Welcome!


Ben Franklin often said that "by failing to prepare, you are preparing to fail." Not preparing for who your actual enterprise mobility management (EMM) customer is may have dire consequences as mobile devices (both personal and corporate-issued) access more corporate data. Before you c...
So what does real-time mean anyway? An example is, what are referred to as, “hard-real-time systems” [2], where computation must meet stringent timing constraints and one must guarantee that those computations must be completed before specified deadlines. Failure to do so can lead to i...
No matter how often you deploy your application or how sophisticated your delivery pipeline is, you always need to know the quality status of the software you are building. That can only be done if you measure it; but measure what exactly? In Part 1 we introduced the Concept of Quality...
Every company worries about competition. When I ran a large enterprise solutions organization, I took steps every day to ensure we were outpacing the competition. Frequently this involved making “build” vs “buy” decisions for the various product parts or services we needed to drive our...
One challenge more and more enterprises are grappling with as they plan to adopt the cloud is data residency & sovereignty. They are finding that if they want to use a cloud service hosted outside of their borders, life can become quite complex. Perhaps it is a result of the often disc...
The power of data-driven business networks is increasing, but how do enterprises best leverage that intelligence as they seek new services, products and efficiency? The next BriefingsDirect thought-leader panel discussion focuses on the future of business and how companies can benefit...
As Eric Reis, pioneer of the lean startup movement notes, a software startup’s ability to succeed depends solely on how quickly and inexpensively they can try new features. The challenge is if you are a typical startup, you are your ops team and development resources are the biggest de...
As recent events have confirmed once again, no single company, organization or government is up to the task of securing the Internet. The never-ending cat and mouse game of exploits chasing vulnerabilities continues. The stunning Heartbleed discovery has shaken the online security esta...
VisionMobile recently published one of the best reports on apps for vehicles that I have read. It is frustrating with how difficult it is to actually get an app approved for use in a car. Here are some of the unique challenges: Safety first considerations (like driver distraction) Lo...
Printing and the cloud are seemingly at opposite ends of an organization’s infrastructure spectrum. Printing remains one of the last bastions of an organization’s infrastructure that cannot be completely virtualized since the whole point of printing is to take something virtual and mak...
GIS technology is being used in the healthcare industry today for patient care and preventative medicine among other things. Hospitals and other organizations, with GIS and big data resources now have the ability to collect geographic information from their patients and study trends in...
Twitter is fun for me, if for no other reason than I “meet” many wildly interesting people through it. I've developed deep professional relationships through initial contacts on Twitter. But like many of you, I'm sure, I also have numerous Twitter friends whom I've never met, and so...
In the last year, conversations about In-Memory Computing (IMC) have become more and more prevalent in enterprise IT circles, especially with organizations feeling the pressure to process massive quantities of data at the speed that is now being demanded by the Internet. The hype aroun...
Enterprises are moving more and more applications to the cloud. Gartner predicts that the bulk of new IT spending by 2016 will be for cloud computing platforms and applications and that nearly half of large enterprises will have cloud deployments by the end of 2017.1 The far-reaching...
Some people really want Google to be a wireless carrier. The most recent speculative episode was early in April when The Information published an exclusive suggesting that Google might be thinking about an MVNO deal with Verizon or AT&T, based on comments by people who were unnamed (bu...
In my previous blog I contrasted the latest net neutrality developments in the EU with the situation in the U.S. Neither decision will settle the argument and the two camps will continue to debate the topic for the foreseeable future. On both sides of the argument and the ocean, believ...
Poorly performing websites, like Twitter’s recent fiasco with Ellen’s selfie, are a constant source of irritation for users. At first you think it’s your computer, or maybe someone on your block is downloading the entire “Game of Thrones” series. But, when nothing changes after refresh...
Are you developing or hosting PHP applications? Are you doing performance sanity checks along your delivery pipeline? No? Not Yet? Then start with a quick check. It only takes 15 minutes and it really pays off. As a developer you can improve your code, and as somebody responsible for y...
The cloud computing revolution is well underway and there are lots of benefits to be realized. According to Awesome Cloud research the industry will be worth more than $150 billion this year, compared to $46 billion just six years ago. Mirroring the general trend for SaaS solutions, cl...
Recently Google acquired the home automation company Nest. Nest is a company that sells IoT (Internet of Things) enabled devices that allow homeowners to control the temperature of their homes through their smartphones, plus it sends notifications if it detects dangerous levels of smok...
