet a robot that cleans their rooms) surfaced the following 3 top toys and top apps in 2017.

Continue Reading

7 IT Operations Challenges to Attack in 2018 – EMA Punch List

By Torsten Volk on Dec 28, 2017 12:46:11 PM

Digital attackers in 2018 need to focus on one key challenge: “how do I deliver the best possible value to my clients, without significantly increasing cost.“

Continue Reading

6 Recommendations for Machine Learning and Artificial Intelligence in 2018

By Torsten Volk on Dec 26, 2017 12:20:52 PM

In 2017, CEOs arrived at the conclusion that machine learning and artificial intelligence (ML / AI) will be critical to unlock competitive advantages in the future. However, most enterprises had very little understanding of exactly what is possible today and how much value the investment in various ML / AI technologies can bring. Here are my six key recommendations for 2018:

Continue Reading

The Frustrations of Applied Machine Learning – A Not So Common Case Study

By Torsten Volk on Dec 17, 2017 1:33:54 PM

Now that I’ve predicted that in 2018 machine learning will be available to ‘average Joe developer,’ let me share my experience from this weekend. Note that I’m not trying to be a ‘cool geek’ by doing some hands on work (I’m way too old to still be cool), but based on all the machine learning and artificial intelligence buzz in 2017, I thought my use case should be quick, simple, and most importantly solving a problem that could otherwise not be solved.

Continue Reading

Top 10 enterprise IT Predictions for 2018 – Release Faster, Cheaper, and at Higher Quality – Everything Is about Becoming a Digital Attacker

By Torsten Volk on Dec 10, 2017 2:26:13 PM

For readers who would like to see what happened to our 2017 predictions, please take a look. Jens Soeldner and the EMA Team sat down again this month to look into the crystal ball for 2018.

Continue Reading

10 Priorities for Container Management in Production and at Scale in 2018 – EMA Top 3 Report and Decision Guide for Enterprise – Sneak Peak

By Torsten Volk on Dec 5, 2017 3:15:15 PM

Here's the Sneak Peak to the EMA Container Management in Production and at Scale research project that so many of you have been asking about over the previous 2 months.

Continue Reading

AWS Re:Invent 2017 – Two Big Time Machine Learning Highlights

By Torsten Volk on Dec 4, 2017 9:33:31 AM

“We want everyday developers (...) to be able to use machine learning much more extensively.” This is Andy Jassy’s mantra targeted at making AWS the company that turns machine learning into a commodity, similar to what the company achieved for IaaS before. Within this context, the following two new offerings stood out of the glut of machine learning and IoT news at Re:Invent 2017.

Continue Reading

AWS Re:Invent 2017 – Serverless Containers, Managed Kubernetes, Bare Metal, Machine Learning, and IoT

By Torsten Volk on Dec 1, 2017 9:56:21 AM

Breaking the Triangle of Cost, Quality, and Speed

This year’s AWS Reinvent delivered major announcements in DevOps, machine learning and IoT. All of the announced capability aim to eliminate infrastructure as the bottleneck for enterprises to become ‘digital attackers’. Observing the nearly 50.000 developers, architects, and software operators that came to Reinvent showed us a significant degree of genuine excitement about Amazon helping enterprises release new software faster, at a higher quality and lower cost.

Continue Reading

Intent Driven DevOps – A New Journey to NoOps

By Torsten Volk on Nov 27, 2017 6:07:38 PM

First Came Autonomic Computing
‘Autonomic Computing’ was the original concept of providing systems and apps with the power autonomously responding to unpredictable challenges. ‘Autonomic Computing’ came with all the right ideas (IBM deserves a good share of credit for defining this concept), but failed due to the same cultural and technological barriers DevOps is struggling with today. There simply was not enough ‘pressure to innovate.' This allowed inertia to prevail, leading to 'business as usual,' instead of magical self-healing and self-optimizing datacenter infrastructure.

Continue Reading

DevOps Enterprise Summit 2017 in SFO – Real Life DevOps Demystified

By Torsten Volk on Nov 17, 2017 1:39:24 PM

This year’s DevOps Enterprise Summit (DOES) in San Francisco was carried by the enthusiasm of 1500 practitioners who were genuinely enthusiastic about how DevOps can transform their enterprises into a ‘digital attacker.’ Digital attackers rely as DevOps as their innovation engine to rapidly release high quality software that offers measurable business value. In short, digital attackers bully their competition by offering best in class customer value on an continuous basis and in a cost effective manner.

Continue Reading

CA Technologies Pushes for Diversity in Tech Industry

By Shamus McGillicuddy on Nov 16, 2017 2:41:03 PM

Despite what you hear from trolls, bigots, and misogynists, diversity in the technology industry is a good thing. But the philosophy of diversity needs more champions. Tech companies and IT organizations need to expand their workforce beyond the herds of white men that have dominated the industry for decades.

Continue Reading

SDDC 2.0 with Kubernetes, Apigee, and Istio – Cisco’s Collaboration with Google Follows a Grander Vision

By Torsten Volk on Oct 27, 2017 10:13:23 AM

On October 25, Cisco and Google announced their hybrid cloud partnership, where Google brings the container runtime (Kubernetes), the platform to provide, manage, and consume APIs (Apigee), and of course a wide range of consumable cloud services (visual recogngition, machine learning, text to voice, etc.). Cisco contributes the hyperconverged infrastructure (Hyperflex) with Kubernetes management (Harmony), networking (Nexus 9k), and hybrid cloud management software (CloudCenter) to integrate Google’s public cloud services with the customer’s local data center.

Continue Reading

Microsoft Pulling ahead of Amazon with its fully Managed Kubernetes Offering

By Torsten Volk on Oct 25, 2017 9:00:55 AM

Azure Container Service (now AKS where the K stands for Kubernetes) is now offers managed Kubernetes as Tech Preview. This new service provides single-line install (az aks create –n myCluster –g myResourceGroup), automated upgrades, self-healing, and scaling. Microsoft promises that the Azure control plane for Kubernetes will remain free (AWS charges for management servers), with customers only paying for worker nodes running applications. Like all other major vendors, Microsoft declares Kubernetes the winner of the container orchestrator and scheduler race and stresses its contribution to the open source project (only 37 commits, compared to 114 by IBM, 668 by Red Hat, and 1543 by Google as of October 25, 2017). Microsoft also stresses the importance of its Draft project (acquired through Deis) to make Kubernetes accessible to developers without any container experience. Today, Amazon does not offer managed Kubernetes, but it is expected that there will be an announcement in this regard at re:Invent in November.

Continue Reading

The Scheduler Race is Over – Why Kubernetes Won and What it Means to the Market

By Torsten Volk on Oct 19, 2017 11:51:23 AM

What Happened?

Continue Reading

Struggling to Turn Around – Finally Docker Announces Kubernetes Support

By Torsten Volk on Oct 18, 2017 9:27:18 AM

Docker used the picturesque setting of its Copenhagen DockerCon event to announce Kubernetes support for both, Docker Enterprise Edition and Docker Community Edition. The company plans to deliver betas for end of 2017.

Continue Reading

SDN and the Data Center of the Future

By Shamus McGillicuddy on Oct 16, 2017 12:42:17 PM

Despite some recent obituaries published by my peers, software-defined networking is not dead. But perhaps certain aspects of it are dead or dying. If that’s the case, I say: “SDN is dead. Long live SDN.”

Continue Reading

EMA Enterprise Decision Guide: Container Management in Production and at Scale

By Torsten Volk on Oct 9, 2017 11:09:24 AM

I’m excited to kick off this project, as no other topic in IT seems to have so many different aspects to consider and so many points to attack it. As, hopefully, in all our EMA research projects, we will look at this topic from all angles without any predetermined outcomes. The project will be exclusively guided by what’s best for the customer when it comes to ramping up a container strategy.

Continue Reading

Top 3 Guidelines for Leveraging Machine Learning and Artificial Intelligence to Lower OPEX and Increase Competitiveness

By Torsten Volk on Oct 2, 2017 11:40:35 AM

“Machine learning (ML) today is frustrating. There is so much potential and the algorithms are all there, but I just do not know how I can leverage it for my organization,” says the CTO of a major professional services firm. “My CEO wants me to ‘leverage ML to lower OPEX and differentiate our service offerings, but there is nothing out there in the market that would allow me to get this done in a manner that has a high probability of success.” Then of course he asks me what I would do and where I would start, because the guy with “Machine Learning and AI” in his job title must know for sure…

Continue Reading

Transforming End-User Support – What Does It Mean and What Is It Really About?

By Dennis Drogseth on Sep 26, 2017 3:03:33 PM

I admit, “end-user support” sounds kind of old-fashioned. But in many respects just the opposite is true. In the digital age the need for easy access to new services is on the rise, and even with a much ‘hipper’ (and increasingly impatient) end-user population, the need for support and guidance remains. It is just taking different forms than in the past.

Continue Reading

Machine Learning and Artificial Intelligence: The Promised Land for Lowering IT OPEX, Decreasing Operational Risk and Optimally Supporting Business Goals

By Torsten Volk on Sep 26, 2017 11:37:40 AM

What should machine and artificial intelligence (ML/AI) do for IT operations, DevOps and container management? The following table represents my quick outline of the key challenges and specific problem ML/AI needs to address. The table is based on the believe that ML/AI needs to look over the shoulder of IT ops, DevOps, and business management teams to learn from their decision making. In other words, every virtualization administrator fulfills infrastructure provisioning or upgrade requests a little bit differently. Please regard the below table as a preliminary outline and basis for discussion. At this point, and probably at no future point either, I won't claim to know the 'ultimate truth.'

Continue Reading

Machine Learning and Artificial Intelligence: The Promised Land for Lowering IT OPEX, Decreasing Operational Risk and Optimally Supporting Business Goals

By Torsten Volk on Sep 26, 2017 10:44:15 AM

What should machine and artificial intelligence (ML/AI) do for IT operations, DevOps and container management? The following table represents my quick outline of the key challenges and specific problem ML/AI needs to address. The table is based on the believe that ML/AI needs to look over the shoulder of IT ops, DevOps, and business management teams to learn from their decision making. In other words, every virtualization administrator fulfills infrastructure provisioning or upgrade requests a little bit differently. Please regard the below table as a preliminary outline and basis for discussion. At this point, and probably at no future point either, I won't claim to know the 'ultimate truth.'

Continue Reading

EMA Quick Take: Why Puppet Acquired Distelli – Kubernetes Management Is Key

By Torsten Volk on Sep 21, 2017 4:50:38 PM

 

Continue Reading

Prologue for EMA Research Project: Machine Learning and Artificial Intelligence in Enterprise IT and DevOps

By Torsten Volk on Sep 18, 2017 2:29:07 PM

Why are there still so many repetitive tasks in data center and cloud management today? Why does application management still contain so many manual steps? Why do most organization still suffer from automation and monitoring silos that prevent them from avoiding preventable application outages and service degradations?

Continue Reading

VMworld 2017 – vRealize 2017 Announcement

By Torsten Volk on Sep 12, 2017 8:14:29 AM

Accelerated Deployment and Lower OPEX

Faster time to value, lower OPEX and deeper multi cloud support are the key elements of VMware vRealize Suite 2017, as it was presented at VMworld 2017
in Barcelona. The new vRealize Suite Lifecycle Manager (vRSCLM) provides
one central user interface tying together the formerly fragmented and complex deployment process for new vRealize environments. Additionally, vRSCLM enables health monitoring, product con guration, IAM integration, and simpli ed upgrades.

[embed width=500]https://youtu.be/Mk3b5UVaFIU [/embed]
Should You Care about the Release of vRealize Suite Lifecycle Manager?

VMware vRealize Suite has received much criticism in the past for its complicated and too brittle deployment, con guration, and integration process. Considering that vRSCLM addresses exactly this critical issue by offering a uni ed installation wizard and a centralized operations dashboard for one or multiple vRealize Suite environments, Enterprise Management Associates (EMA) can only conclude that this new release is signi cant and deserves a close look.

New Deployment Wizard

The new vRS deployment process has been simplified and reduced to the following few steps:

Select whether to import an existing vRS environment or install a new one.

The “import” option lets enterprises manage and upgrade existing vRS environments. The installation process begins as follows:

  • Review the compatibility matrix
  • Select the target version for each component
  • Pick a deployment sizeSelect target data center for new deployment
    Select the vRealize Suite license to apply directly from MyVMware.com Provide the required network details, certi cates and product parametersReview the summary and start the installation process. Due to the new pre-checks it is now less likely for the installation process to fail and in the event of failure, the installation can be resumed from the administration panel, once the root cause has been addressed.

New Operations Management Dashboard

The vRLCM admin panel provides provides a UI to manage, upgrade, and con gure all corporate vRS environments, even across data centers or clouds, through a single pane of glass. vRLCM leverages vRealize Operations (vROps) for health monitoring and root cause analysis and enables administrators to set alerts in case of con guration drift.

Upgrade preparation: Before an upgrade, admins can create a complete snapshot of the environment and view the compatibility matrix.

Upgrades through GUI or Con g File: While the rst upgrade will often be done through the UI, future upgrades could simply leverage the con guration le created through the UI-driven process.

Best practice con guration: vRLCM tracks con guration drift, enables admins to restore previous con gurations, and apply best practice architectural principles.

Leverage VMware Identity Manager: Admins can either leverage an existing installation of VMware Identity Manager or use vRLCM to install a new one.

Final Words

After the initial private cloud hype died down, the race for market leadership is on once again. EMA research shows that in 2017 private cloud is high up on the list of investment priorities for enterprises
of all verticals and sizes. Vendors who will succeed in capturing a signi cant market share have to check the following boxes:

Support any cloud, offer developer friendly APIs and provide customers with a near turn-key deployment experience. With its recent announcements –Vmware Cloud Services, VMware Cloud on AWS, and Pivotal Container Service- Vmware is doing all the right things to be successful.

And then there’s of course one thing that’s needed to juggle apps between clouds and data centers: software de ned networking, where VMware is strategically well positioned with its NSX solution.

Continue Reading

Network Operations and Analytics from CA Technologies has Won the EMA Innovator Award

By Shamus McGillicuddy on Sep 5, 2017 12:42:17 PM

Network Operations and Analytics from CA Technologies has been named a winner of Enterprise Management Associates’ Innovator Award, which recognizes products and services that demonstrate true innovation in the IT industry and address the most critical challenges IT organizations face today.

Continue Reading

VMware Goes SaaS-Ops and Multi Cloud: Launch of VMware Cloud on AWS and Six VMware Cloud Services for Consistent Data Center and Cloud Management

By Torsten Volk on Aug 28, 2017 7:45:57 AM

At VMworld 2017, VMware announced the availability of VMware Cloud on AWS and of the six initial VMware Cloud Services. VMware Cloud on AWS offers customers the long expected capability of deploying VMware's Cloud Foundation Suite of SDDC products (vSphere, NSX and vSAN) to AWS. VMware Cloud Services enable operators, developers, security experts and compliance staff to consistently deploy and operate application infrastructure across today's most popular clouds: AWS, Google, Azure and vSphere. Today, both offerings, VMware Cloud on AWS and VMware Cloud Services are available from AWS U.S. West (Oregon Region), but can be used worldwide. VMware and Amazon are planning to roll out both offerings worldwide during 2018.

