Welcome!


From the Blogosphere

I love receiving gifts in the form of new insights! It doesn't matter if others received the same gift years ago and I am just getting it now. If it is new to me, I get excited. It is like waking up in the morning and discovering a new room in your house. I read an article by Thoma...
Do you avoid stores that have had a credit card breach? You are not alone. About 52% of people avoid merchants who have had a data breach according to a recent Lowcards survey. They surveyed over 400 random consumers to better understand the impact of identity theft on consumer behavi...
I like this word re-imagination from Mary Meeker’s Internet Trends presentation. We are seeing so many aspects of our life being transformed by the internet. Take for example, ordering a cab to go somewhere. Either we phone for a yellow cab here in California or if you are in New York...
If you've had to test one of today's composite applications, you know that "access" has become one of the most daunting barriers to SDLC acceleration. Whether we're talking about access to dev/test environments or access to dependent applications, the ability to pull all the required p...
Much has been published about the Open Compute Project. Initiated by Facebook, it has become an industry effort focused on standardization of many parts and components in the datacenter. Initially focused on racks, power and server design, it has also added storage and now networking t...
In a post Snowden world it is clear that for cloud data security, we need strong encryption. When properly implemented, encryption in the cloud reduces risk to levels acceptable for sensitive data. There is no doubt data protection in the cloud computing era is never going to be a ‘...
Some people are never satisfied. These fearless agents of change are everywhere. They're informed, confident and willing to experiment. They seek out the best business technology solution for the job at hand. They act on instinct. Yes, you could say that they're driven. However, they'...
The GovCloud Media Network features agency specific video playlist for registered members. Please enjoy this feature on the Army IT. Please visit the new GovCloud Network Media Library for more video content. For membership information please send request to [email protected]
One of the primary principles of object-oriented programming (OOP) is encapsulation. Encapsulation is the way in which the state of an object is protected from manipulation in a way that is not consistent with the way the variable is intended to be manipulated. The variable (state) is ...
Cloud computing has finally come into its own. While we’ve been hearing for 8 years or more that cloud computing would one day take over the enterprise, the fact of the matter is that it’s been slow going. While the spread of cloud computing solutions hasn’t been as rapid as many earl...
It's an application world; a world that is rapidly expanding. With new opportunities and markets arising driven by mobility and the Internet of Things, it is only going to keep expanding as applications are deployed to provision, license, and manage the growing sensors and devices in t...
We're launching the "Tap In Open Forum": a new series of blog posts where we detail a current topic being discussed in the software development and testing community and invite you to participate in an open discussion with our best and brightest here at Skytap. Feel free to share your ...
Since the birth of Hadoop in 2005-06, the way we think about storing and processing information has evolved considerably. The term “Big Data” has become synonymous with this evolution. But still, many of our customers continue to ask, “What is Big Data?”, “What are its use cases?”, and...
Public cloud service adoption is already a mainstream phenomenon in most organizations. Meanwhile, many large enterprises see a private cloud in their future. But choosing whether to invest in building an internal cloud infrastructure or buy from a cloud service provider will become mo...
Read more about how AppDynamics helps foster DevOps and take five minutes to get complete visibility into the performance of your production applications with AppDynamics Pro today!
Good morning! Or evening, if you happen to be reading this on the other side of the world. Our topic for today is the internet. What? You already know about the internet? No, no, I don’t mean that internet, the boring old one you use to access YouTube and send Facebook updates, e...
Accomplish much more, very rapidly, while spending less -- this is the business technology trend that savvy executives everywhere have embraced. Worldwide IT spending will reach a total $3.7 trillion in 2014, that's a 2.1 percent increase from last year, according to the latest global ...
This week in the States, the Nation celebrates it’s Independence and many people will be attending or setting off their own fireworks show. In Hawaii, fireworks are shot off more during New Year’s Eve than on July 4th and there is even Daytime Fireworks now. Cloud computing is explo...
Software-defined architectures are critical for achieving the right mix of efficiency and scale needed to meet the challenges that will come with the Internet of Things If you've been living under a rock (or rack in the data center) you might not have noticed the explosive growth of...
On the one hand, the BYOX trends that drive cloud service adoption and worker self-enablement are transforming traditional IT into a User-Centric IT model that focuses on empowering and enabling workers. On the other hand, the free-wheeling nature of the cloud and the regular news of ...
