Blog

Product-Centric Shift in I.T.

Many CIOs are replacing portfolios of discrete, siloed projects with product lines that enable a specific business capability. This move to product-centric organizations is something that we are hearing much more frequently from our contacts in the IT Leadership community. Here, we discuss four key factors driving the shift toward a product-centric IT operating model.…
Read more

Edge Computing Challenges

As more computing moves to the edge, data will be processed in place. By 2023, Gartner projects more than half of enterprise data will be created and processed "outside the data center or cloud." That's up from less than 10% this year. ACM/IEEE definition*: Edge Computing is a new computing paradigm where server resources, ranging…
Read more

Seismic Shift in Backup and Recovery?

Underneath the surface, there has always been (by my view) a tension between IT Industry Research Analysts and vendors. Some of this tension is based upon revenue as companies like Gartner, Forrester, and IDC offer independent research but also offer paid engagements/paid research for the very same vendors that are targets of the independent research.…
Read more

Advanced Data Center Solutions: Mitigating Cybersecurity & Disaster Threats

Adaptability is key for survival. As Charles Darwin noted, “It is not the strongest species that survive, nor the most intelligent, but the ones most responsive to change.” The same could be said about business. Today, businesses depend on technology, and technology is changing fast. The world we live in today is vastly different than…
Read more

5 Effective Ways to Increase Data Security

Hackers show no signs of abating their attacks on businesses. The data that businesses generate is just too valuable for cybercriminals to ignore. Although the risks are numerous and the landscape complex, there are a number of things organizations can do to increase their data security. In this article, we will discuss data security management…
Read more

Insider vs. Outsider Data Security Threats: Are you taking risks?

Whether insiders or outsiders pose a greater threat to security is a matter of ongoing debate. According to Verizon’s 2018 Data Breach Investigations Report, 73% of cyberattacks were executed by outsiders and 28% of attacks involved insiders.  While it’s informative to look at the issue from a statistical perspective, numbers don’t tell the entire story. When…
Read more