Author: GigaOM

  • Sponsored post: Smart cloud-based analytics; not “pie in the sky” promises

    istock_teradataThe power of cloud-based analytics is indisputable, given its potential for simplicity and scalable computing power. But reality falls short of the “pie in the sky” promises of moving all data and all analytics to an open and public cloud. In a recent blog post, Teradata’s Scott Gnau describes analytics in the cloud, in a way that sidesteps the cloud’s “not so silver lining” of concerns around security, privacy, downtime, data loss and latency issues.

    He shares his recommendations using use cases of both public and private cloud deployments. Two examples he shares are BevMo! and Meredith.

    BevMo!, a large West Coast retailer, built an integrated and managed data warehouse in the public cloud using Teradata Cloud Services. By accessing analytics hardware, software, managed services and customer services in the cloud, BevMo! was able to get flexible, secure and scalable analytics on a subscription basis.

    BevMo! runs advanced analytic for things like SKU management, regulatory compliance, invoice error reduction and sophisticated pricing analytics that involve product, cost, location and other variables.

    Meanwhile, media giant Meredith turned to Teradata for a private cloud solution to leverage its sizable data assets. For the publisher of major brands like Better Homes and Gardens, the private cloud delivers immediate and relevant messaging to consumers in near real-time. This has helped the company improve reach and reduce subscriber loss. Meredith can now run 600 campaigns a month instead of 300, and the company has slashed segment analysis time from 24 hours to less than one.

  • Flash analysis: Xbox One

    On Tuesday, May 21, Microsoft raised the curtain on its first new gaming console in nearly seven years: the Xbox One. In order to better understand how the Xbox One is being received by the larger tech community, we surveyed GigaOM’s own readership on the new offering. So which new feature of the Xbox One was chosen to have the biggest impact? Read this analysis to find out.

    Related research and analysis from GigaOM Pro:
    Subscriber content. Sign up for a free trial.

    • Sponsored post: Rethinking the microserver in rack-level terms

      To get a bigger bang for the IT buck, IT managers like to optimize infrastructure for targeted applications and workloads. As I noted in a recent Intel Chip Chat, one way to do this is by creating CPUs targeted at certain types of workloads. That was the case with Centeron, the code name for the Intel® Atom™ S1200 processor family, launched in 2012.

      Centerton was the industry’s first 64-bit sub-6-watt system on a chip (SoC). This low-power processor expanded our server product line, building on the Intel® Xeon® processor family to support a new class of high-density microservers. Now we’re coming up on the launch of Avoton, the follow-on to Centeron, which will debut later this year.

      Great stuff, all the way around. But at Intel, we know that processors are only part of the optimization story. We like to look at the entire data center infrastructure to make sure we’re optimizing across the board.

      With those thoughts in mind, we are collaborating with leading cloud service providers to rethink rack designs to make them more modular and efficient. Specifically, we’re developing a reference design that uses a suite of innovative technologies in a disaggregated rack-scale architecture.

      This mix includes Intel Xeon processors and Intel Atom SoCs for servers, storage and networking; Intel® Ethernet switch silicon for distributed input/output; and Intel® Silicon Photonics Technology for high-speed interconnects.

      For a closer look at this effort, stop into the Intel IT Center.

      Raejeanne Skillern is Intel’s director of marketing for cloud computing.

    • Sponsored post: Looking for more IT efficiency? Try driving a hybrid

      As IT pros aim to make the most efficient use of their budgets, there is a rapidly increasing range of infrastructure options at their disposal.

      While public cloud services in particular have exploded in popularity, especially for organizations without the resources to operate their own data centers, a “one-size-fits-all” myth has also emerged, suggesting that this is the most efficient and cost-effective option for all scenarios.

      In reality, the public cloud may be the sexy new sports car — coveted for its horsepower and handling — but sometimes a hybrid model can be the more sensible approach, burning less gas and still getting you where you need to go.

