Enterprise IT Watch Blog


April 29, 2013  11:45 AM

TechTarget’s weekly roundup (4/22 – 4/29)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

shutterstock_47459749

Software testing image via Shutterstock

Over the past week (and into this week), TechTarget editors have been traveling the world covering the latest IT conferences and events. Take a look at some of the biggest news from each of these events.

1. Beyond Chef and Puppet: Ten essential DevOps tools – Beth Pariseau (SearchDataCenter)

If you’re an IT professional following the DevOps philosophy of application and infrastructure management, here are 10 key tools that will help your DevOps approach identified by IT pros that attended ChefConf 2013.

2. Enterprise Data World preview: Karen Lopez offers tips for data modelers – Mark Brunelli (SearchDataManagement)

With Enterprise Data World 2013 happening this week, the SearchDataManagement team talked with InfoAdvisors senior project manager Karen Lopez on what to expect during the conference.

3. Software test plan 2013: Keynote speakers cite top trends – James A. Denman (SearchSoftwareQuality)

At the Software Test Professionals conference in San Diego last week, several keynote speakers, including RBCS President Rex Black and Florida Institute of Technology professor Cem Kaner, discussed where testing tools will fit into the picture for software testing professionals in 2013 and beyond.

4. CSA offers new initiatives to address SMB cloud security issues – Brandan Blevins (SearchCloudSecurity)

In response to growing SMB cloud security issues, Brandan Blevins reports that the Cloud Security Alliance is offering a new membership level / working group for small to medium-sized businesses.

5. Five steps to get started with HR analytics – Emma Snider (SearchFinancialApplications)

During Impact 2013, several HR experts offered up their five best practices that can help HR managers build strong HR analytics campaigns.

April 24, 2013  12:57 PM

YouTube IT video of the week: Password minder

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

People all across the world (including myself) have had trouble with one thing on their computer at some point in their lives: Remembering their password. Thanks to another assist from ITKE blogger Ken Harthun, Ellen DeGeneres has found a new product that could change the way you remember your passwords forever!

Disclaimer: All videos presented in the “YouTube IT Video of the Week” series are subjectively selected by ITKnowledgeExchange.com community managers and staff for entertainment purposes only. They are not sponsored or influenced by outside sources.


April 22, 2013  2:37 PM

TechTarget’s weekly roundup (4/15 – 4/22)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

shutterstock_101215759

Cloud security image via Shutterstock

Cloud security, cloud development and cloud backup…the ‘cloud’ was a major hit in this week’s roundup. Find out why it was such big news on the TechTarget network.

1. Five best practices for successful cloud backup – Alyssa Wood (SearchCloudComputing)

During last week’s Amazon AWS Summit, senior technology evangelist Simone Brunozzi gave attendees a history lesson by discussing how the Italian Abbey of Monte Cassino helps to illustrate the need for the five best practices on cloud backup.

2. SugarCon conference offers guidelines for social CRM success – Jack Vaughan / Mark Brunelli (SearchCRM)

In this podcast, SearchCRM News Director Mark Brunelli talks to Jack Vaughan about his recent trip to the SugarCon Conference, in particular how organizations can launch a successful social CRM initiative.

3. Symantec 2013 Threat Report highlights rise in SMB attacks – Paul Korzeniowski (SearchSecurity)

Small businesses are under attack! That’s the major takeaway from the 2013 Symantec Internet Security Threat Report, as 31% of Internet attacks were aimed at businesses with less than 250 employees.

4. OpenStack cloud users share pros and cons – Beth Pariseau (SearchCloudComputing)

At the OpenStack Summit, several OpenStack vendors, including Bloomberg, Samsung and Best Buy discussed the benefits and problems of their deployment of the open source cloud.

5. Gartner forecasts rising interest in cloud-based security interests – Brandan Blevins (SearchCloudSecurity)

According to a recent report released by Gartner, cloud-based security systems will account for 10% of all enterprise IT security product market by 2015. The rise was driven by several factors including lack of in-house IT security staff, the need to reduce costs and compliance regulations.


April 17, 2013  8:58 AM

YouTube IT video of the week: Google Nose

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Even though April Fools’ Day has come and gone, it’s nice to look back at some of the funniest technology-related jokes of April 1st. Our favorite is from Google, who introduced us to the ‘Google Nose’, which allows you to search for different smells across the Internet.

