Blogs & Articles

Why Oracle’s Cloud Is Not State of the Art

If you listen to Oracle’s quarterly earnings calls, you might get the impression that all is right in the world of Oracle cloud. After all, it was just last year in Q4 2018 when Oracle announced that it had seen growth in its cloud adoption and had $1.7 billion in cloud revenue for the quarter.  […]

Tags:

Read more

When It Comes to Negotiating With Oracle, Go First

The world of Oracle is often like the seemingly bucolic suburban town depicted in Stranger Things: often, things are not what they seem and what’s right might be unusual in another context. Recently, I had another conversation with Craig Guarente, CEO and Founder of Palisade Compliance, who I’ve interviewed frequently in the past for our […]

Tags:

Read more

Escape Hatch Key Question: Is Oracle Increasingly Unpopular with IT Buyers?

 The Escape Hatch from Oracle Research Mission takes a close look at the state of Oracle in the market. As stated in our Research Mission Declaration, one impetus for this mission is to inspire Oracle to pull back from some of its aggressive tactics, especially regarding audits. Our position is that Oracle has damaged its […]

Tags: , ,

Read more

How Did Software Maintenance Become Such A Bad Deal? Oracle and the Fall of the Traditional Model

As part of the Escape Hatch from Oracle Research Mission, we must examine basic assumptions, the central dogmas that define the market and govern most behavior.  Here are some basic questions about software maintenance that are crucial to understanding the rationale for sending vendors so much money every year. What was the promise of software […]

Tags: ,

Read more

Cybersecurity Cloud Migration: How Fast? How Far?

Sometimes, even for the most skeptical technology industry observers, it’s hard not to get caught up in the hype about the cloud. After all, the cloud offers so much adaptability, flexibility, and power for companies that at least on paper, it makes sense for them to leverage it to the greatest degree possible. But in […]

Tags: ,

Read more

SD-WAN Shows How Security-Driven Networking Can Fix the Internet

SD-WAN technology is interesting for a variety of reasons. First, it is a next-generation cybersecurity technology. Second, it allows a company to route traffic in complex ways based on a variety of aspects of the traffic. The result is a superior experience that enables new networking paradigms without the need for complex configuration. But there […]

Tags: ,

Read more

How DataOps Will Differ From DevOps

The idea of DataOps is rightfully generating a lot of excitement. Anyone who has seen up close what DevOps has done for development knows that applying the same principles to data management will be transformational.  As part of a research project I am doing with Lothar Schubert at Hitachi Vantara, I’ve been digging deeply into […]

Tags: , ,

Read more

Getting Your Priorities Straight: Advice from Theresa Payton, CEO of Fortalice

Phil Quade, Fortinet’s CISO, led a number of top security executives in an important exercise drawn from national security. The “100 Coins” exercise is a fascinating way to get insight into how business and security leaders view their priorities in cybersecurity. The exercise asks each participant to imagine they have 100 coins and then asks […]

Tags: ,

Read more

Commoditizing Cybersecurity: Shannon Lietz on Security Priorities at Intuit

What if’s can be a powerful way for people to understand what is meaningful to them. That’s one of the main reasons I so enjoyed Fortinet’s “100 Coins” exercise about cybersecurity. Taking a page from national security exercises, Fortinet CISO Phil Quade asked a number of top security executive to imagine that they had 100 […]

Tags: ,

Read more

The 100 Coins Project: Fortinet’s Phil Quade on How to Design and Optimize a Cybersecurity Portfolio

Summary:  Fortinet and Early Adopter Research have extended Fortinet’s 100 Coins research into designing and optimizing a cybersecurity portfolio. The resulting report captures detailed thinking from three leading CISOs about how to make the difficult decisions and tradeoffs when allocating a fixed amount of money across a portfolio. This article summarizes Fortinet CISO Phil Quade’s […]

Tags: ,

Read more

1 2 3 17