We Can Work IT Out: The In-House IT and MSP Dynamic
In-house IT professionals and managed service providers (MSPs) have had an
interesting relationship over the course of IT history. Yes, they are vastly
different, but if we drew a Venn diagram of IT and the MSP, the intersection
of the two is worth exploring, particularly regarding how IT professionals
can best manage their MSPs and work harmoniously to advance the common goal
of IT performance.
For IT professionals, the very utterance of the acronym "MSP" may conjure
feelings of skepticism and fearing the reaper, which doesn't need to be the
case. MSPs don't always equal outsourcing IT in its entirety. Let's explore
common scenarios where in-house IT professionals and MSPs work together,
because in these cases, in-house IT professionals need to understand how to
get the most out of these relationships and up-level... (more)
The Myth of 'Mission-Critical': Irrational Thinking in Modern IT Management
By Susan Cole
I was reading an article today that discusses managing “mission-critical”
applications. I really dislike that term. It’s trite, it’s dated – even
nonsensical. It suggests that applications fall into two groups –
mission-critical, and…optional? marginal? unnecessary? one step away from
being voted off the island?
Here’s the fallacy with that view – people that run IT organizations are
smart, and they invest in stuff that matters to the business. They don’t
run apps that don’t provide value because they excel at cost-efficiency. So
the notion that relatively few apps are actually worth managing is illogical.
Even email, the poster child for apps at the bottom of the food chain, is
essential to the operation of a 21st century organization – it’s how they
Which is ... (more)
The origins of SAP GRC software goes back decades, but adoption has been
slow. But with the rigor of modern compliance regimes like SOX, coupled with
the sheer volume and complexity of online transactions, there's been an
accelerating movement away from document-centric review processes to
automation. There are a variety of SAP process control and access control
solutions that can monitor transactions, alert on potential SOD conflicts,
and facilitate remediation.
Companies implementing GRC software stick segregation of duties in IT for
IT handles the Basis administration, which implements the security model They
understand security concepts like the principle of least privilege Often,
they're the only ones who can make heads or tails of the SAP GRC software
But in reality, sticking segregation of duties in IT is asking for trouble.
Why Keep... (more)
The time of year when crystal balls get a viewing and many pundits put out
their annual predictions for the coming year. Rather than thinking up my own,
I figured I’d regurgitate what many others are expecting to happen.
8 Predictions About How the Security Industry Will Fare in 2017 – An eWeek
slideshow looking at areas like IoT, ransomware, automated attacks and the
security skills shortage in the industry. Chris Preimesberger (@editingwhiz),
who does a monthly #eweekchat on twitter, covers many of the worries facing
10 IoT Predictions for 2017 – IoT was my number 1 in The Top 10, Top 10
Predictions for 2016 and no doubt, IoT will continue to cause havoc. People
focus so much on the ‘things’ themselves rather than the risk of an
internet connection. This list discusses how IoT will grow up in 2017, how
having a service component will be key, the com... (more)
Application Delivery Basics
One of the unfortunate effects of the continued evolution of the load
balancer into today’s application delivery controller (ADC) is that it is
often too easy to forget the basic problem for which load balancers were
originally created—producing highly available, scalable, and predictable
application services. We get too lost in the realm of intelligent application
routing, virtualized application services, and shared infrastructure
deployments to remember that none of these things are possible without a firm
basis in basic load balancing technology. So how important is load balancing,
and how do its effects lead to streamlined application delivery?
Let’s examine the basic application delivery transaction. The ADC will
typically sit in-line between the client and the hosts that provide the
services the client wants to use. As with most th... (more)
Ask the Right Questions Before Jumping into Development
In today's post, we're going to be talking more about the steps of ID-GEM -
the business impact software framework from Amadeus Consulting that is
designed to streamline your development process. ID-GEM is a free,
downloadable planning tool that helps organizations incorporate business
objectives early in the development process to reduce software project
failure rates by addressing the need for better front-end planning.