      It all depends on what kind of trip you’re taking. Or, put in data center terminology, the most effective approach depends on the type of application or workload and is often a combination of infrastructure services — ranging from public, private and “bare-metal” cloud to colocation and managed hosting, as well as in-house IT resources.

      In our new ebook “Looking for More IT Efficiency? Take a Drive with a Hybrid,” we examine why it will be critical for organizations to go beyond the industry’s cloud hype and instead build flexible, centrally managed architectures that take a workload-centric approach. The ebook includes chapters on:

      • Debunking the fuel economy myth
      • Combining the handling of cloud with the safety of a hybrid
      • Joining the “cloudy colo” carpool
      • Driving toward flexibility

      Download the complimentary ebook here.

    • Countering targeted attacks with active defense strategies

      Firewalls block basic attacks on your network and antivirus scanners filter known offenders, and no enterprise should operate without them. Still, focused attackers and zero-day exploits make short work of entrenched perimeter defenses, and every business should expect to be breached. To cope with these attacks, IT should build an additional layer of active analysis and mitigation.

      Our panel will address these questions:

      • What are the limits of perimeter defenses?
      • What are the differences among passive and active defense strategies?
      • How can IT identify and mitigate zero-day and targeted attacks?
      • What are the financial implications of implementing active defenses?
      • What level of response to an attack is appropriate?
      • How should businesses share security data with trusted partners, consultants and the government?
      • How should businesses choose security partners?

      Our speaker lineup includes:

      Register here to join GigaOM Research and our sponsor Crowdstrike for “Countering targeted attacks with active defense strategies,” a free analyst roundtable webinar on Wednesday, June 12, 2013, at 10:00 a.m. PT.

    • Sponsored post: EC launches European app economy study: App leaders meet in June

      Eurapp is a new study being led by DERI at NUI Galway and GigaOM Research and was recently launched by the European Commission as part of its Digital Agenda: Startup Europe initiative. Eurapp brings together app developers, platform providers, policy makers and other stakeholders to address the future of the European app economy at its first working workshop in Brussels on June 14.

      “In Eurapp, we’re creating a model and near-term forecast for the European app economy in terms of jobs profiles and market size,” says David Card, the VP of Research for GigaOM Research. “We also plan to identify and propose ideas to solve key problems affecting the app economy in Europe through two crowdsourcing challenges that will be run mid-summer.”

      The working workshop will feature talks from the co-founders of app companies SwiftKey, Tyba and Betapond, focusing on successes they have had and various problems they have faced in the past. Platform managers and evangelists from Samsung and Microsoft will discuss the growth in apps supported by their platforms in Europe. The European Young Innovators Forum will provide perspectives from young tech entrepreneurs.

      The workshop will feature Mapping Sessions to identify primary bottlenecks experienced by app companies located in Europe that could potentially be addressed by EU-wide policy actions and also explore the main issues that companies have in achieving their desired metrics for success.

      GigaOM readers are invited to take part in the workshop. Registration for the workshop is free, but places are limited. Get more information at http://eurapp.eu.

    • Future-proofing business continuity and disaster recovery

      While the goals of your business continuity (BC) and disaster recovery (DC) plans haven’t changed much, the tools available to support them have. On-premise storage has become cheaper and more manageable, while cloud-based solutions are faster, more secure and more reliable than ever before. From tape to disk to cloud to the software and appliances that ties them together, the BC/DR landscape is evolving at an unprecedented pace. Understanding the new value propositions of each type of tool will help businesses revamp their BC/DR infrastructure to build a more responsive, cost-effective, future-proof system and avoid costly surprises.

      In this webinar, our panel will address these questions:

      • What tools and technologies are leading-edge businesses using for BC/DR, and how are they using them?
      • What are the strengths and weaknesses of tape, disk, cloud and other BC/DR technologies?
      • What does the future look like for BC/DR technologies?
      • What balance of on-site and cloud-based technologies is appropriate for a modern, cost-effective BC/DR strategy?

