Blogs & Articles

As part of the Escape Hatch from Oracle Research Mission, we must examine basic assumptions, the central dogmas that define the market and govern most behavior. Here are some basic questions about software maintenance that are crucial to understanding the rationale for sending vendors so much money every year. What was the promise of software […]

October 9, 2019

Sometimes, even for the most skeptical technology industry observers, it’s hard not to get caught up in the hype about the cloud. After all, the cloud offers so much adaptability, flexibility, and power for companies that at least on paper, it makes sense for them to leverage it to the greatest degree possible. But in […]

October 9, 2019

SD-WAN technology is interesting for a variety of reasons. First, it is a next-generation cybersecurity technology. Second, it allows a company to route traffic in complex ways based on a variety of aspects of the traffic. The result is a superior experience that enables new networking paradigms without the need for complex configuration. But there […]

September 16, 2019

The idea of DataOps is rightfully generating a lot of excitement. Anyone who has seen up close what DevOps has done for development knows that applying the same principles to data management will be transformational. As part of a research project I am doing with Lothar Schubert at Hitachi Vantara, I’ve been digging deeply into […]

August 28, 2019

Phil Quade, Fortinet’s CISO, led a number of top security executives in an important exercise drawn from national security. The “100 Coins” exercise is a fascinating way to get insight into how business and security leaders view their priorities in cybersecurity. The exercise asks each participant to imagine they have 100 coins and then asks […]

July 29, 2019

What if’s can be a powerful way for people to understand what is meaningful to them. That’s one of the main reasons I so enjoyed Fortinet’s “100 Coins” exercise about cybersecurity. Taking a page from national security exercises, Fortinet CISO Phil Quade asked a number of top security executive to imagine that they had 100 […]

July 29, 2019

Summary: Fortinet and Early Adopter Research have extended Fortinet’s 100 Coins research into designing and optimizing a cybersecurity portfolio. The resulting report captures detailed thinking from three leading CISOs about how to make the difficult decisions and tradeoffs when allocating a fixed amount of money across a portfolio. This article summarizes Fortinet CISO Phil Quade’s […]

July 29, 2019

In a recent edition of the Designing Enterprise Platforms Podcast at Early Adopter Research (EAR), EAR’s Dan Woods spoke with Tomer Shiran, the CEO and founder of Dremio. Their conversation focused on how to create a data lake for an end user, a topic that anybody who’s worried about BI and analytics should be interested […]

June 26, 2019

In this edition of the Designing Enterprise Platforms Podcast at Early Adopter Research (EAR), EAR’s Dan Woods spoke with Tomer Shiran, the CEO and founder of Dremio. Their conversation focused on how to create a data lake for an end user, a topic that anybody who’s worried about BI and analytics should be interested in. […]

June 25, 2019

Semantic standards have been with us since the birth of the web, when it became clear to inventors of the web like Tim Berners-Lee and many others that meaning could be systematically captured, organized, and exploited to do valuable tasks. Since then, the idea of applying formal semantics to enterprise data has come and faded […]

June 25, 2019