Tag Archives: security

2015 MIT SDM Conference: “Systems Thinking for Contemporary Challenges”

The 2015 MIT Systems Design & Management Conference took place on October 6 & 7, 2015. The topic hooked me right away with its promise of “Systems Thinking for Contemporary Challenges”. The flyers added to the ‘doors-will-be-opened’ flavor by underlining that this would be about “A Whole Systems Approach to Product Design and Development”. I was ready. Continue reading

Advertisements

CIOSynergy – Conversations and Insights

CIOSynergy in Boston on September 24, 2015, was as usual compact, high-energy and insightful. About 150 CIOs attended the half-day event. Scott Shuster (BusinessWeek, ABC News, NPR) was the able and engaging guide and foil for the event. I joked with him later that his seamless connecting of IT ideas and probing questions probably merited an honorary CIO degree for him if such were offered. Continue reading

DEMO Traction: A day with the future-builders

In an overcrowded world of tech symposia and expos, I was somewhat skeptical of how “new” the NEW “DEMO Traction Enterprise” event (Boston, September 16, 2015) was going to be. What a pleasant surprise! The promised convergence of investors/26 startups/prospective customers/strategic partners did take place with its own flavor. While the event organizers’ proclaimed obsession with growth was evident, what stood out to me was not any “rah rah” but the thoughtfulness of the event. You got a clear view of where investors and entrepreneurs stand in today’s consumer and enterprise space for new technologies. Continue reading

Plan an Internet of Things Architecture in the Data Center

[Some of my comments have been included in TechTarget’s SearchDataCenter post on IoT by Alan R. Earls, December 2, 2014.  Earl’s article is also included in Modern Infrastructure: Internet of Things coming to an infrastructure near you]

The rapid development of IoT poses certain threats to the data center, like chaos and added storage demands. How do you plan for such a surge of new technology?  Read more…

Two Steps to Ensuring a More Successful Transition to the Cloud

[My post in IT Security Hub, November 17, 2014 and All Things Managed File Transfer, November 17, 2014]

The evaluations are complete and the decision has been made, a move to the cloud is in the best interest of your organization. Transferring workloads to the cloud in order to free up or discard costly on-premise resources for the fast deployment and flexibility of an elastic environment has overwhelming appeal, but now what? Despite the many advantages of a cloud environment there are still pitfalls that need to be navigated in order to ensure a positive engagement and user experience. To that end, I would offer two pieces of advice to colleagues looking to transform their organization from a strictly on-premise environment to a cloud user.   Read more…

Proactive Network Management: The Basics

[My post in Network Computing, November 7, 2014Information Week, Promethean Data Solutions IT Weekly Newsletter, November 17, 2014]

Bandwidth spikes, sluggish websites, and slow backups are just some of the unexpected problems that IT pros fear. Don’t wait for disaster to strike.  Read more…

WYOD = The Next Big IT Department Headache?

[My post in The daily Network Monitor, October 27, 2014]

Over the past few years, organizations have been forced to deal with the rapid rise of BYOD, which created a number of IT problems as more and more employees began bringing in their own devices to the workplace. Today, there is a new trend IT departments are preparing to deal with that could be more troublesome than its predecessor: Wear Your Own Device (WYOD). With the number of wearable devices steadily increasing, from Google Glass to Apple watches, it’s only a matter of time before we see a proliferation of wearables in the enterprise.  Read more…