Welcome to the Cloud Neighborhood

5 minute read Your system is mission critical. It has hundreds, thousands, or even millions of daily users and it must continue to perform its functions no matter what. But it’s now 10-15 years old, and though it has served its purpose faithfully and is still a solid performer, the time has come to plan…

Read more

Razing a Legacy System

5 minute read “Decommission the legacy system” is one issue that never seems to get priority on the agenda.  Month after month, this major decision sits in the old business category, dwarfed by the other initiatives. With an excitement factor of zero, and a tenuous link to business goals, the prospect of investing precious IT…

Read more

How Hopkins’ CIO Built a Collaborative IT Culture

5 minute read Stephanie Reel had what some may categorize as an insurmountable challenge — pull some of the best doctors in the world away from their hectic schedules to chat about IT. Tapping her penchant for innovative thinking, Reel, CIO for all divisions of the Johns Hopkins University and Health System, guessed that maybe…

Read more

Protecting the Fortress

[toggle title=”Enterprise Security – Part 1 of 2″]The first of a two-part series discussing enterprise security reviews major tactics employed today, cautions about limitations, and highlights the data that can be collected from each. In Part 2, we’ll lay out strategies for using that data – in new ways – to achieve high-level enterprise security. [/toggle]…

Read more