Welcome!


Latest Blogs from CloudEXPO Journal
Robotic process automation (RPA), a concept that has emerged over recent years, is still in a state of rapid evolution, existing without a clearly defined end-state or direction. As such, vendors are experimenting and pushing their products into uncharted waters - successfully or other...
While walking around the office I happened upon a relatively new employee dragging emails from his inbox into folders. I asked why and was told, “I’m just answering emails and getting stuff off my desk.” An empty inbox may be emotionally satisfying to look at, but in practice, you shou...
SAP HANA was released as a work in progress. Tenants could leverage the increased speed of the HANA database immediately, but had to wait for the updated SAP S/4HANA applications to be released. Each release has allowed applications to more fully harness HANA, creating new, compelling ...
Accessing files using traditional VPN software comes at a great cost. In this article we quantify true costs of supporting VPN's for remote access. Businesses of all types utilize VPN software solutions to provide remote access to their employees. How do we quantify the true Total Co...
Following a tradition dating back to 2002 at ZapThink and continuing at Intellyx since 2014, it’s time for Intellyx’s annual predictions for the coming year. If you’re a long-time fan, you know we have a twist to the typical annual prediction post: we actually critique our predictions...
For better or worse, big data has irrevocably altered the digital landscape. The explosion in variety, velocity, volume and value of information presents an abundance of previously unimaginable opportunity. But it also creates a number of challenges that need to be successfully navigat...
We seem to run this cycle with every new technology that comes along. A good idea with practical applications is born, then both marketers and over-excited users start to declare it is the solution for all or our problems. Compliments of Gartner, we know it generally as “The Hype Cycle...
Net Neutrality rules were originally enacted to ensure that all Americans would have equal access to a free and open Internet. We can argue about what Net Neutrality rules did and did not accomplish in a moment, but now I want to explore the most sensational of all the post–Net Neutral...
The impact of emerging technologies has taken the business by storm. Everyone is familiar with Virtual Reality and 360-degree virtual reality. The immersive experience offered by these emerging technologies have replaced the way people shopped, interact and have fun. Though, the virtu...
Troubleshooting a problem on a remote server, especially in production, is not an easy task. Sometimes it involves debugging the application code directly on the server. But the production servers are usually run in a strict environment, where not all convenient developer tools are av...
The end of the year is a time for reflection. It’s when most of us are looking back at the choices, accomplishments, and mistakes of the year prior and setting goals to improve the following year. It’s also when businesses analyze the year’s trends and behaviors to determine necessary ...
Data Monetization! Data Monetization! Data Monetization! It’s the new mantra of many organizations. But what does “data monetization” really mean, how do you do it, and more importantly, who in the organization owns the job of “data monetization”? The role of Chief Data Officer (CDO)...
An update to the Web Content Accessibility Guidelines (WCAG) is coming. Did I lose you already? If you're not familiar with WCAG, it's a collection of guidelines that developers, designers and accessibility experts use to help ensure the apps and websites they create are accessible to ...
We just came off of a review of a product that handles both containers and virtual machines in the same interface. Under the covers, implementation of containers defaults to LXC, though recently Docker support was added. When reading online, or searching for information, increasingly ...
I recently had another client conversation about optimizing their data warehouse and Business Intelligence (BI) environment. The client had lots of pride in their existing data warehouse and business intelligence accomplishments, and rightfully so. The heart of the conversation was abo...
The rule of thumb for network security today is that there is no perimeter anymore. An outsider can easily become an insider once perimeter security is breached. Every day, attackers find new ways to breach enterprise perimeter security through ransomware, malware or phishing through s...
identify the sources of event storms and performance anomalies will require automated, real-time root-cause analysis. I think Enterprise Management Associates said it well: “The data and metrics collected at instrumentation points across the application ecosystem are essential to per...
The benefits of automation are well documented; it increases productivity, cuts cost and minimizes errors. It eliminates repetitive manual tasks, freeing us up to be more innovative. By that logic, surely, we should automate everything possible, right? So, is attempting to automate eve...
Digital experience monitoring plays a vital role in the ecommerce economy. The industry is booming with millions of websites selling everything imaginable. Online stores are expected to be super fast and easy to navigate; users are quick to assess website performance and if said percei...
