Welcome!

Open Source Cloud Authors: Carmen Gonzalez, Elizabeth White, Jnan Dash, Pat Romanski, Lori MacVittie

Related Topics: Microservices Expo, Java IoT, Open Source Cloud

Microservices Expo: Article

TOGAF Foundation Level Certification – Another Practice Test

Sample questions

As I had mentioned earlier, there is a paucity of free sample questions for the TOGAF 9 foundation or the part 1 test. I had created one set earlier and there are two other set available for free:

If you are interested in Part 2 then this may help you: TOGAF – Preparation Aid for Part 2
[Update: TOGAF 9.1 Released – What Does It Mean To You?]

Here is another set of 40 questions.

Basic Concepts (3 questions)

1.

What according to TOGAF is an Enterprise?

(A)

Entire business group or corporation comprising of all local and international main and sub offices, divisions, subsidiaries, and departments

(B)

Any collection of organizations that has a common set of goals

(C)

Any large organization

(D)

An enterprise is an organization that uses computers

(E)

A large corporation or government agency, but it may also refer to a company of any size with many systems and users to manage

 

2.

Which of the following is NOT a correct statement about an Architecture Framework?

(A)

An architecture framework is a tool that can be used for developing a broad range of different architectures

(B)

An architecture framework should describe a method for designing an information system in terms of a set of building blocks, and for showing how the building blocks fit together

(C)

Architecture Framework is a set of resources, guidelines, templates, background information, etc. provided to help the architect establish an architecture practice within an organization

(D)

An architecture framework should contain a set of tools and provide a common vocabulary

(E)

An architecture framework should also include a list of recommended standards and compliant products that can be used to implement the building blocks

 

3.

Which of the following statement is NOT a reason for suitability of TOGAF as a Framework for Enterprise Architecture?

(A)

It provides an immediate return on investment

(B)

It has been developed through the collaborative efforts of more than 300 Architecture Forum member companies from some of the world’s leading IT customers and vendors and represents best practice in architecture development

(C)

It will allow architectures to be developed that are consistent, reflect the needs of stakeholders, employ best practice, and give due consideration both to current requirements and to the likely future needs of the business

(D)

It plays an important role in helping to “de-mystify” and de-risk the architecture development process

(E)

It provides a platform for adding value, and enables users to build genuinely open systems-based solutions to address their business issues and needs

 

Core Concepts (3 questions)

4.

Which of the following is NOT a part of the Architecture Capability Framework?

(A)

Standards with which new architectures must comply

(B)

Guidelines for establishing an Architecture Capability within an organization

(C)

A set of role, skill, and experience norms for staff undertaking enterprise architecture work

(D)

Techniques for evaluating and quantifying an organization’s maturity in enterprise architecture

(E)

Framework and guidelines for Architecture Governance

 

5.

TOGAF recommends running the enterprise architecture practice like any other operational unit within a business. For that, which of the following processes capability needs to be established?

(A)

Environment Management, Supplier Management and Network Management

(B)

Risk Management, Resource Management and IT Management

(C)

Communications and Stakeholder Management, Quality Management and Presentation Management

(D)

Financial Management, Performance Management and Service Management

(E)

Configuration Management, Release Management and Change management

 

6.

According to TOGAF Document Categorization Model, which are the four categories of content?

(A)

Central, Mandated, Recommended and Supporting

(B)

Core, Mandated, Reference and Supplemental

(C)

Central, Mandated, Recommended and Supplemental

(D)

Central, Mandated, Reference and Supplemental

(E)

Core, Mandated, Recommended and Supporting

 

Introduction to the ADM (3 questions)

7.

Which of the following statements is NOT true for ADM?

(A)

ADM defines a recommended sequence for the various phases and steps involved in developing an organization-wide enterprise architecture

(B)

ADM does not determine the scope for an enterprise architecture activity; this must be determined by the organization itself

(C)

The numbering scheme provided in the TOGAF ADM for its outputs is a mandated practice

(D)

An output in an early ADM phase may be modified in a later phase

(E)

The ADM has ten phases

 

8.

Which of the following is a Key Point of the ADM Cycle?

(A)

Decisions taken should be based on the value accruing to the enterprise only

(B)

ADM provides a recommended the scope of activity which can be tailored by the organization itself

(C)

The main guideline is to focus on what creates value to the enterprise, and to select horizontal and vertical scope, and project schedules, accordingly

(D)

Where necessary, use of the ADM should be tailored to meet the needs of the organization but phases cannot be omitted

(E)

Though ADM is iterative, the decisions regarding enterprise coverage, level of detail, time period and architecture asset re-use needs to be take upfront

 

9.

Which of the following is NOT a correct reason for limiting the scope of the Architecture Activity?

(A)

The inflexibility of the baseline IT technical architecture

(B)

The realities of resource and time constraints often mean there is not enough time, funding, or resources to build a top-down, all-inclusive architecture description encompassing all four architecture domains

(C)

To ensure an appropriate demarcation between the architecture effort and other, related activities (system design, system engineering, system development)

(D)

The organizational authority of the team producing the architecture

(E)

The objectives and stakeholder concerns to be addressed within the architecture

 

The Enterprise Continuum and Tools (4 questions)

10.

Which among the following statements about Architecture Continuum is NOT true?

(A)

It offers a consistent way to define and understand the generic rules, representations, and relationships in an architecture, including traceability and derivation relationships

(B)

It represents a structuring of Architecture Building Blocks (ABBs) which are re-usable architecture assets

(C)

Every artifact in the Solutions Continuum has a one to one relationship with a corresponding artifact in the Architecture Continuum

(D)

It shows the relationships among foundational frameworks, common system architectures, industry architectures, and enterprise architectures

(E)

It is a useful tool to discover commonality and eliminate unnecessary redundancy

 

11.

The relationship between the Architecture Continuum and the Solutions Continuum is one of ___ (complete the sentence).

(A)

Guidance, derivation and support

(B)

Guidance, direction and support

(C)

Governance, direction and support

(D)

Guidance, direction and supplementing

(E)

Governance, derivation and supplementing

 

12.

What are the levels of granularity the Architecture Landscape is divided into?

(A)

Strategic Architectures, Segment Architectures and Capability Architectures

(B)

Strategic Architectures, Segment Architectures and Transition Architectures

(C)

Enterprise Architectures, Segment Architectures and Capability Architectures

(D)

Enterprise Architectures, Segment Architectures and Transition Architectures

(E)

Enterprise Architectures, Solution Architectures and Transition Architectures

 

13.

Which of the following is NOT an accurate statement for selecting a tool for managing content of Enterprise Continuum?

(A)

It helps promote re-use

(B)

It enables sharing of architecture information within an organization

(C)

A single and standardized tool should be used

(D)

Tool selection is a complex process

(E)

It provide stakeholders with relevant models

 

ADM Phases (9 questions)

14.

Which of the following is NOT an objective of the Preliminary phase?

(A)

Understand the business environment

(B)

Ensure high-level management commitment and obtain agreement on scope

(C)

Establish principles and establish governance structure

(D)

Agree architecture method to be adopted

(E)

Articulate an Architecture Vision and value proposition

 

15.

What first-cut, high-level description does Architecture Vision provide?

(A)

Baseline Architectures, Target Architectures and Gap Analysis

(B)

Architecture Definition, Architecture Specification and Architecture Roadmap

(C)

Strategic Architectures, Segment Architectures and Capability Architectures

(D)

Business Architectures, Data Architectures, Application Architectures and Technology Architectures

(E)

Enterprise Architectures, Solution Architectures and Transition Architectures

 

16.

Which are the Key Considerations for the Data Architecture?

(A)

Data Analysis, Data Integrity and Data Security

(B)

Data Management, Data Integrity and Data Governance

(C)

Data Management, Data Migration and Data Governance

(D)

Data Analysis, Data Migration and Data Governance

(E)

Data Analysis, Data Integrity and Data Governance

 

17.

Which of the following is NOT an activity in Phase E?

(A)

Perform initial implementation planning

(B)

Group projects into Transition Architectures

(C)

Decide on approach — Make versus buy versus re-use

(D)

Identify the major implementation projects

(E)

Perform a cost/benefit analysis and a risk assessment

 

18.

Which of the following is NOT an approach in Phase G?

(A)

Creation of an Implementation and Migration Plan in co-operation with the portfolio and project managers

(B)

Adopt a phased deployment schedule that reflects the business priorities embodied in the Architecture Roadmap

(C)

Follow the organization’s standard for corporate, IT, and Architecture Governance

(D)

Use the organization’s established portfolio/program management approach, where this exists

(E)

Define an operations framework to ensure the effective long life of the deployed solution

 

19.

Which of the following statements about Requirements Management phase is correct?

(A)

This phase is executed at the beginning

(B)

It focuses on minimizing changes to requirement

(C)

It does not dispose of, address, or prioritize any requirements; this is done within the relevant phase of the ADM

(D)

TOGAF has a recommend process for requirements management

(E)

Prioritizing requirement is an activity of this phase

 

20.

How is the scope of the enterprise architecture projects decided?

(A)

The scope is defined in phase A and refined in phases B, C and D

(B)

Agreement on the scope is reached in the Preliminary phase and it is defined in phase A

(C)

The scope is defined in the Preliminary phase and agreement is reached in phase A

(D)

Agreement on the scope is reached in the Preliminary phase but the definition happens through phase A to D

(E)

The scope is defined and agree upon in the Preliminary phase

 

21.

In which phase is the make versus buy versus re-use decision taken?

(A)

Phase A

(B)

Phase D

(C)

Phase E

(D)

Phase F

(E)

Phase G

 

22.

In which phase are the Architecture Contracts prepared?

(A)

Preliminary Phase

(B)

Phase A

(C)

Phase E

(D)

Phase F

(E)

Phase G

 

ADM Guidelines and Techniques (6 questions)

23.

Which of the following is not a part of the guidelines for adapting the ADM process?

(A)

Coexisting with other Enterprise Architecture frameworks

(B)

Ways to apply iteration to the ADM

(C)

Applying the ADM at different levels of the enterprise

(D)

Security considerations when applying the ADM

(E)

Using TOGAF to define Service-Oriented Architectures (SOAs)

 

24.

Regarding Architecture Principle, which of the following statement is NOT correct?

(A)

TOGAF specifies a template for defining Architecture Principles

(B)

Architecture principles are a subset of IT principles that relate to architecture work

(C)

Principles must be derived from business goal

(D)

There are five criteria that distinguish a good set of principles – Understandability, Robustness, Completeness, Consistency and Stability

(E)

Principles should not be contradictory to the point where adhering to one principle would violate the spirit of another

 

25.

Where the process of creating a Business Scenario does starts?

(A)

Business and Technical environments

(B)

Problem statements

(C)

Desired objectives

(D)

Human participants

(E)

Roles and responsibilities

 

26.

In which phases is the Gap Analysis technique used?

(A)

Phases B, C, D, and E

(B)

Phases B, C, and D

(C)

Phases A, B, C, D, and E

(D)

Phases A, B, C and D

(E)

Phases C, D, and E

 

27.

For which phases is the Business Transformation Readiness Assessment a key technique?

(A)

Phases E only

(B)

Phases E, F and G

(C)

Phases A, E and F

(D)

Phases from A to F

(E)

Phases E and F

 

28.

Which of the following statements is NOT correct?

(A)

Corporate Strategic Plan manages and creates Capabilities

(B)

Capability consists of Capability Increment

(C)

Capability is documented in Architecture Vision

(D)

Capability Increment is documented by Transition Architecture

(E)

Architecture and Solution Building Blocks are the basis for Capability Increment Solutions

 

Architecture Governance (4 questions)

29.

Which of the following statements is NOT correct?

(A)

Effective governance ensures that problems are identified early and that subsequent changes to the environment occur in a controlled manner

(B)

Architecture Governance is the practice by which enterprise architectures and other architectures are managed and controlled at an enterprise-wide level

(C)

Architecture Governance typically operates within a hierarchy of governance structures

(D)

Corporate Governance is a broad topic and outside the scope of the TOGAF framework

(E)

Architecture Governance helps creating organizational structures that enabled each individual department to operate at maximum efficiency

 

30.

Which are the six characteristics used in TOGAF to highlight both the value and necessity for governance?

(A)

Discipline, Transparency, Independence, Accountability, Responsibility and Fairness

(B)

Transparency, Independence, Accountability, Responsibility, Fairness and Compliance

(C)

Independence, Accountability, Responsibility, Fairness, Compliance and Discipline

(D)

Accountability, Responsibility, Fairness, Compliance, Discipline and Transparency

(E)

Responsibility, Fairness, Compliance, Discipline, Transparency and Independence

 

31.

Which of the following is NOT the responsibility of Architecture Board?

(A)

Ensuring consistency between sub-architectures

(B)

Identifying re-usable components

(C)

Identification of risk and subsequent risk mitigation

(D)

Improving the maturity level of architecture discipline within the organization

(E)

Providing the basis for all decision-making with regard to changes to the architectures

 

32.

Which of the following is NOT a recommendation for Architecture Capability building?

(A)

Establishing a sustainable Architecture Capability within an organization can be achieved by adhering to the same approach that is used to establish any other capability

(B)

TOGAF states that Architecture Capability development should not be seen as a phase of an architecture project but as a separate one-off project

(C)

The ADM is an ideal method to be used to architect and govern the implementation of such Architecture Capability

(D)

Applying the ADM with the specific Architecture Vision to establish an architecture practice within the organization would help building Architecture Capability

(E)

Implementing any capability within an organization would require the design of the four domain architectures

 

Architecture Views, Viewpoints, and Stakeholders (2 questions)

33.

What question should the architect answer to ensure the completeness of the architecture?

(A)

Can the views be connected to each other?

(B)

Can the conflicting concerns be reconciled?

(C)

What trade-offs have been made?

(D)

Does it address all the concerns of its stakeholders?

(E)

Is the architecture implementable?

 

34.

Which of the following relationship between view, viewpoint, stakeholder and architecture is correct?

(A)

Stakeholder concern is address by one or more views

(B)

An architecture consists of multiple viewpoints

(C)

One of more viewpoint can be used to cover a concern

(D)

A Viewpoint conforms to a view

(E)

Viewpoint library contains multiple views

 

Building Blocks (2 questions)

35.

Which among the following statements is NOT correct?

(A)

TOGAF recommends the way in which functionality, products, and custom developments are assembled into building blocks

(B)

Every organization must decide for itself what arrangement of building blocks works best for it

(C)

A good choice of building blocks can lead to improvements in legacy system integration, interoperability, and flexibility in the creation of new systems and applications

(D)

An architecture is a composition of a set of building blocks and the specification of how those building blocks are connected

(E)

Various building blocks in an architecture specify the services required in an enterprise specific system

 

36.

Which among the following statements about patterns is NOT correct?

(A)

Pattern is “an idea that has been useful in one practical context and will probably be useful in others”

(B)

Patterns are considered to be a way of putting building blocks into context

(C)

Patterns can tell when, why, and what trade-offs you have to make

(D)

Patterns are a package of functionality defined to meet business needs across an organization

(E)

Patterns offer the promise of helping the architect to solutions that have been proven to deliver effective in the past

 

ADM Deliverables (2 questions)

37.

What does the Architecture Requirements Specification provide?

(A)

A qualitative view of the solution and aims to communicate the intent of the architects

(B)

A quantitative view of the solution stating measurable criteria

(C)

List of individual increments of change

(D)

An aspirational view of the end architecture product

(E)

Context for architecture work by describing the needs

 

38.

Which of the following is NOT a key ADM Deliverable?

(A)

Architecture Contract

(B)

Architecture Principles

(C)

Architecture Repository

(D)

Change Request

(E)

Integrated Information Infrastructure

 

TOGAF Reference Models (2 questions)

39.

Which among the following are NOT service categories in the TRM?

(A)

Data management and data interchange

(B)

User interface, graphics and image

(C)

Security, system and network management

(D)

Software engineering

(E)

Information brokers and application integrators

 

40.

Which among the following statements about Boundary-less Information Flow is NOT correct?

