In my ADD fugue state yesterday it turns out I missed the primary point of my primary reason for writing that blog. Service Expectations.
by Steve Duplessie, on Feb 28, 2013
In my ADD fugue state yesterday it turns out I missed the primary point of my primary reason for writing that blog. Service Expectations.
by Steve Duplessie, on Feb 27, 2013
Yes, I know it's more unrelated elements than usual, but it's been a while.
by ESG, on Feb 25, 2013
Gamification, which is the use of game mechanics developed for video games in non-game software, used to bother me. Stripped of the marketing title, gamification is about behavior modification. The techniques such as badging, rankings, and levels are all a form of reward designed to affect our behaviors in some fashion or another. This is classic operant conditioning, pioneered by B.F. Skinner. Voluntary behavior can be modified through a system of perceived rewards and punishments so that the behavior is shaped in a certain manner. Gamification tries to do just this. It helps to shape behaviors in a direction that benefits the company deploying the software. A common place one finds gamification in business applications is in onboarding knowledge workers to new applications, shaping their ability to make use of the software through a series of rewards. Another area where gamification has taken hold has been in CRM and Sales Enablement systems to help drive behaviors that result in more sales revenues. Gamification shows up a lot in customer-facing applications especially social applications where peer interactions can be leveraged by the game mechanics. Typically, companies use game mechanics to engage customers and encourage them to buy products.
by Jon Oltsik, on Feb 22, 2013
It wasn’t long ago that the annual RSA Security Conference was an oasis from mainstream IT. While CIOs were focused on business process automation, the RSA crowd was celebrating technologies like DLP, web security, and key management. Yup, security was an under-funded IT stepchild and the RSA Conference was still centered on bits and bytes.
That was then, this is now and cybersecurity is everywhere – newspapers, magazines, television news, etc. Off the top of my head, here are some of the big cybersecurity news stories from the first two months of 2013:
by ESG, on Feb 21, 2013
Sometimes I find it fascinating to step back and sit and listen. It is especially fun to sit back and listen (and people watch) at malls or airports. Over the past few years the tools we have at our fingertips for doing this digitally keep getting better and better allowing us to engorge ourselves with information. Taking the time to step back digitally and try to make sense of things, or look for patterns, and sometimes connect a few of the dots can provide some pleasure as well. The difference in the digital world is that the connections are easier to take out of context – which can be a bad thing.
I’d like to take a step back anyway and look at a series of recent events in the news to see if there is enough here to connect the dots:
by Mark Peters, on Feb 21, 2013
It's a de-rigeur and throwaway statement to say that 'data is growing and that storage management is tough.' But all-too-often we move immediately to specific problem areas and specific potential solutions. This video piece - first released in slightly different form late last year but just as relevant today and updated for this blog - takes an objective look at what the type and scales of the challenges really are, and whether there's actually any reason for optimism that we might 'tame the data monster.' It's a massive topic to cram into a video of just 11 minutes, but should prove valuable to some, useful to many, and cathartic to just about anyone in the storage business!
by ESG, on Feb 21, 2013
Part of my job is to sit in my office and do research, which I enjoy quite a bit. Put in the earbuds, crank up Led Zep, analyze, and write all day. But probably one of the coolest parts of the job is getting to go and talk to customers. Sometimes this is a one-to-many endeavor like I’ll be doing next week in Vegas at VMWare’s Partner Exchange 2013. Other times it is getting to go talk to a customer face-to-face and sometimes it’s at a place that is just plain cool. This happened to me just this week as we got to go to One Summer St. in Boston MA to visit The Markley Group. I got to see a tour of their NOC, an OC-768 cable (with every other possible OC size), and several multi-megawatt generators up on the roof.
Markley has been providing close to 1M square feet of carrier grade data center space for over a decade. What is carrier grade? I’ve seen it defined as Five-nines availability with very short (sub 50 millisecond) failover. In layman’s terms, this means always available and failures are seamless and unnoticeable.
by Jon Oltsik, on Feb 21, 2013
With the Oscar award ceremony completed, the information security industry rolls out its own red carpet for its annual celebrity event, the RSA Security Conference, next week. I’ve written before about the pervasive “buzz” topics I expect to hear about next week. Here are 5 subjects I’d like to discuss:
Trade shows are trade shows so you have to expect high-level conversations, marketing hype, and generous distribution of alcohol. I admit I enjoy the lighter side or RSA, but I hope that the fun and frolic is balanced by serious discussions on an increasingly ominous subject.
by ESG, on Feb 20, 2013
Close on the heels of its winter cloud release, Informatica announced near immediate availability of Informatica Cloud Spring 2013 released (“Spring release”) on February 20th. Customers will be upgraded this Saturday, February 23rd. As I observed in a previous informatica-thaws-its-integration-cold-snap/index.html" target="_blank">blog on Informatica Cloud posted not even four weeks ago, Informatica continues to expand its portfolio of connectors and enhance the features of its templates, and this holds true for the Spring release as well.
