Enterprise IT Watch Blog


April 10, 2013  12:14 PM

YouTube IT video of the week: Facebook Home

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Much of the discussion around the mobile industry as been about Facebook’s newest offering, Facebook Home. The new software, which will be available in Google stores beginning April 12, will provide deep Facebook functionality for Android smartphones and devices. Many experts, including Ron Miller, believe the company’s new approach will go nowhere. Right after the announcement, Bloomberg discussed the impact Home could have on the market.

Tell us in the comments below if you think Home will be a hit or miss for Facebook.

Disclaimer: All videos presented in the “YouTube IT Video of the Week” series are subjectively selected by ITKnowledgeExchange.com community managers and staff for entertainment purposes only. They are not sponsored or influenced by outside sources.

April 8, 2013  2:57 PM

TechTarget’s weekly roundup (4/1 – 4/8)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Mobile image via Shutterstock

Mobile was a big hit in this week’s roundup. Major topics included enterprise mobile applications and Facebook Home’s effect on mobile security.

1. Forrester VP says enterprise mobile applications miss the mark – James Denman (SearchSoftwareQuality)

During his recent keynote address at EclipseCon, Forrester Vice President Jeffrey Hammond stated that building an enterprise mobile application shouldn’t be the focus of application development teams.

2. Facebook Home for Android heightens mobile data security concerns – James Furbush (SearchConsumerization)

With Facebook recently announcing the arrival of the ‘Facebook Home’, James Furbush discusses possible data security and private challenges that Home could bring to BYOD environments.

3. Social Media recruitment must be engaging, attractive to candidates – Aaron Lester (SearchFinancialApplications)

As social media recruitment grows rapidly, Aaron Lester says recruiters need to be social, engaging and attractive to in order to stay competitive.

4. Networking blogs: Tips for network strategies, handing tech support – Madelyn Stone (SearchNetworking)

Bloggers from across the network looked at several topics including why companies should ditch tech-specific plans for more general corporate strategies, and five trends that will dominate the networking industry in the near future.

5. Cloud telephony: A potential hit or miss for businesses? – Gina Narcisi (SearchUnifiedCommunications)

During Enterprise Connect, a panel of hosted and cloud telephony users spoke about their implantation process and why their processes make sense for their companies.


April 5, 2013  11:59 AM

Top 10 Twitter users to follow on security

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Twitter image via Shutterstock

From cybersecurity to web security, we’ve built a list of the top experts and professionals across the Twitterverse that update and share their security knowledge. Ten of our favorites are listed below; tell us in the comments below if we left anyone off!

  • Graham Cluley (@gcluley): Technology consultant at Sophos
  • Tom Eston (@agent0x0): Security aficionado
  • Dave Marcus (@DaveMarcus): Chief Architect, Advanced Research and Threat Intelligence, McAfee Federal Advanced Programs Group
  • Mikko Hypponen: (@mikko): CRO at F-Secure
  • Jeremiah Grossman (@jeremiahg): Founder & CTO of WhiteHat Security
  • Paul Asadoorian (@pauldotcom): Founder of PaulDotCom
  • Lenny Zeltser (@lennyzeltser): Security expert at NCR Corporation
  • Brian Krebs (@briankrebs): Internet security journalist
  • Bruce Schneier (@schneierblog): Security guru and author
  • Dan Philpott (@danphilpott): Editor of FISMApedia.org

Follow them all (and other security experts) through our Twitter list.


April 3, 2013  11:23 AM

YouTube IT video of the week: Most famous BSOD of all-time

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

All IT professionals have witnessed the ‘blue screen of death’ (BSOD) at least once in their lifetime. Thanks to an assist from ITKE blogger Ken Harthun, here’s the most famous BSOD of all-time, which comes from none other than Microsoft during a demonstration of the Windows 98 beta version. As Bill Gates put it after the error, “That must be why we’re not shipping Windows 98 yet.”

Disclaimer: All videos presented in the “YouTube IT Video of the Week” series are subjectively selected by ITKnowledgeExchange.com community managers and staff for entertainment purposes only. They are not sponsored or influenced by outside sources.


April 1, 2013  4:08 PM

TechTarget’s weekly roundup (3/25 – 4/1)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Risk management image via Shutterstock

This week’s roundup is all about communication. Find out how it’s important in risk management, business intelligence and in distributing and analyzing content.

