Welcome!


From the Blogosphere

Performance is the elusive butterfly of API development. Everybody is intrigued with its beauty, yet few know how to capture it. In the old days, the approach of many shops to ensure a performant API was to create some code and then pass it over to the wall to QA to do load testing....
The goal of any tech business worth its salt is to provide the best product or service to its clients in the most efficient and cost-effective way possible. This is just as true in the development of software products as it is in other product design services. Microservices, an app ar...
BI Intelligence recently published the Top 5 Digital Trends that is worth looking at. It starts with a dramatic statement, “today, nearly 43% of the world is connected to the Internet, enabling us to talk, share photos, and conduct business halfway across the globe. As a result, we hav...
Since Gartner’s latest research around bimodal IT was published, the buzzword has been catching some serious heat. This week, the fires quell as we learn best practices to balance bimodal IT for success. Another buzzword picking up traction this week is Agile. Whether it’s in developme...
Stop me if you’ve heard this one before: there’s another side to the Internet that isn’t just about connecting people. The Internet of Things (IoT) is about connecting virtually any “thing” or machine. They could range from personal wearables to smart homes, smart cities’ infrastructur...
For those of you using Apache Kafka and Docker Cloud or considering it, we’ve got a Sematext user case study for your reading pleasure. In this use case, Ján Antala, a Software Engineer in the DevOps Team at @pygmalios, talks about the business and technical needs that drove their deci...
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his...
If we are involved in a cyber-war, where are the frontlines? What are the defenses that will work? Much of the efforts done so far in cybersecurity are nothing more than building an ineffective Maginot Line for cyber-defenses. Should we be spending more time (and money) in figuring ou...
It is a sad but very real truth that many, dare I say most, IT professionals consider alerts to be the bane of their existence. After all, they’re annoying, noisy, mostly useless and frequently false. Thus, we IT professionals who specialize in IT monitoring are likely well acquainted ...
The EMV liability shift that began in October 2015 is likely to reduce card present payment card fraud. That’s a double-edged sword for retailers with an online presence and those who accept mobile payments, as fraudsters are seeking easier routes to ill-gotten gain. Add to this the on...
Angular 2 is a complete re-write of the popular framework AngularJS. Programming in Angular 2 is greatly simplified – now it's a component-based well-performing framework. This immersive one-day workshop at 18th Cloud Expo, led by Yakov Fain, a Java Champion and a co-founder of the IT ...
We’ve all been in those sales meetings. The sales person kicks off the meeting by welcoming everyone and introducing the topic of discussion. Then the pre-sales expert drags everyone through their 100-slide PowerPoint deck with enough buzzwords and confusing phrases (at 9 point font, o...
A BriefingsDirect expert panel discussion examines the value and direction of The Open Group IT4IT initiative, a new reference architecture for managing IT as a business. IT4IT was a hot topic at The Open Group San Francisco 2016 conference in January, and the enterprise architect and...
It’s a well-known adage, ‘Don’t throw the baby out with the bath water’. These days we generally don’t toss our bathwater out the window, nor do we make a baby take the last bath – but we should probably still heed this advice. Especially when we consider adopting and transitioning to ...
Digital means customer preferences and behavior are driving enterprise technology decisions to be sure, but let’s not forget our employees. After all, when we say customer, we mean customer writ large, including partners, supply chain participants, and yes, those salaried denizens whos...
The benefits of efficiency and lower cost have been the primary drivers toward the cloud and SaaS deployments, but this is just the low-hanging fruit of a much greater body of potential. According to a Cisco-sponsored IDC report, a second wave of cloud adoption now targets a much more ...
The cloud provides two major advantages to load and performance procedures that help testing teams better model realistic behavior: instant infrastructure and geographic location. Cloud-based load testing also lowers the total cost of ownership, increases flexibility and allows testers...
Automation and ITSM-driven insights endow help desk personnel with more knowledge and provide a single point of support for end users, regardless of their needs while still catering to their preferred method of help. We'll learn how automation and ITSM-driven insights endow help desk ...
As we have seen the growth in security challenges across the organization, we have also seen the growth in security spending and number of products that an enterprise buys. But have we, as an industry, been able to show that we are better off or worse? There is no clear yardstick to me...
Incumbent storage vendors such as EMC, Netapp, and Nutanix have built their rich code base on the block layer. This means that the only viable option to use Persistent Memory as a storage tier is to wrap it up with an abstraction layer that will present it as a block device.
Developing solutions integrated with mobile applications that can anticipate your needs based upon your Code Halo data, the information that surrounds people, organizations, projects, activities and devices, and acting upon it automatically is where a large amount of productivity gains...
More is being required today of network infrastructure than ever before, due in part to the changing latency and bandwidth needs of modern applications. Wide area networks (“WANs”) are feeling the pressure, especially those that use many technologies from different services providers, ...
I had the opportunity to catch up with Chris Corriere - DevOps Engineer at AutoTrader - to talk about his experiences in the realm of Rugged DevOps. We discussed automation, culture and collaboration, and which thought leaders he is following. Chris Corriere: Hey, I'm Chris Corriere...
SAP Ariba offers new ways for small businesses to make and manage the connections that matter to them most using cloud-based networks to bring intelligent buying and digital business benefits to any type of company. The next BriefingsDirect technology innovation thought leadership dis...
Data persistence has a way of sneaking up on developers. You start out with a simple, straightforward database that can functionally hold the data you’re working with and the data you need to work with later. But as your needs change, you start to modify it here and there, until it bec...
Initially, we came across ransomware which exploited the entire system and just restricted you from interacting with your own device, later on requiring you to pay dollars if you want to go back and use your computer. And then it started becoming obsolete because an end-user. People...
Technical decisions around data persistence are hard, which is why we surveyed 583 IT Professionals on everything from current DBMS and ORM usage to modern database engines’ data structures and access patterns to storing data on a mobile device. The two most mature commercial DBMS off...
The notion of customer journeys, of course, are central to the digital marketer’s playbook. Clearly, enterprises should focus their digital efforts on such journeys, as they represent customer interactions over time. But making customer journeys the centerpiece of the enterprise archit...
Much of the discussion around cloud DevOps focuses on the speed with which companies need to get new code into production. This focus is important – because in an increasingly digital marketplace, new code enables new value propositions. New code is also often essential for maintaining...
In the digital arena, it’s impossible to avoid Dion Hinchcliffe. Perhaps you’ve seen one of his numerous keynotes or joined one of his workshops. Maybe you’ve read one of his books, Web 2.0 Architectures (with coauthors James Governor and Duane Nickull) or Social Business By Design (Pe...
According to a study the rising number of cloud-specific security attacks are likely to propel the demand for cloud security systems to 20 percent CAGR over the next four years. Adoption of cloud computing services has risen and so have the security risks associated with them. Accordi...
It’s safe to assume that the majority of all Internet of Things (IoT) devices operate near large populations of people. Of course, right? This is where the action happens – smart devices, smart cars, smart infrastructure, smart cities, etc. Plus, the cost of getting “internet-connected...
APIs have taken the world by storm in recent years. The use of APIs has gone beyond just traditional "software" companies, to companies and organizations across industries using APIs to share information and power their applications. For some organizations, APIs are the biggest reven...
The proper isolation of resources is essential for multi-tenant environments. The traditional approach to isolate resources is, however, rather heavyweight. In his session at 18th Cloud Expo, Igor Drobiazko, co-founder of elastic.io, will draw upon their own experience with operating...
Software as a Service (SaaS) is a model that has become a popular choice for deploying enterprise applications, delivering efficiencies and value to organizations in many ways. The benefits SaaS solutions deliver include not only avoiding the major resource drain and licensing costs as...
Imagine my surprise when reading the March 28, 2016 issue of BusinessWeek and stumbling across the article titled “Lies, Damned Lies, and More Statistics.” In the article, BusinessWeek warned readers to beware of “p-hacking” which is the statistical practice of tweaking data in ways th...
In Angular 2 a parent component can pass the data to its child via binding to the child’s input parameter marked with the annotation @Input(). I’ll blog about it later, but you can see how it can be done in my blog on implementing the Mediator design pattern. In this blog I’ll show yo...
A few weeks ago I had the pleasure of doing a Blab on advanced storage with Daniel Newman and Eric Vanderburg. We covered some pretty interesting points on enterprise storage challenges, advanced storage trends and flash. If you didn't catch it, a replay is now available.
In the rush to compete in the digital age, a successful digital transformation is essential, but many organizations are setting themselves up for failure. There’s a common misconception that the process is just about technology, but it’s not. It’s about your business. It shouldn’t be t...
Currently, the preferred method of data protection of cloud giants, such as Google, is to replicate the data across different locations (i.e., data centers), rather than performing a true back up. This is done because a true back up seems logistically too complicated given the amount o...