      Our speakers include:

      Register here to join GigaOM Research and our sponsor Axcient for “Future-proofing business continuity and disaster recovery,” a free analyst webinar on June 6, 2013, at 10:00 a.m. PT.

          

    • Sponsored post: Determining the root cause of a data breach using “the 5 Whys”

      There is a fun little question-asking technique called the 5 Whys. It was developed by Sakichi Toyoda at Toyota to determine the root cause — and solution — to any given problem in the manufacturing process. The technique has been borrowed by coders, sysadmins and executives alike. Let’s say a CIO just learned that a data breach occurred in which 50,000 sensitive files had been stolen from the company. Below is the 5 Whys exercise that this exec worked out:

      Problem: 50,000 files were stolen.
      Why? The files were accessible to everyone in the company, even guests.
      Why? The folder’s access control list was configured incorrectly.
      Why? Chuck the intern configured that file server in 2007 and it hasn’t been reviewed since.
      Why? We don’t have a process to review file system permissions.
      Why? Because manually reviewing every folder’s ACL for problems is like searching for a needle in a haystack . . . and THERE’S ONLY THREE OF US AND A THOUSAND FILE SERVERS! SHEESH!

      See, behind every technical problem is usually a human problem!

      It seems like the above fictional security incident was technical in nature — the ACL was configured incorrectly. The value of the 5 Whys technique is that it encourages us to really understand the underlying cause: a nonexistent entitlement review policy.

      We hope this post has started you thinking about your entitlement procedures.

      Varonis DatAdvantage and DataPrivilege improve your company’s breach mitigation solutions by automating the entitlement review and permissions audit process.

          

    • Considerations for rolling out an NoSQL strategy in the enterprise

      The information-processing demands of many of today’s businesses have long outgrown legacy RDBMS software from Oracle, IBM, Sybase, Microsoft SQL Server and MySQL. In many cases DBAs are still stitching these systems together, adding another table and another join until eventually they hit a wall and realize relational databases were simply not designed for today’s big data challenges. The web giants Amazon, Facebook and Google were the first to struggle with the scale of big data, and now mainstream enterprises are feeling the pain. IT leaders at these companies are no longer asking the question of whether they should have a NoSQL strategy but rather when it will roll out and which NoSQL technologies to use. Those are still tough questions today, as there are countless different flavors of NoSQL targeting different use cases.

      Our experts will discuss these topics:

      • What are the inhibitors to enterprise adoption?
      • What are the different NoSQL technologies, and which use cases are they designed for? (Sessions stores versus analytics)
      • What lessons can we learn from early adopters of NoSQL?
      • What role does the cloud play as NoSQL and MongoDB in particular are offered by many cloud service providers?

      Our panel includes:

      Register here to join GigaOM Research and our sponsor 10gen for “Considerations for rolling out a NoSQL strategy in the enterprise,” a free analyst webinar on Tuesday, June 4, 2013, at 10:00 a.m. PT.

          

    • Sponsored post: Cloud storage is great — but be careful what you put there

      Marco Arment — creator of Instapaper, co-founder of Tumblr and internet-famous software developer — has a knack for sharing unique and thoughtful insights on technology. Take, for example, public cloud–based storage services, such as Dropbox. Marco makes some salient points worth repeating here for users who may not be fully aware of the ramifications of storing sensitive data off-premise.

      Arment says:

      “Anything that is really sensitive or extremely valuable or needs to be kept very secret, I wouldn’t store on anybody else’s servers. That, to me, seems ridiculous unless I held the encryption keys like with the online backup service that I use.”

      Public cloud-based locker services hold the keys to encrypt and decrypt your data on their servers. Why? It’s important to remember they are used as a collaboration tool. To offer public file sharing features, they need to decrypt data stored on their servers. In addition, employee could view or steal your data. To make matters worse, public cloud services are more likely to be hit by hackers because they are high value targets.

      However, there is an alternative. Varonis DatAnywhere is a private cloud-based file sharing solution that is secure and easy to use.

      • Create a secure private cloud experience using your existing file sharing infrastructure
      • Keep your data on your file servers
      • Keep your existing permissions (e.g., NTFS and Active Directory)
      • Provide secure, enterprise-capable file synchronization and mobile access
      • Collaborate with the same ease-of-use as public cloud solutions

          

    • Sponsored post: Announcing BeyondCore Light: advanced analytics for all

      BeyondCore2Traditional analytics software forces you to choose between power and simplicity. Statistical analysis tools like SAS are powerful but require extensive coding experience, while visual reporting software like Tableau are business user accessible but don’t offer advanced analysis capabilities. Both types of solutions answer only specific questions from the user, but there are simply too many questions that could be asked of any reasonable size data. While machine learning or “kitchen-sink” regressions can look at large numbers of questions at the same time, these are expert tools whose output is typically indecipherable by business users. BeyondCore is designed from the ground up to combine power and simplicity.
      Since 2004, BeyondCore worked with nine leading services firms and analyzed data from a dozen of the Fortune 100 to build its award-winning Advanced Analytics solution from the ground up.

      BeyondCore’s one-click automated analysis explores all of the millions of possible patterns in your data, conducts rigorous statistical tests and presents the most important insights, without the risk of human bias or error.

      Unlike any other analytics solution, BeyondCore automatically generates a two-minute animated briefing that is like having an analyst walk you through a set of slides while highlighting the key insights.

      BeyondCore makes advanced analysis so comprehensible that business users are comfortable with the results and can easily overlay their human intuition on top of the analysis. This is how BeyondCore translates automated analysis into actionable business insights.

      BeyondCore Light brings BeyondCore analysis to business users for $5,000. Sign up today.

          

    • Sponsored post: The question you didn’t ask is the one you regret

      BeyondCoreDid you know that patients with heart stent surgeries who are depressed and don’t take their antidepressants triple their health care costs compared to similar patients who take their antidepressants? Our client did not. With databases full of conditions, treatments and patient characteristics, they had been busy examining other things. This particular question, with an interesting answer, had simply not been asked. For a real-world example of automatically evaluating a million variable combinations, see this case study with McKinsey that we are presenting at StrataRx. Excerpt: “From an analytical perspective, due to the large number of potential variable combinations, it is impossible to preconceive of and evaluate all of the potential hypotheses.”

      In traditional analytics, manual pattern evaluation is the weak link that slows speed-to-insight and risks overlooking key insights. In an hour, humans can only explore dozens out of the millions of potential patterns hidden in the data. In minutes, BeyondCore explores those millions of possibilities, conducts rigorous statistical tests and presents the most important insights, without the risk of human bias or error. Users then examine the short list to further refine the most relevant insights. Competitors who focus on building faster and more powerful tools for human experts to ask specific questions of their data are simply missing the point.

      BeyondCore’s automated algorithms test, rank and present the very best patterns your data has to offer. There is a fundamental difference between merely answering your questions and discovering questions with useful answers. BeyondCore identifies the best questions to ask.

          

    • Sponsored post: Open markets for IT infrastructure

      The traditional approach to acquiring, managing and financing IT infrastructure is rapidly transforming through a combination of technology advancements and market structure shifts. Cloud computing set the technical underpinnings in motion, but the IaaS market options available to customers today present challenges that are holding the market back:

      • Severe lack of clarity in pricing and consumption by providers
      • Limited flexibility in configuration and management
      • No way to hedge risk against changes in infrastructure demand

      However, open marketplaces for IT infrastructure are emerging that provide a neutral platform for infrastructure buyers, sellers and brokers to contract for immediate or future delivery of IaaS. These markets are introducing a true brokerage model that will focus on the business of compute rather than the technical organization of compute.  And the business of compute has nothing to do with cloud computing or the technology driving this revolution. The business of compute is about approaching compute, network and storage infrastructure as a fungible commodity traded on an open market exchange.

      You can expect to see major announcements on open IaaS marketplaces later this year. In the meantime, attend the webinar on this topic on May 23, 2013, at 10 a.m. PT. REGISTER HERE.

      Key topics of discussion will include:

      • How are IaaS marketplaces addressing key market challenges today?
      • What lessons can we learn from previous marketplace failures and successes?
      • What is the role of IaaS brokers and what new products will they develop?
      • How will IaaS marketplaces affect staffing, operations and cost?

          

    • Sponsored post: Navigating the Apache Hadoop Ecosystem

      Open is the flavor du jour in enterprise software for big data. But it’s just the beginning.

      The challenge of analyzing massive data sets has spurred a hotbed of creativity in open-source communities. While some of these are more novel than innovative, hindsight has taught us that open source succeeds in the enterprise when it meets relatively mundane challenges like security, reliability, manageability and cost-efficiency.

      Enterprises need a platform to ingest, store and process data that is open and extensible but also robust and high-performing. Committed to developing Apache Hadoop as that platform for the long-term, Intel is adding value to these essentials.

      • First, we focused on bolstering security with hardware capabilities available today. In the Intel Distribution for Apache Hadoop, we built in file-based encryption in HDFS, accelerated up to 20 times with Intel AES-NI. We also launched Project Rhino to offer a common framework for authentication, authorization and auditing across key Hadoop projects.

      • Optimizing performance was another focus, and we achieved up to 8.5 times faster Hive queries, adaptive data replication and optimization for SSD.

      • We’re also making secure, high-performing Hadoop clusters easier to manage. By simplifying deployment and monitoring, automating configuration with Intel® Manager, and enabling Hadoop across multiple data centers, we’re taking the complexity out of Hadoop deployments.

      While foresight is rarer than hindsight, we predict that this is the right approach for enterprises which are harnessing big data for the long haul.

          

    • Welcome to the post-normal age of work

      It’s a now-prevalent notion that companies can advance by simply adding a social layer on top of existing business processes, integrating social tools with existing functional tools such as ERP, CRM, and HR solutions. The idea goes that this will make companies more social and therefore more productive.

      That idea isn’t going to work.

      Why? In a nutshell, social network-based communication is primarily organized around the concept of a “pull” medium — that is, a medium where individuals subscribe to whichever information sources they prefer and find useful. Traditional business processes, on the other hand, use “push” communications, where whoever created the information gets to decide whom it’s most important to. Simply put, the two parties don’t gibe.

      Perhaps more importantly, the nature of work in our era has changed. Most people now have jobs based on non-routine work, where the predefined and fixed roles of business process do not reach.

      I recently wrote a report as part of my activities in GigaOM Research, entitled “Social networks will displace business processes, not socialize them” (subscription required). In the report, I argue that we are drifting away from a business-process defined culture and towards a social network-shaped, cooperative one.

      Cooperation

      Source: Stowe Boyd/GigaOM Research

      Above we see the variance between process-oriented organizational cultures and network-oriented ones. I consider this part of the transition from post-modern (1970-2005) to what I’ll call post-normal (2005-present and beyond) economic eras. These cultures also differ in the nature of social affiliation, with a loosening of the bonds that tie people together in cooperative cultures contrasted with collaborative ones. People in cooperative organizations will have a higher number on connections, but the proportion of those that are strong ties decreases relative to collaborative cultures.

      figure2
      Source: Stowe Boyd/GigaOM Research

      Some corporate cultures are stuck even farther back in time because they are based on competition. I don’t mean competing with others in the marketplace, like Toyota competing with BMW. I am talking about a corporate culture based on zero-sum competition among workers, where one person’s advancement is someone else’s demotion. These are cultures strongly based on authority-based decision-making, and really are a holdover from the late modern era: the late industrial era.

      figure3
      Source: Stowe Boyd/GigaOM Research

      In the report, I discuss the “fit” of different psychological profiles, or archetypes, in these cultures. For example, the Entrepreneur archetype (see above) fits well in collaborative and competitive cultures, and fits the entrepreneurial culture perfectly. But Entrepreneurs won’t like working in a purely traditional, “cooperative” culture, because they like to lead collectives that are managed through consensus. A cooperative organization is too loose for them: It’s a connective, and is based on laissez-faire decision making.

      3CModelSource: Stowe Boyd/GigaOM Research

      This is the debut of the 3C model — competitive, collaborative, and cooperative. It’s a psychosocial model of organizational culture, and I hope it helps address some key issues in organizational dynamics in organizations today as social technologies and practices are being adopted. Marshal McLuhan said, “we make our tools, and they shape us.” Keeping that in mind, we see the change that social network-based communication is causing.

      Businesses are not making these changes on a whim or because individuals are made happier by cooperative work relationships. The fast-and-loose business is most in sync with the digital realities of today’s world, although most companies are still operating principally in a more traditional mode, and may even have a healthy dose of the “frozen-and-immobile” at the core. Nonetheless, businesses must move towards a more cooperative work environment because in doing so they will successfully compete in today’s fast-paced, digitally focused world. Older cultures that cling to traditional business processes will not.

      To read the full report, click here (subscription required).

      Thumbnail image courtesy of flickr user ShellVacationsHospitality.

      Related research and analysis from GigaOM Pro:
      Subscriber content. Sign up for a free trial.

          

    • Sponsored post: Hasta la vista desktop – introducing Ektron Responsinator

      Responsive web design is all the craze when it comes to making websites look great on a multitude of devices. This is the must do marketing technology of 2013 — for web designers and marketers too.

      Imagine if you could increase your mobile leads by over 350 percent and reduce development efforts. It’s time to get started. All you need to do is register for the Ektron Responsinator and plug in your company website URL. Ektron simplifies the creation, management and delivery of digital experiences for global organizations that are looking to drive revenue growth and improve customer satisfaction. Ektron helps companies deliver customer experiences to their audiences through digital channels by using content to engage consumers and drive business outcomes.

      Go ahead . . . test it out . . . it’s free. 

          

    • Sponsored post: Apple devices become business communications tools with ShoreTel Dock

      Apple has an ingenious knack for providing its customers with mobile devices they love. For its first fiscal quarter of 2013, the company announced iPhone sales of 47.8 million, up from 37 million in the year-ago quarter, and iPad sales of 22.9 million, compared to 15.4 million in the same quarter last year.

      Mobile devices from Apple, and from other manufacturers, are fast replacing PCs in the enterprise, as workers fuel the BYOD (bring-your-own device) phenomenon. “Smartphones and tablets will be the two most widely used devices for UC in 2013, passing traditional computers and desk phones,” Infonetics Research said in a recent report.

      It’s clear that workers want to use their favorite mobile devices in the workplace and they are asking IT managers to help them integrate them.

      Responding to this trend, ShoreTel has released a new solution, ShoreTel Dock, to turn Apple iPads and iPhones into desk phones, integrating the convenience of mobile devices with the power of a business communications system. The industry’s first business-grade device, ShoreTel Dock transforms iPhones and iPads into unified communications end points, so that workers can use their Apple handheld devices as their primary business communications tools.

      “ShoreTel Mobility is a game changer for companies with leaders who see effective communications as a competitive advantage and who are trying to win by leveraging the power of unified communications. The ShoreTel Dock is a natural extension providing the conveniences of a desk phone for iPhones and iPads,” said Kevin Gavin, ShoreTel’s chief marketing officer.

      http://jobs.gigaom.com/job/sales-manager-director-tri-state-bay-area-gigaom-ea871bffeb/?d=1&source=linkedin_share

          

    • Meet cloud pioneers at next month’s GigaOM Structure

      The IT industry is undergoing a cataclysm of innovation that is disrupting big businesses, offering opportunities for entrepreneurs, and redefining the role of IT in the corporation. GigaOM’s Structure conference helps you understand what’s next.