Continue Reading

VMworld 2017 – The Container Story Will be Key for VMware’s Future

By Torsten Volk on Aug 23, 2017 10:45:10 PM

VMware’s container management strategy should be seen as the key to success for this year’s VMworld. VMware needs to conclusively convince its customers that instead of doing their own thing the company is able to offer a strong value proposition based  on the fact that Kubernetes and Amazon ECS are the key container technologies to embrace. DockerCon has shown that VMware admins have realized that it is time to “learn about containers,” but VMware’s challenge today is to convince customers that Kubernetes management will not happen entirely separately from virtualization management. Even worse, Kubernetes management may not even require virtualization at all.

Continue Reading

VMworld 2017 Prologue 2 – Where Are the APIs

By Torsten Volk on Aug 22, 2017 10:08:25 AM

“vRealize Automation really doesn’t have an API,” says a reputable partner of a VM-ware centric consulting firm, “they say that it does, but it still does not, so I won’t tell my customers that it does.” Then he goes on in a slightly agitated manner “,also, there is no easy-to-implement orchestrator and no central queueing system to tie together all the VMware components based on dynamically changing policy-defined app requirements.” “Then finally,” he continues, “I have yet another client who asked me to come back with ‘an alternative to vRA, as my developers just don’t want vRA."

Continue Reading

Cisco Announces Intent to Acquire Springpath for $320 Million

By Torsten Volk on Aug 21, 2017 10:12:51 AM

Cisco’s Springpath Acquisition Will further Boost Its EMA Top 3 Winning Hyperconverged Portfolio

Continue Reading

VMworld 2017 – Prologue

By Torsten Volk on Aug 18, 2017 4:18:34 PM

“Oh, I’m not coming to VMworld this year, we are at Jenkins instead.” This is a sentence I’ve heard quite a few times now from vendors that I’m used to seeing at VMworld and it makes me wonder what’s going on.

Continue Reading

The Internet of Things will Drive Network Management Evolution

By Shamus McGillicuddy on Jul 26, 2017 3:34:24 PM

EMA research has determined that network managers will need to upgrade, expand, and adapt their network monitoring and management tools and practices if they are going to support the Internet of Things (IoT).

Continue Reading

EMA Top 3 Product Selection Process

By Torsten Volk on Jun 16, 2017 5:14:24 PM

(You can read more about the content of the EMA Top 3 - Enterprise Decision Guide in my first Post)

Continue Reading

The EMA Top 3 Report: Ten Priorities for Hybrid Cloud, Containers, and DevOps in 2017

By Torsten Volk on Jun 15, 2017 4:34:31 PM

(Click here to jump to the next part and read about how EMA selected its Top 3 products)

Continue Reading

HPE Project New Stack – It’s a “Free Play”

By Torsten Volk on Jun 8, 2017 1:32:07 PM

At its Discover event this week, HPE announced its own multi cloud management platform: HPE Project New Stack.

Continue Reading

Optimizing the Business With Network Analytics

By Shamus McGillicuddy on Jun 7, 2017 3:36:32 PM

Some network operations teams are discovering that they possess a critical asset that can transform enterprises: network data.

Continue Reading

Q&A From How Digital Business is Shaping the Next Wave of Automation Webinar

By Dan Twing on Jun 5, 2017 8:14:06 AM

I recently presented findings from my Workload Automation (WLA) research and other EMA research on a webinar with Tim Eusterman, Sr. Director Solutions Marketing at BMC in a webinar titled “How Digital Business is Shaping the Next Wave of Automation”. The recording of the webinar is now live here, and the slides are available here.

Continue Reading

An Easy Button for Serverless Functions: Back& Turns Average Joe Developer into Serverless Super Hero

By Torsten Volk on May 17, 2017 10:36:52 AM

Backand provides a simplification layer that makes serverless functions approachable for the average Joe developer
Continue Reading

Dell EMC World – The Easy Button for Digital Transformation

By Torsten Volk on May 15, 2017 8:44:12 AM

“It feels like magic but it is technology,” and “we will help transform every company into a software company,” were the two quotes by Michael Dell that best summed up the spirit of  Dell EMC World 2017. These statements show the genuine excitement of a seasoned tech executive to attack the next challenge of his career: merging the Dell EMC brands -Pivotal, VMware, RSA, SecureWorks, and Virtustream- into one highly differentiated IT powerhouse.

Continue Reading

ExtraHop Addy applies cloud-based machine learning to network data

By Shamus McGillicuddy on May 7, 2017 3:36:29 PM

IT analytics vendor ExtraHop unveiled a cloud-based service that applies machine learning heuristics to the metadata that its appliances generate from packet stream analysis. The service should give users better visibility into IT service problems and security threats.

Continue Reading

The Open Networking Foundation’s New Direction: We Live in a Post-OpenFlow World

By Shamus McGillicuddy on May 6, 2017 3:36:32 PM

The Open Networking Foundation (ONF) recently unveiled plans to redefine itself for the post-hype phase of software-defined networking (SDN). I welcome the ONF’s reset and believe it bodes well for the industry’s future.

Continue Reading

Redefining the Branch Office With SD-WAN

By Shamus McGillicuddy on May 5, 2017 3:36:32 PM

Editor’s Note: This blog post is sponsored by Citrix. The ideas and analysis are entirely the authors own.

Continue Reading

New EMA Research: 68% of Enterprises are Evaluating Containers TODAY

By Torsten Volk on Apr 27, 2017 12:59:03 PM

EMA's latest research shows that 68% of enterprises are in the process of evaluating container technologies. Why is everyone today so fascinated by containers? It reminds me of the OpenStack-mania in 2013. At the time I was convinced that VMware had set out to crush the hype, while IBM, Rackspace and a ton of VC funded startups oversold OpenStack to the highest degree. I still have my collection of USB sticks with OpenStack distributions from Piston, Mirantis and friends. Claiming that all I had to do was plugging these sticks into any piece of metal and I'd have Amazon EC2 running right under my desk was not a great idea and ultimately lead to a degree of frustration that made the Microsoft and VMware tax look attractive and ultimately turned Amazon Web Services into a $4.5 billion business.

Continue Reading

Full Stack Container Monitoring – A Whole New Animal

By Torsten Volk on Apr 19, 2017 11:52:20 PM

Traditional IT infrastructure monitoring focuses on hypervisor hosts, storage and VMs. Application impact is tracked through vSphere resource tagging. This simple and mostly static drilldown approach to full-stack monitoring no longer works for modern microservices based computing.

Continue Reading

VMware Goes DevOps: Wavefront Acquisition Brings Massive Data Analytics Capabilities for IT Operations

By Torsten Volk on Apr 18, 2017 5:21:03 PM

Wavefront could be seen as the Swiss Army knife of IT Ops Analytics tools, which makes this VMware acquisition so interesting. Infusing vRealize, Cloud Foundation and even vSphere, vSAN and NSX with Wavefront analytics would enable VMware to run, not walk, toward the Business-defined Data Center (BdDC).

Continue Reading

Advanced IT Analytics: Making it Simpler to Optimize What’s More Complex

By Dennis Drogseth on Apr 13, 2017 3:03:33 PM

The growing market for analytics in IT is one of the more exciting areas to watch in the technology industry. Exciting because of the variety and types of vendor innovation in this area. And exciting as well because our research indicates the adoption of advanced IT analytics supports data sharing and joint decision making in a way that’s catalytic for both IT and digital transformation.

Continue Reading

Microsoft Challenges Amazon and Google with Deis Acquisition

By Torsten Volk on Apr 10, 2017 1:26:33 PM

One week after the GA of Azure Container Registry and only two months after the availability of Kubernetes on Azure Container Service, Microsoft acquires Deis, the guys who make open source Kubernetes management software (Helm, Steward and Workflow), from PaaS Cloud Provider Engine Yard. The Deis slogan is “making Kubernetes easy to use.” With the Deis acquisition Microsoft obtains talent and technologies to successfully compete in the container arena. Infusing Windows, Visual Studio, Azure and OMS with easy container management capabilities is key for Microsoft to catch up with AWS and stay ahead of Google Cloud Platform.

Continue Reading

InterConnect 2017 – Showing off a whole New IBM

By Torsten Volk on Apr 10, 2017 1:19:45 PM

“Today, a dev team leveraging Kubernetes containers can get a cloud app up in minutes.” This statement by Arvind Krishna, IBM’s GM for Hybrid Cloud, at the beginning of his InterConnect 2017 keynote should have received a lot more recognition than it did. This one sentence shows the fundamental shift in IBM’s strategy, away from the old Tivoli-centric IT ops company and toward a modern DevOps-focused organization that is looking for differentiation up the stack. Today’s IBM encourages developers to deploy entire application environments without IT administrators even being aware.

Continue Reading

InterConnect 2017 – Showing off a whole New IBM

By Torsten Volk on Mar 24, 2017 10:31:12 AM

"Today, a dev team leveraging Kubernetes containers can get a cloud app up in minutes." This statement by Arvind Krishna, IBM’s GM for Hybrid Cloud, at the beginning of his InterConnect 2017 keynote should have received a lot more recognition than it did. This one sentence shows the fundamental shift in IBM’s strategy, away from the old Tivoli-centric IT ops company and toward a modern DevOps-focused organization that is looking for differentiation up the stack. Today’s IBM encourages developers to deploy entire application environments without IT administrators even being aware.

Continue Reading

The Business Defined Hybrid Cloud – Or Why the Software Defined Data Center Needs a Brain

By Torsten Volk on Mar 15, 2017 10:49:46 AM

Let us look at a hypothetical example to better understand the difference between the traditional bottom-up approach to hybrid cloud management and the new business-driven paradigm. In Q4 of 2016, a bank wants to gain a 3% market share in North America with its trading tools directed toward savvy end customers that are between 30 and 40 years old, have an average household income of over $100k, and live in California. After reaching the Q4 goal, this same bank sets itself the new objective of defending its IRA market share against aggressive competition in California.

Continue Reading

Cisco Is Turning Enterprise Pets into Scale Out Cattle

By Torsten Volk on Mar 7, 2017 11:01:31 AM

When we think back to why everyone’s favorite child named OpenStack failed so miserably to catch on in all but the largest enterprises, the conversation comes back to one central topic: OPEX. This topic consists of multiple dimensions:

Continue Reading

EMA Innovators of Cisco Live 2017 in Berlin

By Torsten Volk on Feb 27, 2017 1:12:26 PM

Jens Soeldner writing for iX Magazin, the largest German IT publication, and Torsten Volk of Enterprise Management Associations (EMA) have selected the two most outstanding and innovative vendors (out of 150 exhibitors) at last week’s Cisco Live event in Berlin. This EMA Innovators award crowns vendors that dare stepping outside the box to help their customers solve hard IT problems in a simpler, faster and often more cost effective manner.

Continue Reading

EMA Innovators of IBM Connect 2017

By Torsten Volk on Feb 23, 2017 4:43:29 PM

After three fascinating days at IBM Connect 2017, EMA crowned a very short list of vendors with the “EMA Innovators of IBM Connect 2017” award. These vendors are true game changers because they look at a traditional IT challenges from a whole new angle, which enables them to drive highly differentiated customer value. Please note that some of these vendor products might still be in an early or even experimental stage, but Enterprise Management Associates (EMA) believes that they are absolutely worth any IT professional’s time to check out.

Continue Reading

Artificial Intelligence and Machine Learning as the Guardians of Your Hybrid Data Center

By Torsten Volk on Feb 16, 2017 8:42:38 AM

Serverless computing, containers, IoT, DevOps, mobile workspaces and of course hybrid cloud are all technologies -and of course excellent buzzwords- with immediate impact on your organization’s security. Each one of these technologies increases the speed and agility of corporate IT, enabling your company to beat the competition. As enterprise IT complexity is exploding, this year’s RSA Conference attracted over 400 exhibitors and 45,000 attendees which makes it one of the largest IT events of the year, even bigger than the 2016 Amazon Re:Invent show.

Continue Reading

The Four Horsemen of the Hybrid Cloud Apocalypse – Vision of the Business Defined Data Center

By Torsten Volk on Feb 15, 2017 9:53:09 AM

EMA estimates that enterprises today waste over 50% of their IT budgets on inefficient application workload placement, configuration and management. As a side effect, they introduce tremendous operational risk in terms of security, regulatory compliance, performance and reliability.

Continue Reading

Cisco introduces “Digital Building” Catalyst switches for IoT

By Shamus McGillicuddy on Feb 10, 2017 5:03:17 PM

Cisco recently announced a new series of Catalyst “Digital Building” switches. These Catalyst switches are designed for connecting and powering Internet of Things (IoT) devices and systems in smart buildings and other related environments. For example, one design innovation is the use of a separate power plate for Power over Ethernet (PoE), so even when an administrator reboots the device or updates its software, the switch will continue to deliver power to peripheral devices such as smart lighting and surveillance cameras.

Continue Reading

Juniper founder steps away to run new startup Fungible: What is Fungible?

By Shamus McGillicuddy on Feb 10, 2017 10:45:30 AM

What is Fungible, Inc., the new startup created by Juniper Networks’ founder Pradeep Sindhu, working on?

Continue Reading

Unified Endpoint Management: Bringing Multi-Device Support to the Next Generation of Business Professionals

By Steve Brasen on Jan 31, 2017 4:16:42 PM

It’s hard to believe there was actually a time before mobile devices. It wasn’t even all that long ago. In fact, this month Apple is celebrating the 10th anniversary of the iPhone. While the iPhone was not the first smartphone, its introduction is credited with kick-starting the mobile revolution and initiating the “consumerization of IT,” forever changing how technology is developed, marketed, and utilized in business environments. In trying to relate these historical milestones to Millennials, I find myself more and more sounding like a crotchety old man: “Back in my day, we only had PCs—and we were glad to have ‘em, too!” Today, three-quarters of all business workers regularly use mobile devices to perform job tasks, so my nostalgic recollections of PC-only business environments are increasingly falling on disinterested ears.

Continue Reading

Dell EMC Opens Door to Bare-Metal Campus Switching

By Shamus McGillicuddy on Jan 26, 2017 2:02:37 PM

Back when Dell EMC was still just known as Dell, its networking business staked out a leadership position by becoming the first mainstream switch manufacturer to embrace bare-metal data center switching. Now it’s moving into the bare-metal campus switching market, too.

Topics: Featured
Continue Reading

Avaya’s Chapter 11 bankruptcy filing points to a sale of its networking business

By Shamus McGillicuddy on Jan 26, 2017 2:02:37 PM

Avaya will restructure its debt under the protection of a Chapter 11 bankruptcy filing. The company aims to emerge from this action intact with minimal impact on customers. However, it is very possible that Avaya will sell its network infrastructure business.

Topics: Featured
Continue Reading

The Software-Defined Future of the WAN

By Shamus McGillicuddy on Jan 26, 2017 2:02:36 PM

Software-defined networking (SDN) exploded onto the scene five years ago with a tremendous amount of hype, but the transition from hype to reality has been a little less explosive. Most enterprises are still in evaluation mode with SDN.