Java 9 ships with some minor—yet awesome—new language features that make developing easier and cleaner. In this post, we’ll take a look at three of these new features. You probably remember interface methods, which were introduced in Java 8. These are required so that Java itself, as ...
One problem that all developers and companies struggle with is trying to decide if they should "build it" or "buy it". Software developers love to build things. That is what we do! Their natural reaction tends to lean towards building things. We are also always up for a new challenge. ...
These days, no matter what task you’re trying to accomplish within your online properties, chances are there’s at least one cloud solution that provides it. However, with so much of our personal and business data living now online, there’s perhaps no functionality more important than c...
MongoDB, an open-source document store and most popular NoSQL database on the market today, offers a variety of advanced features to administer security over your MongoDB deployments. In this tutorial post, we’re going to show you how to set up role-based access control (RBAC) to manag...
Organizations around the world are struggling to cope with the current data explosion. A vital characteristic of this data is that it is unstructured and represents things like email, images, and videos. Storage of this form of data is typically in an object format which differs signi...
While having a reliable monitoring solution for your application is important, being able to parametrize and configure thresholds and alerting is even more critical. No matter what kind of market your business is in, your web applications have seasonal patterns. For example, the loa...
Digital transformation has changed the way users interact with the world, and the traditional healthcare experience no longer meets rising consumer expectations. Enterprise Health Clouds (EHCs) are designed to easily and securely deliver the smart and engaging digital health experience...
Artificial intelligence, virtual reality, software-defined networking, Hyperconverged Infrastructure, the cloud. These are all technological advancements intended to improve how IT systems and operations work, to give the business better agility and reduced costs, and ultimately to giv...
Today’s hyper-connectivity of both people and things has led to an enormous jump in network traffic. Global IP traffic will increase nearly threefold over the next five years. It’s not going to lessen, nor is it going to get slower. These factors create a need for high-speed networks t...
SYS-CON Events announced today that Evatronix will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Evatronix SA offers comprehensive solutions in the design and implementation ...
From our perspective as consumers, perhaps the best thing about digital transformation is how consumerization is making technology so much easier to use. Sure, our television remote controls still have too many buttons, and I have yet to figure out the digital display in my Honda, but ...
Long-term partners Fujitsu Limited and Citrix Systems Japan have announced a new virtual desktop service based in the cloud. Designed to take some of the pain out of digital transformation, the new offering makes it easier to create digital workspaces in a secure manner that’s scalable...
The Federal Communications Commission announced that it will vote on December 14 to enact the exceptionally misleadingly titled “Restoring Internet Freedom” order. If passed, it will do the opposite of restoring anything resembling freedom — it will repeal the current net neutrality ru...
Digital technologies have altered how people and businesses interact. The potential for dislocation from ongoing digital transformation has created unprecedented levels of C-suite discussion. The decisive market leaders have heeded the warnings and taken bold actions. That said, if yo...
Targeted attacks on the network of a business can be big trouble. A business should know where to look and what to look for to stop the attacks. Businesses are aware of the dangers of hackers. They know that a hacker can steal private information that hey store on their computer netwo...
Cloud computing innovation will power enterprise transformation in 2018. Cloud growth is also driving a rapid rise in the storage market, exacerbating the enterprise challenge around storage cost and complexity. The business reason behind this marketplace reality is the proliferation o...
Over the last few years, the Internet of things (IoT) has become a trending phrase for consumers and a top priority for businesses embarking on their digital transformation. Even with the growth and interest in IoT however, the meaning can still confuse people. So, what is IoT? IoT ...
The human work of solving problems, facing challenges and overcoming obstacles tends to share a common goal: creating stable, secure and predictable environments. The tendency for most humans is that once we solve a challenge, we want to be done with it. That propensity, however, does...
SYS-CON Events announced today that Google Cloud has been named “Keynote Sponsor” of SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Companies come to Google Cloud to transform their busin...
In today’s digitized world, a software glitch can create chaos, and software releases can be the greatest cause of downtime (and glitches) across all industries. At the same time, organizations are being forced to choose between agility and risk, causing many of the quality checks put ...
Keeping your enterprise data safe and secure is more important now than it ever has been. IT has always been an ever-changing industry, but in recent years, it has been changing more and more quickly. Now, thanks to the cloud, big data, and mobile devices all expanding at once, it may ...