Enterprise

  • Most Topular Stories

  • Office For Mac 2016: First Look

    InformationWeek:
    Kelly Sheridan
    5 Mar 2015 | 1:14 pm
    Microsoft Office for Mac 2016 combines Windows and Mac interfaces with built-in cloud storage.
  • 2 Microsoft Azure Services Hit General Release

    InformationWeek:
    Doug Henschen
    5 Mar 2015 | 10:50 am
    Microsoft Azure Search service is out now, and the Azure DocumentDB NoSQL database service will debut in April.
  • Managing Data Security In The Hybrid Cloud

    Network Computing:
    Jim O'Reilly
    5 Mar 2015 | 5:00 am
    The hybrid cloud model helps address security and compliance issues, but there are still a lot of challenges, including cloud encryption.
  • The End of the Beginning, and the Beginning of the End

    deal architect
    vinnie
    5 Mar 2015 | 8:11 am
    I enjoyed this interview with Zach Nelson where he says we have come to the end of the beginning of the move to cloud computing. I also hope we are seeing the beginning of the end of a dark era...
  • Information Archiving and Governance Success Requires Strategic Thinking

    SandHill.com General Feed
    2 Mar 2015 | 4:00 pm
    This article discusses the benefits of adopting Information Governance (IG) and deploying an information archiving platform, as well as eight basic requirements for institutionalizing IG. Keep on reading: Information Archiving and Governance Success Requires Strategic Thinking
  • add this feed to my.Alltop

    InformationWeek:

  • Office For Mac 2016: First Look

    Kelly Sheridan
    5 Mar 2015 | 1:14 pm
    Microsoft Office for Mac 2016 combines Windows and Mac interfaces with built-in cloud storage.
  • Industrial IoT: Creating New Business Opportunities

    Chris Murphy
    5 Mar 2015 | 12:06 pm
    While the consumer IoT putters along, the industrial world is diving headlong into using connected devices. Here's how mining equipment maker Joy Global plans to use near real-time remote analytics to squeeze more productivity out of equipment.
  • 2 Microsoft Azure Services Hit General Release

    Doug Henschen
    5 Mar 2015 | 10:50 am
    Microsoft Azure Search service is out now, and the Azure DocumentDB NoSQL database service will debut in April.
  • Apple Watch: 5 Facts, 5 Questions

    Kelly Sheridan
    5 Mar 2015 | 10:30 am
    As Apple's March 9 event approaches, we break down what we know, and what we want to know, about Apple Watch.
  • iPad Pro Update: Larger Model Delayed

    Kelly Sheridan
    5 Mar 2015 | 9:36 am
    The rumored 12.9-inch iPad Pro gets pushed back as Apple determines which features are best for enterprise users.
 
 
  • add this feed to my.Alltop

    deal architect

  • The End of the Beginning, and the Beginning of the End

    vinnie
    5 Mar 2015 | 8:11 am
    I enjoyed this interview with Zach Nelson where he says we have come to the end of the beginning of the move to cloud computing. I also hope we are seeing the beginning of the end of a dark era...
  • The spotty technology globalization record

    vinnie
    3 Mar 2015 | 5:36 pm
    I read a few tweets today about how SAP does “global well” and how SuccessFactors reflects it. My reaction was technology vendors, not just SAP, are actually inconsistent when it comes to global matters compared to companies like Unilever or...
  • Enterprise Software Churn: E2Open Ring Fence

    vinnie
    3 Mar 2015 | 2:07 am
    When I was researching SAP Nation, I was impressed with how many customers are swapping out software, moving to third party maintenance, “ring fencing” the core solution with specialist tools, and implementing two and three tier strategies – different solutions...
  • For National Reading Month

    vinnie
    1 Mar 2015 | 1:56 pm
    March celebrates reading. Can I recommend for your reading list the book on left which is a comedy, a tragedy, action genre title about the technology business? Seriously, not every one is a book reader, but in the spirit of...
  • Enterprise Software ChurnRimini Street keeps rolling

    vinnie
    1 Mar 2015 | 4:30 am
    The general presumption in the enterprise software marketplace is customers stay loyal for lifetimes – the more realistic thinking, of course, is they stay loyal for long periods, but not that long. When I was researching SAP Nation, I was...
  • add this feed to my.Alltop

    SandHill.com General Feed

  • Information Archiving and Governance Success Requires Strategic Thinking

    2 Mar 2015 | 4:00 pm
    This article discusses the benefits of adopting Information Governance (IG) and deploying an information archiving platform, as well as eight basic requirements for institutionalizing IG. Keep on reading: Information Archiving and Governance Success Requires Strategic Thinking
  • The Reality of Tech’s Big League

    1 Mar 2015 | 4:00 pm
    A recent study on the velocity of market cap growth of tech companies shows the difference between winners and losers now happens faster than ever. Keep on reading: The Reality of Tech’s Big League
  • Software News Brief – March 2

    1 Mar 2015 | 4:00 pm
    Unimaginably large. That’s the size of potential impacts in several recent developments in the software world. Here are some of the news stories we’re watching. Keep on reading: Software News Brief – March 2
  • Data Visualization: Changing the Way Decisions Are Made

    1 Mar 2015 | 4:00 pm
    Data visualization allows decision makers to directly interact with the information that’s needed to make an informed decision. Here’s how. Keep on reading: Data Visualization: Changing the Way Decisions Are Made
  • Ask the Experts: Pebble Smartwatch

    26 Feb 2015 | 4:00 pm
    What is the real significance of Pebble raking in more than $5 million in less than five hours for its new smartwatch? Keep on reading: Ask the Experts: Pebble Smartwatch
 
  • add this feed to my.Alltop

    Hu's Blog

  • DELIVERING ON INFORMATION INTELLIGENCE

    Hu Yoshida
    4 Mar 2015 | 2:22 am
    For the last five years, Hitachi Data Systems has been following a three-step vision and strategy that was defined by our CEO, Jack Domme, which he first presented at an Executive Advisory Board in August 2010. The foundation for this vision and strategy starts with a continuous infrastructure that enables the non-disruptive access to data, applications, and information over a virtualized infrastructure. The second step was a content management system for structured and unstructured data, that could scale from edge, to core, to public cloud and be accessible anywhere, any time, over any…
  • DATA ENCRYPTION SHOULD BE PART OF YOUR DEFENSIVE GAME PLAN

    Hu Yoshida
    27 Feb 2015 | 10:44 am
    In the last twelve months we’ve seen some massive data security breaches in the United States.  Here is a list with the largest number of customer records exposed to loss: Anthem (80,000,000), Home Depot (56,000,000), JP Morgan Chase (76,000,000), EBay (145,000,000) Target (70,000,000) Living Social (50,000,000) (Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks) The loss of private information on such a massive scale is every executive’s worst nightmare.  In Target’s case, their CEO Gregg Steinhafel was fired in response to…
  • VSP G1000: THE FASTEST ALL FLASH ARRAY VALIDATED BY SPC-1

    Hu Yoshida
    19 Feb 2015 | 9:06 am
    The System Performance Council SPC-1 tests results for Hitachi VSP G1000 have just been published on the SPC website and the results show that the G1000 is the clear leader in storage performance against the leading all flash storage arrays! VSP G1000 can be configured as an all-flash storage array simply by not adding any spinning disks. The chart above is constructed from data on the SPC-1 website which shows the audited results of the SPC -1 test that was run on different all-flash storage systems. This test consists of a single workload designed to demonstrate the performance of a storage…
  • The Advantages and Benefits of Erasure Coding in the HCP S10

    Hu Yoshida
    4 Feb 2015 | 3:43 pm
    We recently announced the HCP S10 Storage node as part of our HCP portfolio of object storage solutions. See my previous post on the changes that the S10 introduced in the way that we access, manage and protect data. S10 introduced a high capacity commodity disk system with higher availability and faster rebuild times than enterprise disk systems with RAID 6 protection.  This was done through the use of erasure coding and a patented approach to rebuild. “Erasure Coding” (EC) is a method of data protection that is well known in the networking world but is relatively new in the…
  • z13 a Mainframe Designed for the 3rd Platform

    Hu Yoshida
    30 Jan 2015 | 5:12 pm
                  On January 13 IBM announced the new z13 Mainframe, that was promised to be the most powerful and secure system ever built. The press release made the following claims: First system able to process 2.5 billion transactions per day, built for mobile economy 
– Makes possible real-time encryption on all mobile transactions at scale 
– First mainframe system with embedded analytics providing real time transaction insights 17X faster than compared competitive systems at a fraction of the cost. This system is clearly focused on the…
  • add this feed to my.Alltop

    Andrew McAfee's Blog

  • Jobs and Wages in January: Some Growth, Still Plenty of Slack

    Andrew McAfee
    10 Feb 2015 | 6:44 am
    January’s jobs report was so good that The Atlantic declared it to be ‘without a blemish.’ Job creation remained strong and wages grew as well. I agree that there was a lot to like about it, but it also strikes me that the enthusiasm it’s generated is a bit unsettling because it shows me how far our expectations have been diminished. At first glance, job growth looks quite torrid. The New York Times noted that “Since Nov. 1, employers have hired more than one million new workers, the best performance over a three-month period since 1997.” This sounds a…
  • The Second Machine Age and the Velvet Underground

    Andrew McAfee
    12 Dec 2014 | 10:59 am
    Today we got the happy news that The Second Machine Age was named one of the best books of the year by Bloomberg. Their methodology for putting together their list was interesting: they just asked a lot of heavy hitters in finance, industry, and public affairs what their favorite books were. I’m flattered to see what our book was among the most cited. Mohamed El-Erian, Dominic Barton, Jeff Sachs, Tim Adams, and and Pippa Malmgren all gave it a shout-out, which is a great feeling. The Second Machine Age hit the bestseller lists, but it hasn’t been a runaway commercial hit.
  • Enterprise 2.0, Finally?

    Andrew McAfee
    20 Nov 2014 | 11:28 am
    Facebook’s recent announcement that it’s readying a version of its social software for workplaces got me thinking about Enterprise 2.0, a topic I used to think a great deal about. Five years ago I published a book with that title, arguing that enterprise social software platforms would be valuable tools for businesses. The news from Facebook, along with rapid takeup of new tools like Slack, the continued success and growth of Salesforce’s Chatter and Yammer (now part of Microsoft), and evidence of a comeback at Jive, indicates that the business world might finally be coming…
  • Why Is Customer Service Still So Lousy (Financial Services Web Design Edition)?

