How Skynet Could Terminate an Enterprise Zombie Apocalypse

[toggle title=”Enterprise Security – Part 2 of 2″]Learn how big data, machine learning, business intelligence, and holistic security profiling help make enterprise security an affordable reality – and of course, help ward off the zombies.[/toggle] “I’ll be back.” ~ The Terminator Part 1 of this series on enterprise security explored 6 IT tools and tactics that…

Read more

On Guard!

4 minute read “In this business, by the time you realize you’re in trouble, it’s too late to save yourself. Unless you’re running scared all the time, you’re gone.” ~Bill Gates Relentless hackers infect millions of personal records by exploiting a tiny hole in the protective wall surrounding the Internet. A mid-level analyst, frustrated that…

Read more

Welcome to the Cloud Neighborhood

5 minute read Your system is mission critical. It has hundreds, thousands, or even millions of daily users and it must continue to perform its functions no matter what. But it’s now 10-15 years old, and though it has served its purpose faithfully and is still a solid performer, the time has come to plan…

Read more

Razing a Legacy System

5 minute read “Decommission the legacy system” is one issue that never seems to get priority on the agenda.  Month after month, this major decision sits in the old business category, dwarfed by the other initiatives. With an excitement factor of zero, and a tenuous link to business goals, the prospect of investing precious IT…

Read more