Content Vault : Applications | Recommended Content
CIO Leadership, Applications

Touching down on Transformation one application at a time

Applications Transformation can be a competitive sport like football

Blog-post by,
HP Blogger
,

Denver Broncos’ quarterback, Peyton Manning threw his record-breaking 509th touchdown against the San Francisco 49ers.  A moment of glory for Manning who would have thrown many more times out of which there were 509 glorious touchdowns.  Applications Transformation principles are not very different.  While business objectives drive the strategy and roadmap to get to that future state, enterprise transformation happens one application at a time – or in Manning’s words, one throw at a time.  I am no quarterback but would like to think like one by applying simila

(1) (1)

Business Issues, Applications, Cloud

Moving the right apps to cloud to make the business run better

How to reap cloud benefits....

Blog-post by,
HP Blogger
,

Companies are adopting the cloud as they realize more and more benefits. Few jump in whole hog based on the cloud hype and there's been plenty of that. Still, as the cloud becomes more mainstream, new terms crop up.

(2)
   
(4) (4)

CIO Leadership, Applications

The 5 stages of app performance maturity

At what stage is your company — and how do you get to the top level?

Blog-post by,
Gerben Verstraete

IT operations has never had an easy time evaluating how business applications are performing end-to-end. If this sounds like a familiar conversation from years gone by, you are correct. But now the growing complexity of mobile apps and composite apps is fueling the challenge anew. Most of my customers are moving to a level of maturity with their application monitoring processes, as app visibility is critical to business revenues.


CIO Leadership, Technology, Applications, Cloud, Security

Looking for innovative, daring and successful cloud implementations

That's our #CIOchat topic, Thursday, 2-3 p.m. ET.

Blog-post by,
Community Manager
,

Our chat topic this week will explore innovative, daring and/or successful cloud implementations. It's time to talk about actual examples.

(4)
   
(2) (2)

Technology, Applications, Big Data

Mastering Data Management

MDM, SOA, ESB, and Other Three Letter Words

Blog-post by,

I met with a client last week that was trying to determine what and how to deal with one of the most common and complex problems that organizations both small and large have to deal with – data management.  This oil and gas company had data coming out of its ears – production data, seismic data, HSE data, down-hole sensor data, well log data, financial data… you get the picture.  Each department was its own silo; a vast, sprawling archipelago of data islands completely disconnected from each other.

(2) (2)

Technology, Applications, Mobility, Security

Wearables fashion v. function: depends on who's buying.

#CIOchat reveals substantial interest from CIO in wearables.

Blog-post by,
Community Manager
,

Our Twitter #CIOchat this week tackled wearable devices: fashion versus function? The consensus was it depends on the market, but that fashion is very important in most cases. 

We also explored IT and security implications of smart watches and more broadly, wearable devices. But first the numbers: 28 participants (a half dozen CIOs) cranked out 282 Tweets in our hour long #CIOchat.

(5)
   
(1) (1)

Technology, Applications, Mobility, Security

Fashion first, function second in smart watches, wearables

We #CIOchat about this at 2-3 p.m. ET, Thursday.

Blog-post by,
Community Manager
,

It's simple. Most people won't don a smart watch or wearble device that's ugly. Consumers will not buy the new Apple Watch or forthcoming HP Luxury Smartwatch unless they are sharp and fashionable.

Our weekly #CIOchat will center on this fun question: Is fashion as important as function with smart watches and wearable devices? We chat 2-3 p.m. ET on Thursday, hashtag #CIOchat .

(4)
   
(2) (2)

Business Issues, Applications, Mobility, Security

Imperfect Security: something will always get through

The weak link is employees.

Blog-post by,
Community Manager
,

Our #CIOchat yesterday looked at security through the lens of recent credit card hacks via payment systems.

First the numbers: 23 participants spewing out 333 Tweets! We chat every Thursday 2-3 p.m. p.m. ET, hashtag #CIOchat . 

All agreed that no security is foolproof and that something is going to get through. Several did not envy being a retail CIO given these high profile hacks at Target, Home Depot and most assuredly others.

What's more, employees are the point of the most vulnerability to cyber attacks.

(4)
   
(2) (2)

Business Issues, Technology, Applications, Cloud

Will public cloud market just be served by big vendors?

I don't think so although some do.

Blog-post by,
HP Blogger
,

I don't agree with David Linthicum's post in InfoWorld that contends the IaaS and PaaS markets will no longer support smaller providers. He also argues that the little guys will have to exit those markets and find something else to do. 

(4)
   
(2) (2)

Business Issues, CIO Leadership, Applications, Mobility

BYOD fading, IT regaining control?

Wishful thinking or reality?

Blog-post by,
Community Manager
,

BYOD is an easy subject to have strong opinions about and that resulted in a very robust Twitter chat hour yesterday. The Tweets were flying: 279 of them from 38 rowdy participants.

The main question asked if BYOD is on the wane or plateauing based on a couple of CIO.com stories from senior online writer Tom Kaneshige. One cited a California court ruling that employees must be reimbursed for business calls made from personal phones.

(2)
   
(2) (2)