Enterprise IT Watch Blog

April 22, 2013  2:37 PM

TechTarget’s weekly roundup (4/15 – 4/22)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh


Cloud security image via Shutterstock

Cloud security, cloud development and cloud backup…the ‘cloud’ was a major hit in this week’s roundup. Find out why it was such big news on the TechTarget network.

1. Five best practices for successful cloud backup – Alyssa Wood (SearchCloudComputing)

During last week’s Amazon AWS Summit, senior technology evangelist Simone Brunozzi gave attendees a history lesson by discussing how the Italian Abbey of Monte Cassino helps to illustrate the need for the five best practices on cloud backup.

2. SugarCon conference offers guidelines for social CRM success – Jack Vaughan / Mark Brunelli (SearchCRM)

In this podcast, SearchCRM News Director Mark Brunelli talks to Jack Vaughan about his recent trip to the SugarCon Conference, in particular how organizations can launch a successful social CRM initiative.

3. Symantec 2013 Threat Report highlights rise in SMB attacks – Paul Korzeniowski (SearchSecurity)

Small businesses are under attack! That’s the major takeaway from the 2013 Symantec Internet Security Threat Report, as 31% of Internet attacks were aimed at businesses with less than 250 employees.

4. OpenStack cloud users share pros and cons – Beth Pariseau (SearchCloudComputing)

At the OpenStack Summit, several OpenStack vendors, including Bloomberg, Samsung and Best Buy discussed the benefits and problems of their deployment of the open source cloud.

5. Gartner forecasts rising interest in cloud-based security interests – Brandan Blevins (SearchCloudSecurity)

According to a recent report released by Gartner, cloud-based security systems will account for 10% of all enterprise IT security product market by 2015. The rise was driven by several factors including lack of in-house IT security staff, the need to reduce costs and compliance regulations.

April 17, 2013  8:58 AM

YouTube IT video of the week: Google Nose

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Even though April Fools’ Day has come and gone, it’s nice to look back at some of the funniest technology-related jokes of April 1st. Our favorite is from Google, who introduced us to the ‘Google Nose’, which allows you to search for different smells across the Internet.

Share some other technology-related April Fools’ jokes in the comments below.

Disclaimer: All videos presented in the “YouTube IT Video of the Week” series are subjectively selected by ITKnowledgeExchange.com community managers and staff for entertainment purposes only. They are not sponsored or influenced by outside sources.

April 16, 2013  7:58 AM

Big identity is big data’s double-edge sword

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh


Big data image via Shutterstock

By James Kobielus (@jameskobielus)

Big data’s primary executive-level sponsors are chief marketing officers (CMOs). Consequently, it’s no surprise that big-data repositories are primarily populated with information on customers. To the extent that the CMO’s IT organization has linked diverse customer records to positive identifiers–a process often known as “identity resolution”–they can drive finely targeted marketing efforts.

These massive stores of customer identity information–let’s call them “big identity”–are the lifeblood of modern commerce. Social media, other Internet sites, and enterprise repositories manage a sprawling, heterogeneous, disconnected variety of identity information. Rolling up any particular individual’s various identities across these sites demands the massively parallel horsepower, specialized analytic tools, and high-capacity storage of a robust big-data infrastructure. Identity resolution leverages advanced algorithms to uniquely match the disparate identities that an individual or group might be using.

Identity resolution is the missing link between two important use cases of big data: social media analytics on the one hand and multichannel customer relationship management on the other. High-performance identity resolution is already a substantial application in customer data integration, data quality, master data management, and anti-fraud applications.

Social media monitoring, however, has yet to tap its potential. How else can we match the disparate identities that people go under in Twitter, Facebook, and other socials, both against each other and against the system-of-record identifiers that we keep on customers in our CRM, data warehousing, and other operational platforms? Without the ability to resolve some prospective customer’s social-sourced identities, how can we determine whether or not they’re an existing customer or a hot prospect?

The flip side of the “big identity” dream is the potential for high-powered violations of personal privacy. Some say big data is Big Brother’s chief tool for mass surveillance. Others say it opens a Pandora’s box for any grass-roots peeping-Tom to pry into other people’s affairs with the most powerful telescope ever invented. A cynic might say that social business–one of the hottest new focus areas in multichannel marketing and engagement–is all about everybody minding–and mining–everybody else’s business.

Privacy concerns are rooted deep in the heart of the online experience, which thrives on freewheeling give-and-take but can easily slip into oversharing, surveillance, cyberstalking, and intrusive targeting. Businesses should put privacy considerations at the core of our big-data strategies before customers demand it or the courts, regulatory bodies, and legislators decide to force our hands.

April 15, 2013  2:48 PM

TechTarget’s weekly roundup (4/8 – 4/15)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh


Oracle image via Shutterstock

All sorts of news came out during recent IT conferences and events including SugarCon, the Ingram Micro Cloud Summit, and the Collaborate user group conference. Take a look at what was said at each event in this week’s roundup.

