Welcome!


Cloud Computing

For most enterprises, cost savings and increased efficiencies are the primary motivations for making the move to cloud computing. But recent studies from Gartner and other firms have identified concerns over cloud security and data privacy as being the leading barriers to cloud adoptio...
Mobile Backend as a Service (MBaaS) has emerged as one of the hottest trends in today’s technology market. While most of the adoptions of MBaaS technologies have taken place in the consumer or B2C space, these platforms are starting to make serious inroads in the enterprise. In order t...
Cloud computing’s promise is becoming reality, but cloud integration is an ongoing challenge. As the use of cloud applications spreads throughout the enterprise, there’s just no way to escape data exchange, change management, and related user issues. Why? The fact is, most top cloud an...
Every cloud infrastructure can be home to potentially hundreds of thousands of vulnerable privileged accounts. The presence of automated hacking tools means improperly secured privileged logins are almost certain to give hackers free reign on the network and access to customers’ privat...
Cloud brokers were recognized and described by Gartner analysts as the `Intermediary services that support fast cloud adoption`. From their customers’ perspectives cloud brokers are the system integrators (SI) or the `cloud enablers` that support fast adoption and maintenance of cloud ...
Everyone has an opinion about the ‘Cloud’ and its effect on business – some believe it is dark and scary and fraught with unnecessary risk, while others would argue it’s silver lined and the path to greater business performance and cost savings. The truth is that the Cloud undeniably h...
McKesson Corp. accomplished a multi-year, pan-IT management transformation that has enabled it to better leverage an agile, hybrid cloud model. Gardner: It's hard to believe it's been a full year since we last spoke. What's changed in the last year in how McKesson had been progressing...
The very name is kind of ridiculous, don’t you think? The word “ephemeral” means it can go away. It’s temporary. Fleeting, even. So why would I want to depend on storing something in a medium that can disappear without warning? And why am I forced to buy more of it when all I want is m...
Australian Government agencies have some new regulations to consider when they are contemplating moves to the cloud, particularly clouds hosted outside of Australian borders. These guidelines, known as “The Australian Government policy and risk management guidelines for the processing ...
You can design a great enterprise cloud network, but it will be very restricted if you are in a building that does not support broadband connectivity or mission-critical applications. What good is a multi-gigabit design if your connection to the central office is not fiber? Or redund...
The data center industry, especially cloud providers, has recently been in the spotlight for massive power consumption. For example, if the industry were a country, it would be in the Top 15 users of energy, somewhere between Spain and Italy. The 30+ Gigawatts pushed through data cente...
With the C-suite, innovators, developers and IT all pushing for the cloud, albeit for different reasons, there is no doubt that cloud computing is the next or fifth wave. As the cloud computing market continues to mature, explaining the platform shift gets easier and more succinct. Th...
SHI International has teamed with Ariba to streamline IT product discovery and purchasing processes for large agricultural machinery builder AGCO. A global provider of IT products, procurement, and related services, with more than $4 billion in annual sales, SHI has tapped into the ne...
In the enterprise context, the missing piece of Agile Software Architecture is Agile Enterprise Architecture, where EA brings together the organization, the processes, the technology, and the information in a consistent, business-driven whole. Configurability alone doesn’t provide this...
In the last MetraTech blog I introduced you to the Conferencing and Collaboration (C&C) market and highlighted the way in which C&C players uniquely approach the market. I challenged you to think about what was possible if IT didn’t have “no” in their vocabulary; to imagine the possibi...
When organizations look to protect sensitive data at rest in the cloud or in transit on the way to it, there are two primary obfuscation strategies most consider – tokenization or encryption. But some enterprises may not know the details of how these methods work or how they differ. A...
This chapter introduces and describes several of the more common foundational cloud architectural models, each exemplifying a common usage and characteristic of contemporary cloud-based environments. The involvement and importance of different combinations of cloud computing mechanisms...
Floods, fires, tornados, earthquakes, pandemics, riots, and hurricanes are just a small sample of the potential disasters that threaten businesses almost daily. Throughout my career, I have been responsible for preparing, managing, and rebuilding major communications infrastructure and...
Many small businesses are realizing that cloud computing isn’t just for large corporations. Many providers offer services that are targeted at the small business owner. Cloud computing presents unique opportunities for small businesses, giving them access to infrastructure that had tra...
The world of software applications and products is moving from on-premise to a Software-as-a-Service (SaaS) model. Perpetual licence earnings are shrinking, while subscription revenue including SaaS is growing increasingly fast and at a steady pace. According to a recent PWC report, su...
