Archive for category Enterprise Applications
A Massachusetts company called Prelert released a new application yesterday that combines machine learning and predictive analytics to detect and report anomalous behavior emanating from IT infrastructure. If that sounds a lot like what Splunk does, you’re right.
Last week, I was dismayed when I read an article from a cloud vendor that I considered to be extremely disrespectful of CIOs. In short, the article implied that all CIOs are simply anachronistic remnants of the past in every organization because not all CIOs are rushing out and simply throwing every aspect of the IT organization to the cloud and heading home. In these organizations, the author implies, the CIO and the IT department in general are apparently universally reviled by their business counterparts because of IT’s lack of understanding of the business and unwillingness to simply take orders from every individual business unit.
SAPPHIRE, SAP’s annual mega-show, is just days away. Taking place next week (May 14-16) in Orlando, expectations are high for the German software maker and (now) database player.
At last year’s show, much of the focus was on HANA, SAP’s in-memory database, which promises end-users support for lightening fast analytics against large volumes of data. As I wrote then, SAP is betting the house on HANA, with plans to migrate its entire software and application portfolio onto the new database, as well as rolling out new, HANA-optimized analytic applications. SAP also declared last year that it intended to reach #2 in the database market by 2015.
As we continue this journey into the age of big data, cloud, mobility, social media and so forth, vast amounts of data are being generated daily. The volume of digital information continues to grow with no end in sight. More and more, personal and company information are becoming more and more digitized, both in storage and transfer. Securing this information is a growing challenge, and is becoming more complex by the day. Protecting digital assets means utilizing the best of available technologies and methodologies to achieve security goals. Not only must they ensure that the quality and performance of the solution is maintained, they must also assure undoubtedly that the information they seek to protect stays uncompromised.
The data center. Featuring state-of-the art technology, multiple millions of square feet of space, the requirement of holding billions of pieces of business and customer information.
What goes into data center infrastructure? Think about rooftop arrays of solar panels generating as much as 4.5 megawatts of power. Lightning prevention systems that detract strikes from a 300 foot radius. Structures designed to withstand a category 5 earthquake.
Check out Wikibon’s latest infographic, highlighting some of the innovative information behind five of North America’s largest data centers.
I could get so much material from this one hour video from Microsoft’s Build 2011 on the Channel9 MSDN blog.
This session will introduce the next release of Windows Server, code-named Windows Server “8”. We will talk about the engineering investments we have done in this release along with their benefits. We will also point out opportunities for developers and hardware partners to expand on the new capabilities in the product. This session will include lots of demos illustrating how Windows Server 8 lets our customers and partners move beyond virtualization and embrace a truly cloud optimized OS.
A recent survey of consumers conducted by Xerox indicated some surprising results in regards to consumer perception of electronic health records (EHRs). Among other findings, the main concern cited in the report was the threat of hackers stealing information. The article states:
“Nearly 80 percent of respondents who have concerns about digital medical records indicated stolen personal information by a computer hacker to be their number one worry, followed by the threat of lost, damaged or corrupted records at 64 percent and the misuse of information at 62 percent.”
Results also indicated the following:
Attivio added a handful of new modules to its Active Intelligence Engine platform today that allow users to tap into the power if Big Data. The AIE Extreme Modules include connectors to Big Data sources, namely Hadoop, as well as MPP data warehouses from vendors including HP Vertica, EMC Greenplum, IBM Netezza and Oracle.
Also included are a new recommendation engine that analyzes user-generated Big Data to suggest targeted products and services to customers and a new classification engine that classifies documents based on pre-determined rules and categories.
The new modules, particularly the Hadoop connector, are important developments for both Attivio and its current (and potential) customers.