Visit one of the Subject Area Blogs or ESG Analyst Blogs by clicking any link below:
|Cloud Computing Truths||The Bigger Truth||ESG Lab Blog|
|Data Management & Analytics Truths||Big Data, the Universe, and Everything||Insecure About Security|
|Data Protection Truths||The Business of Storage||IT Artillery|
|Enterprise Software Truths||Channeling IT||IT Depends|
|Information Management Truths||The Cloudy Enterprise||Liquefying IT|
|Information Security Truths||Data Center Continuum||Technical Optimist|
Individual Author Blogs can be found via EXPLORE, selecting the Author, and clicking on "Read blog."
Security groups point to cybersecurity training, software patching, and system hardening.
Love them or hate them, be aware what Microsoft is up to. They have by no means figured everything out and have some pretty significant hurdles to leap over with a CEO change and stiff competition from the likes of Amazon.
CISOs should think about privacy, culture, and third-party relationships.
Maybe not “every” – but certainly more than “most” – data protection architecture should be “hybrid,” meaning that it should include disk-, cloud-, and yes tape-based recovery components. Why? Because each has a legitimate set of use-case scenarios and attributes that lend each medium type to different data protection goals.
Check out this 7m video to hear why I think so.
ESG is designing a survey on the world of big data, business intelligence, analytics, and related topics. We would welcome your input. What questions do you think we should be asking?
A light-hearted, introductory post to the new "Big Data, The Universe and Everything" blog by Nik Rouda, which will cover the topics of big data, including hadoop, business intelligence, analytics, visualization, and various other data management approaches.
So, as we start thinking about how we will do things smarter and more effectively in 2014, here is a short (6m) video to hopefully get you thinking about what to plan for in your 2014 Data Protection Strategy. If your virtualization-protection solution already meets the four directives in this video of “what to look for” … then you have one more thing to be thankful for during this holiday season. If not, then your virtualization protection is not as good as it could/should be.
Integration, analytics, services, identity, and "C-level" messages....
The past few days were spent engaged with IBM and their annual Software Analyst event. The meetings started out with Steve Mills talking about their overarching strategy and their shift in how they design products (you have to check out their new design studio in Austin) and how the enterprise is driven by internal and external customers. Read on to see what else I learned ...
Enterprises want choices, integration, and specific types of data feeds. Will vendors acquiesce?