Transforming IT Requires a Three-Legged Race

For over 30 years, we have successfully run IT organizations. And things (generally) have worked well for IT organizations and the businesses they serve. Best practices were identified, shared and enhanced. Technology evolved and became increasingly more sophisticated. We built…

How to Leverage the Cloud for Disasters like Hurricane Sandy

Between natural disasters like Hurricanes Sandy and Irene or man-made disasters like the recent data center outages, disasters happen. The question isn’t whether they will happen. The question is: What can be done to avoid the next one? Cloud computing…

How Important are Ecosystems? Ecosystems are Everything

The IT industry is in a state of significant flux. Paradigms are changing and so are the underlying technologies. Along with these changes come the way we think about solutions. Over time, IT organizations have amassed a phenomenal number of…

Apple Acquisition of AuthenTec Provides Significant Opportunity

Apple’s acquisition of AuthenTec for $8 per share or about $356 million brings a value purchase of fingerprint and security technology. On the surface, the acquisition provides Apple with biometric fingerprint technology to imbed in their mobile devices. While that…

Gaining Entry to the Enterprise via the Consumer Trojan Horse

Ok, so you’re selling technology products, solutions or services. You’re looking for the largest buyers and typically look to the enterprise market. You develop the strategy and start going to work. You setup a sales team, check. You setup a…