Inarguably one of the drivers of software-defined architectures (cloud, SDDC, and SDN) as well as movements like DevOps is the complexity inherent in today's data center networks. For years now we've added applications and services, and responded to new threats and requirements from th...
Security and Defense People offers a tremendous opportunity for experts and consultants, whether you are focused on building your brand or seeking work. You can target your messages and interactions to the right targeted audience, publish your content that connects with that audience, ...
Welcome to the fourth era of digital. The first three periods or ages or phases — call them what you like — were each defined clearly by transformative events. First, the dawn of the personal computer age in April 1977 with the debut of the Apple II (and validated in August 1981 with...
By now we’ve seen plenty of cost justification on the efficiency of using cloud infrastructure. You can easily Google “Cloud Computing Value” and get a stack of analyst and vendor reports. Or just pop open Amazon’s AWS value calculator and plug in some numbers. There are huge one-time ...
North Bridge in partnership with GigaOm Research released their 2014 Future of Cloud Computing – 4th Annual Survey Results. As you examine the 124 slides, one thing is obvious that the greatest growth in cloud computing is coming from Software-as-a-Service (SaaS). Market research like ...
Anyone who has been involved with security knows there is a balance to providing both security and privacy and performance at the same time. Security is often blamed for performance woes, particularly when cryptography is involved. SSL and TLS have long addressed this balance by lev...
72%. That's an estimate of how much of the IT budget is allocated to simply keeping the lights on (a euphemism for everything from actually keeping the lights on to cooling, heating, power, maintenance, upgrades, and day to day operations) in the data center. In a recent Forrester Res...
Addressing the global cloud skills gap is the number one priority to help accelerate the successful adoption of Cloud, according to the Cloud Credential Council. To address the skills gap specifically related to FedRAMP, the Cloud Credential Council has released an online course and ex...
Ask two politically opposed people in any given country about the causes of the country’s problems, and guess what? Each will give you an answer filtered through their world-view. Through what they know, and what they believe. That is not to say one is right and one is wrong, both simp...
The global village, mobile devices, online marketplaces, social networks, and on-demand entertainment all have a part to play. People all over the world are increasing the time they spend in the virtual world. They’re buying, selling, sharing, studying, developing apps, hanging out in ...
When Instagram was sold to Facebook in 2012, it employed only 13 people and maintained over 4 billion photos shared by its 80 million registered users. Internally, Instagram was a small business. Externally, it was a web monster. Filling the gap between those two contradictory perspec...
About 8 years ago at my previous employer we started a project related to Autonomic Networking. Autonomic Networking is modeled after Autonomic Computing, an IBM initiative from the early 2000s, targeted at creating self managing computing elements. The network version intends to creat...
Experts say that cloud computing is disruptive and then continue on to discuss how the cloud quickly enables innovation while competition between cloud service providers drive costs down. Both of these scenarios are accurate, but the disruption from cloud has additional shockwaves that...
Go ahead. Name a cloud environment that doesn't include load balancing as the key enabler of elastic scalability. I've got coffee... so it's good, take your time... Exactly. Load balancing - whether implemented as traditional high availability pairs or clustering - provides the mean...
Some of you will remember Caddyshack - that campy '80s movie in which Chevy Chase often offered crazy advice, like "be the ball." For those of you who don't (because you're too young or were living under a rock), the premise of this particular piece of advice was along the lines of Obi...
Internet usage is evolving, and so are the application scenarios for business technology. In the foreseeable future, desktop personal computers will produce a much smaller share of commercial internet protocol (IP) traffic. Mobile and portable devices -- other than PCs -- will drive th...
It was a long and full day for me at Devops Summit. I could fill a week or more with blogs on ideas I both agreed - and of course, disagreed - with from sessions and panels. But for now, here's a digestible selection. Ephemeral Infrastructure From John Willis (@botchagalupe) sessi...

Thanks for attending one of my recent DevOps talks over the past few weeks in our community!

In this...

It’s no secret that doing nothing is often considered a safe bet. The psychology behind inaction is well understood, particularly in the case of IT — the path of least disruption is usually maintaining the status quo rather than trying something new, But once in a while, a decision ...
Kevin L. Jackson, CEO and Founder of GovCloud Network, LLC, was showcased in US Veteran's Magazine for his work with Veteran's 360, a San Diego, California non-profit. With more than 30,000 troops return to civilian life after serving the country, Vets360 helps them through this som...