1. Q&A: Communication, monitoring keys to corporate risk management – Ben Cole (SearchCompliance)

SearchCompliance.com Editor Ben Cole sat down with William J. Montanez, director of risk management at Ace Hardware Corp., to discuss why communicating risk strategy to the entire organization is “absolutely essential” to overall corporate risk management success.

2. Activists unleash biggest DDoS cyber attack to date – Warwick Ashford (ComputerWeekly.com)

After anti-spam website Spamhaus blacklisted web hosting company Cyberbunker, angry activists took to the web and unleashed the biggest distributed denial-of-service (DDoS) attack to date.

3. Business intelligence program needs long-term tending to fully blossom – Craig Stedman (SearchBusinessAnalytics)

Craig Stedman tells us how Quicken Loans has had great success with its self-service business intelligence program.

4. Chief content officer can create value from content management noise – Scott Petersen (SearchContentManagement)

There are too many sources of content and information and no single way of managing it all, says Scott Peterson.  Find out how a Chief Content Officer (CCO) can help to solve this problem.

5. Middleware tools for integrating SAP, third-party software growing – Beth Stackpole (SearchSAP)

While integrating SAP and non-SAP systems has always been a problem, Beth Stackpole points out that a slew of middleware and new third-party software is helping to ease the transition.


March 29, 2013  9:20 AM

April 2013 is packed with IT events

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Calendar image via Shutterstock

All throughout April, not a day goes by without you having the chance to attend a big IT conference. Check your schedule to see if you can attend one of April’s many events!

1. Gartner Business Process Management Summit (April 2-4, National Harbor, Maryland)

2. Cloud Connect (April 2-5, Silicon Valley, California)

3. IT Sales & Marketing Boot Camp (April 3-6, Nashville, Tennessee)

4. TechTarget: The Consumerization of IT (April 4, San Francisco, California)

5. Big Data TechCon (April 8-10, Boston, Massachusetts)

6. Ingram Micro Cloud Summit 2013 (April 8-10, Phoenix, Arizona)

7. TechTarget: The New Rules of Backup and Data Protection (April 9, Atlanta, Georgia)

8. TechTarget: Modern Infrastructure Decisions (April 11, New York, New York)

9. 2013 Spring Varnex Conference (April 14-17, Orlando, Florida)

10. Symantec Vision 2013 (April 15-18, Las Vegas, Nevada)

11. DEMO Mobile 2013 (April 17, San Francisco, California)

12. Government Enterprise Mobility Symposium (April 17-18, Washington D.C.)

13. Synnex Red White & You (April 17-19, Orlando, Florida)

14. CA World 2013 (April 21-24, Las Vegas, Nevada)

15. VTN 2013 Spring Invitational (April 21-24, Hollywood, Florida)

16. TechTarget: Desktop Virtualization 2013 Seminar (April 23, St. Louis, Missouri)

17. TechTarget: CW500 Club (April 23, London, England)

18. TechTarget: The New Rules of Backup and Data Protection (April 25, Cleveland, Ohio)

19. TechTarget: Desktop Virtualization 2013 Seminar (April 25, Houston, Texas)

20. RightScale Compute 2013 (April 25-26, San Francisco, California)

21. Midsize Enterprise Summit East 2013 (April 28-May 1, Chicago, Illinois)

22. Gartner Portals, Content & Collaboration Summit (April 29-May 1, San Diego, California)

23. Kaseya Connect (April 29-May 1, Las Vegas, Nevada)

24. Accelerate 2013: Lenovo Channel Partner Forum (April 29-May 1, Las Vegas, Nevada)

We’ll be sharing IT events each month here on the Enterprise IT Watch blog. Got an event to add to our list? Let us know via Twitter (@ITKE) or email. Going to one of these events? Share your takeaways (and photos) with us!


March 27, 2013  2:52 PM

YouTube IT video of the week: Oracle’s recent struggles

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Much of the discussion surrounding Oracle lately has been on the company’s quarterly report, which resulted in its third losing quarter in the past two years. Some experts, including ITKE blogger Ron Miller, believe Oracle’s decline could be linked to the fact that more cloud and open source upstarts are offering similar services at a lower price. Bloomberg recently took a look at the negative vibe circling the company.

