This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
As IT professionals and business decision-makers, weve routinely used the term digital transformation for well over a decade now to describe a portfolio of enterprise initiatives that somehow magically enable strategic business capabilities. Ultimately, the intent, however, is generally at odds with measurably useful outcomes.
In a 2014 Next-Generation WAN Survey , 68 percent of respondents said demand for WAN bandwidth will increase over the next year. These factors will prevent some global companies from successfully deploying bandwidth-hungry enterprise IT strategies worldwide, such as virtualization and data center consolidation. Limited WAN Bandwidth.
AWS, Microsoft, and Google may continue to dominate the enterprise cloud market, but a raft of second-tier cloud providers are proving to be valuable partners for organizations and innovators with specialized workloads and use cases especially in the burgeoning AI era. Athos Therapeutics is one such enterprise.
And enterprise technology professionals should track them to learn fo solutions and help articulate intelligent requirements to the community. The next one will be held 3-4 December 2014 at the National Press Club in Washington DC. Startups should track SINET as a way to learn and perhaps expose your technology to the community.
By Bob Gourley Data Science Powered CloudSOC™ Solution Enables Security for Cloud Applications and Services by Providing Transaction Visibility, Threat Detection, Controls and Forensics Analysis. CloudSOC™ empowers enterprise IT to enable employees to take full advantage of the cloud era, while staying safe, secure and compliant.
To illustrate his point, Mr. Bray shared the story of an application for smartphones created by the FCC. — Trajectory Magazine (@TrajectoryMag) July 30, 2014. David Bray says @FCC repositioned chief data officer as "enterprise information and data integration lead." — Seth Grimes (@SethGrimes) July 30, 2014.
With this post we would like to give you a high level overview of their Spring 2014 Cohort. Using techniques and concepts originally applied to Air Force combat operations, we leverage dynamic next generation networking (IPv6) and application techniques to allow real-time responses to threats across both IT infrastructure and cloud services.
At Trellix, which is positioning itself as a leader in extended detection and response (XDR), she heads the Enterprise Technology and Operations group.Anstett said at her appointment : My number one priority as CIO is to deliver insights to our business to serve our customers. billion range.
News like the release below shows how virtuous this firm is being in the enterprise IT domain. Their solutions are now enhancing enterprise defenses in every major sector of the economy and at firms of all sizes. Invincea Announces 54 New Enterprise Customers For its Flagship Enterprise Solution, $8.1M – bg.
OnLive is a firm I recommend enterprise technologists watch closely. By delivering high-end visual computing experiences successfully to any device they have created capabilities that can apply to just about every enterprise. The first application to showcase OnLive Go is currently in open Beta. By Bob Gourley.
While enterprise resource planning (ERP) had existed for three decades, its architecture and implementations were designed in a different era, before the globalization of the economy and supply chains, and the advancements in artificial intelligence (AI) and cloud computing.
What if all your company’s computers and applications were connected directly to the Internet? That was the assumption behind BeyondCorp, a new model for network security that Google proposed back in 2014, and it’s one that’s starting to get some attention from networking and security vendors.
At the Dell Enterprise Forum EMEA 2014 this week in Frankfurt, Dell introduced new storage and systems management solutions designed to dramatically speed application response times, strengthen the ties among data center technologies and simplify IT operations. Dell Storage'
By Bob Gourley Editor’s note: we have met and had discussions with the leadership of MemSQL and are excited for the virtuous capabilities they bring to enterprise IT (see, for example, our interview with Eric Frenkiel and their position on our Top Enterprise Big Data Tech List ). Prominent Investors Enthusiastic about a $32.4
Achieving more, efficiently, with enterprise data is a hot topic. So optimizing Apache Hadoop to contribute to enterprise security missions is an incredibly hot topic. By Bob Gourley. Security is a hot topic. The security and audit of Hadoop itself is also of critical importance. Rethink Security Analysis.
Business intelligence (BI) is a runaway locomotive that keeps picking up speed in terms of enterprise interest, adoption, and spending levels. Forrester started the original research with fewer than 30 vendors in 2014 and ended up with 73 in the current 2017 update. The result: Forrester now tracks 73(!) vendors in the segment.
Although it can be complex, the right HPC implementation provides your enterprise the computing capabilities necessary for high-intensity applications in many industries, especially those taking advantage of AI. HPC as a service : Another key trend is the emergence of HPC as a fully managed service inside enterprise data centers.
Companies that develop enterpriseapplications download over 200,000 open-source components on average every year and one in every 16 of those components has security vulnerabilities. To read this article in full or to leave a comment, please click here
If you are in or know people in government, non-profits or NGO’s that have leveraged Hadoop in service to missions please nominate them for recognition as part of the 2014 Data Impact Awards presented by Cloudera. 2014 Data Impact Awards. Nominations are open through September 12, 2014. Presented by Cloudera.
Applications are the backbone of modern business. And when it comes to building enterpriseapplications, Java has made a name for itself as the Swiss Army Knife of programming languages. In fact, 50% of today’s enterprise apps are Java-based – meaning most of today’s businesses rely on Java in some shape or form.
The 2014 Data Impact award, presented by Cloudera, is a great way of helping the community learn best practices by highlighting mission-focused solutions. 2014 Data Impact Awards. Nominations are open through September 12, 2014. The 2014 Data Impact Awards highlight achievements in the following areas: BUSINESS IMPACT.
