SYS-CON.tv is unique multimedia resource - enabled by Flash video - bringing you timely interviews, news, expert panels, and features on all that's new and all that's best among i-Technology products and services.
2020 seems to be an important milestone for the Internet of Things. That’s the year that Cisco says there will be 50 billion connected devices and also the year Gartner notes that over 50% of major new business processes and systems will incorporate some element of the Internet of Things.
That’s the good news.
Thomas Bitman of Gartner wrote a blog post last year about why OpenStack projects fail. In that article, he outlined three particular metrics which together cause 60% of OpenStack projects to fall short of expectations:
Wrong people (31% of failures): a successful cloud needs commitment both from the operations team as well as from "anchor" tenants.
Wrong processes (19% of failures): a successful cloud automates across silos in the software development lifecycle, not just within silos.
Privileged Identity Management (PIM) is the lowest common denominator in today’s most treacherous corporate and governmental security breaches. Or more accurately: Privilege Mismanagement. Sony, Target, Anthem, JP Morgan Chase, the city of San Francisco and many others succumbed to the reality that the identity of a single super-user account can be subverted for the purposes of manipulating sensitive organizational data, correspondence, commercial goods and intellectual property.
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement.
In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
One of the many questions that companies face when introducing new enterprise systems either to provide new functionality or incorporate legacy systems from a merger or acquisition is "How do we identify and manage access rights?"
Not only do new access approval processes need to be established, but a common platform to define and execute processes, reliably document approvals and provide users with an acceptable user experience is often not in place to handle the additional workload. Corporate IT is also faced with the challenge responding quickly to changes in access rules or approval chain...
In a series of articles, I am going to share my thoughts on the state of IT infrastructure and how we've arrived with current architecture trends. The topic today is SAN.
Storage Area Networking (SAN) is a technology that solved a real problem that existed a couple decades ago. SANs have been a foundational piece of IT infrastructure architecture for a long time and have helped drive major innovations in storage. But how relevant are SANs today in the age of software-defined datacenters? Let's talk about how we have arrived at modern storage architecture.
A cybersecurity transformation discussion on how cloud security is rapidly advancing, and how enterprises can begin to prevail over digital disruption by increasingly using cloud-defined security.
We'll examine how a secure content collaboration services provider removes the notion of organizational boundaries so that businesses can better extend processes. And we'll hear how less boundaries and cloud-based security together support transformative business benefits.
This complete kit provides a proven process and customizable documents that will help you evaluate rapid application delivery platforms and select the ideal partner for building mobile and web apps for your organization.
A few years ago, those little iHome alarm clocks started to appear in hotel rooms. Cool gadgets that you could mount your mobile phone to battery charge or play the music on the device. We also had a few in our home. They worked perfectly for the iPhone4 since the connector was that 1 inch protruding plug. When I got the iPhone6, those clocks instantly became useless. Obsolete. At least the phone connector part lost its value.
A recent CIO editorial by Bernard Golden regarding the future of private cloud spurred some interesting commentary in my network. The pushback seemed to focus around the viability of the term “private cloud”. These individuals are well-respected thought-leaders in cloud with significant experience guiding senior IT executives transition to modern architectures, so I decided I’d engage them in a discussion regarding the future of self-managed infrastructure as a whole.
As cloud security is rapidly advancing, enterprises can begin to prevail over digital disruption by increasingly using cloud-defined security.
The next BriefingsDirect cybersecurity innovation and transformation panel discussion explores how cloud security is rapidly advancing, and how enterprises can begin to innovate and prevail over digital disruption by increasingly using cloud-defined security.
We'll examine how a secure content collaboration services provider removes the notion of organizational boundaries so that businesses can better extend processes. And we'll hear how less boundari...
The following fictional case study is a composite of actual horror stories I’ve heard over the years. Unfortunately, this scenario often occurs when in-house integration teams take on the complexities of DevOps and ALM integration with an enterprise service bus (ESB) or custom integration. It is written from the perspective of an enterprise architect tasked with leading an organization’s effort to adopt Agile to become more competitive. The company has turned to Scaled Agile Framework (SAFe) as a way of scaling Agile, since initial attempts at Agile were not successful despite many scrum maste...
Generally speaking, there are two kinds of companies in the world: data rich and data poor. The richest of the data rich are easy to name: Google, Facebook, Amazon, Apple. But you don’t need to be at the top of this list to use data to create value. You need to have the tools in place to turn information (data) into action. That’s what the data rich do that the data poor and the data middle class do not.
The world of business is changing. Disruptive shifts in power are forcing everyone to question the established status quo. In particular, savvy chief executives are tasking IT organizations to help create compelling customer experiences, support new business models and adopt agile operational processes.
That's why the vast majority of IT and business leaders are joining forces on the organizations’ most pressing commercial needs and wants. They seek an open and flexible business technology foundation that's an enabler, rather than an inhibitor, to meaningful and substantive workflow progress....
Welcome to part one on my new blog series of IoT focused postings. The IoT has been picking up a lot of steam recently and as someone who works with numerous companies building networked devices, I am fortunate to see the evolution of the modern IoT firsthand. This series will focus not just on the IoT and what it is and where it works, but we are going to be building along at home as I undertake my own IoT journey.
Join Us at the Santa Clara Convention Center in New York, Santa Clara, November 1-3
Cloud computing software is eating the world, and each day is bringing new developments in this world.
Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Meanwhile, 94% of enterprises are using some form of XaaS – software, platform, and Infrastructure as a Service.
Big Data | Analytics and the emerging Internet of Things (IoT) are driving exponentially increased demands on datacenters and developers alike, as we cross the zettabyte horizon this year.
Containers and microservices are now part of every PaaS conversation, and IaaS providers are increasingly competing for platform customers.
WebRTC continues to reform web communications, and DevOps is pushing its way into an enterprise IT world that is increasingly agile, lean, and continuous.
Through all this, Cloud Expo remains the single independent event where delegates and technology vendors can meet to experience and discuss the entire world of the cloud.
Only Cloud Expo brings together all this in a single location:
• Cloud Computing
• Big Data | Analytics
• Internet of Things
• Containers | Microservices
Cloud computing budgets worldwide are reaching into the hundreds of billions of dollars, and no organization can survive long without some sort of cloud migration strategy. Each month brings new announcements, use cases, and success stories.
Cloud Expo offers the world's most comprehensive selection of technical and strategic Industry Keynotes, General Sessions, Breakout Sessions, and signature Power Panels. The exhibition floor features 100+ exhibitors offering specific solutions and comprehensive strategies.
The floor also features a Demo Theater that give delegates the opportunity to get even closer to the technology they want to see and the people who offer it.
Attend Cloud Expo. Create your own custom experience. Learn the latest from the world's best technologists. Talk to the vendors you are considering, and put them to the test.