Welcome!


In a hybrid world where will have some private-cloud solutions and multiple public clouds, the challenge is to have the right level of governance, and to be in a position to move the workloads, and adjust the workloads with the needs. The old model of just being an outsourcer or on-pr...
Digital transformation is often unnerving. Our morning newspaper shifts to the iPad. Our coffee is paid for on a mobile app. Our taxis are hailed via mobile apps. Our cars talk to us. Our jobs and careers change as a result of SMAC (social, mobile, analytics and cloud) solutions. How s...
Modern Application Performance Management (APM) solutions can be tremendously helpful in delivering end-to-end visibility into the application delivery chain: across all tiers and network sections, all the way to the end user. In previous blog posts we showed how to narrow down to vari...
This month, we released our latest MetraNet® 8.0 software. What makes this release particularly exciting is that it bridges the gap between the complex business models and customer and partner empowerment that is unique to MetraTech with the user experience typically found in consumer ...
In this part of the Modernizing Your Infrastructure with Hybrid Cloud, we are focusing on of the great solutions we introduced with Windows Server 2012 and improved in Window Server 2012 R2, Storage Spaces. In Windows Server 2012 Storage became a first class citizen, from storage de...
Everything from jet engines to refrigerators is joining the Internet of Things, pushing networks to the brink. In a new Boeing 747, almost every part of the plane is connected to the Internet, recording and, in some cases, sending continuous streams of data about its status. General El...
The cloud plays an integral role in enabling the agility required to take advantage of new business models and to do so in a very convenient and cost-effective way. However, this also means that more personal information and business data will exist in the cloud and be passed back and ...
With an ear to the ground and an eye on the sky, Gigaom's Barb Darrow chronicles the competitive factors shaping the bumpy journey that is cloud computing among the superpowers (AWS in fight of its life as customers like Dropbox ponder hybrid clouds and Google pricing). Wherever you st...
I love sensors. In my opinion we write too little about the role sensors play in the whole Internet of Things discussion. Sensors are what measure things in the physical world and converts the information to digital. This process is a key component of digital transformation which en...
In the last decade, the “Internet of Things” has expanded from a small set of assets with first-generation radio frequency identification (RFID) tags to a proliferation of devices using a variety of wireless machine-to-machine (M2M) technologies. By some estimates, there are as many as...
“The cloud will transform everything about technology.” This statement is better suited for 20 years ago when the cloud was in its infancy. In 2014 the statement should be that “The cloud has taken over technology.” Cloud computing has been around since the sixties believe it or not, b...
Is it just me, or has there been an explosion of buzz words lately? Don’t get me wrong, the IT industry innovates at a crazy pace normally, but it seems that things have been evolving faster than ever and that a fundamental change in the way things are done is underway. We can attribut...
Transaction management is not just for technical geeks; it is very much a subject that ‘business suits’ should be focused on. But should it be seen as a business issue for technologists or a technology issue for business people? Or doesn’t it matter and should transaction management...
If you work in technology, you’d have to have been under a rock to have not heard about Docker. In a nutshell, Docker provides a lightweight container for code that can be installed onto a Linux system, providing both an execution environment for applications and partitioning to secure...
Martin Heisig, Senior Vice President of Cloud and Infrastructure Delivery at SAP SE, is responsible for SAP’s global IT infrastructure including the operation of SAP’s external cloud offerings. The mega trends real-time platforms – Big Data, cloud, enterprise mobility as well as socia...
Virtualization has almost become a no-brainer for most major companies out there. The added benefits of greater efficiency and lower energy costs are certainly excellent reasons for adopting a virtualization strategy and the vast majority of big businesses are taking advantage of it. T...
Ever since Eric Schmidt, the Chief Executive of Google Inc. mentioned the magical term - “Cloud Computing” - in the year 2006, a gale has been crowding over the Silicon Valley. Companies across the IT industry are competing against each other to associate themselves with the cloud comp...
We all feel it, data use and growth is explosive. Individuals and businesses are consuming -- and generating - more data every day. The challenges are common for nearly all businesses operating in every industry: ingest all the data, analyze it as fast as possible, make good sense o...
A completely new computing platform is on the horizon. They’re called Microservers by some, ARM Servers by others, and sometimes even ARM-based Servers. No matter what you call them, Microservers will have a huge impact on the data center and on server computing in general. Although f...
In a Feb 2014 survey, 94 percent of organizations surveyed reported running applications or experimenting with infrastructure-as-a-service[1]. According to research firm Nasumi, there is over one exabyte currently stored in the cloud. An exabyte is over a billion GB[2]. Considering the...
