Featured Article

Welcome to MarkoInsights

By | May 1, 2014

Welcome to MarkoInsights, my new online home where you’re all invited to join in what I hope will be a mutually beneficial exploration of the always fascinating world of technology, where the implications for business, personal life and society have never been greater. We collectively are inventing the future and I hope to provide insights into not only what is… Read More »

Forget File Sharing, Box Wants to be CMS Hub for All Apps and Data

By | October 8, 2015

Box has always tried to differentiate itself from the plethora of cloud file sync-and-share startups by focusing on enterprise customers and their requirements. This led the company down the path of providing greater management control over users and content. At the company’s recent Boxworks developers conference, Box made clear its larger ambitions of becoming the content management platform… Read More »

How SoMoClo Helped Me Heal (yes, really) with Lessons For Business Collaboration

By | October 4, 2015

This article originally appeared on Forbes. I recently had an accident that entailed a lot of pain and emergency surgery. Indeed, it was the most significant medical trauma I have ever had to endure and required a lengthy, 5-night hospital stay. Unfortunately, my closest family and primary support group are parents whose ability to get around is quite… Read More »

Automating Infrastructure Configuration and Management Using Chef with AWS

By | October 1, 2015

A version of this article appeared on TechTarget SearchAWS as Achieving AWS automation with Chef The transition of corporate infrastructure into software defined private clouds has transformed IT automation from an aspirational goal into an existential imperative. The move from treating servers, storage and network gear as individual units that are carefully managed into interchangeable resources — the familiar… Read More »

The Confluence of Next-Gen LTE and Wi-Fi: Good News for Carriers and Customers

By | September 26, 2015

LTE and Wi-Fi are finally bridging the gap between cellular and wireless LANs, enabling UC for the smartphone era Mobile IP telephony is nothing new, however the innovation has come from app developers, not carriers. Over the top messaging (OTT) services like WhatsApp, Facebook Messenger, WeChat, Google Hangouts and iMessages/Facetime have displaced traditional carrier SMS for text messaging… Read More »

Amazon Cognito: Authentication and App Sync for the Multi-Device World

By | September 13, 2015

A version of this article originally appeared on TechTarget Search AWS as AWS Cognito makes a mark in mobile app development A major challenge when developing applications in the post-PC era, where the average person uses three devices and expects to access and have a consistent view of their data from each one of them, is the difficulty of… Read More »

VMworld Retrospective: Betting on Hybrid Cloud, but do VMware’s Customers Care?

By | September 10, 2015

The news out of VMworld 2015 was less significant than its overarching theme of hybrid cloud. My summary of the news, along with a photo album, are available here. Although there were plenty of announcements, indeed one analysis contends VMware is trying to do too much, other than the Photon container project (which is still experimental) they were mostly… Read More »

Sights and Highlights from VMworld 2015

By | September 4, 2015

VMworld is a multifaceted experience, particularly for those of us where it may be the one time of the year where we can visit with far-flung friends and colleagues in the flesh. Indeed, the opportunity to have deep, stimulating discussions with other very smart people is perhaps the highlight of VMworld. Yet there were plenty of vendor announcements, technical… Read More »

A Guide to AWS Identity Management and Policies

By | August 29, 2015

Portions of this article appeared in the Tech Target SearchAWS E-HandBook: Your Role in AWS Security. AWS security is built upon a powerful identity and access management service (IAM) with a rich set of features befitting of an enterprise platform. Yet the IAM management console, nestled within an overflowing AWS service dashboard, is deceptively simple, belying the complexity… Read More »

Book Review – Geekonomics: The Real Cost of Insecure Software

By | August 27, 2015

If you’ve ever wondered why the first thing you have upon booting a new PC, with it’s pristine copy of Microsoft’s latest and greatest, is spend the next few hours loading extraneous security software – anti-virus, spyware protection, firewall, spam filter – David Rice has a theory for you. As he expounds at great length in his first… Read More »