    Andrew McAfee
    10 Nov 2014 | 9:00 am
    A while back I set up autopayment on the Citi credit card I used for business expenses, and it’s been working fine. Recently, however, I ran up so many travel expenses in a month that I hit my credit limit (the clearest sign yet that I’ve been on the road too much). So in order to keep further charges from being declined, I went to the Citi credit cards site to make a manual payment. I wanted to use the same bank account for this manual payment that I use for my automatic one. But I couldn’t see how to do that, even after looking around the site for a while. The ‘MAKE…
  • This Saturday: The Glass Cage Match at the Boston Book Festival

    Andrew McAfee
    20 Oct 2014 | 10:47 am
    I’ve been involved with the Boston Book Festival since Deborah Porter founded it in 2009, and it’s become one of my favorite events of the year. And since I had a for-real mainstream published book come out this year (as opposed to a self-published glorified pamphlet) I get to participate this year as a full-fledged author in the session titled “Technology: Promise and Peril” What makes this especially exciting to me is the fact that I’ll share the stage with Nick Carr, who’s one of my favorite writers and thinkers about technology. I don’t praise…
  • add this feed to my.Alltop

    The Enterprise System Spectator

  • ERP Selection Is Not Just About Vendor Selection

    Frank Scavo
    22 Feb 2015 | 12:17 pm
    When an organization decides to look for a new ERP system, consultants and vendors often refer to that effort as an "ERP selection project." Sometimes they will refer to it as ERP vendor selection, or an ERP vendor evaluation, but the idea is the same. I've been advising companies on ERP selection since 1989, and my consulting firm Strativa has been doing ERP selection consulting since 2000. After many such projects, I've come to the conclusion that the whole process is misnamed. Why? Because referring to the effort as an ERP vendor selection project makes the choosing the right system the…
  • Free Resources on the New Strativa Website

    Frank Scavo
    4 Feb 2015 | 10:58 am
    After much work, we've launched a long-overdue redesign of website for Strativa, my business and IT consulting firm.Visit the new website at Strativa.com.  Free ResourcesIn addition to giving the site a fresh new design and new content, one of our motivations was to be able to offer free resources for download to our website visitors. A starting collection is now online:The Need for Independence in Advisory Services: An informal video interview that I gave recently on the history of Strativa and the value of independence. Business Strategy Case Study: The Critical Few: A case study…
  • Eight Incredibly Useful Tips for Writing New Year Predictions

    Frank Scavo
    21 Dec 2014 | 9:16 am
    Every year around this time, analysts and assorted pundits put together their lists of predictions for the coming year. These I find to be, for the most part, sleep-inducing and lacking insight. So, rather than add to the prediction posts already piling up, let me share how you too can come up with predictions for the coming year. Next year will be like this year, only more so. Pick a news item from today’s newspaper, and turn it into a trend for the coming year. For example, “The dollar will strengthen against world currencies.”  “Will Continue.” Similarly, pick a technology…
  • The Maturing of ERP on the Salesforce Platform

    Frank Scavo
    1 Nov 2014 | 7:11 pm
    Salesforce.com held its monster user conference, Dreamforce, last month in San Francisco, and there were plenty of new announcements. For example: A new analytics cloud, dubbed Wave, which fills out Salesforce.com's offerings to include native business intelligence and analytical capabilities A new version of the Salesforce1 platform, Lightning, for developing mobile apps  An expanded partnership with Microsoft for Windows mobile devices and new integrations with Microsoft Office, Office 365, Power BI, and Excel But Dreamforce is not just about Salesforce. It's about the Salesforce…
  • Is HR Tech Overshooting HR Capabilities?

    Frank Scavo
    19 Oct 2014 | 11:15 am
    Human resources management is a hot area for new technology, at least based on the number of new vendor offerings. But why isn’t there greater adoption of among HR practitioners? In this post, I outline three reasons that interest is high but actual adoption is slow, and what business leaders should do about it.But first, a quick summary about the leading conference on HR technology.  HR Tech Conference, a Must-Attend EventAt the urging of several associates, I attended my first HR Technology® Conference (HR Tech) earlier this month in Las Vegas. If you are interested at all in HR…
 
  • add this feed to my.Alltop

    Schneier on Security

  • Now Corporate Drones are Spying on Cell Phones

    schneier
    5 Mar 2015 | 4:33 am
    The marketing firm Adnear is using drones to track cell phone users: The capture does not involve conversations or personally identifiable information, according to director of marketing and research Smriti Kataria. It uses signal strength, cell tower triangulation, and other indicators to determine where the device is, and that information is then used to map the user's travel patterns. "Let's say someone is walking near a coffee shop," Kataria said by way of example. The coffee shop may want to offer in-app ads or discount coupons to people who often walk by but don't enter, as well as to…
  • Tom Ridge Can Find Terrorists Anywhere

    schneier
    4 Mar 2015 | 4:40 am
    One of the problems with our current discourse about terrorism and terrorist policies is that the people entrusted with counterterrorism -- those whose job it is to surveil, study, or defend against terrorism -- become so consumed with their role that they literally start seeing terrorists everywhere. So it comes as no surprise that if you ask Tom Ridge, the former head of the Department of Homeland Security, about potential terrorism risks at a new LA football stadium, of course he finds them everywhere. From a report he prepared -- paid, I'm sure -- about the location of a new football…
  • Data and Goliath: Reviews and Excerpts

    schneier
    3 Mar 2015 | 11:03 am
    On the net right now, there are excerpts from the Introduction on Scientific American, Chapter 5 on the Atlantic, Chapter 6 on the Blaze, Chapter 8 on Ars Technica, Chapter 15 on Slate, and Chapter 16 on Motherboard. That might seem like a lot, but it's only 9,000 of the book's 80,000 words: barely 10%. There are also a few reviews: from Boing Boing, Booklist, Kirkus Reviews, and Nature. More reviews coming. Amazon claims to be temporarily out of stock, but that'll only be for a day or so. There are many other places to buy the book, including Indie Bound, which serves independent…
  • Google Backs Away from Default Lollipop Encryption

    schneier
    3 Mar 2015 | 3:46 am
    Lollipop device encryption by default is still in the future. No conspiracy here; it seems like they don't have the appropriate drivers yet. But while relaxing the requirement might make sense technically, it's not a good public relations move. Android compatibility document. Slashdot story.
  • The Democratization of Cyberattack

    schneier
    2 Mar 2015 | 4:49 am
    The thing about infrastructure is that everyone uses it. If it's secure, it's secure for everyone. And if it's insecure, it's insecure for everyone. This forces some hard policy choices. When I was working with the Guardian on the Snowden documents, the one top-secret program the NSA desperately did not want us to expose was QUANTUM. This is the NSA's program for what is called packet injection--basically, a technology that allows the agency to hack into computers. Turns out, though, that the NSA was not alone in its use of this technology. The Chinese government uses packet injection to…
  • add this feed to my.Alltop

    Martin Fowler

  • photostream 83

    Martin Fowler
    3 Mar 2015 | 3:49 am
    Provincetown, MA
  • Bliki: BeckDesignRules

    Martin Fowler
    2 Mar 2015 | 6:20 am
    Kent Beck came up with his four rules of simple design while he was developing ExtremeProgramming in the late 1990's. I express them like this. [1] Passes the tests Reveals intention No duplication Fewest elements The rules are in priority order, so "passes the tests" takes priority over "reveals intention" Kent Beck developed Extreme Programming, Test Driven Development, and can always be relied on for good Victorian facial hair for his local ballet. The most important of the rules is "passes the tests". XP was revolutionary in how it raised testing to a first-class activity in software…
  • Retreaded: ConversationalStories

    Martin Fowler
    19 Feb 2015 | 9:06 am
    Retread of post orginally made on 04 Feb 2010 Here's a common misconception about agile methods. It centers on the way user stories are created and flow through the development activity. The misconception is that the product owner (or business analysts) creates user stories and then put them in front of developers to implement. The notion is that this is a flow from product owner to development, with the product owner responsible for determining what needs to be done and the developers how to do it. A justification for this approach is that this separates the responsibilities along the lines…
  • Refactoring code that accesses external services

    Martin Fowler
    17 Feb 2015 | 7:52 am
    When I write code that deals with external services, I find it valuable to separate that access code into separate objects. Here I show how I would refactor some congealed code into a common pattern of this separation. more…
  • photostream 82

    Martin Fowler
    8 Feb 2015 | 7:23 am
    Wellfleet Bay Wildlife Sanctuary, MA
  • add this feed to my.Alltop

    EMC Blogs

  • The Data Insurer and Trust Inspections

    4 Mar 2015 | 5:25 am
    For several weeks I've been writing about Data Valuation with a goal of considering any impacts on IT infrastructure.  I introduced the table below as a framework for discussing data insurance from the perspective of people and processes. Insuring data is an example of data valuation, and much can be learned by diving into the potential underwriting process depicted below. In a recent post I mentioned that it is already common for an insurance agent to visit a data center for the purpose of insuring against disaster. What is uncommon, however, is the role of a data insurer. This…
  • Mobile World Changes

    2 Mar 2015 | 9:28 am
    Several years ago EMC hired a new Chief Technology Officer: John Roese.  John brought with him decades of networking experience, including CTO roles at companies such as Cabletron and Nortel. Within a few months he participated in Mobile World Congress 2013 and heard the Telco/Service Provider industry communicate their need for dramatic and radical change. In 2014 he attended the same conference and saw an acceleration of transformation activity (see his Reflections post from last year). As he participates in his 3rd consecutive MWC in Barcelona next week, I thought I'd take a…
  • Metadata Lakes and Data Value

    26 Feb 2015 | 7:06 am
    I've been taking a look at data valuation through the context of a data insurance use case. In my last post I mentioned that as data architects go through the process of moving silo'ed data sets into a Business Data Lake, they should simultaneously build a governance structure known as a Metadata Lake. I like to think of a Metadata Lake as an infrastructure construct that enables partitioning of an overall Data Lake. Indeed, for the data insurance use case, the Metadata Lake becomes a one-stop shop for an insurer to subsequently audit data sets that are insured through premium…
  • Considering The Next Wave Of Storage Automation

    24 Feb 2015 | 12:26 pm
    From the time enterprise data centers sprang into existence, we’ve had this burning desire to automate the heck out of them. From early mainframe roots to today’s hybrid cloud, the compulsion never wanes to progressively automate each every aspect of operations. The motivations have been compelling: use fewer people, faster responses, be more efficient, make outcomes more predictable, and make services resilient. But the obstacles have also been considerable: both technological and operational. With the arrival of vSphere 6.0, a nice chunk of new technology has been introduced to help…
  • Where's The Data (Value)?

