Welcome!

Cross-Platform Technology Journalism By Seasoned Writer

Adrian Bridgwater

Subscribe to Adrian Bridgwater: eMailAlertsEmail Alerts
Get Adrian Bridgwater via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Adrian Bridgwater

This post is sponsored by The Business Value Exchange and HP Enterprise Services First and by way of clarification - as all fans of archaic English colloquial language will know, ‘poppycock and bunkum' are appealing euphemisms for a useful four letter word starting with C that rhymes with clap. Nuances of language out of the way so that we all know what we're talking about, there are (more than ever) an increasingly bewildering set of terms used today to describe our state of enterprise IT. How long have we been talking about converged clouds, Big Data analytics, new mobility considerations for touch-enablement and perhaps even converged infrastructures to bring all the above together? The answer is simple, i.e., not long. It has not been many years that the CIO of today has had to not only negotiate the ever-changing landscape of modern IT, he or she also has to ... (more)

Dark Truths from Deep Inside the Data Universe By @ABridgwater | @BigDataExpo #BigData

The technology industry is fond of rounding out the year with predictions for the twelve months ahead. It's almost as if our arbitrary notion of calendar-driven time should be guaranteed to herald the arrival of the next paradigm shift or platform change. Of course we know that in reality, change and development happens continuously and this is especially so in IT. Rather than a ‘what to expect in the year ahead' discussion, let's instead look at some of the darker truths that currently stem from the data universe we are all currently trying to circumnavigate. Arguably one of o... (more)

Is the Future of Security Held in a Single Box? By @ABridgwater | @ThingsExpo #IoT

We protect our homes with a single front door (generally speaking) don't we? Should our approach to cyber security be any different? Shouldn't we be able to look to one single security layer for protection? Given the proliferation and diversity of malware, viruses, hacks, phishing, online fraud, spying and data theft - shouldn't we be able to protect our home networks in the same way that companies establish security firewalls? Could some of the ‘data separation' and ‘air gap' techniques used in secure facilities all the way up to nuclear power stations help us model similar app... (more)

Just When You Thought It Was Safe to Go Back into the Data By @ABridgwater | @BigDataExpo #BigData

So-called ‘paradigm shifts' happen across the information technology landscape roughly every five years. We can make this statement with enough approximate ambiguity for it still to be of some value in terms of the way an average CIO might look to plan for major infrastructural changes. First Big Data, then the flood As we stand today, Big Data has been around for roughly five years. In the year 2000, famed economist Francis X. Diebold is said to have published the first version of a paper titled "Big Data Dynamic Factor Models for Macroeconomic Measurement and Forecasting" - and t... (more)

Why the Smart CIO Trusts in Mobile

This post is sponsored by The Business Value Exchange and HP Enterprise Services Mobile is almost old news now isn't it? What more can we say about how important mobile technology is in the workplace? The visionary CIO trusts in a mobile device future with employees securely connecting to the corporate datacenter from an array of tightly locked-down devices - stop me if you've heard this one before. Workers are "empowered" via mobile smartphones, tablets and laptops to work anywhere securely with appropriate controls and policies in place across the corporate IT stack to ensure... (more)