Curl, an open source application installed on hundreds of thousands of servers, was found to have several serious security vulnerabilities in a voluntary audit. The vulnerabilities were quickly fixed, but the incident exemplifies the importance of external auditing of the open source projects on which we all depend.
IT Briefcase Exclusive Interview: Evolving the Enterprise with the Service Desk and Improved Workflows through IT Service ManagementDecember 26, 2016 No Comments
with Nancy Van Elsacker, Top DeskIn this Interview, Nancy Van Elsacker Louisnord, president of TOPdesk US, discusses the value of IT Service Management within the ever evolving IT Enterprise. Read More >>>
A lot of great software is being built using open source, and each year Black Duck reviews open source projects started during the past 12 months to recognize those whose mission, community growth, and market impact make them particularly notable. We call our selections the “Open Source Rookies,” and the process begins with an average 100-200 projects that meet those requirements of intriguing vision, ability to build a community, and value to the marketplace.
In many organizations, IT support seems to follow a corollary of Moore’s Law in which the number of support tickets — rather than the number of transistors — doubles every two years. Even companies that experience slower growth find that tickets ultimately proliferate and threaten to overwhelm their IT support teams if they haven’t kept their ticket management systems and processes up to date. You can avoid that fate by following the 10 steps below to keep tickets manageable, resolve them quickly and provide an amazing help desk and ticket management experience.
The direction of technology both follows and influences the direction of business. The tools enterprises need to compete, improve, adapt, solve problems, and succeed are supplied by technology. Sometimes, technology even supplies new opportunities, such as when a technological advance leads to the creation of a new marketplace. The Internet is by far the most powerful example of this in the past 50 years.
One of the buzzwords that has been floating around tech circles for the past several years is “open source.” Open source software has been around for quite a while, now, but there are still several misconceptions about it. Many people aren’t even quite sure what it means. Is it just freeware? Is it copyrighted material? How secure is it? Is it just cheap, low-quality junk that you use because you don’t want to shell out the money for a real program?
There are more online stores than ever as we get nearer to 2017; far more than when we experienced a dot-com boom back in 2000. People are appreciating the advantages offered by maintaining online businesses, which is why the market is saturated and very competitive.
Are you prepared for a network outage? Many companies have invested heavily in disaster-recovery solutions designed to mitigate the effects of catastrophic storms, earthquakes or power outages. However, Information Age notes that the cause of disruptions isn’t always so obvious — software updates gone awry or day-to-day human errors can also precipitate continuity problems. Here are five tips to help your company dodge network disruptions.
It seems as though the world has gone mobile. Everywhere you look someone has their smartphone out doing everything from playing Pokémon Go to shopping on the QVC online store. From texting to checking Facebook to keeping abreast of the news and weather forecasts, there is always something to do and see on that handy little gadget we wouldn’t leave home without. Not only are our cell phones a source of entertainment, but also a source of information and even function.
IT executives today expect they will need to provide more rigorous cost and ROI calculations to justify spending on services. At the same time, digital technology is increasingly the means for delivering profit-generating business services, so keeping technology in optimal working order is critical. This paradoxical imperative with the dual mandate of reducing cost and increasing value needs an effective strategy to drive toward “zero maintenance IT.”
Every day, organizations and individuals are experiencing the power of custom apps to improve productivity, increase efficiency and achieve desired outcomes. For those uninitiated, getting your first custom app off the ground can be intimidating. However, there are a few concrete steps that you can take to move your idea from imagination to implementation. These steps and core concepts have been distilled from the best practices of many people – and teams – who have planned their own custom apps and are using them to their advantage. By following these steps, you’ll be harnessing the power of custom apps in no time.
Big data, analytics, and especially mobile are disrupting the marketplace, and your customers need to understand the implications and opportunities inherent in the new marketplace. This webcast outlines ways to become a trusted source of knowledge and information on storage options for your customers.
This IDC Flash discusses Nimble Storage’s introduction of an all-flash array (AFA), the AF-Series, as an addition to the company’s already very successful CS-Series line of hybrid-flash arrays (HFAs), on February 23, 2016. This Flash discusses Nimble’s entry into the AFA space and updates IDC’s view of the company’s competitive position in the overall enterprise storage market, based on this announcement.