In Part 6, we dove into the Nagle algorithm – perhaps (or hopefully) something you’ll never see. In Part VII, we get back to “pure” network and TCP roots as we examine how the TCP receive window interacts with WAN links. Each node participating in a TCP connection advertises its avail...
Security professionals are constantly negotiating the tension of balancing ease-of-use with data security. Savvy security professionals know that their users will often choose a less secure technology that makes getting things done easier over a more secure technology that makes gettin...
When combining all data sources into one central location, decisions become more uniform. While there are many ways to integrate multiple sources into a data warehouse, attention to detail is key to avoid creating more problems than are being solved. Choosing when to adopt a data war...
In order to foster high levels of innovation that lead to adaptation to both internal and external disruption, you must foster an organization with low connectivity and furthermore, give them flexible, loosely coupled technology tools. In such environments, teams have the leeway to sel...
The telecommunication service-provider industry is gaining new business analytic value and strategic return through the better use and refinement of their big data assets. It’s no secret that communication service providers (CSPs) are under a lot of pressure as they make massive inves...
In the US Army they have a term called "Revolution in Military Affairs (RMA)." It is often associated with the use of modern data collecting technologies, communications technologies, information analysis and the use of these technologies to improve strategies, doctrines and organizati...
My friend and colleague, the Chief Technologist of Studio 13 at Cognizant, Peter Rogers, shares his insights on digital transformation and mobile strategies in this guest post. He digs deep into the technologies involved in a digital transformation and the role of mobility? This arti...
The ability to choose low-cost hardware, to manage across different types of storage, and radically simplify data storage via intelligent automation means a virtual rewriting of the economics of data. But just as IT leaders seek to simultaneously tackle storage pain points of scalabil...
If you Google “detachable computing” today you will mostly get a selection of links relating to removable storage media. It’s a trend that’s slowly changing, but detachable computing is also coming closer to meaning the use of laptop devices that function and fully working laptops wit...
Consider that the Age of the Cloud has precipitated a new agent concept which is lightweight, deploys quickly, and goes in virtually undetected with zero configuration. These agents are built with a survival mode in mind including a self-healing option for hands-free maintenance. At t...
Rarely have we experienced such rapid innovation in the IT industry. CIOs have become essential leaders of the business, both in terms of promoting growth by optimizing technology and mitigating risk for their organizations. At the same time, IT departments are being stretched as busin...
The traditional approach to application delivery – do one big revision or introduce a major new feature over a short period – is rapidly being replaced by a new, faster and smarter approach, Continuous Delivery (CD). The core idea of CD is to create a repeatable, reliable and increment...
The widespread adoption of tablets and mobile devices in schools allows for tracking of key performance indicators that can help gauge the impact of specific initiatives on a student's future success. While skeptics argue against ethical concerns raised by such techniques, several coll...
NNIT uses HP Cloud Service Automation to improve their deployment of IT applications and data, and to provide higher overall service delivery speed and efficiency. As a provider of both application development management and infrastructure outsourcing, Denmark-based NNIT needed a bett...
It's become clear that the impacts and implications of cloud commerce are much broader and much more of a benefit to the business as a whole as an innovation engine, even across whole industries. Over the past five years, the impetus for cloud adoption has been primarily about advanci...
According to Gartner, Big Data refers to "high volume, high velocity, and/or high variety information assets” – and, this is the key – “that require new forms of processing to enable enhanced decision making, insight discovery and process optimization." While Big Data may seem like an ...
The public cloud computing model is rapidly becoming the world’s most prolific IT deployment architecture, yet it leaves many promises unfulfilled. While offering scale, flexibility, and potential cost savings, the public cloud often lacks the isolation, computing power, and control ad...
It feels as if we can’t even go a week anymore without hearing about a new breach or outage. For years, IT departments were always on stand-by should the unimaginable happen and were judged by how quickly they could curb a bad situation. These days, however, it’s not good enough to fix...
It seems that about every 10 years the Internet takes on a new popular name. In the late 90′s the term World Wide Web (www) set the standard but as a new generation of SaaS and more connected applications came online the Internet needed a rebranding and the Web 2.0 revolution came into...
Encryption is a key element of a complete security strategy. The 2013 Global Encryption Trends Study shows a steady increase in the use of encryption solutions over the past nine years. Thirty-five percent of organizations now have an encryption strategy applied consistently across the...