From the category archives:

Upside updates

Mobile World Congress Brings Latest Developments in Mobile – Mobile Device and Mobile OS Implications for the Enterprise

March 27, 2013

The mobile world descended upon Barcelona the first week of March for the annual Mobile World Congress 2013. More than 72,000 attendees from 200 countries attended a series of conferences, exhibits, and mobile product demonstrations and releases in what was perhaps the largest gathering of mobile experts ever.  Among the highlights of the week for […]

Share
Read the full article →

A Game Plan for Big Data that moves Beyond the Hype

March 12, 2013

It can be argued that Big Data has grown to occupy a position of huge proportions in enterprise computing. Whereas some of the other emerging technologies that are driving this latest generation of enterprise software revolution – namely mobile, social, and cloud – have followed adoption patterns that are somewhat more typical for an enterprise, […]

Share
Read the full article →

Does Obama’s Cybersecurity Executive Order Have Broader Big Data Implications?

February 21, 2013

In the wake of President Obama’s recent State of the Union Address, much of the buzz in enterprise technology circles has been around cybersecurity, and the impact of the President’s Executive Order on the IT industry. The President released an Executive Order on Cybersecurity on February 12th immediately following his address. Among the contents of […]

Share
Read the full article →

ERP and Cloud

January 11, 2013

Let’s take a closer look at what’s new in the cloud computing space for the enterprise. A good place to start might be with a company that is trying to set the bar for how to fully bring ERP into the future. NetSuite is a cloud-based ERP solution vendor who is making a lot of noise around […]

Share
Read the full article →

2013 Enterprise Cloud Predictions

January 3, 2013

It’s that time of year again, when the entire technology community is abuzz with predictions for the coming year. What will change dramatically in enterprise computing? I believe that 2013 will be the year of cloud. Here are a few ways I see the cloud computing impacting enterprise computing: 1) Cloud adoption will move toward […]

Share
Read the full article →

New Enterprise Social Technologies

December 17, 2012

There’s no stopping it now: enterprise social technologies are definitely a key part of any competitive organization today. Read about this year’s most recent changes my enterprise social technology column at IT Briefcase.

Share
Read the full article →

BYOD – Bring Your Own Device

November 28, 2012

With the proliferation of iPhones, Android phones, iPads, and other tablets and mobile devices, it’s easy to see how employee’s personal devices may have a potentially big impact on corporate computing options. Read my latest IT Briefcase column on the move in the corporate world to bring your own device.

Share
Read the full article →

JDA and Red Prairie Merger

November 15, 2012

Big mergers in the cloud! Recently announced blockbuster merger between JDA Software and Red Prairie occurred Thursday, Nov. 1st, followed just days after news reports that JDA was shopping around for a buyer. The details of the merger are of interest. JDA will be taken private by privately-held Red Prairie, with the help of New […]

Share
Read the full article →

Mobile Application Development

November 13, 2012

Mobile devices are fast becoming a replacement for significant portions of traditional application development time inside enterprise IT. Luckily for beleaguered IT departments struggling to keep up with the demand, Oracle has released a framework to assist with Apple and Android application development. Read my full column on mobile application development at IT Briefcase.

Share
Read the full article →

Toxic Data–Why Enterprises Should Be Careful

October 19, 2012

Toxic data, as one recent definition states, is any data that has leaked out of an organization that might become harmful. Essentially, it’s important information that the company has lost control of. There are a wide range of types of data that can become toxic—from the personal data like a social security number, credit cards, […]

Share
Read the full article →