Share some other technology-related April Fools’ jokes in the comments below.

Disclaimer: All videos presented in the “YouTube IT Video of the Week” series are subjectively selected by ITKnowledgeExchange.com community managers and staff for entertainment purposes only. They are not sponsored or influenced by outside sources.


April 16, 2013  7:58 AM

Big identity is big data’s double-edge sword

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

shutterstock_130670039

Big data image via Shutterstock

By James Kobielus (@jameskobielus)

Big data’s primary executive-level sponsors are chief marketing officers (CMOs). Consequently, it’s no surprise that big-data repositories are primarily populated with information on customers. To the extent that the CMO’s IT organization has linked diverse customer records to positive identifiers–a process often known as “identity resolution”–they can drive finely targeted marketing efforts.

These massive stores of customer identity information–let’s call them “big identity”–are the lifeblood of modern commerce. Social media, other Internet sites, and enterprise repositories manage a sprawling, heterogeneous, disconnected variety of identity information. Rolling up any particular individual’s various identities across these sites demands the massively parallel horsepower, specialized analytic tools, and high-capacity storage of a robust big-data infrastructure. Identity resolution leverages advanced algorithms to uniquely match the disparate identities that an individual or group might be using.

Identity resolution is the missing link between two important use cases of big data: social media analytics on the one hand and multichannel customer relationship management on the other. High-performance identity resolution is already a substantial application in customer data integration, data quality, master data management, and anti-fraud applications.

Social media monitoring, however, has yet to tap its potential. How else can we match the disparate identities that people go under in Twitter, Facebook, and other socials, both against each other and against the system-of-record identifiers that we keep on customers in our CRM, data warehousing, and other operational platforms? Without the ability to resolve some prospective customer’s social-sourced identities, how can we determine whether or not they’re an existing customer or a hot prospect?

The flip side of the “big identity” dream is the potential for high-powered violations of personal privacy. Some say big data is Big Brother’s chief tool for mass surveillance. Others say it opens a Pandora’s box for any grass-roots peeping-Tom to pry into other people’s affairs with the most powerful telescope ever invented. A cynic might say that social business–one of the hottest new focus areas in multichannel marketing and engagement–is all about everybody minding–and mining–everybody else’s business.

Privacy concerns are rooted deep in the heart of the online experience, which thrives on freewheeling give-and-take but can easily slip into oversharing, surveillance, cyberstalking, and intrusive targeting. Businesses should put privacy considerations at the core of our big-data strategies before customers demand it or the courts, regulatory bodies, and legislators decide to force our hands.


April 15, 2013  2:48 PM

TechTarget’s weekly roundup (4/8 – 4/15)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

shutterstock_62164921

Oracle image via Shutterstock

All sorts of news came out during recent IT conferences and events including SugarCon, the Ingram Micro Cloud Summit, and the Collaborate user group conference. Take a look at what was said at each event in this week’s roundup.

1. Urban Outfitters looks creative destruction in the eye – Linda Tucci (SearchCIO)

While most CIOs and business executives continue to hear the term ‘creative destruction’, Urban Outfitters CSO Matthew Kaness has experienced it first hand, and responded by creating a brand new online experience for the e-commerce giant.

2. RFID technology options evolve beyond tags – Beth Stackpole (SearchManufacturingERP)

Although RFID is a mature technology, Beth Stackpole takes a look at five new technologies with the potential to dramatically change RFID’s course.

3. SugarCon speaker reveals 10 reasons why social CRM projects fail – Mark Brunelli (SearchCRM)

During this year’s SugarCon conference, David Myron, editorial director of CRM Magazine, discussed the top 10 reasons why social CRM projects fail including culture issues and the lack of compliance policies.

4. Ingram Micro cloud services pitch: Cloud enablement for partners – Lynn Haber (SearchITChannel)

During the Ingram Micro Cloud Summit last week, Lynn Haber reports the company laid out its strategy to help partners take a bite out of the $25 billion worldwide cloud services market in 2013.

5. Oracle President Mark Hurd: We don’t set out to be hard to work with – Mark Fontecchio (SearchOracle)

“We do not want to be hard to work with,” he said. “We don’t sit in a room and strategize about how we can be harder to work with.” Those were Oracle President Mark Hurd’s words during an exchange at the Collaborate user group conference.


April 10, 2013  12:14 PM

YouTube IT video of the week: Facebook Home

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Much of the discussion around the mobile industry as been about Facebook’s newest offering, Facebook Home. The new software, which will be available in Google stores beginning April 12, will provide deep Facebook functionality for Android smartphones and devices. Many experts, including Ron Miller, believe the company’s new approach will go nowhere. Right after the announcement, Bloomberg discussed the impact Home could have on the market.

Tell us in the comments below if you think Home will be a hit or miss for Facebook.

Disclaimer: All videos presented in the “YouTube IT Video of the Week” series are subjectively selected by ITKnowledgeExchange.com community managers and staff for entertainment purposes only. They are not sponsored or influenced by outside sources.


April 8, 2013  2:57 PM

TechTarget’s weekly roundup (4/1 – 4/8)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Mobile image via Shutterstock

Mobile was a big hit in this week’s roundup. Major topics included enterprise mobile applications and Facebook Home’s effect on mobile security.

1. Forrester VP says enterprise mobile applications miss the mark – James Denman (SearchSoftwareQuality)

During his recent keynote address at EclipseCon, Forrester Vice President Jeffrey Hammond stated that building an enterprise mobile application shouldn’t be the focus of application development teams.

2. Facebook Home for Android heightens mobile data security concerns – James Furbush (SearchConsumerization)

With Facebook recently announcing the arrival of the ‘Facebook Home’, James Furbush discusses possible data security and private challenges that Home could bring to BYOD environments.

3. Social Media recruitment must be engaging, attractive to candidates – Aaron Lester (SearchFinancialApplications)

As social media recruitment grows rapidly, Aaron Lester says recruiters need to be social, engaging and attractive to in order to stay competitive.

4. Networking blogs: Tips for network strategies, handing tech support – Madelyn Stone (SearchNetworking)

Bloggers from across the network looked at several topics including why companies should ditch tech-specific plans for more general corporate strategies, and five trends that will dominate the networking industry in the near future.

5. Cloud telephony: A potential hit or miss for businesses? – Gina Narcisi (SearchUnifiedCommunications)

During Enterprise Connect, a panel of hosted and cloud telephony users spoke about their implantation process and why their processes make sense for their companies.


April 5, 2013  11:59 AM

Top 10 Twitter users to follow on security

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Twitter image via Shutterstock

From cybersecurity to web security, we’ve built a list of the top experts and professionals across the Twitterverse that update and share their security knowledge. Ten of our favorites are listed below; tell us in the comments below if we left anyone off!

  • Graham Cluley (@gcluley): Technology consultant at Sophos
  • Tom Eston (@agent0x0): Security aficionado
  • Dave Marcus (@DaveMarcus): Chief Architect, Advanced Research and Threat Intelligence, McAfee Federal Advanced Programs Group
  • Mikko Hypponen: (@mikko): CRO at F-Secure
  • Jeremiah Grossman (@jeremiahg): Founder & CTO of WhiteHat Security
  • Paul Asadoorian (@pauldotcom): Founder of PaulDotCom
  • Lenny Zeltser (@lennyzeltser): Security expert at NCR Corporation
  • Brian Krebs (@briankrebs): Internet security journalist
  • Bruce Schneier (@schneierblog): Security guru and author
  • Dan Philpott (@danphilpott): Editor of FISMApedia.org

Follow them all (and other security experts) through our Twitter list.


April 3, 2013  11:23 AM

YouTube IT video of the week: Most famous BSOD of all-time

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

All IT professionals have witnessed the ‘blue screen of death’ (BSOD) at least once in their lifetime. Thanks to an assist from ITKE blogger Ken Harthun, here’s the most famous BSOD of all-time, which comes from none other than Microsoft during a demonstration of the Windows 98 beta version. As Bill Gates put it after the error, “That must be why we’re not shipping Windows 98 yet.”

Disclaimer: All videos presented in the “YouTube IT Video of the Week” series are subjectively selected by ITKnowledgeExchange.com community managers and staff for entertainment purposes only. They are not sponsored or influenced by outside sources.


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: