Ericka Chickowski

10 Tips for Getting Started with SOA

As service-oriented architecture technologies and practices have gained the attention of CIOs and executive teams for showing business value, more and more IT managers are facing the prospect of...

Is Voice Mail-to-Text the Answer?

Emerging voice mail-to-text technologies offer flexibility and conveinence for busy professionals, but is the market headed toward mass consumption? Will mobile and Internet carriers be a barrier or a...

14 Delivery Models Transforming IT

The technology prognosticators at Gartner say the convergence of new IT delivery models will fundamentally transform the way businesses consume and interact with IT within the next three to...

Latest Posts

Top Cloud Service Providers & Companies

Cloud computing providers play a foundational role for businesses. Virtually every enterprise uses cloud computing in some manner, whether it’s to deliver key infrastructure...

The Role of Data Governance in Effective Data Management

I spoke with four industry experts about the growing challenges in data governance, spotlighting which issues need to be resolved for better data management. The...

Edge Data Fabric: What It Is, Why It Matters

To generate richer and more timely insights, enterprises are using increasing amounts of data. Expect that trend to continue. An IDC model projects that...

How to Encourage a New Generation of Leaders in the Remote Workplace

Companies are starting to finalize their long-term work plans, with many choosing to stay remote for the foreseeable future. The flexible, remote work option will...

F5 Acquires Threat Stack, Continuing Its Transition to a Security Company

F5 has announced an agreement to acquire Boston-based Threat Stack for $68M. The purchase of Threat Stack is F5’s fourth acquisition in the past...