Mobile World Congress Brings Latest Developments in Mobile – Mobile Device and Mobile OS Implications for the Enterprise

The mobile world descended upon Barcelona the first week of March for the annual Mobile World Congress 2013. More than 72,000 attendees from 200 countries attended a series of conferences, exhibits, and mobile product demonstrations and releases in what was perhaps the largest gathering of mobile experts ever.  Among the highlights of the week for the enterprise IT customer are some of the following announcements and observations:

Mobile Devices continue to Evolve. The enormous adoption of smartphones continues, and device manufacturers were plentiful at the Congress, announcing the release of numerous new mobile devices. One of the big themes was reaching the emerging markets through mobile devices. While there were already 6 billion mobile subscriptions worldwide at the end of 2011 (source: The International Telecommunications Union), which is equivalent to 87% of the world population, device manufacturers were not resting on their laurels. They spoke about connecting the next 1 billion people who will use mobile devices as their primary connection point to the Internet. While smartphone sales may eclipse mobile phone sales to end users by the end of this year, affordable handsets in emerging markets will be key to achieving this goal. To this end, Nokia announced four new handsets, of which one having a price tag of merely 15 Euros.


A Game Plan for Big Data that moves Beyond the Hype

It can be argued that Big Data has grown to occupy a position of huge proportions in enterprise computing. Whereas some of the other emerging technologies that are driving this latest generation of enterprise software revolution – namely mobile, social, and cloud – have followed adoption patterns that are somewhat more typical for an enterprise, Big Data has become a Holy Grail, one that many companies don’t even really understand. The challenge is that Big Data is really not new – data has been an integral part of the business from the very beginning. Enterprises have spent the better part of their existence trying to capture, manage, store, and access this data. The recent new “wrinkle” in all this data talk that has spawned the “Big Data” movement is the rise of technologies that enable very large amounts of data to be manipulated and mined quickly and through user-friendly interfaces, giving rise to the ability for companies to use the data in real-time to impact the course of business.

Continue reading “A Game Plan for Big Data that moves Beyond the Hype”


Does Obama’s Cybersecurity Executive Order Have Broader Big Data Implications?

In the wake of President Obama’s recent State of the Union Address, much of the buzz in enterprise technology circles has been around cybersecurity, and the impact of the President’s Executive Order on the IT industry. The President released an Executive Order on Cybersecurity on February 12th immediately following his address. Among the contents of the Order include the following statement, “It is the policy of the United States to enhance the security and resilience of the Nation’s critical infrastructure and to maintain a cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties.” Continue reading “Does Obama’s Cybersecurity Executive Order Have Broader Big Data Implications?”


ERP and Cloud

Let’s take a closer look at what’s new in the cloud computing space for the enterprise. A good place to start might be with a company that is trying to set the bar for how to fully bring ERP into the future. NetSuite is a cloud-based ERP solution vendor who is making a lot of noise around cloud and ERP, and since it boasts 12,000 customers including Magellan GPS, Guitar Center, and Igloo, it may be onto something. Read my full story about ERP and Cloud on IT


2013 Enterprise Cloud Predictions

It’s that time of year again, when the entire technology community is abuzz with predictions for the coming year. What will change dramatically in enterprise computing? I believe that 2013 will be the year of cloud. Here are a few ways I see the cloud computing impacting enterprise computing:

1) Cloud adoption will move toward critical mass.

2) Cloud solutions will become more trustworthy.

3) Hybrid cloud will be the flavor of choice.

For the rest of my 2013 cloud predictions, and all the details, read my latest IT Briefcase column on 2013 Enterprise Cloud Predictions.


JDA and Red Prairie Merger

Big mergers in the cloud! Recently announced blockbuster merger between JDA Software and Red Prairie occurred Thursday, Nov. 1st, followed just days after news reports that JDA was shopping around for a buyer. The details of the merger are of interest. JDA will be taken private by privately-held Red Prairie, with the help of New Mountain Capital LLC, the private-equity firm that owns Red Prairie. For our full update on the JDA Software / Red Prairie merger check out our IT Briefcase column.


Mobile Application Development

Mobile devices are fast becoming a replacement for significant portions of traditional application development time inside enterprise IT. Luckily for beleaguered IT departments struggling to keep up with the demand, Oracle has released a framework to assist with Apple and Android application development. Read my full column on mobile application development at IT Briefcase.


Toxic Data–Why Enterprises Should Be Careful

Toxic data, as one recent definition states, is any data that has leaked out of an organization that might become harmful. Essentially, it’s important information that the company has lost control of. There are a wide range of types of data that can become toxic—from the personal data like a social security number, credit cards, or health care information, to corporate considerations, such as business plans, sales figures, or even product designs. Think of sensitive customer or corporate records and you have an idea of the type of data that could become “toxic” if it got into the wrong hands. For more perspective, read my recent IT Briefcase column on toxic data.