In our last post, we talked about step one - the "I" of ID-GEM, which stands
for "Identify Value." It might be helpful to take a step back and read that
blog so you can understand the importance of identifying business value
before beginning your project.
So now that you're brought up to speed with step one, let's launch right into
step two - D, for "Discovery Questions." This is the part of y... (more)
The Year of the (Fire) Rooster will soon be upon us and the talkative,
outspoken, frank, open, honest, and loyal Rooster could influence events in
2017. Whether you were born under the symbol or not, Roosters strive on trust
and responsibility, essential for any organization especially in these times.
2016 (Year of the Monkey) brought us a crazy year of high profile breaches, a
500% increase in ransomware, a 0-day per day and slick malware each looking
to cause havoc on all parts of society including your mobile device. The
monkey’s shenanigans exhausted many of us in 2016 and 2017 will require
some quick thinking and practical solutions to battle the ongoing,
A year ago I noted, Mobility, both the state of being and the devices we use,
will continue to grow and be an immense enabler and/or inhibitor for
organizations. Today, we are the devices... (more)
The entire intent of load balancing is to create a system that virtualizes
the “service” from the physical servers that actually run that service. A
more basic definition is to balance the load across a bunch of physical
servers and make those servers look like one great big server to the outside
world. There are many reasons to do this, but the primary drivers can be
summarized as “scalability,” “high availability,” and
Scalability is the capability of dynamically, or easily, adapting to
increased load without impacting existing performance. Service virtualization
presented an interesting opportunity for scalability; if the service, or the
point of user contact, was separated from the actual servers, scaling of the
application would simply mean adding more servers or cloud resources which
would not be visible to the end user.
High Availability ... (more)
What is the Domain Name System (DNS)?
Imagine how difficult it would be to use the Internet if you had to remember
dozens of number combinations to do anything. The Domain Name System (DNS)
was created in 1983 to enable humans to easily identify all the computers,
services, and resources connected to the Internet by name—instead of by
Internet Protocol (IP) address, an increasingly difficult-to-memorize string
of information. Think of all the website domain names you know off the top of
your head and how hard it would be to memorize specific IP addresses for all
those domain names. Think of DNS as the Internet’s phone book. A DNS server
translates the domain names you type into a browser, like www.f5.com, into an
IP address (184.108.40.206), which allows your device to find the resource
you’re looking for on the Internet.
DNS is a hierarchical distributed naming sy... (more)
The mad dash to connect virtually every noun to the internet or the Internet
of Things is creating a massive M2M network for all the devices, systems,
sensors and actuators to connect & communicate on the Internet.
With that, they need a communications protocol to understand each other. One
of those is Message Queue Telemetry Transport (MQTT). MQTT is a “subscribe
and publish” messaging protocol designed for lightweight machine-to-machine
(or IoT) communications.
In this episode of Lightboard Lessons, I light up how MQTT works.
IoT Ready Infrastructure IoT Effect on Applications IoT Influence on Society
What are These "Things? The Intruders of Things
Internet of @ThingsExpo, taking place June 6-8, 2017 at Javits Center, New
York City, is co-located with 20th International @CloudExpo and will feature
technical sessions from a rock star conference facult... (more)
Early Bird Savings Cloud Expo
Cloud computing is a game changer. The cloud is disrupting traditional
software and hardware business models by disrupting how IT service gets
delivered. Entrepreneurial opportunities abound as this classic disruptive
technology begins to proliferate, so it is no surprise that SYS-CON's
industry-leading International Cloud Expo is going from strength to strength.
The 5th International Cloud Expo, to be held April 19-21, 2010, at the Jacob
Javits Convention Center in New York, NY, announces that its Call for Papers
is fast approaching.
Topics on which submission are welcome include all aspects of providing or
using massively scalable IT-related capabilities as a service using Internet
technologies (see suggested examples below).
Help plant your flag in the fast-expanding business opportunity that is The
Cloud: submit your speaking propos... (more)