This is a roll-up of all Forrester blogs written for Business Technology Professionals. Role-specific blogs are listed below. Visit Forrester.com to learn how we make Business Technology Professionals successful every day.
If you still subscribe to fixed site recovery services using shared IT infrastructure from the likes of HP, IBM BCRS, or SunGard, among others, you will quickly become a dinosaur in the next 1 to 2 years.
These types of shared infrastructure services involve lengthy restores from tape and a recovery time objective of 72 hours, at best. Plus, you'll be lucky if you recover at all because chances are, you've had trouble scheduling a test with your service provider and it's been a LONG time since the last one, if indeed you’ve ever tested.
72 hours recovery just doesn't cut it anymore. And frankly, understanding your provider's oversubscription ratio to shared infrastructure to determine the risk of multiple invocations, or attempting to negotiate exclusions zones and availability guarantees is a time suck. Most companies are either taking DR back in-house or, if they still rely on a DR service provider, they are using dedicated infrastructure.
Monster today announced their acquisition of Mountain View, Calif. based Trovix for $73 million in an all cash deal. Trovix was known as an applicant tracking system (ATS) vendor and have amassed over 40 customers during their short tenure, but that was not their passion. Instead, they were fully focused on perfecting and innovating search technologies. Their goal was to bridge the gap between jobs and candidates and find the perfect match for both. So what does Monster get and what are they going to do with Trovix?
What's a zettabyte? It's the same amount of information found on 500 billion DVDs or 75 full-length movies for every human on the planet. And a half a zettabyte, a mere 250 billion DVDs' worth, is the number of bits that Cisco expects to fly around the Internet every year in 2012.
The networking giant has created aVisual Networking Index, a detailed measurement of annual business and consumers Internet traffic. In a recent conversation with Cisco senior analyst Arielle Sumits, we learned that Cisco has used this index and a lot of detailed data to calculate that the public and private Internet will carry 6 times the amount of traffic in 2012 as it does today.
The big driver of that torrent is, of course, video. By 2012, Internet video alone will be almost 400 times the size of the entire US backbone in 2000. Add downloadable HD video, Telepresence, and Internet traffic to the television, and the volume of bits is staggering, even higher than the P2P traffic.
Wow, that's a lot of bits. But what does it really mean? I think it means three things for Information & Knowledge Management professionals:
My colleague at Forrester, Chris Silva, recently commented upon the recent Air Defense acquisition by Motorola. Looking at the deal through the security lens, I completely agree with Chris that this will help ease integration of wireless security into wireless infrastructure. It's good to see one of the major wireless brands step up and take wireless security seriously. Perhaps that other major wireless vendor will get the hint...
Motorola announced this week its intentions to acquires Wireless IDS/IPS vendor AirDefense.
The acquisition may provide a bit of deja vu to readers who recall the
acquisition of Network Chemistry's wireless IDS/IPS assets by Aruba
Networks in 2007.
In our efforts to become increasingly more relevant to the day-to-day concerns and research needs of BP&A professionals we’re asking you to participate in our current Business Process & Applications Survey. With your insight, our analysts will learn more about your evolving role in the enterprise and prioritize their research plans to better address the pressing issues that BP&A professionals face.
The Dark Knight is chock full of memorable quotes and, dare I say, advice from none other than the Joker, a role played eerily, crazily, and fabulously by the late Heath Ledger. One of the many quotes that stuck with me is "If you are good at something, never do it for free." This is pretty good advice, especially when you are proposing to "Kill the Batman" in exchange for half of the mob's money. It worked for the Joker. He got the job.
But, is this advice good for software developers?
On the surface it seems silly to even ask the question. Why would anyone want to work for free? But plenty of people donate their time and talent to causes great and small in an effort to help people and to benefit humanity. That is a good thing. But, is this in fact good advice for open source software developers? To answer this question we need to know what motivates them and what they hope to gain.
Software developers contribute to open source projects for many different reasons.
I had a conversation with a client the other day about Blogging at work. The question came up, as it often does, how to ensure that employees blog appropriately at work. We spoke about corporate policies regarding appropriate use of the intranet, discussing if they really make an impact on behavior, or if they only exist as leverage when it comes time to take action.
It occurred to me that there is a simple analogy that all professionals can relate to, which brings clarity to the issue: How do you determine what to wear to work?
At every company I have ever worked in (with the exception of Forrester, ironic), there was an explicit policy about dress code. In some organizations, men are expected to show up in a pressed shirt, perhaps a tie and jacket. In others, the code is more lax, but denim jeans are verboten. Of course, men have it much easier, we have fewer choices and they all work pretty well for us. In my last company, a memo forbidding open-toe shoes angered many women in my team, including my boss, who loved her shoe collection. Why forbid open-toe shoes? Perhaps it could lead to sandals – or, heaven forefend – crocs! Crocs in the workplace – oh my word, that could be terrible!
When Business Objects got acquired by SAP earlier this year, it made a statement that it plans to continue to remain an open, heterogeneous BI vendor, treating all partners equally. Apparently, all partners are not created equal – and, as we suspected and long predicted, this Business Objects strategy does not extend to its own parent.
Well, the cat's finally out of the bag. Efforts are already underway at SAP to improve the existing connectivity between Business Objects products and SAP applications. The improved connectivity that may result from these efforts will be very much optimized for Business Objects products only. SAP states that "SAP customers who instead decide to move forward with non-SAP third party BI tools will not benefit from these types of improvements and enhancements."