Visit one of the Subject Area Blogs or ESG Analyst Blogs by clicking any link below:
|Application Development & Deployment Truths||The Bigger Truth||Insecure About Security|
|Cloud Computing Truths||Big Data, the Universe, and Everything||IT Artillery|
|Data Management & Analytics Truths||The Business of Storage||IT Depends|
|Data Protection Truths||Channeling IT||Liquefying IT|
|Information Security Truths||Decoding Development and Developers||Technical Optimist|
|Networking Truths||ESG Lab Blog|
Individual Author Blogs can be found via EXPLORE, selecting the Author, and clicking on "Read blog."
Everyone loves the concept of Schrodinger's cat, with the possible exception of a few serious PETA members. The metaphor that an entrapped feline can be both poisoned and/or not poisoned until directly observed is a catchy way to understand uncertainty around various possible states and outcomes.
The relational database management system was a breakthrough when it first appeared about 40 years ago. A relational database puts power into a user’s hands. Few assumptions are needed about how data is related or how it is to be extracted. Data can then be viewed in a variety of ways, each one illustrating different connections or correlations. This power, history, and a little user inertia have led to the RDBMS being implanted and used in practically every sector of business today.
Big data has a real complexity/credibility problem. There are too many variables to the system that make even basic product evaluation tricky for even the sharpest technical decision maker in the IT shack.
Little known fact: Yesterday was the 30th anniversary of Bob Ballard’s discovery of the RMS Titanic, several hundred miles off the coast of Newfoundland Canada. I’ve recently done some research into the ship, its builders, and its ultimate fate and believe that lessons learned from Titanic may be useful for the cybersecurity community at large.
Every year at Blackhat there is a section of the show floor charmingly referred to as "Innovation City," which functions as an area for up-and-coming vendors to show their stuff. One of the citizens of Innovation City this year was x.o.ware, which bills itself as an "end-to-end encryption solution" that makes public Wi-Fi completely secure.
Day Two of VMworld is in the books, and here's what our team of analysts have to say...
A significant part of any enterprise mobility strategy begins with mobile apps that are designed, developed, and deployed in the cloud. Developers are consuming these services from the cloud and not letting IT stand in their way. However, every time a mobile application lands on the public cloud, it adds a potential risk to VMware's long term business model, since it is an application that is more likely to not be running on VMware infrastructure and has likely landed on Amazon AWS, Miicrosoft Azure, or some other developer-friendly and mobile-app-friendly cloud platform.
It’s the end of the summer of 2015—the nights are getting cooler, the leaves are starting to change colors, and flocks of students are abandoning the beaches of Cape Cod bound for college campuses. The seasonal change also signals another annual ritual: VMworld in San Francisco.