    24 Feb 2015 | 5:14 am
    In recent posts I've started to take a look at the process of data valuation and the people, processes, and infrastructure that might be involved. The discussion of data valuation is at an early stage. In order to frame a dialogue I suggested in a recent post that the data insurance underwriting process may be an excellent use case to discuss valuation.  I posted the table below in an effort to stimulate dialogue on data insurance people and processes. In this post I'd like to focus on the first row of the table: data set identification. Consider a corporation that wishes to…
 
  • add this feed to my.Alltop

    Oracle Bloggers

  • IMPORTANT NOTICE: Your Oracle Database 10g OCP Requirements May Not be Complete

    Brandye Barrington-Oracle
    5 Mar 2015 | 12:36 pm
    If you have passed all the required Oracle Database 10g Administrator Certified Professional (OCP) exams, but have not submitted your required course details, you will need to do so by September 1, 2015 to complete your certification path and earn the credential. Oracle Database 10g exams and certification paths retired on March 1, 2015. If you have not done so yet, you must provide verification of your completed training by September 1, 2015 to complete your Oracle Database 10g Administrator OCP certification.  You will need to submit this…
  • Free Training Delivered by Product Experts!!!

    Toddac-Oracle
    5 Mar 2015 | 12:10 pm
    Are you a current Oracle EBS Customer? Do you prefer training from Product experts on your own timetable? Would you like to suggest a training topic? If you answered YES! to these questions, we have the training for you. Logistics Product Support delivers Webcast/Webinars every month on key topics, common issues and new features. See, Oracle Inventory, Product Information Management and Warehouse Management Teams Informational Webcast Series (Doc ID 1290983.1).If you miss a live Webcast, no worries. The Webcasts are recorded and available for viewing at your liesure. Also keep an eye on the…
  • Working around heatbeat issues caused by tracing or by regexp

    Roger MacNicol-Oracle
    5 Mar 2015 | 11:29 am
    I had noted in my first post that using the highest level of tracing caused timeout issues with the offload server heartbeat monitor. Heartbeat issues can also occur with expensive (and badly formed) regexp expressions. By default the heartbeat monitor is set to 6 seconds which is the maximum permitted to process 1MB data in the offload server and mark the task completed and is far more time than is reasonably expected to take.  Operations such as expensive tracing to disk or badly formed regexp expressions that cause that time period to be exceeded lead to this…
  • New Java Champion: Peter Lawrey

    Yolande Poirier-Oracle
    5 Mar 2015 | 10:51 am
    Congratulations to the new Java Champion Peter Lawrey! Peter has over twenty years experience in IT, and around 15 years experience designing, developing and supporting Java systems. He provides consulting and develops software for trading firms based on the open source code written for OpenHFT. He is also the technical lead for OpenHFT, which is a suite of Apache 2.0 OSS libraries.   Peter is the founder of the "Performance Java User's Group", a virtual JUG with over 1300 members. He is a top contributor of the Java and JVM forums on StackOverflow.  He has published over…
  • Introduction to the REST Service Editor, Generation (PART 2)

    gstachni-Oracle
    5 Mar 2015 | 10:35 am
    Introduction to the REST Service Editor, Generation (PART 2) By Chris Stodden <>Given successful completion of the REST Service Description in part 1. We will now consume the <service description>.xmi, for generation of the java client service. Post Conditions: Generated Java Data Type Objects, represents the JSON payload Generated Java Rest API Objects, represents the call behavior of the modeled API. Generated Service Object, represents the rest call and response data objects. This will comprise our POJO data control and be used in the UI. Consuming the Service Description: With…
  • add this feed to my.Alltop

    JT on EDM

  • First Look: Blue Yonder

    James Taylor
    3 Mar 2015 | 7:38 am
    Copyright © 2015 http://jtonedm.com James TaylorBlue Yonder is based in Germany (Karlsruhe) and was founded in 2008 by an ex-CERN researcher, Prof. Michael Feindt and focusing on solving big data problems such as demand estimation. Several solutions targeted at retail were released over subsequent years. In 2013 they launched their Data Science Academy. The Blue Yonder platform for predictive applications launched last year. This is targeted at making it possible to automate very large numbers of decisions and embedding analytics and machine learning into operational systems. Blue Yonder has…
  • Using Decision Modeling to make Predictive Analytics more pervasive

    James Taylor
    24 Feb 2015 | 12:22 pm
    Copyright © 2015 http://jtonedm.com James TaylorBack in May of last year, Wayne Eckerson published “Making Predictive Analytics Pervasive“. It’s a great report with some really useful data but one of the key headline result is that implementation rates are not rising – in fact fewer organizations are reporting successful implementation of predictive analytics (from 21% to 18%). This despite the massive increase in awareness of predictive analytics as part of the “Big Data” wave and continued good results for those that succeed with predictive analytics…
  • First Look: Predixion 4.0

    James Taylor
    11 Feb 2015 | 7:13 am
    Copyright © 2015 http://jtonedm.com James TaylorPredixion released 4.0 of Predixion Insight in October 2014 and I got a product update recently. First, some quick background on Predixion: They started back in 2009 based in California and Washington and recently added an office in Europe. 70 employees now with a core set of partners and investors. Their focus is on making it easier for business users to benefit from predictive analytics. Ease of use and deployment at the front line of an organization – at the point of decision – is a central focus and Predixion positions itself between…
  • How to frame requirements for predictive analytic projects with decision modeling

    James Taylor
    10 Feb 2015 | 7:45 am
    Copyright © 2015 http://jtonedm.com James TaylorOne of my big focus areas right now is using decision requirements models to frame predictive analytic projects. We are working with a few insurance companies as well as a couple of manufacturing companies to apply decision requirements modeling in their analytic requirements process and I am excited by the potential. I recently wrote an article for Predictive Analytic Times on this topic – Effective Framing of Predictive Analytic Projects – and I am presenting on Decision Modeling for Predictive Analytic Projects with Steve…
  • Free Version of Decision Modeling Software DecisionsFirst Modeler Now Available

    James Taylor
    3 Feb 2015 | 7:00 am
    Copyright © 2015 http://jtonedm.com James TaylorAt Decision Management Solutions we have a long history of providing free resources to help drive the adoption of Decision Management, Decision Management technology and Decision Modeling. Today we continued this with our announcement of a free version of our decision modeling software, DecisionsFirst Modeler. The free Basic Version delivers user-friendly, DMN standards-based graphical decision models for up to three users to support collaboration on decision requirements for business process management, business rules, predictive analytics…
  • add this feed to my.Alltop

    Development & Integration Blogs

  • Malware is Leaking into Enterprises at Unprecedented Rates

    5 Mar 2015 | 2:27 am
    Web-born malware is getting on corporate systems at alarming rates throughout north America. In many cases users may not be aware of the infections, think the effects of the malware are just glitches in the system and don?t bother about it or the organization lacks the resources and knowledge to properly contain and remediate these infections.
  • Building Reliable Disk Volumes Part 1

    4 Mar 2015 | 2:28 pm
    RAID and Drive Redundancy. Redundant disk drives allow non-stop operation in case of a drive failure. The acronym RAID stands for Redundant Array of Inexpensive Disks. Six levels of RAID, 0 through 5, were defined in a paper published by the Universi...
  • Is There Any Privacy In Your VPN Service?

    4 Mar 2015 | 6:51 am
    People should be taking a close look at their VPN providers to ensure that there is actually some degree of ?Privacy? to their Virtual Private Network. From design, configuration and business practices ? there may be some leaks in those VPN or data may be available on request.
  • How to Make LinkedIn More Effective for Career and Business

    4 Mar 2015 | 3:41 am
    connect beyond the click
  • Selecting Reliable Disk Systems

    28 Feb 2015 | 7:19 am
    Over the last few years disk drives have become more reliable. Still, they do occasionally fail, and you need to be prepared for that eventuality. You have numerous choices of interfaces, drive capacities and fault-tolerant configurations.   W...
 
  • add this feed to my.Alltop

    StorageMojo

  • EMC’s DSSD hiring is exploding

    Robin Harris
    18 Feb 2015 | 1:24 pm
    DSSD, the Valley startup acquired by EMC last year (see EMC goes all in with DSSD) is continuing to hire at an accelerating rate. Informed sources put the current DSSD team at 160 heads with plans to grow it to 800 over the next year. This is a program in a hurry. Hiring such numbers in the very tight Silicon Valley job market today is expensive, where even new graduates command 6 figures – and need it to afford an apartment with only one roommate. But given that VMAX needs a low latency backend to replace the uncompetitive VMAX disk infrastructure, the rush is understandable. Rotating…
  • Latency in all-flash arrays

    Robin Harris
    17 Feb 2015 | 10:04 am
    StorageMojo has been writing about latency and flash arrays for years (see The SSD write cliff in real life), with a focus on data from the TPC-C and SPC-1 benchmarks. The folks at Violin Memory asked me to create a Video White Paper to discuss the problem in a bite-size chunk. Latency is the long pole Steven Swanson’s and Adrian M. Caulfield’s work at the University of California San Diego found that with a 4Kbyte disk access, the standard Linux software stack accounted for just 0.3% of the latency and 0.4% of the energy consumption. With flash however, the same software stack…
  • EMC’s missing petabytes: the cost of short stroking

    Robin Harris
    10 Feb 2015 | 1:34 pm
    A couple of weeks ago StorageMojo learned that a VMAX 20k could support up to 2400 3TB drives, it can only address ≈2PB. Where did the remaining 5 petabytes go? Some theories were advanced in the comments, and I spoke to other people about the mystery. No one would speak on the record, but here’s the gist of the received wisdom. Different strokes for different folks Short stroking is the short and best answer. Short stroking uses the outermost tracks – the fastest, densest, and capacious tracks – to punch up drive performance. By reducing head shift time and maximizing…
  • Help StorageMojo find the VMAX 20k’s lost petabytes!

    Robin Harris
    21 Jan 2015 | 11:51 am
    While working on a client configuration for a VMAX 20k – and this may apply to the 40k as well, as I haven’t checked – I encountered something odd: The 20k supports up to 2400 3TB drives, according to the EMC 20k spec sheet. That should be a raw capacity of 7.2PB However, the same spec sheet appears to say that the maximum usable storage capacity – after taking care of formatting overhead, system needs, etc. is ≈2PB. Here’s the table from the spec sheet: Coming at it from other directions, it seems that since the 20k supports four 60 drive enclosures per rack,…
  • Facebook on disaggregation vs. hyperconvergence

    Robin Harris
    6 Jan 2015 | 10:04 am
    Just when everyone agreed that scale-out infrastructure with commodity nodes of tightly-coupled CPU, memory and storage is the way to go, Facebook’s Jeff Qin, a capacity management engineer – in a talk at Storage Visions 2015 – offers an opposing vision: disaggregated racks. One rack for computes, another for memory and a third – and fourth – for storage. The rationale: applications need different amounts of each resource over time. Having thousands of similarly configured servers ignores this fact and leads to substantial – at FB scale – waste.
  • add this feed to my.Alltop

    Network & Infrastructure Blogs

  • Malware is Leaking into Enterprises at Unprecedented Rates

    5 Mar 2015 | 2:27 am
    Web-born malware is getting on corporate systems at alarming rates throughout north America. In many cases users may not be aware of the infections, think the effects of the malware are just glitches in the system and don?t bother about it or the organization lacks the resources and knowledge to properly contain and remediate these infections.
  • Building Reliable Disk Volumes Part 1

    4 Mar 2015 | 2:28 pm
    RAID and Drive Redundancy. Redundant disk drives allow non-stop operation in case of a drive failure. The acronym RAID stands for Redundant Array of Inexpensive Disks. Six levels of RAID, 0 through 5, were defined in a paper published by the Universi...
  • Is There Any Privacy In Your VPN Service?

