Information Rules – The Future of Document Management – Part 4
I have received both public and private comments about this blog series, and I encourage you to continue adding to this discussion. For each of us, how we think about documents, content consumption...
View ArticleSteel Mills and the Security of Critical Infrastructure
In late December, the German government issued a report about a cyber attack on a steel mill that resulted in significant damage to that facility. The attack has received extensive publicity since...
View ArticleVMware KB Digest – New KB articles published for week ending 1/24/15
In our effort to provide our viewers with up to the minute information on VMware related news and topics, we’re posting the following list of new KB Entries for this week, direct from VMware Support....
View ArticleMonitoring Pivotal Cloud Foundry Health and Status: Hybrid Models, KPIs, and...
2014 was a very busy year for many customers adopting Platform as a Service (PaaS). I spent many weeks conducting “Operator Workshops” on Pivotal Cloud Foundry, helping customers make decisions on how...
View ArticleSteel Mills and the Security of Critical Infrastructure
In late December, the German government issued a report about a cyber attack on a steel mill that resulted in significant damage to that facility. The attack has received extensive publicity since...
View ArticleRemove Your Data Center “Beer Goggles” to See the Real Cost of Your Storage
Storage Management Challenges Virtualization has delivered on many promises: massive consolidation, huge cost savings, dynamic scheduling and live migrations of applications and storage. But, with all...
View ArticleVMware Online Launch Event – February 2015
Just a quick post to make you aware that VMware have an extra-special online launch event happening on Friday 2nd 2015. VMware aren’t giving away any details around what the online launch event will...
View ArticleEnterprise Risk Management Processes: Room for Improvement
Increasing risk is driving many organizations to adopt formal processes for enabling risk management. Despite this increased attention, less than one quarter have complete risk management processes in...
View ArticleAll Things Pivotal Podcast Episode #13: Using Service Brokers in Pivotal...
Microservices are becoming an increasingly popular development pattern for modern, cloud-ready applications. This is an “extreme” example of what developers have known for a long time—consuming...
View ArticleThe Relationship of Killing Trees and Fraud in the Financial Services Industry
Paper is both costly, inefficient and with the quality of laser printers improving annually, it’s much easier to create fraudulent documents. According to the Treasury Department it costs $0.92 more...
View ArticlePivotal People–Michael Coté on Joining Pivotal and Building Better Software
There is no question, Michael Coté is an expert on cloud computing and enterprise software. He recently joined Pivotal, in part, because of Cloud Foundry’s impact on building better software, open...
View ArticleVMware PEX 2015 Bootcamp: Prepare to have faces melted 10,9,8
It's that time! VMware Partner Exchange is RIGHT AROUND THE CORNER. While I've been travelling furiously, I've also been working as furiously on the EMC Bootcamp opener. VMware PEX is for me THE...
View ArticlePivotal Opens Chicago Office
Today, Pivotal opens the doors to our new office in Chicago. Located at 222 Merchandise Mart Plaza, in the center of Chicago’s high tech scene, this new office expansion will provide more accessible,...
View ArticleClearing Your Clouded Mind
Feeling like your brain is clouded? No, I don’t mean that your ability to think is disabled or that you’re having trouble finding clarity in your thoughts. I mean THE CLOUD- is it on your mind? As...
View ArticleOld-School IAM for New-School Security Risks: Attestation, Separation of...
“The thief who is harder to detect and who could cause the most damage is the insider—the employee with legitimate access.” This attestation is found in The Insider Threat, a publication by the FBI’s...
View ArticleTalent and Innovation Come Together To Reach the Third Platform
The journey to the Third Platform is forging new requirements, skills and expectations of the evolving employee. To stay ahead of the curve and fulfill the opportunities associated with emerging...
View ArticleBuilding Data Lakes in the Real World
Data lakes are here to stay. In a recent lab validation brief, IDC stated “data lakes should be a part of every big data workflow in the enterprise.” And in a recent blog post, EMC’s own Hadoop...
View ArticleImpact of the GNU glibc gethostbyname Function Buffer Overflow “GHOST”...
The “Ghost” vulnerability (CVE-2015-0235) in the gethostbyname functions of the GNU C Library (glib), which is commonly found in Linux based operating systems, affects applications calling this...
View ArticleBig Data Technology Transformation
I have been discussing my experiences working with companies starting Big Data projects. Every customer I talk to today is working on or planning projects to leverage predictive analytics to improve...
View ArticleTis the season for Resolutions
Holidays are a time of giving, and the beginning of the year is a time for resolutions. A few years ago I made a resolution to eat more bacon because it made me happy. Two years ago, I made a...
View Article