Tag: agile
Is Agile Software Development Dead in the Age of AI?
Not dead — but under serious pressure, and some of its foundational assumptions are eroding fast.
Agile was designed around the scarcity of working software. Writing code is slow, human attention is finite, and iteration is expensive. Its rituals — sprints, standups, story points, velocity tracking — exist to manage that scarcity. AI coding assistants like GitHub Copilot, Cursor, and Claude Code dramatically compress the time from intent to working code. When a sprint’s worth of boilerplate takes an afternoon, the sprint cadence starts to feel like bureaucracy.
Tag: ai
ServiceNow Brings AI-Native Platform to Manufacturing Value Chain
ServiceNow has expanded its platform into manufacturing with a suite of AI-native capabilities covering the full value chain from sales and configuration through quality, warranty, and factory-floor operations. The announcement, made alongside the unveiling of Industrial Connected Workforce and ServiceNow EmployeeWorks for manufacturers, positions the company directly against the fragmented stack that characterizes most industrial enterprises.
The core argument is structural. Manufacturing AI investments have accelerated over the past two years, but quality data, warranty claims, order workflows, and shop-floor processes typically run on separate systems with no shared governance layer. ServiceNow’s pitch is that AI cannot deliver end-to-end execution when the data it needs is distributed across siloed tools—and that a single platform with unified workflows changes that calculus.
We Are Likely in the Early Stages of Another Productivity Boom
We are likely in the early stages of another productivity boom.
You can feel it before you can fully measure it. Not in the official statistics yet, not neatly captured in GDP releases or quarterly productivity reports, but in the way work itself is beginning to change. Tasks that used to take hours now collapse into minutes. Layers of friction around research, drafting, analysis, coordination, and execution are starting to thin out. The shift is still uneven, still messy, but it is becoming difficult to ignore.
AI in Enterprise IT: Where It Is Actually Saving Time
Enterprise IT has adopted AI-assisted tools at an uneven pace across the four functional areas. The adoption unevenness reflects a genuine difference in the maturity of AI applications across contexts — some IT functions have clear, measurable AI use cases with documented productivity gains, while others have AI vendor claims that have not translated to operational reality at the scale most enterprises require.
The honest assessment of where AI is saving time in enterprise IT is narrow but real: specific use cases within IT support, security operations, and software development assistance have demonstrated consistent productivity gains. The broader claims — AI transformation of IT operations across all functions — remain future-oriented rather than present-tense.
Tag: ai agents
Infor and AWS Deploy Industry-Specific AI Agents for Manufacturing at Scale
The manufacturing sector’s AI problem has never been a shortage of tools — it has been the absence of tools that understand what manufacturing actually is. Infor and AWS are now pushing a direct answer to that gap, announcing a collaboration to deploy industry-specific AI agents built natively on AWS infrastructure, targeting discrete and process manufacturing enterprises that need to move from pilot programs to production at scale.
The core argument is that generic AI fails on the shop floor. Manufacturing workflows involve bill of materials hierarchies, vendor pricing cycles tied to annual model changes, returns processing chains, and procurement-to-payment pipelines that off-the-shelf models cannot navigate without substantial domain grounding. Infor’s position is that it supplies the industry-specific intelligence while AWS provides the enterprise infrastructure — Amazon Bedrock AgentCore, Amazon Bedrock, and Amazon SageMaker — to run it at mission-critical reliability.
Tag: ai-infrastructure
11% Is Not a Bug. It's the Starting Gun.
xAI is running its 550,000-GPU Colossus fleet at roughly 11% model FLOPs utilization. An internal memo from infrastructure lead Michael Nicolls confirmed the figure and set a target of 50% — a number that sits at the high end of an industry range where even the best operators, Meta and Google, are only achieving 43–46%. For a company that built the world’s largest AI supercomputer in 122 days, the software stack is still catching up to the hardware.
Systal Named Leader in Gartner Magic Quadrant for Managed Network Services
Systal Technology Solutions has been named a Leader in the 2026 Gartner Magic Quadrant for Managed Network Services, marking its third consecutive inclusion in the report and reinforcing its position within the global managed services landscape. The recognition reflects how enterprise network environments continue to evolve toward highly complex, multi-vendor and hybrid cloud architectures where operational stability, automation, and security integration are becoming inseparable priorities. In this context, Systal has been highlighted for its approach of acting as an embedded extension of enterprise IT teams, supporting both day-to-day operations and longer-term transformation initiatives.
Tag: aiops
Kyndryl Named Leader in Three Mainframe Categories in 2026 ISG Provider Lens Report
Kyndryl (NYSE: KD) has been recognized as a Leader in three categories of the 2026 ISG Provider Lens™ Mainframes — Services and Solutions Report: Mainframe Technology Consulting, Mainframe as a Service (MFaaS), and Application Modernization Services. The triple recognition from ISG, an independent technology research and advisory firm, positions Kyndryl among the top-tier providers supporting enterprises running mission-critical mainframe workloads through a period of compounding modernization pressure.
In the Mainframe Technology Consulting quadrant, ISG cited Kyndryl’s strategy and assessment-led methodology, its targeted infrastructure optimization approach, and its hybrid cloud integration focus. The report highlighted the role of Kyndryl Bridge and agentic AI-enabled automated discovery in delivering operational insights across discrete engagements and multi-year transformation programs alike. For MFaaS, ISG noted Kyndryl’s large global outsourcing footprint and the breadth of its consumption models, which range from customer-owned environments to shared platforms including zCloud and C4i, alongside continued investment in AI-driven autonomy and observability. In Application Modernization Services, ISG recognized the company’s end-to-end approach spanning structured assessments, iterative implementation, and hyperscaler alliances, again underpinned by Kyndryl Bridge and its governance and agentic AI capabilities.
Tag: apple
Corporate Laptop Procurement in 2026: What Has Changed and What Still Gets It Wrong
Corporate laptop procurement has not kept pace with the changes in how knowledge workers use their devices. The procurement criteria that dominated enterprise laptop purchasing for the past fifteen years — Windows compatibility, Intel processor, specific RAM and storage tiers, corporate image support — are still driving purchasing decisions in organizations where the actual requirements have shifted materially. The mismatch produces laptops that are enterprise-manageable but mediocre for the work employees actually do.
Tag: architecture
Zero Trust Architecture Is Not a Product You Buy
The security vendor community has done something impressive with the Zero Trust concept: it has taken a principled architectural framework that requires organizational discipline, policy definition, and sustained implementation effort, and repackaged it as a product category that can be purchased and deployed. The repackaging is commercially effective. It is also misleading in a way that causes organizations to believe they have implemented Zero Trust when they have purchased a tool.
Tag: artificial intelligence
Is Agile Software Development Dead in the Age of AI?
Not dead — but under serious pressure, and some of its foundational assumptions are eroding fast.
Agile was designed around the scarcity of working software. Writing code is slow, human attention is finite, and iteration is expensive. Its rituals — sprints, standups, story points, velocity tracking — exist to manage that scarcity. AI coding assistants like GitHub Copilot, Cursor, and Claude Code dramatically compress the time from intent to working code. When a sprint’s worth of boilerplate takes an afternoon, the sprint cadence starts to feel like bureaucracy.
Tag: asset management
Hardware Asset Management Is the IT Discipline Most Organizations Do Badly
Hardware asset management — knowing what physical devices the organization owns, where they are, who has them, what software is installed on them, and when they need to be refreshed or retired — is foundational to almost every other IT function. Security teams need accurate asset inventory to understand their attack surface. Support teams need device configuration data to resolve issues efficiently. Finance teams need asset records for depreciation and insurance. Procurement teams need lifecycle data to plan refresh cycles.
Tag: automation
The DevOps Job Isn't Dead. It's Being Repriced.
Every few months the same headline resurfaces: DevOps is dead. In 2026, the claim has more surface credibility than before — job boards are brutal, the title is disappearing from org charts, and AI is eating the work that once defined the role. None of that means the function is gone. It means the floor dropped out and the ceiling went up.
The mechanics are straightforward. AI systems built into cloud platforms now handle what junior and mid-level DevOps engineers spent most of their time on — infrastructure provisioning, pipeline configuration, alert triage, rollback decisions. That work isn’t being done by fewer people out of choice. It’s being done by machines out of necessity, because the scale modern systems operate at makes human-in-the-loop intervention a bottleneck. Netflix deployed 4,000 times daily last quarter. Amazon pushes a change every 11.7 seconds across global infrastructure. No headcount solves that. Automation does.
Tag: awareness training
Phishing Remains the Most Effective Attack Vector and Training Is Not Fixing It
Phishing has been the leading initial access vector for enterprise breaches for over a decade. Security awareness training — the annual compliance exercise that organizations deploy to satisfy auditors and reduce cyber insurance premiums — has been the dominant organizational response for the same period. The training has not significantly reduced phishing click rates in most organizations. The reasons are structural, not motivational, and the solutions require technical controls rather than behavioral ones.
Tag: aws
Infor and AWS Deploy Industry-Specific AI Agents for Manufacturing at Scale
The manufacturing sector’s AI problem has never been a shortage of tools — it has been the absence of tools that understand what manufacturing actually is. Infor and AWS are now pushing a direct answer to that gap, announcing a collaboration to deploy industry-specific AI agents built natively on AWS infrastructure, targeting discrete and process manufacturing enterprises that need to move from pilot programs to production at scale.
The core argument is that generic AI fails on the shop floor. Manufacturing workflows involve bill of materials hierarchies, vendor pricing cycles tied to annual model changes, returns processing chains, and procurement-to-payment pipelines that off-the-shelf models cannot navigate without substantial domain grounding. Infor’s position is that it supplies the industry-specific intelligence while AWS provides the enterprise infrastructure — Amazon Bedrock AgentCore, Amazon Bedrock, and Amazon SageMaker — to run it at mission-critical reliability.
Tag: backup
Ransomware Recovery Is Where Security Programs Actually Get Tested
Ransomware preparation is the security investment that organizations discover the quality of during the worst possible moment. The backup strategy that was designed but not tested reveals its gaps when the organization needs to restore from it. The incident response plan that was written but not rehearsed reveals its gaps when the team is trying to execute it under pressure. The cyber insurance policy that was procured but not fully read reveals its requirements when the claim is filed.
Tag: byod
BYOD Policy Has Produced Security Problems Nobody Wants to Own
Bring Your Own Device policies were adopted by enterprise IT organizations under pressure from employees and leadership who wanted to use their personal devices for work and did not want to carry two phones. The policies were designed hastily, implemented with tools that were not ready for the management requirements they needed to meet, and left in place with minimal review as the security landscape changed around them. The result is a policy category that most IT security professionals acknowledge as a significant exposure and most organizations decline to address because addressing it requires telling employees they cannot use their personal devices for work.
Tag: cio
The IT Budget Allocation Problem That Keeps CIOs Up at Night
The IT budget allocation problem is structural, not mathematical. Organizations that spend the right total amount on IT frequently allocate it incorrectly across the four functional areas — run the business, grow the business, transform the business, and maintain the infrastructure that enables all three — producing technology environments that are simultaneously overspent in some areas and critically underfunded in others.
The allocation pattern that is most common and most damaging is heavy spending on new software and technology initiatives with insufficient investment in the support, security, and infrastructure maintenance that determines whether those investments function reliably. An organization that spends aggressively on digital transformation while deferring network infrastructure refresh, understaffing the helpdesk, and running security with inadequate tooling has not made a strategic trade-off. It has made an accounting error that looks like a strategic choice.
