Using Amazon Web Services IAM
IAM (Identity and Access Management) from Amazon Web Services is a tool to create users, groups, roles and permissions. This is a 10 minute video on how to use IAM (Identity and Access Management)...
View ArticleShould a DDoS be considered a legal form of protest?
Should a DDoS be considered a legal form of protest?
View ArticleMove To Put ERP On HANA Significant For SAP Customers: Ray Wang
Filed under: News : Business Intelligence Ray Wang, Principal Analyst & CEO, Constellation Research shares his views on SAP Business Suites availability on SAP HANA. Read more
View ArticleFunding For OpenStack Brain Trust
Dell, Intel and WestSummit Capital have come together to infuse $10 million in funding into Mirantis, a cloud consulting firm. Mirantis is one of the only OpenStack brain trusts outside of Rackspace....
View ArticleA CIOs Enterprise Mobility Strategy Blueprint
Filed under: Videos : Mobility Leigh Williamson, IBM DE, IBM Software, Rational CTO Team explains important points to consider before CIOs can roll out their enterprise mobility strategy. Read more
View ArticleU.K. CIOs Stretch Budgets With Used Equipment
Some UK IT execs embrace pre-owned network equipment in a bid to find more IT budget for new innovation.
View ArticleExperimental Results: Liars and Outliers Trust Offer
Last August, I offered to sell Liars and Outliers for $11 in exchange for a book review. This was much less than the $30 list price; less even than the $16 Amazon price. For readers outside the U.S.,...
View ArticleHow Centre College IT Prepped For VP Debate
Small college needed new IT infrastructure to meet the Wi-Fi, cellular, VoIP demands for the U.S. vice presidential debate. Here's how they did it.
View ArticleServer Power Factor: Thoughts on Bridging IT-Facilities Conversations
In the data center space, the most fruitful conversations stem from crossing the department lines and finding out exactly what you have in common. A perceived schism exists, however, such that...
View ArticleThe SAP Fanboy
“Rubbish” responded John Appleby to a tweet of mine which pointed out SAP evolves very slowly and that 95% of its revenues still come from older ECC and Business Objects licenses and maintenance. A few...
View ArticleProgress. It is inevitable.
I was reading an article recently on the progress being made in the manipulation of electronic data on film sets ( I know, right...). In particular the article was talking about how the current methods...
View ArticleExecutive Q&A with John Andrews: Part I - What “Personalization” Really Means...
We sat down with John Andrews, VP of Product Management, Oracle Commerce to discuss his views on one of the most talked about topics in the world of commerce, personalization. Q. The term...
View Article4.4 Million Big Data Jobs? Not So Fast
Gartner made headlines recently when it predicted big data would create 4.4 million jobs by 2015. The analyst firm opined that there’s not enough hired talent to meet the challenges of big data and...
View ArticleWhen it comes to Content and your business - Go Big or Stay Home!
Happy Friday everyone! Yesterday I wrote briefly about the importance of honing you personal skills along with improving the way you use technology to manage content in your organization. Today, I...
View Article3 More Reasons SMBs Stick With Windows XP
Microsoft says Windows 8 selling like hotcakes, or at least like Windows 7. Here's why some SMBs are just saying no.
View ArticleUKOUG - Everthing you wanted to know about developing mobile applications
UKOUG are running an awesome special interest group on mobile development. The ability to run and access enterprise applications on smartphones and tablets is probably the hottest development topic...
View ArticleCreating a 21st Century Finance Organization
What is it that CFOs need to create a successful twenty-first century finance organization? CFOs must become more strategic in their use of technology and even become a catalyst for change. Becoming a...
View ArticleAPEX Listener PL/SQL Validations
There's a 2 ways to lockdown which applications/URLS are accessible for any APEX installation with the APEX Listener. First, I showed the new javascript method in the 2nd half of this post. This is...
View ArticleExperts Say All Computer Users Should Disable Java ASAP
Hackers are currently exploiting a security vulnerability in Java, and there is no patch or workaround.
View Article