Visit one of the Subject Area Blogs or ESG Analyst Blogs by clicking any link below:
|Application Development & Deployment Truths||The Bigger Truth||Insecure About Security|
|Cloud Computing Truths||Big Data, the Universe, and Everything||IT Artillery|
|Data Management & Analytics Truths||The Business of Storage||IT Depends|
|Data Protection Truths||Channeling IT||Liquefying IT|
|Information Security Truths||Decoding Development and Developers||Technical Optimist|
|Networking Truths||ESG Lab Blog|
Individual Author Blogs can be found via EXPLORE, selecting the Author, and clicking on "Read blog."
This week’s announcement that VCE will be folded into EMC takes customer concerns over ownership uncertainty off the table and makes sense as it matches up nicely with what EMC is already doing on a broader scale.
Enterprises are increasingly interested in free antivirus products, but there continue to be reasons to exercise caution before making the jump. Avast's spyware debacle today is the latest proof that there is "no such thing as a free lunch."
As expert group gains status and budget, large organizations are moving away from the status quo.
On the outside this may look like a packaging of existing Microsoft software snapped on top of Dell gear, but Microsoft is ultimately helping IT change the way it thinks about delivering IT services and challenging traditional IT infrastructure deployments.
The Splunk.conf 2014 event in Las Vegas was an eye-opening view into the company's bold aspirations for a more strategic role in the future of the big data marketplace.
Deal aligns cybersecurity business metrics with IT risk mitigation to bridge the perpetual communications gap between business executives and CISOs.
It really is just that simple: backup products without robust catalogs are just that, backup products – not restore products.
There are lots of reasons that just maintaining a browse-able file list is not enough today, including not only a lack of search-ability but also because the catalog is the key to really leveraging primary storage snapshots and replication capabilities with traditional backup for a modern recovery capability.
Check out this video for more details.
Network/Endpoint integration initiatives gaining traction at advanced organizations driven by threat management and security analyst teams.
Convergence, whether it be full hyperconvergence or better engineering between infrastructure components that is delivered in a pre-configured turnkey manner, is here to stay. Traditional and emerging IT vendors are going to quickly have to determine how to stand out from the pack and light up their go to market campaigns and sales initiatives.
A waste of time and effort unless cybersecurity professionals and the industry beyond the Beltway jump on the bandwagon.