The Platform and Operations Monster Survey
Step up, brave souls, and win Reg goodies
Reg Tech Panel It's possibly the biggest, beastliest survey we've ever put together - now we just need you to get stuck into it, and give us the full platforms and operations lowdown. By way of a shameless bribe, we've got some splendid Reg goodie bags to give away to the dauntless filler-inners.
What do we want to know? Well, we know sometimes it feels like the death of thousand cuts as IT vendors torture us with a relentless flow of new ideas and technologies. There comes a time, though, when you need to stand back and take stock of how it all hangs together and whether any of it is actually working.
An area in which this seems to be necessary at the moment is, for want of a better phrase, software infrastructure – all of that stuff running on our servers that underpins business applications and end-user computing. This includes everything from operating systems and web servers, through BI and analytics systems, to transaction engines, workflow engines and other forms of middleware – not to mention the development environments and management systems needed to make it all work.
The big question is whether we should carry on thinking of all this stuff separately, or, as some vendors are encouraging, put more emphasis on ‘standard’ or ‘integrated’ stacks and platforms. It’s a simple question to ask, but a complex one to answer given that there is so much to consider. When we started to put together a survey to tackle the topic, we therefore ended up with bit of a monster.
Rather than dilute it down and potentially miss an important angle, we thought we offer it up as it is for those of you who think you are man or woman enough to have a crack at it. If you reckon you are, we suggest you grab yourself a fresh brew before starting then settle down and pace yourself. And as a reward for your efforts, we’ll enter those gallant individuals who make it to the end into a prize draw for one of our sought after Reg goodie bags.
Sponsored: Network DDoS protection