Uncategorized

Last week I wrote about how software appliances can reduce sales friction. Today I want to elaborate on how appliances make this possible. Software and virtual appliances package your application in a compact, portable form factor that greatly reduces the complexity of installation and configuration. Since most applications don’t need the full breadth of today’s…

+ read more

Jan 31, 2011
4:15 pm
Reads:
2,377
Score:
Unrated

As we kick off 2011, many ISVs are looking at the business plans they thoughtfully crafted last fall and are now building out detailed plans and tactics to hit those numbers. But if you’re like most software providers we talk with, you’re now wondering just how you will hit those growth targets. Sure, the economy…

+ read more

Jan 26, 2011
3:51 pm
Reads:
2,544
Score:
Unrated

As CIOs are all too aware, business users are turning to SaaS and cloud applications in droves. No longer are they willing to make a purchase requisition and wait months for a new server to be acquired to support the software they need. They simply pull out their business credit card, and voila, in a…

+ read more

RichardWhitehead
Jan 18, 2011
3:40 pm
Reads:
2,291
Score:
Unrated

Summary: Infrastructure as a Service (IaaS), Software as a Service (SaaS) or Other. We asked attendees to the ‘Lessons from the Experts: Creating a Cloud-Ready Security Program’ web-cast which services they currently received via cloud. Based on our conversations with cloud users, we believed IaaS and SaaS to be the primary services delivered via the…

+ read more

David Shephard
Jan 18, 2011
1:45 pm
Reads:
3,967
Score:
Unrated

On Wall Street, a millisecond delay in compute time could alter the selling price of a share. This may not seem like a big deal, but it’s a huge loss when you’re transacting millions of shares. To gain maximum performance, banks run high-demand transactions on physical servers. But how do they take advantage of the…

+ read more

RichardWhitehead
Dec 9, 2010
2:48 pm
Reads:
2,553
Score:
Unrated

I know this probably sounds like sacrilege coming from a technology vendor, but new technology doesn’t always equate to improved productivity. That’s particularly so when it comes to mergers and acquisitions. In addition to the business stress involved with merging together two organizations, there are looming questions about which whose technology will remain in use….

+ read more

RichardWhitehead
Nov 23, 2010
2:35 pm
Reads:
5,947
Score:
Unrated

I’m going to start this one by throwing out some numbers.  In particular, these are the number of servers owned by the following organisations that have publicly disclosed such information (this is taken from the Data Center Knowledge post “Who has the most servers?” and was recently updated). Intel: 100,000 servers (company, Feb. 2010) OVH: 80,000…

+ read more

haf
By: haf
Nov 19, 2010
3:30 pm
Reads:
4,639
Score:
Unrated

As I was speaking with a client earlier this week about intelligent workload management (IWM), he suddenly had an epiphany. “Intelligent workloads are like having a license plate on your car”, he exclaimed. And he’s absolutely right. When we drive, we have all sorts of identifying information about our vehicle and how it can be…

+ read more

RichardWhitehead
Nov 9, 2010
1:45 pm
Reads:
9,043
Score:
Unrated

Intelligent workloads are infused with knowledge about who is consuming them, what access rights each individual has, who is the authoritative owner of the content and the best place for that workload to reside to run successfully. Further, intelligent workloads know not only what they are designed to do, but the level of urgency of…

+ read more

Nov 3, 2010
1:40 pm
Reads:
1,898
Score:
Unrated

Intelligent workload management (IWM) provides a highly efficient way to build, secure, manage and measure workloads. This isn’t going to happen overnight, however. There are several hurdles to overcome first. Recognizing the problem Like with any major business shifts, the first step is admitting there’s a problem to fix in the first place. If, for…

+ read more

RichardWhitehead
Oct 19, 2010
1:20 pm
Reads:
9,004
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow