Blogs

Visit one of the Subject Area Blogs or ESG Analyst Blogs by clicking any link below:

Application Development & Deployment Truths               The Bigger Truth Insecure About Security
Cloud Computing Truths               Big Data, the Universe, and Everything IT Artillery
Data Management & Analytics Truths               The Business of Storage IT Depends
Data Protection Truths               Channeling IT Liquefying IT
Information Security Truths               Decoding Development and Developers Technical Optimist
Networking Truths               ESG Lab Blog  
Storage Truths                  

Individual Author Blogs can be found via EXPLORE, selecting the Author, and clicking on "Read blog."

  • April 27, 2015

    Can Oracle’s VCA Wrest Share from VCE?

    Larry Ellison and Oracle have EMC’s VCE and Cisco’s UCS square in the crosshairs. The question is, can Ellison's “highest performance, lowest purchase price” converged infrastructure value proposition be enough to sway IT buyers to adopt Oracle’s Virtualized Computing Appliance (VCA)?

    Learn More


  • April 27, 2015

    Take-aways from RSA

    As expected, the 2016 RSA Conference was bigger than ever—more attendees, presentations, exhibitors, etc. Since I live in the cybersecurity space, there were few surprises, but there were a few major highlights to this year’s show.

    Learn More


  • April 27, 2015

    All I Need to Know about Cyber Security, I Learned in an NSA Pamphlet for Securing Home Networks

    Do you remember a list called All I Really Need to Know I Learned in Kindergarten? No? It’s a list of basic things that children are taught, which can guide them throughout life. It’s pretty old but was very popular in its day. Thinking about this led me to ask: Would lessons from a pamphlet for securing home networks have prevented some recent mega breaches? No way? Think again.

    Learn More


  • April 24, 2015

    Wrapping up RSA USA 2015, and Looking Forward to Interop

    I’m wrapping up my visit to the RSA USA 2015 Conference. The conference was as big as ever. There was a feeling of how to protect ourselves from breaches by being realistic: Realize that adversaries will somehow get into your system, so look for multi-layered approaches to protect yourself after a breach occurs and minimize the damage. But there was some hopefulness as well, since we are acknowledging the changes in the security landscape, and we’re adapting ourselves accordingly. So I hope we’re not fighting the last war, and we’re becoming forward-looking.

    Learn More


  • April 24, 2015

    Video Series on Data Protection Appliances – Part 1, Backup Appliances

    In March 2015, ESG published its research report on the Shift toward Data Protection Appliances. In ESG’s taxonomy, there are four types of DPAs in market today. For the next four Fridays, I’ll be releasing videos (about 4 minutes long each), detailing why each type of DPA is interesting, current and anticipated usage trends, etc. Why Fridays? Because Fridays deserve something easy, and DPAs offer all kinds of easy.

    Learn More


  • April 24, 2015

    Making Sense of Raytheon and Websense

    I was just getting on my flight to the RSA Security Conference in San Francisco on Monday morning when I received an e-mail announcing an intriguing cybersecurity deal.Defense contractor Raytheon announced its acquisition of security veteran Websense for approximately $1.6 billion. Vista Equity Partners, Websense’s previous owner, also contributed $335 million and will retain some skin in the game.

    Learn More


  • April 22, 2015

    Somber Message at the 2015 RSA Conference

    As the 2015 RSA Conference got underway this week, I attended a dinner hosted by Pacific Crest Securities. Our host began the dinner by asking former cyber czar Richard Clarke to say a few words. Now this was a rather festive dinner as the cybersecurity industry is in the midst of a robust boom. Nevertheless, Clarke’s brief talk was a reminder of where we’ve been and the state of cybersecurity today.

    Learn More


  • April 22, 2015

    Nimble Storage - Early Adulthood at Age 7 (includes video)

    Age is a very interesting phenomena: there's the real numbers and then the relative aspect. "You're only as old as you feel" - as someone who's now having to check the last age-range box on demographic questions (certainly in ESG's own research!), I'm mightily relieved to hear that "60 is the new 45," or whatever! And we all seem sure that a human year equates to 7 "dog years."

    Learn More


  • April 22, 2015

    Leaders' Perspectives on Big Data: Economic Value

    Previously in this blog series we looked at business and technology goals for big data and analytics initiatives as described by the leaders of these projects at a wide variety of businesses today. The aim is to understand the state of the market and how people seek to drive value from the data naturally occurring in their businesses. While some organizations are truly on the cutting edge, others are taking a more conservative approach or are just now implementing new solutions. Today I’d like to look at some of the ways people actually measure the value of big data and analytics to their business.

    Learn More


  • April 22, 2015

    Focus on Networking Software Not Just the Silicon Underneath (Part 2)

    In my previous blog, I discussed the need to focus on the software in addition to the core hardware functions. I noted that spending too much attention on merchant silicon vs. custom ASICs for network processors neglects the importance of software to the networking infrastructure.

    Learn More



More Results:
NEWSLETTER

Enter your email address, and click subscribe