Blogs

Visit one of the Subject Area Blogs or ESG Analyst Blogs by clicking any link below:

Application Development & Deployment Truths               The Bigger Truth Insecure About Security
Cloud Computing Truths               Big Data, the Universe, and Everything IT Artillery
Data Management & Analytics Truths               The Business of Storage IT Depends
Data Protection Truths               Channeling IT Liquefying IT
Information Security Truths               Decoding Development and Developers Technical Optimist
Networking Truths               ESG Lab Blog  
Storage Truths                  

Individual Author Blogs can be found via EXPLORE, selecting the Author, and clicking on "Read blog."

  • February 26, 2015

    Instart Logic Use of Optimization to Disrupt the CDN Market

    The content delivery network (CDN) market largely appears to be a mature market that is dominated by Akamai due to the market’s apparent affinity for a high degree of physical network infrastructure and caching to minimize the impact of last mile issues. It’s therefore surprising to see the degree of attention focused on Instart Logic by some of Silicon Valley’s leading entrepreneurs and VCs. Instart Logic is a west coast application delivery startup with funding from Andreessen Horowitz, Greylock Partners, Kleiner Perkins Caufield & Byers, Sutter Hill Ventures, Tenaya Capital, and several notable Silicon Valley angel investors. This is the A-team when it comes to investors and a group whose attention is not easy to attract.

    Learn More


  • February 26, 2015

    Strata + Hadoop World = Big Data x Innovation

    The recent Strata + Hadoop World show in San Jose was again a fascinating cross-section of the larger big data and analytics market space. Watch our "man on the scene" video or read on below for some quick highlights. Note: the one-side flared collar is a fashion fad you saw here first!

    Learn More


  • February 26, 2015

    0% Cybersecurity Job Unemployment in Washington

    I’ve written a lot about the global cybersecurity skills shortage over the past few years. Here’s some recent ESG data that illustrates this problem...

    Learn More


  • February 25, 2015

    More on Network Encryption and Security

    In a blog I posted last week, I described that enterprise organizations are encrypting more of their network traffic. This is a mixed blessing in that it can protect data confidentiality and integrity but it also opens a camouflaged threat vector back into the organization. To address this risk, a majority (87%) of organizations decrypt and then inspect SSL/TLS traffic looking for things like reconnaissance activity, malware, and C2 communications according to ESG research.

    Learn More


  • February 25, 2015

    What’s New in Data Protection from IBM Interconnect 2015

    Every time that I take a close look at IBM’s data protection portfolio, veiled under its storage solutions umbrella, I am happily surprised by the technology—and my guess is that you would be too.

    Learn More


  • February 24, 2015

    TDWI Gets Fresh

    I'm a "big data" guy, in the broadest, most aggressively futuristic sense of the term. So when Tom Davenport opened the TDWI keynote saying he doesn't like the Kardashians and he doesn't like the term "big data," I was alarmed. Was this going to be another grandpa-style lecture on how business intelligence and data warehousing didn't need any of them new-fangled gizmos? You know the spiel, "Back in my day we did analytics on the way to school, for 10 miles, uphill both ways, in the snow, without shoes, and we were happy to do it!" When he started on his history of decision support analytics, I began to wonder if there there any earlier flights available out of Las Vegas that day....

    Learn More


  • February 23, 2015

    Violin Refines its Pitch to "Software Major" (includes video)

    While it's always tempting to use some musical reference when talking about Violin (and I make no apologies for doing so in my blog title or the video blog below) I was struck by a different metaphor when speaking with CEO Kevin Denuccio recently. His office looks straight at the new home of the 49ers, Levi's Stadium in Santa Clara. Imagine a football team that only played either offense or defense?! That was almost the Violin story early on - it was a perfomance value proposition and not a lot else. But winning requires playing both sides of the ball....and now Violin has rounded out and extended its software data services offerings so as to field a balanced team.

    Learn More


  • February 23, 2015

    Big Data Deployment Trends (Part II)

    In my first post of this blog series on big data deployment models, I discussed some of the fundamental choices enterprises must make and shared a somewhat tongue-in-cheek flowchart to help people think about their options on how to host a new big data environment.

    Learn More


  • February 19, 2015

    Federal Cybersecurity Duplicity

    As part of a whistle-stop tour of Northern California, President Obama held a White House Summit on Cybersecurity and Consumer Protection at Stanford University last Friday. Much to the delight of the Silicon Valley crowd, the President signed an executive order (right there on stage at Stanford) to promote data sharing about digital threats. The summit also highlighted industry leaders like Apple CEO Tim Cook, and large critical infrastructure organizations like Bank of America and Pacific Gas & Electric Co.

    Learn More


  • February 19, 2015

    Organizing Principles for Optimization

    Optimization is surfacing more frequently in the applications and tools markets. I was recently speaking with a vendor who competes in the content delivery network (CDN) market about their optimization technology. Consequently, I started thinking about optimization, its role in decision analytics, and how it is applied.

    Learn More



More Results:
NEWSLETTER

Enter your email address, and click subscribe