Business users expect immediate access to data, all the time and without interruption. But reality does not always meet expectations. IT leaders must constantly perform intricate forensic work to unravel the maze of issues that impact data delivery to applications. This performance gap between the data and the application creates a bottleneck that impacts productivity and ultimately damages a business’ ability to operate effectively. We term this the “app-data gap.”
At times, being a developer can feel a little bit like being back in school and getting partnered up on projects. You would work your butt off, fastidiously checking and rechecking your part of the assignment until you’re sure it’s perfect only to show up at school on Monday and find that your partner hasn’t fulfilled his end of the deal. And there goes the project.
with Jeremy Moskowitz, Founder and CEO, PolicyPak SoftwareIn this interview, Jeremy Moskowitz, founder and CEO of PolicyPak, speaks with IT Briefcase on the challenges and opportunities of using a virtual desktop infrastructure (VDI.)Read More >>>
by Stefan Bernbo, CompuverdeAs the data deluge continues on unabated, vertically scaling legacy approaches to storage are falling short. Organizations need to find a way to store high volumes of data without busting the budget, all while maintaining high levels of performance… Read More >>>
IBM commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by migrating from open source Java EE application servers to WebSphere Application Server (WAS) Liberty.
with Kong Yang, SolarWindsIn this interview, Kong Yang, Head Geek and technical product manager at SolarWinds, speaks with IT Briefcase on how hybrid environments are changing the role of the IT professional. Read More >>>
No longer a catchphrase or a vague notion, the Internet of Things is in full swing. McKinsey & Company estimates that the IoT has a total potential economic impact of $3.9 trillion to $11.1 trillion a year by 2025. Manufacturers are already spending considerable amounts of money on mobilizing the enterprise, including connecting employees, products, services and machines/vehicles. Digging deeper, we can see what functions in the business they’ve tackled first.
IT Briefcase Analyst ReportThis product guide allows you to quickly assess — current products in the market, deployment options, basic differences by monitoring features, the stability of suppliers and more. Read More >>>
In part one of this series, “Rugged DevOps: Survival is Not Mandatory”, I shared news that 1 in 16 open source and third-party components downloaded last year included a known vulnerability. That may not seem like too many until you realize the average company downloads well over 200,000 components annually. These components are electively downloaded by development teams, often unaware of the vulnerabilities that come with them.
Deming, the patron saint of DevOps once advised, “It is not necessary to change. Survival is not mandatory.” To survive, application development teams are constantly pressured to deliver software even faster. But fast is not enough. The best organizations realize that security, quality and integrity at velocity are mandatory for survival. Hence, DevOpsSec.
“Software is eating the world.” The now-classic quote from Marc Andreessen needs some updating, since it’s now more accurate to say software as a service (SaaS) is consuming the world, but the core statement is spot on: Companies can’t survive (and thrive) without the regular influx of new software. The problem? Many employees struggle to keep pace with changing environments and workflows — here are four tips for executives looking to streamline the software training process.
Learn how an integrated security strategy can secure and simplify access to Hadoop environments, while leveraging your existing identity management infrastructure.
Get insights on securing the Hadoop infrastructure, as well as the data in Hadoop.
People want to get going with DevOps or Continuous Delivery, but need a place to start. Others are already on their way, but need some validation of their choices. A few months ago, I published the first volume of DevOps and Continuous Delivery reference architectures which has now been viewed over 50,000 times on SlideShare (it’s free to download…no registration required). Three things helped people in the deck: (1) the reference architectures, (2) links to the sources for each architecture attached to each slide, and (3) no marketing fluff.
This year that annual shopping frenzy in the U.S. known as Black Friday will take place on November 27, the day after Thanksgiving. Sales, according to the Black Friday website, will actually start early on Thanksgiving Day and extend throughout the weekend. Total sales are expected to top $80 billion. Also, the number of bargain hunters will increase this year to well over 300 million. Sales channels will include both brick and mortar stores as well as online retailers.
by Antoine Mottier, BonitasoftUnderstanding customer need is more important today than ever as millennials enter the workforce. According to Goldman Sachs, millennials are one of the largest generations in history and are about to move into their prime spending years – poised to reshape the economy. Read More >>>