Many developers faced difficulties porting applications developed for a particular computing environment decades ago. Each container leverages a shared operating system kernel and encapsulates everything needed to run an application (application code, dependencies, environment variables, application runtimes, libraries, system tools etc.)
While the incorporation of touch-screens and the emphasis on applications demonstrated Microsoft’s willingness to change, many found that the execution of the new operating system left much to be desired.
Last year, Enterprise IT was dramatically shaped by the influx of security breaches, data leaks and a new wave of hackers. and that Windows 10 was better than the Enterprise could have imagined. This year, two of 2014’s biggest stories will intersect as security and Windows 10 prepare to re-shape the Enterprise.
A critical, foundational piece of this solution is its use of the Cloudera Enterprise Data Hub. More on the tech involved: As new data comes into the enterprise it is made immediately available through a high velocity streaming ingest capability based on Storm. The result? This negates challenges in data logistics.
Enterprise security company, Palo Alto Networks has announced the latest release of its virtual firewall series (VM-Series). Upgrades of enterprise Hadoop-based distributions from two of the top three vendors — Cloudera Inc. Palo Alto unveils latest release of virtual firewall series. and Hortonworks Inc.
Widely know in enterprise technology circles for their advanced analytics, business intelligence and enterprise data management capabilities, SAS is continuing to invest in innovation, partnering and mission focused application development. With this post CTOvision is initiating coverage of SAS. Threat Intelligence.
They’ve invested heavily in big data analytics — $44 billion in 2014 alone, according to Gartner. Data must first be “Cataloged” and “Connected” before it can be “Consumed” by applications and various analytics tools. Data cleaning and curation is the cornerstone of modern business intelligence pipelines.
In 2014, the company launched its center, utilizing the SAP technology platform to monitor 22 production systems and more than 18,000 users worldwide. Take security alerts, for example, “ 46% of all application downtime [is] caused by false positives. The average enterprise receives more than 10,000 security alerts a day.
In a recent survey by AIIM entitled ‘Paper Wars 2014 – an update from the battlefield’ 60% of respondents said they had seen a return on their investment on paper-free projects they had put in place within 12 months. Make sure they are taking advantage of OCR, data capture and integration with core enterprise systems.
Another very positive development was the application of engineering and security talent by an amazing firm named Gazzang. Jun/03/2014. Cloudera continued to focus on security and find-grain access control with capabilities like Sentry. One of the big advances from Gazzang: well engineered key management.
The following is from the RSA conference press release : Congratulations to Red Owl Analytics for being named the Most Innovative Company at RSA Conference 2014! It is an anti-fraud and security solution that works equally well for the advertising industry, ecommerce and Enterprise business systems. Bluebox Security. Defense.Net.
They have a great portfolio of technologies needed by enterprises today and are helping make mobile workforces more secure, agile and productive. I believe this acquisition by Good Technologies will result in a very significant enhancement in the ability of enterprises to secure their mobile users. – bg. From: [link].
By Bob Gourley If you work in enterprise technology, earth science or national security affairs you will immediately get the significance of the video at this link and embedded below. SkySat-2, an identical version of SkySat-1, is scheduled to launch in early 2014.
Since Satya Nadella took the helm in 2014, Microsoft has doubled down on its support for non-Microsoft technologies. Modern enterprise threat surfaces are diverse, extensive, and dynamic—and most certainly extend well beyond any single vendor’s offerings. Netskope also offers two applications that integrate with MEI.
It connects untrusted domains (partner Extranet networks) to the core enterprise trusted network and provides the gateway functionality for partner Extranet connectivity.’”
Editor’s note: We believe the release below will be of high interest to enterprise technologists since it directly relates to topics of enhanced functionality and security of your mission critical infrastructure. Monday, August 4, 2014. Government intelligence and defense customers and commercial enterprises. – bg.
Invincea Redefines Endpoint Security with Integrated Endpoint, Cloud Analysis and Enterprise Response Capabilities. Invincea Advanced Endpoint Protection now includes granular escalating controls that empower security staff to isolate suspect processes on endpoints, quarantine compromised devices, and eradicate threats enterprise-wide.
– 24 Feb 2014: IBM (NYSE: IBM ) today announced a definitive agreement to acquire Boston, MA-based Cloudant, Inc., “Cloudant’s decision to join IBM highlights that the next wave of enterprise technology innovation has moved beyond infrastructure and is now happening at the data layer,” said Cloudant CEO Derek Schoettle.
Darmstadt, Germany, 4/30/2014. Software AG acquired JackBe in August 2013 to serve as the foundation for its Intelligent Business Operations Platform, which provides analytics and decision management for real-time applications. SOFTWARE AG’S ACQUISITION OF JACKBE RECOGNIZED AS STRATEGIC M&A DEAL OF THE YEAR.
One need only look at the infamous Target breach of 2014 , which exposed the data of nearly 110 million individuals due to a backdoor that a contractor inadvertently created, to realize that an organization is only as secure as the weakest link in its supply chain. Don’t forget internal applications. Securing the cloud.
This is a live blog of session DATS004, titled “Bare-Metal, Docker Containers, and Virtualization: The Growing Choices for Cloud Applications.” Visit the site for more information on virtualization, servers, storage, and other enterprise technologies. IDF 2014: Bare Metal, Docker Containers, and Virtualization.
SAP, the world’s leading enterprise resource planning (ERP) software vendor, was chosen to develop the platform, due largely to the history of co-innovation the German multinational enjoyed with Petrobras.
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content