October 24, 2013
By Sridhar Vembu, Zoho
Zoho and Google both have offered free office suite for years, and today, Apple announced that their office suite will also be free across all Apple devices.
Given that Microsoft Office has long been the de-facto monopoly, none of our three companies have anything to lose in commoditizing the office suite market. That is the nice thing about facing a monopoly in an adjacent market – every player other than the monopoly would win if they get a non-zero share of a massively shrunk market. If the $20 billion market shrinks to $2 billion, we at Zoho would celebrate it, as long as we can hope to get a share of that shrunken market. In fact, competitors would win even if they don’t get any share of the shrunken market, because it denies the monopoly the ability to use its cash cow to dominate adjacent markets they do have an interest in.
That very same dynamic has played out in the operating system market already. The near-zero revenue share that competitors to Windows had meant that Google and Apple could give away their operating systems (which Apple also announced today!) and not have anything to lose. What Google achieves with the $0 ChromeOS license it charges OEMs (which costs Google exactly $0 in foregone operating system revenue) is that the OEM will now turn around and ask Microsoft for a $0 Windows license.
What OS X, iOS, Android and ChromeOS have collectively achieved is to drive Windows market share to under 25% of all client devices and yet, these alternative operating systems derive near zero revenue in and of themselves.
See Full Article: http://ow.ly/q7w8i
October 23, 2013
By Sridhar Iyengar, ManageEngine
Judging by the activity at Oracle OpenWorld 2013 — and in businesses around the world — Oracle is quickly emerging as a leading provider of enterprise application infrastructure. From the Oracle E-Business Suite to the Oracle WebLogic Server and Oracle relational database, the company’s software empowers companies to find new and different ways to leverage their data to gain competitive advantage.
In the IT department, meanwhile, the rise of the Oracle-powered business is putting the pressure on IT admins and managers charged with supporting an exploding number of business-critical applications. If you’re responsible for the Oracle infrastructure, you’ve got to ensure that it performs optimally and meets service level standards. When any one of the Oracle components fails or underperforms, your business is immediately and adversely affected.
So, what does it take to optimize an Oracle installation? The trick is to clearly understand the complex interrelationships among the databases and applications. That way, you can quickly reach and troubleshoot the root problem of an underperforming Oracle system. When you know exactly what’s running — and how it’s running — at the application, database and network level, you can keep Oracle humming. Here are three keys to maximizing your Oracle application performance.
See Full Article: http://ow.ly/q1k9Q
October 22, 2013
By Raj Sabhlok, ManageEngine
The Silk Road and NSA spying may be old news, but The Onion Router (Tor) continues to generate interest among Internet users seeking online anonymity. Tor isn’t all upside, though. As I found out, you pay a price for privacy.
To put things in context, Tor hides your online activity, plain and simple. It covers your tracks, including your browsing history, identity and physical location. Tor also anonymizes the websites you visit and their operators.
While such activity might sound inherently nefarious, remember that Tor technology also grants anonymity to people fighting tyranny, oppression and other injustices. And for the record, the Tor Project was initially funded by the U.S. government.
Given the many legitimate, compelling use cases, it may be time to ask if Tor is right for you. Well, I’ve put Tor through its paces and come up with my top five tips to help you decide.
(Photo credit: Wikipedia)
See Full Article: http://ow.ly/q1mAP
October 21, 2013
By Erich Diener, Echopass Corp. Posted by John Casaretto
You know where your most valuable data is stored. Your data is locked safely in a fortress of layered defenses. You’ve protected those treasures with well-configured edge devices, a lean fully-patched DMZ, a tightly woven net of firewall ACLs and an intentional architecture that separates your servers’ functions. Your logs are continually examined and anomalous behavior is analyzed. Your privileged identities are well defined by role and rigorously managed.
Overall, you’re able to sleep well at night knowing that you have a well-oiled machine protecting your company’s — and your customers’ — most valuable data. Right?
There’s Not an App for That
Alas, enterprise-level security is not so simple. There are some incredible apps and hardware available today to support networks and protect sensitive data. But technology is not the silver bullet to solving security concerns. And simply buying more technology won’t make you any safer.
In this age of ever-increasing industry and government enforced compliance and regulations, the cost of a breach or loss of sensitive information can sound the death knell for all but the largest businesses. Ironically your best security assets are three things you’re probably overlooking.
See Full Article: http://ow.ly/q1jbZ
By Raj Sabhlok
September 30, 2013
IT departments are being marginalized by SaaS, IaaS, PaaS and the rest of the cloud-driven “aaS”es. At least that’s what some are suggesting, like Scott Bils at InformationWeek. And I’m inclined to agree, at least in spirit, if not in the specifics.
Highly automated IT services give end users do-it-yourself options — or perhaps more accurately, do-IT-yourself options — that undermine the value IT departments have traditionally delivered. And that means chief information officers and the rest of the IT team must adapt to meet changing demands and expectations — or risk becoming marginalized into irrelevance.
The way I see it, most CIOs today operate in a largely tactical capacity for a relatively naïve user base. That leaves them to oversee fundamental responsibilities such as technology provisioning, break/fix support, software and hardware upgrades and operational support (including email), application support and password management.
See Full Article: http://ow.ly/ph0jQ