September 12, 2013

CFOs Holding CIOs’ Feet to the Fire
The role of today’s IT department has to change from selecting technology providers to vetting the tech providers chosen by the business unit, said Thoran Rodrigues, the owner of BigData Corp. in Rio de Janeiro, which provides cloud-based big-data services. That would include making sure that the technology provider will provide benefits, low exit costs, reliability, interoperability, security and the long-term vision that it promised, he said.

CPUsage Makes It Easier To Harness The Cloud’s Compute Power
The idea behind the service is to allow anybody to take their existing applications and then allow them to run on virtually any cloud computing service available, whether that’s AWS, Microsoft’s Azure or one of their competitors. That’s still in the future, though. What the company is launching today is support for AWS, with support for Azure and Google’s Compute Engine coming by the end of the calendar year.

Securing data with Authentication as a Service in the cloud, mobile era
Authentication and identity management systems can be complex and costly, but AaaS brings the cost benefits of SaaS to authentication. Keeping up with advances in authentication, managing two-factor authentication and incorporating mobile devices can also be time-consuming. Shifting these burdens to a service provider is an appealing option.

Key Market Trends In Disaster Recovery
The growing instances of natural disasters, along with a rise in data loss, have increased the significance for having an effective disaster recovery (DR) strategy in place. IT industry trends are having a profound influence on enterprises’ current DR strategies. Organizations are being forced to reevaluate how they plan test, and execute their disaster strategies. This brief looks at some of the prominent trends currently taking place in disaster recovery.

Consulting on the Cusp of Disruption
Although McKinsey and other consulting firms have gone through many waves of change—from generalist to functional focus, from local to global structures, from tightly structured teams to spiderwebs of remote experts—the launch of McKinsey Solutions is dramatically different because it is not grounded in deploying human capital. Why would a firm whose primary value proposition is judgment-based and bespoke diagnoses invest in such a departure when its core business was thriving?

How will we integrate all these enterprise cloud apps?
Dhillon believes that people who aren’t programmers should to be able to integrate applications without learning Java or hiring a consulting company. Just drag-and-drop connections on a simple visual grid (say an order in Salesforce into an order object on the ERP system) and, voila, it all just works, and when your salespeople close an order in Salesforce it spits out the order in your financial system.

Cisco Unveils Mega Chip for New Network Demands
It’s a new product line called the nPower, and Cisco says the chips can pump as much as 400 gigabits of data per second. By contrast, the company’s prior technology could handle 140 gigabits and required more than one chip, Cisco says. The new capacity translates into hundreds of millions of transactions per second.

10 yrs later, DHS still plagued with cybersecurity, critical infrastructure problems
Today marks 12 years after the 9/11 terrorist attacks; it’s been a decade since 22 government agencies were combined into the Department of Homeland Security in response to those attacks. “DHS has spent more than $35 billion on homeland security grants, but cannot measure whether we are safer from terrorist attacks,” according to Republican Senator Tom Coburn.

14 Things You Need to Know About Data Storage Management
So how do you formulate that sound data storage management strategy? asked dozens of storage and data management experts, which resulted in these top 14 suggestions regarding what steps you need to take to choose the right data storage solution(s) for your organization -- and how you can better ensure your data is properly protected and retrievable.

How to revamp your IT operational plan without getting fired
If you didn't run the generators, check the power distribution units, monitor the ambient temperature on the data center floor, perform change control, replace or rack and stack new equipment, put out fires, upgrade the storage frame, open the ports, plug the holes, and stop the distributed denial-of-service attacks, at some point nothing will work. The problem is that nobody cares that you do any of these things until one thing breaks.

Quote for the day:

"Thunder is good, thunder is impressive; but it is lightning that does the work" -- Mark Twain

No comments:

Post a Comment