Topics: Featured
Continue Reading

How Network Infrastructure Teams Support the Internet of Things

By Shamus McGillicuddy on Jan 26, 2017 2:02:36 PM

[Editors Note: This blog post is sponsored by Infosim®, but the ideas expressed here are entirely my own]

Topics: Featured
Continue Reading

EdTech Networkers: Be Ready for Cloud, SDN, and IoT this Year

By Shamus McGillicuddy on Jan 26, 2017 2:02:35 PM

This sponsored blog post was originally published at at HelpSystems.com

Topics: Featured
Continue Reading

Cisco DNA is Marchitecture, But Also a Shift Away From CLI

By Shamus McGillicuddy on Jan 26, 2017 2:02:35 PM

The industry has seen plenty of marchitectures from Cisco and its peers over the years. Its newest one, Digital Network Architecture (DNA), feels different, especially after I spent a week at Cisco Live 2016. DNA is different because underneath all the slideware and demos is an apparent commitment to changing the way enterprises do networking. In other words, Cisco wants network engineers to rely less on their skills with its command line interface (CLI).

Topics: Featured
Continue Reading

Preparing Network Management for SDN and NFV

By Shamus McGillicuddy on Jan 26, 2017 2:02:34 PM

[Editor’s note: This blog is sponsored by Infosim®, but the content is entirely my own]

Topics: Featured
Continue Reading

Network Managers Should be Monitoring Servers

By Shamus McGillicuddy on Jan 26, 2017 2:02:33 PM

Editor’s Note: This article was originally published by HelpSystems on February  2, 2016.

Topics: Featured
Continue Reading

Early Adopters Define SDN

By Shamus McGillicuddy on Jan 26, 2017 2:02:33 PM

Greg Ferro recently blogged about how attempts to define software-defined networking (SDN) are a waste of time. He wrote:

Topics: Featured
Continue Reading

The Benefits of Leveraging MSPs for Performance and Security Monitoring

By Shamus McGillicuddy on Jan 26, 2017 2:02:32 PM

[Author’s Note: This post is sponsored by Edgeworx. The content is entirely mine.]

Topics: Featured
Continue Reading

Machine Learning and Artificial Intelligence for the Masses

By Torsten Volk on Jan 18, 2017 1:35:25 PM

Recently, I’ve been thinking about why we haven’t come all that far in machine learning and artificial intelligence over the previous decade. Today, Keen Browne, Bonsai’s Co-founder and Head of Product, summed it up for me in a concise manner: “The tools really suck and are meant for scientists and mathematicians, not for people who work for the line of business.”

Continue Reading

HPE Acquires Simplivity – A $650 Million Data Virtualization Play

By Torsten Volk on Jan 17, 2017 9:10:26 PM

Today, HPE paid $650 to acquire Simplivity. HPE paid this sizeable amount mainly to acquire OmniStack, Simplivity’s data virtualization software platform. OmniStack’s central value proposition is OPEX reduction through the elimination of traditional infrastructure management tasks. In short, Simplivity enables customers to manage their infrastructure at the virtual machine (VM) – level. Please note that there will be a separate EMA Impact Brief covering this topic in much more detail.

Continue Reading

The Truth Behind the Scope of the Endpoint Problem in the Enterprise

By David Monahan on Jan 12, 2017 6:41:06 PM

The Evolution of the “Endpoint”
Over the past few years, the perception of what an “endpoint” is, and therefore the definition, has changed. The original perception was a user workstation independent of operating system. With the expansion of functionality, data persistence, Internet connectivity, and ultimately the threats against them, that definition no longer applies. Laptops became included, then smartphones, servers, tablets, internal file shares, and dedicated or special function devices such as point of sale terminals and processors.

Continue Reading

Analytical Resolutions for Technologists and Tech Teams in 2017

By John Myers on Jan 5, 2017 9:03:35 AM

Ahhh, the annual resolutions list! A time-honored tradition when we all look at the new year as an opportunity for a fresh start.

Continue Reading

PODCAST: Discussing Big Data, Integration and Security

By John Myers on Jan 5, 2017 9:03:34 AM

Continue Reading

Dos and Don’ts for the Data Scientist

By John Myers on Jan 5, 2017 9:03:34 AM

Review of Statistics Done Wrong by Alex Reinhart

Since the advent of the big data era, organizations have been crying out for data scientists. Initially it was finding the true data scientist. But as these resources were considered scarce, it was a search for people who could hand-code analytical models in a Hadoop environment.  As statistical tools such as R, Alteryx, and RapidMiner augmented Hadoop environments, we started to include traditional tools such as SAS and SPSS. These data scientists, or data scientists in training, were asked to take large amounts of data and divine the nuggets that would create a “cross-sell/up-sell” recommendation engine that would launch the next Netflix or link two disparate data sets that explain how markets interact and find the next groundbreaking investment opportunity.

Continue Reading

PODCAST: Cloud Data Warehousing

By John Myers on Jan 5, 2017 9:03:34 AM

Continue Reading

Big Data and the Data-Driven Enterprise

By John Myers on Jan 5, 2017 9:03:34 AM

 

Continue Reading

How the EMA HDE Information Management Layer Impacts the Growth of Analytical Platforms

By John Myers on Jan 5, 2017 9:03:32 AM

The ability to execute in a low latency time frame is a core component of the concept of next generation data management architectures such as the Enterprise Management Associates Hybrid Data Ecosystem (HDE). One of the key business drivers of the HDE is speed of response,  which stems from an organization’s drive to execute faster than their competitors to create an advantage or to be on par with those competitors to simply “keep up with the Joneses.” You see this in workloads such as cross-sell/up-sell opportunities for revenue generation. You see this in opportunities to limit costs with asset logistics and labor scheduling optimization. You see this in opportunities to limit exposure to risk in fraud management and liquidity risk assessment.

Continue Reading

A Tribute to IoT Device Security Researchers

By David Monahan on Jan 3, 2017 9:34:22 AM

This blog in the Internet of Things (IoT) series comes as a tribute to security researchers everywhere. The autumn’s largest security-focused show is the Black Hat Security conference. If you are not familiar with Black Hat, it is a tech conference that started in 1997 and covers numerous security topics in various presentations that are fairly to highly technical. As mentioned in the first blog in the series, IoT-like systems have been around a long time. However, researchers began paying more public attention to IoT around 2011. Visibility on the subject of the security, or lack thereof, of IoTincreased in 2011, when researcher Jay Radcliffe demonstrated that medical devices; in this case, his own automated insulin pump, could be hacked to deliver a lethal dose of insulin.1 Since that time, there were numerous other IoT hacks in various fields, including:

Continue Reading

Enterprise IT Predictions for 2017 – Journey to a Business-Defined Hybrid Cloud

By Torsten Volk on Dec 29, 2016 8:15:34 AM

Customers in 2017 will demand solutions to claim back today’s massive CAPEX and OPEX waste of over 50% of their total IT spend. All our 2017 predictions are directly derived from the rapidly increasing pressure to reclaim these resources and leverage them to achieve direct business advantages in today’s highly competitive and fast moving marketplace.

Continue Reading

IoT Enterprise Risk Report

By David Monahan on Dec 21, 2016 2:47:12 PM

ForeScout recently released an IoT Enterprise Risk Report based on research from ethical hacker Samy Kamkar. Based on Kamkar’s findings, the report on IoT security issues could readily be renamed something like, “IoT: the bane of the enterprise environment,” or “IoT brings new meaning to the term ‘Enterprise Risk’.”

Continue Reading

Acronym Acrobatics: Relating UEM to UEM

By Steve Brasen on Dec 6, 2016 11:14:30 AM

An unfortunate side effect of maintaining a vibrant technology subculture is an over-reliance on acronyms to describe basic concepts and solutions. For instance, to be ITIL compliant a CTO may need to invoke the ARP of a TCP or UDP IPv6 WAN to determine the DNS entry of an SMTP server for a POS system to prevent GIGO and ensure WYSIWYG. Now, if you understood that statement, you are certainly among the lucky few “in the know” and probably use these terms on a regular basis. However, if you are unfamiliar with or had to look up any of those terms, you likely recognize the core problem. While acronyms are intended to simplify complex technical conversations, they actually impede successful communication if any participants are unaware of their meaning. Sometimes acronyms are introduced to shorten long-winded technobabble; sometimes they are developed as marketing devices to create unique sounding products; and often they evolve simply because they make techno-elitists sound more knowledgeable.

Continue Reading

How to Unleash the Full Value of Hybrid Cloud

By Torsten Volk on Nov 9, 2016 4:03:28 PM

In an ideal world, customers would be able to fully take advantage of the benefits of hybrid cloud by rationally matching infrastructure parameters -cost, performance, reliability, availability, security, regulatory compliance, scalability- with the requirements and dependencies of each application.

Continue Reading

VMware and OpenStack: A Marriage Made in Heaven?

By Torsten Volk on Nov 9, 2016 4:00:28 PM

As we -Evan and I- were ranting last week about how OpenStack and VMware fit together (see #EMACloudRants), we were mainly focusing on the central conundrum that VMware faces within this context: “Should we support an open platform that could commoditize away a substantial part of our profitable infrastructure business or should we ignore the threat and do our own thing”

Continue Reading

Software Defined Storage: The Vendor Landscape – Part 2 of 2

By Torsten Volk on Nov 9, 2016 4:00:27 PM

As promised in my previous post on “Software Defined Storage – Why Customers Should Care”, I want to follow-up with a brief overview of the competitive landscape.

Continue Reading

EMA Cloud Rants – Pilot Episode

By Torsten Volk on Nov 9, 2016 4:00:27 PM

Evan Quinn and I have been collecting popular customer questions for a while and wanted to share our thoughts on these questions in the form of a new format: EMA CLOUD RANTS. Each week we will discuss one of the hot topics in enterprise IT to provide the viewer with rapid analyst insights, without any fluff. Here goes the first one:

Continue Reading

The State of the Software Defined Data Center

By Torsten Volk on Nov 9, 2016 4:00:26 PM

Of course, I always encourage practitioners to carefully study the full EMA research report on the “Obstacles and Priorities on the Journey to the Software-Defined Data Center” or at least read the research study summary or at the very least join the EMA SDDC Research webinar on February 18, but I still want to briefly summarize the key findings here.

Continue Reading

EMA Research: Enabling Enterprise IT Management to Optimally Support Big Data

By Torsten Volk on Nov 9, 2016 4:00:26 PM

What does Big Data mean to traditional enterprise IT? Organizations of any size and industry are becoming more and more aware of the incredible importance of capturing, managing and analyzing the data available to them. The more comprehensively companies are able to tap structured and unstructured data sources, the quicker they can refresh this data and the more successfully they make this body of data available to all business units, the better they can develop advantages in the market place. Today’s business units are demanding the rapid implementation of these big data use cases, as well as optimal resiliency, cost efficiency, security and performance.

Continue Reading

Software Defined Storage: Why Customers Should Care – Part 1 of 2

By Torsten Volk on Nov 9, 2016 4:00:26 PM

Much marketing hype and heated discussions should be seen as excellent indicators for the fact that Software Defined Storage (SDS) is one of the hottest topics in today’s data center. Naturally, every vendor defines SDS based on their own product range, sometimes leaving customer out of the equation.

Continue Reading

Highlights from IBM Analyst Insights 2013

By Torsten Volk on Nov 9, 2016 3:59:25 PM

As every year, IBM invited the analyst community to Stamford, CT, for a deep dialogue on today’s most important topics in enterprise IT. Here is a short overview for everyone interested in IBM’s current world view.

Continue Reading

Rapid Evolution – OpenStack Is Growing Up

By Torsten Volk on Nov 9, 2016 3:59:24 PM

The Havana release of OpenStack was launched on October 17, about three weeks prior to the OpenStack Summit in Hong Kong.  As always, there are many new features -high availability, load balancing, easier upgrades, plugins for development tools, improved SDN support, fiber channel SAN support, improved bare metal capabilities- and even two new core components, Ceilometer -metering and monitoring- and Heat -orchestration of the creation of entire application environments- to admire. Without any doubt, OpenStack is becoming more enterprise ready with each new release .

Continue Reading

War of the Stacks: OpenStack vs. CloudStack vs. vCloud vs. Amazon EC2

By Torsten Volk on Nov 9, 2016 3:59:23 PM

When it comes to cloud technologies, discussions often get passionate or even heated. It’s all about the “war of the stacks”, where much Cool Aid is dispensed to get customers to buy into the respective cult. This discussion reminds me of the old days of enterprise IT, where everything was about technology instead of business value. You either bought one thing or the other and then you were locked in for a half decade. Dark times.

Continue Reading

Making Your Service Desk Less Vocal Actually Tells You Things Are as They Should Be

By Dennis Drogseth on Nov 4, 2016 3:03:32 PM

Optimizing the end-user experience has many dimensions to it, and one key element of them is ensuring that any issues from password reset, to application access, to support for multiple endpoints by a single user—are all addressed without your users feeling that they’re queuing up at the Department of Motor Vehicles. This blog leverages EMA research to examine how a truly efficient service desk can make itself all the more effective by becoming more transparent, less verbally visible, and yet ultimately far more end-user empowering.

Continue Reading

How to Unleash the Full Value of Hybrid Cloud

By admin on Oct 25, 2016 1:37:52 PM

In an ideal world, customers would be able to fully take advantage of the benefits of hybrid cloud by rationally matching infrastructure parameters -cost, performance, reliability, availability, security, regulatory compliance, scalability- with the requirements and dependencies of each application.

Topics: Uncategorized
Continue Reading

How to Unleash the Full Value of Hybrid Cloud

By Torsten Volk on Oct 24, 2016 12:26:50 PM

In an ideal world, customers would be able to fully take advantage of the benefits of hybrid cloud by rationally matching infrastructure parameters -cost, performance, reliability, availability, security, regulatory compliance, scalability- with the requirements and dependencies of each application.

Continue Reading

The Magnificent Seven ITSM 2.0 Challenges

By Dennis Drogseth on Oct 11, 2016 3:03:31 PM

This is my second blog targeting the next generation of IT service management, or ITSM 2.0. The first blog described the characteristics I see as defining ITSM 2.0. Here we’ll look more closely at the key challenges you might face in getting there from a more traditional ITSM background.

Continue Reading

Introducing IT Service Management (ITSM) 2.0: A Cornerstone for Digital and IT Transformation

By Dennis Drogseth on Sep 27, 2016 3:38:11 PM

Over the course of numerous deployment dialogs and multiple research projects starting with last year’s work on “ITSM futures,” I have been tracking a still largely unheralded phenomenon: ITSM teams in many organizations are evolving to take a leadership role in helping all of IT become more efficient, more business aligned, and ever more relevant [...]

Continue Reading

The Real Reason Apple Users Are Treated Like Second-Class Citizens

By Steve Brasen on Sep 26, 2016 3:03:15 PM

(With apologies to Jeff Foxworthy) You might be an Apple user if…

Continue Reading

The Top 5 IoT Lessons I Learned From Hollywood

By David Monahan on Sep 23, 2016 12:07:46 PM

In my last IoT blog, I talked about the history of IoT and the evolution of issues surrounding IoT devices. In this part of the series, we will expand on the issues around IoT and the data it collects.

Continue Reading

Endpoint Management and Security – More Effective as Partners than Adversaries

By Steve Brasen on Sep 2, 2016 10:59:52 AM

The primary function of enterprise IT management is to empower end users with access to technology resources that will boost their productivity and job performance. However, this focus is at odds with the core precepts of IT security which are adopted to minimize the exposure of enterprise systems, applications, and data. I recall that in a number of IT operations management adventures throughout my career, I often joked with colleagues that the most effective way to create a secure environment is to simply shut down all computers in the data center. Naturally, management executives dependent on the IT infrastructure to generate revenue were not amused by my flippancy…and even less happy that their workers had to “jump through hoops” to gain access to IT resources.

