Welcome!


Cloud Computing

In the pharmaceutical industry, the drug development clock is ticking at the rate of warp-speed. As a result, companies are constantly looking for solutions to help them accelerate time to market – and many are realizing that implementing a cloud-based information management system can...
When focusing on one element of a SaaS provider to evaluate, it should not be the technology it is providing today but its commitment to finding new ways to succeed in the future. This kind of agility that goes beyond technology is why SaaS is so loaded with potential for entrepreneurs...
ServiceNow this week launched its Eureka version of its online service management suite with new features aimed at letting non-technical folks build custom applications and process flows. IT service management (ITSM) has long been a huge benefit to complex and exception-rich IT operat...
Quite often you will see IT or business teams estimate the cloud costs only based on the compute power and storage that they need. One quite often overlooked component of the cloud cost is the traffic (inbound and outbound) that can become significant charge depending on your applicati...
The private cloud is misunderstood. At this stage, vendors can be forgiven for not having a firm idea of what the private cloud is and how it can uniquely improve their processes. Too many service providers have branded legacy technologies as "cloud-based," warping buyers' expectations...
The Agile Architecture bar is set. Vendors should know what their products must do. Architects have some insight into the patterns they must follow. And business stakeholders can finally rest assured that at least it’s possible to achieve technology-enabled business agility. True, it’s...
The cloud wars battle rages on. Gartner predicts that one in four cloud providers will be gone by 2015, making this a very high stakes battle for all concerned. The 800lb gorillas, AWS, IBM, Google, Microsoft, et al. continue their efforts for dominance. The latest salvo has been a pri...
Whether they admit it or not, the emergence of public cloud providers has dramatically altered the playing field for hardware vendors of every type. Amazon Web Services (AWS) and its competitors opened Pandora’s box by introducing the world to a completely programmatic, scalable, evolv...
Last month, the Information Security Forum released their annual prediction of the top 10 information security threats they foresee for the next two years – through 2016. While I found the entire list insightful, half of the list resonated strongly with me as someone who is working wit...
In the five years since I co-founded Bonitasoft with Miguel Valdes Faura and Rodrigue Le Gall, our organization has come a long way. We started with seven developers. We now have 17 dedicated full time to Bonita BPM – along with a systems architect, a QA team, a documentation team, a...
Zetta.net is an enterprise-grade backup and disaster recovery provider. We have been in business for over five years, and we have over 800 enterprise customers and managed service providers (MSPs) that use or resell our product, as is the case with MSPs. In terms of the IT challenges,...
The proliferation of cloud-based applications for the enterprise grows each day, and more and more professionals have grown dependent on these apps as the consumerization of IT flourishes in today’s mobile enterprise. With the consumerization of IT, employees have become their own IT e...
I believe the trends away from mainframes to the Cloud will have a large impact on enterprise mobility architecture. If we believe that going forward, enterprise mobility architectures will be closely tied to the Cloud, then we need to take a serious look at architectural design. I ha...
It's now clear that we are entering into a very diverse and even unprecedented work environment -- something the world perhaps has never known. Companies need to prepare for it now. But how do enterprises prepare, and how do they create the means to analyze and manage the transiti...
Businesses have IT because apps deliver value to their customers. This can be direct value - a user-facing app. Or it can be indirect - an internal app for managing sales, marketing, or even HR transactions. Either way, the idea is that the app will make the business more efficient and...
According to a recent KPMG report, SMAC, or Social, Mobile, Analytics and Cloud Computing, comprises around 80% of total ICT (Information & Communications Technology) spend. SMAC is not only promising a modern way for enterprises to leverage information technology, but it’s also revolu...
In a recent Corning whitepaper, The Connectivity Premium, it discusses how commercial real estate developers can profit from forward-looking strategies in network infrastructure and wireless connectivity. Corning quotes ABI research that points out there are over 10,000,000,000 mobile...
The ever-growing web as well as the `consumerization of IT` provide end users with an abundance of options and full discretion. We now understand the vital need to internalize the concept of spreading knowledge and information across a variety of applications and platforms as a means t...
COMCAST’s recent $45 billion acquisition of Time-Warner Cable was big news in the Cable TV world, but it should be big news in the area of cloud computing and network diversity. Instead of looking at COMCAST as a cable TV provider, it is time that we should be looking at it as another...
So many organizations switched to third-party help desk solutions without really putting in place any performance measures or tracking mechanisms to really measure how good – or bad – the support is. Some executives got a big bonus for “thinking out of the box” and coming up with a c...