Tag: citizen developer
Low-Code Platforms Have Found Their Ceiling
Low-code and no-code platforms arrived with a promise that has been partially delivered and significantly oversold: that business users without programming backgrounds could build the software applications they needed without depending on IT development teams. The partially-delivered part is real. Workflow automation tools like Power Automate, Zapier, and Make have genuinely enabled business users to build integrations and automations that previously required developer time. The oversold part is the claim that this capability extends to applications of arbitrary complexity.
Tag: cloud
The DevOps Job Isn't Dead. It's Being Repriced.
Every few months the same headline resurfaces: DevOps is dead. In 2026, the claim has more surface credibility than before — job boards are brutal, the title is disappearing from org charts, and AI is eating the work that once defined the role. None of that means the function is gone. It means the floor dropped out and the ceiling went up.
The mechanics are straightforward. AI systems built into cloud platforms now handle what junior and mid-level DevOps engineers spent most of their time on — infrastructure provisioning, pipeline configuration, alert triage, rollback decisions. That work isn’t being done by fewer people out of choice. It’s being done by machines out of necessity, because the scale modern systems operate at makes human-in-the-loop intervention a bottleneck. Netflix deployed 4,000 times daily last quarter. Amazon pushes a change every 11.7 seconds across global infrastructure. No headcount solves that. Automation does.
Server Hardware in the Cloud Age Has a Different ROI Calculation
The cloud versus on-premises debate has settled into a more nuanced position than its early framing suggested. The argument that all workloads should move to cloud and that on-premises infrastructure would become obsolete was oversimplified. The organizations that moved all workloads to cloud and discovered that certain workload categories are more expensive to run in cloud than on-premises have been quietly repatriating those workloads for several years.
The current reality is a hybrid infrastructure landscape where the economic decision about where to run a workload depends on its specific characteristics — compute intensity, data volume, access patterns, regulatory requirements, and predictability — rather than on a blanket preference for either delivery model. Server hardware investment in this context requires the same rigor as any capital investment: a specific business case for the specific workloads that the hardware will run.
Tag: compute
11% Is Not a Bug. It's the Starting Gun.
xAI is running its 550,000-GPU Colossus fleet at roughly 11% model FLOPs utilization. An internal memo from infrastructure lead Michael Nicolls confirmed the figure and set a target of 50% — a number that sits at the high end of an industry range where even the best operators, Meta and Google, are only achieving 43–46%. For a company that built the world’s largest AI supercomputer in 122 days, the software stack is still catching up to the hardware.
Tag: cost management
SaaS Sprawl Is Costing More Than the Finance Team Knows
The average organization with 500 to 1,000 employees is running between 100 and 200 SaaS applications. A fraction of those are managed by IT. The rest were procured by individual departments, teams, and employees using corporate credit cards, expense reports, and in some cases personal cards that get reimbursed. The finance team knows about the ones with purchase orders. The IT team knows about the ones that went through the security review queue. Nobody knows about all of them.
Tag: cpq
ServiceNow Brings AI-Native Platform to Manufacturing Value Chain
ServiceNow has expanded its platform into manufacturing with a suite of AI-native capabilities covering the full value chain from sales and configuration through quality, warranty, and factory-floor operations. The announcement, made alongside the unveiling of Industrial Connected Workforce and ServiceNow EmployeeWorks for manufacturers, positions the company directly against the fragmented stack that characterizes most industrial enterprises.
The core argument is structural. Manufacturing AI investments have accelerated over the past two years, but quality data, warranty claims, order workflows, and shop-floor processes typically run on separate systems with no shared governance layer. ServiceNow’s pitch is that AI cannot deliver end-to-end execution when the data it needs is distributed across siloed tools—and that a single platform with unified workflows changes that calculus.
Tag: cve
The Vulnerability Management Backlog Every Organization Has and Nobody Talks About
Vulnerability management programs have a dirty secret that annual security assessments and compliance audits politely decline to examine: the remediation backlog. Organizations that have deployed vulnerability scanners — Tenable, Qualys, Rapid7 — know their vulnerability count precisely. Most of them have more open vulnerabilities than they will remediate in the coming year. Many have more open vulnerabilities than they will remediate in the next three years at their current remediation pace.
Tag: data center
Server Hardware in the Cloud Age Has a Different ROI Calculation
The cloud versus on-premises debate has settled into a more nuanced position than its early framing suggested. The argument that all workloads should move to cloud and that on-premises infrastructure would become obsolete was oversimplified. The organizations that moved all workloads to cloud and discovered that certain workload categories are more expensive to run in cloud than on-premises have been quietly repatriating those workloads for several years.
The current reality is a hybrid infrastructure landscape where the economic decision about where to run a workload depends on its specific characteristics — compute intensity, data volume, access patterns, regulatory requirements, and predictability — rather than on a blanket preference for either delivery model. Server hardware investment in this context requires the same rigor as any capital investment: a specific business case for the specific workloads that the hardware will run.
Tag: debt
The Network Infrastructure Debt Most Organizations Are Quietly Carrying
Network infrastructure occupies an unusual position in enterprise IT budget conversations. It is essential — nothing in the technology stack works without it — and invisible when functioning correctly. The invisibility is the problem. Network hardware that is approaching or past its end-of-support date, running firmware that has not been updated in years, and operating at utilization levels for which it was not designed accumulates risk silently. The incident that reveals the accumulation is not gradual. It is sudden.
Tag: dell
Corporate Laptop Procurement in 2026: What Has Changed and What Still Gets It Wrong
Corporate laptop procurement has not kept pace with the changes in how knowledge workers use their devices. The procurement criteria that dominated enterprise laptop purchasing for the past fifteen years — Windows compatibility, Intel processor, specific RAM and storage tiers, corporate image support — are still driving purchasing decisions in organizations where the actual requirements have shifted materially. The mismatch produces laptops that are enterprise-manageable but mediocre for the work employees actually do.
Tag: development
Low-Code Platforms Have Found Their Ceiling
Low-code and no-code platforms arrived with a promise that has been partially delivered and significantly oversold: that business users without programming backgrounds could build the software applications they needed without depending on IT development teams. The partially-delivered part is real. Workflow automation tools like Power Automate, Zapier, and Make have genuinely enabled business users to build integrations and automations that previously required developer time. The oversold part is the claim that this capability extends to applications of arbitrary complexity.
Tag: devops
The DevOps Job Isn't Dead. It's Being Repriced.
Every few months the same headline resurfaces: DevOps is dead. In 2026, the claim has more surface credibility than before — job boards are brutal, the title is disappearing from org charts, and AI is eating the work that once defined the role. None of that means the function is gone. It means the floor dropped out and the ceiling went up.
The mechanics are straightforward. AI systems built into cloud platforms now handle what junior and mid-level DevOps engineers spent most of their time on — infrastructure provisioning, pipeline configuration, alert triage, rollback decisions. That work isn’t being done by fewer people out of choice. It’s being done by machines out of necessity, because the scale modern systems operate at makes human-in-the-loop intervention a bottleneck. Netflix deployed 4,000 times daily last quarter. Amazon pushes a change every 11.7 seconds across global infrastructure. No headcount solves that. Automation does.
Tag: economy
We Are Likely in the Early Stages of Another Productivity Boom
We are likely in the early stages of another productivity boom.
You can feel it before you can fully measure it. Not in the official statistics yet, not neatly captured in GDP releases or quarterly productivity reports, but in the way work itself is beginning to change. Tasks that used to take hours now collapse into minutes. Layers of friction around research, drafting, analysis, coordination, and execution are starting to thin out. The shift is still uneven, still messy, but it is becoming difficult to ignore.
Tag: edr
Endpoint Detection and Response Has Not Solved the Endpoint Security Problem
Endpoint Detection and Response platforms replaced antivirus as the dominant endpoint security technology on the basis that signature-based detection could not keep pace with the volume and variety of modern malware. The replacement was justified. EDR’s behavioral detection, continuous telemetry, and forensic capability represent a genuine improvement over signature-based antivirus in detecting and investigating endpoint threats.
The marketing that followed — the promise of comprehensive endpoint security that would significantly reduce breach frequency and impact — overstated what the technology can deliver. EDR is better than what it replaced. It is not the endpoint security solution. Endpoints continue to be compromised at scale in organizations running mature EDR deployments because the threats that matter most have adapted to operate within the behavioral envelope that EDR considers legitimate.
Tag: email security
Phishing Remains the Most Effective Attack Vector and Training Is Not Fixing It
Phishing has been the leading initial access vector for enterprise breaches for over a decade. Security awareness training — the annual compliance exercise that organizations deploy to satisfy auditors and reduce cyber insurance premiums — has been the dominant organizational response for the same period. The training has not significantly reduced phishing click rates in most organizations. The reasons are structural, not motivational, and the solutions require technical controls rather than behavioral ones.
Tag: employee experience
Self-Service IT Portals Fail When They Are Designed for the IT Team, Not the Employee
The self-service IT portal is one of enterprise IT’s most persistent good ideas with consistently poor implementation. The idea is sound: employees who can resolve their own IT issues without contacting the helpdesk reduce the support burden, resolve their issues faster, and build a level of IT self-sufficiency that benefits the organization. The implementation failure is that self-service portals are almost universally designed to make it easy for IT to publish content rather than easy for employees to find solutions to their problems.
Tag: endpoint security
Endpoint Detection and Response Has Not Solved the Endpoint Security Problem
Endpoint Detection and Response platforms replaced antivirus as the dominant endpoint security technology on the basis that signature-based detection could not keep pace with the volume and variety of modern malware. The replacement was justified. EDR’s behavioral detection, continuous telemetry, and forensic capability represent a genuine improvement over signature-based antivirus in detecting and investigating endpoint threats.
The marketing that followed — the promise of comprehensive endpoint security that would significantly reduce breach frequency and impact — overstated what the technology can deliver. EDR is better than what it replaced. It is not the endpoint security solution. Endpoints continue to be compromised at scale in organizations running mature EDR deployments because the threats that matter most have adapted to operate within the behavioral envelope that EDR considers legitimate.
Tag: endpoints
BYOD Policy Has Produced Security Problems Nobody Wants to Own
Bring Your Own Device policies were adopted by enterprise IT organizations under pressure from employees and leadership who wanted to use their personal devices for work and did not want to carry two phones. The policies were designed hastily, implemented with tools that were not ready for the management requirements they needed to meet, and left in place with minimal review as the security landscape changed around them. The result is a policy category that most IT security professionals acknowledge as a significant exposure and most organizations decline to address because addressing it requires telling employees they cannot use their personal devices for work.
Corporate Laptop Procurement in 2026: What Has Changed and What Still Gets It Wrong
Corporate laptop procurement has not kept pace with the changes in how knowledge workers use their devices. The procurement criteria that dominated enterprise laptop purchasing for the past fifteen years — Windows compatibility, Intel processor, specific RAM and storage tiers, corporate image support — are still driving purchasing decisions in organizations where the actual requirements have shifted materially. The mismatch produces laptops that are enterprise-manageable but mediocre for the work employees actually do.
The PC Refresh Cycle Has Been Extended Too Far
The four-year PC refresh cycle that became standard in enterprise IT during the 2010s was a budget optimization made under specific conditions: hardware improvements were incremental, Windows 7 was stable, and the marginal productivity gain from newer hardware was not large enough to justify more frequent refresh. Those conditions no longer hold. The PC refresh cycle at many organizations has stretched to five, six, and in some cases seven years without a corresponding assessment of whether the extended cycle is actually saving money.