Continue Reading

Increased Focus on Digital Experience Management Prompts New Research- Done Jointly by Dennis Drogseth and Julie Craig

By Dennis Drogseth on Aug 26, 2016 9:11:12 AM

Digital and user experience management has been the focus of multiple EMA research studies throughout the years, both as a stand-alone topic and as part of EMA’s ongoing examination of critical trends such as digital and operational transformation, IT performance optimization, and of course application performance management (APM).  In many respects, optimizing the digital experience [...]

Continue Reading

The Enterprise Service Catalog—Unifying IT Services for the Digital Age

By Dennis Drogseth on Aug 26, 2016 9:11:11 AM

While service catalogs are not new, they are becoming increasingly critical to enterprises seeking to optimize IT efficiencies, service delivery and business outcomes. They are also a way of supporting both enterprise and IT services, as well as optimizing IT for cost and value with critical metrics and insights. In this blog we’ll look at [...]

Continue Reading

How Is Cloud Changing the Face of IT Service Management?

By Dennis Drogseth on Aug 26, 2016 9:11:11 AM

Cloud is no longer a new topic for IT, or for IT service management (ITSM). But its impact on how ITSM teams work, as well as on how IT works overall, has probably never been greater. Indeed, more and more IT organizations have been “moving to the cloud.” But understanding its relevance can’t be achieved [...]

Continue Reading

Effective Security Requires a Change in Mindset and the Protection Paradigm

By David Monahan on Aug 24, 2016 11:05:53 AM

Nearly every day another successful breach is reported. In 2016 alone, organizations from major governmental agencies such as the IRS and Department of Defense, to major retailers including Wendy’s, have succumbed to attack. These organizations are not alone; every major business and governmental sector has been compromised. Large tech companies such as LinkedIn and Oracle, healthcare providers including Premier Healthcare (as well as numerous hospitals), manufacturers, major educational institutions, and large financial organizations have all succumbed to either internal or external threats.

Continue Reading

Windows 10…One Year Later

By Steve Brasen on Aug 18, 2016 1:58:29 PM

Time flies when you’re upgrading operating systems. It has officially been a year since Microsoft introduced Windows 10 to much fanfare and approbation. Acceptance of the platform was almost immediate, with many users simply grateful to migrate away from the much-maligned Windows 8 environment. At the core of the problems with the previous edition of Microsoft’s flagship OS was that the GUI was designed to function more effectively on a tablet than on a PC, which infuriated users who had grown used to the Windows 7 look and feel on their laptops and desktops. The release of Windows 10 gave Microsoft’s core audience exactly what it wanted—a unified code base that enables the same applications to be employed on all device architectures (desktops, laptops, tablets, and smartphones) while retaining the look and feel of the classic Windows 7 desktop that they had come to appreciate.

Continue Reading

IoT Devices in the Network: Can you find them?

By David Monahan on Aug 10, 2016 2:26:18 PM

In the last year or so, the topic of Internet of Things (IoT) received a lot of attention. Both the concept of the topic and scope of what should be included in IoT changed dramatically in that time. The first commercialization of IoT were wearables such as GoogleGlass. Shortly thereafter came the next wave, with devices such as smart watches. The first security concerns were focused on personal safety due to user distractions, similar to those voiced when smartphones became popular, and then came the invasion of privacy concerns. However, shortly after the first hackers got hold of them and identified attacks to gather data from them. At that point, the view on IoT expanded to recognize that the concept of IoT was actually much broader and had more significant impacts than privacy.

Continue Reading

Tips on Getting the Most Out of Your 1:1 iPad Education Program

By Steve Brasen on Jul 5, 2016 8:18:16 AM

There is no greater investment we can make in the future than to prepare our children to successfully navigate the challenges of tomorrow. Of course, predicting the workforce requirements of the future is a bit like trying to capture a fly with a cargo net—just when you think you have it, it slips through the holes and buzzes in a different direction. Nonetheless, it’s safe to assume that workforce mobility will be an essential aspect of the coming generation’s career experiences. Mobile technology is already an integral part of nearly every business role, and its use can only be expected to increase in the years to come. To help support this revolution, Apple has pledged to donate $100 million worth of teaching and learning technology to 114 underserved schools across the country and has offered special discount pricing and volume-purchase programs to all educational institutions. A large number of grade schools have embraced these financial enticements and introduced 1:1 iPad programs that provide every student with their own personal iPad to be used during the duration of a school term.

Continue Reading

Q&A from EMA Radar for Workload Automation (WLA): Q1 2016 Webinar

By Dan Twing on May 2, 2016 11:15:13 AM

I recently presented findings from my EMA Radar for Workload Automation (WLA): Q1 2016 report. The recording for the webinar is now live here.

Continue Reading

Linux on Power—Poised for Greatness

By Steve Brasen on Apr 22, 2016 11:12:45 AM

For two decades, IBM’s Power Systems family of high-performance servers has been considered the premier alternative to x86-based systems. Combining fast processing, high availability, and rapid scalability, Power Systems are optimized to support big data and cloud architectures. Popularly deployed to run IBM’s AIX and IBM i operating systems, the platform has seen stiff competition in recent years from x86-based Linux systems. In 2013, IBM responded to this challenge by investing a billion dollars into the development of enhancements to the Power line that would support Linux operating systems and open source technologies. This bold move was hailed as a strategy that would greatly improve the attractiveness of the platform and drive broader adoption.

Continue Reading

The Desperate Need for Accuracy and Efficiency in Security for Detecting Network Intruders and Other Threat Actors Quickly

By David Monahan on Apr 14, 2016 2:37:49 PM

According to 2015 research reports published by Ponemon, Mandiant, and others, median intruder dwell time in a target network prior to detection ranges from just under to just over 200 days. That is a little over six months and as everyone agrees, totally unacceptable.

Continue Reading

5 Reasons to Transition From the Dark Ages to the Digital Age With a Document Management System

By Steve Brasen on Apr 11, 2016 1:18:47 PM

We live in the digital age—or at least many of us do. Today’s IT-savvy users expect to be able to access any data, form, or record from any device at any location and at any time. However, some organizations seem to be perpetually stuck in the dark ages, relying on antiquated paper documents and physical filing cabinets for document retention. Other businesses may have documents in electronic form but lack any method for organizing them beyond just saving them to a basic filesystem. I’ve even known business professionals who store critical records in archive folders in their email package because they lack any other method for document organization. Electronic document management has never been more essential, and organizations that fail to provide adequate document support either will not be able to compete effectively against businesses that do or, even worse, will fail to meet compliance objectives and lose customers due to an inability to provide adequate support services.

Continue Reading

Q&A from EMA Radar for Workload Automation (WLA): Q1 2016

By Dan Twing on Mar 16, 2016 8:05:41 AM

Earlier today I presented findings from my recent EMA Radar for Workload Automation (WLA): Q1 2016 report. The recording for the webinar is now live here.

Continue Reading

Automation is Key to Staying in the Driver’s Seat of Your Data-driven Strategy

By Dan Twing on Feb 8, 2016 12:54:28 PM

More and more organizations are increasing the use of data in their decision making. EMA describes this as having a data-driven strategy. Recent research has revealed that almost 63% of respondents included data-driven strategies in their organization at a significant level. EMA has been tracking the growth of big data with annual research since 2012. From our 2015 research, you can see in the chart below how organizations are moving forward with their big data projects.

Continue Reading

2016: Looking Ahead at ITSM—Want to Place Any Bets?

By Dennis Drogseth on Jan 22, 2016 12:52:29 PM

I thought I’d begin the year by making some predictions about what to look for in 2016 in the area of IT service management (ITSM).  For those of you who have been following my blogs with any regularity, and particularly for those who sat in on our webinar for the research report “What Is the [...]

Continue Reading

Who Owns User and Customer Experience Management?

By Dennis Drogseth on Jan 22, 2016 12:52:28 PM

There is growing industry attention to user, customer, and digital experience management—often condensed by the acronym UEM for “user experience management.” This attention is more than justified, but most of the buzz leaves out critical questions like, “What is user experience management?”, “Who really runs (or who should run) the UEM show in the digital [...]

Continue Reading

PODCAST: Discussing Qlik unSummit and QlikView 12

By John Myers on Jan 5, 2016 9:03:35 AM

Continue Reading

HEAT Software Meets the Need for Endpoint Protection Head-On

By David Monahan on Dec 11, 2015 12:40:49 PM

In many organizations, endpoints see virtually constant change. Users access, download, and utilize applications, data, drivers, files, toolbars, widgets, etc., introducing both new security threats and undocumented changes in systems and processes. For better or for worse, all of these activities leave their mark on the endpoint.

Continue Reading

Best Practices for Innovating Through Cloud Technologies – Utilizing Public, Private, and Hybrid Cloud

By Dan Twing on Nov 25, 2015 9:15:12 AM

Cloud computing can speed up deployment, reduce costs, and increase efficiency and connectivity. It can open up new ways to get computing work done, but more importantly, the inherent connectivity can change the way employees interact with each other and with customers. It can also change the way companies interact with suppliers and partners. The ease of standing up new apps and connecting with users through mobile devices, as well as the minimal capital investment, can spur innovation.

Continue Reading

The Rise of Thingbots in the Internet of Things (IoT)

By David Monahan on Nov 20, 2015 12:50:39 PM

The Internet can be a pretty scary place. Places like the dark web exist in the form of trading houses with stolen personal information from credit cards and social security numbers, to health records and full identities being obtained for a price. Malware development and deployment and other attack services such as DDoS and botnets can be rented by the hour. Recent reports indicate that DDoS attacks are increasing in both frequency and size, and the problem of botnets being used as attack networks or launch points in DDoS and other malicious activities is significant. Indications are that it will only continue to get worse.

Continue Reading

EMA Research Shows that Cyber Security is Achieving Executive Visibility in a Big Way

By David Monahan on Nov 20, 2015 12:50:32 PM

One of the services that EMA provides to the tech industry is research. During the course of the year, numerous projects are launched to help IT consumers and vendors understand market perceptions. EMA then provides analysis and forecasts on trends based upon those perceptions.

Continue Reading

Why Analytics and Automation Are Central to ITSM Transformation

By Dennis Drogseth on Nov 9, 2015 11:12:00 AM

In research done earlier this year, we looked at changing patterns of IT service management (ITSM) adoption across a population of 270 respondents in North America and Europe. One of the standout themes that emerged from our findings was the need for the service desk to become a more automated and analytically empowered center of [...]

Continue Reading

Digital Transformation and the New War Room

By Dennis Drogseth on Nov 3, 2015 10:42:46 AM

In August EMA surveyed 306 respondents in North America, England, France, Germany, Australia, China and India about digital and IT transformation. The goal was in part to create a heat map around just what digital and IT transformation were in the minds of both IT and business stakeholders. We targeted mostly leadership roles, but also [...]

Continue Reading

User Experience Matters in Self-Service Provisioning

By Steve Brasen on Oct 26, 2015 12:08:22 PM

If you’re like me, you are increasingly becoming reliant on online shopping to replace the more arduous task of physical in-store shopping. I find this is particularly true during the holiday season when the idea of fighting traffic and elbowing crowds to desperately search numerous shops in order to find just the right gift for Aunt Phillis (who’s just going to hate whatever she receives anyway) gives way to the more idyllic setting of web-surfing multiple stores simultaneously from the privacy of your home while the dulcet tones of Nat King Cole playing gently in the background lull you into the holiday spirit (a little spiced eggnog on the side doesn’t hurt either). But have you ever stopped to consider why you shop at some websites and not at others? Certainly item prices have something to do with it, as does the breadth of product selection. However, there is almost certainly a third element involved—one of which you may not even be consciously aware: The quality of the online store shopping experience directly impacts the likelihood that you (and other consumers) will purchase items on it. Websites that are friendly, professional, and easy to use are far more likely to produce sales than those that are confusing and difficult to navigate.

Continue Reading

Top 5 Reasons IT Administrators Are Working Too Hard Managing Endpoints

By Steve Brasen on Oct 9, 2015 10:25:18 AM

IT administration is a thankless job. Let’s face it—the only time admins gain any recognition is when something goes wrong. In fact, the most successful IT administrators proactively manage very stable environments where very few failures and performance degradations occur. Unfortunately, though, this is rarely the case, and it is far more common for admins to get stuck in the break/fix cycle of reactive “firefighting” where problems are never truly resolved and are destined to occur again. Making matters worse, increasing requirements for mobility, business agility, high performance, and high availability have substantially increased IT administrator workloads. With this kind of pressure, it’s no wonder IT professionals are frustrated.

Continue Reading

Running Containers Doesn’t Have To Mean Running Blind

By Dan Twing on Oct 6, 2015 2:17:15 PM

The idea of containers has been around for a long time in various forms on various operating systems. It has been part of the Linux kernel since version 2.6.24 was released in 2008. However, containers did not become mainstream until a couple years ago when Docker was first released in March 2013. Docker introduced container management tools and a packaging format, which made container technologies accessible to developers without Linux kernel expertise. By doing so Docker led the way to making containers mainstream as well as one of the hottest trends in application development and deployment because it simplified the way applications are packaged. While this has big advantages, containers are still early in their lifecycle and lack operational maturity. The ease of use with which Docker images can be created leads to image sprawl, previously seen with VMs, and exacerbates the problem of managing security and compliance of these images. Container environments do not integrate well to existing developer tools, complicating team development due to a lack of staging and versioning for preproduction and production promotion. Also, containers do not integrate with existing monitoring tools, complicating management. However, new tools are being developed targeting Docker as an application delivery format and execution environment by an ever-growing Docker community. Many of the benefits are on the development side of the house, with the promise of DevOps benefits. Running in production can be a different story.

Continue Reading

Are Laptops Really Mobile Devices?

By Steve Brasen on Sep 25, 2015 10:39:16 AM

When people think of IT mobility, the images most immediately conjured regard smartphones and tablets. In truth, however the mobile device landscape could be considered broader than this. The basic definition of a mobile device is simply “any computing device designed principally for portability.” By that definition, laptops should clearly be included in that scope. However, some definitions state that a mobile device must be “handheld” indicating size is a factor without actually specifying how small a device must be to achieve that designation. Regardless of size limitations, those definitions still favor inclusion of laptops since many are available with a form facture that is smaller than some of the larger tablets. Therefore, the defining descriptor for a mobile device must fall to its portability, which also happens to be the key differentiator between a laptop and a desktop PC. Logically, therefor, a laptop is, in fact, a mobile device.

Continue Reading

Process, Dialog, and Workflow: A Formula for Interconnection and Automation

By Dennis Drogseth on Sep 24, 2015 11:42:46 AM

As a follow-up to my previous columns on change management, I’d like to step back a little and shine a light on an even broader landscape. Here I’ll touch briefly on process, dialog, and workflow as a triad that can help IT organizations move forward toward a more efficient and potentially more business-aligned way of [...]

Continue Reading

Why It’s Never Too Soon to Think about IPv6 Network Management

By Shamus McGillicuddy on Sep 9, 2015 3:23:37 PM

Most network managers are still many years away from turning on Internet Protocol version 6 (IPv6) in their enterprise local area networks (LANs). Private non-routable IPv4 address ranges can happily exist behind a network address translation (NAT) gateway for the foreseeable future. However, things could change. At any time, someone above your pay grade might [...]

