Category Archives: Cloud Computing

You are “free”: the threat of business commoditization and the role of customer lock-in

Thanks to radical changes happened in 08/09 many vendors are threatened of getting their offering assets commoditized in a day. How to react? is customer lock in an answer? What should be based on?

You are “free”: the threat of business commoditization and the role of customer lock-in

Thanks to radical changes happened in 08/09 many vendors are threatened of getting their offering assets commoditized in a day. How to react? is customer lock in an answer? What should be based on?

Chrome OS: from Personal Computer to Personal Computing. A matter of trust.

Google is gradually shifting the user ownership from hardware computers to computing sessions hosted on it’s infrastructure. Are you ready for the shift?

Chrome OS: from Personal Computer to Personal Computing. A matter of trust.

Google is gradually shifting the user ownership from hardware computers to computing sessions hosted on it’s infrastructure. Are you ready for the shift?

Cloudy day at the White House

The Thing known as Cloud computing is getting seriously inside the US administration. Any concern?

Cloudy day at the White House

The Thing known as Cloud computing is getting seriously inside the US administration. Any concern?

Why Google Chrome OS will succeed AKA The war is over

Is Microsoft OS dominance era at it’s end? Is Big G dominating the ideas landscape? Starting from the announcement of Google Chrome OS let’s try to recap the Microsoft vs Google challenge and to figure out what future we should expect.

Why Google Chrome OS will succeed AKA The war is over

Is Microsoft OS dominance era at it’s end? Is Big G dominating the ideas landscape? Starting from the announcement of Google Chrome OS let’s try to recap the Microsoft vs Google challenge and to figure out what future we should expect.

Monoliths and bit pipes

After going in deep on the “bit pipe” topic for a couple of weeks I eventually came to notice that the most important telco operators are now embracing the model called,  in brief, “telco 2.0″. The “walled garden” approach worked for

Monoliths and bit pipes

After going in deep on the “bit pipe” topic for a couple of weeks I eventually came to notice that the most important telco operators are now embracing the model called,  in brief, “telco 2.0″. The “walled garden” approach worked for