    4 Mar 2015 | 6:51 am
    People should be taking a close look at their VPN providers to ensure that there is actually some degree of ?Privacy? to their Virtual Private Network. From design, configuration and business practices ? there may be some leaks in those VPN or data may be available on request.
  • LEAN principles into daily activities

    1 Mar 2015 | 2:35 am
    We've talked a little about LEAN and more about SQDC over the past few months. What is one benefit of using LEAN principles and activities like Kaizen events or SQDC boards? They hopefully will seep into your every day life and make your normal routines easier.
  • Selecting Reliable Disk Systems

    28 Feb 2015 | 7:19 am
    Over the last few years disk drives have become more reliable. Still, they do occasionally fail, and you need to be prepared for that eventuality. You have numerous choices of interfaces, drive capacities and fault-tolerant configurations.   W...
 
  • add this feed to my.Alltop

    Data Management Blogs

  • How to Make LinkedIn More Effective for Career and Business

    4 Mar 2015 | 3:41 am
    connect beyond the click
  • Warning: Rant about recruiters follows.

    19 Feb 2015 | 8:58 am
    I have to warn you that I am about to rant about IT Recruiters. I've had a whole series of "contacts" in the last few days and I am about to blow off some steam regarding the manner in which they have approached me! That being said, I am now stepping up onto my proverbial soup box.
  • Follow up to my "Wake" post

    4 Feb 2015 | 6:11 pm
    This is a follow up to one of my recent posts ( Who are you impacting with your ?wake?? ), so, if you haven?t read that one, you might want to take a minute or to and do so (or you might not ;-). I am returning to an old, favorite theme of mine: mentoring.
  • I have a confession to make ...

    1 Feb 2015 | 6:11 pm
    My grandmother used to tell me that, "Confession is good for the soul." Most of the time, I found that confession was, indeed, good for the soul and I have encouraged that attitude among those with whom I have worked (especially when I was in a team lead position) and the users I have dealt with (especially those who might have been prone to trying to cover up mistakes they've made). (Of course,
  • Are your skills improving, stagnating, or degrading?

    1 Feb 2015 | 8:42 am
    In keeping with my convictions, I am once again going to encourage y?all to take advantage of every opportunity to improve your existing skills, learn new skills, and network with others in our profession. I am going to especially encourage you to avail yourself of opportunities that have little to NO cost other than your time (and, perhaps, a bit of gasoline). As IT becomes more and more complex,
  • add this feed to my.Alltop

    Enterprise Back Office Blogs

  • Malware is Leaking into Enterprises at Unprecedented Rates

    5 Mar 2015 | 2:27 am
    Web-born malware is getting on corporate systems at alarming rates throughout north America. In many cases users may not be aware of the infections, think the effects of the malware are just glitches in the system and don?t bother about it or the organization lacks the resources and knowledge to properly contain and remediate these infections.
  • Building Reliable Disk Volumes Part 1

    4 Mar 2015 | 2:28 pm
    RAID and Drive Redundancy. Redundant disk drives allow non-stop operation in case of a drive failure. The acronym RAID stands for Redundant Array of Inexpensive Disks. Six levels of RAID, 0 through 5, were defined in a paper published by the Universi...
  • Is There Any Privacy In Your VPN Service?

    4 Mar 2015 | 6:51 am
    People should be taking a close look at their VPN providers to ensure that there is actually some degree of ?Privacy? to their Virtual Private Network. From design, configuration and business practices ? there may be some leaks in those VPN or data may be available on request.
  • How to Make LinkedIn More Effective for Career and Business

    4 Mar 2015 | 3:41 am
    connect beyond the click
  • Business and Technology Predictions for the Year 2020

    4 Mar 2015 | 2:11 am
    A man by the name of Dennis Gabor once said, ?We cannot predict the future, but we can invent it.? In the ERP industry we have the ability to look at data collected over the last several years to see where trends are shaping the future of enterprise resource planning.
  • add this feed to my.Alltop

    Microsoft Security Response Center

  • Security Advisory 3046015 released

    MSRC Team
    5 Mar 2015 | 10:44 am
    Today, we released Security Advisory 3046015 to provide guidance to customers in response to the SSL/TLS issue referred to by researchers as “FREAK” (Factoring attack on RSA-EXPORT Keys). Our investigation continues and we’ll take the necessary steps to protect our customers. MSRC Team
  • February 2015 Updates

    MSRC Team
    10 Feb 2015 | 10:07 am
    Today, as part of Update Tuesday, we released nine security bulletins – three rated Critical and six rated Important in severity, to address 56 unique Common Vulnerabilities and Exposures (CVEs) in Microsoft Windows, Microsoft Office, Internet Explorer, and Microsoft Server software.  We encourage you to apply all of these updates. For more information about this month’s security updates, including the detailed view of the Exploitability Index (XI) broken down by each CVE, visit the Microsoft Bulletin Summary webpage. If you are not familiar with how we calculate the XI, a…
  • January 2015 Updates

    MSRC Team
    13 Jan 2015 | 10:24 am
    Today, as part of Update Tuesday, we released eight security updates – one rated Critical and seven rated Important in severity, to address eight unique Common Vulnerabilities and Exposures (CVEs) in Microsoft Windows. We encourage you to apply all of these updates. For more information about this month’s security updates, including the detailed view of the Exploit Index (XI) broken down by each CVE, visit the Microsoft Bulletin Summary webpage. If you are not familiar with how we calculate XI, a full description can be found here. We re-released one Security Bulletin: MS14-080…
  • A Call for Better Coordinated Vulnerability Disclosure

    Chris Betz
    11 Jan 2015 | 6:49 pm
    For years our customers have been in the trenches against cyberattacks in an increasingly complex digital landscape. We’ve been there with you, as have others. And we aren’t going anywhere.  Forces often seek to undermine and disrupt technology and people, attempting to weaken the very devices and services people have come to depend on and trust. Just as malicious acts are planned, so too are counter-measures implemented by companies like Microsoft. These efforts aim to protect everyone against a broad spectrum of activity ranging from phishing scams that focus on socially…
  • Evolving Microsoft's Advance Notification Service in 2015

    Chris Betz
    8 Jan 2015 | 8:00 am
    Our Advance Notification Service (ANS) was created more than a decade ago as part of Update Tuesday to broadly communicate in advance, about the security updates being released for Microsoft products and services each month. Over the years, technology environments and customer needs have evolved, prompting us to evaluate our existing information and distribution channels. This desire to improve is why customers may have seen us introduce myBulletins to provide bulletin reports tailored to customer preferences, discontinue the Deployment Priority matrix in favor of the Exploitability Index,…
 
  • add this feed to my.Alltop

    SQLblog.com - The SQL Server blog spot on the web

  • SQL Server DML Triggers - Tips & Tricks - Part 2 ("Thought to work on multiple rows")

    Sergio Govoni
    5 Mar 2015 | 12:29 pm
    This is the second blog post in the series dedicated to the Tips and Tricks of DML Triggers development.The first part can be found here: SQL Server DML Triggers - Tips & Tricks - Part 1 ("Intro" & "Triggers activation order").  Triggers must be thought to work on multiple rows One of the most frequent mistake I have seen during my experience in Triggers debugging and tuning is: the Author of the Trigger doesn't consider that his Trigger will work on multiple rows, sooner or later! I have seen many Triggers, especially those ones that implement domain integrity constraints, which…
  • Test for a warning message using Pester

    jamiet
    5 Mar 2015 | 2:04 am
    Here’s a little ditty that’s worth throwing out (if nothing else so that I can find it later), if you’re not using Pester to test your PowerShell code then this post probably isn’t for you. If you’re not using PowerShell stop reading now. I wanted to write a Pester test that tested whether or not a piece of code threw a warning or not. I discovered from Understanding Streams, Redirection, and Write-Host in PowerShell that it is possible to redirect stuff in the PowerShell Warning (or Verbose or Debug) stream to the output stream. Here’s an example of doing just that: "Here is…
  • Suggest Compression Strategies for Tables and Indexes

    Greg Low
    5 Mar 2015 | 12:56 am
    I make no secret of the fact that I think that table compression was the best thing added to SQL Server 2008. It seems like every week that I’m talking to clients about it. They have Enterprise Edition but they weren’t using it because they were familiar with O/S level disk compression and they think that compression will mean smaller and slower, yet this often couldn’t be further from the truth for customers whose databases are currently I/O bound or who don’t have enough memory in their buffer cache for it to work correctly. It’s important though, to make sure the correct form of…
  • Rebuild Partitioned Clustered Columnstore Indexes

    Greg Low
    4 Mar 2015 | 11:00 pm
    A short time back, I provided an updated script that can be used to rebuild clustered columnstore indexes when necessary. One thing that wasn’t covered by that script was the ability to only individual index partitions. Below, I’ve provided an updated version of the script that will rebuild only affected partitions if the clustered columnstore index is partitioned. -- Rebuild clustered columnstore indexes when necessary -- Dr Greg Low v2.2   -- rebuild when more than supplied % of rows have been deleted -- rebuild when any segments contain more than supplied % deleted rows -- rebuild…
  • ICYMI: the Halloween Problem and DBCC CheckConstraints - SQL Server Performance

    KKline
    2 Mar 2015 | 7:02 am
    Cool and informative articles about SQL Server performance relating to IO caused by the DBCC CheckConstraints command and exploring the infamous Halloween Problem....(read more)
  • add this feed to my.Alltop

    MySQL Performance Blog

  • How to test if CVE-2015-0204 FREAK SSL security flaw affects you

    David Busby
    5 Mar 2015 | 8:45 am
    The CVE-2015-0204 FREAK SSL vulnerability abuses intentionally weak “EXPORT” ciphers which could be used to perform a transparent Man In The Middle attack. (We seem to be continually bombarded with not only SSL vulnerabilities but the need to name vulnerabilities with increasing odd names.)Is your server vulnerable?This can be tested using the following GISTIf the result is 0; the server is not providing the EXPORT cipher; and as such is not vulnerable.Is your client vulnerable?Point your client to https://oneiroi.co.uk:4443/test if this returns “Vulnerable” then the…
  • Steve ‘Woz’ Wozniak to speak at Percona Live MySQL Conference & Expo 2015