When we first built our MetraNet billing platform our customers (large enterprises and service providers) generally offered services that were clearly defined in terms of character and scope, with fairly stable setup charges, usage charges, and periodic recurring charges. Back then, wi...
We all know the story of Goldilocks and the three bears, but have you heard the one about Goldie Locks and the three clouds? This tale is playing out throughout the IT marketplace. Goldie Locks – an IT executive for a state government – has once again found herself in a dilemma. “If o...
Self-service is a traditional element for humans. A typical and successful example of self-service is vendor machines that dispenses drinks. Coca-Cola (among others) operates a large number of self-service machines all over the world, in public places such as universities, museums, and...
The use of in-memory data grids (IMDGs) for scaling application performance has rapidly increased in recent years as firms have seen their application workloads explode. This trend runs across nearly every vertical market, touching online applications for financial services, ecommerce,...
I had the privilege of interviewing the CEO of Capriza, Yuval Scarlat, last week. We discussed a wide range of topics such as cloud mobility, MADPs, MBaaS, mobile strategies and why he thought the market needed another mobile solutions vendor. On a side note, I think Capriza's websit...
I had the privilege of interviewing mobility expert Vaidy Iyer today. He is the founder and CEO of AppsFreedom, a company focused on providing enterprise mobility solutions in the form of Multi-Channel, Multi-Device Platform as a Service solutions to the SAP community. I asked if the...
In a previous blog on Cloud Services Brokerage (CSB), I promised to return briefly to the topic of CSB monetization. The term CSB can refer to both to the activity of brokering cloud services, or to the software application (or suite of applications) used to manage that activity. The ...
Enterprise IT organizations today often are bypassed as employees and LoBs use cloud services; in fact cloud computing is considered the revenge of the business unit. 2014 will be year that the Enterprise IT organizations move from role of helpless bystander to role of strategic partne...
The major strides achieved in IT in 2013 are possibly a hint of what to expect in 2014. The leading players are expected to introduce new and advanced cloud-based solutions, and at the same time keep testing, improving the efficiency of the existing services. Here are some of our top p...
Did you miss any of the top Service Virtualization resources from 2013? See which case studies, reports, papers, and videos were most popular. In 2013, Parasoft saw a tremendous level of interest in Service Virtualization across a broad spectrum of industries (including retail, financ...
As we enter a new year, it is time to look back over the past year and resolve to improve upon it. In 2014, we will see more service providers resolve to add more personalization in enterprise technology. Below are seven predictions about what will drive this trend toward personalizati...
Over the past few years, the cloud evolution has answered all questions on the cloud being the right strategy. The key challenge that remains now is leveraging cloud capabilities and features in such a way that they can be used to innovate as well as solve business problems. If we rela...
If you are worried about securing your sensitive data in commercial storage services here is a guide to how you can encrypt your sensitive data. The recent PRISM Data snooping controversies have heightened almost every companies awareness of the potential vulnerabilities of data store...
Cloud service providers are up against several key challenges when it comes to selling desktop virtualization technology. An understanding of the benefits of desktop-as-a-service (DaaS) rarely exists, and licensing concerns – and their rising costs – are not going away any time soon. K...
Everyone talks about a cloud-first or mobile-first strategy. It’s the trend du jour, and for good reason as these innovative technologies have revolutionized an industry and made savvy companies a lot of money. But consider for a minute what’s emerging with the Age of Context and the I...
The medical needs of developing countries are staggering and come in many shapes and sizes. The trouble is the real issues can only be understood once an individual or organization gets involved. About 10 years ago, our organization was routinely shipping medical supplies to hard-to-re...
Like millions of other Americans, I learned the other night about the massive data breach at Target. The Washington Post is reporting that sensitive details on over 40 million credit and debit cards were exposed. While the information associated with the crime is still coming out, the ...
With the end of the year buzz around predictions, it's hard not to join in the conversation. Our CenturyLink Cloud leadership team came together for a few predictions for the year head – and to show we are keepin' it real, we scored last year's predictions as well. 1. Enterprise-buye...
Do you like opinions? I have asked my UK based colleague and opinionated enterprise mobility expert, Peter Rogers, to share some of his personal views and predictions for enterprise mobility in 2014 in this guest post. Do you disagree or agree with Peter? We would love your comments. ...
In light of the recent NSA snooping scandal via their PRISM program regarding private cloud computing security, many people are left wondering if their sensitive data is actually secure. In fact, the statistics points to this startling fact: businesses and individuals alike have been s...