Of particular interest in the Spring release are connectors covering Microsoft Dynamics, Amazon Redshift, Oracle CRM On-Demand, and Intuit QuickBooks. There is no obvious correlation between these new app connectors, but that is exactly the point—the breadth of Informatica Cloud’s integration portfolio is unmatched in the industry. It also exemplifies how quickly Informatica is moving to keep Informatica Cloud up-to-date; Amazon Redshift data warehouse service went generally available today and Informatica already offers a pre-release connector.
by Jon Oltsik, on Feb 20, 2013
I used to work with a guy who was significantly overweight. I ran into him in the cafeteria one day and he mentioned that his doctor recommended that he eschew large lunches in favor of lighter foods like salads. He proceeded to the salad bar where he buried a few greens, onions, and tomatoes under a mountain of cheese, deli meats, and blue cheese dressing.
by ESG, on Feb 20, 2013
Bring Your Own Device (BYOD) initiatives are having a significant impact on organizations' campus and branch network environments. In fact, one could argue that BYOD is rapidly becoming BYO3 as employees bring smartphones and tablets to work along with a laptop and all these devices are most likely leveraging corporate or guest WiFi services. It is not uncommon for an enterprise to see wireless connections spike by thousands of devices after a major holiday or new product release. However, this can create significant issues for IT when trying to deal with a surge in connections and contain any security threats. Legacy networks that require separate management of wired and wireless environments only compound the problem.
by Jon Oltsik, on Feb 14, 2013
As Bruce Springsteen once sang, “you can’t start a fire without a spark.” With this in mind, President Obama issued an executive order on cybersecurity this week. Will this truly be a spark?
To answer that question, it is worthwhile to start by describing what the executive order does. There are really three main points as the order:
by Mark Peters, on Feb 14, 2013
While there have been many dramatic improvements in storage management tools - lots of which are automated - one of the surprises in our general storage research from late last year is that it is the larger capacity IT 'shops' that are most likely to be adding storage management staff. Is there a 'tyranny of large numbers' at work here? Has scale actually got us beaten? Or is better use of tools that are already available the answer? Watch this short (four and a half minutes) video to hear my thoughts.
by ESG, on Feb 13, 2013
2013 is certainly starting off well for companies in the software-defined networking (SDN) space--just this week we have witnessed both an acquisition and an investment as more vendors seek to take part in this emerging market.
by ESG, on Feb 13, 2013
In my role covering big data at ESG, nothing would please me more than to say I am covering the hottest area of IT. And perhaps from a hype perspective, big data is hot, but from an IT spending perspective, while decidedly warm, big data is not nearly number one. In ESG’s just published 2013 IT Spending Intentions Survey, which suggests around a 2% overall increase in IT spending (the mean came in at 1.99% for those of you who are statistically significant), the closest proxy to “big data,” specifically “improved data analytics…,” tied for 5th place, among a longish list of “Business Initiatives with the Greatest Impact on IT Spending Decisions.” Note that if one only focuses on IT priorities not tied to business initiatives per se, BI/ analytics ties for 9th place.
T5, with 24% of the 540 respondents citing “improved data analytics…” as one of their top ten business priorities impacting IT, isn’t bad. It actually maps well to our mid-2012 survey that showed about 40% of respondents – those with a more distinct focus on data management and analytics BTW – citing it as a top 5 priority. Suffice it to say that a healthy minority have been bitten by the big data bug, but not deeply enough to push large amounts of difficult to reallocate IT budgets into the analytics bug juice cup.
How boring, but cost reduction initiatives, business process improvements, security and compliance stand ahead of data analytics, which tied with mobile computing. What happened to big data, isn’t it the IT initiative that will forever alter the competitive landscape of business and government? Here are the three primary reasons why budgetary reality flies in the face of big data hype:
I am not saying that the big hype of big data of 2012 will entirely be squashed during 2013. In fact, improved data analytics made the biggest jump between 2012 and 2013 in terms of business initiatives impacting IT spending. In addition, business intelligence/data analytics is most commonly cited as the workload most responsible for storage capacity growth, and ESG definitely sees lines of business and marketing taking on more share – albeit incrementally only - of the budgetary load for IT initiatives. Given all of that, 2013 will be an excellent year for big data. But crazy claims like big data will augment the IT workforce by 25% over the next two years, or that big data will grow from a $5b to $50b in 5 years, and other wacky market sizing and forecast exercises need zapping. Thankfully, ESG’s IT spending survey for 2013 helps take the inaccurate creep out of big data forecasts, but also clarifies that big data will do more than merely crawl along.
by Jon Oltsik, on Feb 11, 2013
When it comes to cybersecurity and public policy, I’m as big a cynic as anyone. Why? From a historical perspective, cybersecurity issues were first recognized during the Bush administration (41, not 43). Over the subsequent 20+ years we’ve experienced misinformed rhetoric, overlapping agendas, and inaction, but little meaningful progress.
