Welcome!


Industry Commentary

The first law of change management is not to use change management. To be more precise, the first law of change management is not to use change management until you use configuration management first. Okay so that might be a slightly sneaky way of making a point, but many change manag...
What is the most secure way to authenticate electronic data? Until recently, many technical people would have answered ‘cryptographic keys’ without blinking. But recent headline events – and a ‘biggie’ last year – have raised serious doubts about the ability of cryptographic keys to pr...
In this version of the book the author still starts off by answering the question, "Why do we need another C# book?". I was asking myself that very question when I turned to the introduction of C# 4.0 Unleased which was the first version of this book I read. He says "In short, what set...
I like this major new trend known as software-defined data center and this will be a highly disruptive force in enterprise computing. Gone are the days of expensive physical data center owned by large corporations. Now it is the rise of … May. 3, 2013 06:45 AM EDT  Reads: 10,859
Despite the recent flood of high profile network breaches, hacking attempts are hardly new. In 1995, I was attending school in Helsinki when I discovered a password “sniffer” attack in our university network. In response, I wrote a program called the “secure shell” to safeguard informa...
Associated Surgeons and Physicians, LLC in Indiana went from zero to 100 percent virtualized infrastructure and as a result, met many compliance and efficiency goals. In part one of a two-part interview series, we discuss how a mid-market health services provider rapidly adopted serve...
Energetic debates of what SDN is and the expanding scope of what it can do for our customers continue to race along in a chaotic frenzy. In addition, the overall SDN market is somewhat fragmented in terms of both vendor positioning and marketing. Collectively, the conversation really ...
Over the last few years, increased reliance on IT systems has meant that Change and Release Management has made its way to the forefront of major organizations. However, as far as the end-user base goes, Change and Release can sink into the subconscious as a simple-to-use to-do list, w...
Many organizations that are looking at implementing a new network infrastructure for cloud computing; a new building being built; or any other network capability, better look closer at their network designs. Why? All the cabling needed to build the network should fit the lifespan of t...
The Big Data Old Tail focuses on the costs inherent in maintaining archives of increasingly small, yet increasingly costly data as we struggle to deal with older and older information. True, perhaps the fact that the Old Tail data sets from a particular time period are small will compe...
Symantec’s 2013 State of Mobility Survey uncovered two distinct groups among businesses that have implemented mobility. One group could be called the Innovators. They are willing to take a chance as early adopters of technology, seeking opportunities to improve themselves and accepting...
The networking industry has gone through different waves over last 30+ years. In the ’80s, the first wave was all about connecting and sharing; how to connect a computer to other peripheral devices and other computers. There were many players who developed technology and services to ad...
The telecom industry will be challenged in the coming year as operators learn to adapt to the rapidly changing mobile landscape. 2012 was the year of mobile – big brands and Internet companies have just started to realize the potential impact that mobile communications can have on the...
Ford Motor Company has scoured the metrics from the company’s best processes across myriad manufacturing efforts and through detailed outputs from in-use automobiles -- all to improve and help transform their business. What's different now in being able to get at this data and do this...
Significant business benefits often follow when BYOD-adopter companies empower their employees with their preferred devices and work habits. What's more, the rapidly improved productivity and enhanced collaboration among employees -- as well as greater communication and better service...
It was never a question of whether SAP would bring it flagship product, Business Suite to HANA, but when. And when I saw this while parking the car at my physical therapist over the holidays, I should’ve suspected that something was up: SAP at long last was about to announce … this. F...
The NEBs level 3 certification is essential to keeping carriers services up and running during natural disasters and other catastrophic events. The Network Equipment-Building System (or NEBS) is such a standard, attempting to force device builders to engineer their products to withst...
Since ZapThink started the trend with our 2003 predictions and 2002 retrospective ZapFlash, we have taken a different tack than most IT prognosticators in that we actually grade ourselves on our predictions from the previous year, for better or worse. Last year we scored ourselves 2.5 ...
So it’s the end of the year and we’ve all had about as many 2012 retrospectives and 2013 predictions as we can eat. So let’s take a different tack and see if some fanciful (but hopefully somewhat informed) conjecture can give us some pointers for future innovation roadmaps. What do ch...
Many companies and enterprises in 2012 witnessed the proliferation of network data as a huge and growing problem across data centers. Additional data center solutions were needed to access, process, analyze, and deliver it instantly on a global basis to millions of users. Several advan...
One of the things I look forward to most at Christmastime is the seemingly endless parade of predictions and year-in-review columns. You see them everywhere: The Ten Best movies of 2012 2012: The Year in Bacon Ten Brilliant, Surefire, Can’t-Miss Business Predictions for 2013 A Crys...