Enterprise IT Watch Blog


September 17, 2012  12:02 PM

IT Presentation of the Week: Developing SOA strategies

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

As Salesforce.com’s Dreamforce 2012 conference opens this week, we wanted to take a look back at a presentation from Dreamforce’s past that focuses on how organizations can develop an effective SOA strategy. How has your company fared with SOA? What are you looking forward to this week’s show?

 

September 14, 2012  12:44 PM

GoDaddy outages and business travel: This week in IT quotes

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Business travel image via Shutterstock

 It seems a negative light has surrounded this week’s best quotes from the IT industry. Can you put a positive spin on them?

“Throughout our history, we have provided 99.999% uptime in our DNS infrastructure. This is the level our customers expect from us and the level we expect of ourselves. We have let our customers down and we know it.”
- GoDaddy CEO Scott Wagner expressing his displeasure after 52 million websites were taken down on Monday. Confusion still remains over what caused the outage but it does cause trust issues between a user and their hosting provider.

“It’s going to radically change the way data is stored.”
- Brendan Collins, vice president of product marketing for HGST, taking about its new 3.5 inch, helium-based hard disk drive, which will be coming out in 2013.

“What we uncovered is this infringement on personal lives. That is what has underlined this dislike of business travel.”
- Tricia Heinrich, chief marketing offer of ON24, explaining why business travelers would rather stay at home instead of going on business trips. Over 85% of respondents felt work is a major infringement on personal time while 91% said spending too much time away from home because of work could lead to several consequences. Do you feel work travel infringes on your personal time? Share your thoughts on the Head in the Clouds blog.

“This is yet another clear reminder that otherwise smart people continue to create electronic documents that are both dangerous and discoverable.”
- Jeffrey Hartman of EDiscovery Labs explaining why electronic documents played a critical factor in Apple’s patent victory over Samsung. His take: Don’t create harmful documents in the first place.


September 14, 2012  9:13 AM

Five fun facts on how IT views business intelligence

Ben Rubenstein Ben Rubenstein Profile: Ben Rubenstein

Image of angry bird

Angry bird image via Shutterstock

LogiXML recently conducted a survey of 757 IT prosprofessionals (672 of which classify themselves as IT executives, managers, directors and “IT other”) spread across several industries, on how they view users of business intelligence, and the results are intriguing — and pretty entertaining, too. Among our favorites:

  • 7667 percent of respondents say users make BI needs known by “loudly insisting” (247 respondents, 33%), “screaming like banshees,” (52, 7%) or assuming IT had “telepathy” (203, 27%)
  • 20 percent (151 respondents) would give users direct access to data sources only “if my life depended on it”
  • 38 percent think users spend most of their time “checking Facebook comments on photos from recent Bahamas trip” (96 respondents, 13%) or “wish I knew” (193, 25%)
  • 43 percent (326) are “meh” on implementation of their BI projects
  • 5 percent (35)  think mobile BI is “more popular than Angry Birds”

Check out the full survey report here. What are your thoughts on business intelligence?


September 12, 2012  11:02 AM

YouTube IT video of the week: The History of Spam

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

With a little help from Security Corner’s Ken Harthun, this week’s IT video takes a look at the history of every computer user’s worst nightmare: Spam.

Disclaimer: All videos presented in the “YouTube IT Video of the Week” series are subjectively selected by ITKnowledgeExchange.com community managers and staff for entertainment purposes only. They are not sponsored or influenced by outside sources.


September 11, 2012  2:20 PM

This week in tech history: Stretch computer

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Mainframe image via Shutterstock

On September 5, 1980, the last IBM 7030 ‘Stretch’ mainframe was decommissioned at Brigham Young University. The stretch was known as the first IBM computer to use transistors instead of vacuum tubes and was the world’s fastest computer from 1961-1964.

Each Tuesday, the ITKE team will take you back in time, as we take a look at the events that have changed technology history. Have a tip for us? Email mtidmarsh@techtarget.com or find us on Twitter (@ITKE).

Disclaimer: All posts presented in the “This week in tech history” series are subjectively selected by ITKnowledgeExchange.com community managers and staff for entertainment purposes only. They are not sponsored or influenced by outside sources.


September 11, 2012  10:22 AM

IT Presentation of the Week: NoSQL Databases

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Data management is becoming a growing concern,  and NoSQL is one way to get a handle on it. This presentation from Steve Francia of 10Gen (the company behind MongoDB) discusses how NoSQL can help with managing big data.

After watching the presentation, tell us about your biggest data problem in the comments and you might win a copy of the book, Making Sense of NoSQL!


September 10, 2012  11:40 AM

IT infographic: Is 2012 the year of password theft?

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

From online banking to email accounts, passwords have become a very important part of our everyday lives. This week’s IT infographic from Space Chimp Media shows how this year, those passwords are in greater danger than ever before. What steps are you taking to protect yourself?

For more on password protection, visit the Security Corner blog.