Now I realize the President has some higher priority issues to deal with and that cybersecurity is neither sexy nor universally understood. That said, however, there is no denying that things are getting progressively worse. Just this week, congressman Mike Rogers (R, Michigan), stated that he believed that 95% of private sector networks are vulnerable and most have already been attacked.
by Mark Peters, on Feb 8, 2013
Well of course I picked my words in the title to get some attention. When I say ‘snapshots’ I’m not talking in terms of instant-storage-system-replication, but I’m talking more about a snapshot of the flash storage market. It has to be one of the most dynamic market segments I can recall seeing…. every day you turn around, something else has happened. So any snapshots are instantly out of date. This blog is a bit more like looking at the family album for 2013 so far (of course I’m sure I’ll have missed plenty but I’m not trying to be a news service, more aiming to convey the types and breadth of changes that are occurring.
There you go! And we’re not even at Valentine’s Day yet – maybe there’ll be move love in the flash air as a result of that. One thing is for sure….between the time that I wrote this and the time that you’re reading it, something changed in the solid-state market!
by ESG, on Feb 7, 2013
If you are a CIO/IT manager at an enterprise there seems to be a lot of promise but also hype when it comes to the cloud. And god forbid you get a real and consistent definition of what cloud is. That said, there are so many people talking about it and so many great ideas and offerings, there just has to be some reality in it all. Right?
by ESG, on Feb 6, 2013
Last week Cisco rolled out its unified wire and wireless solutions to better address challenges created from BYOD initiatives during Cisco Live in London. This week it is announcing a slew of new additions to its Unified Data Center Strategy that include additions to the Nexus switch family, an expansion of Cisco ONE strategy, and a new cloud connect solution. Makes one wonder about what they will announce next week....
by Jon Oltsik, on Feb 5, 2013
Just 3 weeks until the annual RSA Security Conference geek-fest in San Francisco. Should be a good one since the economy is doing okay, VCs are throwing money around and organizations are increasing security budgets. Oh, and let’s not forget that the NY Times and Wall Street Journal just reported major security breaches.
I’ve attended the RSA show for the last dozen years or so. Over that time period, the show has morphed from a down-in-the-packets security technology expo to a run-of-the-mill industry trade show chock full of hype and cluelessness. Heck, vendors and PR pros provide their marketing collateral by distributing USB thumb drives throughout the Moscone Center! That’s like handing out packs of Marlboros at an Oncology convention.
by Steve Duplessie, on Feb 5, 2013
After 30 years or so Michael Dell is taking his baby private again. Good for him.
by ESG, on Feb 5, 2013
When I hear the expression used, “We are trying to change the tires while the car is still moving,” I cringe. Even the most efficient tire changers in the world, the NASCAR pit crews, still require the vehicle to come to a full stop. Wall Street doesn’t allow full stops. Dell, while having done quite well turning its business model towards wider IT systems and services, based mainly on a slew of enterprise IT oriented acquisitions, initially punctuated by the purchase of Perot Systems over three years ago and underscored by the addition of ex-IBM and ex-CA Technologies turnaround specialist John Swainson in 2012 to run software, isn’t quite a NASCAR pit crew.
Today’s announcement of the pending leveraged buyout clearly is intended to give Mr. Dell the room and time he needs to take his foot off the quarterly brakes without the spreadsheet-toting stare of Wall Street handing out traffic violations. The drama of the largest privatization in the history of information technology may not quite have ended, however, because the deal still needs to go through a long list of approvals, with Dell allowing for a healthy six month window before close.
by ESG, on Feb 4, 2013
Hello there! If you haven’t heard, I’m the newest analyst at ESG focusing specifically on cloud, IT-as-a-Service (ITaaS), and the software-defined data center (SDDC). My bio’s listed on the site or you can find me on Linkedin as well so I won’t bore you with those same details.
Instead I’d like to share some other thoughts about where I’d like to take the blog and why I named it the way I did. So first, the name – I think the theme that is starting to really permeate the cloud world finally is enterprise. By enterprise I mean companies with 100-1000 employees or so and their adoption (rate, barriers, challenges, etc.) of cloud computing. In terms of where I’d like to take the blog – well, that one is easy. Wherever I want! Seriously, I just want to explore many of the topics that are being talked about by the customers.
by Jon Oltsik, on Feb 1, 2013
As a former New Yorker and regular reader of the New York Times, I was appalled when I read about the recent security breach yesterday. Appalled but not surprised. Regardless of the security talents and controls implemented at the NY Times, the bad guys were easily able to find a back door or open window and get inside.
Data is just data unless you understand its relevance. Truly understand technology trends and market dynamics, and swiftly take advantage of arising business opportunities with ESG’s actionable data and analysis.
John McKnight, Vice President, Research and Analyst Services
Learn More about custom market research.
ESG, a division of TechTarget, is an IT analyst, research, validation, and strategy firm
that provides market intelligence and actionable insight to the global IT community.