In the comments, tell us what you think is behind Oracle’s recent struggles.

Disclaimer: All videos presented in the “YouTube IT Video of the Week” series are subjectively selected by ITKnowledgeExchange.com community managers and staff for entertainment purposes only. They are not sponsored or influenced by outside sources.


March 25, 2013  3:42 PM

TechTarget’s weekly roundup (3/18 – 3/25)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

CIO image via Shutterstock

This week’s roundup is full of news from the CIO, big data and healthcare industry. Read on to find out the big headlines from these industries!

1. Hauwei security issues are result of ‘rumors’ says Hauwei executive – Valery Marchive (SearchSecurity)

Several months after the U.S. House of Representatives Permanent Select Committee on Intelligence labeled the Chinese networking vendors, Huawei Technologies and ZTE Corp. as a threat to U.S. national security, Huawei’s Chairman Francois Quentin said the company has become a victim of ‘rumors’.

2. Beyond the hype, CIOs can generate business value from big data tools – Editorial team (SearchCIO)

In this video interview, Sears Holdings CTO Phil Shelley discusses how embracing big data tools can lead to new business and how CIOs can use them to add value to their business.

3. Telecommuting technology a double-edged sword for SMBs – Nicole Laskowski (SearchCIO-Midmarket)

Following the reaction to Yahoo’s ban on telecommunication, Nicole Laskowski says most small business owners continue to rely on telecommuting for day-to-day operations but believe customer interaction will lead to success.

4. Look out, Big Data: In-memory data grids start to go mainstream – Stephanie Mann (SearchSOA)

As in-memory data grids become more popular (Gartner called in-memory computing one of the top 10 strategic technology trends of 2013), Stephanie Mann looks at why it has finally gone mainstream.

5. Podcast: What you missed at HIMSS 2013 – Ed Burns and Don Fluckinger (SearchHealthIT)

SearchHealthIT reporters Ed Burns and Don Fluckinger break down the big stories and hot health IT themes that emerged from HIMSS 2013 in New Orleans.


March 22, 2013  3:00 PM

Small data and big data are joined at the hip

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Big data image via Shutterstock

By James Kobielus (@jameskobielus)

Big data has its discontents. The discontent is taking the form of a backlash against the incessant hype of big data’s most noteworthy rock star approach: Hadoop. The backlash is a necessary reality-check in an otherwise fast-growing space. Often in this industry, when a technology is super-hot, the hype can get in the way of rational decision making, both among users and among solution providers.

Backlashes against hype are inevitable. At times, it almost feels like people discuss big data with the assumption that bigger is necessarily better and that throwing more data at your problems will automatically produce insights. You should be searching for those special problems, often of a scientific nature, that can be solved best through petabyte-scale analytics. You don’t need a data center full of maxed-out storage arrays to derive powerful insights. Gut feel is free, and it often thrives on the scantiest information.

This viewpoint, which is now in the mainstream, is often referred to as “small data,” or as the need for traditional lower-scale analytics platforms to balance the hype for all things “big.” Of course, keeping your BI, performance management, and statistical modeling deployments small and simple can be a challenge. This is especially true as your user base grows; the range of data sources, structured reports, metrics, dashboards, models, visualizations, and downstream applications grows. Throughout the life of your “small data” environment, it will probably continue to grow into “big data” territory on the volume, velocity, and/or variety dimensions.

As your needs scale from small to big, you should have a data platform that you can grow modularly and cost-effectively to keep pace. Big data and small data should be joined at the hip in your strategy–simply a seamless spectrum of analytical platforms, tools, and approaches serving your business.

Big data, small data. Big insights, small epiphanies. It’s all important. And none of it is mutually exclusive.


March 20, 2013  10:38 AM

YouTube IT video of the week: Hitler on the Google Reader shutdown

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Many users remember Hitler’s reaction when he found out that one of his customer databases had been tampered with several months ago. Well, his mood has gone from bad to worse as he learns that Google is shutting down its web-based RSS feed aggregator, Google Reader.

Disclaimer: All videos presented in the “YouTube IT Video of the Week” series are subjectively selected by ITKnowledgeExchange.com community managers and staff for entertainment purposes only. They are not sponsored or influenced by outside sources.


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: