If rumors of Google and Microsoft going after a piece of Amazon’s infrastructure service business are true, the competition could result in dramatically lower prices and IT could be a big winner.
Adam Pisoni from Yammer describes traditional enterprise software as being forced to eat soup with a fork when you know very well there are spoons are out there somewhere. He says, consumerization is forcing IT to give out spoons.
Facebook has joined Netflix in offering edge servers to ISPs to help break content delivery bottlenecks around its growing photo collection. And your company could learn from Facebook’s highly efficient approach.
As more companies develop mobile apps to access enterprise systems, experts say it’s imperative to get issues like security architecture taken care of early on, allowing you to build apps on top of that system.
Microsoft appears to be trying to build a tablet that’s IT-friendly, but in the Bring Your Own Device era, users tend to be choosing their own devices, and this could be an outdated strategy.
Some IT departments have decided that the best defense against hackers could be a good offense, and deceiving hackers is one thing, but outright attacking them is another altogether.
As consumerization trends sweep over the enterprise, sometimes the easiest way to deal with a problem is to provide some front-end tweaks to make it easier to use the existing back-end systems. Beats ripping and replacing.
Last week’s security breach at LinkedIn was exacerbated by reportedly sloppy security techniques with stored passwords, which allowed hackers to grab millions of them.
When Netflix teamed with Internet Server maker NGINX to design the open source servers for its content delivery network (CDN), it turned out to be a good match for all concerned — including ISPs who got low-maintenance, highly efficient servers and users who should get smoother streaming of Netflix content.
When hackers brought down web security service Cloudflare last week, a post mortem by the company showed the hackers exploited four unrelated vulnerabilities, proving just how relentless hackers can be when getting into a system.