Celonis Process Mining: A Modern Value Creation Engine for the Digital World
By John Santaferraro on Dec 12, 2018 8:18:10 PM
Process mining technology extracts business application data, tags it based on time and location within a business process, visualizes the business processes, logs variations, and makes recommendations for process improvement based on built-in advanced analytics. RPA technology identifies repetitive business processes with potential for automation and codifies the logic necessary to take intelligent action without human intervention. In some more critical areas, the RPA engine makes recommendations for validation by human decision-making.
Tableau Sets the Tone for Business Intelligence 2019
By John Santaferraro on Nov 7, 2018 11:57:56 AM
From community to consumers of data, Tableau Conference 2018 (TC18) set the tone for the business intelligence market in 2019.
Salesforce Honors Customers, Boosts Sales Productivity: Gleanings from an Industry Analyst Observer
By John Santaferraro on Oct 9, 2018 12:44:15 PM
I could spend pages and days talking all about the new technology that was released at Dreamforce 2018, but I am going to take the higher road and discuss what Dreamforce 2018 means to customer organizations. Salesforce demonstrated that it cares about its customers and is committed to increasing the productivity of customer-facing teams around the world. Of course, if customer-facing teams are more productive, that will mean increased revenue, higher customer satisfaction, and a palpable competitive advantage.
The C-Suite Should see Gains in Productivity and Profitability
Many sales leaders complain about the challenge of getting sales representatives to enter information into their sales automation systems. The results are incomplete information and the inability to properly forecast and manage sales teams for success. The introduction of Einstein Voice allows sales teams to interact with Salesforce products over their morning coffee or handsfree on their drive home, freeing them to do more of what they are paid to do: sell.
Cyber Attackers Turn Their Sight to ERP Applications
By Paula Musich on Sep 26, 2018 7:58:29 AM
In late July, the Department of Homeland Security issued a warning about a growing number of malicious cyberattacks aimed at ERP systems based on a research project conducted by Digital Shadows and Onapsis. This warning comes at the heels of the first-ever DHS CERT Alert focused on SAP Business Applications released in May of 2016. According to the report, hackers exploited old, unpatched vulnerabilities to successfully hack multiple organizations, including government agencies, energy businesses, and financial services companies. Onapsis and Digital Shadows found significant evidence of increased interest on ERP applications, including bad actors in criminal forums on the dark web asking for exploits specifically targeting ERP technology vulnerabilities. The study, “ERP Applications Under Fire: How Cyberattackers Target the Crown Jewels,” found that the attackers do not need to use advanced techniques to breach their targets because the current state of ERP application security across organizations is such that old vulnerabilities still affect these systems. This means that attackers don’t need to develop new zero-days or advanced exploitation techniques.
EMA Perspectives – Informatica Makes Sparks Fly in the Cloud
By John Santaferraro on Sep 18, 2018 11:54:08 AM
On September 12, 2018, at Strata NYC, Informatica announced a data management solution for Apache Spark-based cloud environments, including Google Cloud Dataproc, Qubole, and Azure Databricks. Touting new advancements in CLAIRE™, a metadata intelligence technology powered by artificial intelligence (AI) and machine learning, this new release is targeted at increasing the efficiency and reach of data management organizations. To expand efficiency, Informatica is releasing more than 50 new algorithms and functions for automated data discovery and preparation, as well as machine learning focused on industrializing data operations.
Public Clouds Are Disrupting Enterprise Network Management
By Shamus McGillicuddy on Sep 14, 2018 3:31:41 PM
Network managers who are supporting the migration of critical applications to the public cloud will need a new set of tools for engineering and operations.
3 Key Lessons from DockerCon 2018: Strategic Analysis of the Container Market Place
By Torsten Volk on Jun 26, 2018 5:21:30 AM
Today, where there are almost as many approaches to digital transformation as there are enterprise software vendors, Docker refocuses its strategy on providing the best unified container management platform for DevOps. Docker’s key value proposition is to enable developers to build an application once and then deploy it to any Kubernetes-driven private or public cloud, where DevOps teams and IT operations can manage it throughout its lifecycle and move it to another location at any point in time. However, Docker also aims to absorb traditional enterprise applications, edge and IoT workloads, big data apps, blockchain, and serverless functions, both on Windows and on Linux.
Future-Proofing Your EDR Solution
By Steve Brasen on Jun 19, 2018 5:16:04 PM
EMA recently published primary research on the topic of “Adopting Effective Solutions in Endpoint Detection and Response,” which included a detailed comparison of two of the most popular platforms on the market today: Tanium and 1E Tachyon. Put simply, Endpoint Detection and Response (EDR) solutions represent a classification of management tools designed to proactively provide the holistic visibility and rapid automation necessary to respond to endpoint security threats and administration requirements in real-time. The purpose of the evaluation was to provide an example of how to conduct a side-by-side comparison of EDR solutions in order to determine the optimal platform for meeting current endpoint management requirements.
Cisco Live 2018: Forget Hardware, Cisco Is All About Software
By Shamus McGillicuddy on Jun 14, 2018 4:17:51 PM
For years network engineers have built lucrative careers upon their wizardly knowledge of things like network protocols, hardware specifications, and the Cisco command line interface (CLI). These skills are still essential to network engineering, but they are emblematic of a highly manual, box-by-box era of network engineering and operations. Today’s enterprises need agile, programmatic networks that leverage software, automation, and more
Putting the User into “User Experience Management”
By Dennis Drogseth on May 31, 2018 8:05:11 AM
In the course of researching, documenting and advising on user experience management needs and directions for more than a decade, I’ve found myself waging a quiet (and sometimes not so quiet) war with several industry assumptions. Chief among these is the notion that user experience management (UEM) is purely a subset of application performance management (APM). This APM-centricity misses some of UEM’s most critical value points, and in a basic sense fails to recognize what UEM is truly about.