Joseph Gulla

Joseph Gulla

Bookmark and Share

Recent Posts

  • Strategies, Methods and Toolsets for Modernization
    February 18, 2019
  • Architectural Enhancements for a Wide Variety of Workloads
    February 11, 2019
  • Special Hardware Support of Software
    February 4, 2019
  • 2018 in Review: Attending the ECC Conference
    January 28, 2019
  • 2018 in Review: Significant IT Capabilities and Technology
    January 21, 2019
  • IT Change and Renewal

    In this post, I concentrate on approaches and tactics to address challenges like breathing new life into applications.

    Read More

    Posted: April 30, 2018 |

    Keeping Up with IT Requires Thoughtful Change and Renewal

    In this post, I concentrate on dealing with change by focusing on taking control and managing the key wants and needs that impact specific IT challenges. The framework for this model is a discussion of wants and needs, approaches and tactics, and expected outcomes. 

    Read More

    Posted: April 23, 2018 |

    IT Security and Data

    This week, I’ll continue with the computer security topic with a focus on data and computer security. According to Techopedia, data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Data security also protects data from corruption.

    Read More

    Posted: April 16, 2018 |

    IT Security Standards

    This week, I continue the computer security topic with a discussion of security standards used by security professionals. An example is ISO/IEC 27001, a standard that specifies a management system that is intended to bring information security under explicit management control. This standard is part of a growing family of information security management standards.

    Read More

    Posted: April 9, 2018 |

    IT Security People

    This week, I continue the computer security topic with a look at what “security people” do on a day-to-day basis. So far, I have discussed hardware and software, and now I want to explore the human aspects of security and security administration. Last week, I wrote about identity and access management products, endpoint security and messaging security programs like secure email gateways. Security specialists install and maintain products in these categories but the job of security specialist is bigger than that.  

    Read More

    Posted: April 4, 2018 |

    A Useful Security Software Categorization

    This week, I continue the computer security topic with a broader focus on software, exploring a few of the security software categories from IDC's Worldwide Software Taxonomy, 2017. The IDC framework is a useful one. Companies have to buy the research from IDC to see the latest study but often a slightly older version of the document is available from companies that have licensed it for product marketing purposes.

    Read More

    Posted: March 26, 2018 |

    HSM Software – A Detailed Example

    This week, I continue the computer security topic with a focus on software. A good place to start is the software used to support the PCIe Cryptographic Coprocessor Version 2 (PCIeCC2) hardware security module (HSM). Using a specific example is a good way to start the security software journey.

    Read More

    Posted: March 19, 2018 |

    The Special Attributes of Computer Security Hardware

    This week, I continue the computer security topic with a focus on computer security hardware. Many of us think about security with primarily a software focus. It seems to us that protecting and hacking is mainly about understanding and using software. You might be surprised to know about the special security hardware and its role in safeguarding data and other resources.

    Read More

    Posted: March 12, 2018 |

    Computer Security Teams Face Many Challenges

    This week, I start a new series on computer security. My focus is on today’s security threats and the steps that should be taken by companies to secure their assets.

    Read More

    Posted: March 5, 2018 |

    Financial Analysis of IT Projects Using NPV, Payback Period, IRR and Others

    This post focuses on financial analysis of IT projects and the usefulness of financial tools like payback period, internal rate of return and net present value. It also discusses total cost of ownership, base-case analysis and intangible or soft measures.

    Read More

    Posted: February 22, 2018 |

    Displaying results 41-50 (of 267)
     |<  <  1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10  >  >|