Flagship Blog

The Cadillac of Infrastructure Analytics, Infralytics™

Have you driven a new Cadillac lately? If not, picture this… As you are driving down the road, clearly displayed on your windshield is not only the speed you are going, but the posted speed limit for the part of the road that you are currently driving on. I don’t know...

Solution Strategies for IBM i

Long-time IBM i customers, new IBM i customers and those who have just begun to consider it, may be interested to know exactly how IBM i supports various other business strategies. Here is a list of relevant solution areas and descriptions of how IBM i integrates with...

4-Step Plan to Cloud-based Resiliency

As IT becomes ever more important and the cost of downtime increases, it is no wonder that improving resiliency has become a high priority. Organizations are willing to spend money to help make systems, data and applications virtually always available; to protect them...

The Big Bang Theory of Mobile Devices in the Enterprise

In the beginning there was darkness, especially for those who needed to get work done on the road or at home. Workers left their data and productivity programs on their cumbersome desktops. Laptops made it possible to work outside the office, but connectivity was...

Strategies for Securing Your Business – Part III

Blog Series: IT Perspectives by Jaqui Lynch Exploring QRadar In my previous blogs, Strategies for Securing Your Business – Part I & II, I talked about some of the new roles in security along with some of the things to think about with respect to security including...

The Latest Challenges Influencing Mobile App Design

In today’s mobile world, users have very little tolerance for apps that have problems or don’t attract their attention. 80 to 90 percent of all downloaded apps are used once and eventually deleted. Making a good first impression can be the difference between success...

Never Fear, Managed Private Cloud is Here!

Thanks to the advances of cloud computing, enterprises of all sizes can more easily optimize their IT investment and achieve economies of scale, cost savings and business innovation. According to a recent survey, (Under Cloud Cover: How leaders are accelerating...

3 Options for Business Resilience

Downtime can be divided into two categories: planned and unplanned. Planned downtime is usually associated with systems maintenance, which was a common requirement for previous generations of servers. However, the nature of today’s global business environment —...

Linux or Windows for SAP?

When you are faced with trying to decide between the competitive platform operating systems Linux and Windows for your SAP ERP deployment, it can be difficult to compare the two. In an attempt to find clear and concise comparisons, it is common to find artificial...

The Role of Visibility and Control in the Hybrid Cloud

Contributor: Judith S. Hurwitz, Hurwitz & Associates LLC, via Thoughts on Cloud I had an interesting discussion with the chief tech officer of a rather large insurance company the other day. His company is making huge progress in moving from a rigid IT environment...

The Challenges of Big Data and How to Work Around Them

Data has never been bigger. One of the main reasons organizations are not utilizing this information is because with it, comes a whole new set of challenges. A recent survey found that 55% of big data projects are never completed – ouch. In fact, from what we’ve...

5 Ways to Enhance Your Customers’ Online Experiences

I don’t know about you, but when I’m doing research, or shopping online, I have pretty high expectations for how websites are supposed to perform. I expect them to be quick, responsive, intuitive, safe, and somewhat personalized. If not, I will close it and look for...

Strategies for Securing Your Business – Part II

Blog Series: IT Perspectives by Jaqui Lynch In our initial security blog we talked about what is meant by security and what kinds of assets need to be protected. One of the items mentioned was the detection and prevention of threats. In this blog we will discuss an...

The Importance of Fast, High-quality Web Experiences

As online channels—and specifically the mobile platform—grow, customer expectations for a superior online experience grow right along with them. If an organization does not provide customers and potential customers with the optimal experience they prefer, users can...

Strategies for Securing Your Business – Part I

Blog Series: IT Perspectives by Jaqui Lynch This is the first entry in a series of blogs covering the role of security in businesses today. When people talk about the fastest areas of growth in IT today we automatically think about cloud, mobile, social media and web...

5 Tips for Increasing Infrastructure Efficiency

Today’s IT departments face significant challenges from two opposing forces: the unprecedented growth in the information and applications required to run business infrastructures the shrinking of funds available for IT optimization projects This conflict has a direct...

Bluemix Shortens Time to Business Value

Cloud, analytics, mobile, social and cognitive—all new technologies—require rapid innovation and shortened development time. Working at “cloud speed” is becoming all-important as the cloud becomes the preferred place for developers to build applications. With that...

Mobile Device Management – Denial is not a Strategy

Still think smartphones are a fad? Are you convinced that tablets have just about run their course? Are you of the opinion that people shouldn’t be doing work wherever they go, anyway? Do you see yourself as a lone crusader for LYOD (leave your own device)? “Denial...

What Does Quality Technical Support Look Like?

Ever have “one of those days” – the kind that is plagued with problem after problem? What about the days that you would gladly trade for “one of those days” – the kind where the technical issues are so great that they could cause severe business impact, affecting...

Launch New Apps with Speed and Confidence via Hybrid Cloud

The pressure from your competitors is mounting. You may not know it, or see it, but it’s true – especially in a digital sense. More than ever, organizations are focused on developing applications that deliver next-level customer experience and/or improve...

3 Key Considerations for APM SaaS and Analytics

The needs of modern applications, mobile users, and cloud services increasingly dominate APM (Application Performance Management) purchase priorities. Buyers are becoming more diverse and demanding, and important user groups now include not only enterprise IT...

What Good is a Cyber Security Strategy with Blind Spots?

Vulnerability management activities have long been a core requirement for organizations seeking to understand the extent of their exposures and overall security state of their networks. Yet many security teams continue to struggle when faced with the operational...

This Common Linux Practice is No Longer Best

Whenever IT architects, designers, and executives think about placement of new Linux applications on servers, the most common conclusion is to put the applications on x86-based servers. Frequently missing from the initial infrastructure decision-making process is a...

Capturing and Utilizing Data in Motion

Blog Series: IT Perspectives by Jaqui Lynch In my last blogs I talked about Big Data, the Internet of Things (IOT) and Data at Rest. As we learned, there are two main types of data that are of interest in a Big Data environment – data at rest and data in motion (or...

Hyper-Converged. Is it right for you?

Blog Series:  About IT, by Ed Turetzky There is a lot of discussion today about the hyper-convergence of processing power, storage capacity and network. Most of the discussion has been around a couple of newcomers in Nutanix and Simplivity that provide a data center...