Joseph Gulla

Joseph Gulla




Bookmark and Share
RSS

Recent Posts

  • The Significance of Technology Change and IT Innovation
    August 20, 2018
  • The Significance of Open Source
    August 13, 2018
  • The Significance of Internetworking
    August 6, 2018
  • The Significance of Computer Architecture
    July 30, 2018
  • The Significance of Shared Services
    July 23, 2018
  • IT Security People

    This week, I continue the computer security topic with a look at what “security people” do on a day-to-day basis. So far, I have discussed hardware and software, and now I want to explore the human aspects of security and security administration. Last week, I wrote about identity and access management products, endpoint security and messaging security programs like secure email gateways. Security specialists install and maintain products in these categories but the job of security specialist is bigger than that.  

    Read More

    Posted: April 4, 2018 |

    A Useful Security Software Categorization

    This week, I continue the computer security topic with a broader focus on software, exploring a few of the security software categories from IDC's Worldwide Software Taxonomy, 2017. The IDC framework is a useful one. Companies have to buy the research from IDC to see the latest study but often a slightly older version of the document is available from companies that have licensed it for product marketing purposes.

    Read More

    Posted: March 26, 2018 |

    HSM Software – A Detailed Example

    This week, I continue the computer security topic with a focus on software. A good place to start is the software used to support the PCIe Cryptographic Coprocessor Version 2 (PCIeCC2) hardware security module (HSM). Using a specific example is a good way to start the security software journey.

    Read More

    Posted: March 19, 2018 |

    The Special Attributes of Computer Security Hardware

    This week, I continue the computer security topic with a focus on computer security hardware. Many of us think about security with primarily a software focus. It seems to us that protecting and hacking is mainly about understanding and using software. You might be surprised to know about the special security hardware and its role in safeguarding data and other resources.

    Read More

    Posted: March 12, 2018 |

    Computer Security Teams Face Many Challenges

    This week, I start a new series on computer security. My focus is on today’s security threats and the steps that should be taken by companies to secure their assets.

    Read More

    Posted: March 5, 2018 |

    Financial Analysis of IT Projects Using NPV, Payback Period, IRR and Others

    This post focuses on financial analysis of IT projects and the usefulness of financial tools like payback period, internal rate of return and net present value. It also discusses total cost of ownership, base-case analysis and intangible or soft measures.

    Read More

    Posted: February 22, 2018 |

    Project-Level Financial Measures Quantify Project Value

    This week, I start a two-part series focused on project-level financial measures, like ROI, a business strategy used at the beginning of significant IT projects. 

    Read More

    Posted: February 19, 2018 |

    Methods and Tools for IT Consolidation Projects

    In this, the third of a three-part exploration of the IT consolidation topic, I discuss methods and tools that are important to the success of consolidation projects as they impact risk and the predictability of outcomes.  

    Read More

    Posted: February 12, 2018 |

    IT Consolidation Projects Vary Widely

    This is the second post on IT consolidation, a topic that is broad and important to the vitality of organizations and their IT departments. In this post, I explore the diversity of IT consolidation projects as they relate to various undertakings from server to data center consolidation. 

    Read More

    Posted: February 5, 2018 |

    IT Consolidation is Both an Art and a Science

    This is the first of several planned posts on IT consolidation. You might find the phrase “IT consolidation” to be cold or even unimaginative, so how can it be both an art and a science? This is what I will explore over the next couple of weeks, as the topic is so broad and important to the overall vitality of organizations and their IT departments.

    Read More

    Posted: January 29, 2018 |

    Displaying results 21-30 (of 243)
     |<  <  1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10  >  >|