In an ideal world, customers would be able to fully take advantage of the benefits of hybrid cloud by rationally matching infrastructure parameters -cost, performance, reliability, availability, security, regulatory compliance, scalability- with the requirements and dependencies of each application.
How to Unleash the Full Value of Hybrid Cloud
By Torsten Volk on Oct 24, 2016 12:26:50 PM
The Magnificent Seven ITSM 2.0 Challenges
By Dennis Drogseth on Oct 11, 2016 3:03:31 PM
This is my second blog targeting the next generation of IT service management, or ITSM 2.0. The first blog described the characteristics I see as defining ITSM 2.0. Here we’ll look more closely at the key challenges you might face in getting there from a more traditional ITSM background.
Introducing IT Service Management (ITSM) 2.0: A Cornerstone for Digital and IT Transformation
By Dennis Drogseth on Sep 27, 2016 3:38:11 PM
Over the course of numerous deployment dialogs and multiple research projects starting with last year’s work on “ITSM futures,” I have been tracking a still largely unheralded phenomenon: ITSM teams in many organizations are evolving to take a leadership role in helping all of IT become more efficient, more business aligned, and ever more relevant [...]
The Real Reason Apple Users Are Treated Like Second-Class Citizens
By Steve Brasen on Sep 26, 2016 3:03:15 PM
(With apologies to Jeff Foxworthy) You might be an Apple user if…
The Top 5 IoT Lessons I Learned From Hollywood
By David Monahan on Sep 23, 2016 12:07:46 PM
In my last IoT blog, I talked about the history of IoT and the evolution of issues surrounding IoT devices. In this part of the series, we will expand on the issues around IoT and the data it collects.
Endpoint Management and Security – More Effective as Partners than Adversaries
By Steve Brasen on Sep 2, 2016 10:59:52 AM
The primary function of enterprise IT management is to empower end users with access to technology resources that will boost their productivity and job performance. However, this focus is at odds with the core precepts of IT security which are adopted to minimize the exposure of enterprise systems, applications, and data. I recall that in a number of IT operations management adventures throughout my career, I often joked with colleagues that the most effective way to create a secure environment is to simply shut down all computers in the data center. Naturally, management executives dependent on the IT infrastructure to generate revenue were not amused by my flippancy…and even less happy that their workers had to “jump through hoops” to gain access to IT resources.
Increased Focus on Digital Experience Management Prompts New Research- Done Jointly by Dennis Drogseth and Julie Craig
By Dennis Drogseth on Aug 26, 2016 9:11:12 AM
Digital and user experience management has been the focus of multiple EMA research studies throughout the years, both as a stand-alone topic and as part of EMA’s ongoing examination of critical trends such as digital and operational transformation, IT performance optimization, and of course application performance management (APM). In many respects, optimizing the digital experience [...]
The Enterprise Service Catalog—Unifying IT Services for the Digital Age
By Dennis Drogseth on Aug 26, 2016 9:11:11 AM
While service catalogs are not new, they are becoming increasingly critical to enterprises seeking to optimize IT efficiencies, service delivery and business outcomes. They are also a way of supporting both enterprise and IT services, as well as optimizing IT for cost and value with critical metrics and insights. In this blog we’ll look at [...]
How Is Cloud Changing the Face of IT Service Management?
By Dennis Drogseth on Aug 26, 2016 9:11:11 AM
Cloud is no longer a new topic for IT, or for IT service management (ITSM). But its impact on how ITSM teams work, as well as on how IT works overall, has probably never been greater. Indeed, more and more IT organizations have been “moving to the cloud.” But understanding its relevance can’t be achieved [...]
Effective Security Requires a Change in Mindset and the Protection Paradigm
By David Monahan on Aug 24, 2016 11:05:53 AM
Nearly every day another successful breach is reported. In 2016 alone, organizations from major governmental agencies such as the IRS and Department of Defense, to major retailers including Wendy’s, have succumbed to attack. These organizations are not alone; every major business and governmental sector has been compromised. Large tech companies such as LinkedIn and Oracle, healthcare providers including Premier Healthcare (as well as numerous hospitals), manufacturers, major educational institutions, and large financial organizations have all succumbed to either internal or external threats.