Featured Content from Mark Bowker

135903506.jpg

[ESG Blog] Google I/O Fascinates Developers, but How About CIOs?

By: Mark Bowker

Attending Google I/O you can instantly feel the inspiration and visually see the excitement from the developers. I quickly learned that long gone are my days programming COBOL!?!?! Creativity runs wild at the event and while it is easy to get excited about the innovation that Google splashes around, I try to snap a business lens on everything I see so I can start matching Google with the top IT and business priorities ESG captures in our research. This involves some creative thinking, but here it goes.

135903506.jpg

[ESG Blog] Google I/O Fascinates Developers, but How About CIOs?

By: Mark Bowker

Attending Google I/O you can instantly feel the inspiration and visually see the excitement from the developers. I quickly learned that long gone are my days programming COBOL!?!?! Creativity runs wild at the event and while it is easy to get excited about the innovation that Google splashes around, I try to snap a business lens on everything I see so I can start matching Google with the top IT and business priorities ESG captures in our research. This involves some creative thinking, but here it goes.

img2.png

[ESG Blog] The VMware EUC Team’s Execution Machine Continues to Roll

By: Mark Bowker

It is a busy time of year for IT vendor announcements, and the VMware EUC team is actively demonstrating its path to growth with multiple announcements. Before dipping into the specifics, it is important to put a few items in perspective...

img2.png

[ESG Blog] The VMware EUC Team’s Execution Machine Continues to Roll

By: Mark Bowker

It is a busy time of year for IT vendor announcements, and the VMware EUC team is actively demonstrating its path to growth with multiple announcements. Before dipping into the specifics, it is important to put a few items in perspective...

img3.png

[ESG Blog] Will WannaCry Help Drive Google Chromebooks?

By: Mark Bowker

Microsoft Windows is prime target for cybercriminals, and the daunting cadence of patching places businesses at great risk. Factor in the unsettling thought that critical business systems still run on Windows operating systems that have reached EOL years ago.

img3.png

[ESG Blog] Will WannaCry Help Drive Google Chromebooks?

By: Mark Bowker

Microsoft Windows is prime target for cybercriminals, and the daunting cadence of patching places businesses at great risk. Factor in the unsettling thought that critical business systems still run on Windows operating systems that have reached EOL years ago.

img4.png

[ESG Blog] Is Intel Inside Your Digital Transformation?

By: Mark Bowker

Today’s market opportunity for IT vendors is razor-focused on cloud consumption and economics. As a result, it can be easy to lose track of what’s actually powering on-premises data centers, various cloud platforms, and massive numbers of ever-proliferating endpoints.

img4.png

[ESG Blog] Is Intel Inside Your Digital Transformation?

By: Mark Bowker

Today’s market opportunity for IT vendors is razor-focused on cloud consumption and economics. As a result, it can be easy to lose track of what’s actually powering on-premises data centers, various cloud platforms, and massive numbers of ever-proliferating endpoints.

ESG Blog

[ESG Brief] The Challenge of Delivering Secure Workspaces

By: Mark Bowker

The central role of the endpoint in cybersecurity attack chains and the spate of ransomware attacks has created a strategic imperative to secure these devices and the users who operate them. Knowledge worker mobility and bring-your-own-device (BYOD) policies have further complicated endpoint security with virtual workspaces being employed as a location- and device-agnostic secure desktop environment. But in the push and pull of knowledge worker experience and securing their access to and use of corporate assets, which wins out?

ESG Blog

[ESG Brief] The Challenge of Delivering Secure Workspaces

By: Mark Bowker

The central role of the endpoint in cybersecurity attack chains and the spate of ransomware attacks has created a strategic imperative to secure these devices and the users who operate them. Knowledge worker mobility and bring-your-own-device (BYOD) policies have further complicated endpoint security with virtual workspaces being employed as a location- and device-agnostic secure desktop environment. But in the push and pull of knowledge worker experience and securing their access to and use of corporate assets, which wins out?

2017 Predictions for Enterprise Mobility

 
redmond-channel-partner.png

Mark Bowker, a senior analyst at Enterprise Strategy Group, said he's seeing growing interest among large IT organizations that are enamored with the agility of sites such as Amazon.com and Facebook, and among those that offer modern apps. However, he warned that the technology is still in its very early days.

Read the entire article at Redmond Channel Partner Magazine

Some of our clients: