The BMC Beat – BMC Blogs BMC Software Tue, 12 Dec 2017 17:05:27 +0000 en-US hourly 1 The BMC Beat – BMC Blogs 32 32 Setting Your Cloud Path: A Journey to Multi-Cloud and Beyond Thu, 12 Oct 2017 08:15:28 +0000 The other day, my colleague said “Moving to the cloud should be as easy as moving house.” Now, I can’t vouch for her experience in regards to a house move, but mine certainly wasn’t “easy.” My wife and I visited over 10 places before we agreed on the one we purchased. There was the location […]]]> Asset Management Has Moved Beyond the “Bean Counting” Tue, 05 Sep 2017 12:10:13 +0000 There has been significant emphasis on corporate data and IT asset vulnerability in recent years due to the increase in cyber security threats. Some industries have regulations requiring companies to know what IT assets they have as well as track what they connect to in the effort to better protect critical infrastructures. However, to really […]]]> Will My Team Be Ready? Assessing and Addressing Operational Needs for A Successful IT Launch Thu, 17 Aug 2017 00:50:47 +0000 Every IT leader wrestles with operationalizing a new software solution or business application for the enterprise. After advocating for the need to secure the budget as well as researching and getting approval for the solution selected, it isn’t a clear path to how your team and your end users will actually be successful. Moreover, the […]]]> CIO Journey – Moving IT from Cost Avoidance to Service Advancement Thu, 20 Apr 2017 00:00:29 +0000 Cost is an emotional subject with CIOs and IT managers. They’ve seen IT budgets slashed since the market recession in 2008, and have been expected to deliver the same quality of service, if not better. They’ve virtualized, consolidated and standardized. They’ve experimented with outsourcing, insourcing, service integration, and management models but the crux of the […]]]> IT and the End User: The Tortoise and the Hare of Business Applications Thu, 23 Mar 2017 00:00:57 +0000 We often hear from customers that when a business application that employees frequently use has been upgraded, the calls to IT support increase and they often echo the same themes: “…Something is not right!” “I can’t access the solution!” “This thing is so slow…” “The thing I used to use is no longer there. Where […]]]> How do I Accelerate Getting Value Out of My Solution? Thu, 23 Feb 2017 07:49:03 +0000 Every business and IT leader has business critical goals to achieve when they make an IT investment. Even further and often more daunting is being able to quickly demonstrate the value around it back to the company. After the acquisition process, the pressure is on to get the solution operational and functioning to specification. And […]]]> No Man is an Island in IT Mon, 19 Dec 2016 01:46:11 +0000 Despite a year in which England chose to separate from the European Union (aka, Brexit 2016), those of us in IT recognize another reality. Our technology world has everything to do with being connected together. For IT to succeed, there are business policies, compliance regulations, and most of all, other integrating technologies to manage through […]]]> Finally, I Can See Reality – Making Good CIOs Great Wed, 14 Dec 2016 01:45:46 +0000 Two recent Application Managed Services engagements that I participated in have brought to light one of the key characteristics I believe helps make good CIOs great – visibility into IT services. It’s not enough to know where you are doing well; it takes daily visibility and tracking across the good situations, the bad ones, and […]]]> Is Your Education Ready for Digital Transformation? Tue, 29 Nov 2016 05:03:45 +0000 Hardly a day goes by that we don’t hear about transformative IT, and with it comes a pressing need to master new technologies quickly. For organizations with teams of IT administrators, developers, and end users, transformative change places a heavy demand on training. Fortunately, times have changed since the days of whiteboards and classroom hand-outs. […]]]> Building Security At The Speed Of Business Fri, 09 Sep 2016 09:30:44 +0000 The Digital Transformation Playbook from BMC & PSFK Labs uncovers how companies need to utilize technology to enhance security, not just innovate their products Twenty-one percent of organizations suffered a security breach involving a mobile device in the past, primarily due to connections to shady Wi-Fi hotspots and malware, according to the 2016 BYOD and […]]]>