Welcome!


Latest Blogs from @CloudExpo
It is impossible to go outside and not notice banks offering consumers new ways to save, send, spend, and access their money at a bank. This trend-to ease access to funds – extends well beyond the retail banking sector and is equally prevalent among investment banks, private banks, hed...
An Azure platform is running on a virtualized server and hence the above container hosts may not give the same performance as an equivalent container host on a bare metal server. However, this thought process will help organizations to come up with new use cases of utilizing Windows 20...
Some mainstream IT buyers might think that most cloud infrastructure vendors and service providers are essentially alike. But there are key differences. Besides, given the body of market research to the contrary, there’s clearly no such thing as a "one-size-fits-all" cloud solution. F...
While some existing apps allow the Doctors to write using their stylus pen, what is needed is an integrated solution that includes handwriting recognition, voice , face recognition and other cognitive intelligence as part of health care applications.
Many IT organizations look to the private cloud to improve agility and simplify business operations. More and more are introducing converged and hyperconverged infrastructure solutions to support cloud initiatives and agile development practices. But there is too often a road block — l...
Adopting storage innovation protects the Nebraska Medical Center from data disruption and adds operational simplicity to complex data lifecycle management. To describe how more than 150 terabytes of data remain safe and sound, we're joined by Jeff Bergholz, Manager of Technical System...
The age of digital disruption is upon us, as the last decade alone has proven in terms of technology and disruption with the progression of organizations like Uber, Airbnb, and Netflix. We are also on the brink of new disruptions in industry, including banking or payments, insurance, h...
In a recent CloudTech article multi-cloud, or hybrid cloud, strategy was heralded as “… transformative for businesses, allowing them flexibility to scale offerings, save on hosting solutions, and ultimately offer better solutions to their customers. The article goes on to cite: A 201...
In the era of microservices and cloud-native applications, Software Development Lifecycle (SDLC) is going through a major transformation. The combination of containers and continuous integration and deployment (CI/CD) is enabling rapid deployment of software like never before. And thou...
Mike described the overlay of Cloud, Mobile, Social and Big Data across the traditional legacy of hardware, software and telco services, constituting the ‘Third Platform' and beginning around 2006. He highlighted the general explosion of the technology innovation ecosystem, everything...
The hype around data breaches in the health industry may seem commonplace and cause complacency. Last year, it was Anthem and Premera Blue Cross suffering attacks affecting nearly 90 million people combined. Among others, last month it was Banner Health – a nationwide health system bas...
It was late 2011 and Steven Donovan was comfortable working at SHI International Corporation, a growing information technology firm, as a personal computer break/fix technician. His company had been growing quickly from a $1 million "software-only" regional re-seller into eventually be...
For enterprises disrupting the marketplace, technology is the key enabler that is helping them create new business models and processes. Open source software has played an enabler role in developing these new scalable and high-performing systems. From the digital transformation perspec...
A recent CIO editorial by Bernard Golden regarding the future of private cloud spurred some interesting commentary in my network. The pushback seemed to focus around the viability of the term “private cloud”. These individuals are well-respected thought-leaders in cloud with significan...
The growing popularity of IoT has spawned the debate on privacy once again. Last year, Samsung stoked controversy by warning customers that their Smart TV Voice Recognition system was capable of “listening” to personal and sensitive information spoken by customers. Not only this, all o...
2020 seems to be an important milestone for the Internet of Things. That’s the year that Cisco says there will be 50 billion connected devices and also the year Gartner notes that over 50% of major new business processes and systems will incorporate some element of the Internet of Thin...
HudsonAlpha Institute for Biotechnology leverages modern IT infrastructure and big-data analytics to power a pioneering research project incubator and genomic medicine innovator.
StarNet Communications Corp has announced the addition of three Secure Remote Desktop modules to its flagship X-Win32 PC X server. The new modules enable X-Win32 to safely tunnel the remote desktops from Linux and Unix servers to the user’s PC over encrypted SSH. Traditionally, users ...
Pulzze Systems was happy to participate in such a premier event and thankful to be receiving the winning investment and global network support from G-Startup Worldwide. It is an exciting time for Pulzze to showcase the effectiveness of innovative technologies and enable them to make th...
A few years ago, those little iHome alarm clocks started to appear in hotel rooms. Cool gadgets that you could mount your mobile phone to battery charge or play the music on the device. We also had a few in our home. They worked perfectly for the iPhone4 since the connector was that 1 ...
Agile development is highly iterative, and relies upon the rapid development of software and early feedback. These practices are well understood and practiced in mature application development teams. The shift to an agile software development process has helped teams accelerate time t...
Enterprises have forever faced challenges surrounding the sharing of their intellectual property. Emerging cloud adoption has made it more compelling for enterprises to digitize their content, making them available over a wide variety of devices across the Internet. In his session at...
"Going mobile" seems to be the mantra of modern day enterprises, with 63 percent of them firmly believing that mobility leads to competitive advantage. Their belief is not without cause, as a recent survey by Nielson reports that 93 percent of consumers who research products via mobile...
Datos IO has announced its membership within Amazon Web Services’ (AWS) Partner Network (APN). As a new Standard Partner with AWS, Datos IO will enable enterprises to protect their next-generation SaaS applications or applications (such as Internet of Things (IoT), Analytics, eCommerce...
During the early days of my career, I used a variety of development environments, including the most popular Turbo C along with FoxPro, PowerBuilder, and Delphi before finally settling down with Microsoft Visual Studio. The first line of code that I have ever written was in QBasic run...
Breqwatr has announced the general availability of its Breqwatr Cloud Appliance 2.0. This turnkey, hyper-converged cloud appliance offers scale-out infrastructure, cloud management tools and a uniquely designed user interface that empowers its clients to deploy and consume Infrastructu...
DoubleHorn is now offering its feature-rich and cost effective Evidence Management System for Law enforcement agencies interested in developing body-worn camera programs across Texas. DoubleHorn's Evidence Management System (DEMS) is a unified system suitable for capturing any digital...
Cloud computing is now entering adolescent. With all the early adopters now swimming in the cloud pool with that “I told you so” smug, fast followers are just barely beating the early majority. The gold rush to cloud is also driving the IT herd to get cloud computing training. Traini...
Data centers have seen a lot of change in a short time. It used to be possible for organizations to run their service from a single data center and house their Domain Name Service (DNS) servers within it. It wasn’t an issue to have them in the same place, since if the data center went ...
Our new upcoming ebook is the ‘Microservices Cookbook'. This will provide a general introduction to the new software design model known as ‘Microservices,' provide a Platform design for their implementation, and describe a number of ‘recipe' scenarios for how they might be applied. A...
The First Law of Thermodynamics states, "energy can be changed from one form to another, but it cannot be created or destroyed." In a business context that can be interpreted to mean if energy is being used to resist change, then it is not available for making change. Change is diffic...
Windstream has recently completed construction of a new colocation point of presence (PoP) in Dallas, Texas, and plans to complete construction of a new colocation PoP in Columbus, Ohio, in October – both in facilities operated by Cologix, a network-neutral interconnection and data cen...
There are seven key MegaTrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for Cloud Computing, Artificial Intelligence, Mobility, Big Data, Robotics, Internet of Things, CyberSecurity. In this post we dive dee...
If you’ve been following along the DevCentral team’s journey toward F5 Certification, then you may be aware that we were in Chicago last week for F5’s Agility 2016 conference and took our 101 Application Delivery Fundamentals exam. I am happy to report that all of us, Jason, John, Chas...
Opus Interactive adopted a software-defined storage approach to better support its thousands of customers. We'll learn how scaling of customized IT infrastructure for a hosting organization in a multi-tenant environment benefits from flexibility of modern storage, unified management, ...
There is an old saying that good things come in small packages. This saying definitely applies to this book, which focuses in on a set of functions that most people are not aware of that are available in SQL Server. To start off with we need to answer the following question: What are T...
Ixia has announced that the company’s ThreatARMOR™ solution, a key component of Ixia’s Security Fabric™, adds Zero-Day Malware Immunity™ (ZDMI), which blocks mutated versions of malware that use sophisticated obfuscation techniques to evade detection by signature-based security engines...
Imagine if every PhD dissertation resulted in something that changed the world? That's what happened when Roy Fielding presented his doctoral dissertation on the "representational state transfer" at University of California-Irvine in 2000. This dissertation laid the groundwork for th...
Ugh. I see so many organizations get so close to the goal line with Big Data, and then get sidelined by something that is not nearly as important to the business. It is easy to see how these organizations get distracted as they get near the Big Data goal line, because the average CIO a...
While API virtualization is already over a decade old, many developers, testers, and decision-makers still misunderstand it. Virtual APIs create an environment that teams can use to mimic the characteristics of the production environment and create simulated responses from all APIs th...