Continue Reading

Know when it’s time to replace open source and freeware infrastructure management tools

By Shamus McGillicuddy on Aug 28, 2015 2:02:09 PM

Many small and midsized IT organizations rely on a mix of freeware and open source software to manage their infrastructure. These free tools can be effective and economical choices for smaller networks. But how do you know when it’s time to upgrade to a commercial product? Scale is one of the first indicators that you [...]

Continue Reading

InterMapper Application for Splunk Answers Need for Log Analytics in Network Management

By Shamus McGillicuddy on Aug 28, 2015 2:02:08 PM

You may not have noticed, but log analytics has become table stakes for network management toolsets. Last year, Enterprise Management Associates® (EMA™) surveyed network managers about the data sources that have become important to engineering and operations tasks. Log files consistently scored higher than anything else, including flow data, packet analysis, and SNMP metrics. Fifty-nine [...]

Continue Reading

Top 5 Reasons Custom Scripts are Putting Your Business at Risk

By Steve Brasen on Aug 25, 2015 3:09:13 PM

IT administrators love to write scripts – at least, the most talented ones do. Scripting provides a powerful platform to automate simple and repeatable tasks. However, like with most powerful tools, there is an overwhelming temptation for scripting to be overused. When faced with a project deadline, a high-pressure failure event, or even just the need to simplify day-to-day events, administrators can unintentionally create scripts that are so complex they actually put the business at risk. I must confess that during my 2 decades-long tenure as an IT administrator and engineer, I’ve written a lot of scripts…a LOT of scripts…and learned a lot of important lessons. Scripting was never intended to replace application programming. Its purpose is to provide a quick and easy resource for performing simple and repeatable tasks. It is not uncommon, however, for scripts to start simple but balloon over time into complex code that is virtually unintelligible even to its author.

Continue Reading

The Limits of Packet Capture

By David Monahan on Aug 19, 2015 3:42:12 PM

In preparation for my new ‘Achieving Hi-Fidelity Security’ research project, I thought I would post a relevant blog I wrote for InformationSecurityBuzz.com.

Continue Reading

Workload Automation: A Key Tool in a Fast Paced Tech Landscape

By Dan Twing on Aug 17, 2015 4:24:54 PM

Consumers of IT services want speed and dependability above all else. When they envision a new service, they want it built and deployed in record time. While there has always been time pressure, it has become more pressing with the consumerization of IT. Consumerization describes the emergence of IT in the consumer market which then spread to business and government organizations. Users carry their devices and expectations to the workplace and want the same instant gratification, self-service mobile access, and constant stream of new apps they experience in their personal use of technology. Combine this with business intelligence capabilities advancing big data and analytics, and you end up with digital transformation: using data, pervasive connectivity, and easy to use devices to change the way businesses interact with their customers and conduct their core activities. These trends have raised the bar on the expectations of IT to innovate as quickly as possible.

Continue Reading

Optimizing Change Management for Cloud, Agile, and Mobile: How the Technologies Are Evolving

By Dennis Drogseth on Aug 13, 2015 11:42:45 AM

This is the third blog in my series on change management. In the first, I examined both the processes and the use cases associated with managing change. In the second, I looked at metrics, best practices, and pitfalls. In this third blog, I’ll look at how the technologies for service modeling, automation, visualization, and self-service [...]

Continue Reading

Orchestrating a Symphony of Application Automation

By Steve Brasen on Aug 3, 2015 10:42:16 AM

There is a reason orchestras have a single conductor. Can you imagine the cacophony that would result if a horn section performed out of sync with a string section? Or if the percussions played a faster beat then the woodwinds?  But in IT management, it’s all too common for organizations to have separate automation platforms conducting individual software elements. In fact, this is often the cause of an increased IT complexity that results in degraded performance and reliability. For instance, SAP’s popular customer relationship management (CRM) software includes a built-in job scheduler – the Computing Center Management System (CCMS) – with some limited capabilities specifically designed to support its unique platform (such as to analyze and distribute client workloads). But this is an independent tool requiring administration and monitoring tasks separate from any other automated solutions. An average IT organization will need to manage dozens of similar management platforms, each with its own unique interface and operating parameters.

Continue Reading

Change Management—Metrics, Best Practices, and Pitfalls

By Dennis Drogseth on Jul 31, 2015 11:42:45 AM

This is part two of a three-part series. In part one, I addressed the question, “What is change management?” and examined change management from the perspectives of both process and use case. In this blog, I’ll look at what it takes to make change management initiatives succeed—including metrics and requirements, best practice concerns, and some [...]

Continue Reading

Change Management—The Big Picture

By Dennis Drogseth on Jul 20, 2015 11:42:44 AM

This is the first of a three-part series on change management. In this blog, I’ll try to answer the question, “What is change management?” from both a process and a benefits (or use-case) perspective. In the second installment, I’ll address best practices for both planning for and measuring the success of change management initiatives. I’ll [...]

Continue Reading

The Real Reason Your Workforce Is Not As Productive As It Should Be

By Steve Brasen on Jul 20, 2015 11:32:49 AM

Chances are, in an average day, you are not accomplishing as many tasks as you would like … and neither are your colleagues or your employees. What is mystifying about that statement is that it seems today’s workforce is putting in more hours and more effort than ever before coinciding with an increased adoption of IT devices and applications designed to improve user productivity. In fact, this has been a key driver for organizations to enable workforce mobility – to provide flexibility in accessing business IT resources (applications, data, email, and other services) from any device at any location at any time in order to improve overall business performance. But even the most accomplished business professionals must admit there are days when little gets done despite herculean efforts.

Continue Reading

ITSM Futures: A Closer Look at Mobile and Unified Endpoint Management

By Dennis Drogseth on Jul 8, 2015 11:42:43 AM

In my last blog, I discussed how IT service management (ITSM) roles (and rules) are becoming more operations-aware. The blog examined a number of key game-changers for ITSM, including a growing requirement for shared analytics; the rise (not the demise) of the CMDB/CMS and service modeling; cloud as both a catalyst for innovation and a [...]

Continue Reading

Office 365: To Cloud or Not to Cloud—That IS the Question!

By Steve Brasen on Jun 21, 2015 9:01:07 PM

It’s time to take a serious look at Office 365. The cloud edition of Microsoft’s broadly adopted business productivity suite – which bundles such popular packages as Microsoft Word, Microsoft Excel, Microsoft PowerPoint, and Microsoft Outlook – has been both heavily praised and heavily criticized since its introduction in 2011. While the adoption rate of the traditional software edition of Microsoft Office is currently in no danger of being overtaken by its cloud-hosted cousin, recent adoption rates for Office 365 have substantially accelerated. Businesses, in particular, have shown increased interest in the cloud-based platform, and many are carefully considering whether to make the transition after existing Enterprise Agreement (EA) licenses expire.

Continue Reading

Cisco’s Big Data Analytics Vision: Some Data Will Be Distributed Forever

By Shamus McGillicuddy on Jun 12, 2015 12:26:17 PM

Champions of big data analytics extoll the virtues of massive data stores. Enterprises have so much unstructured data that could help them improve operations and generate new revenue, they say. The more bytes, the better. Some might assume that enterprises will simply push every byte they can find into a Hadoop cluster or data warehouse. [...]

Continue Reading

Is Your Organization Ready for Windows 10?

By Steve Brasen on Jun 5, 2015 10:18:52 AM

Here we go again. New releases of Microsoft’s flagship operating system are typically greeted with a combination of angst, curiosity, confusion, and dread in equal measure. It seems just as folks have gotten used to a particular Microsoft version, a new one is released with a completely different interface and requiring a whole new set of operational practices. Even worse, upgrading large numbers of desktops to the new edition in a large enterprise environment is a daunting task often avoided by IT operations teams until and unless it is absolutely necessary to perform a mass migration. More often, new OS platform adoption occurs due to device attrition (i.e., replacing old devices hosting old OS versions with new devices hosting the new OS version). The upcoming, late-July release of Windows 10 will likely be no exception to this.

Continue Reading

The Future of ITSM: How Are the Roles (and the Rules) Changing?

By Dennis Drogseth on May 28, 2015 8:09:36 AM

Both the “rules” and the “roles” governing IT service management (ITSM) are evolving to support a far-broader need for inclusiveness across IT, and between IT and its service consumers. Recent EMA research, “What Is the Future of IT Service Management?” (March 2015), exposed a number of shifting trends that might surprise many in the industry. [...]

Continue Reading

Open network management is the focus on spring ONUG meeting

By Shamus McGillicuddy on May 21, 2015 1:19:20 PM

The Open Networking User Group (ONUG) is a community of IT executives that are using their combined buying power to influence the networking industry. Members hail from companies such as Bank of America, JPMorgan Chase and Fidelity Investments. ONUG’s goal is to specify requirements and reference architectures for products that are open, more affordable and more agile than what vendors traditionally offer.

Over its first two years of existence, ONUG has focused on software-defined WAN (SDWAN), network virtualization overlays and network service virtualization (also known as network functions virtualization or NFV).  Last week, ONUG convened its spring meeting at Columbia University, where its focus expanded into network management and operations. ONUG introduced three new working groups that will specify open networking requirements and begin testing vendor solutions in various management areas.

Continue Reading

SDN and Network Management at ONUG

By Shamus McGillicuddy on May 12, 2015 9:13:36 AM

As an analyst who focuses on network management research, I am particularly intrigued by software-defined networking (SDN). As SDN architectures are deployed in data centers, local area networks and WANs, network management practices will have to evolve. For instance, SDN may make it easier for cloud administrators to provision network services and connectivity for a new application, but how do you ensure that your new programmable network remains compliant with configuration controls and policies? Is your performance management tool able to model and monitor an SDN controller? If you have traditionally relied about appliance-based load balancers and firewalls in your data center, how do you monitor and manage those network functions when they become virtualized services that are as mobile and dynamic as the workloads they serve?

Continue Reading

Best Practices for Maximizing Efficiencies – Governance and Optimization

By Dennis Drogseth on May 8, 2015 12:56:04 PM

In my last blog, I talked about “IT Cultural Transformation and the Elimination of Technology Silos.” That blog keyed on four key areas of advice, which also provide a useful foundation for the topic of “Governance and Optimization.” These key areas include: Standing in the middle of the storm –This means looking at the interdependencies [...]

Continue Reading

Rewarding Impatience with User Self-Service

By Steve Brasen on Apr 27, 2015 7:34:39 AM

There seems to be a direct correlation between how successful business professionals are and their level of impatience. While I am not familiar with any studies on this particular subject, it is simple logic that the most productive employees are those who most frequently demand rapid response to service requests. From my past experience managing and providing IT administrative support, I can attest that these individuals are usually the most irritating—constantly requesting access to new applications, data, and other business resources with expectations of an immediate response. Begrudgingly, I must acknowledge that these are the folks who are also most likely to close deals, beat deadlines, increase revenues, and win awards. In the modern world of highly competitive markets and increased organizational requirements, impatience may actually be a virtue.

Continue Reading

Business Process Management in the Real World — Why It’s Important to Govern Both Automated and Manual Processes

By Steve Brasen on Apr 13, 2015 10:15:12 AM

In a perfect world, all business processes would be automated and all work tasks would be accomplished with the click of a button. This idyllic work experience seems to be the realization of Plato’s utopia…or, if you prefer, the world of the Jetsons. Regrettably, however, we clearly do not live in a perfect world. Put simply, while any repeatable process can be automated, not every process is repeatable, so automation is not a practical solution in all cases. This is particularly a problem for enterprises since business productivity is almost entirely dependent on the rapid and accurate performance of business processes.

Continue Reading

Vectra Provides Pervasive Visibility & Analysis to Detect Cyber Attacks

By David Monahan on Apr 9, 2015 2:21:39 PM

Though cyber attacks have been around for years, in 2014 there was an explosion in the volume of attacks and a marked increase in the losses and damages they inflicted. In 2015, this does not seem to be lightening up.

Continue Reading

Avoiding Enterprise Mobile Management: A Futile Exercise in Procrastination

By Steve Brasen on Mar 30, 2015 9:38:31 AM

IT operations managers are cringing all around the world – desperately trying to avoid those inevitable words from their executive management: “You need to support enterprise mobility.” Their concerns are understandable. After all, IT administrators are already overtaxed with supporting desktop, server, application, and infrastructure management requirements. Asking them to layer a whole new management discipline on top of that can be a daunting prospect. IT managers who find themselves in this predicament often recognize it as an opportunity to practice the fine art of procrastination. Particularly skilled procrastinators will employ one or more of the following excuses:

Continue Reading

IT Cultural Transformation and The Elimination of Technology Silos—An Exercise in Efficiency or a Dream Turned Nightmare?

By Dennis Drogseth on Mar 13, 2015 12:48:19 PM

Cultural transformation and eliminating IT silos may sound like an impossible dream—and indeed, perhaps “eliminating” is too strong a word. But the reality is that IT organizations must change toward a more responsive, business-aligned culture, as well as toward a more service-aware (versus siloed) way of working. So how do you begin? A lot depends, [...]

Continue Reading

Developing an Information Management Strategy Within the EMA Hybrid Data Ecosystem

By John Myers on Mar 13, 2015 9:24:56 AM

Enterprise Management Associates (EMA) has recognized that big data implementers and consumers rely on a variety of platforms to meet their big data requirements. These platforms include new data management technologies such as Hadoop, MongoDB, and Cassandra, but the collection also includes traditional SQL-based data management technologies supporting data warehouses and data marts; operational support systems such as customer relationship management (CRM) and enterprise resource planning (ERP); and cloud-based platforms. EMA refers to this collection of platforms as the Hybrid Data Ecosystem (HDE):

Continue Reading

Leveraging User Activity Monitoring to Protect Information and Employees from Cyber Threats

By David Monahan on Mar 4, 2015 2:46:04 PM

Historically, many organizations and personnel have been concerned about user activity monitoring (UAM). Certain business cultures feel that these activities are an invasion of privacy or are distrustful. However, in today’s Internet connected, data driven world, having specific information or data means the difference in being a market leader and being out of business.

Continue Reading

Docker acquires SocketPlane for multi-host container networking

By Shamus McGillicuddy on Mar 4, 2015 2:36:21 PM

Docker Inc. acquired networking startup SocketPlane today, indicating that Docker wants to accelerate the development of networking APIs and software that will help network managers operationalize production Linux containers. Docker is a suite of open source software that helps developers and admins manage and scale their use of Linux containers. Containers offer the same resource [...]

Continue Reading

PFP CyberSecurity Breaks on to the Scene to Identify Malware at the Chip Level.