I often get asked the question “what is really being done differently by delivering supply chain management software through the cloud versus deploying it behind the firewall?” It’s a fair and important question. I’ll give my thoughts here in terms of two of the more important dimensio...
The answer is – it isn't possible. "No one's ever on an old version of Salesforce.com because Salesforce.com is multitenant, that is everybody shares the same servers, so when those servers are upgraded, everybody's upgraded." Naturally, when a perplexed customer asked me whether "Nav...
Millennium Pharmacy Systems, Inc., has successfully deployed mission critical SaaS applications, and implemented advanced IT management and operational efficiency processes and systems to keep all the applications up to date, compliant, performant, and protected. Managing application...
Blue Marble Media in Atlanta has been using so-called spot-buying capabilities on the Ariba Network and Ariba Discovery to find new sales channels and new clients in the cloud. Tell us a little bit about your company -- your size, what services and products you provide. And why is the...
Recovery-as-a-Service, or “RaaS”, is the latest disaster recovery solution. Cloud-based RaaS allows organizations to recover their IT resources efficiently and effectively when an adverse situation strikes. When compared to traditional disaster recovery solutions, RaaS is more easily...
In enterprises across the globe, CIOs are looking cautiously in one direction: up – to the cloud. Migrating to the cloud changes not only the operations of the data center but also the roles of the CIO and IT staff. As a result, management must carefully weigh the pros and cons of shif...
In Part 1 I talked about how there’s nothing new about subscription services since they’ve been around for generations. Now I’ll relent a little and admit that there is something new about many of the subscription services out there. What’s new is what is no longer there. Traditionall...
In the course of IT history, many schemes have been devised and deployed to protect data against storage system failure, especially disk drive hardware. These protection mechanisms have nearly always been variants on two themes: duplication of files or objects (backup, archiving, synch...
Precautions to safeguard client data & infrastructure is an MSPs responsibility-this extends beyond client's sphere of access to MSP employees & consultants. MSPs must employ some degree of security to cover their own access, not just that of their clients. A man walks into the doctor...
Some of our customers and billing industry contacts are somewhat intrigued (or even bemused) by the upsurge in attention being given to the concept of “subscriptions”. Some are concerned that they’re missing something because, after all, subscriptions have been business-as-usual for mo...
The cloud will soon supplant on-premise security initiatives. IT is at a crossroads: the acceptance of cloud-based computing as the chief business driver. Erasmus Wilson, the celebrated Oxford professor once proclaimed, "When the Paris Exhibition [of 1878] closes, electric light will ...
Telecommuting at one time meant little more than working from one's kitchen table, saving files onto a floppy disk, and possibly sending them into the office via dial-up modem. There was no videoconference, no softphones to move your office extension to wherever you were sitting at the...
Amazon has built a classic virtuous cycle. They got IaaS to work, disrupting the pre-existing data center outsourcing market. They achieved market dominance, enabling them to be the low-cost leader. And they figured out how to scale, facilitating unlimited growth. But such growth and m...
It’s clear that cloud computing has transformed the enterprise IT landscape, from the computing infrastructure layer up through enterprise software, as companies move to leverage more efficient and cost-effective service-delivery models and bring new cloud-based products and services t...
At the top of many IT group’s list of concerns lie security, compliance and internal process governance – both in static data centers and in dynamic clouds. Indeed, governance should not be overlooked. And, as they say in many security circles, the best measure of successful security i...
We’ve all heard it. Security and regulatory compliance are issues in the public cloud. And building a private cloud many say does not pass a cost/benefit analysis. Given these hurdles, what is an enterprise to do? Well, according to Datamation, 47% of enterprises are going to implem...
The technology infrastructure of today’s business landscape has undergone dramatic shifts in recent years. The consumerization of IT, the Bring Your Own Device (BYOD) movement, and of course the cloud have revolutionized the way corporations manage data, complete transactions and commu...
If the leadership in your organization is mature and has a good track record – rest assured that a risk-mitigated decision to dabble in the public cloud is a vote of confidence in your direction. It's little more than innate human nature to strive to control the environment around us....
New breakthroughs in cloud-based data management empower databases with the necessary elasticity they need to be truly responsive to the ebbs and tides of supply and demand. Cloud computing allows all capital assets – computing power, memory and storage for example – to be exchanged a...
Legos have been a part of my life for as long as I can remember. Some of my earliest, fondest memories involve Legos - starting from a small car made from a couple of simple bricks to very complex spaceships and wild creatures. I’m always amazed at how nicely and cleanly they snap toge...