Newsletters 2007

April 25, 2007

The merger of physical and information security: the new frontier

Why the inability to produce actionable intelligence from physical security systems is hampering organizations The market for Physical Security Information Management (PSIM) technologies is nascent, with the biggest initial take up being seen in government agencies, law enforcement and the military. But interest is growing fast in the private sector, especially in heavily regulated industries […]

0 Comment
April 25, 2007

Can Software as a Service work for Business Intelligence?

Software as a Service (SaaS) has become an important option for many business applications.  The model is subscription based; users don’t pay a license fee and the service provider hosts, runs, and manages the software in a one-to-many model. Usually, the software can be implemented very quickly – much faster than a purchase software package.  […]

0 Comment
April 25, 2007

Is your business process approach service oriented?

The packaged applications market has remained unchanged for more than 30 years.  Yes, some of the trimmings have changed — the programming languages the packages have been written in have changed and standard interfaces and middleware has been added.  Some vendors have even started modularizing their code.  But the fact remains that a packaged application […]

0 Comment
March 16, 2007

Five Important Strategies for Text Analytics Vendors

Text analytics is a rapidly evolving market. Nimble new vendors are entering the space, incumbents continue to battle, and now technology giants are jumping in.  The technology analyzes unstructured text, identifying and extracting the relevant parts and then transforms it into structured information to be mined and analyzed. It is very compelling. Users of the […]

0 Comment
March 16, 2007

Why Is Physical Security Still the Poor Relation?

Security predates technology. Theft, intrusion and fraud are crimes that have been around for as long as people. But if you mention the word ‘security’ in a corporate environment, most people will immediately think of computer viruses and hackers. Some might just think of the security passes that get them into the building, but few […]

0 Comment
March 16, 2007

You want to get started with SOA? IBM has it by the Box Full

IT and business executives frequently ask us about getting started with SOA. They are unsure about the best way to begin. Which project is the right place to start? Which has the greatest likelihood of success and which will have the greatest visibility at the business management level?  Most of them recognize that even a […]

0 Comment
March 16, 2007

Why 64 Bits Will Soon Matter

Cast your mind back fifteen years, if you can. Believe it or not that was when the IT industry suddenly started to get excited about 64 bit computing. IBM (in conjunction with Apple and Motorola) had already embarked on the design of the 64 bit Power PC chip and Digital announced the 64 bit Alpha […]

0 Comment
March 16, 2007

Why Software Virtualization is Critical to SOA:

When Service Oriented Architecture (SOA) first emerged as a driving trend, we at Hurwitz & Associates quickly concluded that virtualization would be a foundation of SOA. And while much of the virtualization discussion has focused around hardware, we think the ability to virtualize software is the real innovation.   Hardware virtualization focuses on partitioning servers […]

0 Comment
February 12, 2007

How Do You Govern SOA?

When organizations establish a Service Oriented Architecture (SOA) strategy, the governance model is usually not the first thing on the to-do list.  However, it should be.  Many organizations rush into SOA with a flurry of activities.  Typically these are technical efforts: everything from putting an Enterprise Service Bus in place to adding Web Services interfaces […]

0 Comment
February 12, 2007

Physical Security: The New Frontier in Identity Management

Risk management is a key focus for many executives today. And it’s the driving force behind many major investments companies make to achieve business goals, particularly regulatory compliance. It’s also a key factor in bringing together investments in IT security and those made for improving the physical security of company facilities.  

0 Comment