Featured Article

Welcome to MarkoInsights

By | May 1, 2014

Welcome to MarkoInsights, my new online home where you’re all invited to join in what I hope will be a mutually beneficial exploration of the always fascinating world of technology, where the implications for business, personal life and society have never been greater. We collectively are inventing the future and I hope to provide insights into not only what is… Read More »

A Guide to AWS Identity Management and Policies

By | August 29, 2015

Portions of this article appeared in the Tech Target SearchAWS E-HandBook: Your Role in AWS Security. AWS security is built upon a powerful identity and access management service (IAM) with a rich set of features befitting of an enterprise platform. Yet the IAM management console, nestled within an overflowing AWS service dashboard, is deceptively simple, belying the complexity… Read More »

Book Review – Geekonomics: The Real Cost of Insecure Software

By | August 27, 2015

If you’ve ever wondered why the first thing you have upon booting a new PC, with it’s pristine copy of Microsoft’s latest and greatest, is spend the next few hours loading extraneous security software – anti-virus, spyware protection, firewall, spam filter – David Rice has a theory for you. As he expounds at great length in his first… Read More »

Data Analytics Meets Farming in Precision Agriculture: A Recipe For Cloud Services

By | August 25, 2015

Agriculture marches to its own version of Moore’s Law, with crop productivity steadily increasing for decades. While past improvements were the result of better plant hybrids, fertilization and production equipment, information technology will be the key to sustaining and perhaps accelerating agricultural productivity. Precision agriculture, a collection of data collection, analysis and prediction technologies that looks like something… Read More »

Google Fi Frees Mobile Users from Carrier Lock-In, Onerous Pricing Models

By | August 18, 2015

Lost in the alphabet soup that is Google’s new holding company is one of its many experiments in changing the business rules for network services while nudging the technology in a direction that ultimately benefits consumers. No, not Fiber, although it’s a fantastic broadband disruptor for those that can get it, but Project Fi, Google’s mobile service. After… Read More »

Micron Has a Rosy Future, But Faces Bumpy Product Transition

By | August 18, 2015

Micron Technology provided its view of the memory market, technology trends and company strategy at an analyst conference where executives stressed the company’s R&D investments and product roadmaps designed to exploit changing customer requirements and new memory applications. The company has a thorough understanding of the memory business, a compelling vision and strong product roadmap, however its near-term… Read More »

Networks For The Next Generation: OpenDaylight Hits Critical Mass

By | August 3, 2015

An overarching trend sweeping the industries that combine to create IT infrastructure is the embrace of open, inter-company collaboration on core technology. There have been plenty of examples of corporate affection for open source of late, however the trend was on full display at the recent OpenDaylight Summit where network hardware vendors, component suppliers, telecom companies, software developers… Read More »

Composite Applications and Next-Gen APM: A Fusion of Dev And Ops

By | July 22, 2015

Applications used to be so simple, some self-contained code linked with a few system libraries that accessed local data: a distinct bundle where everything required was on a single machine. Client-server software complicated things a bit, but the demarcation was clean and the hub-spoke design pattern straightforward. No longer. Apps are now composite mashups, often mixing custom and… Read More »

Smart Consolidation: Make Branch Offices Server Free with WAN Appliances

By | July 20, 2015

A version of this article, with complete coverage of  branch office WAN appliances, use cases and recommendations is available this Channel Partners report. With the pressure on IT to deliver new services without bigger budgets, organizations large and small are under pressure to cut costs and increase efficiency while simultaneously improving application performance and security. It’s a tall… Read More »

Security’s Silver Bullet Is Virtualization: Bromium, Microsoft, VMware Show How

By | July 15, 2015

Virtualization has long been used to wring efficiency out of over-sized, under-used systems, but isolating applications and operating systems from the underlying hardware also produces immense flexibility that cloud services like AWS, Azure and Google Cloud exploit to deliver infrastructure on demand. Yet virtualization has become instrumental to solving the most vexing and serious problem facing IT providers… Read More »

Bimodal IT Explained: It Doesn’t Imply Bipolar Organizations, but the Path to IT Transformation

By | July 13, 2015

Never underestimate a buzzword’s power to frame the discussion. As I recently discussed, the term bimodal IT has captured the imagination and polemical energy of technology commentators and like many IT discussions in the age of 140-character commentary, it often degenerates into polarized, all-or-nothing positions. Using a variant of the classic reductio ad absurdum strategy, critiques of bimodal IT… Read More »