The Value of Data in Big Data Architectures

A new “V” for Big Data

Big Data, an enabler for many next-generation use cases is defined with the 3 “V” s “Volume, Variety and Velocity” in the literature. These characteristics describe a new set of requirements for which every company has to develop a strategy. Read More

Why Digitalization Needs Application Modernization

Authors: Stefan Pauly and Gerhard Kaucky

Looking at the current hype around Digitalization we recognize the positions and arguments of two groups: One group is Sales and Marketing, CEOs and CMOs who reflect about the business value of Digitalization, about new sales and service channels, digitalized products, and – in general – renewed business processes. Read More

No Chance for Stuxnet & Company: Ways to Ensure Secure and Reliable Energy Supply

In 2009, a nuclear facility at Natanz in Iran became the location of an event that had never happened before: a highly complex and clever worm overcame several security barriers and sabotaged the functioning of the technical equipment necessary to enrich uranium, postponing the country’s nuclear program. This worm you may still remember, as Stuxnet gained access to control systems through connected computers, causing far-reaching political consequences as the world’s first cyber weapon attack. Is such an attack also possible in the D.A.CH. region, endangering our energy supply? Read More

Real World Digital Transformation

Too many still think and act as Digital Transformation topics like IoT, Industry40 etc. are a pure technical topic.

Fail !

The value resides in the intelligent combination of business & IT – well, that should be a no-brainer, but are we as IT companies, Service Providers, Consultants etc really acting on this? Read More

SIEM in Real-Time: Really Necessary?

Imagine you had a burglar alarm for your IT infrastructure: a tool that raises your awareness of any anomaly detected in your cyber-environment. This is what a SIEM (Security Information and Event Management; pronounced SIM, with a silent e) tool does. The basic inputs are log-files, generated by your system’s components. Those are analyzed against a standard set of rules defining the normal state of your network. Once you are facing the decision to install such a system, a product description that it is working in ‘real-time’ will certainly be compelling. But is this promise realistic and valuable? Read More

Copyright 2015 21st CENTURY IT · RSS Feed · Anmelden