Tag: it management

If Big Data’s too scary, try Little Data (it’s free)

Here are some stats that will blow your mind: Every minute of every day, 48 hours of video content is uploaded to YouTube, Google receives over 2 million queries, over 100,000 tweets are sent and nearly 600 new websites are created. Perhaps most shocking is that quietly in the background, all of this data is tracked and stored. But what happens to it after that?

Why You Need to Integrate IT Operations and IT Service Management

In a previous article, I wrote about the need for application-aware network performance management (AA-NPM) tools. With tools that can manage the entire range of infrastructure and applications, we can manage the delivery of services more effectively and responsively — which is better for an organization, better for IT, better for everyone

5 Reasons You Should Consider Application-Aware Network Performance Management

In today’s complex business environment, the first question thoughtful IT leaders ask when considering any new IT investment or change is, ‘How will it impact the business?’ That the business depends on well-managed IT is well understood. What is less well understood is how an IT organization can manage an infrastructure that is growing ever more complex. It’s not just the network infrastructure that IT teams need to consider; it’s not even the increasingly complex application infrastructure that stands between the physical network infrastructure and the users. The challenge today involves the effective management of both these infrastructures as well the interplay between them — and it’s the interplay between them that poses the greatest challenge. Application-aware network performance management (AA-NPM) tools can help you overcome that challenge.

Could Your Jewelry Stop Hackers?

Google has been talking about an innovative idea to replace passwords with jewelry — that’s right, jewelry. Actually, the enabling technology could be  hidden in jewelry, such as a ring , which would perform secure cryptographic transactions that would obviate the need for the user to enter a password.

Beware: Hackers in your car, TV and light-bulbs?

We all know we should be careful transacting online, but are you thinking about cyber-security when you’re watching TV or driving your car? If you’re like me, those flashy new products at last week’s CES show probably got you dreaming about upgrading some of your old-school gadgets. The trend today is moving away from stand-alone devices to futuristic “connected” devices, those that can talk to the cloud or even interact with your other systems and appliances.

5 Tips for CIOs: Plan for Hurricanes, Hackers and Aliens?

Google is so serious about its disaster recovery planning that it tests for most scenarios imaginable, no matter how unlikely, including an  alien invasion of its offices . You see, nothing puts fear into a CIO like a system outage — it gives new meaning to having a “bad day” at the office. But quite surprisingly, unlike Google, very few companies have a disaster recovery plan.