A key performance indicator (KPI) is a business metric for evaluating factors that are crucial to the success of an organization. The purpose of using KPIs is to focus attention on the tasks and processes that management has determined are most important for making progress towards declared goals and targets. Continued…
Quote of the Day
“IT KPIs typically fall into three categories: service delivery effectiveness, service or performance efficiency and agility (responding to change).” – Stephen J. Bigelow
My manager wants quality as a KPI measurement — help!
When the boss wants quality as a KPI measurement, you don’t have many options. Expert Matt Heusser walks you through the process.
Why are cybersecurity KPIs important for enterprises to determine?
Cybersecurity KPIs are a measurable way to reach security goals in an enterprise. Here’s how a KPI for security can benefit an infosec program.
Checklist of IT KPIs for responsive data center ops
KPI metrics gauge if a business is meeting, exceeding or falling below certain defined goals. These IT KPIs deal with service level, responsiveness and efficiency in the data center.
Finding KPIs that matter to the business
Identifying KPIs that matter to the business is as much art as science. A panel of CFOs at the recent MIT Sloan CFO Summit explain.
Growth best practices and key performance indicators for IT solution providers
The Taylor Business Group’s Larry Schulze outlines key performance indicators for IT solution providers, including optimal cost and profitability percentages.
This definition is one of Top 10 Terms to watch in 2017!
Geo-fencing (geofencing) is a feature in a software program that uses the global positioning system (GPS) or radio frequency identification (RFID) to define geographical boundaries. Continued…
Quote of the Day
“Apps on location-aware devices can make use of geofences to trigger different types of actions as the user enters or exits a geofenced location.” – Michael Cobb
Location of things: Why location matters in IoT
An emerging IoT subcategory known as the ‘location of things’ is becoming an organizing principle for anything connecting to the Internet.
With safety and surveillance under its belt, video tackles insight
Your organization’s most underutilized sensor is moving to the frontline in an IoT-enabled world. Get ready for video, the next big insight creator.
Asset tracking: What products and services can trace device location?
Asset-tracking products and services can give you the precise location data of devices in and out of workplaces. Find out what options are available.
Drones – taking off or staying grounded?
While excitement grows in anticipation of potential mass adoption of drones, the industry has to overcome hurdles in the form of regulation.
How can geofencing improve an enterprise security strategy?
Expert Michael Cobb explains the pros and cons of geofencing and discusses whether one should be an integral part of an enterprise security strategy.
Persistent storage is any data storage device that retains data after power to that device is shut off. It is also sometimes referred to as non-volatile storage. Continued…
Quote of the Day
“People realized that containers didn’t just have to last for seconds or minutes, but could last for hours or days because that’s the way people tend to work and they need persistent storage for that.” – Chris Evans
NexentaEdge DevOps goes gratis for Docker persistent storage
Nexenta Systems touts a free ‘container-converged’ Docker persistent storage platform to help development teams get started with containers.
Persistent storage for containers: What developers need to know
Is it possible to achieve persistent storage for containers? Yes, but it’s not automatic. Chris Tozzi explains what developers can do.
Docker persistent storage is the next frontier in containerization
Docker persistent storage is now available through partner plug-ins to help IT shops tackle the ‘scary part’ of containerizing traditional applications.
Docker storage: how to get persistent storage in Docker
Docker, by default, doesn’t come with persistent storage, which presents an issue to some workloads customers that want to run in containers – however, there are ways to achieve persistent storage.
Planning for storage volume in the containerized world
Storage volume plugins such as Flocker bridge the gap between container technology and enterprise data storage requirements.
Customer experience management (CEM or CXM) is the collection of processes a company uses to track, oversee and organize every interaction between a customer and the organization throughout the customer lifecycle. Continued…
Quote of the Day
“We will see CEM become more integrated with the overall running of the business, and not seen as a standalone or ‘additional’ thing that is layered on top of the companies’ core business.” – Bruce Temkin
Customer experience trends: Why predictive analytics failed and more
Customer experience trends include a better understanding of customers and more deft use of predictive analytics, according to Bluewolf co-founder Eric Berridge.
Making CRM part of your customer engagement strategy
Brent Leary examines the features and functions of CRM software and how organizations are using this software as part of their customer engagement strategy.
Guide to customer experience management best practices, technologies
Learn why customer experience management (CEM) is growing. Read about technologies, strategies and customer experience management best practices that businesses are applying to their CEM.
Cross-channel communication CEM support: A work in progress
Find out how cross-channel support allows customers to seamlessly communicate with companies. Learn why cross-channel communication is integral to a successful customer experience management (CEM) plan.
Customer experience management technologies shape business strategies
With technology rapidly changing, companies want the latest innovations that mesh with their customer experience management strategies. But it also takes the right employees to make CEM work, industry observers say.
Structured content is a modular approach to managing digital content that uses metadata tags and automation to publish content from a single source to multiple distribution channels. Continued…
Quote of the Day
“Structured content increases the reach and ROI of an organization’s content, while generating time savings and cost reductions. While some systems force content to be trapped within an interface, structured content helps set content free, enabling it to appear on a website, portal, app or Internet of Things (IoT) device.” – Dennis Shiao
Challenges of combining structured and unstructured data
Business intelligence tools can assist decision making, but optimal results require merging structured and unstructured data. Master data and improved metadata can do the job.
Content intelligence: Content management meets business intelligence
Analyst Gerry Brown explains ‘content intelligence’ — a combination of business intelligence software and content management that helps companies leverage unstructured data.
How contextual awareness changes content delivery
Contextual awareness in hardware and applications has quickly caught on with apps such as Waze, but companies have yet to harness its potential.
Is it too soon for unstructured data governance?
Organizations struggling to define unstructured data next need to find approaches that work for unstructured data governance, expert Anne Marie Smith tells SearchDataManagement.
How to develop big data consulting services
Experts offer advice around developing big data consulting services, including building use cases, preparing staff, standing out among competitors and uncovering opportunities.
Fail fast is a philosophy that values extensive testing and incremental development to determine whether an idea has value. An important goal of the philosophy is to cut losses when testing reveals something isn’t working and quickly try something else, a concept known as pivoting. Continued…
Quote of the Day
“Agile analytics with ‘fail fast’ capabilities is something we’ve been touting for ages – use a sip of data and an agreed probability of desired outcome score, and then analyze the small amount of data to see whether it deviates significantly from that probability.” – Clive Longbottom
Pentaho 7.0 drives Agile ‘fail fast’ analytics capabilities
Open source business analytics company Pentaho (now a Hitachi Group Company of course) has just reached software version 7.0 with its self-named platform. The new software addresses data preparation pain points in particular.
Failing fast: A lesson in semantics
‘Failing fast’ may work for Silicon Valley startups, but it’s a concept that can fail fast at government agencies and established companies.
Pixar president on why building a ‘fail fast’ culture is hard
‘Fail fast’ is easier said than done. Ed Catmull, president of Pixar and Walt Disney Animation Studios, explains why: The Data Mill reports.
To ‘fail fast,’ CIOs need to think strategically from the get-go
A chief innovation officer explains the benefits of failing fast in this SearchCIO video interview.
Is fail fast the next trend in app development?
The integration outlook for 2015 says developers should use Agile development methodology and fail fast with mobile apps, make changes, then redeploy.
Smart data is digital information that is formatted so it can be acted upon at the collection point before being sent to a downstream analytics platform for further data consolidation and analytics. The term smart data is often associated with the Internet of Things (IoT) and the data that smart sensors embedded in physical objects produce. Continued…
Quote of the Day
“Take the example of smart hats used on factory floors, for example. If the smart hat detects a carbon monoxide level exception, it vibrates and alerts the person wearing the hat before relaying the data to a central system.” – Arjuna Chala
Plan carefully for IoT edge analytics to avoid network stress
Edge analytics can ease the load on internet of things networks — but plan carefully in concert with the business side, advises consultant David A. Teich.
Mobile edge computing promises wide variety of uses
With lower latency and increased reliability, mobile edge computing stands to benefit networking trends like NFV, IoT and 5G.
IoT and the case for intelligence at the edge
As IoT data grows, our challenge is to develop systems that capture and process data fast, efficiently and at the point where it can have maximum impact. Intelligence at the edge can help.