By David Monahan on Mar 2, 2015 11:51:59 AM

A few weeks ago, I briefed with a new company called PFP Cybersecurity, also known as Power Fingerprinting, Inc., and was so intrigued by the concept alone that I wrote a Vendor to Watch about them. They officially launched on January 26, , and currently their claim to fame is their physics-based scanning technology which monitors the electromagnetic frequency (EMF) emanations of a microchip while operating. It then compares those readings to either a previous reading or to an established manufacturer’s baseline to determine the state of the chip. There are numerous uses for the technology from supply chain chip counterfeit detection, to operational failure prediction, and most unique of all, malware detection. The scanners are useful in many environments, but especially those that are change and failure/fault intolerant like space vehicles, nuclear and other critical infrastructure environments, and multiple military and natural resource acquisitions environments because they are touchless. There is nothing to install on the system using the microchip, so no change control requests or outage windows are needed. The other interesting thing about their technology is it is disruptive to the current scanner market, costing significantly less than competing products. Their platform is that each model of chip has a different EMF/power signature. These also vary by manufacturer because of variances in raw materials sourcing and manufacturing processes. It is well known that under use conditions, especially when heat dissipation is not well implemented, the chips degrade over time until failure. (That’s the point when the ‘magic smoke’ comes out and it stops working.) The cool part for me was the concept of malware detection. Aside from the physical properties of the chip, the software running on the chip will change the output pattern because of register changes and associated changes in code execution. This means that if a probe is scanning a chip and malware installs itself, the scanner can detect it at the time of installation and alert an operator that it has happened, potentially avoiding larger impact failures and data exfiltration. This technique reminds me of classic side channel attacks on CPUs that perform encryption to attempt a key extraction based on how the various chip leads changed over time. (The key difference being those attacks required contact with the open leads.) In a sense, this technology is highly disruptive, in a positive way, to both the current scanning system suppliers because of the lower cost, and to the infrastructure and supply chains because of not only the cost, but also because of the reported accuracy. It will significantly improve supply chain verification, system reliability, and security. I am looking forward to see how they progress in the marketplace over the next few years. About PFP Cybersecurity Headquartered in Washington, D.C., PFP Cybersecurity provides a unique, anomaly-based cyber security threat detection technology that can instantly identify software and hardware intrusion including active and dormant attacks. With its innovative technology, PFP shortens the compromise detection gap to milliseconds by monitoring changes in electromagnetic frequencies and power usage. This physics-based technology can be applied to detect advanced malware and sophisticated threats in critical cyber systems. It can also detect hardware Trojans and counterfeits in the supply chain. For more information, please visit: www.pfpcyber.com

Continue Reading

Top 5 Trends in 2015 for Unifying PC and Mobile Management

By Steve Brasen on Feb 12, 2015 9:18:00 PM

Have you ever tried to create a major slide presentation on a tablet? Or edit a large spreadsheet? Or write a long document? Probably not. While it’s certainly possible to perform more substantial business tasks on a tablet, the small screen real estate and limited system resources (e.g., processing speed, memory, graphic support, etc.) are typically insufficient in current tablet form factors. However, carrying a laptop around with you everywhere you go just so you can access email is not very practical either. The reality is that we live in a multi-device world where the average worker employs 3 – 5 different computing devices in the regular performance of their job function. . . . and I would argue that’s exactly how it should be. Each user employs the device they prefer to optimally perform tasks at any particular time or place.

Continue Reading

A new analyst on the block

By Shamus McGillicuddy on Feb 10, 2015 2:36:21 PM

Hello world. I am the new senior analyst for the network management research practice at Enterprise Management Associates (EMA).  My name may be familiar to some of you. Prior to 2015, I led the news team for TechTarget’s networking and telecommunications publications for seven years. Now I’m making the transition from journalist to analyst. The [...]

Continue Reading

Leveraging Security Policy Orchestration to “Bake Security in” to SDDC Environments

By David Monahan on Jan 27, 2015 9:50:24 AM

I have a new guest blog just posted at for Tufin around Security Policy Orchestration.  You can check it out here.

Continue Reading

The Changing Game of IT Service Management

By Dennis Drogseth on Jan 5, 2015 12:11:01 PM

If you think that ITSM is static and old hat, think twice. A huge number of innovations are just emerging—some have been a long time in coming; while others are unexpected surprises—as analytics and automation are changing the ITSM game dramatically. Here are some trends that I’ve seen in 2014 that I expect will grow [...]

Continue Reading

Automating Change: The Key to Proactive IT Management

By Steve Brasen on Dec 30, 2014 2:03:18 PM

Reflecting on my earlier career in IT management, I have to confess to a level of astonishment at how naïve IT administrative practices were just a decade or two ago. Failure events were common, and most organizations just accepted as immutable fact the reality of systemic firefighting. IT services critical to business operations were all too often held together with little more than a hope and a prayer. Sure, my colleagues and I were acutely aware of the importance of performing “root cause analysis” and implementing proactive management practices, but who had the time for that? The inevitability of business pressures, support limitations, and time constraints most often contributed to sustaining a mantra of “just get it working and move on!”

Continue Reading

Breach Detection, Sony Entertainment and Vectra Networks…

By David Monahan on Dec 19, 2014 1:25:56 PM

Working in information security for the past 20 years, I have seen a lot. Though there have been many multi-million dollar impact breaches, the recent Sony Pictures hack and subsequent data exposure and extortion is probably the most impactful to a company out of the previous breaches this year.

Continue Reading

Allgress Insight Risk Management Suite Brings Flexibility and Functionality to IT-GRC

By David Monahan on Dec 19, 2014 1:04:02 PM

When I started out in security, only very large organizations with a mature set of business processes dared to talk about implementing some form of governance, risk, and compliance (GRC) or enterprise program (e-GRC). They generally did it in an attempt to get ISO or similar certification, or to “move their programs to the next level,” and some, I think, attempted it just to prove they did it. Many of those efforts were monumental, costing millions of dollars and taking years to complete. However, a significant number seemed to end in compromise, yielding a smaller end result or totally failing after thousands of man hours and millions of dollars for software, systems, and consulting had been spent.

Continue Reading

Is EMV an Expensive Security Misstep for the Payments Industry?

By David Monahan on Dec 8, 2014 10:04:28 AM

There is no disagreement that the current mag-stripe technology used in the USA and other countries outside of the EU is antiquated and lends itself to fraud. The data is easily copied using various methods from manual card data copying and shoulder surfing, to database compromise and POS terminal malware.  Cards can be reproduced with off-the-shelf plastic blanks and a simple machine you can buy on the Internet.

Continue Reading

Cloud Security Alliance Hack-A-Thon and the Software Defined Perimeter

By David Monahan on Nov 7, 2014 11:00:31 AM

The Cloud Security Alliance (CSA) is a not-for-profit think tank of volunteers that spend their time trying to better the internet. These people are the antithesis of cybercriminals; they spend their energy trying to figure out ways to make our data safer. They create best practices for providing security assurance within cloud computing, or in this case, they determine how a cloud environment can be used to enhance and scale authentication for a service that can be cloud-based or private data center-based.

Continue Reading

Damballa and Bit9 + Carbon Black Collaborate to Deliver Better Security with More Context

By David Monahan on Oct 28, 2014 1:54:17 PM

 

Continue Reading

Thoughts on Splunk .conf 2014

By David Monahan on Oct 24, 2014 10:43:42 AM

This week, Las Vegas hosted some 3500 people at the MGM Grand to mark Splunk .conf14, the annual user gathering for Splunk customers, referred to as “Splunkers”. For those of you not in the tech industry, spelunking, or the act of exploring caves, may come to mind. The theme of the conference was not cave exploration, but data exploration; however, the analogy of cave exploration actually aligns very well. “Splunkers” are diving into their data, delving deep into places that many have never explored before. Each of them finding new and cool ways to use the data that they have been collecting for years, just-in-case they ever needed it.

Continue Reading

Return on Investment (ROI) of Data Science as a Service

By John Myers on Aug 18, 2014 10:31:56 AM

In skiing, the “black diamond” run or ski slope is often referred to as “high risk/high reward.” You receive lots of “reward” skiing the black diamond slopes, but you have a significant amount of “risk” associated with variable terrain, such as the presence of trees and the possibility of injury. However, the black diamond slopes are very fun to experience, and you can mitigate the risks with preparation, practice, and a really good skiing helmet.

Continue Reading

Optimizing Change by Understanding Value

By Dennis Drogseth on Jul 31, 2014 1:29:02 PM

A little over a year ago, I got into a rather animated argument about whether IT could measure its performance by the “value” it delivered rather than by purely measuring “costs.” My dinner companion insisted that IT could now, always, and forever only be measured on costs. I disagreed. In fact I had just planned [...]

Continue Reading

Why Data Analytics as a Service?

By John Myers on Jul 14, 2014 9:39:14 AM

Waaay back in the day (say 2002), organizations would ask themselves:

Continue Reading

Prioritizing Workloads – Deciding What’s Hot and What’s Not

By Steve Brasen on Jul 7, 2014 8:57:40 AM

If you are an IT manager, have you ever found yourself stuck in the uncomfortable position of having to choose which jobs are given priority access to essential computing resources? Most likely you have as this is not an uncommon problem. Expecting them to invoke the Wisdom of Solomon, enterprises often bestow the power to decide the workload hierarchy on IT operations. But as most IT managers will tell you, this responsibility is typically more of a curse than a blessing.

Continue Reading

Why Advanced Operational Analytics (AOA) is NOT for 20 men or women in white lab coats!

By Dennis Drogseth on Jul 1, 2014 7:34:25 PM

You may have noticed that Advanced Operational Analytics is a topic of ongoing interest for blogs and commentary here at EMA, and I suppose this is especially true for me. In a recent blog focusing on “Transformative Use Cases from EMA Research” we looked at using the modular values of AOA to address everything from [...]

Continue Reading

Why Optimizing your Cloud Service Provider(s)—is Still an Industry Work in Progress

By Dennis Drogseth on Jun 23, 2014 1:28:48 PM

A year ago, EMA did some rather eye-opening research about what it takes to deliver business services over a mix of public and private, and non-cloud infrastructures. The research—dubbed “Ecosystem Cloud”—showed that an overwhelming 94% of the respondents felt that monitoring “inside” public cloud infrastructures was important—and 63% felt it was “very important” or “critical.” [...]

Continue Reading

Workload Automation is Not Just For Large Enterprises Anymore

By Steve Brasen on Jun 12, 2014 11:16:50 AM

The term, “workload automation,” often conjures images of an army of robots zipping around an enterprise performing arduous tasks while the IT manager sits comfortably in a lounge chair at the back of the data center sipping a Mai Tai. Well, it’s not quite that Jetsonesque just yet – we’ll have to wait a few years for the robots and Mai Tais – but there is a fundamental truth in how workload automation dramatically reduces management effort and improves IT performance. Put simply, workload automation (sometimes still referred to as “job scheduling”) aggregates the placement and execution of individual business processes (i.e. applications, data bases, web services, or any other jobs that would be hosted by an enterprise IT system) to the optimal location (e.g. a server, a cloud, or a virtual machine) at the appropriate time to maximize performance and minimize costs.

Continue Reading

Top 5 Indications It’s Time to Transition to a Hybrid Cloud

By Steve Brasen on Jun 11, 2014 1:07:21 PM

A core precept in cloud computing is that it must deliver the illusion of infinite scalability.  That is, it must fulfill the expectation that any and all workloads will continuously operate at peak performance regardless of the size and number of jobs being added.  In reality, however, private cloud deployments are finite with limited compute, storage, and network resources. It’s kind of like a room full of mirrors – it seems to go on forever, but stretch your hand out and you’ll hit a wall.  The trick to successfully maintaining the illusion of infinite scalability is to allow workloads to extend beyond the scope of a single private cloud into other clouds and, in particular, into public clouds. Adopting this hybrid cloud approach also introduces opportunities for significant cost reductions and increased workload flexibility.

Continue Reading

Advanced Operational Analytics (AOA) – Transformative Use Cases from EMA Research

By Dennis Drogseth on Jun 9, 2014 10:16:37 AM

Steve Smythe discusses how IT Operations is transformed by big data solutions in his latest blog, “Transformation of IT operations with big data solutions.” Is this a reality? The answer—agreed upon here—is almost certainly “yes.” However, it should be pointed out that “big data,” or “IT Operations Analytics,” or as EMA calls it, “Advanced Operational [...]

Continue Reading

Integrated ITSM—the Service Desk + Operations + Analytics

By Dennis Drogseth on May 16, 2014 9:05:13 AM

It’s fascinating how the meaning for just about every term relevant to service management can be a matter of debate—including IT Service Management itself (a discussion for another time).  However, what’s sparking this blog centers around the three other terms in the headline—“service desk,” “Operations” and “Analytics,” plus a fourth—“cognitive computing.” In reading Brian Jeffrey’s [...]

Continue Reading

Dell SecureWorks and Risk I/O team up to deliver a better kind of Vulnerability Management

By David Monahan on Apr 29, 2014 11:56:20 AM

On April 23rd, 2014 Dell announced its new Vulnerability Threat Monitoring and Prioritization service delivered through the SecureWorks Counter Threat Platform.  This managed service was created to expand the current Vulnerability Management offerings and increase customer value by creating the ability for customers to integrate their own vulnerability management systems.  With the additional context provided through Risk I/O, remediation and mitigation prioritization are done less in a bubble of the operational environment and more in context with the Internet threat universe.

Continue Reading

Gaining Data Control with BYOD and Bluebox

By David Monahan on Apr 22, 2014 10:51:06 AM

What’s the issue with BYOD? Data Control… What’s the issue with Data Sharing? Data Control!

Continue Reading

VMware and OpenStack: A Marriage Made in Heaven?

By Torsten Volk on Mar 25, 2014 8:40:39 AM

As we -Evan and I- were ranting last week about how OpenStack and VMware fit together (see #EMACloudRants), we were mainly focusing on the central conundrum that VMware faces within this context: “Should we support an open platform that could commoditize away a substantial part of our profitable infrastructure business or should we ignore the threat and do our own thing”

Continue Reading

EMA Cloud Rants – Pilot Episode

By Torsten Volk on Mar 17, 2014 1:33:45 PM

Evan Quinn and I have been collecting popular customer questions for a while and wanted to share our thoughts on these questions in the form of a new format: EMA CLOUD RANTS. Each week we will discuss one of the hot topics in enterprise IT to provide the viewer with rapid analyst insights, without any fluff. Here goes the first one:

Continue Reading

Symantec CyberWar Games Provide Valuable Cyber-Insight

By David Monahan on Mar 3, 2014 6:40:11 PM

The emotions oscillate between high frustration and high jubilation as I observe cyber-attack teams’ hacking activities against an unnamed financial institution…

Continue Reading

CA Analyst Symposium- CA is Changing

By David Monahan on Mar 3, 2014 6:39:56 PM

I had an interesting experience a few weeks ago.  I went to NYC to brief with CA Technologies.  I spent a full day speaking in group sessions with some of its top executives including CEO, Mike Gregoire, EVP Technology and Development, Peter Griffiths, EVP Strategy and Corporate Development Jacob Lamm, as well as a 1 on 1 meeting with GM of Security Management Mike Denning,.  I found their discussions and candor on the changes and advancements within CA VERY refreshing; more so than I would have expected from what I perceived as a “monolithic behemoth” such as CA.
Continue Reading

Software Defined Storage: The Vendor Landscape – Part 2 of 2

By Torsten Volk on Feb 17, 2014 9:42:23 AM

As promised in my previous post on “Software Defined Storage – Why Customers Should Care”, I want to follow-up with a brief overview of the competitive landscape.

Continue Reading

Software Defined Storage: Why Customers Should Care – Part 1 of 2

By Torsten Volk on Feb 17, 2014 9:42:22 AM

Much marketing hype and heated discussions should be seen as excellent indicators for the fact that Software Defined Storage (SDS) is one of the hottest topics in today’s data center. Naturally, every vendor defines SDS based on their own product range, sometimes leaving customer out of the equation.

Continue Reading

EMA Research: Enabling Enterprise IT Management to Optimally Support Big Data

By Torsten Volk on Feb 17, 2014 9:42:22 AM

What does Big Data mean to traditional enterprise IT? Organizations of any size and industry are becoming more and more aware of the incredible importance of capturing, managing and analyzing the data available to them. The more comprehensively companies are able to tap structured and unstructured data sources, the quicker they can refresh this data and the more successfully they make this body of data available to all business units, the better they can develop advantages in the market place. Today’s business units are demanding the rapid implementation of these big data use cases, as well as optimal resiliency, cost efficiency, security and performance.

Continue Reading

Software Defined Storage: The Vendor Landscape – Part 2 of 2

By Torsten Volk on Feb 13, 2014 10:23:44 AM

As promised in my previous post on "Software Defined Storage - Why Customers Should Care", I want to follow-up with a brief overview of the competitive landscape.

Continue Reading

EMA Research: Enabling Enterprise IT Management to Optimally Support Big Data

By Torsten Volk on Feb 6, 2014 8:45:26 AM

What does Big Data mean to traditional enterprise IT? Organizations of any size and industry are becoming more and more aware of the incredible importance of capturing, managing and analyzing the data available to them. The more comprehensively companies are able to tap structured and unstructured data sources, the quicker they can refresh this data and the more successfully they make this body of data available to all business units, the better they can develop advantages in the market place. Today’s business units are demanding the rapid implementation of these big data use cases, as well as optimal resiliency, cost efficiency, security and performance.

Continue Reading

Software Defined Storage: Why Customers Should Care – Part 1 of 2

By Torsten Volk on Feb 5, 2014 9:26:59 AM

Much marketing hype and heated discussions should be seen as excellent indicators for the fact that Software Defined Storage (SDS) is one of the hottest topics in today’s data center. Naturally, every vendor defines SDS based on their own product range, sometimes leaving customer out of the equation.

Continue Reading

The State of the Software Defined Data Center

By Torsten Volk on Feb 3, 2014 1:03:44 PM

Of course, I always encourage practitioners to carefully study the full EMA research report on the “Obstacles and Priorities on the Journey to the Software-Defined Data Center” or at least read the research study summary or at the very least join the EMA SDDC Research webinar on February 18, but I still want to briefly summarize the key findings here.

Continue Reading

The State of the Software Defined Data Center

By Torsten Volk on Feb 3, 2014 11:15:45 AM

Of course, I always encourage practitioners to carefully study the full EMA research report on the “Obstacles and Priorities on the Journey to the Software-Defined Data Center” or at least read the research study summary or at the very least join the EMA SDDC Research webinar on February 18, but I still want to briefly summarize the key findings here.

Continue Reading

Don’t Believe Everything You Read – Especially About Enterprise Mobility!

By Steve Brasen on Jan 17, 2014 11:12:53 AM

I just got off the phone with a reporter from a major industry trade magazine (no names please!) who is preparing an article on enterprise mobile device adoption. Wanting to help ensure accuracy in the reporting, I provided him with statistical details from our recent research into the use of mobile devices in the enterprise and stepped him through the findings. He was fascinated by the results and asked lots of follow-up questions. In the end, however, he admitted he would likely not be able to use any of the information in his article (say what?!). Apparently, his editor had specifically tasked him with writing an article showcasing how tablets are rapidly replacing PCs in the workplace, even though this is completely contradictory to reality.

Continue Reading

Security Awareness Programs Are Not just For Compliance

By David Monahan on Jan 16, 2014 8:35:20 PM

I see a significant gap in not only how the need for Security Awareness training is perceived as needed but also in the general quality of the programs and training delivered vs other types of training.  In many cases small companies avoid security awareness training due to ignorance, cost fears, or fears it will stifle their culture of creativity.  This research project is structured to give CIO’s, CISO’s, and other security and IT managers the data to motivate them to provide in security awareness training programs thereby bringing about change in their organizations.

Continue Reading

Last minute 2014 RSA Boycotts Hurt Attendees not RSA

By David Monahan on Jan 16, 2014 8:35:19 PM

With all of the negative attention that the NSA – RSA relationship (or deal) has been getting, many are fired up.  If the deal went down anything like it has been reported by Reuters, then rightfully so.  However, the last minute boycotts of the RSA event to show disapproval are a bit much.

Continue Reading

ForeScout Technologies has a Knack for NAC (and more) with ControlFabric and CounterACT

By David Monahan on Jan 16, 2014 8:35:02 PM

Recently I briefed with ForeScout Technologies, a Network Admission/Access Control (NAC) vendor, to get an update on the CounterACT platform it has been delivering and developing for a few years and to see its recently announced ControlFabric technology.  I thought it wise to take another look at NAC vendors and how they address BYOD, rogue, or non-compliant devices that can be the source of many compliance and security headaches including advanced/targeted threats.

Continue Reading

Recent Surveillance “Revelations” Part 2- What can we do?

By David Monahan on Jan 16, 2014 8:34:55 PM

I hope you were able to read part 1 of this blog prior to coming to this part as it really sets the stage.
Continue Reading

Introduction and Thoughts About Recent Surveillance “Revelations”

By David Monahan on Jan 16, 2014 8:34:53 PM

Hello everyone!  I have been at Enterprise Management Associates for a couple of months now and decided that it is time to write an introduction and blog.  For those of you who have been following the blog from Scott Crawford, I hope you will find my blogs stimulating and possibly entertaining.  I tend to throw a few zingers in on occasion for a little humor as sometimes security writing can come across a little dry.

Continue Reading

Highlights from IBM Analyst Insights 2013

By Torsten Volk on Nov 26, 2013 1:46:30 PM

As every year, IBM invited the analyst community to Stamford, CT, for a deep dialogue on today’s most important topics in enterprise IT. Here is a short overview for everyone interested in IBM’s current world view.

Continue Reading

Highlights from IBM Analyst Insights 2013

By Torsten Volk on Nov 22, 2013 12:47:41 PM

As every year, IBM invited the analyst community to Stamford, CT, for a deep dialogue on today's most important topics in enterprise IT. Here is a short overview for everyone interested in IBM's current world view.

Continue Reading

Graph Databases–and Their Potential to Transform How We Capture Interdependencies

By Dennis Drogseth on Nov 18, 2013 2:10:15 PM

Discovering, capturing and making sense of complex interdependencies is central to running IT organizations more effectively, and it is also a critical part of running the businesses IT serves. Whether it’s optimizing a network, or an application infrastructure, managing change, or providing more effective security-related access—more often than not these problems involve a complex set [...]

Continue Reading

Rapid Evolution – OpenStack Is Growing Up

By Torsten Volk on Oct 28, 2013 9:21:05 AM

The Havana release of OpenStack was launched on October 17, about three weeks prior to the OpenStack Summit in Hong Kong.  As always, there are many new features -high availability, load balancing, easier upgrades, plugins for development tools, improved SDN support, fiber channel SAN support, improved bare metal capabilities- and even two new core components, Ceilometer -metering and monitoring- and Heat -orchestration of the creation of entire application environments- to admire. Without any doubt, OpenStack is becoming more enterprise ready with each new release .

Continue Reading

Rapid Evolution – OpenStack Is Growing Up

By Torsten Volk on Oct 24, 2013 7:59:53 AM

The Havana release of OpenStack was launched on October 17, about three weeks prior to the OpenStack Summit in Hong Kong.  As always, there are many new features -high availability, load balancing, easier upgrades, plugins for development tools, improved SDN support, fiber channel SAN support, improved bare metal capabilities- and even two new core components, Ceilometer -metering and monitoring- and Heat -orchestration of the creation of entire application environments- to admire. Without any doubt, OpenStack is becoming more enterprise ready with each new release .

Continue Reading

War of the Stacks: OpenStack vs. CloudStack vs. vCloud vs. Amazon EC2

By Torsten Volk on Oct 14, 2013 2:25:19 PM

When it comes to cloud technologies, discussions often get passionate or even heated. It’s all about the “war of the stacks”, where much Cool Aid is dispensed to get customers to buy into the respective cult. This discussion reminds me of the old days of enterprise IT, where everything was about technology instead of business value. You either bought one thing or the other and then you were locked in for a half decade. Dark times.

Continue Reading

War of the Stacks: OpenStack vs. CloudStack vs. vCloud vs. Amazon EC2

By Torsten Volk on Oct 11, 2013 11:46:00 AM

When it comes to cloud technologies, discussions often get passionate or even heated. It’s all about the “war of the stacks”, where much Cool Aid is dispensed to get customers to buy into the respective cult. This discussion reminds me of the old days of enterprise IT, where everything was about technology instead of business value. You either bought one thing or the other and then you were locked in for a half decade. Dark times.

Continue Reading

VMworld 2013 Digest – 8 Companies You Should Take a Closer Look At

By Torsten Volk on Sep 3, 2013 12:02:14 PM

Every year after VMworld EMA receives countless inquiries regarding the most notable vendors on the show floor. This time around, we have compiled a list consisting of startups taking a new look at traditional IT challenges, as well as larger and more mature companies that have launched industry transforming initiatives. Ultimately, this list of eight extraordinary vendors is focused on one central concept: customer value.

Continue Reading

VMworld 2013 Digest – 8 Companies You Should Take a Closer Look At

By Torsten Volk on Aug 30, 2013 9:28:28 AM

Every year after VMworld EMA receives countless inquiries regarding the most notable vendors on the show floor. This time around, we have compiled a list consisting of startups taking a new look at traditional IT challenges, as well as larger and more mature companies that have launched industry transforming initiatives. Ultimately, this list of eight extraordinary vendors is focused on one central concept: customer value.

Continue Reading

The Impact of Cloud on Data Protection: Ripple or Sharknado™

By Torsten Volk on Aug 14, 2013 12:35:47 PM

It’s always like that in enterprise IT. There’s this incredible new technology that lets you do things you could never even fathom possible. But then, once the honeymoon is over, the old problems come back to bite you with a vengeance.

Continue Reading

The Impact of Cloud on Data Protection: Ripple or Sharknado™

By Torsten Volk on Aug 14, 2013 12:18:21 PM

It’s always like that in enterprise IT. There’s this incredible new technology that lets you do things you could never even fathom possible. But then, once the honeymoon is over, the old problems come back to bite you with a vengeance.

Topics: Uncategorized
Continue Reading

Review of the Microsoft SURFACE RT – A Story of What Could Have Been

By Torsten Volk on Jul 18, 2013 7:22:11 PM

Now that I have spent a month with my latest gadget, a Microsoft Surface RT, I want to share some thoughts on the device, as well as on Windows 8. I have been a happy iPad user for the previous 2 years, but have sorely missed MS Office on this excellent device. As much as I like -if not love- the iPad, there was this key moment on a flight to Boston that made me wonder if there’s not a better tablet out there for doing my work. The casualty was a 28 page research report, with plenty of charts and tables. I used QuickOffice, a highly rated productivity suite for iPad, to complete a final edit of my document. To make it short, after 3 hours of editing, the document was damaged beyond repair, even by the EMA production team, and I ended up with the infuriating manual task of having to open up a previous version of my doc on one and the entirely garbled version on another screen and manually restore my edits. Not fun.

Continue Reading

Review of the Microsoft SURFACE RT – A Story of What Could Have Been

By Torsten Volk on Jul 18, 2013 9:56:41 AM

Now that I have spent a month with my latest gadget, a Microsoft Surface RT, I want to share some thoughts on the device, as well as on Windows 8. I have been a happy iPad user for the previous 2 years, but have sorely missed MS Office on this excellent device. As much as I like -if not love- the iPad, there was this key moment on a flight to Boston that made me wonder if there’s not a better tablet out there for doing my work. The casualty was a 28 page research report, with plenty of charts and tables. I used QuickOffice, a highly rated productivity suite for iPad, to complete a final edit of my document. To make it short, after 3 hours of editing, the document was damaged beyond repair, even by the EMA production team, and I ended up with the infuriating manual task of having to open up a previous version of my doc on one and the entirely garbled version on another screen and manually restore my edits. Not fun.

This unfortunate event made me curious to take a look at alternatives that may allow running MS Office natively. XenDesktop was an option, however, the excellent Citrix mobile workplace solution would also not have helped me on the plane, as there are no offline capabilities for iPad. That’s when I thought about getting a Microsoft SURFACE. However, spending $699, only to be able to work on the plane a few times a month for a few hours seemed overkill, even for me. So instead, I ended up using my 8 pound brick, also known as HP Elite Book. It wasn’t cool or friendly for my back, but it was productive.

Then came TechEd and the economics behind the SURFACE changed. In return for 1.5 hours of standing in line and $99, I obtained the 64GB SURFACE RT, including the touch keyboard. It feels wrong to criticize a device that cost me $99, but here’s my review aimed at an audience considering to splurge the full $699.

Pros:

  1. MS Office: The SURFACE has MS OFFICE loaded by default, offering Word, Excel, PowerPoint and OneNote (Outlook is coming soon) in an incredibly small form factor. It works great and doesn’t seem to cause any incompatibility issues with my documents that were created in Office 2010 on the desktop. As I run my entire professional life through MS OneNote, this is a huge advantage for me.
Continue Reading

OpenStack Thoughts – Part 2: Impact on VMware

By Torsten Volk on Jun 20, 2013 9:56:22 AM

At EMA, we constantly receive inquiries regarding what OpenStack means to the VMware portfolio. Is it a competing technology? Are OpenStack and vCloud complementary? Why did VMware join OpenStack? What are the typical use cases for OpenStack as opposed to vCloud? To address these questions, let’s take a step back and take a look at what OpenStack is and, as importantly, what it is not. This post is building on my previous article on the business value of OpenStack.

Continue Reading

OpenStack Thoughts – Part 2: Impact on VMware

By Torsten Volk on Jun 19, 2013 9:33:19 AM

At EMA, we constantly receive inquiries regarding what OpenStack means to the VMware portfolio. Is it a competing technology? Are OpenStack and vCloud complementary? Why did VMware join OpenStack? What are the typical use cases for OpenStack as opposed to vCloud? To address these questions, let’s take a step back and take a look at what OpenStack is and, as importantly, what it is not. This post is building on my previous article on the business value of OpenStack.

Continue Reading

Maybe We Should Call It The “Pre-Post-PC” Era?

By Steve Brasen on Jun 6, 2013 9:48:41 AM

IT marketing hype has generated quite a few ridiculous and sometimes outright bizarre phrases to describe trends in technology adoption, but few on the list of the absurd top the insistence that we live in a “post-PC” era.  The concept of “post-PC” derives from the (correct) fact that mobile device adoption has broadly accelerated, but makes the incorrect assumption that this is causing a substantial decrease in PC use.  Nothing could be further from the truth – especially in relation to the business use of desktop and laptop PCs.

Continue Reading

Dell’s Clean Slate Approach to Enterprise IT

By Torsten Volk on May 8, 2013 7:22:09 PM

Breaking News: Dell Acquires Enstratius to Further Complete Its Cloud Story

Continue Reading

Dell’s Clean Slate Approach to Enterprise IT

By Torsten Volk on May 3, 2013 12:05:21 PM

Breaking News: Dell Acquires Enstratius to Further Complete Its Cloud Story

Continue Reading

OpenStack Thoughts – Part 1: Key Business Considerations

By Torsten Volk on Apr 22, 2013 10:27:18 AM

OpenStack’s huge momentum is undeniable. IBM, RedHat, NetApp, Rackspace, HP, Dell, Cisco, Intel and even VMware have committed significant funds and human resources to this project. But why would companies, that are otherwise competing rather fiercely, sit on one table to build an OpenSource cloud platform?