September 10, 2012  9:53 AM

Opportunity Cost: The Real Way to Measure Cloud ROI

Ben Rubenstein Ben Rubenstein Profile: Ben Rubenstein

Image of cost-benefit signs pointing in different directions

Cost-benefit image via Shutterstock

By Brian Gracely (@bgracely)

Somewhere in the last two or three years, between various industry definitional debates about “cloud computing,” we seem to have forgotten how to think about costs for this emerging operational model.

Initially, there were two discussions that focused on cost savings. The first was focused on server virtualization and cost-savings from consolidating applications on under-utilized server resources. The immediate savings came from reduced spend on rackspace, power, cooling and infrastructure. This discussion tended to focus on internal data centers, or what evolved to be called ‘private cloud.’ The second looked at the on-demand costs of public clouds (e.g. Amazon AWS) and how developers didn’t have to wait for new infrastructure to be provisioned before their could create new applications. Savings for this use-case came from the elimination of capital expense (CAPEX) for internal data center resources.

Then as competition between vendors intensified, the cost discussions began to blur between CAPEX, operating expense (OPEX) and opportunity costs. Some vendors claim that costs could be reduced with private cloud but not public cloud. Other vendors claimed the exact opposite. How could this be possible?

As experience and usage of cloud computing evolves, we’re beginning to see a much clearer cost picture emerge. Cloud costs tend to follow these guidelines:

  • It’s possible to reduce CAPEX and OPEX costs by deploying virtualized and converged technologies, along with the ability to automate the operations of those technologies.
  • Those CAPEX and OPEX savings often return to normal levels as the delivery of optimized IT services tends to create more demand for new IT services, as business users see faster response times to new requests.
  • As businesses begin to expect technology to deliver greater advantages in the market, and require IT services, it is expected that IT costs will rise over time, in some cases significantly. The additional costs are focused on impacting the topline (revenues) of the business.
  • The cost to deploy new IT services on public cloud resources are often significantly lower (CAPEX and OPEX) over short periods of time (days, months).
  • When compared over longer timeframes (2-3 years), the costs to deploy applications on private cloud (internal) vs. public cloud (external) are often fairly equal.

When viewed holistically, cloud computing has the greatest potential to impact opportunity costs for the business, delivering increased agility when new market opportunities arise. These opportunities may be short-term or long-term, so it’s important for business leaders and IT organization to create technology strategies that can respond to both types of new opportunities. Failure to be prepared will negatively affect the business’ ability to compete in a given market.

While many companies are looking to deploy operating models that resemble the largest cloud computing environments to reduce costs (CAPEX or OPEX), I would suggest that the more important ROI they should measure is the one based on opportunity costs from potentially missed business opportunities. Access to available IT resources, either via public cloud or private cloud is just to plentiful to miss a great business opportunity because the IT organization can’t properly manage ALL the available resources.

Brian Gracely is Director of Technical Marketing at EMC. He is a 2011/2012 VMware vExpert, holds CCIE #3077, and has an MBA from Wake Forest University. Brian’s industry viewpoints and writings can also be found on Twitter (@bgracely), his blog “Clouds of Change,” and the weekly podcast “The Cloudcast”.


September 7, 2012  10:40 AM

Lumia smartphones and Java flaws: The week in IT quotes

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Smartphone image via Shutterstock

From new smartphones to remaining CEOs, check out this week’s best quotes from around the IT industry.

“When the time is right, my successor will be named.”
- EMC CEO Joe Tucci after announcing he will remain as chairman and CEO into 2013 at the request of EMC’s board. It looks like he could be around for much longer; the company decided to extend Tucci’s contract through February 2015.

“The world’s most innovative smartphone.”
- Nokia CEO Stephen Elop talking about the new Lumia 920 and 820 Windows 8 devices. However, blogger Ron Miller believes the new smartphone won’t be able to compete with the giants of the mobile world, Google and Apple.

“There are still not -yet-addressed, serious security issues that affect the most recent version of Java 7.”
- Security Explorations Founder and CEO Adam Gowdiak expressing his disappointment over Oracle’s recent emergency upgrade to fix flaws in Java 7. If you still feel uncomfortable using Java 7, here are some tips on how to assess a site’s trustworthiness or to disable Java altogether.

“I was amazed to discover that enterprise technology professionals had no place to go to get online product reviews and connect with real users before making such an important purchase. ”
- Co-founder and CEO Russell Rothstein talking about the launch of his site, IT Central Station, a new free social network for enterprise technology professionals. Would you use it? Offer your take on the new site on the Data Center Apparatus blog!

 


September 6, 2012  10:39 AM

YouTube IT video of the week: Andy’s computer

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Whoops! Since we’re a day late this week, we’re bring you a special clip for our ‘YouTube IT video of the week’, looking at how some employees are (ab)using their computers. (SPOILER: This particular employee goes by the name of Andy Bernard.)

Disclaimer: All videos presented in the “YouTube IT Video of the Week” series are subjectively selected by ITKnowledgeExchange.com community managers and staff for entertainment purposes only. They are not sponsored or influenced by outside sources.


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: