Technology Perspectives

Viewpoints from DXC’s technology leaders

Adopting video in the enterprise

I recently wrote a post on my personal blog about how we now use YouTube to answer problems rather than asking that practical friend who we used to trust. Why bother a friend when you can watch someone on video doing the thing you want to do? Why don’t we do the same in our […]

Digital fitness: Virtual cycling with Zwift

Zwift-screenshot

It’s 7:30am on a Saturday, below freezing outside, starting to snow, and I have a 2-hour bike training session to get in. A few years ago, the options in this situation would have been limited to either coping with the cold, slick, roads or spinning inside on a stationary trainer for a mindless torture session, […]

Enterprise virtualization vs. public cloud in 2018

Enterprise virtualization prediction for 2018 tl:dr — no drastic changes from 2017. There are some interesting possibilities, though, and I’ve used Simon Wardley mapping to diagram them. As shown in the enterprise virtualization map on the left, we can now argue that the consumption of virtual machines has trended all the way into commodity consumption (with […]

Workplace collaboration advice for introverts

You walk into a restaurant on your own and see that there are two choices for where to sit. To your left there’s a bar with a few people sitting around talking, the barman looks chatty and you recognize one of the group as an acquaintance. To your right there’s an alcove with a table […]

Getting TensorFlow running on a MacBook Pro

As I have been working with clients, one thing is becoming incredibly true — Machine Learning and AI are becoming prerequisite skills. Certainly modern clouds including Amazon, Azure and Google are providing GPUs or even TPUs to assist researchers, engineers and corporations in taking advantage of training and evaluation acceleration. One easy and active way […]

BitLocker in modern device management: Automating recovery key escrow

Security is a top priority in all enterprise IT teams. One important security requirement enterprises look to address is the protection of corporate data at rest on devices, and thus provide data protection in the event of a device being lost or stolen. BitLocker Drive Encryption is the Microsoft tool that can satisfy this use […]

Welcome to the world of the “slashies” and the “multi-hyphenated”

In English we used to name people by their family role: Taylor – tailored clothing Smith – was the blacksmith Fletcher – created arrows Wright – a worker of wood such as a wheelwright Fisher – was the local catcher of fish Carpenter – made carriages If you were born into a family of smiths […]

Through the looking-glass: Quantum computing 101

In his book, Programming the Universe: A Quantum Computer Scientist Takes on the Cosmos, Seth Lloyd wrote: “A classical computation is like a solo voice — one line of pure tones succeeding each other. A quantum computation is like a symphony — many lines of tones interfering with one another.” So, what is quantum computing? “Begin […]

Breaking free from legacy constraints in a cloud world

In the world of on-premise delivery, services are constrained to stop people from damaging the service for everyone else. A great example of this is storage quotas that stop people from having an email mailbox or file larger than a certain size. Likely, when the technical infrastructure was being procured for the on-premise service, someone looked at the costs and said […]

It’s STILL an exciting time for workplace technology

workplace augmented reality

In July 2015, only 19 months ago, I wrote a post entitled It’s an exciting time for Workplace Technology in which I talked about the exciting technology changes that were heading our way. I write this post in the middle of another change, as we bring together two organizations and create the new DXC. Now seems like […]