Enterprise IT Watch Blog


January 29, 2013  3:30 PM

TechTarget’s weekly roundup (1/21 – 1/28)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

IT image via Shutterstock

Looking for the latest news and highlights surrounding the IT industry? Check out 5 stories from across the TechTarget network in this week’s roundup!

1. Leadership qualities of CIOs who do big things – Linda Tucci (SearchCIO)

Linda Tucci goes in-depth on the idea of a ‘Renaissance CIO’ by looking at the traits of industry leaders (selected by a committee) to see what they have in common and how they have impacted their companies.

2. Social media listening pulls direct opinion, focus groups get personal – Sue Hildreth (SearchCRM)

With social media listening becoming the primary way that companies interact with their customers, focus groups and surveys look to be on the way out. However, Sue Hildreth talks to several experts who say these tools still have a role to play.

3. Cisco software business to double with help from Cisco SDN strategy – Shamus McGillicuddy (SearchNetworking)

As part of its goal to become the number one IT company in the world, Cisco said it will double its software business in the next 5 years through acquisitions and emerging technology (especially SDN).

4. Cyber-security services: Identify, respond to and evaluate an attack – Gina Narcisi (SearchNetworking)

With enterprises battling constant cyber-security attacks, Gina Narcisi looks at the most important ways companies should protect themselves.

5. Convenience of mobile accounts payable software brings security risks – Emma Snider (SearchFinancialApplications)

As more people are using smartphones for barcodes and checks, Emma Snider explains the pros and cons of accounts payable software for users and companies alike.

January 23, 2013  1:09 PM

YouTube IT video of the week: Kim Dotcom’s Mega

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

World-renowned (both famous and infamous) technology hacker Kim Dotcom recently released his new website Mega, which offers 50GB of free storage. Dotcom, who was arrested in early 2012 for copyright infringements on his previous site MegaUpload, has said over 500,000 users have signed up for Mega in the first 14 hours alone.

Here’s his speech from the Mega launch several days ago. Tell us in the comments below if you think his new website will be a success or a failure.

Blasts from the past:

Disclaimer: All videos presented in the “YouTube IT Video of the Week” series are subjectively selected by ITKnowledgeExchange.com’s community manager


January 22, 2013  12:27 PM

Securing Big Data: Issues to consider in your strategic planning

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Big Data image via Shutterstock

By James Kobielus (@jameskobielus)

All things considered, big-data platforms are not any more or less secure than established, smaller-scale databases.

Where security is concerned, the sheer volume of your data is not the key factor to lose sleep over. Instead, the chief security vulnerabilities in your big-data strategy may have more to do with the unfamiliarity of the platforms and the need to harmonize disparate legacy data-security systems.

Platform heterogeneity is potentially a big-data security vulnerability. If you’re simply scaling out your an existing DBMS, your current security tools and practices probably continue to work well.  However, many big-data deployments involve deploying a new platform–such as Hadoop, NoSQL, and in-memory databases–that you have never used before and for which your existing security tools and practices are either useless or ill-suited. If the big-data platform is new to the market, you may have difficulty finding a sufficient range of commercial security tools, or, for that matter, anybody with experience using them in a high-stakes production setting.

Platform heterogeneity is also a potential big-data security vulnerability. Some organizations implement big data as a consequence of consolidating inconsistent, siloed data sets. In the process of amassing your big-data repository from heterogeneous precursors, you will need to focus on the thorny issue of harmonizing disparate legacy security tools. These tools may support a wide range of security functions, including authentication, access control, encryption, intrusion detection and response, event logging and monitoring, and perimeter and application access control.

At the same time as you’re consolidating into a big-data platform, you will need to harmonize the disparate security policies and practices associated with the legacy platforms. Your big-data consolidation plans must be overseen and vetted by security professionals at every step. And, ultimately, your consolidated big-data platform must be certified according to all controlling enterprise, industry, and government mandates.

And if you want to approach big-data security holistically, your strategy should also include tools and procedures for unified (hopefully real-time) monitoring of security events on disparate data sets. You should consider implementing a logical big-data mart for security incident and event monitoring (SIEM) to identify threats across your disparate big-data platforms, consolidated and otherwise.

To the extent that you’re managing customer, finance, and other system-of-record data on your big-data clusters, you should certainly consider the need for strong SIEM. If you don’t, your enterprise’s chief information security officer will almost certainly, at some point, ask why you haven’t.


January 21, 2013  3:23 PM

Infographic: Top 100 technology blogs to follow in 2013

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Tired of being the last person to know what’s happening in the IT industry? This infographic from CouponAudit shows the top 100 technology blogs to follow in 2013 (You might see a familiar name at the #1 spot)!

Continued »


January 16, 2013  5:04 PM

YouTube IT video of the week: 2016 technology predictions

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Each day, IT managers and CIOs try to figure out what the future of technology has in store for us.  Well, SearchCIO-Midmarket.com‘s Site Editor Wendy Schuchart had the opportunity to discuss it with several top IT executives at Gartner’s ITxpo.

Tell us in the comments below if you agree or disagree with their views on the future.

Disclaimer: All videos presented in the “YouTube IT Video of the Week” series are subjectively selected by ITKnowledgeExchange.com community managers and staff for entertainment purposes only. They are not sponsored or influenced by outside sources.


January 10, 2013  4:40 PM

YouTube IT video of the week: Lenovo’s 27-inch table PC!

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Each year at CES, companies roll out new high-tech gadgets so users can glimpse the future of technology. At this year’s show, Lenovo outdid itself with its ’27-inch’ IdeaCentre Horizon Table PC! Yes, you heard me correctly: 27-inch PC! TechnologyGuide had some hands-on time with Lenovo’s Godzilla-sized PC.

Disclaimer: All videos presented in the “YouTube IT Video of the Week” series are subjectively selected by ITKnowledgeExchange.com community managers and staff for entertainment purposes only. They are not sponsored or influenced by outside sources.


January 9, 2013  3:31 PM

Top 10 Twitter users to follow on big data

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Twitter image via Shutterstock

Want to know the latest news and updates surrounding big data? We’ve built a list of the top experts and professionals across the Twitter world who update and share their data gossip. Ten of our favorites are listed below; tell us in the comments below if we left anyone off!

Follow them all (and other big data experts) by using our Twitter list.


January 8, 2013  3:17 PM

ITKE blogger Matt Heusser on how to become an IT talent

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Two ITKE bloggers joined forces recently on Slashdot, as Robin Miller (Cheap Computing) had the chance to interview Matt Heusser (Unchartered Waters) on ‘How to become an IT expert that companies seek out and pay well‘. Matt has written several posts on this topic and gives great information on taking the right steps for your career.

With the interview inspiring a ton of conversation on Slashdot, let us know if you agree with Matt’s advice in the comments below.


January 7, 2013  12:44 PM

IT infographic: 2013 International CES

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

The 2013 International Consumer Electronics Show opens in Las Vegas today as millions of users will get to see some of the newest gadgets from across the technology industry. This infographic from 404TechSupport shows several fun facts about the much anticipated event.


January 2, 2013  3:07 PM

YouTube IT video of the week: The future of IBM

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

To kick off the new year, IBM has made predictions on 5 innovations that will help change our lifestyle within 5 years. Interestingly enough, they each have to do with our mental senses!

Disclaimer: All videos presented in the “YouTube IT Video of the Week” series are subjectively selected by ITKnowledgeExchange.com community managers and staff for entertainment purposes only. They are not sponsored or influenced by outside sources.


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: