Research Notes

03-08-2015: The Devil Made Me Do It

Diablo Technologies Inc. just disrupted the memory and PCIe flash markets with its launch of the Memory1 flash-based DDR4 memory modules. These modules use a standard DIMM form factor, support up to 4 TB of memory in a two socket server, and require no changes to the servers, operating system, or application. This will change the capacity and cost dynamics and enable greater performance per server. IT executives should understand the value proposition of Memory1, determine the areas where its use would be most valuable, and identify who offers the best solution. ...more details

02-08-2015: FTC – Converting Data Breaches to Intrusion Disruption

Irony of ironies: the federal government that exposed millions of personnel records and created the insecure Obama system now wants to heavily fine companies that fail to protect consumer information. Based on a recent U.S. Circuit Court of Appeals decision, the Federal Trade Commission (FTC) can find businesses at fault for data breaches and tie them up with consent decrees that force them to submit to thrid-party security assessments every two years for up to 20 years. Business and IT executives need to understand the implications of the ruling and ensure they can demonstrate they have implemented and are monitoring "reasonable" security practices.  ...more details

01-08-2015: LinuxOne – Penguins without Limits

What do you call a Linux solution that enables users to start small and grow exponentially without ending up with server sprawl – and it can be acquired on a rental basis? IBM Corp. calls it LinuxONE. The LinuxONE portfolio melds together the best of mainframes with Linux and open systems, accompianied by services and support and a new pricing model. The buyer-friendly LinuxONE business model may finally give IBM the breakout it was looking for with its Linux on mainframe solutions. IT executives should understand the LinuxONE value proposition and consider it for their short list of Linux hardware platforms. 
...more details

03-07-2015: Cybersecurity Tops CFO and CIO Priorities

Recent CFO and CIO studies highlight the need for a focus on cybersecurity and risk. Although these studies concur on the priority, the viewpoints of the respondents differ dramatically – CFOs take a broad view while IT executives remain more inwardly focused. IT executives should take a broader corporate view and provide better quality of information so that the organization can execute the appropriate steps to protect itself and its customers, employees, customers, and suppliers. ...more details

02-07-2015: Cloud Obsoletes Outsourcing Model

For more than a decade now outsourcing has been the way to cut costs while maintaining the business model; cloud computing is making that obsolete. Outsourcing is really a "business as usual" (BAU) model but with development and/or operations shifted from in-house to an external provider. The cloud model disrupts the BAU approach of development by reining in options and commoditizing operational components. Outsourcers that do not address the shift in the market will struggle to survive and remain competitive. IT executives should understand the impacts of the model shift and negotiate agreements accordingly.

...more details

01-07-2015: Dancing Elephants

Based on second quarter financials it looks like Amazon Inc. is teaching tech elephants how to dance while EMC Corp. and IBM Corp. are trying not to get trampled as they learn all the right moves.  ...more details

03-06-2015: Oracle Bluster

Oracle Corp. delivered disappointing fourth quarter and fiscal year 2015 results but true to form, top management came out slugging, claiming they over-achieved in cloud and are beating competition. Software license sales were down and the gains in their cloud offerings did not cover the shortfall. And for all the prior-quarter chest-beatings on its hardware offerings, the sales continue to slip. Oracle wants to prove it is still a winner and therefore, IT executives should expect the company to become more aggressive in its audits and sales pushes, especially cloud.

...more details

01-06-2015: How to Stop Betting Your Job on Security

Security surveys show the cybersecurity instances are increasing, as are the risks of a successful breach. Furthermore, 55 percent of attacks are carried out by insiders. Major enterprises and governments are no more immune from massive breaches than smaller firms. If security professionals want job security, they need to achieve a reasonable acceptable level of risk exposure that is supported by the board of directors and top management.

...more details

03-05-2015: Where to Recoup the Wasted 60 – 70 Percent of IT Operations Budget

Sadly 60 – 70 percent of the typical IT operations budget is wasted. The business model is broken. The three malfunctioning areas are the procurement process, asset management process, and lifecycle process. The good news is that there are ample opportunities for driving improvement and doing so will enable internal IT operations to become more competitive with clouds and competitors.