1. Urban Outfitters looks creative destruction in the eye – Linda Tucci (SearchCIO)

While most CIOs and business executives continue to hear the term ‘creative destruction’, Urban Outfitters CSO Matthew Kaness has experienced it first hand, and responded by creating a brand new online experience for the e-commerce giant.

2. RFID technology options evolve beyond tags – Beth Stackpole (SearchManufacturingERP)

Although RFID is a mature technology, Beth Stackpole takes a look at five new technologies with the potential to dramatically change RFID’s course.

3. SugarCon speaker reveals 10 reasons why social CRM projects fail – Mark Brunelli (SearchCRM)

During this year’s SugarCon conference, David Myron, editorial director of CRM Magazine, discussed the top 10 reasons why social CRM projects fail including culture issues and the lack of compliance policies.

4. Ingram Micro cloud services pitch: Cloud enablement for partners – Lynn Haber (SearchITChannel)

During the Ingram Micro Cloud Summit last week, Lynn Haber reports the company laid out its strategy to help partners take a bite out of the $25 billion worldwide cloud services market in 2013.

5. Oracle President Mark Hurd: We don’t set out to be hard to work with – Mark Fontecchio (SearchOracle)

“We do not want to be hard to work with,” he said. “We don’t sit in a room and strategize about how we can be harder to work with.” Those were Oracle President Mark Hurd’s words during an exchange at the Collaborate user group conference.

April 10, 2013  12:14 PM

YouTube IT video of the week: Facebook Home

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Much of the discussion around the mobile industry as been about Facebook’s newest offering, Facebook Home. The new software, which will be available in Google stores beginning April 12, will provide deep Facebook functionality for Android smartphones and devices. Many experts, including Ron Miller, believe the company’s new approach will go nowhere. Right after the announcement, Bloomberg discussed the impact Home could have on the market.

Tell us in the comments below if you think Home will be a hit or miss for Facebook.

Disclaimer: All videos presented in the “YouTube IT Video of the Week” series are subjectively selected by ITKnowledgeExchange.com community managers and staff for entertainment purposes only. They are not sponsored or influenced by outside sources.

April 8, 2013  2:57 PM

TechTarget’s weekly roundup (4/1 – 4/8)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Mobile image via Shutterstock

Mobile was a big hit in this week’s roundup. Major topics included enterprise mobile applications and Facebook Home’s effect on mobile security.

1. Forrester VP says enterprise mobile applications miss the mark – James Denman (SearchSoftwareQuality)

During his recent keynote address at EclipseCon, Forrester Vice President Jeffrey Hammond stated that building an enterprise mobile application shouldn’t be the focus of application development teams.

2. Facebook Home for Android heightens mobile data security concerns – James Furbush (SearchConsumerization)

With Facebook recently announcing the arrival of the ‘Facebook Home’, James Furbush discusses possible data security and private challenges that Home could bring to BYOD environments.

3. Social Media recruitment must be engaging, attractive to candidates – Aaron Lester (SearchFinancialApplications)

As social media recruitment grows rapidly, Aaron Lester says recruiters need to be social, engaging and attractive to in order to stay competitive.

4. Networking blogs: Tips for network strategies, handing tech support – Madelyn Stone (SearchNetworking)

Bloggers from across the network looked at several topics including why companies should ditch tech-specific plans for more general corporate strategies, and five trends that will dominate the networking industry in the near future.

5. Cloud telephony: A potential hit or miss for businesses? – Gina Narcisi (SearchUnifiedCommunications)

During Enterprise Connect, a panel of hosted and cloud telephony users spoke about their implantation process and why their processes make sense for their companies.

April 5, 2013  11:59 AM

Top 10 Twitter users to follow on security

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Twitter image via Shutterstock

From cybersecurity to web security, we’ve built a list of the top experts and professionals across the Twitterverse that update and share their security knowledge. Ten of our favorites are listed below; tell us in the comments below if we left anyone off!

  • Graham Cluley (@gcluley): Technology consultant at Sophos
  • Tom Eston (@agent0x0): Security aficionado
  • Dave Marcus (@DaveMarcus): Chief Architect, Advanced Research and Threat Intelligence, McAfee Federal Advanced Programs Group
  • Mikko Hypponen: (@mikko): CRO at F-Secure
  • Jeremiah Grossman (@jeremiahg): Founder & CTO of WhiteHat Security
  • Paul Asadoorian (@pauldotcom): Founder of PaulDotCom
  • Lenny Zeltser (@lennyzeltser): Security expert at NCR Corporation
  • Brian Krebs (@briankrebs): Internet security journalist
  • Bruce Schneier (@schneierblog): Security guru and author
  • Dan Philpott (@danphilpott): Editor of FISMApedia.org

Follow them all (and other security experts) through our Twitter list.

