pam baker

Latest Posts From

Who Owns Your Data, Really?

Who Owns Your Data, Really?

I’ll forgive you if you think my asking who owns your data is a rhetorical question. I’m quite sure that an esteemed reader such as yourself has asserted your company’s ownership of data in any cloud or hosted contract you’ve entered. It is not my intent to disparage your abilities in any way. It is my intent, however, to point out hidden…

How to Rank Your Apps and Processes According to the Fire Alarm Scale

How to Rank Your Apps and Processes According to the Fire Alarm Scale

There you stand, figuratively speaking, with a fistful of sticky labels all bearing the words “mission critical.” Now, what to affix them to? Which applications and processes are truly mission critical and which are not? Ha! That’s a trick question, right?! Yeah, actually it is.
“There are many stories where a failure in an unimportant system…

How to Reduce Your Mission Critical Footprint

How to Reduce Your Mission Critical Footprint

Abstract labels are useful in conversation but no so much in practice. Take the mission critical label, for example. In abstract, mission critical applications means the applications your business absolutely could not function without. In practice, you’ve already argued in business case after business case that every application you spent the…

Getting Started With Public Clouds

Getting Started With Public Clouds

Looking to spin up a virtual machine and get that project done in a hurry but not sure what your choices are in terms of cloud vendors?
Here is a listing (not a rating) of some of the top vendors and what they offer.

My Favorite Collaboration Apps

My Favorite Collaboration Apps

Collaboration apps are not new but they are gaining prominence in this brave new world where crowd-sourcing trumps individual pontification. Leaders such as Google Docs have already gained notoriety but the purpose here is to share information about great collaboration apps that may not be as well known but are certainly worth knowing…

How App Graveyards Produce Zombies

How App Graveyards Produce Zombies

Apps are everywhere, on desktops, smartphones, laptops, tablets, netbooks and soon to be in cars and TVs as well. So many apps on so many devices lead to a lot of loose ends for enterprises and consumers alike. But the number of zombie apps is on the rise. By that I mean abandoned mobile apps that are still active and therefore a security threat…

The Future Desktop

The Future Desktop

The PC era is here to stay as long as the Internet lives. That is not to say however that it won’t go through some physical changes along the way, in much the same way the QWERTY keyboard has been made more ergonomic, virtualized on touchscreens, and tucked away in tiny cellphone trays, but remains essentially the same.
Certainly other…

Birth of the Hybrid Desktop

Birth of the Hybrid Desktop

Many companies not comfortable leaping completely into the cloud are keeping one foot on the ground (aka a hybrid cloud environment). This approach will also characterize many companies’ eventual relationships to desktops. That’s because sometimes virtualized desktops make sense and sometimes they don’t. Examples of the latter include when you need…

Why the Desktop Will Never Die

Why the Desktop Will Never Die

The current cries heralding the death of desktops and the rise of the Post-PC Era ring hollow to anyone of the Video Killed the Radio Star MTV age. If history has taught us anything, it’s that devices with a common purpose seldom destroy one another. It is the changes in computing processes that kills devices.

The Future of Instant Customized Software

The Future of Instant Customized Software

For years, the culture of the U.S. has been all about instant gratification. But it is only fairly recently that manufacturers began to seriously take interest in instant customization as a means to profit from that ravenous cultural maw. Instant Customization (IC), also known as “mass customization,” is a relatively new production model built upon…

The Cloud as Software Pirate Police

The Cloud as Software Pirate Police

Piracy has been the bane of software companies since the first CD was bought and underhandedly passed along to friends. Certainly peer-to-peer file sharing is alive and well, albeit usually done across the ‘Net instead of via personal hand-offs these days. Then there are the mobile app heists that add to the toll. While the preferred mode of…

SLAs Throttle Cloud Adoption

SLAs Throttle Cloud Adoption

The cloud is hiccuping its way forward for lack of buy-in by vendors. You wouldn’t necessarily know that from the pat and parceled messaging that places blame for slow cloud adoption on the timidity of buyers.
Buyers are skeptical, and have good reason to stay so until cloud vendors put some skin in the game.

It is All About the API, Not the App

It is All About the API, Not the App

As IT becomes more consumerized and cloud computing becomes more of a reality, the app itself is becoming almost irrelevant across enterprises. As the desktop PC model has morphed into the network, and as the network has become just another extension of the Internet, it is all about the API, the ways that apps talk to each other that has made…

Twitter for Newsrooms is a Masterful Stroke

Twitter for Newsrooms is a Masterful Stroke

In a savvy sashay of marketing brilliance, Twitter was able to attract more journalists’ eyeballs to its platform than anything short of an overwhelming disaster could garner. And it was able to do so in a matter of minutes with absolutely no news at all.

While much of tech media trumpeted the introduction of Twitter for Newsrooms (#TfN) as if…