Parsing through the software-defined storage hype
Essentially, SDS is emerging as an ecosystem of products that decouples software from underlying storage networking hardware, placing it in a centralized controller or hypervisor. This centralized software will provide visibility of all physical and virtual resources, enabling programmability and automated provisioning based upon consumption or need.
ERM: 5 Steps to Success
Everyone agrees the role of ERM is for risk management to be involved in the "key business decisions," however, some misinterpret this as interviewing only the senior executives in "big picture" assessments. In reality, aligning day-to-day activities of all managers to the strategic objectives set senior leadership, and then aggregating and analyzing this information is the winning approach. So how is this accomplished? Here are the 5 steps to quickly and practically embed risk management enterprise-wide.
Your company's cloud strategy must come from the top
Define, refine, understand, and publicize your cloud strategy, then implement your plans in small phases. IT should drive any technological shift from the top down. Moreover, in doing so, IT should make sure it understands user and development requirements as related to the company strategy.
Microsoft Survey Picks Up Early Signs Of New Trend - Bring Your Own Service
Bring Your Own Device (BYOD) to work it seems is old hat already. Early signs of a new trend have now been spotted – that of, what can be loosely called, Bring Your Own Service (BYOS). A recent survey by research firm Ipsos on behalf of Microsoft Corp. found that nearly half of the employees surveyed were of the opinion that social tools at work helped increase their productivity.
Tripartite Approach to Enterprise Architecture
Architectural work in an enterprise be designed and built around organizational accountability levels and be divided into three distinct yet interlinked architectures: Technical Architecture, Socio-Technical Architecture, and Ecosystemic Architecture. Each of these architectures would be self-contained and self-regulated with its paradigmatic function, methods, and tools.
Active/Active WAN-based Replication in GemFire vs Oracle and MySQL
The replication service in GemFire is transparent to applications and does not affect normal use of the distributed big data grid. Setup is easy too as there is nothing to change in your configuration other than enabling the WAN service and providing the WAN endpoint(s) to use for replication. GemFire automatically sets up a parallel asynchronous replication system across your machines that reaches out to the remote site and efficiently batches changes asynchronously across the WAN.
Virtualization security 101: A user's primer
Server virtualization allows you to float multiple 'virtual machines' on top of a physical server, using a hypervisor to manage them. The obvious benefits are better hardware utilization, faster scalability and the ability to move VMs around to get optimal processing power. However, this same structure creates some very real security concerns.
Big Data and the Cambrian Explosion of Information Sources
Welcome to the Age of Data! From every direction, along any number of trajectories, data now streams at us in unprecedented fashion. Customers, prospects, partners, competitors; Web sites, mobile phones, medical devices, manufacturing machines – the number and nature of data sources seems to be growing exponentially. What’s a data manager to do? Fasten your seat belt and prepare for a wild ride!
IE10 steals user share from IE9, jumps 53%
In relative terms, IE10 was the third-most-used browser of the five that Microsoft now supports, passing the 12-year-old IE6 for the first time. IE10's climb has been brisk: As late as January, it had a mere 2.3% user share of all of IE. The increase was prompted by the automatic update from IE9 to IE10 on Windows 7 PCs, which began shortly after IE10's release on the popular platform in late February.
5 Rockin’ Motivation Techniques That Won’t Cost a Dime
Managers often struggle to get their team into high gear without using financial incentives. They don’t realize that the best motivation is self-motivation—and you don’t need a dime to get your staff going. There are two parts when it comes to team motivation: preventing dissatisfaction and engendering satisfaction. Use them both.
Quote for the day:
"Why are you going to choose failure when success is an option?" -- Jillian Michaels
Essentially, SDS is emerging as an ecosystem of products that decouples software from underlying storage networking hardware, placing it in a centralized controller or hypervisor. This centralized software will provide visibility of all physical and virtual resources, enabling programmability and automated provisioning based upon consumption or need.
ERM: 5 Steps to Success
Everyone agrees the role of ERM is for risk management to be involved in the "key business decisions," however, some misinterpret this as interviewing only the senior executives in "big picture" assessments. In reality, aligning day-to-day activities of all managers to the strategic objectives set senior leadership, and then aggregating and analyzing this information is the winning approach. So how is this accomplished? Here are the 5 steps to quickly and practically embed risk management enterprise-wide.
Your company's cloud strategy must come from the top
Define, refine, understand, and publicize your cloud strategy, then implement your plans in small phases. IT should drive any technological shift from the top down. Moreover, in doing so, IT should make sure it understands user and development requirements as related to the company strategy.
Microsoft Survey Picks Up Early Signs Of New Trend - Bring Your Own Service
Bring Your Own Device (BYOD) to work it seems is old hat already. Early signs of a new trend have now been spotted – that of, what can be loosely called, Bring Your Own Service (BYOS). A recent survey by research firm Ipsos on behalf of Microsoft Corp. found that nearly half of the employees surveyed were of the opinion that social tools at work helped increase their productivity.
Tripartite Approach to Enterprise Architecture
Architectural work in an enterprise be designed and built around organizational accountability levels and be divided into three distinct yet interlinked architectures: Technical Architecture, Socio-Technical Architecture, and Ecosystemic Architecture. Each of these architectures would be self-contained and self-regulated with its paradigmatic function, methods, and tools.
Active/Active WAN-based Replication in GemFire vs Oracle and MySQL
The replication service in GemFire is transparent to applications and does not affect normal use of the distributed big data grid. Setup is easy too as there is nothing to change in your configuration other than enabling the WAN service and providing the WAN endpoint(s) to use for replication. GemFire automatically sets up a parallel asynchronous replication system across your machines that reaches out to the remote site and efficiently batches changes asynchronously across the WAN.
Virtualization security 101: A user's primer
Server virtualization allows you to float multiple 'virtual machines' on top of a physical server, using a hypervisor to manage them. The obvious benefits are better hardware utilization, faster scalability and the ability to move VMs around to get optimal processing power. However, this same structure creates some very real security concerns.
Big Data and the Cambrian Explosion of Information Sources
Welcome to the Age of Data! From every direction, along any number of trajectories, data now streams at us in unprecedented fashion. Customers, prospects, partners, competitors; Web sites, mobile phones, medical devices, manufacturing machines – the number and nature of data sources seems to be growing exponentially. What’s a data manager to do? Fasten your seat belt and prepare for a wild ride!
IE10 steals user share from IE9, jumps 53%
In relative terms, IE10 was the third-most-used browser of the five that Microsoft now supports, passing the 12-year-old IE6 for the first time. IE10's climb has been brisk: As late as January, it had a mere 2.3% user share of all of IE. The increase was prompted by the automatic update from IE9 to IE10 on Windows 7 PCs, which began shortly after IE10's release on the popular platform in late February.
5 Rockin’ Motivation Techniques That Won’t Cost a Dime
Managers often struggle to get their team into high gear without using financial incentives. They don’t realize that the best motivation is self-motivation—and you don’t need a dime to get your staff going. There are two parts when it comes to team motivation: preventing dissatisfaction and engendering satisfaction. Use them both.
Quote for the day:
"Why are you going to choose failure when success is an option?" -- Jillian Michaels
No comments:
Post a Comment