(A)

It is a trademark of The Open Group

(B)

It provides insights on how to operate individual departments at maximum efficiency

(C)

An infrastructure that provides Boundaryless Information Flow has open standard components

(D)

Its problem space is one that is shared by many customer members of The Open Group, and by many similar organizations worldwide

(E)

It is a shorthand representation of “access to integrated information to support business process improvements”

Answers

  1. B – Any collection of organizations that has a common set of goals
  2. C – Architecture Framework is a set of resources, guidelines, templates, background information, etc. provided to help the architect establish an architecture practice within an organization
  3. A – It provides an immediate return on investment
  4. A – Standards with which new architectures must comply
  5. D – Financial Management, Performance Management and Service Management
  6. E – Core, Mandated, Recommended and Supporting
  7. C – The numbering scheme provided in the TOGAF ADM for its outputs is a mandated practice
  8. C – The main guideline is to focus on what creates value to the enterprise, and to select horizontal and vertical scope, and project schedules, accordingly
  9. A – The inflexibility of the baseline IT technical architecture
  10. C – Every artifact in the Solutions Continuum has a one to one relationship with a corresponding artifact in the Architecture Continuum
  11. B – Guidance, direction and support
  12. A – Strategic Architectures, Segment Architectures and Capability Architectures
  13. C – Facilitate easier maintenance of the software assets
  14. E – Articulate an Architecture Vision and value proposition
  15. D – Business Architectures, Data Architectures, Application Architectures and Technology Architectures
  16. C – Data Management, Data Migration and Data Governance
  17. E – Perform a cost/benefit analysis and a risk assessment
  18. A – Creation of an Implementation and Migration Plan in co-operation with the portfolio and project managers
  19. C – It does not dispose of, address, or prioritize any requirements; this is done within the relevant phase of the ADM
  20. B – Agreement on the scope is reached in the Preliminary phase and it is defined in phase A
  21. C – Phase E
  22. E – Phase G
  23. A – Coexisting with other Enterprise Architecture frameworks
  24. C – Principles must be derived from business goal
  25. B – Problem statements
  26. A – Phases B, C, D, and E
  27. C – Phases A, E and F
  28. C – Capability is documented in Architecture Vision
  29. E – Architecture Governance helps creating organizational structures that enabled each individual department to operate at maximum efficiency
  30. A – Discipline, Transparency, Independence, Accountability, Responsibility and Fairness
  31. C – Identification of risk and subsequent risk mitigation
  32. B – TOGAF states that Architecture Capability development should not be seen as a phase of an architecture project but as a separate one-off project
  33. D – Does it address all the concerns of its stakeholders?
  34. C – One of more viewpoint can be used to cover a concern
  35. A – TOGAF recommends the way in which functionality, products, and custom developments are assembled into building blocks
  36. D – Patterns are a package of functionality defined to meet business needs across an organization
  37. B – A quantitative view of the solution stating measurable criteria
  38. E – Integrated Information Infrastructure
  39. E – Information brokers and application integrators
  40. B – It provides insights on how to operate individual departments at maximum efficiency

More Stories By Udayan Banerjee

Udayan Banerjee is CTO at NIIT Technologies Ltd, an IT industry veteran with more than 30 years' experience. He blogs at http://setandbma.wordpress.com.
The blog focuses on emerging technologies like cloud computing, mobile computing, social media aka web 2.0 etc. It also contains stuff about agile methodology and trends in architecture. It is a world view seen through the lens of a software service provider based out of Bangalore and serving clients across the world. The focus is mostly on...

  • Keep the hype out and project a realistic picture
  • Uncover trends not very apparent
  • Draw conclusion from real life experience
  • Point out fallacy & discrepancy when I see them
  • Talk about trends which I find interesting
Google

@ThingsExpo Stories
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2017 New York The 7th Internet of @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, New York. Chris Matthieu is the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flo...
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Unsecured IoT devices were used to launch crippling DDOS attacks in October 2016, targeting services such as Twitter, Spotify, and GitHub. Subsequent testimony to Congress about potential attacks on office buildings, schools, and hospitals raised the possibility for the IoT to harm and even kill people. What should be done? Does the government need to intervene? This panel at @ThingExpo New York brings together leading IoT and security experts to discuss this very serious topic.
We are always online. We access our data, our finances, work, and various services on the Internet. But we live in a congested world of information in which the roads were built two decades ago. The quest for better, faster Internet routing has been around for a decade, but nobody solved this problem. We’ve seen band-aid approaches like CDNs that attack a niche's slice of static content part of the Internet, but that’s it. It does not address the dynamic services-based Internet of today. It does...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, discussed recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model for ...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2017 New York. The 20th Cloud Expo and 7th @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, NY. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Internet to enable us all to im...
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...