Cloud computing security can be a conundrum. The point of using the public cloud is to outsource certain infrastructure and application needs to third party providers, after all. How can you secure your data once it leaves your perimeter and your control? As puzzling as it may seem, th...
There has been a lot of media attention on Heartbleed and as always that means a lot of bizarre and often conflicting advice. I sat down (for a very long time) to find the truth of the matter and bring it together in one single article for those involved in enterprise mobility. "The ...
With HP's Adoption Readiness Tool (ART), EVRY, based in Oslo, has gained new advantages in the adoption and understanding of both new and existing technology. Nordic IT solutions provider EVRY has taken automation and agility to new heights in its training and documentation of IT prod...
While Big Data and the cloud are often thought of as going hand in hand, some enterprises still hesitate to place large amounts of proprietary data online. Enterprises decide to keep their large data sets stored locally for a variety of reasons including the possibility of security bre...
Have you seen this error message before “java.sql.Exception: ORA-00060: deadlock detected while waiting for resource”? This is caused when parallel updates require locks on either rows or tables in your database. I recently ran into this exception on an instance of an IBM eCommerce Se...
There are things we tend to take for granted in our everyday lives. We have certain expectations that don’t even have to be spoken, they’re just a given. If you walk into a room and turn on the light switch, the lights will go on, it’s assumed. If you turn the water faucet on, water wi...
The selfie that changed the world, or at least Twitter, has been in the news for the past month. On March 2, 2014, the infamous Oscar selfie of Ellen and her celebrity friends broke a record of 2 million retweets before midnight the same night. That record was previously set by Preside...
The world of enterprise applications, such as enterprise resource planning (ERP), customer relationship management (CRM) and billing, can seem boring to people who are more interested in what is going on at Amazon, Facebook, Google and Twitter, or the latest iPhone or Android applicati...
Over the last six months I met with a wide range of customers and prospects in order to understand how they understand enterprise mobility, and especially to learn whether they see it as a business opportunity or just another piece of technology. It's no secret that the past few years ...
We all want usability, that’s a given right? We exist in an enterprise world, but we want to behave as naturally as possible with all of the technologies and devices that we come into contact with every day. The co-called ‘consumerization of information technology’ suggests that we as...
Zetta.net is an enterprise-grade backup and disaster recovery provider. We have been in business for over five years, and we have over 800 enterprise customers and managed service providers (MSPs) that use or resell our product, as is the case with MSPs. In terms of the IT challenges,...
Companies in many different industries are realizing that applications of GIS (geospatial information systems) can provide competitive and strategic advantages, productivity increases and efficiencies in operations. GIS, when combined with mobile devices like smartphones, tablets, lapt...
We have all been there. Sitting in a stuffy conference room white-boarding and sharing innovative ideas only to be shut-down by the words, "Our IT environment won't support that." I remember during my time as an IT manager hearing those words over and over. We were encouraged to be i...
An interesting article came out recently, “Why Continuous Deployment may mean Continuous Disappointment for your Customers.” It correctly identifies the human need for a shiny, new thing every so often. And it argues that the practice of continuous deployment could lead to disenchantme...
IBM has recently invested $1.1 billion USD into Location Based Services (LBS) and Application Programming Interface (APIs). The investment was in the development of BlueMix, a cloud-based service, that when combined with Pitney Bowes' API programs, allow businesses to collect data on ...
New research commissioned by CA Technologies and conducted by Vanson Bourne shows the role of IT is changing -- and not to benefit IT leaders in many cases. The survey of 1,300 senior IT leaders worldwide revealed 39% of respondents now see IT as a service broker or consultant to the l...
Leading Web search portals are using semantic search engines to deliver answers instead of results. That same technology is now emerging in the enterprise. It can help developers tame log data by uncovering information about application performance problems and answering the question ‘...
A recent post by John Wilmes on the TM Forum website caught my eye for drawing a parallel between the Uber car service business model and the telecom service provider business model as network functions virtualization (NFV) becomes a reality. Wilmes uses this metaphor to remind us of t...
As organizations continue expanding their adoption of the public cloud, many IT and security professionals are beginning to see that they need improved cloud-monitoring and cloud-auditing capabilities. By cloud monitoring, I’m referring to the process of identifying cloud use within an...
American comedian Louis C.K. once observed on Late Night with Conan O’Brien that ”everything is amazing and nobody is happy.” And you know what? He’s right. He riffs about people complaining about the uncomfortable seats on a plane – despite the fact that they are partaking in the mi...