...more details

02-05-2015: Halfway to HP Enterprise, HP Inc

Hewlett-Packard Co., the corporation ex-CEO Mark Hurd built for economies of scale, is about to be carved in half by the current CEO Meg Whitman in the name of agility, focus and lower costs. In another six months two Fortune 50 companies will come into existance – HP Inc., the home of the PC and printer business segments, and HP Enterprise, the realm of servers, storage, software, services and all things big business. Both companies will have their share of challenges and opportunities. There will be dissynergies for the two firms and for their business customers. IT executives can expect to deal with breakup discontinuities and dropped balls as they sort through working with both entities.  ...more details

01-05-2015: Analytics Maturity

We have moved from an era where the businesses are in possession of all the knowledge to today's complex interconnected world where the buyer can acquire more information than the seller and thereby be in control. Thus, to remain competitive companies must incorporate the various social media dimensions and real-time and predictive analytics into their distribution, marketing and sales processes if they wish to maximize revenues and customer loyalty while minimizing costs and risks.

...more details

03-04-2015: Why OpenPOWER Takes Marketshare from x86

Initial prototype results realized by the OpenPOWER Foundation members point to major performance gains that lead Experton Group to believe enterprises with large server farms and/or data-intensive, compute-intensive workloads may be enticed to abandon x86-architected servers for these next-generation alternatives. IBM Corp. and the other OpenPOWER Foundation members presented the technological advances they are obtaining at the GPU Technology Conference last month but avoided pricing discussions.  ...more details

02-04-2015: When Should You Upgrade Smartphones and Tablets

Much has been said over the years about optimizing refresh cycles for PCs, servers, and a host of other IT and non-IT corporate assets.  While ownership and control over these items rest within the enterprise, the same cannot always be said of smartphones and tablets, which are often acquired independent of the organization and managed through bring your own device (BYOD) strategies. ...more details

04-03-2015: Clouds Need a New Architecture

Most IT executives believe that if they virtualize their applications, automate processes and orchestrate provisioning of services, they are running a cloud. Granted that there are other elements required if one is to deliver a true cloud environment but missing from most all architectural comments is the fact that unless applications and databases are architected for the cloud, the biggest gains will be lost.  ...more details

03-03-2015: Cutting Waste thru Strategic Sourcing

Many enterprises have put in place strategic sourcing organizations but are still struggling with determining if these organizations are achieving their goals and objectives. Executives are unsure if they have established the best metrics or key performance indicators (KPIs) to demonstrate the success they are seeking.  ...more details

02-03-2015: Why Mainframe Makes Sense in Cloud

Contrary to opinion of many, the redesigned IBM z Systems are an excellent platform of choice for cloud, analytics, and mobile and security (CAMS) applications. For small cloud environments or large parallel processing applications, distributed server platforms work well but for large cloud environments or analytics accessing a mainframe database, the z Systems architecture is better suited and can satisfy business requirements on a least cost basis. ...more details

01-03-2015: Why the Apple Watch is More Important to the Enterprise Than You Think

Apple Inc.’s entry into the smartwatch arena, the Apple Watch, is the company’s first new product line since the iPad in 2010. At the time, the tablet space had a limited selection of products – many of which were from respected manufacturers – that failed to make compelling “must have” arguments that with offerings combining ease of use, application selection, and smart marketing. The Apple Watch enters the fray in a similar manner as there are only two major players in the field, Google Inc.’s Android Wear -based watches and those from Pebble, and sales across all platforms reached a mere 6.8 million, according to estimates.  ...more details

15-02-2015: How to Prevent IoT from Leaving You DOA

While the Internet of Things' (IoT's) notoriety has only surged within the corporate and IT communities as of late, enterprises have been gearing up for the impeding onslaught of data for some time. Sensors to monitor performance characteristics and geographic transitions, big data amalgams, and analytics applications are all pieces of the IoT puzzle that have circular operational and business implications. Still, most IT executives are ill prepared for the transformative and revolutionary business and technological shifts required to effectively embrace IoT and enact smarter, more reactive infrastructure models.  ...more details

03-01-2015: How to Win Mobile Now or Otherwise Die Trying

Consumer and enterprise behaviors over the better part of the last decade bore the  concept of developing for mobile first. Now, new metrics demonstrate the magnitude of that truth as the largest U.S. online retailers witness a virtual even split between mobile and PC traffic. Similarly, mobile enterprise tablet and smartphone business requirements are rapidly changing as needs dictate access to a wider range of functionality on mobile devices. Proper understanding of current and future business requirements and customer behaviors are necessary in implementing a mobile application framework that is responsive, adaptable to future needs, and offers consistency with desktop experiences. ...more details

02-01-2015: Hacker Prevention Checklist

The massive Sony security breach and the other multiple well-publicized cyber attacks in 2014 demonstrate the shortcomings in corporate security governance and accountability. If companies are to better protect their assets, customers, employees, intellectual property, and suppliers and business partners, they need to proactively protect corporate and personal data.  ...more details