By Phil Wainewright on June 6, 2011
Despite the increasing prevalence of cloud services, many of us remain naive about the necessary steps we should take to keep our online assets secure. These five simple guidelines will go a long way towards helping you keep online threats at bay.
By R "Ray" Wang on January 4, 2011
Organizations Seek Measurable Results In Disruptive Tech, Next Gen Business, And Legacy Optimization Projects For 2011 Credits: Hugh MacLeod Enterprise leaders seek pragmatic, creative, and disruptive solutions that achieve both profitability and market differentiation. Cutting through the hype and buzz of the latest consumer tech innovations and disruptive technologies, Constellation Research expects business value to [...]
Posted in Business, Featured Posts, Technology / Software | Tagged 2011, 2011 Predictions, analytics, android, appliance market, Apps Strategy, B2B, B2B E-commerce, B2B market strategy, B2C, B2C E-commerce, best practices, bill of rights, BPO, brand monitoring, Business 2.0, business drivers, business intelligence, business process optimization, business process outsourcing, business requirements, business strategy, business technology, business value, CEO, CFO, CIO, Cloud, Cloud Computing, cloud integration, Cloud options, cloud security, Cloud Wars, CMO, collaboration software, Constellation Research, Consumer Tech, contract negotiations, contract strategy, Convergence, cost reduction, CRM, CTO, custom apps, custom development, DaaS, Data deluge, data integration, data quality, data stewardship, disruptive, disruptive technologies, Disruptive technology, early adoptions, Emerging Technologies, Enterprise 2.0, enterprise applications, enterprise apps, Enterprise apps strategy, Enterprise Business Apps, Enterprise Business Apps Vendors, enterprise collaboration, enterprise software, Enterprise Software Licensee Bill of Rights, enterprise strategy, erp, Facebook, future of business, Gov 2.0, gov20, Government Contracting, govtech, hybrid, hybrid deployments, ibm, information management, information management matrix, innovation, innovation insights, Internet of Things, IT budgets, IT services firms, IT Strategy, last mile solutions, Legacy Optimization, lessons learned, license fees, license management, license parking, license policy, license returns, line of business, maintenance, maintenance fees, management strategy, market strategy, marketing, microsoft, next gen, next gen apps, next gen cio, next gen CIO’s, next gen enterprise, next gen IT leaders, next generation, Next generation apps, NextGen, oracle, p2p, PaaS, pace of change, pace of technology adoption, packaged apps, Point of view, Private Cloud, Private Clouds, procurement, R “Ray” Wang;, relationship managmeent, relationships, Research Report, rwang0, SaaS, SaaS Bill of Rights, SaaS escrow, SaaS Integration, SaaS offensive, SaaS strategies, sales strategies, salesforce.com, sap, service economy, services based industries, social business, Social Business Software, social campaign tracking, Social CRM, social customer insights, Social Enterprise, social enterprise apps, social event management, Social Media, social media monitoring, social service, social support, social support insights, social technologies, software appliances, software as a service, software bill of rights, software contract reviews, Software Ecosystems, software escrow, software licensing, software licesing and pricing, software maintenance, software ownership, software ownership lifecycle, software pricing, software revenue recognition rules, software trends, Software Vendors, Sourcing, stack wars, subscription pricing, subscription revenues, technology adoption, technology budgets, technology partnerships, technology platforms, third party maintenancce, Third Party Maintenance, trends, two-tier ERP, Unified Communications, upgrades, usability, use cases, used software, user strategy, value, vendor strategy, vmforce, VMware, Web 2.0 | Leave a response
By R "Ray" Wang on December 28, 2010
This blog was jointly posted by @Chirag_Mehta (Independent Blogger On Cloud Computing) and @rwang0 (Principal Analyst and CEO, Constellation Research, Inc.) Part 1 was featured on Forbes: 2011 Cloud Computing Predictions For CIO’s And Business Technology Leaders As Cloud Leaders Widen The Gap, Legacy Vendors Attempt A Fast Follow Cloud computing leaders have innovated with [...]
Posted in Business, Featured Posts, Technology / Software | Tagged 2011 Predictions, BPO, Business Analytics, business technology, business value, CFO, Chirag Mehta, CIO, Cloud, Cloud Computing, cloud integration, Cloud options, cloud security, Cloud Wars, CTO, DaaS, enterprise applications, enterprise apps, Enterprise apps strategy, Enterprise architecture, Enterprise Business Apps, Enterprise Business Apps Vendors, enterprise collaboration, enterprise software, enterprise strategy, iaas, information broker, integration, IT Strategy, next gen apps, next gen cio, next gen CIO's, next gen CIO’s, next gen enterprise, next gen IT leaders, next generation, Next generation apps, PaaS, Platform as a service, Private Cloud, Private Clouds, R "Ray" Wang;, R “Ray” Wang;, Research Report, rwang0, SaaS, SaaS Integration, SaaS offensive, SaaS strategies, social business, Social Business Software, Social Enterprise, social enterprise apps, software as a service, trends, vendor strategy | 9 Responses
By Phil Wainewright on June 18, 2010
The old downloadable signature file method of anti-malware protection is flawed in today’s era of cloud-scale malware threats, say a new generation of vendors. I caught up recently with Gerhard Eschelbeck, CTO of Webroot, to learn more.
By Phil Wainewright on December 21, 2009
If I read one more article about what MIT Technology Review in its January lead story is calling “the security problem inherent in the size and structure of clouds,” then I swear I am going to burst a blood vessel. This article is a classic of the genre, beginning with an absurd screed about “computer [...]