Blogs

Visit one of the Subject Area Blogs or ESG Analyst Blogs by clicking any link below:

Application Development & Deployment Truths               The Bigger Truth Insecure About Security
Cloud Computing Truths               Big Data, the Universe, and Everything IT Artillery
Data Management & Analytics Truths               The Business of Storage IT Depends
Data Protection Truths               Channeling IT Liquefying IT
Information Security Truths               Decoding Development and Developers Technical Optimist
Networking Truths               ESG Lab Blog  
Storage Truths                  

Individual Author Blogs can be found via EXPLORE, selecting the Author, and clicking on "Read blog."

  • May 26, 2015

    Dear CISO, Tear Down These Legacy Cybersecurity Walls!

    Here’s a scenario we’ve all encountered: You go to a nice restaurant to enjoy a meal and the whole experience turns sour. The service is terrible, your entrée arrives before your salad, and your food is overcooked and virtually inedible.

    Learn More


  • May 26, 2015

    IBM Edge "Is Breadth Manifest" (Includes Video)

    The 2015 edition of IBM’s Edge conference recently took place in Las Vegas. While it lacked some of the showbiz sheen of other big industry events, the feeling of being at a cult reunion was just as strong; and any lack of hype was more than balanced by the focus on links to real world business/societal outcomes that permeated everything.

    Learn More


  • May 26, 2015

    Subduing the data storage growth monster with object

    Have you ever seen the movie, Pacific Rim? As a fan of Guillermo del Toro and of science fiction in general, the movie was right up my alley. And with a 72% from Rotten Tomatoes, I am not alone. But what does this movie have to do with information technology and/or enterprise data storage? Hang on a second and I will get to that, but first let me set the stage for any reader who hasn’t seen the movie.

    Learn More


  • May 22, 2015

    Dell Continues to Enhance its DR Deduplication and DL Backup Appliances

    Earlier this month, Dell announced enhancements to its DR series of deduplication appliances. Deduplication appliances continue to be a common method of improving one’s overall data protection infrastructure since they can typically be added to whatever backup/archive software or method that you already have, while near immediately reducing the storage consumed in secondary copies.

    Learn More


  • May 21, 2015

    The barrier to wider adoption of solid-state storage

    Included with this blog post is fifth in a series of seven videos that talk about the key findings from ESG’s recently published research report, Next-generation Storage Architectures. I collaborated with my colleagues Mark Peters and Scott Sinclair on the research. In this segment, I talk about one of the key, next-generation storage architectures: solid-state storage.

    Learn More


  • May 19, 2015

    NFV, Telecom, and Enterprise: We know what we are, but know not what we may be

    I attended the NFV World Congress, and I found the continuation of the increased intersection between Enterprise and Telecom Carrier Ecosystems. Traditionally, the world of telecom has been about signaling, switching circuits, radios, and the like. The introduction of NFV (network functions virtualization) had nudged the telecom world closer to the land of data center networking and cloud computing.

    Learn More


  • May 20, 2015

    A ‘File Server in the Cloud’ is hard to find!

    This weekend, I decided to fully embrace the cloud by getting rid of my last "production IT resource" in my Dallas office—a file server. This is not complicated, right? It is currently a 2TB VM with less than a dozen file shares on it and serving 3-5 users with various permissions to the shares. That is a configuration that anyone who has ever spun up a copy of Windows Server OS could do in less than an hour—but can you do it in the cloud? Not as easily as you might think.

    Learn More


  • May 19, 2014

    Big Data Security Analytics Meets Identity and Access Management (IAM)

    Enterprise organizations benefit by monitoring user activity and improving identity and access management (IAM) processes.

    Learn More


  • May 19, 2015

    Toward Omniscient Cybersecurity Systems

    Cybersecurity systems suffer from compartmentalization. Vulnerability management systems know which software revisions are installed on which systems, but have no idea how endpoints and servers are connected together. Similarly, an anti-malware gateway can perform static and dynamic analysis on a suspicious file but doesn’t know if a user downloaded analogous malware when she was connected to the Internet on a public network.

    Learn More


  • May 19, 2015

    Enterprise Mobility at Citrix Synergy

    Last week, ESG Senior Analyst Terri McClure and I were at Citrix's Synergy event in Orlando to see the developments and announcements on enterprise mobility. Both of us were active on Twitter throughout the event, so our best recap comes by way of Storify:

    Learn More



More Results: