Networks Do Matter – Really!

Jerry Caron
Jerry Caron

Summary Bullets:              

  • Networks and networking suffer from a lack of respect that defies logic.
  • Innovation continues apace, however, the industry often fails to give these advances the attention they deserve.

Networks and the stuff that make them work are suffering from a dearth of respect to which even Rodney Dangerfield would have to defer. Sure, we all know that it is lunacy to dismiss the value of both private and public networks because the quality of experience is utterly dependent on the quality of the network connections. This is a stone-cold fact, whether we are talking about a teenager looking at YouTube videos on a smartphone, or a business running mission-critical applications.

Yet while networks and networking have never been truly glamorous, there is a perceptible downward trend in love for the stuff of connectivity. It has long been the case, for example, that the hottest, most admired Internet businesses take public and private networks for granted and ride roughshod over them with something approaching complete disdain. If Facebook is sluggish, you don’t blame Facebook, do you?. Continue reading “Networks Do Matter – Really!”

Out of the Shadows: Making a Decentralized Approach to IT for Business

Amy Larsen DeCarlo
Amy Larsen DeCarlo

Summary Bullets:

  • Flexibility is one of the prime benefits of a cloud-based IT consumption model, giving IT and non-technical employees capacity when they need it.  This access to resources enables organizations to execute new projects quickly and respond to fast-changing market dynamics.
  • This appealing model has risks for the IT organization – issues around manageability and control are a natural byproduct of shadow IT.

While cost reductions are often the main driver for cloud adoption today, elasticity and accessibility distinguishes cloud from traditional methods. Organizations of many sizes gravitate toward the cloud to make it easier for individual business units and employees to tap IT resources to support organizational goals. Cloud can facilitate a more improvisational approach to technology and project management, allowing even non-technical users to dial up and down server and storage capacity for short term or cyclical projects. Continue reading “Out of the Shadows: Making a Decentralized Approach to IT for Business”

IT Service Providers Up the Ante in Mobility

Kathryn Weldon
Kathryn Weldon

Summary Bullets:

• In 2012, IT service providers (ITSPs) are increasingly focused on mobility as a growth area for consulting and managed services. What are their focus areas today and what have they added to their portfolios? (See IT Service Providers Focus on Apps and Security, November 5, 2012)

• How do ITSPs differ from mobile operators and should the latter worry about direct competition?

This year the top global ITSPs are focusing not only on managed services and consulting for mobility deployments, but there is an increased emphasis on new areas including: consulting, implementation and managed services to help with BYOD; virtualization for mobile devices, mobile application development and delivery; and mobile security. These are many of the same service areas that are in mobile operators’ managed mobility portfolios. Continue reading “IT Service Providers Up the Ante in Mobility”

On Guard or Under the Radar: How Threats Vary by Industry

Amy Larsen DeCarlo
Amy Larsen DeCarlo

Summary Bullets:

  • Not surprisingly, organizations often apply similar security protections and practices to those employed by their industry peers to safeguard what are often very comparable assets, leaving them equally vulnerable or well-protected depending upon the effectiveness of their controls.
  • While cyber attackers target certain industry-specific, high-value assets such as a manufacturing company’s intellectual property (IP), many of the breaches involve the theft of less valuable resources that are more often left exposed to risk.

Just as enterprises in every industry tend to share some analogous traits in how they do or do not effectively leverage IT to advance their particular business agendas, organizations within the same vertical tend to use data security strategies similar to those their counterparts use to safeguard equivalent assets.  Thus, it is not all that surprising to see some vertically specific security breach trends that highlight gaps in industry-wide security practices. Continue reading “On Guard or Under the Radar: How Threats Vary by Industry”

Superstorm Sandy Reinforces the Need for Business Continuity Planning

Cindy Whelan
Cindy Whelan

Summary Bullets:

  • The arrival of yet another devastating storm reinforces the need for business continuity features.
  • Business customers need to have a clear understanding of their carrier’s internal architecture for redundancy; they should also take secondary steps for further assurance of continuity.

In my August 28 blog, “UCaaS Can Be a Lifesaver in a Disaster,” I discussed the need for customers to have a clear understanding of their service providers’ business continuity features.  When I wrote that article, nobody had any idea that a storm on the scale of Sandy, which ravaged the Mid-Atlantic seaboard, was on the horizon.  Of course, the first and most important thing in these situations is the protection of family and loved ones.  This was a storm like nothing else in recent history in the region, leaving devastation in its wake. Continue reading “Superstorm Sandy Reinforces the Need for Business Continuity Planning”

New Microsoft Tablet OS Not Compatible with Windows 8, Supports Limited Apps

  • Charlotte Dunlap
    Charlotte Dunlap

    Mass confusion has risen among the Windows developer community over new OS Microsoft RT

  • Microsoft RT is not backwards compatible, so popular desktop apps won’t port to this environment anytime soon

Microsoft is feeding a frenzy of confusion among developers that are questioning the implications of incompatible Windows operating systems (OS) used between laptop and mobile devices. The company is not making it any easier for enterprise developers to fulfill their new mobile requirements because of the limitations of the company’s latest mobile device OS. The trouble is, while Windows 8 will run regular PC and desktop software, Windows RT cannot run those same x86/64 and desktop apps. And Windows RT is the only OS that currently runs on the upcoming Microsoft Surface tablet. Continue reading “New Microsoft Tablet OS Not Compatible with Windows 8, Supports Limited Apps”