Ransomware On The Rise: Is Your IT Organization Ready?

One of the leading healthcare institutions fighting the COVID-19 scourge, the University of California at San Francisco, was shaken down...

Crush every IT audit through Enterprise Technology Management

The annual or semi-annual IT audit is about as enjoyable as a root canal. Counting devices and licenses. Checking on...

Ready for Real-Time Compliance?

What’s even more challenging than periodic compliance? Real-time compliance. Many IT teams and CIOs view System and Organization Controls (SOC)...

Connecting IT Management to Workflows

IT Infrastructure and workflow are connected. Enterprise technology does not work as a series of stand-alone items. No one uses...

Workflows and the rise of true holistic integration

Every business runs on workflows. Whether you process mortgages, manufacture machinery, provide health care, or nearly anything, your business output...

Enterprise Technology Management and Cybersecurity

We are living in the era of the fully connected enterprise, and of near-constant cybersecurity threats. CTOs and CISOs have...

How IT audits can reduce your attack surface

For many CIOs and their IT teams, audits are a painful inconvenience. Traditionally audits involved building detailed spreadsheets with data...

How ready are you for a hybrid IT environment?

Working in the enterprise IT domain has always been interesting; regardless of how prepared you think you are, there is...

Five critical endpoint security issues addressed by Enterprise Technology Management

Endpoint security is and will continue to be front and center in the scheme of things that keep your IT...

The five biggest threats to Cloud Security

As more employees and business processes shift to a Cloud-based model, a whole new raft of potential risks surface, many...

Four ways to uplevel visibility into your potential attack surface

Ransomware (everyone’s least favorite software) is entering a new phase. As the world drags itself out of the Covid swamp...

Enable cybersecurity through better technology management

Security has always been a top-line consideration for every enterprise, and given the direction in which the world seems headed...

Getting asset lifecycle management right from the start

What is meant by asset lifecycle management? IT asset lifecycle management is the systematic process of purchasing, securing, monitoring, maintaining...

How to manage inherent endpoint risk in a hybrid IT environment

For many years, IT’s job in terms of managing endpoint risk was complicated but straightforward; ensure any endpoint device (primarily...

Comprehensive Visibility – The Starting Point for Managing and Securing Assets in a Hybrid IT Environment

IT assets have historically been categorized as hardware – old school hardware (PCs, servers, etc.). That definition has been evolving...

Ten best practices for managing technology assets

As the pandemic continues to linger and disrupt, enterprises are settling into a new operational model that has work-from-anywhere as...

Managing endpoints in an increasingly dynamic IT environment

Endless complexity and the role of IT The management of mobile devices has become far more complex due to variables...

The evolution of ITAM in a hybrid IT ecosystem

How Enterprise Technology Management helps you dominate the “new normal” Managing information technology assets (ITAM) as a discipline has been...

The rise of true holistic integration

Every business runs on workflows. Whether you process mortgages, manufacture machinery, provide health care, or nearly anything, your business output...

Connecting the dots on IT Asset Management

Dot 1: IT Asset Management as a discipline has been around for quite a while. As an industry trend it is...

The sudden rise of the new normal

The requirements associated with on-boarding a new employee can be a very smooth experience, somewhat uneven, or a complete cluster...

Best practices for IT Asset Management and the remote workforce – Part 2

In the last blog post, we talked about best practices for dealing with a shifting workforce as the entire economy...

Best Practices for IT Asset Management and the remote workforce – Part 1

The speed and breadth of the Coronavirus pandemic have caught pretty much everyone off guard. The result across both the...

The critical role of IT Asset Management in adding value to the enterprise

Information Technology has always been the core enabler of modern business. Regardless of what that business actually delivers (energy, health...

Right-Sizing Your On-Demand Infrastructure for Payment Processing in Any Cloud

In an ideal world, consumer-facing online businesses would deliver a consistent, efficient, and secure payment processing experience to their customers...

High-Speed Transaction Processing with No Compromise on Fraud Detection

Transaction processing in today’s global payments networks is what essentially powers the global economy. The framework for transaction processing has...

Open Banking and the Application of In-Memory Technologies

The Open Banking initiative, also referred to as PSD2 (Payment Services Directive), is a textbook example of streaming technology applied...

Stream processing and retail banking

Stream processing refers to real-time management of data entering a banking system (or any information system, actually) at high speed and...

How in-memory computing powers artificial intelligence

Artificial Intelligence (AI) as a concept has been around since the development of computational devices, as early as the creation...

5G and In-Memory Deliver on the Promise of Genuinely Cool Technology

Another massive, transformative technology wave is about to hit, and while this won’t be quite as overt as some of...

A Business Level View of Kubernetes, Cloud Migration and In-Memory Technologies

There’s a trio of buzzwords that are starting to spend more time in proximity to each other, and are also...

Why the CAP Theorem is relevant to a business person

The data we continuously generate and use operates on an incredibly vast scale (think of Google, Amazon, Facebook, that level...

Executing Machine Learning at Scale and Speed

One of the current hot topics driving the in-memory domain is the potential associated with the application of Machine Learning...

How Streaming Microservices Can Advance Your Entire IT Environment

Repost from Hazelcast, Streaming microservices. Sounds pretty cool, right? And like a lot of new technologies, it actually is, and...

The business case for In-Memory Technology

Repost from Hazelcast. Any business that is expanding and leveraging transformative technologies, such as IoT or in-memory computing, is already...

In Memory Data Grid vs. In Memory Database

The technologies that are most present in our lives are often ones we don’t realize exist, (even within the IT...

Hazelcast accelerates IBM Cloud Private

In response to market forces that are both broad and deep, IBM has been moving deliberately and systematically to a...

What Is Stream Processing and Why Is It Important to Your Business?

Reposted from Hazelcast. Stream processing is a term that is becoming increasingly relevant to the technical side of any company...

Transformational Drivers and In-Memory Data Grids

Reposted from Hazelcast:  One of the rewards of a career in technology is experiencing first hand the constant, pervasive, game...

Big Data Concerns and Enablers

The concept of “Big Data” surfaced in 2005, when it was first coined by O’Reilly Media, referring to the (then)...

Is blockchain-as-a-service the next big thing?

The next big thing in blockchain is, in fact, really really big. At least in terms of who’s driving the...

Using blockchain to bridge the gap

There has been a running battle for years between the advertising industry – driven by a vast, complex ecosystem, and...

Blockchain: Why boring can be sexy

While there is a tremendous amount of noise around blockchain, it appears to be contained in a bubble. If you...

Blockchain : Whose identity is it anyway?

There is a rapidly growing array of potential use cases for applying blockchain outside of cryptocurrency. In my last blog...

The role of blockchain in enabling software lifecycles

Blockchain. Nearly anyone who spends time online has heard of it, yet very few people really understand what it does...

Why ITOM and DevOps are more critical than ever

We’ve reached the point where nearly every aspect of our lives are interconnected. Our homes, cars, offices, our commutes, practically...

Running towards the ITOM challenge

Continuous adaptability is what separates market leaders from cautionary footnotes. There is a rapidly accelerating confluence of deep, pervasive currents...

The cold/warm embrace of IoT

What drives adoption of IoT at the consumer level? Presumably convenience (easy to set up and use), enablement (delivers promised...

IoT and Security – Same as always, only more so.

Chuck Martin over at MediaPost recently wrote an article with some interesting insights on consumer perspectives on IoT. While there...

IoT – Am I pleased or frightened?

IoT has become a very noisy space recently; driven by the fact that a significant part of the operating framework...

IoT and the cheerfully oblivious customer

Functions within companies that service end-user needs have historically relied on their customer’s transactional data to determine interests, habits and...

How infrastructure convergence drives IoT

For those of us who have spent their careers in the technology space, having a long-term perspective helps to recognize...

Integrated Data is the Key for State Agencies to Become More Customer-centric

During the past few years, there has been considerable discussion and media attention about the impact of digital natives (Millennials...

How Data-Integrity Technology Can Help Create a Patient Health Timeline

For healthcare providers to deliver the best diagnosis and treatment for their patients, the data on which they rely must...

Your current discovery tool is not giving you what you need

Here is what you need to know Your current discovery tool is not up to the task – period. Discovery...

Five key barriers to IT/OT integration and how to overcome them

Operational Technology (OT) consists of hardware and software that are designed to detect or cause changes in physical processes through...

Answers to 8 essential questions about assets that should be in your CMDB

Your Configuration Management Database (CMDB) is continuously increasing in size and complexity, driven by an endless list of components that...

The future is closer than you think. Data is coming (and fast), how will you manage it?

What will you do when your job and the future of your company hinges on your ability to analyze almost...

Machine Learning is re-inventing Business Process Optimization

Machine Learning is a game changer for business process optimization – enabling organizations to achieve levels of cost and quality...

Optimizing Business Performance with People, Process, and Data

People are the heart and mind of your business. Processes form the backbone of your operations. Data is the lifeblood...

IT under attack: Data Quality Technology helps companies assess security vulnerabilities

In the wake of the most recent (May 2017) malware attack impacting computer systems around the world, company executives are...

Machine Learning and the rise of the Dynamic Enterprise

The term “dynamic enterprise” was introduced during 2008, as an enterprise architecture concept. Rather than striving for stability, predictability and...

How ITSM tools miss the boat on operational data management

For most companies, IT Service Management (ITSM) tools are the core hub for monitoring and managing the systems used to...

Why CMDBs are sexier than you think

Sexy may not be the first word that comes to mind when you think about your CMDB and the operational...

