News, trends and insights about applications services, enterprise and cloud apps

Red Hat’s system management tools join hands with its DevOps programs


For years we’ve used older system management tools such as Ivanti LANDESK, Kaseya VSA and  Dynatrace Application Monitoring. They’re still great, but as we move to the cloud, containers and continuous integration and development (CI/CD) DevOps programs such as Puppet, Chef and SaltStack have risen in importance. Red Hat, a leading business Linux distributor, has a foot […]

What is a digital core, and why do enterprises need it?

Ask a CEO which technologies his or her company must have to digitally transform the organization, and you’ll likely hear about advanced analytics and the internet of things (IoT). I’d posit that while plenty of other technologies also play vital roles, these are the keys that unlock the digital value door. But these technologies can’t […]

How to effectively deploy Workday across your enterprise


Deploying Workday, a leader in enterprise cloud applications for finance and human resources, is an exciting event for a company. Not only does it promise to make everyone’s job easier, it also means the company is about to gain new insights into its operations that will make it smarter, faster and more profitable. So it’s […]

Automobile : 3 questions qu’il faut se poser sur le développement de logiciels agiles

La transformation digitale du secteur automobile est spectaculaire, dans ses deux facettes. Sur la route, d’une part, avec de nouveaux modèles équipés d’accessoires technologiques. Dans les usines, d’autre part, où l’Internet des objets, la robotique et l’intelligence artificielle ne cessent d’améliorer la production des véhicules. Les tendances de consommation évoluent également : les conducteurs sont à la […]

How Venmo and other payment sharing apps change culture


If you ask a group of 20-somethings how to split a dinner tab, you’ll get a totally different answer than you would from their boomer parents. This became readily evident in a graduate class I teach on cross-cultural communications made up mostly of international students between 21-26 years old. Just three years ago when I […]

DXC Bionix – Digital generation services delivery

DXC Bionix

Today’s a big day as we’ve unveiled our first sub-brand at DXC Technology — DXC Bionix™, our new digital generation services delivery model that provides a data-driven approach to intelligent automation. DXC Bionix includes three elements: Analytics and AI Lean methodology Automation Bringing these elements together enables us to achieve greater insight, speed and efficiency across […]

Winning strategies for using open source and intellectual property

The terms “open source” and “intellectual property” (IP) appear, on the surface, to be opposites. The purpose of this blog is to examine this and understand how and when to use open source and IP. At the simplest level, IP in a corporation means that output created by employees is owned by the organisation, and […]

Workday dashboards offer instant, current insights


Humans are creatures of habit, and this is especially true when it comes to the way we use software and perform routine tasks. Once we become familiar with a certain way of getting something done, it’s hard to let go. Consider that well-used and loved (sometimes hated) spreadsheet you keep on your desktop. Even though […]

What to do when your apps can’t use native Azure migration tools and services


Enterprises are increasingly migrating their applications to public clouds, and Microsoft’s Azure is a preferred target for many of them. During the migration, enterprises must consider their diverse estate of operating systems, databases, middleware, COTS products and application technologies, as well as their multiple versions. Azure Site Recovery is an Azure service that orchestrates replication […]

How application security testing needs to change in an agile, DevOps world


In today’s dynamic cyber-attack landscape, a robust security strategy that looks at all attack surfaces is critical. Enterprises must tirelessly assess their current state of readiness and continually improve governance and processes to stay a step ahead of malicious actors. Applications are one of the preferred attack vectors with up to 90% of successful breaches […]