    Peter Zaitsev
    5 Mar 2015 | 5:00 am
    Apple’s Steve “Woz” Wozniak will talk at Percona Live 2015I am thrilled to announce that Apple co-founder and Silicon Valley icon and philanthropist Steve Wozniak will participate in a moderated Q&A on creativity and innovation April 14 during this year’s Percona Live MySQL Conference and Expo in Santa Clara, California.In addition to “The Woz,” as Steve is nicknamed, we have a great lineup of esteemed industry luminaries, with a broad range of talks and tutorials along with fun and informative networking events during the four-day conference (April 13-16).Harrison…
  • Percona XtraDB Cluster 5.6.22-25.8 is now available

    Hrvoje Matijakovic
    5 Mar 2015 | 4:30 am
    Percona is glad to announce the new release of Percona XtraDB Cluster 5.6 on March 5th 2015. Binaries are available from downloads area or from our software repositories.Based on Percona Server 5.6.22-72.0 including all the bug fixes in it, Galera Replicator 3.9, and on Codership wsrep API 25.8, Percona XtraDB Cluster 5.6.21-25.8 is now the current General Availability release. All of Percona’s software is open-source and free, and all the details of the release can be found in the 5.6.22-25.8 milestone at Launchpad.Bugs Fixed:XtraBackup SST wouldn’t stop when MySQL was SIGKILLed.
  • Percona Server 5.6.23-72.1 is now available

    Hrvoje Matijakovic
    4 Mar 2015 | 9:29 am
    Percona is glad to announce the release of Percona Server 5.6.23-72.1 on March 4, 2015. Download the latest version from the Percona web site or from the Percona Software Repositories.Based on MySQL 5.6.23, including all the bug fixes in it, Percona Server 5.6.23-72.1 is the current GA release in the Percona Server 5.6 series. Percona Server is open-source and free – and this is the latest release of our enhanced, drop-in replacement for MySQL. Complete details of this release can be found in the 5.6.23-72.1 milestone on Launchpad.New Features:TokuDB storage engine package has…
  • Percona Server 5.5.42-37.1 is now available

    Hrvoje Matijakovic
    4 Mar 2015 | 7:22 am
    Percona is glad to announce the release of Percona Server 5.5.42-37.1 on March 4, 2015. Based on MySQL 5.5.42, including all the bug fixes in it, Percona Server 5.5.42-37.1 is now the current stable release in the 5.5 series.Percona Server is open-source and free. Details of the release can be found in the 5.5.42-37.1 milestone on Launchpad. Downloads are available here and from the Percona Software Repositories.Bugs Fixed:RPM pre-install script assumed that the PID file was always located in the datadir. If it was not, during installation, wrong assumption could be made if the server was…
  • add this feed to my.Alltop

    ProjectVRM

  • Up next: a master app to give customers scale

    Doc Searls
    15 Feb 2015 | 1:05 pm
    Businesses love to say “the customer comes first,” “the customer is in charge” and that they need to “let the customer lead.” But for those things to happen, the customer customer needs to actually have the ability to do all three:  to come first, to be in charge, and to lead. In the networked marketplace, the customer has none of those. And she’ll never get it from the companies she deals with, no matter how well-intended they might be. They can greet her by name, give her a hug and lavish all every discount and benefits they can on her,…
  • Signs of progress

    Doc Searls
    2 Feb 2015 | 4:52 am
    In Fightback against internet giants’ stranglehold on personal data starts here, , John Naughton of The Guardian writes, When the history of this period comes to be written, our great-grandchildren will marvel at the fact that billions of apparently sane individuals passively accepted this grotesquely asymmetrical deal. (They may also wonder why our governments have shown so little interest in the matter.) And future historians, diligently hunting through digital archives, will discover that there were only a few voices crying in the wilderness at the time. Of these prophets, the most…
  • A pile of VRooMy links

    Doc Searls
    27 Jan 2015 | 1:58 pm
    Eventbrite – Edit VRM Day 2015a Monday,  6 April at the Computer History Museum, leading into the next three days of IIW, at the same place. Free. Internet Identity Workshop, aka IIW. Where we’ll have lots of productive VRM sessions. Tuesday to Thursday, 7-9 April. It’s the 20th of these, or the XXth. Should be a good one. Internet Identity Workshop XX #20 – 2015A- Eventbrite Where to register for IIW. How VRM works Dave nails a primary use case: intentcasting. What’s wrong with surge pricing? Dave mentions VRM in the midst nodeStorage now! One of Dave’s…
  • The answer is #CFT: Clouds For Things

    Doc Searls
    17 Jan 2015 | 2:33 am
    My last post asked, How do you maximize the help that companies and customers give each other? My short answer is in the headline above. Let me explain. The house where I’m a guest in London has clouds for all its appliances. All the clouds are physical. Here they are: Here is a closer look at some of them: Each envelope contains installation and instruction manuals, warranty information and other useful stuff. For example, today I used an instruction manual to puzzle out what these symbols on the kitchen’s built-in microwave oven mean: Now let’s say I didn’t have…
  • How do you maximize the help that companies and customers give each other?

    Doc Searls
    17 Jan 2015 | 1:34 am
    I’m not talking just about what companies and customers learn from each other through the sales, service and surveys — the Three S’s. Nor am I talking only about improving the “customer experience,” (a topic that has been buzzing upward over the last few years). I’m talking about how companies and customers help each other out. I mean really help. Constantly. One way, of course, is by talking to each other. There are exemplars of this. Among big companies, Apple leads the way, gathering intelligence though its responsive call center and the Genius bars at…
 
  • add this feed to my.Alltop

    Symantec Connect

  • SSR 2013 desktop history cleanup

    cddefo
    5 Mar 2015 | 2:11 pm
    I need a solution I have the entire year of 2013 backups in my history that are not available.  They all have blue question mark icons instead of the green check mark.  I would like to know how to get rid of them in the history.  I think they got there when the backup drive was replaced where the files were stored.  The software seems to think they are coming back online someday when they never will.  I don't have the backup drive to attach anumore to get them removed.  So how do I clean this up in the software history when you do have the backup drive…
  • Brazilian consumers under attack by Boleto malware

    Kevin Gossett
    5 Mar 2015 | 2:00 pm
    The Boleto payment system is unique to Brazil but that doesn’t mean it escapes the attention of malware authors.Read More
  • Enterprise Vault and the AD/Exchange Domain Story

    The Boulon
    5 Mar 2015 | 1:34 pm
    A few days ago I was installing Enterprise Vault 11 for a customer and got a little suprise when I started the Exchange archive task for the first time. There were some warnings in the event veiwer telling me that Enterprise Vault couldn't connect to Exchange.  We checked everything: connection point, certificates, dns,... Just everything. Everything was correctly set up. Nothing to do, we always got the same warning. Now, take a look a the trace below. 934 13:07:02.952 [8680] (EVExchangeWebServicesProxy) <7052> EV-L {EVExchangeWebServicesProxy.UpdateConnectionPointDetails} started…
  • Unable to setup BE2014 for NDMP backup

    AAGAdmin
    5 Mar 2015 | 12:43 pm
    I need a solution I have an emc cellera NS-20 and am working on setting up NDMP to back up the cif shares from the EMC. When attempt to setup NDMP in Backup Exec I keep getting a message when attempting to connect that says access is denied. I have no idea how to check the configuration on the celerra. Any assistance is appreciated.
  • Allow user to perform an action on a list of systems in a text file

    mister paul
    5 Mar 2015 | 12:33 pm
    I frequently need to perform actions on large sets of systems.  An efficient way to do it would be to create a text file listing the systems, and have symantec perform the action on all systems in that list. Actions might be: * update and scan * move to a specific group * anything else you can do when you've done a search for systems
  • add this feed to my.Alltop

    confused of calcutta

  • Be Not Alone

    JP
    1 Mar 2015 | 2:42 pm
    I became a grandfather for the first time last Friday night, and had the opportunity to welcome grandson number one Elijah Fenn to planet earth. One of the happiest moments of my life. It mattered to me in ways that may not make sense to others: my father never lived to see any of his … Continue reading Be Not Alone
  • Big Data, tastefully done

    JP
    25 Feb 2015 | 12:59 pm
      Take 2543 recipes from 8 subcuisines. Use 194 unique ingredients drawn from 15 unique categories. Connect the dots. Oh frabjous day. A friend of mine, Sandee Weiner, shared an article with me, taken from TechnologyReview.com. That in turn pointed to this piece of research Spices Form the Basis of Food Pairing in Indian Cuisine. … Continue reading Big Data, tastefully done
  • Thinking about Turning Points

    JP
    15 Feb 2015 | 2:33 pm
            Around forty years ago, a friend of mine, Gyan Nain Singh, walked into my house with an album I’d never heard before. The Turning Point. Sure, I’d heard of John Mayall. Sure, I’d listened to some of the early Bluesbreakers stuff. By then I’d even managed to acquire a copy of … Continue reading Thinking about Turning Points
  • Of barons and corvos, continued

    JP
    14 Feb 2015 | 2:39 pm
            Yesterday I wrote about interventions that were needed to ensure that the Second Machine Age does not accelerate inequality. Continuing to think about that, I wanted to share a few things that came my way over the past 24 hours. First, let me add a few bits about inequality. The Gini … Continue reading Of barons and corvos, continued
  • Of robber Barons and Corvo antics

    JP
    13 Feb 2015 | 12:35 pm
            A few days ago someone sent me a link to Robert Reich’s piece in Slate, “America is headed full speed back to the 19th century (on the dangers of on-demand jobs and our growing intolerance for labour unions). And somewhere in my head it joined a long list of jeremiads on … Continue reading Of robber Barons and Corvo antics
  • add this feed to my.Alltop

    Enterprise Irregulars

  • IBM’s InterConnect 2015, the good and the not so good

    Tom Raftery
    5 Mar 2015 | 11:43 am
    IBM invited me to attend their Cloud and Mobile Conference InterConnect 2015 last week. Because of what IBM has done globally to help people get access to safe water, to help with solar forecasting, and to help deliver better outcomes in healthcare, for example, I tend to have a very positive attitude towards IBM. So I ventured to the conference with high hopes of what I was going to learn there. and for the most part I wasn’t disappointed. IBM had some very interesting announcements, more on which later. However, there is one area where IBM has dropped the ball badly – their Cloud…
  • Solve for the Customer Is Almost Here

    Denis Pombriant
    4 Mar 2015 | 3:20 pm
    My new book, Solve for the Customer, will be available on Amazon later this week. For now, you can find an article based on one of the key components at MyCustomer.com–The Anna Karenina Principle. Just follow this link. Solve for the Customer Is Almost Here is copyrighted by Denis Pombriant. If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. Enterprise Irregulars is sponsored by FinancialForce.com, Salesforce.com and Workday.
  • Procurement Doesn’t Manage Indirect Spend – Suppliers and Stakeholders Do

    Jason Busch
    4 Mar 2015 | 10:28 am
    One of the toughest challenges for procurement organizations tasked with managing indirect spend is that they don’t do it – their suppliers and stakeholders do. Consider the sometimes limited visibility procurement has into demand, pricing, contracts and related areas for indirect spend, especially those that are managed and/or negotiated at a decentralized level in the business. In addition, procurement often lacks the same level of understanding of the physical and financial supply chain flow for indirect material that they do for direct. Free Research Report: A Supply Chain Finance…
  • Hiring Your VPs: When Can You Compromise?

    Jason M. Lemkin
    4 Mar 2015 | 8:46 am
    I know these days we’re all talking about Unicorns and Decacorns, but not too long ago, it was all about Rockstars.  That you absolutely, positively, have to only hire “Rockstars” in your startups.  The very best of the best.   As if that was some sort of profound insight It’s true.  A Rockstar engineer really is 10x better than the next tier.  And a Rockstar VP is really what you need in every position.  If you don’t think you need a great VP of Sales, Product, Marketing, Customer Success, and Engineering — then all that all that means is you’ve never worked with a great…
  • The 2015 Progressive F&A BPO Blueprint

    Phil Fersht
    4 Mar 2015 | 8:40 am
    Almost two years to the day since we launched our first Blueprint Report, we finally circle back to the core horizontal services function at the core of BPO and shared services:  finance and accounting.  For our 20th Blueprint, authored by analysts Phil Fersht and Hema Santosh, we deliberately focused on the proven “progressive” skills, investments, domain acumen and as-a-service potential of the leading providers in finance and accounting service delivery. In order to pull together the most comprehensive view of this market, we created importance weightings for the key categories of…
 
  • add this feed to my.Alltop

    deal architect

  • The End of the Beginning, and the Beginning of the End

    vinnie
    5 Mar 2015 | 8:11 am
    I enjoyed this interview with Zach Nelson where he says we have come to the end of the beginning of the move to cloud computing. I also hope we are seeing the beginning of the end of a dark era...
  • The spotty technology globalization record

    vinnie
    3 Mar 2015 | 5:36 pm
    I read a few tweets today about how SAP does “global well” and how SuccessFactors reflects it. My reaction was technology vendors, not just SAP, are actually inconsistent when it comes to global matters compared to companies like Unilever or...
  • Enterprise Software Churn: E2Open Ring Fence

    vinnie
    3 Mar 2015 | 2:07 am
    When I was researching SAP Nation, I was impressed with how many customers are swapping out software, moving to third party maintenance, “ring fencing” the core solution with specialist tools, and implementing two and three tier strategies – different solutions...
  • For National Reading Month

    vinnie
    1 Mar 2015 | 1:56 pm
    March celebrates reading. Can I recommend for your reading list the book on left which is a comedy, a tragedy, action genre title about the technology business? Seriously, not every one is a book reader, but in the spirit of...
  • Enterprise Software ChurnRimini Street keeps rolling

    vinnie
    1 Mar 2015 | 4:30 am
    The general presumption in the enterprise software marketplace is customers stay loyal for lifetimes – the more realistic thinking, of course, is they stay loyal for long periods, but not that long. When I was researching SAP Nation, I was...
  • add this feed to my.Alltop

    Chuck's Blog

  • Considering The Next Wave Of Storage Automation

    Chuck Hollis
    24 Feb 2015 | 12:26 pm
    From the time enterprise data centers sprang into existence, we’ve had this burning desire to automate the heck out of them. From early mainframe roots to today’s hybrid cloud, the compulsion never wanes to progressively automate each every aspect of operations. The motivations have been compelling: use fewer people, faster responses, be more efficient, make outcomes more predictable, and make services resilient. But the obstacles have also been considerable: both technological and operational. With the arrival of vSphere 6.0, a nice chunk of new technology has been introduced to help…
  • Enter VSPEX BLUE

    Chuck Hollis
    3 Feb 2015 | 7:35 am
    In the IT biz, all forms of converged infrastructure are now the rage. Rightfully so: their pre-integrated nature and single-support model eliminates much of the expensive IT drudgery that doesn’t usually create significant value: selecting individual components, integrated them, supporting them, upgrading them, etc. How much easier is it to order a block, brick, node, etc. of IT infrastructure as a single supportable product, and move on to more important matters?   A lot easier, it seems ... Reference architectures have been around for ages.  I think of them as a blueprints…
  • VSAN 6.0 — The Second Chapter Begins

    Chuck Hollis
    2 Feb 2015 | 1:05 pm
    As part of the vSphere 6.0 announcement festivities, there’s a substantially updated new version of Virtual SAN 6.0 to consider and evaluate.  Big news in the storage world, I think. I have been completely immersed in VSAN for the last six months.  It's been great.  And now I get to publicly share what’s new and — more importantly — what it means for IT organizations and the broader industry. If there was a prize for the most-controversial storage product of 2014, VSAN would win.  In addition to garnering multiple industry awards, it’s…
  • The New Cloud Supply Chain

    Chuck Hollis
    29 Jan 2015 | 10:44 am
    I admit I had my obsession with All Things Cloud back in the day. Like so many others, I found the industry move to cloud fascinating on so many levels: new technology models, new operational models, new application models, new consumption models, etc.   I wrote endless, lengthy blog posts attempting to explore every nook and cranny.  Even to this day, the topic continues to intrigue me. One of the things I spent much time considering was what I dubbed the "cloud supply chain".   As an example, supply chains in the physical world are responsible for transforming raw…
  • 2015 — The 3rd Platform Gets Real For IT

    Chuck Hollis
    6 Jan 2015 | 2:01 pm
    I used to regularly do my list of New Year predictions.  My success rate has been reasonable, but this year is different. Why?  Because this year, I believe there is one vastly important trend that will begin to drive more change across the IT landscape than all the other possible candidates combined. And that driving force is the 3rd platform — and the new breed of applications it supports. We’ve all been talking about it for a few years.  It’s not a contentious discussion, although it's been rather abstract for many.  But, in 2015, it shows every sign of…
  • add this feed to my.Alltop

    Exchange Server Pro

  • Training Course: High Availability for Exchange Server 2013

    Paul Cunningham
    27 Feb 2015 | 12:43 am
    High availability for Exchange Server 2013 continues to be a topic that creates a lot of questions and problem scenarios for Exchange admins. Recently I co-authored the ebook Deploying and Managing Exchange Server 2013 High Availability with my fellow Exchange MVPs Michael Van Horenbeeck and Steve Goodman. The ebook generated a strong response from readers, many of them asking for even more training on the topic. So I’ve teamed up with the folks at Windows IT Pro to deliver a video training course on Exchange Server 2013 high availability. This course is designed for both…
  • Azure Active Directory Synchronization Failing with Stopped-Extension-DLL-Exception Error

    Paul Cunningham
    25 Feb 2015 | 4:47 pm
    You may encounter a condition in which Azure Active Directory synchronization stops working, for example in an environment that is using directory synchronization for Office 365. The Operations view of the Synchronization Service Manager (miisclient.exe) will display a status of “stopped-extension-dll-exception” for operations on the Windows Azure Active Directory Connector. The Application event log of the directory synchronization server may log the following entries: Log Name: Application Source: Directory Synchronization Date: 26/02/2015 10:34:00 AM Event ID: 0 Description:…
  • Shared Mailbox Sent Items Changes Coming to Office 365

    Paul Cunningham
    17 Feb 2015 | 8:28 pm
    In Exchange Server 2010 there is a useful feature that allows an administrator to configure the sent items behavior for shared mailboxes. For example, this feature can be configured to automatically store emails sent from a shared mailbox in the Sent Items folder of the shared mailbox itself, rather than the Sent Items folder of the person who actually sent it. This is quite important to some organizations and certainly makes it easier to find a sent item for a shared mailbox instead of needing to hunt down the sender using mailbox audit logging. This sent items control is unfortunately not…
  • Outlook for iOS and Android Gets Updated with Support for PIN Policies

    Paul Cunningham
    17 Feb 2015 | 2:58 am
    Microsoft has shipped an update for Outlook for iOS and Android that includes support for device PIN policies. The new version number with this feature for both iOS and Android versions is 1.0.4. Lack of support for PIN policies was one of the major criticisms of Outlook for iOS and Android when it first shipped. Basically the application would successfully connect to Exchange or Office 365 if the mobile device policies required a PIN, even when the device itself had no PIN. In effect it was ignoring the mobile device policies set by the organization. This caused some organizations to…
  • How to Fix a Failed Database Content Index for Exchange Server 2013

    Paul Cunningham
    15 Feb 2015 | 4:34 pm
    Note: this tip applies to Exchange Server 2013 Mailbox servers that are not members of a Database Availability Group. For failed content indexes on DAG members refer to this article. On an Exchange Server 2013 server you may encounter failed content indexes that are preventing end users from being able to run searches in OWA and Outlook. A failed content index will be visible in the output of Get-MailboxDatabaseCopyStatus: [PS] C:\>Get-MailboxDatabaseCopyStatus * | ft -auto Name Status CopyQueueLength ReplayQueueLength LastInspectedLogTime ContentIndexState ---- ------ ---------------…
 
  • add this feed to my.Alltop

    Socialcast | Enterprise Social Network Platform

  • Feature Updates: February 2015

    Samantha Lee
    28 Feb 2015 | 11:59 am
    This month, we’re releasing the last wave of our External Contributors enhancements (for now!). If you haven’t used this feature, we highly recommend trying it out in your community today. External collaboration with customers, vendors, partners, and contractors in a secure and private manner is vital to getting work done in the modern workplace, and a major reason why we’ve invested in enhancing our External Contributor feature. Many Socialcast customers are already leveraging this feature to foster a virtual, collaborative workspace with people outside of their organization. These…
  • Socialcast + Workday: HR’s Dream Come True

    Inna Fabrikant
    25 Feb 2015 | 2:38 pm
    With 2014 in our rearview mirrors, many workplace conversations are turning to performance reviews. Employees are racking their brains trying to document all of their accomplishments over the past 12 months, and people managers have the equally daunting task of acknowledging the successes of all of their direct reports. At VMware, we’ve developed an integration between Socialcast and Workday that is helping us to alleviate these very real pain points, and save countless man hours in the process. By integrating our 18,500-member Socialcast community with our HR platform, we’ve made it easy…
  • Placeholder polyfill for IE < 10

    Jason Moon
    19 Feb 2015 | 10:56 am
    Placeholders for old IE The placeholder attribute is a great way to provide some hint text to help users as they’re filling out your form, or as a complete replacement for traditional headers/labels that describe each field in a form. But, since it’s not supported in Internet Explorer 9, you can’t use placeholders without a polyfill, otherwise those old IE users won’t know what each field is. In this article, I’ll describe how you can create a placeholder polyfill which will provide the exact same experience that you’d get with the placeholder attribute in…
  • Feature Updates: January 2015

    Samantha Lee
    28 Jan 2015 | 1:31 pm
    The Socialcast team is proud to introduce the highly anticipated ‘Share’ and ‘Skills Finder’ feature this month. We are also continuing to enhance our External Contributor feature from both a usability and administrative perspective. Read more about our updates for January* below: 1. Share Interesting or important posts within the Stream can stir up lots of conversation, and sometimes you may want to continue that dialogue amongst a different network of colleagues, such as your followers, a specific group, or an individual. With our new “Share” feature, users can…
  • Feature Updates: December 2014

    Samantha Lee
    30 Dec 2014 | 2:03 pm
    To close out 2014, we have some great feature additions and enhancements, including a Town Hall Calendar integration and updates to our External Contributor feature. Collaborating with vendors, contractors, or customers in a secure and private setting couldn’t get easier. Check out Socialcast’s newest updates for the month of December* and let us know what you think! 1. Town Hall Calendar Integration Town Halls are a great way to bring executives and employees together in a moderated, real-time conversation inside your Socialcast community. Regardless of the topic, a Town Hall would…
  • add this feed to my.Alltop

    Panorama Consulting Solutions

  • Sundance Helicopters Announces Implementation of Ramco Aviation Software

    Ramco Systems
    5 Mar 2015 | 12:04 pm
    Ramco to manage flight and maintenance operations for its fleet of 28 tour helicopters Sundance Helicopters, the longest running helicopter tour operator in Las Vegas, Nev., announces the implementation of Aviation Maintenance Repair and Overhaul (MRO) solution developed by Ramco Systems, to manage flight and maintenance operations for its fleet of 28 tour helicopters. “Ramco is an easy to use, agile solution for managing the flow of information and data,” said Mr. Jay Francis, President, Sundance Helicopters. “We look forward to fully integrating this program with our existing…
  • YouTube: Why Six Sigma is Important During ERP Implementations

    Panorama Consulting Solutions
    5 Mar 2015 | 6:28 am
    Hosted by January Paulk, Director of Client Services at Panorama Consulting Solutions, this webinar clip will explore why Six Sigma is an important part of ERP implementation success. The full webinar recording is available here: Six Sigma Quick Hits. For more YouTube videos and webinar clips, visit our YouTube Channel.
  • Epicor Unveils New Version of Epicor BisTrack

    Epicor Software Corporation
    4 Mar 2015 | 10:09 am
    Update Aimed at Simplifying Complex Lumber and Building Materials Operations Epicor Software Corporation, a global leader in business software solutions for manufacturing, distribution, retail, and services organizations, today announced an update to the Epicor BisTrack business management solution for lumber and building materials (LBM) dealers and distributors. Epicor BisTrack version 4.5 is now available in North America and includes over 1,100 improvements that simplify the management of a LBM business, including product batches, sub-assembly to manufacturing and scheduling kits, new…
  • Is Your Enterprise Software Strategy Hurting Your Bottom Line?

    Eric Kimberling
    4 Mar 2015 | 3:04 am
    Have you ever considered that your enterprise software strategy may be hurting your business more than it is helping? Most of us focus on the potential business benefits of leveraging enterprise systems, but few consider that we may be undermining our more noble intentions. With all the industry hype around various types of ERP and CRM systems in the market, perhaps this isn’t such an odd question after all. CIOs and CFOs are often lured into making large software purchases without having a clear direction or reason for doing so. A compelling quarter-end financial incentive from a software…
  • Tuesday Poll: What system is your new ERP replacing?

    Panorama Consulting Solutions
    3 Mar 2015 | 9:33 am
    According to our 2014 ERP Report, of all the ERP systems that were purchased by organizations, 43% replaced an out-of-date ERP solution, 20% replaced a non-ERP system, 17% replaced a homegrown system, and 3% replaced a paper-based system. What system is your organization’s new ERP software replacing? Take a moment to vote in our poll and then check back to review the overall results. Note: There is a poll embedded within this post, please visit the site to participate in this post's poll.
  • add this feed to my.Alltop

    brenda michelson

  • Informing the pursuit of digital era ambitions and challenges

    brenda michelson
    9 Feb 2015 | 10:13 am
    I never intend to halt my public writing. It just happens. A client invites me to work on interesting problem, which can lead to another interesting problem or client, and before long only the crickets remain here. During this latest, much prolonged, cricket chorus I’ve been helping clients pursue digital agenda items. It is critical to digress for a moment to mention: there is no one-size-fits-all digital agenda, nor is there an all encompassing digital solution. The digital agenda of any given organization (or individual) will depend on ambitions and challenges, as enabled or…
  • Want better answers? Ask better questions.

    brenda michelson
    27 Jan 2015 | 12:12 pm
    Some years ago, I was engaged in a discussion with leadership peers on tackling a particularly challenging issue that seemingly had no answer to satisfy the trifecta of ambitions, resource constraints and ability to execute. We’ve all been in this meeting. You circle until one of two things happens. Some person or faction gives in, by scaling back the stated ambitions or pouring money into the constraints. Or, time runs out and you adjourn with the promise to think it over, independently. Forgotten, the minute another fire crosses your threshold (or screen). Occasionally, something else…
  • Link: Why Nordstrom’s Digital Strategy Works (and Yours Probably Doesn’t) – HBR

    brenda michelson
    15 Jan 2015 | 7:10 am
    From the esteemed Jeanne W. Ross on studying customer obsessed, digitally ambitious Nordstrom: DON’T: Only a small percentage of companies will gain competitive advantage from [social, mobile, analytics, cloud, and internet of things] SMACIT technologies. Those that do will focus less on the individual technologies and more on how they rally all those technologies, in unison, to fulfill a distinctive purpose. We don’t mean a generic, high-concept purpose like “generating shareholder value.” Instead, we mean something much more down-to-earth – a strategic focus that directs their…
  • Connective thinking is rare, crucial – 1959 Essay by Isaac Asimov on Creativity

    brenda michelson
    21 Oct 2014 | 12:46 pm
    Connective thinking ability cited as key trait in newly published Isaac Asimov essay on Creativity: But what if the same earth-shaking idea occurred to two men, simultaneously and independently? Perhaps, the common factors involved would be illuminating. Consider the theory of evolution by natural selection, independently created by Charles Darwin and Alfred Wallace. There is a great deal in common there. Both traveled to far places, observing strange species of plants and animals and the manner in which they varied from place to place. Both were keenly interested in finding an explanation…
  • Links: Making the case for polymaths

    brenda michelson
    17 Mar 2014 | 12:59 pm
    Not everyone can be a specialist, and that’s a good thing. Four good sources on why we still need polymaths (generalists, versatility) in an age of increasing specialization, and complexity. For natural polymaths, check out the bonus link on Maya Angelou, and then proceed as wired. THE LAST DAYS OF THE POLYMATH | More Intelligent Life “The question is whether their loss has affected the course of human thought. Polymaths possess something that monomaths do not. Time and again, innovations come from a fresh eye or from another discipline. Most scientists devote their careers to…
 
  • add this feed to my.Alltop

    Firstpost » Biztech

  • Mobile operators should take a leaf out of OTT service providers’ book for future growth

    FP Staff
    5 Mar 2015 | 1:53 am
    ABI Research believes the struggles of mobile operators will become more intense, as worldwide capital expenditure and operating expenditure grow due to 4G services while average revenue per user (ARPU) is in continual decline. The post Mobile operators should take a leaf out of OTT service providers’ book for future growth appeared first on Firstpost.
  • How does IoT impact your information management strategy?

    FP Staff
    4 Mar 2015 | 11:17 pm
    The opportunity of the Internet of Things (IoT) has everything to do with data. By distributing and diversifying data, IoT architectures will dramatically impact analytics, stakeholders and infrastructure. The post How does IoT impact your information management strategy? appeared first on Firstpost.
  • Telecom & IT minister reveals 38,000 cyber fraud cases reported in four years

    FP Staff
    4 Mar 2015 | 9:11 pm
    According to a report, as many as 37,721 cyber fraud cases involving Rs 497 crore have been reported by the RBI and CBI in the last four years. Telecom and IT minister Ravi Shankar Prasad informed Lok Sabha about this issue. Several cyber attack techniques are used in engineering these crimes and are normally reported […] The post Telecom & IT minister reveals 38,000 cyber fraud cases reported in four years appeared first on Firstpost.
  • IBM buys AlchemyAPI to boost Watson computing unit

    hidden
    4 Mar 2015 | 8:48 pm
    AlchemyAPI is a startup selling software that collects and analyzes unstructured text and data in ways big enterprises, website publishers and advertisers find useful. The post IBM buys AlchemyAPI to boost Watson computing unit appeared first on Firstpost.
  • Sponsored: What enterprise IT should learn from the Cricket World Cup 2015

    Nagaraj G N
    4 Mar 2015 | 3:29 am
    Many companies today are plugged into the information super highway with their ears to the grid and are keenly listening to everything that is being said... The post Sponsored: What enterprise IT should learn from the Cricket World Cup 2015 appeared first on Firstpost.
  • add this feed to my.Alltop

    OSS Line

  • Cerillion Acquires netSolutions – Geospatial Network Inventory

    J. Pullen
    3 Mar 2015 | 12:53 pm
    Cerillion Technologies, a leading provider of billing, charging and customer management systems, has acquired netSolutions, a geospatial location network inventory business, from Ubisense Group plc for an undisclosed fee. Cerillion expect this acquisition will enhance their BSS/OSS portfolio, enabling it to address the end-to-end service management needs of next generation networks, as well as extending its reach into other industry verticals. The netSolutions product suite comprises netAssign, netCapacity, netBusiness and netWireless, providing a range of network asset management solutions…
  • MYCOM Goes Next Gen at MWC15

    J. Pullen
    3 Mar 2015 | 12:50 pm
    At MWC15, MYCOM has just announced new automation and analytic products. Virtualization? Tick. Multi-everything? Tick. Next Generationiness? Tick. MYCOM OSI ProActor is a Next Generation Automation & Orchestration solution that addresses the challenges of growing network complexity – in the light of VoLTE, LTE-A, HetNets, M2M/IoT, and NFV/Virtualization – by automating CSP Operations and Engineering processes based on best-practice business policies. ProActor can increase the speed/frequency of essential activities, accelerate issue identification and resolution, reduce manual…
  • Telkomsel Deploys Ericsson OSS

    J. Pullen
    3 Mar 2015 | 12:36 pm
    Ericsson has announced that it has been selected by Telkomsel for a comprehensive OSS transformation that will help the operator meet new customer demands and efficiently manage rapid network growth. Telkomsel, the largest mobile operator in Indonesia, will deploy a broad range of Ericsson software solutions. Paulus Djatmiko, Vice President Network Operation Management, Telkomsel, says: “As we grow our network to address fast-evolving mobile trends and capture new opportunities, it is imperative that we move with speed and efficiency. Our latest work with Ericsson ensures that as we…
  • Juniper Networks and Amdocs Showcase Virtualized CPE

    J. Pullen
    3 Mar 2015 | 12:34 pm
    Juniper Networks and Amdocs are showcase an automated virtualized customer premises equipment (vCPE) solution to meet enterprise customer demands for new, user-defined services.  Available today, the vCPE solution, which leverages Juniper Networks vMX router and vSRX firewall, enables service providers to quickly introduce a broad set of services for their enterprise customers using virtual CPE. In addition, the joint offering also utilizes Juniper Networks Contrail Networking, an open SDN solution for cloud and network functions virtualization (NFV). The Amdocs Network Cloud Service…
  • What to See at MWC 2015

    J. Pullen
    26 Feb 2015 | 4:02 am
    The awesomeness and craziness that is MWC is just around the corner. OSS Line asks some friends for their advice on what to see in Barcelona, inside and out of the exhibition halls… Mobile World Congress, held in Barcelona, is probably the biggest telco event in Europe. It’s huge in terms of scale, scope and the time and money invested by exhibitors and attendees. As a comparison, Europe’s big OSS-centric event TMF Live attracts around 4000 attendees. Barcelona’s population will be swollen by 85,000 attendees visiting MWC. Why Go to MWC? MWC enjoys attention from the mainstream media…
  • add this feed to my.Alltop

    Ultra Consultants

  • Cre8tive Technology & Design: Making Epicor History

    Rob Henry
    5 Mar 2015 | 9:15 am
    A few weeks ago, Ultra held a vendor briefing with Cre8tive Technology and Design, an Epicor Preferred Partner based out of San Diego. In a previous Ultra blog post, we provided an overview of Cre8tive Technology and Design, profiling their growth and plans, industry experience, and corporate values. Today’s post covers more details on the company’s services, how Cre8tive differentiates itself, and how the company makes Epicor history as a full-service partner. End-to-End Project Services Cre8tive is one of the few Epicor partners with end-to-end service offerings, which allows them to…
  • Life Sciences ERP with QAD: A Webinar for Life Sciences Manufacturers

    Rob Henry
    3 Mar 2015 | 9:40 am
    Recently Ultra profiled QAD for their growth plan and Cloud ERP strategic vision, in advance of their participation in our Automotive Industry ERP Webinar Series held in early February 2015. QAD’s Cloud offerings and experience extends into Life Sciences ERP, with an environment that has standard operating procedures for FDA and current good manufacturing practices (cGMP) validation. Ultra’s experience with business process improvement for medical device clients was the subject of one of our late 2014 blog entries, “Top Things to Consider When Looking for the Best Solution for Medical…
  • The Maturity Matrix Continued: Receiving and Inspection

    Dennis Gilhooley, Jr.
    24 Feb 2015 | 8:57 am
    In earlier blogs we introduced the Ultra Operations and Warehouse Fulfillment Maturity Matrix and reviewed Material Handling & Putaway. This next post in the Maturity Matrix series focuses on Receiving and Inspection. The basic function of the receiving and inspection process is to take responsibility for the inbound material, validate the material received to the purchase order, check for damage, and complete required material inspections. Dock Management Docks in today’s warehouses must be more flexible and support a variety of receipts that are coming in at a faster rate, in greater…
  • Project Management and Group #3: The Executing Process Group

    Dennis Gilhooley, Jr.
    19 Feb 2015 | 7:57 am
    The Project Management Body of Knowledge (PMBOK) states “The Executing Process Group consists of those processes performed to complete the work defined in the project management plan to satisfy the project specifications.” This group integrates and coordinates people and other resources to carry out the project management plan. The processes below make up the Executing Process Group. Direct and Manage Project Work The Direct and Manage Project Work process belongs to the Project Integration Management knowledge area. Some outputs of this process are deliverables, work performance data,…
  • Everything You Need to Know About Epicor Partner Cre8tive Technology and Design

    Analiese Trimber
    17 Feb 2015 | 7:24 am
    Founded in 2005 by Aaron Continelli, Cre8tive Technology and Design is an Epicor Preferred Partner headquartered in San Diego. Ultra had the pleasure of meeting recently with Aaron and COO Mary Arnhart to learn everything there is to know about Cre8tive. Cre8tive has an interesting storyline right from the beginning. When asked the purpose of the “8” in the company name, Aaron shared his passion for NASCAR racing and affinity for #8, Dale Earnhart, Jr. Earnhart raced the #8 car from his rookie year in 2000 until 2007. Aaron and Earnhart happened to know each other, thus Cre8tive was born.
 
  • add this feed to my.Alltop

    The Investing Edge

  • Democratizing Analytics with RapidMiner

    Luke Burns
    18 Feb 2015 | 1:35 pm
    Today I’m happy to announce Ascent’s newest portfolio company, RapidMiner. In leading the $15M Series B financing of RapidMiner, we are following through on an investment theme I’ve been pursuing for several years – bringing advanced analytics to the business analyst. As we’ve all seen, there’s been tremendous hype around big data, but unfortunately many companies have been left disappointed as they have struggled to derive real value from the data they are collecting. The core of the problem is a shortage of data scientists capable of delivering the analyses required to…
  • Retro Chic: The IoT Means Hardware Engineers Are Cool Again

    Eric B. Schultz
    22 Jan 2015 | 1:23 pm
    In the beginning there were Military Engineers who built bridges and designed fortifications. When peacetime came, some headed to dig in the mines and others to build roads, canals and cities. For the first 50 years of the 19th century, engineers came in five basic flavors: Military, Mining, and Civil, and with the rise of steam, Naval and Railroad. In those same 50 years, however, the world began to mechanize–everything from cotton gins and reapers to textile mills and firearms. The force in this new world was the “mechanic,” a craftsman, businessman and America’s first…
  • Why the Northeast is Best for Enterprise IT Investing

    Matt Fates
    8 Jan 2015 | 6:31 am
    A recent look at 2015 innovations trends by IDC shows significant growth in nearly every area impacting enterprise IT – including cloud, big data and analytics, mobile and internet of things. In fact, cloud services, a hotbed of activity in 2014, will likely accelerate in 2015 with $118 billion in spending on the greater cloud ecosystem. As the topic rises to a new level this year and the industry approaches a massive tipping point born out of necessity and opportunity, investors are continuing to pour money into new startups.  Regionally, the west coast has long had a healthy share of…
  • How the Internet of Things Can Improve Environmental Sustainability

    Christopher W. Dick
    17 Dec 2014 | 1:49 pm
    I’m a graduate of the College of Agriculture and Life Sciences at Cornell and sit on the board of Change is Simple, a non-profit devoted to educating the next generation to become thoughtful and aware of environmental issues and social responsibility. I also surf as frequently as possible, when I can find free time, literally immersing myself as often as I can in the power of nature. Lately, my personal interest in environmental sustainability has been intersecting with my professional interest in the Internet of Things, or IoT, where we are seeing a tremendous amount of new deal activity…
  • The new normal: Cloud, it’s not just early adopters anymore Part II

    Matt Fates
    16 Dec 2014 | 11:23 am
    In our last blog post , we referenced an IDG study suggesting that in the past two years, the percentage of enterprises with either applications or infrastructure running in the cloud has gone from just 12 percent to an enormous 69 percent. This post will discuss why. Business Insider recently reported that a gigabyte’s worth of storage on a hard drive cost more than $9,000 in 1993, but a mere 4 cents in 2013. In cloud computing, this is being called the “the race to zero.” As the level of usage and adoption rises and storage becomes cheaper, competition has skyrocketed causing massive…
 
  • add this feed to my.Alltop

    All Channels

  • Peeling Back the Layers of the Cloud Security Onion

    nwurst@skytap.com
    20 Feb 2015 | 8:08 am
    ​I had the chance to sit down with Lee Slaughter, Skytap's Manager of Information Security, to discuss security in the cloud, the efforts that make up a thorough due diligence when choosing a cloud provider, and how to keep up with external and internal threats to your business. Noel: Last year, Charles Babcock wrote a piece for InformationWeek on the list of the top 9 worst cloud security threats that was put out by the Cloud Security Alliance. As I read through them, I noticed that the threats were predominantly related to malicious insiders and outsiders, data breaches, denial of service…
  • No Crystal Ball Needed: Jez Humble Shares Trick to Predicting High IT Performance

    nwurst@skytap.com
    17 Feb 2015 | 10:16 am
    It didn’t hit me until after a second viewing of Jez Humble’s recent webinar with Perforce that his ways to predict high IT performance aren’t just a neat party trick; they’re absolutely essential. The days of bugs making it into production, distrust between departments, and delayed fixes and releases are becoming a thing of the past, at least among “high performers” of the world.And as the complexity of software grows year after year, being able to accurately predict success may be the only way to actually achieve it.Jez lists the following must-haves for anyone looking to…
  • A love letter from Cloud Dev/Test Labs to Service Virtualization

    nwurst@skytap.com
    12 Feb 2015 | 6:41 am
    In the spirit of Valentine's Day, here's a little love letter from "the Cloud" that originally appeared in our partner Parasoft's perspective guide to Service Virtualization. But we think it's especially appropriate now. Enjoy!​ - N.W., Ed. Dear SV, Hey, I know it’s been a while since we started being “a thing.” When we met, everyone said you were just mocking, and that I wasn’t real enough to make a living, with my head in the clouds. Yet, here we are, a few years later.  Service Virtualization, you complete me. As a young Dev/Test Cloud, I always wanted to try new things. And…
  • Recent Surveys Show DevOps Use on the Rise, but Confusion Remains

    nwurst@skytap.com
    9 Feb 2015 | 5:25 pm
    ​I recently poured over F5’s “The State of Application Delivery in 2015” and InformationWeek’s “2015 App Dev Priorities Survey” that they presented with Dr. Dobb’s. The similarity of their titles, and even their release dates made me wonder how unique each of their findings would be, and I challenged myself to flush out any interesting findings or patterns that emerged from their collective research.Both reports were really well done, and I would recommend them to anyone looking to see if your organization is on the right path of change, or to anyone who knows you’re not on…
  • A Resolution to Keep: Trimming Your SDLC Waste in 2015

    nwurst@skytap.com
    3 Feb 2015 | 1:28 pm
    Hats off to Parasoft’s Mark Lambert and our own Jason English for their recent webinar, “New Year's Resolution: Trim Your Waste to Accelerate SDLC Velocity.” Holiday-themed online content can often be found for a dime a dozen and sadly, the cuteness of a clever title often exceeds the quality of the media itself. But Jason and Mark put together an awesome presentation that compares the importance of trimming our software development waste to the need to trim our waist after the all-to-common gorging that many tend to participate in to celebrate the end of another year. I do find it…
Log in