Continue Reading

OpenStack Thoughts – Part 1: Key Business Considerations

By Torsten Volk on Apr 22, 2013 10:01:57 AM

OpenStack’s huge momentum is undeniable. IBM, RedHat, NetApp, Rackspace, HP, Dell, Cisco, Intel and even VMware have committed significant funds and human resources to this project. But why would companies, that are otherwise competing rather fiercely, sit on one table to build an OpenSource cloud platform?

Continue Reading

On the Importance of Workload Automation in the Age of Cloud and Big Data

By Torsten Volk on Mar 27, 2013 10:03:12 AM

With its roots in mainframe job scheduling, workload automation is often seen as a relic in today's age of cloud, Big Data, mobile management and DevOps. Do we even still need workload automation as a separate discipline or should we simply roll the management of batch jobs into other automation disciplines, such as IT process automation? Is the market for workload automation software stagnating or is there still potential for growth?

Continue Reading

The Software Defined Datacenter: Part 4 of 4 – Where We Are Today

By Torsten Volk on Mar 26, 2013 3:58:50 PM

Almost one year into the discussion about the Software Defined Data Center (SDDC), it is time to take inventory of the state of the discipline. As a reminder, the ultimate goal of the SDDC is to abstract and centralize the
management of compute, network, storage, operating systems, middleware and applications in order to dynamically place workloads where they can run in the most cost efficient, secure and compliant manner.

Continue Reading

The Software Defined Datacenter: Part 4 of 4 – Where We Are Today

By Torsten Volk on Mar 25, 2013 9:34:24 AM

Almost one year into the discussion about the Software Defined Data Center (SDDC), it is time to take inventory of the state of the discipline. As a reminder, the ultimate goal of the SDDC is to abstract and centralize the
management of compute, network, storage, operating systems, middleware and applications in order to dynamically place workloads where they can run in the most cost efficient, secure and compliant manner.

Continue Reading

Data Management: In-Memory Could Be the Mother of All Wisdom

By John Myers on Feb 27, 2013 12:07:01 PM

As I review my series of #100linesOnBIDW blogs over the last couple of weeks, I found myself looking at the Data Management posting. I covered when to apply schemas, Big Data, and data governance. What I left out was technical implementation concepts for data management systems like row vs. column orientation; in-memory vs. spinning disk primary storage; and symmetric multiprocessing (SMP) vs. massively parallel processing (MPP). Processing and storage were the “developments” of 2012. I left 2013 for the “how to use” Data Management platforms.

Continue Reading

Actionable Intelligence in 2013: Action will Define You

By John Myers on Feb 18, 2013 9:18:23 AM

If I told you in September that the Baltimore Ravens would win the Super Bowl in February and you did nothing with that information ( i.e. place a bet, announce your prognostication skill, etc. ), was my prediction worth anything? Much like “if a tree falls in the forest and no one is there to hear it, did it make a sound?”, you need action from a piece of analysis, prediction, etc. to make it worthwhile.

Continue Reading

Knowledge Delivery in 2013: Imagination is More Important than Knowledge

By John Myers on Feb 11, 2013 9:57:31 AM

Albert Einstein once said:

Continue Reading

Business Analytics in 2013 – A Model Is Useful If…

By John Myers on Feb 11, 2013 9:56:30 AM

Edward de Bono, a noted expert on creative thinking, once said:

Continue Reading

Data Management in 2013: Warning of the Big Data Wolf

By John Myers on Jan 28, 2013 10:43:44 AM

When Aesop created the fable about the shepherd boy who cried wolf, the message was clear:

Continue Reading

Data Integration in 2013: Give us a platform and we will fill it

By John Myers on Jan 21, 2013 3:27:57 PM

“Back in the day”, Pablo Picaso once said:

Continue Reading

100 Lines about 25 Business Intelligence Topics for 2013

By John Myers on Jan 17, 2013 1:11:35 PM

I have always loved the song “88 Lines about 44 Women” by the Nails.  And based on some recent success with a blogging topic relating to the songs of the 80s, I thought that I would continue that theme with “100 Lines about 25 Business Intelligence Topics”. Think of this list, or series of lists, as a wide ranging set of predictions, topics for discussion and observations relating to the business intelligence and data warehousing domain for the upcoming year.

Continue Reading

IT Point Products DO NOT Support Data Center Infrastructure Management (DCIM), So Stop Calling Them That!

By Steve Brasen on Dec 12, 2012 9:33:49 AM

Nothing drives an IT industry analyst more nuts then when a term is repeatedly misused for marketing purposes. DCIM certainly falls into this category. In the recently release EMA Radar Report on Data Center Infrastructure Management, we looked at hundreds of products claiming to be DCIM solutions, but identified only ten (that’s right … 10!) that could reasonably lay claim to that distinction.

Continue Reading

What Big Data Is Not

By John Myers on Dec 7, 2012 1:12:00 PM

Next week, EMA and 9sight will hold a webinar covering our Big Data research findings.  Among our insights will be that Big Data has evolved. Moving forward, Big Data isn’t:

Continue Reading

The Software-Defined Datacenter: Part 3 of 4 – Questions and Battlefields

By Torsten Volk on Sep 24, 2012 11:24:05 AM

After talking about the “grand vision” of the Software Defined Datacenter (SDD) in part 1 of this series and discussing the individual components required to build out the SDD in part 2, this third part will be all about the three core challenges and controversies:

Continue Reading

The Software-Defined Datacenter: Part 3 of 4 – Questions and Battlefields

By Torsten Volk on Sep 24, 2012 8:58:53 AM

After talking about the “grand vision” of the Software Defined Datacenter (SDD) in part 1 of this series and discussing the individual components required to build out the SDD in part 2, this third part will be all about the three core challenges and controversies:

Continue Reading

The Software-Defined Datacenter: Part 2 of 4 – Core Components

By Torsten Volk on Aug 23, 2012 10:42:54 AM

In part 1 of this series of four posts, we examined the grand vision of the software-defined datacenter (SDD). In this second post of the series, we will take a look at the core components of the SDD (see Figure 1) and provide a brief evaluation of how mature these components currently are.

Continue Reading

The Software-Defined Datacenter: Part 2 of 4 – Core Components

By Torsten Volk on Aug 22, 2012 5:37:52 PM

In part 1 of this series of four posts, we examined the grand vision of the software-defined datacenter (SDD). In this second post of the series, we will take a look at the core components of the SDD (see Figure 1) and provide a brief evaluation of how mature these components currently are.

Continue Reading

The Software-Defined Datacenter: Part 1 of 4 – The Basics

By Torsten Volk on Aug 16, 2012 6:00:58 PM

The ultimate goal of the Software-Defined Datacenter (SDD), a term coined only a few months ago by VMware’s Steve Herrod, is to centrally control all aspects of the data center – compute, networking, storage – through hardware-independent management and virtualization software. This software will also provide the advanced features that currently constitute the main differentiators for most hardware vendors. The following quote by Steve Herrord succinctly sums up the bad news that VMware is delivering to many of these vendors: “If you’re a company building very specialized hardware … you’re probably not going to love this message.”

Continue Reading

The Software-Defined Datacenter: Part 1 of 4 – The Basics

By Torsten Volk on Aug 16, 2012 3:05:13 PM

The ultimate goal of the Software-Defined Datacenter (SDD), a term coined only a few months ago by VMware’s Steve Herrod, is to centrally control all aspects of the data center – compute, networking, storage – through hardware-independent management and virtualization software. This software will also provide the advanced features that currently constitute the main differentiators for most hardware vendors. The following quote by Steve Herrord succinctly sums up the bad news that VMware is delivering to many of these vendors: “If you’re a company building very specialized hardware … you’re probably not going to love this message.”

Topics: Uncategorized
Continue Reading

A Collaborative Journey to the Cloud

By Torsten Volk on Aug 1, 2012 9:50:10 AM

When I picked “The Journey to the Cloud” as the working title for one of my fall research projects, I triggered some immediate reactions from colleagues and customers, whose opinions I value. And while I typically do not place too much importance on selecting a working title and also did not intend to just warm up an earlier research piece on that same topic, these reactions prompted me to take a minute to think about how we can best target our research for maximum customer benefit. As EMA is conducting this research for our customers – vendors and end users – why not talk to exactly these people to find out which specific issues they want to learn more about? And so we did…

Continue Reading

A Collaborative Journey to the Cloud

By Torsten Volk on Aug 1, 2012 9:42:00 AM

When I picked “The Journey to the Cloud” as the working title for one of my fall research projects, I triggered some immediate reactions from colleagues and customers, whose opinions I value. And while I typically do not place too much importance on selecting a working title and also did not intend to just warm up an earlier research piece on that same topic, these reactions prompted me to take a minute to think about how we can best target our research for maximum customer benefit. As EMA is conducting this research for our customers – vendors and end users – why not talk to exactly these people to find out which specific issues they want to learn more about? And so we did…

Continue Reading

Physical, Virtual … Cloud – Upcoming EMA Research

By Torsten Volk on Jul 18, 2012 12:17:47 PM

Cloud is still a rapidly evolving discipline, with currently many organizations thinking about how to get started or how to take their limited cloud environment to the next level. These organizations are faced with two general challenges. They have to a) get their own house – data center – in order and b) identify a shortlist of vendors that best fit their individual requirements.

Continue Reading

Physical, Virtual … Cloud – Upcoming EMA Research

By Torsten Volk on Jul 18, 2012 11:13:28 AM

Cloud is still a rapidly evolving discipline, with currently many organizations thinking about how to get started or how to take their limited cloud environment to the next level. These organizations are faced with two general challenges. They have to a) get their own house - data center – in order and b) identify a shortlist of vendors that best fit their individual requirements.

Continue Reading

EMA Radar for Workload Automation 2012 – Key Findings

By Torsten Volk on Jun 14, 2012 12:38:37 PM

During this year’s research for the 2012 EMA Workload Automation (WLA) Radar Report, we encountered a number of very interesting core findings. These research results mostly originated from dozens of conversations with end customers, who have been using WLA software for many years and sometimes even for decades. WLA, by definition, is a mature discipline, as it started during the beginning of mainframe times, then became more complex when organizations adopted distributed computing, and today is faced with a new challenge: the cloud. Please take a look at what our research showed as the most important aspects of a modern WLA solution. The following vendors were included in the report: Arcana, ASCI, ASG, BMC, CA Technologies, Cisco, Flux, MVP Systems, Network Automation, ORSYP, Stonebranch, UC4.

Continue Reading

EMA Radar for Workload Automation 2012 – Key Findings

By Torsten Volk on Jun 14, 2012 10:57:43 AM

During this year's research for the 2012 EMA Workload Automation (WLA) Radar Report, we encountered a number of very interesting core findings. These research results mostly originated from dozens of conversations with end customers, who have been using WLA software for many years and sometimes even for decades. WLA, by definition, is a mature discipline, as it started during the beginning of mainframe times, then became more complex when organizations adopted distributed computing, and today is faced with a new challenge: the cloud. Please take a look at what our research showed as the most important aspects of a modern WLA solution. The following vendors were included in the report: Arcana, ASCI, ASG, BMC, CA Technologies, Cisco, Flux, MVP Systems, Network Automation, ORSYP, Stonebranch, UC4.

Continue Reading

Windows 8: The Mobile Dark Horse

By Steve Brasen on Apr 26, 2012 5:28:55 PM

I know what you’re thinking – you just read the title and thought, “Microsoft as a serious player in the mobile space … suuuuure!”  Bear with me, though – this really does make sense.

Continue Reading

From File Share to ownCloud, Dropbox and RES HyperDrive

By Torsten Volk on Apr 11, 2012 2:37:43 PM

I was sitting in a plane recently, pulling out my iPad to enjoy one of my colleague’s excellent publications. After clicking the Dropbox icon, I noticed that I forgot to bookmark the actual document, so it did not replicate to the iPad. This rather annoying experience made me think about how far we have come regarding replicated and shared storage. It made me also think about where we may go from here.

Continue Reading

From File Share to ownCloud, Dropbox and RES HyperDrive

By Torsten Volk on Apr 11, 2012 10:20:20 AM

I was sitting in a plane recently, pulling out my iPad to enjoy one of my colleague's excellent publications. After clicking the Dropbox icon, I noticed that I forgot to bookmark the actual document, so it did not replicate to the iPad. This rather annoying experience made me think about how far we have come regarding replicated and shared storage. It made me also think about where we may go from here.

Continue Reading

IBM Pulse 2012: Visibility – Control – Automation

By Torsten Volk on Mar 28, 2012 1:35:00 PM

Every March, IBM invites customers and analysts to its annual Pulse user conference. This year, Pulse was all about the more efficient delivery of IT services, a concept that is usually referred to as “cloud”. Since cloud has developed into a term that, due to its overuse, is often frowned upon, to say the least, it was great to see IBM try hard to demystify this elusive concept, backing it up with numerous case studies and customer testimonials. The fact that many of these case studies were not as polished as you so often see during this type of show, made the experience actually better. It became clear that these were real customers, implementing “cloud” to solve very specific corporate problems and while doing this, running into very specific IT problems. This is something that just happens when breaking new ground and it speaks for IBM’s self confidence to not present only squeaky clean projects at its show.

Continue Reading

IBM Pulse 2012: Visibility – Control – Automation

By Torsten Volk on Mar 28, 2012 8:42:01 AM

Every March, IBM invites customers and analysts to its annual Pulse user conference. This year, Pulse was all about the more efficient delivery of IT services, a concept that is usually referred to as "cloud". Since cloud has developed into a term that, due to its overuse, is often frowned upon, to say the least, it was great to see IBM try hard to demystify this elusive concept, backing it up with numerous case studies and customer testimonials. The fact that many of these case studies were not as polished as you so often see during this type of show, made the experience actually better. It became clear that these were real customers, implementing "cloud" to solve very specific corporate problems and while doing this, running into very specific IT problems. This is something that just happens when breaking new ground and it speaks for IBM's self confidence to not present only squeaky clean projects at its show.

Continue Reading

User Experience Management Panel in Boston

By Dennis Drogseth on Mar 21, 2012 1:27:25 PM

User Experience Management (UEM) continues to capture interest in the marketplace.  And yet it remains somewhat elusive. So, what is User Experience Management really?  It’s gone by many other names in the past, such as Quality of Experience (QoE), and has other incarnations in the present such as Real User Management (RUM).   Older, typically network-centric [...]

Continue Reading

The Many Dimensions of User Experience Management (UEM)

By Dennis Drogseth on Mar 13, 2012 11:49:26 AM

See Dennis’ recent article on User Experience Management (UEM), posted at APM Digest, here: http://www.apmdigest.com/the-many-dimensions-of-user-experience-management-uem

Continue Reading

Phish-ing for New Operational Revenues

By John Myers on Mar 7, 2012 10:18:35 AM

Miami Dolphins, Sun Life Stadium and IBM Intelligence Operations Center

Last September, Forbes Magazine published its 2011 ranking of the NFL’s Most Valuable Teams. Forbes gives detailed financial information on why NFL franchise values are “only” growing by 1.4%. The article notes that operating costs for NFL franchises are rising. This increase is due to: