Monster today announced their acquisition of Mountain View, Calif. based Trovix for $73 million in an all cash deal. Trovix was known as an applicant tracking system (ATS) vendor and have amassed over 40 customers during their short tenure, but that was not their passion. Instead, they were fully focused on perfecting and innovating search technologies. Their goal was to bridge the gap between jobs and candidates and find the perfect match for both. So what does Monster get and what are they going to do with Trovix?
What's a zettabyte? It's the same amount of information found on 500 billion DVDs or 75 full-length movies for every human on the planet. And a half a zettabyte, a mere 250 billion DVDs' worth, is the number of bits that Cisco expects to fly around the Internet every year in 2012.
The networking giant has created aVisual Networking Index, a detailed measurement of annual business and consumers Internet traffic. In a recent conversation with Cisco senior analyst Arielle Sumits, we learned that Cisco has used this index and a lot of detailed data to calculate that the public and private Internet will carry 6 times the amount of traffic in 2012 as it does today.
The big driver of that torrent is, of course, video. By 2012, Internet video alone will be almost 400 times the size of the entire US backbone in 2000. Add downloadable HD video, Telepresence, and Internet traffic to the television, and the volume of bits is staggering, even higher than the P2P traffic.
Wow, that's a lot of bits. But what does it really mean? I think it means three things for Information & Knowledge Management professionals:
My colleague at Forrester, Chris Silva, recently commented upon the recent Air Defense acquisition by Motorola. Looking at the deal through the security lens, I completely agree with Chris that this will help ease integration of wireless security into wireless infrastructure. It's good to see one of the major wireless brands step up and take wireless security seriously. Perhaps that other major wireless vendor will get the hint...
Motorola announced this week its intentions to acquires Wireless IDS/IPS vendor AirDefense.
The acquisition may provide a bit of deja vu to readers who recall the
acquisition of Network Chemistry's wireless IDS/IPS assets by Aruba
Networks in 2007.
Motorola announced this week its intentions to acquires Wireless IDS/IPS vendor AirDefense. The acquisition may provide a bit of deja vu to readers who recall the acquisition of Network Chemistry's wireless IDS/IPS assets by Aruba Networks in 2007.
Meru Networks, eschewing acquisition for product introduction made its own announcement on Monday, announcing the company's RF Barrier, an active RF management solution that aims to solve the problem of what the vendor is calling "leaky RF." The Meru solution actively blocks 802.11 RF from escaping the physical confines of a WLAN deployment to thwart external "parking lot" attacks by closing Wi-Fi based attack avenues.
Quark, Inc. has been undergoing a major strategic overhaul in the past two years. With its acquisition this month of In.Vision, the leading add-in to Microsoft Word for XML authoring, it appears poised to be taken seriously for enterprises wanting to empower their business units and be able to reuse content dynamically through a variety of channels.
In our efforts to become increasingly more relevant to the day-to-day concerns and research needs of BP&A professionals we’re asking you to participate in our current Business Process & Applications Survey. With your insight, our analysts will learn more about your evolving role in the enterprise and prioritize their research plans to better address the pressing issues that BP&A professionals face.
The Dark Knight is chock full of memorable quotes and, dare I say, advice from none other than the Joker, a role played eerily, crazily, and fabulously by the late Heath Ledger. One of the many quotes that stuck with me is "If you are good at something, never do it for free." This is pretty good advice, especially when you are proposing to "Kill the Batman" in exchange for half of the mob's money. It worked for the Joker. He got the job.
But, is this advice good for software developers?
On the surface it seems silly to even ask the question. Why would anyone want to work for free? But plenty of people donate their time and talent to causes great and small in an effort to help people and to benefit humanity. That is a good thing. But, is this in fact good advice for open source software developers? To answer this question we need to know what motivates them and what they hope to gain.
Software developers contribute to open source projects for many different reasons.
I had a conversation with a client the other day about Blogging at work. The question came up, as it often does, how to ensure that employees blog appropriately at work. We spoke about corporate policies regarding appropriate use of the intranet, discussing if they really make an impact on behavior, or if they only exist as leverage when it comes time to take action.
It occurred to me that there is a simple analogy that all professionals can relate to, which brings clarity to the issue: How do you determine what to wear to work?
At every company I have ever worked in (with the exception of Forrester, ironic), there was an explicit policy about dress code. In some organizations, men are expected to show up in a pressed shirt, perhaps a tie and jacket. In others, the code is more lax, but denim jeans are verboten. Of course, men have it much easier, we have fewer choices and they all work pretty well for us. In my last company, a memo forbidding open-toe shoes angered many women in my team, including my boss, who loved her shoe collection. Why forbid open-toe shoes? Perhaps it could lead to sandals – or, heaven forefend – crocs! Crocs in the workplace – oh my word, that could be terrible!