Data Integrity: the key to operational insights or the elephant in the room?

Throughout history, business has always struggled with the challenge of data accuracy and integrity. While there is clear operational and...

Why is IT Operational data important for IT?

Each day, with every customer transaction, employee task and business process, companies generate vast amounts of operational data that provides...

IT Management is becoming predictive – which is good, right?

Improvements in IT data quality and analysis tools have enabled IT management to spend less time looking into the past...

The downstream impact of IT data improvements

How well prepared is your organization for growth? What are the challenges to making progress? One often overlooked constraint is...

Is data management a thorn in IT’s side?

Modern business leaders depend on data – it provides insights into operational performance, customer needs, supplier risks, market opportunities and...

The rise of IoT, what should IT execs be most worried about?

The core role of IT executives is to drive strategic enablement by stewarding the information and technology resources of the...

What your ITSM vendors don’t want you to know about Discovery Technology

Are you comfortable with how your IT Service Management (ITSM) processes address the volume, diversity and rate of change present...

Benefits of Machine Learning in IT Infrastructure

During the next 5 years, machine learning is poised to play a pivotal and transformational role in how IT Infrastructure...

Securing the Internet of Things

This blog post, covering the Internet of Things, considers security challenges. Security has always been a high order concern in...

Information Technology, Operational Technology, and the Internet of Things

This blog has previously mentioned the relationship between IT Asset Management (normally under the control of IT) and Fixed Asset...

The two faces of the Internet of Things in the Data center

The ascension of the Internet of Things (IoT) will have two profound effects on data center operations. First, IoT techniques...

Uncovering the Internet of Things

The next few posts in this blog will focus on the Internet of Things. Often abbreviated as IoT, the Internet...

Insight through Data Quality

Five Steps to Improve Business Insight Through Data Quality Organizations generate phenomenal amounts of data every day. To avoid being...

Seven Characteristics that Define Data Quality

While many organizations boast of having good data or improving the quality of their data, the real challenge is defining...

Everything you need to know about Oracle and Java licensing

What You Don’t Know about Oracle and Java Licenses Could Cost You Millions A breaking story at the end of...

The difference between data quality and data integrity

Data Quality and Data Integrity Are Not the Same The difference between data quality and integrity is important to understand...

Implications of poor data quality in healthcare

Organizations are constantly challenged to maintain the right level of data quality. This is especially true in a risk-averse industry...

The interacting lifecycles: Service, Asset, and Technology Products

We have previously discussed the Asset lifecycle and its architecture. However, Asset is only one of four IT lifecycles: Application...

The Dimensions of Data Quality: Currency and Consistency

4th of a 4-part series Previous posts have provided an overview of data quality drivers and their associated dimensions. To...

The dimensions of data quality: completeness and duplication

A preceding blog provided an overview of the operational dimensions that are normally associated with data quality. To recap, these...

Things to ask IT during a merger or acquisition

Key topics to ask IT during an M&A As a follow-up to a previous post regarding IT’s role in a...

The role of IT in mergers and acquisitions

When organizations acquire or merge with another company, it is critical that they make informed decisions that will determine the...

The dimensions of data quality: integrity and accuracy

In the previous blog post, I provided an overview of data quality and its dimensions. To recap, its dimensions are:...

The Dimensions of Data Quality

Data quality is a broad topic, and the data management community has worked hard to dissect and define it so...

Managing the Data Lifecycle

In business, we rely on applications, services, and data to improve the efficiency and effectiveness of the organization. One of...

Mapping the Data Lifecycle

In business, we rely on applications, services, and data to improve the efficiency and effectiveness of the organization. One of...

Work in Process and Asset Provisioning

Let’s look upstream of your Configuration Management Data Base (CMDB)/Asset repository. How does the data enter the system? Think it’s...

Data Source Consolidation

Four Core Data Source Consolidation Considerations  Every organization depends on a range of data sources to support different operational initiatives...

Your friendly neighborhood data person

As digital transformation becomes mainstream and drives organizational growth, the enterprise information pipeline continues to expand, driven by a relentless...

The Role of Data Quality in Digital Business Transformation

Companies have always struggled to leverage data quality to the extent necessary to run their business at an optimal level...

Now IT is your problem (part 2 of 2)

One of the most interesting and successful aspects of ServiceNow and other IT service request management tools is the way...

How much is your bad data really costing you?

Every day employees spend more time than they should trying to find the best available data to make decisions. While...

Now IT is your problem (part 1)

What exactly do people mean when they say “IT”? The computers? The networks? The people who run them? That organization...

Automation enables you to stay ahead of the data deluge

Anyone reading this would probably agree that nearly all enterprises are in an endless struggle to maintain their operational data...

Quality data is the key ingredient to better business outcomes

Quality inputs are a core requirement for a quality output, and this is true for nearly any profession, regardless of...

No post found