April 3, 2013  11:23 AM

YouTube IT video of the week: Most famous BSOD of all-time

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

All IT professionals have witnessed the ‘blue screen of death’ (BSOD) at least once in their lifetime. Thanks to an assist from ITKE blogger Ken Harthun, here’s the most famous BSOD of all-time, which comes from none other than Microsoft during a demonstration of the Windows 98 beta version. As Bill Gates put it after the error, “That must be why we’re not shipping Windows 98 yet.”

Disclaimer: All videos presented in the “YouTube IT Video of the Week” series are subjectively selected by ITKnowledgeExchange.com community managers and staff for entertainment purposes only. They are not sponsored or influenced by outside sources.

April 1, 2013  4:08 PM

TechTarget’s weekly roundup (3/25 – 4/1)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Risk management image via Shutterstock

This week’s roundup is all about communication. Find out how it’s important in risk management, business intelligence and in distributing and analyzing content.

1. Q&A: Communication, monitoring keys to corporate risk management – Ben Cole (SearchCompliance)

SearchCompliance.com Editor Ben Cole sat down with William J. Montanez, director of risk management at Ace Hardware Corp., to discuss why communicating risk strategy to the entire organization is “absolutely essential” to overall corporate risk management success.

2. Activists unleash biggest DDoS cyber attack to date – Warwick Ashford (ComputerWeekly.com)

After anti-spam website Spamhaus blacklisted web hosting company Cyberbunker, angry activists took to the web and unleashed the biggest distributed denial-of-service (DDoS) attack to date.

3. Business intelligence program needs long-term tending to fully blossom – Craig Stedman (SearchBusinessAnalytics)

Craig Stedman tells us how Quicken Loans has had great success with its self-service business intelligence program.

4. Chief content officer can create value from content management noise – Scott Petersen (SearchContentManagement)

There are too many sources of content and information and no single way of managing it all, says Scott Peterson.  Find out how a Chief Content Officer (CCO) can help to solve this problem.

5. Middleware tools for integrating SAP, third-party software growing – Beth Stackpole (SearchSAP)

While integrating SAP and non-SAP systems has always been a problem, Beth Stackpole points out that a slew of middleware and new third-party software is helping to ease the transition.

March 29, 2013  9:20 AM

April 2013 is packed with IT events

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Calendar image via Shutterstock

All throughout April, not a day goes by without you having the chance to attend a big IT conference. Check your schedule to see if you can attend one of April’s many events!

1. Gartner Business Process Management Summit (April 2-4, National Harbor, Maryland)

2. Cloud Connect (April 2-5, Silicon Valley, California)

3. IT Sales & Marketing Boot Camp (April 3-6, Nashville, Tennessee)

4. TechTarget: The Consumerization of IT (April 4, San Francisco, California)

5. Big Data TechCon (April 8-10, Boston, Massachusetts)

6. Ingram Micro Cloud Summit 2013 (April 8-10, Phoenix, Arizona)

7. TechTarget: The New Rules of Backup and Data Protection (April 9, Atlanta, Georgia)

8. TechTarget: Modern Infrastructure Decisions (April 11, New York, New York)

9. 2013 Spring Varnex Conference (April 14-17, Orlando, Florida)

10. Symantec Vision 2013 (April 15-18, Las Vegas, Nevada)

11. DEMO Mobile 2013 (April 17, San Francisco, California)

12. Government Enterprise Mobility Symposium (April 17-18, Washington D.C.)

13. Synnex Red White & You (April 17-19, Orlando, Florida)

14. CA World 2013 (April 21-24, Las Vegas, Nevada)

15. VTN 2013 Spring Invitational (April 21-24, Hollywood, Florida)

16. TechTarget: Desktop Virtualization 2013 Seminar (April 23, St. Louis, Missouri)

17. TechTarget: CW500 Club (April 23, London, England)

18. TechTarget: The New Rules of Backup and Data Protection (April 25, Cleveland, Ohio)

19. TechTarget: Desktop Virtualization 2013 Seminar (April 25, Houston, Texas)

20. RightScale Compute 2013 (April 25-26, San Francisco, California)

21. Midsize Enterprise Summit East 2013 (April 28-May 1, Chicago, Illinois)

22. Gartner Portals, Content & Collaboration Summit (April 29-May 1, San Diego, California)

23. Kaseya Connect (April 29-May 1, Las Vegas, Nevada)

24. Accelerate 2013: Lenovo Channel Partner Forum (April 29-May 1, Las Vegas, Nevada)

We’ll be sharing IT events each month here on the Enterprise IT Watch blog. Got an event to add to our list? Let us know via Twitter (@ITKE) or email. Going to one of these events? Share your takeaways (and photos) with us!

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: