Welcome!

@CloudExpo Authors: Pat Romanski, William Schmarzo, Elizabeth White, Liz McMillan, Roger Strukhoff

Related Topics: Containers Expo Blog, Java IoT, Microservices Expo, API Journal, Release Management , @CloudExpo

Containers Expo Blog: Blog Feed Post

2013: The Year of Application Optimization for the Device-Driven Internet

2013 will bring even more complexity to high-performance cloud applications

For the past few years, our friends at VMblog.com have run an annual prediction series forecasting the trends most likely to drive adoption of cloud and virtualization technologies in the upcoming year. This is the second year in a row that they’ve invited me to contribute, and I thought long and hard about the assignment. After a deep gaze into my crystal ball, a deliberate shuffle of the tarot cards, and much careful contemplation, I settled on six major predictions, six changes to how solution providers and organizations will approach performance management in 2013.

Some of these predictions I’ve already alluded to here on the Apica blog, but I also included a few we haven’t yet discussed. VMblog.com published my post a few weeks ago, and they were kind enough to let me share it with you here as well. So read on for my post, “2013: The year of application optimization for the device-driven Internet.” When you’re done, be sure to head over to VMblog.com to check out the rest of the 2013 Virtualization and Cloud Prediction Series.

2013: The year of application optimization for the device-driven Internet, originally published on VMblog.com

The lightning-speed pace at which web application delivery and consumption is changing requires deeper and more accurate performance insight and monitoring capabilities than ever before. In 2012, we saw our fair share of high-profile cloud and web outages expose the unpredictability of today’s infrastructure and highlight the importance of a failover plan. Traditional thinking no longer holds up to today’s performance optimization challenges.

2013 will bring even more complexity to high-performance cloud applications and this will require developers and IT teams to have constant visibility into application performance in order to diagnose specific problems. Here’s what I predict will be the major changes to how solution providers and organizations approach performance management in the coming year:

  1. A shift to a device-driven and faster Internet. By 2014, mobile Internet usage is expected to exceed desktop Internet usage. That means that in 2013 developers and marketers will be hard at work fine-tuning their mobile apps and websites to capitalize on this audience. Performance testing will become more complex as mobile features will need to be considered in all test case scenarios. As a result, application testing tools will evolve to support any type of device with dynamic HTML versus device-specific code. Special protocols like WebSocket and SPDY will also become mainstream.
  2. Internet backup. Companies utilizing hybrid cloud solutions will realize that they need to have a reliable and redundant network connection to the Internet not only from their main headquarters but from every local branch of the office.
  3. Performance Service Level Agreements (SLAs). Service providers with niche applications, like CMS hosting companies, will start to offer SLAs based on uptime and page performance to differentiate from classic server hosting with no SLA for performance. I wish the big mega-hosting companies like AWS, RackSpace, Azure, Google, IBM, and HP would offer real performance SLA. And if I say that they won’t, I’d be more than happy to be proven wrong.
  4. Optimizing Internet SaaS. Recognizing that users have high expectations for how quickly a website, application, or program should respond, global SaaS providers will begin to offer acceleration specifically for their services used by enterprises. This will help overcome latency between the SaaS service location and the local enterprise.
  5. The ‘social’ DDoS attack. Social media has brought a new level of risk to IT departments as a new type of DDoS attack emerges. Now, in addition to traditional hacking, websites need to be aware of social media driven “attacks” that can change traffic levels to 10 Gb/s, 100 Gb/s, or more from real users. Regardless of whether the attack is a malicious hack or a Facebook post or organized tweet, very few enterprise infrastructures can handle this load. Normal DDoS protection will not work. Organizations will safeguard themselves by ensuring their sites can absorb the load in a true cloud fashion (scaling to 10 or 100 times the load) and by having a well-organized and tested plan of action.
  6. Agile performance monitoring. As applications become more complex and the aforementioned predictions come to fruition, application monitoring and, more specifically, the ability to detect and locate the origin of performance problems will be a challenge for IT organizations. 2013 will be the year when performance monitoring will shift focus from just “Is it up or is it down?” to provide agile support for performance status and optimization of applications both in the cloud and on local enterprise networks.

Traffic, infrastructure, networks, and security will continue to threaten application performance in 2013. There is no crystal ball to predict if and when an application will fail, but never assume that your application is immune to any of these issues. Take the necessary measures to test performance, scalability, and reliability often so that you are well-prepared to overcome any situation that may arise.

Read the original blog entry...

More Stories By Sven Hammar

Sven Hammar is Co-Founder and CEO of Apica. In 2005, he had the vision of starting a new SaaS company focused on application testing and performance. Today, that concept is Apica, the third IT company I’ve helped found in my career.

Before Apica, he co-founded and launched Celo Commuication, a security company built around PKI (e-ID) solutions. He served as CEO for three years and helped grow the company from five people to 85 people in two years. Right before co-founding Apica, he served as the Vice President of Marketing Bank and Finance at the security company Gemplus (GEMP).

Sven received his masters of science in industrial economics from the Institute of Technology (LitH) at Linköping University. When not working, you can find Sven golfing, working out, or with family and friends.

@CloudExpo Stories
SYS-CON Events announced today that Niagara Networks will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
SYS-CON Events announced today that eCube Systems, a leading provider of middleware modernization, integration, and management solutions, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. eCube Systems offers a family of middleware evolution products and services that maximize return on technology investment by leveraging existing technical equity to meet evolving business needs. ...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
We’ve been doing it for years, decades for some. How many websites have you created accounts on? Your bank, your credit card companies, social media sites, hotels and travel sites, online shopping sites, and that’s just the start. We do it often without even thinking about it, quickly entering our personal information, our data, in a plethora of systems. Sometimes we’re not even aware of the information we are providing. It could be very personal information (think of the security questions you ...
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr...
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of So...
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...
SYS-CON Events announced today that Tintri Inc., a leading producer of VM-aware storage (VAS) for virtualization and cloud environments, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Tintri VM-aware storage is the simplest for virtualized applications and cloud. Organizations including GE, Toyota, United Healthcare, NASA and 6 of the Fortune 15 have said “No to LUNs.” With Tintri they mana...