Roger.Kay

Roger L. Kay, is President of Endpoint Technologies Associates, Inc., an independent market intelligence company. In this capacity, Mr. Kay provides client product and market strategies to IT vendors and their suppliers. Services include expert advice and counsel on the full market cycle (research, analysis, go-to-market, and measurement), long-range planning and market perspective, bulletproofing (trusted sounding board), message tuning (spin management, press release support), competitive assessment, modeling and forecasting and high quality writing services.

Formerly, Mr. Kay was Vice President of Client Computing at IDC, with responsibility for covering technological, market, and competitive developments related to desktop and portable personal computers. In his capacity as leader of the PC client team, Mr. Kay authored research on competition, technology, and markets in the PC business; produced forecasts; spoke at IDC and other industry forums; contributed to consulting projects; and advised PC industry participants on desktop and notebook matters.

Before joining IDC, Mr. Kay ran his own research and analysis firm, producing articles, reports, and books on the business implications of technological developments for research houses, consulting companies, and magazines. Previously, he was the director of operations at ILA, a developer that created multilingual text processing software for the U.S. Department of Defense. Prior to that, he ran the Information Systems portfolio at Decision Resources, a technology analysis and publishing spin-off of Arthur D. Little. He has also managed international accounts at Codex, a data communications equipment subsidiary of Motorola, and done new product development for Autex, the first ecommerce network in history.

He has published in a variety of forums, including Forbes, BusinessWeek, Betanews, Computerworld, WebMaster, The Boston Globe, The Baltimore Sun, World Monitor and American Management Review. He has also appeared as a commentator a number of times on television, including the ABC Evening News and frequent contributions on CNBC. He has also participated in numerous Web-based streaming audio and video programs.

Mr. Kay received a B.F.A. from Bennington College and an M.B.A. from the University of Chicago Graduate School of Business. He is multilingual, world-traveled, and has bicycled over the Alps. He now lives in Massachusetts with his wife and two children.

The opinions expressed in this blog are those of Roger L. Kay and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Articles by Roger.Kay

Without intellectual property licensing, where would we be?
Semi Truths

Without intellectual property licensing, where would we be?

A robust intellectual property regime allows complex industries to flourish. There's just no other way to induce companies to invest in R&D that may not pay off for years. Once their rights are protected, patent holders can offer their inventions to other to build on. This is how industries like the electrical system, automotive industry, computer business, and telecommunications network were established.
June 19, 2017
IBM, Lenovo and Cisco take top marks in server reliability
Semi Truths

IBM, Lenovo and Cisco take top marks in server reliability

Information Technology Intelligence Consulting recently topped off its datacenter server hardware reliability survey, and results extend and confirm findings from prior years. Reliability requirements have increased as cloud workloads have become more important. The cost of downtime has risen. Among vendors, IBM, Lenovo, and Cisco did best, while Oracle got poor marks from IT managers. IBM's z Systems Enterprise was in a class by itself in terms of greatest reliability and uptime.
June 13, 2017
How to stop spear-phishing cold
Semi Truths

How to stop spear-phishing cold

By now, the shape of many major hacks is apparent. They start with a targeted attack on an individual email account, and, once inside, spread to the rest of the organization. Current standards vouch only for the sending email server, not the specific sending account. Adoption of a more thorough standard, S/MIME, would narrow it down to the individual sender, ending spear-phishing entirely. Inky Phish Fence implements S/MIME for this purpose.
May 30, 2017
Panasonic Toughbook CF-33: a Hummer comes to the suburbs
Semi Truths

Panasonic Toughbook CF-33: a Hummer comes to the suburbs

A review of the new convertible 2-in-1 notebook gives it high marks for durability and functionality. With hot-swappable dual batteries, this unit is ready to take on heavy-duty tasks in the field, riding with public safety, or on military sorties.
May 19, 2017
Semi Truths

Dell shifts security focus to data itself

Dell Data Guardian is a new type of security product that eschews Maginot-line-type walls and instead goes for protecting the data itself. Each file has its own encryption and security policy. This granular approach allows for a highly tuned security regime, under which some files are free to roam and others are restricted in multiple ways.
May 16, 2017
Semi Truths

Picking at the word salad of Dell EMC World

Dell EMC world was alive with buzz words this year, but there was plenty of substance if you dug around a bit. Aside from the infrastructure hardware and software that makes up much of Dell's current portfolio, executives presented views of the company's forays into augmented and virtual reality, the Internet of Things and various endpoint developments.
May 15, 2017
Bringing consumers back into the fold
Semi Truths

Bringing consumers back into the fold

IBM has mostly abandoned the consumer segment over the past decade and a half. It no longer sells endpoints to individuals. But it does provide cloud services consumed by individuals. The Weather Company, which IBM bought in early 2016, is one example. More recently, it has mounted an effort to provide cognitive computing, via services like Watson, to consumers in smart homes. It hopes to do so not directly, but through channels like communications providers, which already have strong relationships with consumers.
April 10, 2017
Swearing Trojan malware in China heralds things to come in the U.S.
Semi Truths

Swearing Trojan malware in China heralds things to come in the U.S.

A new piece of malware is running rampant in China, even though its crafters have already been arrested. It exploits new methods of distribution, but still relies on human weakness, which seems to be abundant. Phishing (general) and spear-phishing (targeted) techniques fool at least some of the people some of the time. Such techniques brought down the Democrats in the recent election. And yet, there are simple tools that that can all but eliminate these spoofing attack. The best tools use cryptographic identity verification.
March 29, 2017
Semi Truths

Duel of the rugged notebooks

The North American rugged market is a specialty area with tough requirements and rich margins. Panasonic is the traditional leader, but Dell's rugged division is keeping Panasonic on its toes. This article assesses their relative positions, focusing on two areas: the full-rugged workhorse notebook and the semi-rugged class of less-expensive, but still robust notebooks.
March 6, 2017
Semi Truths

Yahoo has become a junk account

The latest revelation of hacking and incompetence at the Yahoo only underscores how low this platform has fallen. Really, there's hardly anything left for Verizon to pick over. My own history of email at Yahoo is instructive, illustrating the swamp that is now Yahoo.
February 21, 2017