ThinkPanmure released a bulletin this week speculating that networking stalwart Cisco had plans to enter the femtocell fray via the potential acquisition of equipment vendor iP.access.
If the plans prove true, is this another Navini move for Cisco? I’d say not. An acquisition like this would symbolize a new vector in the vendor’s network equipment strategy. This move would take Cisco equipment in a place where it has not (at least officially) gone before; extending the cellular networks that are of increasing importance to businesses, especially those with a high percentage of mobile workers.
Infosecurity Europe is the continent's premier dedicated information security event. InfoSec, held the 22nd-24th of April at London's Grand Hall, Olympia, saw some 300 security vendors exhibiting and more than 12,500 security folks visiting. Next year will be at the bigger Earls Court. Last year had fewer attendees, but the benefit of a clear key topic: data security.
So, what was the buzz about this time around? Well, for starters there was no single topic that stood out, but instead InfoSec 2008 was a complex smorgasbord of all past and present security and risk management themes. Certainly, deperimeterization, endpoint protection, data-driven security, and compliance strategies were very visible, but at the same time many network security solutions and antivirus stuff were pushed heavily. Some of the traditional security heavyweights were, you guessed it, widely visible and audible and included the likes of McAfee, Sophos, Kaspersky, Juniper Networks, etc.
In recent years, AMD has struggled to remain relevant in the commercial PC as it has competed against Intel, the market share leader and gold-standard in processor performance. Today, companies often only choose AMD for its lower initial acquisition costs — which run approximately $50 to $75 cheaper than Intel’s, although you’re sacrificing performance to get there. This approach of narrowly undercutting Intel has not worked well for AMD, as it has now seen six straight quarters of net loss.
On Monday, however, AMD announced a major new initiative it calls AMD Business Class — a renewed effort to better compete in the commercial segment across both desktops and laptops. Targeting SMBs, the public sector, and large enterprises, AMD Business Class is its renewed focus on a historically weaker area than the consumer market. Initially, AMD is touting the availability of three new AMD-powered desktops: HP’s dc5850 and dx2450, Fujitsu Siemens Computers’ Esprimo E/P5625, and a refresh of Dell’s OptiPlex 740. The new processors are available in Athlon X2 dual-, Phenom X3 triple-, and Phenom X4 quad-cores and will try to keep pace with Intel’s Green IT initiatives with Energy Star 4.0 compliance.
Last week, I delivered a presentation about the recent report Web3D: The Next Major Internet Wave at the vBusiness Expo in Second Life. I'll share some of my experiences and observations, as I'm sure that during the coming year many of you will be invited to present at or attend virtual conferences and meetings -- if you haven't already. These tips may prove helpful.
Picture this. You, the application developer, are in a big conference room. On your left is your boss. On your right are enterprise architects. Across from you are the business analysts and project managers. In the hallway is the businessperson on his "crackberry". Why is everyone gathered here? To discuss the next important application development initiative that the business needs to drive revenue, stay competitive, and be more efficient.
The number of pure-play vendors in user account provisioning decreased on April 7, 2008 when Hitachi announced that it acquired M-Tech Information Technology, and changed the name to Hitachi ID. Although Hitachi has been lacking an identity and access management (IAM) pedigree, this move can prove important due to the following reasons: 1) Using IAM for provisioning of physical resources and hardware resources. 2) Extending enterprise role definitions to previously uncharted verticals and cultures. 3) Evangelizing user account provisioning and IAM in Japan and other APAC regions. 4) Hitachi becoming a major player in Japanese SOX (JSOX) implementation.
Needless to say, the above will hinge on Hitachi's ability to retain and grow the existing customer base of M-Tech IT in North America and Europe, and also on Hitachi's ability to compete against EMC's selling of Courion and RSA products. How Hitachi will create an access and adaptive access management (Web and desktop) portfolio to complement its identity management and provisioning portfolio also remains to be seen.
Overarching causes described in the report are not surprising; control failures, an overly aggressive focus on short-term growth, and excessive risk taking are among the high level issues addressed. Also in the report, however, are scores of more detailed explanations of control failures in more than 20 different categories. Specific problems on the list include:
Teradata has taken the big plunge. Yesterday, as long rumored, it launched the first commercial solutions in its broad portfolio to be explicitly positioned as data warehousing (DW) appliances. Specifically, it announced the new Teradata 550P, Teradata 2500, and Teradata 5550 platforms, which join the established Teradata 5500 platform in the vendor's market-leading enterprise data warehousing (EDW) solution family.
On April 18th, IBM announced its intent to acquire virtual tape library (VTL) and deduplication vendor Diligent Technologies. For IBM, Diligent is a good fit. The company offers both mainframe and open systems virtual tape libraries and they are a pioneer of deduplication. However, IBM already offers a market leading mainframe VTL based on its own intellectual property and an open systems VTL based on FalconStor technology — although the open systems VTL has very limited adoption — so there is also a lot of overlap. Because Diligent is a software solution, IBM can quickly integrate Diligent with any of its storage systems and bring new VTLs to market relatively quickly. It’s very likely that IBM will in fact pursue this route so it can bring an inline deduplicating VTL to market as quickly as possible.