It used to be that a company could pretty much tell where its corporate data was located. It sat on corporate file servers, perhaps as email attachments on a corporate email server, and on well-controlled corporate desktops and laptops. A company could disable USB...
I, like most of my colleagues, have worked with all types of IT vendors: hardware, software, services, and cloud. Each comes to the market seeking to engage with the indirect partners: distributors, resellers, ISVs, service providers, etc. I’ve seen this quest as a...
Who are you? Not philosophically but digitally. What is your identity within your organization? Not just for authentication purposes but for informing others what you have to offer and what you want. This is not a trivial question, at least from a software point of...
Last weekend, I did it again. I ran out of the door without my wallet. A wallet that I have treasured since I got it 20+ years ago. But, unlike the embarrassing predicament that I got myself into, by being payment-less for a lunch meeting with a new client, I was...
On January 28, 2015, my colleague posted a Research Note about Symantec’s plans for VERITAS, putting it back to separate business (before the acquisition), publically traded and renamed back to VERITAS. As Mr. Woo so aptly stated it was like Phoenix rises from the...