Monday, October 30, 2006

Gain a deeper understanding of business performance in real-time

A Rapid-Value Approach to Service Visibility and Assurance

IT organizations are under increasing pressure to provide greater service visibility and intelligence to their customers – the line of business users that own profit and loss. As business success relies more and more on IT services, clear communication between the organization that delivers the services and the business users who consume them is critical.


New This Week

VCC vs. UMA: Two technologies or two different services

Delve inside the topic of fixed/mobile convergence and uncover what role VCC and UMA play in the transition to converged networks.

Monday, October 23, 2006

IT asset management is not just an IT issue, it’s a Business Issue

Translating IT Asset Management into Business Service Value

The impact that the IT infrastructure has in keeping the core business going is as vital as people or money or even electricity. But because IT asset data is dispersed in almost every phase of the enterprise, most companies have only been able to account for IT in broad strokes and with little accuracy, and that can seriously affect critical business decisions.


New This Week

Why You Need to Separate Backup vs. Archiving

Join CXO Media’s Managing Editor Jim Malone and Brian Babineau of Enterprise Strategy Group as they discuss why organizations need to have two separate processes for retention and retrieval.


Analyst Spotlight


Yefim Natis,
Vice President & Distinguished Analyst
Gartner Research

Mr. Natis' research focuses on enterprise software infrastructure, including such technologies as application servers, application platform suites, integration middleware and TP Monitors. Mr. Natis also researches the fundamental software architectures, including event-driven architecture, service-oriented architecture and Web services, COM/COM+, .NET, J2EE and CORBA.

Watch Yefim Natis here:

Server Consolidation and Virtualization for Java Applications

IT departments running enterprise Java applications are embracing server consolidation projects to reduce capital and operational expenses and to drive up server utilization. In addition, there's an accelerating trend toward industry standard hardware platforms, which lend themselves to server consolidation.

Monday, October 16, 2006

30% of businesses experience disaster. Don’t be one of them

New disaster preparedness technologies

Most businesses don't need an underground bunker in order to keep operating, but you do need to think about what you would do if disaster struck. We all hope disaster never strikes. However, world events have shown us that disasters can and do happen. A recent survey of CIO’s revealed that 30% had experienced some form of disaster, and that can translate into serious revenue loss. The good news is there are a lot of new technologies that can help insulate your company from loss.


Analyst Spotlight

John E. Girard,
Vice President & Distinguished Analyst
Gartner Research

John specializes in business security and privacy solutions for wireless and mobile road warriors, extranet, remote offices and teleworkers. Mr. Girard was European research director for New Science Associates(acquired by Gartner), and a founder of the advanced network computing research practice. Previously he was a software engineer at Pacific Bell, where he formed an Expert Systems R&D group and a software testing practice.

See Mr. Girard here:

Protecting Data on Laptops and PDAs

Once company information leaves the office, it becomes vulnerable to loss or theft however, It seems we hear new reports of missing laptops and PDAs every week and when these devices contain sensitive personal information - social security numbers, credit card numbers, etc. - the consequences are particularly severe. Tune in and see how you can fight back.

Tuesday, October 10, 2006

Not your Daddy’s Blade Servers anymore

Blade Servers

The old days of proprietary, incompatible hardware are giving way to a new, much more efficient model based on Blade servers: inexpensive, standards-based and highly scalable. In this first installment, guest experts Peter Burris of Simpler IT and Dave Vellante of Barometrix quantify in specific terms the value Blades bring to organizations both large and small.

New This Week

Dynamic Utility Hosting Services

IT should be simpler, cheaper and more available. That’s the theory at least but it isn’t reality – yet. Join a panel of experts and find out why this emerging technology is a $400 million segment that is up 100 percent year-over-year.

Analyst Spotlight


Mark Nicolett,Vice President, Gartner Research

Mr. Nicolett’s research in the security and privacy area focuses on vulnerability management, patch management, security information and event management and network access control.Mr. Nicolett's 17 years of experience in IT has been focused on IT operations, systems management, security management and storage management.

Watch Mark Nicolett now:

Reduce Security Threats with Automated Patch & Vulnerability Management

Today, the process of eliminating system vulnerabilities and patching software is rapidly shifting from a “should do” to a “must do or pay the price.” Without a security patch management strategy in place, you will not be able to continually and automatically address these critical network vulnerabilities.

Monday, October 02, 2006

Clabby Analytics not a big fan of HP Itanium Architecture

The HP Itanium Architecture Decision

In this program, Joe Clabby, Founder and president of Clabby Analytics, describes some of the technology, vendor and ecosystem issues that surround HP Itanium architecture implementations.


New This Week

Customer Data Integration -- A Single View of Your Customer

Explore why CDI is important to a company’s Master Data Management strategy, as well as the drivers for implementing CDI and the best practices for doing so.

Delivering More “Service” With IT Service Management

Learn how to better align IT with the business organization’s objectives, and discover a service-oriented management strategy that provides the foundation and building blocks for the rapid delivery of IT services, while reducing IT costs.

Protecting Mission Critical Applications with Technology Escrow

Inherent to every technology license agreement is a level of risk. Companies that supply and demand technology must adjust to a fast-changing marketplace, and with such uncertainty, precautions are needed. What if a software development company, for instance, defaults on its maintenance and support contract? This program examines how and why technology escrow plays a key role on any well-crafted technology license agreement.


Analyst Spotlight

Esteban Kolsky, Research Director, Gartner, Inc.


Mr. Kolsky focuses on customer relationship management (CRM), customer service, e-service and e-business. Prior to joining Gartner, Inc., Mr. Kolsky founded a company that invented a technical architecture to provide point-of-need customer service. Mr. Kolsky has 18 years of experience, with eight years in technology and strategy consulting, customer service applications, CRM, help desks, and Internet-based and e-business applications.

2 Programs Mr. Kolsky can be seen in include:

Transitioning from Web Surveys to Enterprise Feedback Management Solutions

Companies with loyal customers generate higher profits, up to 60% higher than those of competitors according to current research. By far the most effective way to increase customer loyalty is to better understand customer wants and needs.

Customer Interaction Management: Deliver an Exceptional Customer Experience

Enterprise Customer Interaction Management (CIM) delivers the solution for managing the processes, workflow, and information required to connect your customer's on-going 'relationship' lifecycle to your organization's touch points.