Edge computing lets IoT systems tap into cloud efficiency
Enterprises adopt edge computing to help IoT systems take advantage of the cloud’s cost efficiency, while still maintaining high response times.
Edge computing becomes ‘Wild West’ of IT world
Amid a varied landscape, edge computing offers potential for growth, but at what cost? Security, performance and bandwidth are all important considerations.
A telepresence robot is a remote-controlled, wheeled device with a display to enable video chat and videoconferencing, among other purposes. Continued…
Quote of the Day
“Doctors control the robots, choosing where the robot should be positioned and what data to keep track of for each patient.” – Alex DelVecchio
Telepresence robotics with Nao and Kinect
Using telepresence robotics, you can have an out-of-body experience like in the movie Avatar. Learn how to build such a robotic system.
Channel Chat: Telepresence = robotic technology?
Telepresence is much more than high-definition videoconferencing. It’s also the use of robotic technology to enable remote work in a variety of settings.
Robots in health care: FDA approves monitoring device
The U.S. Food and Drug Administration cleared the “first autonomous navigation remote presence robot” for use in hospitals.
Benefits of video conferencing unlock with flexible setups
It’s difficult to fully achieve the benefits of video conferencing when your deployment is inflexible and doesn’t match user needs.
Telepresence is the next best thing to being there
This article explains how telepresence looks, feels and works, identifies key telepresence providers and provides information to help you determine if an investment in telepresence is right for your organization.
Noisy neighbor is a cloud computing infrastructure co-tenant that monopolizes cloud resources and negatively affects other tenants. The noisy neighbor effect causes virtual machines and applications that share the infrastructure to suffer from uneven performance. Continued…
Quote of the Day
“In general, noisy neighbor is a potential issue with any public cloud service provider, so customers of all sizes need to understand their options for detecting and mitigating problems with cloud bandwidth.” – Dan Sullivan
Navigate noisy neighbor challenges in cloud vs. colocation
When it comes to cloud versus colocation, the multi-tenant challenges can differ. Find the right provider that won’t let noisy neighbors come knocking.
How to restore cloud bandwidth within shared resources
Shared resources on a server can result in a problem called ‘noisy neighbor,’ in which cloud bandwidth is limited. AWS users can avoid the issue.
AWS fends off ‘bouncy’ cloud computing performance perception
Amazon Web Services officials last week looked to dispel the notion that variations in cloud computing performance on EC2 are due to ‘noisy neighbors’ on shared hardware.
Hypervisors complicate storage I/O with blender effect
In this video, expert Howard Marks describes what he calls the I/O blender and noisy neighbor effects of hypervisors and explains why they can be detrimental to storage I/O.
Cloud storage providers moving to all-flash platform
Find out why cloud storage providers are shifting toward an all-flash platform and how to reduce costs by bursting workloads into an all-flash cloud.
Rowhammer is a vulnerability in commodity dynamic random access memory (DRAM) chips that allows an attacker to exploit devices with DRAM memory by repeatedly accessing (hammering) a row of memory until it causes bit flips and transistors in adjacent rows of memory reverse their binary state: ones turn into zeros and vice versa. Continued…
Quote of the Day
“Rowhammer is a physical attack and deduplication is part of the operating system, which means anything right on the machine is potentially vulnerable.” – Robert Graham
Does Rowhammer mark a new wave of hardware vulnerabilities?
Experts say that the Rowhammer vulnerability isn’t a worry for enterprises, but it may be the first of a growing number of hardware vulnerabilities.
Drammer proves Rowhammer can be used to root Android
Researchers proved the Rowhammer hardware vulnerability can be exploited reliably on Android in order to allow attackers to gain root access.
Rowhammer exploit: Are Microsoft Edge browser users at risk?
Rowhammer exploits can give attackers read and write access to Microsoft Edge browsers. Find out how enterprises can prevent these attacks.
How to mitigate bit flipping flaw caused by Rowhammer exploits
A flaw in DRAM allows attackers to use Rowhammer exploits to prompt high rates of bit flipping. Find out what this attack does and how to prevent it.
‘Ingenious’ attack mixes memory deduplication with Rowhammer
An exploit combines memory deduplication and Rowhammer to allow read or write memory access.