Visit one of the Subject Area Blogs or ESG Analyst Blogs by clicking any link below:
|Application Development & Deployment Truths||The Bigger Truth||Insecure About Security|
|Cloud Computing Truths||Big Data, the Universe, and Everything||IT Artillery|
|Data Management & Analytics Truths||The Business of Storage||IT Depends|
|Data Protection Truths||Channeling IT||Liquefying IT|
|Information Security Truths||Decoding Development and Developers||Technical Optimist|
|Networking Truths||ESG Lab Blog|
Individual Author Blogs can be found via EXPLORE, selecting the Author, and clicking on "Read blog."
Larry Ellison and Oracle have EMC’s VCE and Cisco’s UCS square in the crosshairs. The question is, can Ellison's “highest performance, lowest purchase price” converged infrastructure value proposition be enough to sway IT buyers to adopt Oracle’s Virtualized Computing Appliance (VCA)?
Do you remember a list called All I Really Need to Know I Learned in Kindergarten? No? It’s a list of basic things that children are taught, which can guide them throughout life. It’s pretty old but was very popular in its day. Thinking about this led me to ask: Would lessons from a pamphlet for securing home networks have prevented some recent mega breaches? No way? Think again.
I’m wrapping up my visit to the RSA USA 2015 Conference. The conference was as big as ever. There was a feeling of how to protect ourselves from breaches by being realistic: Realize that adversaries will somehow get into your system, so look for multi-layered approaches to protect yourself after a breach occurs and minimize the damage. But there was some hopefulness as well, since we are acknowledging the changes in the security landscape, and we’re adapting ourselves accordingly. So I hope we’re not fighting the last war, and we’re becoming forward-looking.
I was just getting on my flight to the RSA Security Conference in San Francisco on Monday morning when I received an e-mail announcing an intriguing cybersecurity deal.Defense contractor Raytheon announced its acquisition of security veteran Websense for approximately $1.6 billion. Vista Equity Partners, Websense’s previous owner, also contributed $335 million and will retain some skin in the game.
As the 2015 RSA Conference got underway this week, I attended a dinner hosted by Pacific Crest Securities. Our host began the dinner by asking former cyber czar Richard Clarke to say a few words. Now this was a rather festive dinner as the cybersecurity industry is in the midst of a robust boom. Nevertheless, Clarke’s brief talk was a reminder of where we’ve been and the state of cybersecurity today.
Age is a very interesting phenomena: there's the real numbers and then the relative aspect. "You're only as old as you feel" - as someone who's now having to check the last age-range box on demographic questions (certainly in ESG's own research!), I'm mightily relieved to hear that "60 is the new 45," or whatever! And we all seem sure that a human year equates to 7 "dog years."
Previously in this blog series we looked at business and technology goals for big data and analytics initiatives as described by the leaders of these projects at a wide variety of businesses today. The aim is to understand the state of the market and how people seek to drive value from the data naturally occurring in their businesses. While some organizations are truly on the cutting edge, others are taking a more conservative approach or are just now implementing new solutions. Today I’d like to look at some of the ways people actually measure the value of big data and analytics to their business.
In my previous blog, I discussed the need to focus on the software in addition to the core hardware functions. I noted that spending too much attention on merchant silicon vs. custom ASICs for network processors neglects the importance of software to the networking infrastructure.