Hybrid Cloud Cookbook: Avoiding Automation Pitfalls
Harri Kallioniemi This post is part of a series of Hybrid Cloud ‘cookbook’ blogs that discuss the key concepts of building and running a true hybrid cloud environment and delivering IT-as-a-Service....
View ArticleE5 – The Flies and the Hornet – Insect Bites
A cool breeze whisked through the window causing the scrolls on the Wizard’s desk to rattle and tremor. The wise man shifted a large scroll to weigh down some loose papers. He reallocated a heavy...
View ArticleSlow Drains are impacting your SAN!
If you work with Fibre Channel on a regular basis and have come to depend on its excellent performance attributes, you might be surprised to learn that many of the cases handled by our SAN team in...
View ArticleExchanging eTMF Content Accurately and Efficiently
Facilitating information sharing and enabling collaboration is critical in helping to drive efficiency across the organization. This can be especially true when considering key business processes that...
View ArticleDoes DDoS Takedowns Really Change Extortion Rules of Engagement?
The proliferation of account takeovers, DDoS attacks, ransomware and outright cyber extortion targeting individuals and institutions is not only disrupting the hack attack landscape, but also raising...
View ArticleAh, the points of view of others = golden.
Wanting to understand why hardware and SDS are independent, and yet why they are linked? Why not everyone is best served with a “DIY”model to SDS? (BTW – customers I talk to using SDS + COTS at...
View ArticleDid a Lack of Resiliency Cost the Patriots a Super Bowl Trip?
David Edborg This year’s AFC Championship game was one of the most memorable in years. Two of the league’s top teams with two quarterbacks destined for the Hall of Fame slugging it out for the...
View ArticleThe Role of Tor in Cybercrime
In a previous blog, we explored the layers of the deep web, and briefly explained how anonymity technologies (such as Tor) facilitate illegal, underground commerce. This post aims to explain the...
View ArticleCustomers are Captivated by Captiva
In one of my previous blogs, I shared how Documentum customers are doing more, spending less and transforming their businesses with their ECM platform, a result of our continued focus on addressing...
View ArticleThe integrated digital healthcare revolution – Helping life sciences find...
This is the third post in my series about the global shift to integrated healthcare. Last time I wrote about how insurers are being empowered by mobile and wearable device data. This week I’ll be...
View ArticleBeyond the Login: Web Behavior Analytics Helps Retailers Stop Fraud
In a world of scammers, fraudsters and bad actors, there are two immutable rules thoroughly entrenched in the consciousness of IT professionals trying to stop them. Rule 1: If there is something to...
View ArticleJOBS! (and a treatise on restructuring, and hiring)
It is a FACT that right now the infrastructure business in a state of turmoil and disruption. Anyone that thinks they are immune (in large businesses, or in startups) is delusional. There are...
View ArticleIs Canada really better at Cyber?
The 2016 Cyber Readiness Study of Canadian Organizations was published today by Scalar Decisions, a solution provider based in Toronto, and RSA partner. Scalar was recently rated #1 for Security...
View ArticleDoing Business with European Citizens? The time has come to Prepare for the...
The European Union General Data Protection Regulation (GDPR) will bring big changes for organizations that handle information of European citizens. The scope of the GDPR not only encompasses European...
View ArticleTime to track our issues again…feels like Groundhog Day
In the 1993 movie, Groundhog Day, Phil (Bill Murray), an arrogant weatherman, is out to cover the annual emergence of the groundhog from its hole. He gets caught in a blizzard that he didn’t predict...
View ArticleHybrid Cloud Cookbook: IT Service Catalog Design
Harri Kallioniemi This blog is part of the Hybrid Cloud ‘cookbook’ Series that touches the key concepts of building and running true hybrid cloud and IT-as-a-Service (ITaaS). In this blog I’m touching...
View ArticleThe Wheel of Suffering: Don’t Be a Jerk to Your Future Self
Findings. Defects. Whatever you call them, your organization’s security posture is full of them. At RSA, we use the umbrella term “Issues Management”. So many organizations handle their...
View ArticleMaking Waves: Health IT Dives Into Data Lakes
The healthcare industry is changing – fast. The U.S. Department of Health and Human Services says 30% of Medicare payments need to shift from volume-based to value-based care reimbursement models by...
View ArticleApplauding the President’s Cybersecurity National Action Plan
“The Cybersecurity industry is fundamentally broken… and the problem is not technology, but mindset.” These recent remarks by RSA President Amit Yoran have been echoed around the country and in the...
View ArticleVirtual SAN 6.2 launch and perspectives!
A couple of quick trite observations, and then on to business :-) My friends, colleagues at VMware are great technological serial innovators, but are can sometimes stumble at product naming and...
View Article