Cybersecurity: It’s More Than Worms, Hacking and Phishing
And, now the cherry on top, not everything that is a threat is intentional. As if cyber security wasn’t complex enough, now we’re not just policing for cyber criminal activity,…
Transforming IT One Blog Entry At A Time
And, now the cherry on top, not everything that is a threat is intentional. As if cyber security wasn’t complex enough, now we’re not just policing for cyber criminal activity,…
In October of 2009 I was interviewed by GovIT Journal and in that article I presented my view that Cloud Computing is highly dependent upon the network. The actual quote…
I had a great lunch discussion today regarding the impact of ownership of SOA within the business. As I have discussed multiple times, SOA is about business services, not technical…
Thanks to @jadkins for the colorful ending to that cliched saying, which really got me thinking. Sometimes we just make certain aspects of architecture too difficult for no reason. Good…
Based on feedback from my last blog entry, “The Busy Executive’s Quick Cloud Computing Reference Guide” the consensus was that people found it very helpful as a means of gaining…
As an executive, you may be hearing many different viewpoints about Cloud Computing; some of them promising significant IT cost reductions and reductions in capital expenditures. Similarly, you are hearing…
A semi-humorous look at 2009 the year in review for IT and insight into next year's top IT topics.
Additionally, proper inclusion of metering and instrumentation interfaces into you Cloud service means that you have greater control over the granularity of the data produced through these interfaces. Most metering…
This past weekend I set out explore some of the extension capabilities of Google Wave. One of the weaknesses that have been identified by many is the lack of integration…
Why do I blog? For me it’s a civic duty. I have an ability to identify the real value of IT investments and directions to business. There’s a lot of…