      We’ll peel back some of the software-defined abstraction of last year to focus on the physical cloud. For example, how do we build special-purpose architectures for our apps? What happens when we scale beyond the confines of the data center with dark fiber or other distributed resources?

      Topics we’ll cover include:

      • Networks with ESP — application-aware networks
      • Cloud, agility and your CEO: What happens when infrastructure can match the business changes in strategy?
      • What keeps CIOs up at night?
      • If it’s not software-defined, should you buy it?
      • The Goldilocks Problem — memory that’s too fast or too slow

      Click here to see the full schedule and register now.

      At Structure you’ll meet the people getting their hands dirty with deployments, such as Adrian Cockcroft from Netflix, Jeff Dean from Google, Pat Gelsinger from VMware, Bob Muglia from Juniper Networks, Dean Nelson from eBay, Jay Parikh from Facebook, Kevin Scott from LinkedIn and Werner Vogels from Amazon. Click here for a full list of speakers.

      Plus, you’ll get a first look at our Structure LaunchPad finalists, chosen for their groundbreaking technologies and business models that are driving the future of the cloud industry:

      THERE ARE ONLY 69 SUPER SAVER TICKETS LEFT, SO REGISTER NOW!

          

    • Sponsored post: Under the Radar 2013: not your typical startup event

      Under the Radar 2013 (May 22 and 23, in San Francisco) is a unique startup showcase that has a track record of identifying next-generation category leaders.

      Just how proven is UTR in identifying the “next big thing”?

      • Under the Radar was pivotal in getting companies like AdMob, BillFloat, Box, Flickr, GoodData, Jive, LinkedIn, Marketo, MobileIron, Pandora, TripIt and hundreds more off the ground.
      • $3.5 BILLION has been raised by UTR alumni startups since 2010.
      • About a third of UTR alumni companies are acquired. Dozens have IPO’d.

      This year 20 thoroughly vetted emerging B2B startups will present their vision — and business value — to distinguished VP and C-level execs. In turn, those execs discuss their business problems and how the presented solutions may help solve them.

      Some topics that will be explored this year include:

      • Big data analysis is becoming accessible to more companies, making it fast and easy for any developer — at any size organization — to build, deploy, scale and manage big data applications and also collect, analyze, visualize and share information externally.
      • The evolution of enterprise HR software is enabling companies to algorithmically discover high-quality candidates without recruiters, optimize the employee performance review process, and identify and manage expertise with business units in order to map the most qualified employees to problems they can solve.
      • Enterprise mobility has led to privacy concerns, security risk and costly data leakage, but new mobile startups are developing next-generation tools that enable enterprises to embrace mobility without the risk.

      Register at http://utrconf.com with discount code “GigaOM”

          

    • Sponsored post: Explore social discovery at Glimpse: 20% off tickets

      Glimpse, the social discovery conference, is returning to San Francisco on Wed., June 12, to reignite the conversation around the discovery of people, products and places. As a Glimpse media sponsor, GigaOM is offering 20 percent off early-bird tickets to its readers.

      Glimpse will be a day to discuss how the social sphere has permeated the everyday lives of consumers. Mingle with driving forces in the social discovery space, including CEOs, product gurus and directors shaping social experiences for brands and consumers alike, helping and guiding people in their daily decisions around what to buy, who to date and where to go. Taking place at San Francisco’s Bently Reserve, our stage will host experts from Facebook, Tagged, LinkedIn, Twitter, Pandora, Zappos and more companies leading today’s social trends.

      Don’t miss this opportunity to see moderators from top-tier publications such as GigaOM, Fortune, Bloomberg Businessweek and VentureBeat as they ask the questions that you haven’t seen answered. To get the special GigaOM 20 percent discount on your 2013 Glimpse tickets, head to the Glimpse Eventbrite page and enter code: GO@GLIMPSE

      We look forward to seeing you in our audience and diving into what’s in the future for social discovery.