Tag: engineering culture
Is Agile Software Development Dead in the Age of AI?
Not dead — but under serious pressure, and some of its foundational assumptions are eroding fast.
Agile was designed around the scarcity of working software. Writing code is slow, human attention is finite, and iteration is expensive. Its rituals — sprints, standups, story points, velocity tracking — exist to manage that scarcity. AI coding assistants like GitHub Copilot, Cursor, and Claude Code dramatically compress the time from intent to working code. When a sprint’s worth of boilerplate takes an afternoon, the sprint cadence starts to feel like bureaucracy.
Tag: enterprise
Enterprise Software Procurement Is Broken and Everyone Knows It
Enterprise software procurement moves at a pace that the software it is trying to purchase has long since left behind. The average procurement cycle for a mid-market enterprise software purchase — from initial vendor identification to signed contract — runs between four and nine months. The software category the procurement team is evaluating will have shipped multiple major releases during that period. The requirements documentation that anchored the evaluation will have drifted from what the business actually needs. The vendor selected may have been acquired.
Tag: enterprise software
ServiceNow Brings AI-Native Platform to Manufacturing Value Chain
ServiceNow has expanded its platform into manufacturing with a suite of AI-native capabilities covering the full value chain from sales and configuration through quality, warranty, and factory-floor operations. The announcement, made alongside the unveiling of Industrial Connected Workforce and ServiceNow EmployeeWorks for manufacturers, positions the company directly against the fragmented stack that characterizes most industrial enterprises.
The core argument is structural. Manufacturing AI investments have accelerated over the past two years, but quality data, warranty claims, order workflows, and shop-floor processes typically run on separate systems with no shared governance layer. ServiceNow’s pitch is that AI cannot deliver end-to-end execution when the data it needs is distributed across siloed tools—and that a single platform with unified workflows changes that calculus.
Infor and AWS Deploy Industry-Specific AI Agents for Manufacturing at Scale
The manufacturing sector’s AI problem has never been a shortage of tools — it has been the absence of tools that understand what manufacturing actually is. Infor and AWS are now pushing a direct answer to that gap, announcing a collaboration to deploy industry-specific AI agents built natively on AWS infrastructure, targeting discrete and process manufacturing enterprises that need to move from pilot programs to production at scale.
The core argument is that generic AI fails on the shop floor. Manufacturing workflows involve bill of materials hierarchies, vendor pricing cycles tied to annual model changes, returns processing chains, and procurement-to-payment pipelines that off-the-shelf models cannot navigate without substantial domain grounding. Infor’s position is that it supplies the industry-specific intelligence while AWS provides the enterprise infrastructure — Amazon Bedrock AgentCore, Amazon Bedrock, and Amazon SageMaker — to run it at mission-critical reliability.
Tag: enterprise technology
Kyndryl Named Leader in Three Mainframe Categories in 2026 ISG Provider Lens Report
Kyndryl (NYSE: KD) has been recognized as a Leader in three categories of the 2026 ISG Provider Lens™ Mainframes — Services and Solutions Report: Mainframe Technology Consulting, Mainframe as a Service (MFaaS), and Application Modernization Services. The triple recognition from ISG, an independent technology research and advisory firm, positions Kyndryl among the top-tier providers supporting enterprises running mission-critical mainframe workloads through a period of compounding modernization pressure.
In the Mainframe Technology Consulting quadrant, ISG cited Kyndryl’s strategy and assessment-led methodology, its targeted infrastructure optimization approach, and its hybrid cloud integration focus. The report highlighted the role of Kyndryl Bridge and agentic AI-enabled automated discovery in delivering operational insights across discrete engagements and multi-year transformation programs alike. For MFaaS, ISG noted Kyndryl’s large global outsourcing footprint and the breadth of its consumption models, which range from customer-owned environments to shared platforms including zCloud and C4i, alongside continued investment in AI-driven autonomy and observability. In Application Modernization Services, ISG recognized the company’s end-to-end approach spanning structured assessments, iterative implementation, and hyperscaler alliances, again underpinned by Kyndryl Bridge and its governance and agentic AI capabilities.
Tag: enterprise-it
Systal Named Leader in Gartner Magic Quadrant for Managed Network Services
Systal Technology Solutions has been named a Leader in the 2026 Gartner Magic Quadrant for Managed Network Services, marking its third consecutive inclusion in the report and reinforcing its position within the global managed services landscape. The recognition reflects how enterprise network environments continue to evolve toward highly complex, multi-vendor and hybrid cloud architectures where operational stability, automation, and security integration are becoming inseparable priorities. In this context, Systal has been highlighted for its approach of acting as an embedded extension of enterprise IT teams, supporting both day-to-day operations and longer-term transformation initiatives.
Tag: field service
ServiceNow Brings AI-Native Platform to Manufacturing Value Chain
ServiceNow has expanded its platform into manufacturing with a suite of AI-native capabilities covering the full value chain from sales and configuration through quality, warranty, and factory-floor operations. The announcement, made alongside the unveiling of Industrial Connected Workforce and ServiceNow EmployeeWorks for manufacturers, positions the company directly against the fragmented stack that characterizes most industrial enterprises.
The core argument is structural. Manufacturing AI investments have accelerated over the past two years, but quality data, warranty claims, order workflows, and shop-floor processes typically run on separate systems with no shared governance layer. ServiceNow’s pitch is that AI cannot deliver end-to-end execution when the data it needs is distributed across siloed tools—and that a single platform with unified workflows changes that calculus.
Tag: gartner
Systal Named Leader in Gartner Magic Quadrant for Managed Network Services
Systal Technology Solutions has been named a Leader in the 2026 Gartner Magic Quadrant for Managed Network Services, marking its third consecutive inclusion in the report and reinforcing its position within the global managed services landscape. The recognition reflects how enterprise network environments continue to evolve toward highly complex, multi-vendor and hybrid cloud architectures where operational stability, automation, and security integration are becoming inseparable priorities. In this context, Systal has been highlighted for its approach of acting as an embedded extension of enterprise IT teams, supporting both day-to-day operations and longer-term transformation initiatives.
Tag: gpu
11% Is Not a Bug. It's the Starting Gun.
xAI is running its 550,000-GPU Colossus fleet at roughly 11% model FLOPs utilization. An internal memo from infrastructure lead Michael Nicolls confirmed the figure and set a target of 50% — a number that sits at the high end of an industry range where even the best operators, Meta and Google, are only achieving 43–46%. For a company that built the world’s largest AI supercomputer in 122 days, the software stack is still catching up to the hardware.
Tag: hardware
Hardware Asset Management Is the IT Discipline Most Organizations Do Badly
Hardware asset management — knowing what physical devices the organization owns, where they are, who has them, what software is installed on them, and when they need to be refreshed or retired — is foundational to almost every other IT function. Security teams need accurate asset inventory to understand their attack surface. Support teams need device configuration data to resolve issues efficiently. Finance teams need asset records for depreciation and insurance. Procurement teams need lifecycle data to plan refresh cycles.
Server Hardware in the Cloud Age Has a Different ROI Calculation
The cloud versus on-premises debate has settled into a more nuanced position than its early framing suggested. The argument that all workloads should move to cloud and that on-premises infrastructure would become obsolete was oversimplified. The organizations that moved all workloads to cloud and discovered that certain workload categories are more expensive to run in cloud than on-premises have been quietly repatriating those workloads for several years.
The current reality is a hybrid infrastructure landscape where the economic decision about where to run a workload depends on its specific characteristics — compute intensity, data volume, access patterns, regulatory requirements, and predictability — rather than on a blanket preference for either delivery model. Server hardware investment in this context requires the same rigor as any capital investment: a specific business case for the specific workloads that the hardware will run.
The IT Budget Allocation Problem That Keeps CIOs Up at Night
The IT budget allocation problem is structural, not mathematical. Organizations that spend the right total amount on IT frequently allocate it incorrectly across the four functional areas — run the business, grow the business, transform the business, and maintain the infrastructure that enables all three — producing technology environments that are simultaneously overspent in some areas and critically underfunded in others.
The allocation pattern that is most common and most damaging is heavy spending on new software and technology initiatives with insufficient investment in the support, security, and infrastructure maintenance that determines whether those investments function reliably. An organization that spends aggressively on digital transformation while deferring network infrastructure refresh, understaffing the helpdesk, and running security with inadequate tooling has not made a strategic trade-off. It has made an accounting error that looks like a strategic choice.
BYOD Policy Has Produced Security Problems Nobody Wants to Own
Bring Your Own Device policies were adopted by enterprise IT organizations under pressure from employees and leadership who wanted to use their personal devices for work and did not want to carry two phones. The policies were designed hastily, implemented with tools that were not ready for the management requirements they needed to meet, and left in place with minimal review as the security landscape changed around them. The result is a policy category that most IT security professionals acknowledge as a significant exposure and most organizations decline to address because addressing it requires telling employees they cannot use their personal devices for work.
The Network Infrastructure Debt Most Organizations Are Quietly Carrying
Network infrastructure occupies an unusual position in enterprise IT budget conversations. It is essential — nothing in the technology stack works without it — and invisible when functioning correctly. The invisibility is the problem. Network hardware that is approaching or past its end-of-support date, running firmware that has not been updated in years, and operating at utilization levels for which it was not designed accumulates risk silently. The incident that reveals the accumulation is not gradual. It is sudden.
Corporate Laptop Procurement in 2026: What Has Changed and What Still Gets It Wrong
Corporate laptop procurement has not kept pace with the changes in how knowledge workers use their devices. The procurement criteria that dominated enterprise laptop purchasing for the past fifteen years — Windows compatibility, Intel processor, specific RAM and storage tiers, corporate image support — are still driving purchasing decisions in organizations where the actual requirements have shifted materially. The mismatch produces laptops that are enterprise-manageable but mediocre for the work employees actually do.
The PC Refresh Cycle Has Been Extended Too Far
The four-year PC refresh cycle that became standard in enterprise IT during the 2010s was a budget optimization made under specific conditions: hardware improvements were incremental, Windows 7 was stable, and the marginal productivity gain from newer hardware was not large enough to justify more frequent refresh. Those conditions no longer hold. The PC refresh cycle at many organizations has stretched to five, six, and in some cases seven years without a corresponding assessment of whether the extended cycle is actually saving money.
Tag: helpdesk
Remote Support Has Changed What Good IT Support Looks Like
The IT support model that existed before 2020 was built around physical proximity. The helpdesk sat in the office building. Employees who needed support walked to the helpdesk or the helpdesk walked to the employee. Hardware issues were resolved by hand. The model had inefficiencies — the helpdesk was idle when nobody needed support, and wait times were unpredictable — but it had a ceiling on support complexity that physical access naturally enforced.
The IT Support Ticket Backlog Is a Symptom, Not the Problem
Every IT organization with a persistent ticket backlog treats the backlog as the problem and measures progress by reducing it. This is the wrong frame. A ticket backlog is the visible manifestation of a supply-demand imbalance in IT support capacity — the result of a problem, not the problem itself. Treating the backlog as the target produces solutions that attack the symptom: hiring more helpdesk staff, implementing triage automation to move tickets faster, setting SLA targets that create pressure to close tickets quickly. None of these address why the tickets were created in the first place.
Tag: hybrid cloud
Kyndryl Named Leader in Three Mainframe Categories in 2026 ISG Provider Lens Report
Kyndryl (NYSE: KD) has been recognized as a Leader in three categories of the 2026 ISG Provider Lens™ Mainframes — Services and Solutions Report: Mainframe Technology Consulting, Mainframe as a Service (MFaaS), and Application Modernization Services. The triple recognition from ISG, an independent technology research and advisory firm, positions Kyndryl among the top-tier providers supporting enterprises running mission-critical mainframe workloads through a period of compounding modernization pressure.
In the Mainframe Technology Consulting quadrant, ISG cited Kyndryl’s strategy and assessment-led methodology, its targeted infrastructure optimization approach, and its hybrid cloud integration focus. The report highlighted the role of Kyndryl Bridge and agentic AI-enabled automated discovery in delivering operational insights across discrete engagements and multi-year transformation programs alike. For MFaaS, ISG noted Kyndryl’s large global outsourcing footprint and the breadth of its consumption models, which range from customer-owned environments to shared platforms including zCloud and C4i, alongside continued investment in AI-driven autonomy and observability. In Application Modernization Services, ISG recognized the company’s end-to-end approach spanning structured assessments, iterative implementation, and hyperscaler alliances, again underpinned by Kyndryl Bridge and its governance and agentic AI capabilities.
Tag: hybrid work
Remote Support Has Changed What Good IT Support Looks Like
The IT support model that existed before 2020 was built around physical proximity. The helpdesk sat in the office building. Employees who needed support walked to the helpdesk or the helpdesk walked to the employee. Hardware issues were resolved by hand. The model had inefficiencies — the helpdesk was idle when nobody needed support, and wait times were unpredictable — but it had a ceiling on support complexity that physical access naturally enforced.
Tag: identity
Zero Trust Architecture Is Not a Product You Buy
The security vendor community has done something impressive with the Zero Trust concept: it has taken a principled architectural framework that requires organizational discipline, policy definition, and sustained implementation effort, and repackaged it as a product category that can be purchased and deployed. The repackaging is commercially effective. It is also misleading in a way that causes organizations to believe they have implemented Zero Trust when they have purchased a tool.
Tag: incident response
Ransomware Recovery Is Where Security Programs Actually Get Tested
Ransomware preparation is the security investment that organizations discover the quality of during the worst possible moment. The backup strategy that was designed but not tested reveals its gaps when the organization needs to restore from it. The incident response plan that was written but not rehearsed reveals its gaps when the team is trying to execute it under pressure. The cyber insurance policy that was procured but not fully read reveals its requirements when the claim is filed.
Endpoint Detection and Response Has Not Solved the Endpoint Security Problem
Endpoint Detection and Response platforms replaced antivirus as the dominant endpoint security technology on the basis that signature-based detection could not keep pace with the volume and variety of modern malware. The replacement was justified. EDR’s behavioral detection, continuous telemetry, and forensic capability represent a genuine improvement over signature-based antivirus in detecting and investigating endpoint threats.
The marketing that followed — the promise of comprehensive endpoint security that would significantly reduce breach frequency and impact — overstated what the technology can deliver. EDR is better than what it replaced. It is not the endpoint security solution. Endpoints continue to be compromised at scale in organizations running mature EDR deployments because the threats that matter most have adapted to operate within the behavioral envelope that EDR considers legitimate.
Tag: infor
Infor and AWS Deploy Industry-Specific AI Agents for Manufacturing at Scale
The manufacturing sector’s AI problem has never been a shortage of tools — it has been the absence of tools that understand what manufacturing actually is. Infor and AWS are now pushing a direct answer to that gap, announcing a collaboration to deploy industry-specific AI agents built natively on AWS infrastructure, targeting discrete and process manufacturing enterprises that need to move from pilot programs to production at scale.
The core argument is that generic AI fails on the shop floor. Manufacturing workflows involve bill of materials hierarchies, vendor pricing cycles tied to annual model changes, returns processing chains, and procurement-to-payment pipelines that off-the-shelf models cannot navigate without substantial domain grounding. Infor’s position is that it supplies the industry-specific intelligence while AWS provides the enterprise infrastructure — Amazon Bedrock AgentCore, Amazon Bedrock, and Amazon SageMaker — to run it at mission-critical reliability.
Tag: infrastructure
The Network Infrastructure Debt Most Organizations Are Quietly Carrying
Network infrastructure occupies an unusual position in enterprise IT budget conversations. It is essential — nothing in the technology stack works without it — and invisible when functioning correctly. The invisibility is the problem. Network hardware that is approaching or past its end-of-support date, running firmware that has not been updated in years, and operating at utilization levels for which it was not designed accumulates risk silently. The incident that reveals the accumulation is not gradual. It is sudden.
Tag: inventory
Hardware Asset Management Is the IT Discipline Most Organizations Do Badly
Hardware asset management — knowing what physical devices the organization owns, where they are, who has them, what software is installed on them, and when they need to be refreshed or retired — is foundational to almost every other IT function. Security teams need accurate asset inventory to understand their attack surface. Support teams need device configuration data to resolve issues efficiently. Finance teams need asset records for depreciation and insurance. Procurement teams need lifecycle data to plan refresh cycles.
Tag: isg
Kyndryl Named Leader in Three Mainframe Categories in 2026 ISG Provider Lens Report
Kyndryl (NYSE: KD) has been recognized as a Leader in three categories of the 2026 ISG Provider Lens™ Mainframes — Services and Solutions Report: Mainframe Technology Consulting, Mainframe as a Service (MFaaS), and Application Modernization Services. The triple recognition from ISG, an independent technology research and advisory firm, positions Kyndryl among the top-tier providers supporting enterprises running mission-critical mainframe workloads through a period of compounding modernization pressure.
In the Mainframe Technology Consulting quadrant, ISG cited Kyndryl’s strategy and assessment-led methodology, its targeted infrastructure optimization approach, and its hybrid cloud integration focus. The report highlighted the role of Kyndryl Bridge and agentic AI-enabled automated discovery in delivering operational insights across discrete engagements and multi-year transformation programs alike. For MFaaS, ISG noted Kyndryl’s large global outsourcing footprint and the breadth of its consumption models, which range from customer-owned environments to shared platforms including zCloud and C4i, alongside continued investment in AI-driven autonomy and observability. In Application Modernization Services, ISG recognized the company’s end-to-end approach spanning structured assessments, iterative implementation, and hyperscaler alliances, again underpinned by Kyndryl Bridge and its governance and agentic AI capabilities.
Tag: it automation
AI in Enterprise IT: Where It Is Actually Saving Time
Enterprise IT has adopted AI-assisted tools at an uneven pace across the four functional areas. The adoption unevenness reflects a genuine difference in the maturity of AI applications across contexts — some IT functions have clear, measurable AI use cases with documented productivity gains, while others have AI vendor claims that have not translated to operational reality at the scale most enterprises require.
The honest assessment of where AI is saving time in enterprise IT is narrow but real: specific use cases within IT support, security operations, and software development assistance have demonstrated consistent productivity gains. The broader claims — AI transformation of IT operations across all functions — remain future-oriented rather than present-tense.
Tag: it budget
The IT Budget Allocation Problem That Keeps CIOs Up at Night
The IT budget allocation problem is structural, not mathematical. Organizations that spend the right total amount on IT frequently allocate it incorrectly across the four functional areas — run the business, grow the business, transform the business, and maintain the infrastructure that enables all three — producing technology environments that are simultaneously overspent in some areas and critically underfunded in others.
The allocation pattern that is most common and most damaging is heavy spending on new software and technology initiatives with insufficient investment in the support, security, and infrastructure maintenance that determines whether those investments function reliably. An organization that spends aggressively on digital transformation while deferring network infrastructure refresh, understaffing the helpdesk, and running security with inadequate tooling has not made a strategic trade-off. It has made an accounting error that looks like a strategic choice.
Tag: it lifecycle
The PC Refresh Cycle Has Been Extended Too Far
The four-year PC refresh cycle that became standard in enterprise IT during the 2010s was a budget optimization made under specific conditions: hardware improvements were incremental, Windows 7 was stable, and the marginal productivity gain from newer hardware was not large enough to justify more frequent refresh. Those conditions no longer hold. The PC refresh cycle at many organizations has stretched to five, six, and in some cases seven years without a corresponding assessment of whether the extended cycle is actually saving money.
Tag: it operations
The IT Support Ticket Backlog Is a Symptom, Not the Problem
Every IT organization with a persistent ticket backlog treats the backlog as the problem and measures progress by reducing it. This is the wrong frame. A ticket backlog is the visible manifestation of a supply-demand imbalance in IT support capacity — the result of a problem, not the problem itself. Treating the backlog as the target produces solutions that attack the symptom: hiring more helpdesk staff, implementing triage automation to move tickets faster, setting SLA targets that create pressure to close tickets quickly. None of these address why the tickets were created in the first place.
Tag: it support
Remote Support Has Changed What Good IT Support Looks Like
The IT support model that existed before 2020 was built around physical proximity. The helpdesk sat in the office building. Employees who needed support walked to the helpdesk or the helpdesk walked to the employee. Hardware issues were resolved by hand. The model had inefficiencies — the helpdesk was idle when nobody needed support, and wait times were unpredictable — but it had a ceiling on support complexity that physical access naturally enforced.
Tag: itam
Hardware Asset Management Is the IT Discipline Most Organizations Do Badly
Hardware asset management — knowing what physical devices the organization owns, where they are, who has them, what software is installed on them, and when they need to be refreshed or retired — is foundational to almost every other IT function. Security teams need accurate asset inventory to understand their attack surface. Support teams need device configuration data to resolve issues efficiently. Finance teams need asset records for depreciation and insurance. Procurement teams need lifecycle data to plan refresh cycles.
Tag: itsm
Self-Service IT Portals Fail When They Are Designed for the IT Team, Not the Employee
The self-service IT portal is one of enterprise IT’s most persistent good ideas with consistently poor implementation. The idea is sound: employees who can resolve their own IT issues without contacting the helpdesk reduce the support burden, resolve their issues faster, and build a level of IT self-sufficiency that benefits the organization. The implementation failure is that self-service portals are almost universally designed to make it easy for IT to publish content rather than easy for employees to find solutions to their problems.
The IT Support Ticket Backlog Is a Symptom, Not the Problem
Every IT organization with a persistent ticket backlog treats the backlog as the problem and measures progress by reducing it. This is the wrong frame. A ticket backlog is the visible manifestation of a supply-demand imbalance in IT support capacity — the result of a problem, not the problem itself. Treating the backlog as the target produces solutions that attack the symptom: hiring more helpdesk staff, implementing triage automation to move tickets faster, setting SLA targets that create pressure to close tickets quickly. None of these address why the tickets were created in the first place.
Tag: knowledge base
Self-Service IT Portals Fail When They Are Designed for the IT Team, Not the Employee
The self-service IT portal is one of enterprise IT’s most persistent good ideas with consistently poor implementation. The idea is sound: employees who can resolve their own IT issues without contacting the helpdesk reduce the support burden, resolve their issues faster, and build a level of IT self-sufficiency that benefits the organization. The implementation failure is that self-service portals are almost universally designed to make it easy for IT to publish content rather than easy for employees to find solutions to their problems.
Tag: kyndryl
Kyndryl Named Leader in Three Mainframe Categories in 2026 ISG Provider Lens Report
Kyndryl (NYSE: KD) has been recognized as a Leader in three categories of the 2026 ISG Provider Lens™ Mainframes — Services and Solutions Report: Mainframe Technology Consulting, Mainframe as a Service (MFaaS), and Application Modernization Services. The triple recognition from ISG, an independent technology research and advisory firm, positions Kyndryl among the top-tier providers supporting enterprises running mission-critical mainframe workloads through a period of compounding modernization pressure.
In the Mainframe Technology Consulting quadrant, ISG cited Kyndryl’s strategy and assessment-led methodology, its targeted infrastructure optimization approach, and its hybrid cloud integration focus. The report highlighted the role of Kyndryl Bridge and agentic AI-enabled automated discovery in delivering operational insights across discrete engagements and multi-year transformation programs alike. For MFaaS, ISG noted Kyndryl’s large global outsourcing footprint and the breadth of its consumption models, which range from customer-owned environments to shared platforms including zCloud and C4i, alongside continued investment in AI-driven autonomy and observability. In Application Modernization Services, ISG recognized the company’s end-to-end approach spanning structured assessments, iterative implementation, and hyperscaler alliances, again underpinned by Kyndryl Bridge and its governance and agentic AI capabilities.
Tag: laptop
Corporate Laptop Procurement in 2026: What Has Changed and What Still Gets It Wrong
Corporate laptop procurement has not kept pace with the changes in how knowledge workers use their devices. The procurement criteria that dominated enterprise laptop purchasing for the past fifteen years — Windows compatibility, Intel processor, specific RAM and storage tiers, corporate image support — are still driving purchasing decisions in organizations where the actual requirements have shifted materially. The mismatch produces laptops that are enterprise-manageable but mediocre for the work employees actually do.
The PC Refresh Cycle Has Been Extended Too Far
The four-year PC refresh cycle that became standard in enterprise IT during the 2010s was a budget optimization made under specific conditions: hardware improvements were incremental, Windows 7 was stable, and the marginal productivity gain from newer hardware was not large enough to justify more frequent refresh. Those conditions no longer hold. The PC refresh cycle at many organizations has stretched to five, six, and in some cases seven years without a corresponding assessment of whether the extended cycle is actually saving money.
Tag: legacy
The Legacy Software Migration Nobody Wants to Talk About
Every enterprise IT organization is running software it should have replaced years ago. The system is old enough that the vendor who originally built it may no longer exist. The employees who know how it works are approaching retirement or have already left. The documentation, if it ever existed, is incomplete or missing. The integration with everything else in the technology stack was built on assumptions that have since changed. The system runs critical business processes that the organization cannot operate without.
Tag: lenovo
Corporate Laptop Procurement in 2026: What Has Changed and What Still Gets It Wrong
Corporate laptop procurement has not kept pace with the changes in how knowledge workers use their devices. The procurement criteria that dominated enterprise laptop purchasing for the past fifteen years — Windows compatibility, Intel processor, specific RAM and storage tiers, corporate image support — are still driving purchasing decisions in organizations where the actual requirements have shifted materially. The mismatch produces laptops that are enterprise-manageable but mediocre for the work employees actually do.
Tag: lifecycle
Hardware Asset Management Is the IT Discipline Most Organizations Do Badly
Hardware asset management — knowing what physical devices the organization owns, where they are, who has them, what software is installed on them, and when they need to be refreshed or retired — is foundational to almost every other IT function. Security teams need accurate asset inventory to understand their attack surface. Support teams need device configuration data to resolve issues efficiently. Finance teams need asset records for depreciation and insurance. Procurement teams need lifecycle data to plan refresh cycles.
Tag: low-code
Low-Code Platforms Have Found Their Ceiling
Low-code and no-code platforms arrived with a promise that has been partially delivered and significantly oversold: that business users without programming backgrounds could build the software applications they needed without depending on IT development teams. The partially-delivered part is real. Workflow automation tools like Power Automate, Zapier, and Make have genuinely enabled business users to build integrations and automations that previously required developer time. The oversold part is the claim that this capability extends to applications of arbitrary complexity.
Tag: mainframe
Kyndryl Named Leader in Three Mainframe Categories in 2026 ISG Provider Lens Report
Kyndryl (NYSE: KD) has been recognized as a Leader in three categories of the 2026 ISG Provider Lens™ Mainframes — Services and Solutions Report: Mainframe Technology Consulting, Mainframe as a Service (MFaaS), and Application Modernization Services. The triple recognition from ISG, an independent technology research and advisory firm, positions Kyndryl among the top-tier providers supporting enterprises running mission-critical mainframe workloads through a period of compounding modernization pressure.
In the Mainframe Technology Consulting quadrant, ISG cited Kyndryl’s strategy and assessment-led methodology, its targeted infrastructure optimization approach, and its hybrid cloud integration focus. The report highlighted the role of Kyndryl Bridge and agentic AI-enabled automated discovery in delivering operational insights across discrete engagements and multi-year transformation programs alike. For MFaaS, ISG noted Kyndryl’s large global outsourcing footprint and the breadth of its consumption models, which range from customer-owned environments to shared platforms including zCloud and C4i, alongside continued investment in AI-driven autonomy and observability. In Application Modernization Services, ISG recognized the company’s end-to-end approach spanning structured assessments, iterative implementation, and hyperscaler alliances, again underpinned by Kyndryl Bridge and its governance and agentic AI capabilities.
Tag: malware
Endpoint Detection and Response Has Not Solved the Endpoint Security Problem
Endpoint Detection and Response platforms replaced antivirus as the dominant endpoint security technology on the basis that signature-based detection could not keep pace with the volume and variety of modern malware. The replacement was justified. EDR’s behavioral detection, continuous telemetry, and forensic capability represent a genuine improvement over signature-based antivirus in detecting and investigating endpoint threats.
The marketing that followed — the promise of comprehensive endpoint security that would significantly reduce breach frequency and impact — overstated what the technology can deliver. EDR is better than what it replaced. It is not the endpoint security solution. Endpoints continue to be compromised at scale in organizations running mature EDR deployments because the threats that matter most have adapted to operate within the behavioral envelope that EDR considers legitimate.
Tag: managed-services
Systal Named Leader in Gartner Magic Quadrant for Managed Network Services
Systal Technology Solutions has been named a Leader in the 2026 Gartner Magic Quadrant for Managed Network Services, marking its third consecutive inclusion in the report and reinforcing its position within the global managed services landscape. The recognition reflects how enterprise network environments continue to evolve toward highly complex, multi-vendor and hybrid cloud architectures where operational stability, automation, and security integration are becoming inseparable priorities. In this context, Systal has been highlighted for its approach of acting as an embedded extension of enterprise IT teams, supporting both day-to-day operations and longer-term transformation initiatives.
Tag: manufacturing
ServiceNow Brings AI-Native Platform to Manufacturing Value Chain
ServiceNow has expanded its platform into manufacturing with a suite of AI-native capabilities covering the full value chain from sales and configuration through quality, warranty, and factory-floor operations. The announcement, made alongside the unveiling of Industrial Connected Workforce and ServiceNow EmployeeWorks for manufacturers, positions the company directly against the fragmented stack that characterizes most industrial enterprises.
The core argument is structural. Manufacturing AI investments have accelerated over the past two years, but quality data, warranty claims, order workflows, and shop-floor processes typically run on separate systems with no shared governance layer. ServiceNow’s pitch is that AI cannot deliver end-to-end execution when the data it needs is distributed across siloed tools—and that a single platform with unified workflows changes that calculus.
Infor and AWS Deploy Industry-Specific AI Agents for Manufacturing at Scale
The manufacturing sector’s AI problem has never been a shortage of tools — it has been the absence of tools that understand what manufacturing actually is. Infor and AWS are now pushing a direct answer to that gap, announcing a collaboration to deploy industry-specific AI agents built natively on AWS infrastructure, targeting discrete and process manufacturing enterprises that need to move from pilot programs to production at scale.
The core argument is that generic AI fails on the shop floor. Manufacturing workflows involve bill of materials hierarchies, vendor pricing cycles tied to annual model changes, returns processing chains, and procurement-to-payment pipelines that off-the-shelf models cannot navigate without substantial domain grounding. Infor’s position is that it supplies the industry-specific intelligence while AWS provides the enterprise infrastructure — Amazon Bedrock AgentCore, Amazon Bedrock, and Amazon SageMaker — to run it at mission-critical reliability.
Tag: mfaas
Kyndryl Named Leader in Three Mainframe Categories in 2026 ISG Provider Lens Report
Kyndryl (NYSE: KD) has been recognized as a Leader in three categories of the 2026 ISG Provider Lens™ Mainframes — Services and Solutions Report: Mainframe Technology Consulting, Mainframe as a Service (MFaaS), and Application Modernization Services. The triple recognition from ISG, an independent technology research and advisory firm, positions Kyndryl among the top-tier providers supporting enterprises running mission-critical mainframe workloads through a period of compounding modernization pressure.
In the Mainframe Technology Consulting quadrant, ISG cited Kyndryl’s strategy and assessment-led methodology, its targeted infrastructure optimization approach, and its hybrid cloud integration focus. The report highlighted the role of Kyndryl Bridge and agentic AI-enabled automated discovery in delivering operational insights across discrete engagements and multi-year transformation programs alike. For MFaaS, ISG noted Kyndryl’s large global outsourcing footprint and the breadth of its consumption models, which range from customer-owned environments to shared platforms including zCloud and C4i, alongside continued investment in AI-driven autonomy and observability. In Application Modernization Services, ISG recognized the company’s end-to-end approach spanning structured assessments, iterative implementation, and hyperscaler alliances, again underpinned by Kyndryl Bridge and its governance and agentic AI capabilities.
Tag: migration
The Legacy Software Migration Nobody Wants to Talk About
Every enterprise IT organization is running software it should have replaced years ago. The system is old enough that the vendor who originally built it may no longer exist. The employees who know how it works are approaching retirement or have already left. The documentation, if it ever existed, is incomplete or missing. The integration with everything else in the technology stack was built on assumptions that have since changed. The system runs critical business processes that the organization cannot operate without.
Tag: mobile
BYOD Policy Has Produced Security Problems Nobody Wants to Own
Bring Your Own Device policies were adopted by enterprise IT organizations under pressure from employees and leadership who wanted to use their personal devices for work and did not want to carry two phones. The policies were designed hastily, implemented with tools that were not ready for the management requirements they needed to meet, and left in place with minimal review as the security landscape changed around them. The result is a policy category that most IT security professionals acknowledge as a significant exposure and most organizations decline to address because addressing it requires telling employees they cannot use their personal devices for work.
Tag: modernization
Kyndryl Named Leader in Three Mainframe Categories in 2026 ISG Provider Lens Report
Kyndryl (NYSE: KD) has been recognized as a Leader in three categories of the 2026 ISG Provider Lens™ Mainframes — Services and Solutions Report: Mainframe Technology Consulting, Mainframe as a Service (MFaaS), and Application Modernization Services. The triple recognition from ISG, an independent technology research and advisory firm, positions Kyndryl among the top-tier providers supporting enterprises running mission-critical mainframe workloads through a period of compounding modernization pressure.
In the Mainframe Technology Consulting quadrant, ISG cited Kyndryl’s strategy and assessment-led methodology, its targeted infrastructure optimization approach, and its hybrid cloud integration focus. The report highlighted the role of Kyndryl Bridge and agentic AI-enabled automated discovery in delivering operational insights across discrete engagements and multi-year transformation programs alike. For MFaaS, ISG noted Kyndryl’s large global outsourcing footprint and the breadth of its consumption models, which range from customer-owned environments to shared platforms including zCloud and C4i, alongside continued investment in AI-driven autonomy and observability. In Application Modernization Services, ISG recognized the company’s end-to-end approach spanning structured assessments, iterative implementation, and hyperscaler alliances, again underpinned by Kyndryl Bridge and its governance and agentic AI capabilities.
The Legacy Software Migration Nobody Wants to Talk About
Every enterprise IT organization is running software it should have replaced years ago. The system is old enough that the vendor who originally built it may no longer exist. The employees who know how it works are approaching retirement or have already left. The documentation, if it ever existed, is incomplete or missing. The integration with everything else in the technology stack was built on assumptions that have since changed. The system runs critical business processes that the organization cannot operate without.
Tag: multi-tenant
11% Is Not a Bug. It's the Starting Gun.
xAI is running its 550,000-GPU Colossus fleet at roughly 11% model FLOPs utilization. An internal memo from infrastructure lead Michael Nicolls confirmed the figure and set a target of 50% — a number that sits at the high end of an industry range where even the best operators, Meta and Google, are only achieving 43–46%. For a company that built the world’s largest AI supercomputer in 122 days, the software stack is still catching up to the hardware.
Tag: network
The Network Infrastructure Debt Most Organizations Are Quietly Carrying
Network infrastructure occupies an unusual position in enterprise IT budget conversations. It is essential — nothing in the technology stack works without it — and invisible when functioning correctly. The invisibility is the problem. Network hardware that is approaching or past its end-of-support date, running firmware that has not been updated in years, and operating at utilization levels for which it was not designed accumulates risk silently. The incident that reveals the accumulation is not gradual. It is sudden.
Tag: network security
Zero Trust Architecture Is Not a Product You Buy
The security vendor community has done something impressive with the Zero Trust concept: it has taken a principled architectural framework that requires organizational discipline, policy definition, and sustained implementation effort, and repackaged it as a product category that can be purchased and deployed. The repackaging is commercially effective. It is also misleading in a way that causes organizations to believe they have implemented Zero Trust when they have purchased a tool.
Tag: networking
Systal Named Leader in Gartner Magic Quadrant for Managed Network Services
Systal Technology Solutions has been named a Leader in the 2026 Gartner Magic Quadrant for Managed Network Services, marking its third consecutive inclusion in the report and reinforcing its position within the global managed services landscape. The recognition reflects how enterprise network environments continue to evolve toward highly complex, multi-vendor and hybrid cloud architectures where operational stability, automation, and security integration are becoming inseparable priorities. In this context, Systal has been highlighted for its approach of acting as an embedded extension of enterprise IT teams, supporting both day-to-day operations and longer-term transformation initiatives.
Tag: no-code
Low-Code Platforms Have Found Their Ceiling
Low-code and no-code platforms arrived with a promise that has been partially delivered and significantly oversold: that business users without programming backgrounds could build the software applications they needed without depending on IT development teams. The partially-delivered part is real. Workflow automation tools like Power Automate, Zapier, and Make have genuinely enabled business users to build integrations and automations that previously required developer time. The oversold part is the claim that this capability extends to applications of arbitrary complexity.
Tag: nvidia
11% Is Not a Bug. It's the Starting Gun.
xAI is running its 550,000-GPU Colossus fleet at roughly 11% model FLOPs utilization. An internal memo from infrastructure lead Michael Nicolls confirmed the figure and set a target of 50% — a number that sits at the high end of an industry range where even the best operators, Meta and Google, are only achieving 43–46%. For a company that built the world’s largest AI supercomputer in 122 days, the software stack is still catching up to the hardware.
Tag: on-premises
Server Hardware in the Cloud Age Has a Different ROI Calculation
The cloud versus on-premises debate has settled into a more nuanced position than its early framing suggested. The argument that all workloads should move to cloud and that on-premises infrastructure would become obsolete was oversimplified. The organizations that moved all workloads to cloud and discovered that certain workload categories are more expensive to run in cloud than on-premises have been quietly repatriating those workloads for several years.
The current reality is a hybrid infrastructure landscape where the economic decision about where to run a workload depends on its specific characteristics — compute intensity, data volume, access patterns, regulatory requirements, and predictability — rather than on a blanket preference for either delivery model. Server hardware investment in this context requires the same rigor as any capital investment: a specific business case for the specific workloads that the hardware will run.
Tag: patching
The Vulnerability Management Backlog Every Organization Has and Nobody Talks About
Vulnerability management programs have a dirty secret that annual security assessments and compliance audits politely decline to examine: the remediation backlog. Organizations that have deployed vulnerability scanners — Tenable, Qualys, Rapid7 — know their vulnerability count precisely. Most of them have more open vulnerabilities than they will remediate in the coming year. Many have more open vulnerabilities than they will remediate in the next three years at their current remediation pace.
Tag: pc refresh
The PC Refresh Cycle Has Been Extended Too Far
The four-year PC refresh cycle that became standard in enterprise IT during the 2010s was a budget optimization made under specific conditions: hardware improvements were incremental, Windows 7 was stable, and the marginal productivity gain from newer hardware was not large enough to justify more frequent refresh. Those conditions no longer hold. The PC refresh cycle at many organizations has stretched to five, six, and in some cases seven years without a corresponding assessment of whether the extended cycle is actually saving money.
Tag: phishing
Phishing Remains the Most Effective Attack Vector and Training Is Not Fixing It
Phishing has been the leading initial access vector for enterprise breaches for over a decade. Security awareness training — the annual compliance exercise that organizations deploy to satisfy auditors and reduce cyber insurance premiums — has been the dominant organizational response for the same period. The training has not significantly reduced phishing click rates in most organizations. The reasons are structural, not motivational, and the solutions require technical controls rather than behavioral ones.
Tag: platform engineering
The DevOps Job Isn't Dead. It's Being Repriced.
Every few months the same headline resurfaces: DevOps is dead. In 2026, the claim has more surface credibility than before — job boards are brutal, the title is disappearing from org charts, and AI is eating the work that once defined the role. None of that means the function is gone. It means the floor dropped out and the ceiling went up.
The mechanics are straightforward. AI systems built into cloud platforms now handle what junior and mid-level DevOps engineers spent most of their time on — infrastructure provisioning, pipeline configuration, alert triage, rollback decisions. That work isn’t being done by fewer people out of choice. It’s being done by machines out of necessity, because the scale modern systems operate at makes human-in-the-loop intervention a bottleneck. Netflix deployed 4,000 times daily last quarter. Amazon pushes a change every 11.7 seconds across global infrastructure. No headcount solves that. Automation does.
Tag: policy
BYOD Policy Has Produced Security Problems Nobody Wants to Own
Bring Your Own Device policies were adopted by enterprise IT organizations under pressure from employees and leadership who wanted to use their personal devices for work and did not want to carry two phones. The policies were designed hastily, implemented with tools that were not ready for the management requirements they needed to meet, and left in place with minimal review as the security landscape changed around them. The result is a policy category that most IT security professionals acknowledge as a significant exposure and most organizations decline to address because addressing it requires telling employees they cannot use their personal devices for work.
Tag: procurement
Corporate Laptop Procurement in 2026: What Has Changed and What Still Gets It Wrong
Corporate laptop procurement has not kept pace with the changes in how knowledge workers use their devices. The procurement criteria that dominated enterprise laptop purchasing for the past fifteen years — Windows compatibility, Intel processor, specific RAM and storage tiers, corporate image support — are still driving purchasing decisions in organizations where the actual requirements have shifted materially. The mismatch produces laptops that are enterprise-manageable but mediocre for the work employees actually do.
Enterprise Software Procurement Is Broken and Everyone Knows It
Enterprise software procurement moves at a pace that the software it is trying to purchase has long since left behind. The average procurement cycle for a mid-market enterprise software purchase — from initial vendor identification to signed contract — runs between four and nine months. The software category the procurement team is evaluating will have shipped multiple major releases during that period. The requirements documentation that anchored the evaluation will have drifted from what the business actually needs. The vendor selected may have been acquired.
Tag: productivity
We Are Likely in the Early Stages of Another Productivity Boom
We are likely in the early stages of another productivity boom.
You can feel it before you can fully measure it. Not in the official statistics yet, not neatly captured in GDP releases or quarterly productivity reports, but in the way work itself is beginning to change. Tasks that used to take hours now collapse into minutes. Layers of friction around research, drafting, analysis, coordination, and execution are starting to thin out. The shift is still uneven, still messy, but it is becoming difficult to ignore.
AI in Enterprise IT: Where It Is Actually Saving Time
Enterprise IT has adopted AI-assisted tools at an uneven pace across the four functional areas. The adoption unevenness reflects a genuine difference in the maturity of AI applications across contexts — some IT functions have clear, measurable AI use cases with documented productivity gains, while others have AI vendor claims that have not translated to operational reality at the scale most enterprises require.
The honest assessment of where AI is saving time in enterprise IT is narrow but real: specific use cases within IT support, security operations, and software development assistance have demonstrated consistent productivity gains. The broader claims — AI transformation of IT operations across all functions — remain future-oriented rather than present-tense.
Tag: ransomware
Ransomware Recovery Is Where Security Programs Actually Get Tested
Ransomware preparation is the security investment that organizations discover the quality of during the worst possible moment. The backup strategy that was designed but not tested reveals its gaps when the organization needs to restore from it. The incident response plan that was written but not rehearsed reveals its gaps when the team is trying to execute it under pressure. The cyber insurance policy that was procured but not fully read reveals its requirements when the claim is filed.
Tag: recovery
Ransomware Recovery Is Where Security Programs Actually Get Tested
Ransomware preparation is the security investment that organizations discover the quality of during the worst possible moment. The backup strategy that was designed but not tested reveals its gaps when the organization needs to restore from it. The incident response plan that was written but not rehearsed reveals its gaps when the team is trying to execute it under pressure. The cyber insurance policy that was procured but not fully read reveals its requirements when the claim is filed.
Tag: remote
Remote Support Has Changed What Good IT Support Looks Like
The IT support model that existed before 2020 was built around physical proximity. The helpdesk sat in the office building. Employees who needed support walked to the helpdesk or the helpdesk walked to the employee. Hardware issues were resolved by hand. The model had inefficiencies — the helpdesk was idle when nobody needed support, and wait times were unpredictable — but it had a ceiling on support complexity that physical access naturally enforced.
Tag: risk
The Vulnerability Management Backlog Every Organization Has and Nobody Talks About
Vulnerability management programs have a dirty secret that annual security assessments and compliance audits politely decline to examine: the remediation backlog. Organizations that have deployed vulnerability scanners — Tenable, Qualys, Rapid7 — know their vulnerability count precisely. Most of them have more open vulnerabilities than they will remediate in the coming year. Many have more open vulnerabilities than they will remediate in the next three years at their current remediation pace.
Tag: roi
Server Hardware in the Cloud Age Has a Different ROI Calculation
The cloud versus on-premises debate has settled into a more nuanced position than its early framing suggested. The argument that all workloads should move to cloud and that on-premises infrastructure would become obsolete was oversimplified. The organizations that moved all workloads to cloud and discovered that certain workload categories are more expensive to run in cloud than on-premises have been quietly repatriating those workloads for several years.
The current reality is a hybrid infrastructure landscape where the economic decision about where to run a workload depends on its specific characteristics — compute intensity, data volume, access patterns, regulatory requirements, and predictability — rather than on a blanket preference for either delivery model. Server hardware investment in this context requires the same rigor as any capital investment: a specific business case for the specific workloads that the hardware will run.
Tag: saas
SaaS Sprawl Is Costing More Than the Finance Team Knows
The average organization with 500 to 1,000 employees is running between 100 and 200 SaaS applications. A fraction of those are managed by IT. The rest were procured by individual departments, teams, and employees using corporate credit cards, expense reports, and in some cases personal cards that get reimbursed. The finance team knows about the ones with purchase orders. The IT team knows about the ones that went through the security review queue. Nobody knows about all of them.
Enterprise Software Procurement Is Broken and Everyone Knows It
Enterprise software procurement moves at a pace that the software it is trying to purchase has long since left behind. The average procurement cycle for a mid-market enterprise software purchase — from initial vendor identification to signed contract — runs between four and nine months. The software category the procurement team is evaluating will have shipped multiple major releases during that period. The requirements documentation that anchored the evaluation will have drifted from what the business actually needs. The vendor selected may have been acquired.
Tag: scrum
Is Agile Software Development Dead in the Age of AI?
Not dead — but under serious pressure, and some of its foundational assumptions are eroding fast.
Agile was designed around the scarcity of working software. Writing code is slow, human attention is finite, and iteration is expensive. Its rituals — sprints, standups, story points, velocity tracking — exist to manage that scarcity. AI coding assistants like GitHub Copilot, Cursor, and Claude Code dramatically compress the time from intent to working code. When a sprint’s worth of boilerplate takes an afternoon, the sprint cadence starts to feel like bureaucracy.
Tag: security
The Vulnerability Management Backlog Every Organization Has and Nobody Talks About
Vulnerability management programs have a dirty secret that annual security assessments and compliance audits politely decline to examine: the remediation backlog. Organizations that have deployed vulnerability scanners — Tenable, Qualys, Rapid7 — know their vulnerability count precisely. Most of them have more open vulnerabilities than they will remediate in the coming year. Many have more open vulnerabilities than they will remediate in the next three years at their current remediation pace.
AI in Enterprise IT: Where It Is Actually Saving Time
Enterprise IT has adopted AI-assisted tools at an uneven pace across the four functional areas. The adoption unevenness reflects a genuine difference in the maturity of AI applications across contexts — some IT functions have clear, measurable AI use cases with documented productivity gains, while others have AI vendor claims that have not translated to operational reality at the scale most enterprises require.
The honest assessment of where AI is saving time in enterprise IT is narrow but real: specific use cases within IT support, security operations, and software development assistance have demonstrated consistent productivity gains. The broader claims — AI transformation of IT operations across all functions — remain future-oriented rather than present-tense.
The IT Budget Allocation Problem That Keeps CIOs Up at Night
The IT budget allocation problem is structural, not mathematical. Organizations that spend the right total amount on IT frequently allocate it incorrectly across the four functional areas — run the business, grow the business, transform the business, and maintain the infrastructure that enables all three — producing technology environments that are simultaneously overspent in some areas and critically underfunded in others.
The allocation pattern that is most common and most damaging is heavy spending on new software and technology initiatives with insufficient investment in the support, security, and infrastructure maintenance that determines whether those investments function reliably. An organization that spends aggressively on digital transformation while deferring network infrastructure refresh, understaffing the helpdesk, and running security with inadequate tooling has not made a strategic trade-off. It has made an accounting error that looks like a strategic choice.
BYOD Policy Has Produced Security Problems Nobody Wants to Own
Bring Your Own Device policies were adopted by enterprise IT organizations under pressure from employees and leadership who wanted to use their personal devices for work and did not want to carry two phones. The policies were designed hastily, implemented with tools that were not ready for the management requirements they needed to meet, and left in place with minimal review as the security landscape changed around them. The result is a policy category that most IT security professionals acknowledge as a significant exposure and most organizations decline to address because addressing it requires telling employees they cannot use their personal devices for work.
Ransomware Recovery Is Where Security Programs Actually Get Tested
Ransomware preparation is the security investment that organizations discover the quality of during the worst possible moment. The backup strategy that was designed but not tested reveals its gaps when the organization needs to restore from it. The incident response plan that was written but not rehearsed reveals its gaps when the team is trying to execute it under pressure. The cyber insurance policy that was procured but not fully read reveals its requirements when the claim is filed.
Endpoint Detection and Response Has Not Solved the Endpoint Security Problem
Endpoint Detection and Response platforms replaced antivirus as the dominant endpoint security technology on the basis that signature-based detection could not keep pace with the volume and variety of modern malware. The replacement was justified. EDR’s behavioral detection, continuous telemetry, and forensic capability represent a genuine improvement over signature-based antivirus in detecting and investigating endpoint threats.
The marketing that followed — the promise of comprehensive endpoint security that would significantly reduce breach frequency and impact — overstated what the technology can deliver. EDR is better than what it replaced. It is not the endpoint security solution. Endpoints continue to be compromised at scale in organizations running mature EDR deployments because the threats that matter most have adapted to operate within the behavioral envelope that EDR considers legitimate.
Phishing Remains the Most Effective Attack Vector and Training Is Not Fixing It
Phishing has been the leading initial access vector for enterprise breaches for over a decade. Security awareness training — the annual compliance exercise that organizations deploy to satisfy auditors and reduce cyber insurance premiums — has been the dominant organizational response for the same period. The training has not significantly reduced phishing click rates in most organizations. The reasons are structural, not motivational, and the solutions require technical controls rather than behavioral ones.
Zero Trust Architecture Is Not a Product You Buy
The security vendor community has done something impressive with the Zero Trust concept: it has taken a principled architectural framework that requires organizational discipline, policy definition, and sustained implementation effort, and repackaged it as a product category that can be purchased and deployed. The repackaging is commercially effective. It is also misleading in a way that causes organizations to believe they have implemented Zero Trust when they have purchased a tool.
Tag: self-service
Self-Service IT Portals Fail When They Are Designed for the IT Team, Not the Employee
The self-service IT portal is one of enterprise IT’s most persistent good ideas with consistently poor implementation. The idea is sound: employees who can resolve their own IT issues without contacting the helpdesk reduce the support burden, resolve their issues faster, and build a level of IT self-sufficiency that benefits the organization. The implementation failure is that self-service portals are almost universally designed to make it easy for IT to publish content rather than easy for employees to find solutions to their problems.
Tag: servers
Server Hardware in the Cloud Age Has a Different ROI Calculation
The cloud versus on-premises debate has settled into a more nuanced position than its early framing suggested. The argument that all workloads should move to cloud and that on-premises infrastructure would become obsolete was oversimplified. The organizations that moved all workloads to cloud and discovered that certain workload categories are more expensive to run in cloud than on-premises have been quietly repatriating those workloads for several years.
The current reality is a hybrid infrastructure landscape where the economic decision about where to run a workload depends on its specific characteristics — compute intensity, data volume, access patterns, regulatory requirements, and predictability — rather than on a blanket preference for either delivery model. Server hardware investment in this context requires the same rigor as any capital investment: a specific business case for the specific workloads that the hardware will run.
Tag: servicenow
ServiceNow Brings AI-Native Platform to Manufacturing Value Chain
ServiceNow has expanded its platform into manufacturing with a suite of AI-native capabilities covering the full value chain from sales and configuration through quality, warranty, and factory-floor operations. The announcement, made alongside the unveiling of Industrial Connected Workforce and ServiceNow EmployeeWorks for manufacturers, positions the company directly against the fragmented stack that characterizes most industrial enterprises.
The core argument is structural. Manufacturing AI investments have accelerated over the past two years, but quality data, warranty claims, order workflows, and shop-floor processes typically run on separate systems with no shared governance layer. ServiceNow’s pitch is that AI cannot deliver end-to-end execution when the data it needs is distributed across siloed tools—and that a single platform with unified workflows changes that calculus.
Tag: shadow it
SaaS Sprawl Is Costing More Than the Finance Team Knows
The average organization with 500 to 1,000 employees is running between 100 and 200 SaaS applications. A fraction of those are managed by IT. The rest were procured by individual departments, teams, and employees using corporate credit cards, expense reports, and in some cases personal cards that get reimbursed. The finance team knows about the ones with purchase orders. The IT team knows about the ones that went through the security review queue. Nobody knows about all of them.
Tag: social engineering
Phishing Remains the Most Effective Attack Vector and Training Is Not Fixing It
Phishing has been the leading initial access vector for enterprise breaches for over a decade. Security awareness training — the annual compliance exercise that organizations deploy to satisfy auditors and reduce cyber insurance premiums — has been the dominant organizational response for the same period. The training has not significantly reduced phishing click rates in most organizations. The reasons are structural, not motivational, and the solutions require technical controls rather than behavioral ones.
Tag: software
Low-Code Platforms Have Found Their Ceiling
Low-code and no-code platforms arrived with a promise that has been partially delivered and significantly oversold: that business users without programming backgrounds could build the software applications they needed without depending on IT development teams. The partially-delivered part is real. Workflow automation tools like Power Automate, Zapier, and Make have genuinely enabled business users to build integrations and automations that previously required developer time. The oversold part is the claim that this capability extends to applications of arbitrary complexity.
AI in Enterprise IT: Where It Is Actually Saving Time
Enterprise IT has adopted AI-assisted tools at an uneven pace across the four functional areas. The adoption unevenness reflects a genuine difference in the maturity of AI applications across contexts — some IT functions have clear, measurable AI use cases with documented productivity gains, while others have AI vendor claims that have not translated to operational reality at the scale most enterprises require.
The honest assessment of where AI is saving time in enterprise IT is narrow but real: specific use cases within IT support, security operations, and software development assistance have demonstrated consistent productivity gains. The broader claims — AI transformation of IT operations across all functions — remain future-oriented rather than present-tense.
The IT Budget Allocation Problem That Keeps CIOs Up at Night
The IT budget allocation problem is structural, not mathematical. Organizations that spend the right total amount on IT frequently allocate it incorrectly across the four functional areas — run the business, grow the business, transform the business, and maintain the infrastructure that enables all three — producing technology environments that are simultaneously overspent in some areas and critically underfunded in others.
The allocation pattern that is most common and most damaging is heavy spending on new software and technology initiatives with insufficient investment in the support, security, and infrastructure maintenance that determines whether those investments function reliably. An organization that spends aggressively on digital transformation while deferring network infrastructure refresh, understaffing the helpdesk, and running security with inadequate tooling has not made a strategic trade-off. It has made an accounting error that looks like a strategic choice.
The Legacy Software Migration Nobody Wants to Talk About
Every enterprise IT organization is running software it should have replaced years ago. The system is old enough that the vendor who originally built it may no longer exist. The employees who know how it works are approaching retirement or have already left. The documentation, if it ever existed, is incomplete or missing. The integration with everything else in the technology stack was built on assumptions that have since changed. The system runs critical business processes that the organization cannot operate without.
SaaS Sprawl Is Costing More Than the Finance Team Knows
The average organization with 500 to 1,000 employees is running between 100 and 200 SaaS applications. A fraction of those are managed by IT. The rest were procured by individual departments, teams, and employees using corporate credit cards, expense reports, and in some cases personal cards that get reimbursed. The finance team knows about the ones with purchase orders. The IT team knows about the ones that went through the security review queue. Nobody knows about all of them.
Enterprise Software Procurement Is Broken and Everyone Knows It
Enterprise software procurement moves at a pace that the software it is trying to purchase has long since left behind. The average procurement cycle for a mid-market enterprise software purchase — from initial vendor identification to signed contract — runs between four and nine months. The software category the procurement team is evaluating will have shipped multiple major releases during that period. The requirements documentation that anchored the evaluation will have drifted from what the business actually needs. The vendor selected may have been acquired.
Tag: software development
Is Agile Software Development Dead in the Age of AI?
Not dead — but under serious pressure, and some of its foundational assumptions are eroding fast.
Agile was designed around the scarcity of working software. Writing code is slow, human attention is finite, and iteration is expensive. Its rituals — sprints, standups, story points, velocity tracking — exist to manage that scarcity. AI coding assistants like GitHub Copilot, Cursor, and Claude Code dramatically compress the time from intent to working code. When a sprint’s worth of boilerplate takes an afternoon, the sprint cadence starts to feel like bureaucracy.
Tag: sprawl
SaaS Sprawl Is Costing More Than the Finance Team Knows
The average organization with 500 to 1,000 employees is running between 100 and 200 SaaS applications. A fraction of those are managed by IT. The rest were procured by individual departments, teams, and employees using corporate credit cards, expense reports, and in some cases personal cards that get reimbursed. The finance team knows about the ones with purchase orders. The IT team knows about the ones that went through the security review queue. Nobody knows about all of them.
Tag: supply chain
Infor and AWS Deploy Industry-Specific AI Agents for Manufacturing at Scale
The manufacturing sector’s AI problem has never been a shortage of tools — it has been the absence of tools that understand what manufacturing actually is. Infor and AWS are now pushing a direct answer to that gap, announcing a collaboration to deploy industry-specific AI agents built natively on AWS infrastructure, targeting discrete and process manufacturing enterprises that need to move from pilot programs to production at scale.
The core argument is that generic AI fails on the shop floor. Manufacturing workflows involve bill of materials hierarchies, vendor pricing cycles tied to annual model changes, returns processing chains, and procurement-to-payment pipelines that off-the-shelf models cannot navigate without substantial domain grounding. Infor’s position is that it supplies the industry-specific intelligence while AWS provides the enterprise infrastructure — Amazon Bedrock AgentCore, Amazon Bedrock, and Amazon SageMaker — to run it at mission-critical reliability.
Tag: support
Remote Support Has Changed What Good IT Support Looks Like
The IT support model that existed before 2020 was built around physical proximity. The helpdesk sat in the office building. Employees who needed support walked to the helpdesk or the helpdesk walked to the employee. Hardware issues were resolved by hand. The model had inefficiencies — the helpdesk was idle when nobody needed support, and wait times were unpredictable — but it had a ceiling on support complexity that physical access naturally enforced.
AI in Enterprise IT: Where It Is Actually Saving Time
Enterprise IT has adopted AI-assisted tools at an uneven pace across the four functional areas. The adoption unevenness reflects a genuine difference in the maturity of AI applications across contexts — some IT functions have clear, measurable AI use cases with documented productivity gains, while others have AI vendor claims that have not translated to operational reality at the scale most enterprises require.
The honest assessment of where AI is saving time in enterprise IT is narrow but real: specific use cases within IT support, security operations, and software development assistance have demonstrated consistent productivity gains. The broader claims — AI transformation of IT operations across all functions — remain future-oriented rather than present-tense.
The IT Budget Allocation Problem That Keeps CIOs Up at Night
The IT budget allocation problem is structural, not mathematical. Organizations that spend the right total amount on IT frequently allocate it incorrectly across the four functional areas — run the business, grow the business, transform the business, and maintain the infrastructure that enables all three — producing technology environments that are simultaneously overspent in some areas and critically underfunded in others.
The allocation pattern that is most common and most damaging is heavy spending on new software and technology initiatives with insufficient investment in the support, security, and infrastructure maintenance that determines whether those investments function reliably. An organization that spends aggressively on digital transformation while deferring network infrastructure refresh, understaffing the helpdesk, and running security with inadequate tooling has not made a strategic trade-off. It has made an accounting error that looks like a strategic choice.
Self-Service IT Portals Fail When They Are Designed for the IT Team, Not the Employee
The self-service IT portal is one of enterprise IT’s most persistent good ideas with consistently poor implementation. The idea is sound: employees who can resolve their own IT issues without contacting the helpdesk reduce the support burden, resolve their issues faster, and build a level of IT self-sufficiency that benefits the organization. The implementation failure is that self-service portals are almost universally designed to make it easy for IT to publish content rather than easy for employees to find solutions to their problems.
The IT Support Ticket Backlog Is a Symptom, Not the Problem
Every IT organization with a persistent ticket backlog treats the backlog as the problem and measures progress by reducing it. This is the wrong frame. A ticket backlog is the visible manifestation of a supply-demand imbalance in IT support capacity — the result of a problem, not the problem itself. Treating the backlog as the target produces solutions that attack the symptom: hiring more helpdesk staff, implementing triage automation to move tickets faster, setting SLA targets that create pressure to close tickets quickly. None of these address why the tickets were created in the first place.
Tag: switches
The Network Infrastructure Debt Most Organizations Are Quietly Carrying
Network infrastructure occupies an unusual position in enterprise IT budget conversations. It is essential — nothing in the technology stack works without it — and invisible when functioning correctly. The invisibility is the problem. Network hardware that is approaching or past its end-of-support date, running firmware that has not been updated in years, and operating at utilization levels for which it was not designed accumulates risk silently. The incident that reveals the accumulation is not gradual. It is sudden.
Tag: tech jobs
The DevOps Job Isn't Dead. It's Being Repriced.
Every few months the same headline resurfaces: DevOps is dead. In 2026, the claim has more surface credibility than before — job boards are brutal, the title is disappearing from org charts, and AI is eating the work that once defined the role. None of that means the function is gone. It means the floor dropped out and the ceiling went up.
The mechanics are straightforward. AI systems built into cloud platforms now handle what junior and mid-level DevOps engineers spent most of their time on — infrastructure provisioning, pipeline configuration, alert triage, rollback decisions. That work isn’t being done by fewer people out of choice. It’s being done by machines out of necessity, because the scale modern systems operate at makes human-in-the-loop intervention a bottleneck. Netflix deployed 4,000 times daily last quarter. Amazon pushes a change every 11.7 seconds across global infrastructure. No headcount solves that. Automation does.
Tag: technical debt
The Legacy Software Migration Nobody Wants to Talk About
Every enterprise IT organization is running software it should have replaced years ago. The system is old enough that the vendor who originally built it may no longer exist. The employees who know how it works are approaching retirement or have already left. The documentation, if it ever existed, is incomplete or missing. The integration with everything else in the technology stack was built on assumptions that have since changed. The system runs critical business processes that the organization cannot operate without.
Tag: technology
We Are Likely in the Early Stages of Another Productivity Boom
We are likely in the early stages of another productivity boom.
You can feel it before you can fully measure it. Not in the official statistics yet, not neatly captured in GDP releases or quarterly productivity reports, but in the way work itself is beginning to change. Tasks that used to take hours now collapse into minutes. Layers of friction around research, drafting, analysis, coordination, and execution are starting to thin out. The shift is still uneven, still messy, but it is becoming difficult to ignore.
Tag: ticket backlog
The IT Support Ticket Backlog Is a Symptom, Not the Problem
Every IT organization with a persistent ticket backlog treats the backlog as the problem and measures progress by reducing it. This is the wrong frame. A ticket backlog is the visible manifestation of a supply-demand imbalance in IT support capacity — the result of a problem, not the problem itself. Treating the backlog as the target produces solutions that attack the symptom: hiring more helpdesk staff, implementing triage automation to move tickets faster, setting SLA targets that create pressure to close tickets quickly. None of these address why the tickets were created in the first place.
Tag: vendor management
Enterprise Software Procurement Is Broken and Everyone Knows It
Enterprise software procurement moves at a pace that the software it is trying to purchase has long since left behind. The average procurement cycle for a mid-market enterprise software purchase — from initial vendor identification to signed contract — runs between four and nine months. The software category the procurement team is evaluating will have shipped multiple major releases during that period. The requirements documentation that anchored the evaluation will have drifted from what the business actually needs. The vendor selected may have been acquired.
Tag: vulnerability management
The Vulnerability Management Backlog Every Organization Has and Nobody Talks About
Vulnerability management programs have a dirty secret that annual security assessments and compliance audits politely decline to examine: the remediation backlog. Organizations that have deployed vulnerability scanners — Tenable, Qualys, Rapid7 — know their vulnerability count precisely. Most of them have more open vulnerabilities than they will remediate in the coming year. Many have more open vulnerabilities than they will remediate in the next three years at their current remediation pace.
Tag: warranty
ServiceNow Brings AI-Native Platform to Manufacturing Value Chain
ServiceNow has expanded its platform into manufacturing with a suite of AI-native capabilities covering the full value chain from sales and configuration through quality, warranty, and factory-floor operations. The announcement, made alongside the unveiling of Industrial Connected Workforce and ServiceNow EmployeeWorks for manufacturers, positions the company directly against the fragmented stack that characterizes most industrial enterprises.
The core argument is structural. Manufacturing AI investments have accelerated over the past two years, but quality data, warranty claims, order workflows, and shop-floor processes typically run on separate systems with no shared governance layer. ServiceNow’s pitch is that AI cannot deliver end-to-end execution when the data it needs is distributed across siloed tools—and that a single platform with unified workflows changes that calculus.
Tag: wifi
The Network Infrastructure Debt Most Organizations Are Quietly Carrying
Network infrastructure occupies an unusual position in enterprise IT budget conversations. It is essential — nothing in the technology stack works without it — and invisible when functioning correctly. The invisibility is the problem. Network hardware that is approaching or past its end-of-support date, running firmware that has not been updated in years, and operating at utilization levels for which it was not designed accumulates risk silently. The incident that reveals the accumulation is not gradual. It is sudden.
Tag: work
We Are Likely in the Early Stages of Another Productivity Boom
We are likely in the early stages of another productivity boom.
You can feel it before you can fully measure it. Not in the official statistics yet, not neatly captured in GDP releases or quarterly productivity reports, but in the way work itself is beginning to change. Tasks that used to take hours now collapse into minutes. Layers of friction around research, drafting, analysis, coordination, and execution are starting to thin out. The shift is still uneven, still messy, but it is becoming difficult to ignore.
Tag: workforce
ServiceNow Brings AI-Native Platform to Manufacturing Value Chain
ServiceNow has expanded its platform into manufacturing with a suite of AI-native capabilities covering the full value chain from sales and configuration through quality, warranty, and factory-floor operations. The announcement, made alongside the unveiling of Industrial Connected Workforce and ServiceNow EmployeeWorks for manufacturers, positions the company directly against the fragmented stack that characterizes most industrial enterprises.
The core argument is structural. Manufacturing AI investments have accelerated over the past two years, but quality data, warranty claims, order workflows, and shop-floor processes typically run on separate systems with no shared governance layer. ServiceNow’s pitch is that AI cannot deliver end-to-end execution when the data it needs is distributed across siloed tools—and that a single platform with unified workflows changes that calculus.
Tag: xai
11% Is Not a Bug. It's the Starting Gun.
xAI is running its 550,000-GPU Colossus fleet at roughly 11% model FLOPs utilization. An internal memo from infrastructure lead Michael Nicolls confirmed the figure and set a target of 50% — a number that sits at the high end of an industry range where even the best operators, Meta and Google, are only achieving 43–46%. For a company that built the world’s largest AI supercomputer in 122 days, the software stack is still catching up to the hardware.
Tag: zero trust
Zero Trust Architecture Is Not a Product You Buy
The security vendor community has done something impressive with the Zero Trust concept: it has taken a principled architectural framework that requires organizational discipline, policy definition, and sustained implementation effort, and repackaged it as a product category that can be purchased and deployed. The repackaging is commercially effective. It is also misleading in a way that causes organizations to believe they have implemented Zero Trust when they have purchased a tool.