There has been a bit of confusion around the applicability of cloud computing
in the enterprise space. Recently, the question has come up as to where/
when/ how/ what cloud applies to enterprises and the challenges that
enterprises face when … Continue reading →
Many in the technology world focus on the technology itself without
significant consideration of the data or more importantly, the information.
When you dig a bit deeper, the real reason, the business reason we exist is
about the data.
Just presenting data, however, it not enough. When building applications to
present data, we need to consider how to best present information. And with
information, there is a core principle to follow. I call it ‘rIrTrPrM’.
rIrTrPrM is an acronym of sorts:
rI = right Information: Ensuring that the right information is presented.
Over the past few months, I’ve had a chance to spend time with the HP
product teams. In doing so, it’s really opened my eyes to a new HP with a
number of solid offerings. Two solutions (CloudSystem and Moonshot) really
caught my attention. HP CloudSystem HP’s CloudSystem Matrix provides a
management solution that manages […]
As we prepare to celebrate the start of a new year I can’t help but look
back on the past 10 years and contemplate what the next year (and decade) has
to offer. Many will not miss 2009, but the decade of the new millennium
brought a new wave of technologies.
Standing at the threshold of 2010, I can’t help but wonder where our focus
in technology will turn. In the past 10 years, we’ve had the fortune of
many, many technology advances. Today, most everyone has a cell phone…and
it seems most have traded a cell phone for a smart phone the likes of an
iPhone or Blackberry. To “Google... (more)
I had the opportunity to write a post for SecureWorld Post’s site.
The role Information Security (InfoSec) is nothing new to many organizations.
InfoSec’s methods and best practices are well understood. Note I am
distinguishing between being understood and well implemented. As technology
and methods make incremental changes, InfoSec processes evolved accordingly.
And best practices become more widely understood. That is all well and good.
Then Cloud Computing comes along. Without getting into the nuances what it is
and how long it has been around, it is significantly changing the I... (more)