ADS BY GOOGLE
From the Blogosphere

When I was in Europe presenting some sessions at conferences and doing some seminars last month I meet and spoke with one of the attendees at the StorageExpo Holland event. The persons name (Han Breemer) came up to visit with me after one of my presentations that include SSD is in your...
Presenters asked, attendees responded, I compiled. Of COURSE you know I have something to say about these results, particularly with respect to the definition of "cloud bridges" comprising a variety of features that are more properly distributed across cloud brokers and cloud gateway...
BYOD was arguably the biggest buzz word of 2012 and is now an unstoppable, user-driven wave which will continue to make a major impact on the IT world in 2013 and beyond. Smartphones, tablets and laptops all come under this category, as well as desktop PCs used remotely from home. BYO...
Depending on what your business has in the cloud, the impact of a cloud outage can vary. However, whether it's your email service that's down or your entire IT infrastructure, an outage will have a negative effect on your business and could lead to a loss in revenue. Here are some tips...
In December 2006 I blogged on the topic of Explaining SOA to the Business Audience. It started out “I note resurgent interest in LegoTM blocks as a metaphor for explaining to the business audience the value of SOA. My advice is don’t treat the business audience as dummies!” The blog go...

#Cloud is great at many things. At other things, not so much. Understanding the limitations of cloud will ...

Jack Clark at ZDnet recently published a great series of articles on the current state of cloud computing, which included an article on utility computing called “Cloud computing’s utility future gets closer“. It’s one of the best reviews of where we are in the progression toward utilit...
"Selling" the discipline of Enterprise Architecture (EA) in the Federal Government (particularly in non-DoD agencies) is difficult, notwithstanding the general availability and use of the Federal Enterprise Architecture Framework (FEAF) for some time now, and the relatively mature use ...
A good Log Management solution is a solution that collects 100% of the logs 100% of the time, stores all this data and provides intuitive searching and reporting mechanisms to better understand some aspects of the changes applied to the actual data. If this solution provides for alerti...
Wikibon produced an interesting material (looks like paid by Aerospike, NoSQL database recently emerged by resurrecting failed CitrusLeaf and acquihiring AlchemyDB, which product, of course, was recommended in the end) that compares NoSQL databases based…
The demand for substantive customer feedback -- and engaging all constituents into the feedback process -- drives the need for businesses to innovate and also manage innovation in a new way. Results from a recent market study show that this inherent need is also creating the opportuni...
Too often overlooked, SIEM (security information event management) needs to be a integral part of any enterprises security best practices. It facilitates a holistic view of an IT landscape and allows a company to be more proactive with its security initiatives. First and foremost, SIE...
I have been especially excited about the recent Canada Health Infoway Cloud strategy document, because I understand their importance in the overall “supply chain” of Canadian e-Health technologies like EHR – Electronic Healthcare Records, and what large scale challenges this particular...
Seven Databases in Seven Weeks (A Guide to Modern Databases and the NoSQL Movement) is a book written Eric Redmond (@coderoshi) and Jim Wilson (@hexlib), part of The Pragmatic Programmers (@pragprog) series that takes a look at several non SQL based database systems. Coverage includes...
The U.S. Government needs a robust cyber workforce immediately and for the foreseeable future. The challenge in achieving such a large team of geeks is threefold; it must recruit skilled young individuals, it must continuously train them, and it must improve its ability to retain its w...
Recently an article came out stating that APM was going the way of the space shuttle. Too expensive, outdated, not needed and so on. There were statistics given indicating that APM products were growing out of favor as well. Balderdash! To my experience most customers don’t even us...
One of the truisms of architecting highly available systems is that you never, ever want to load balance a request to a system that is down. Therefore, some sort of health (status) monitoring is required. For applications, that means not just pinging the network interface or opening a ...
I was talking with the team working on our yard – they’re putting in new sidewalks and a patio, amongst other things – and we got on the subject of gutters. When we bought this house, it came with no gutters, and that has, over time, caused some serious damage to the base of the house....
GridGain is Java-based middleware for in-memory processing of big data in a distributed environment. It is based on high performance in-memory data platform that integrates fast In-Memory MapReduce implementation with In-Memory Data Grid technology delivering easy to use and easy to sc...
Inventory levels. Sales results. Negative comments on Facebook. Positive comments on Twitter. Shopping on Amazon. Listening to Pandora. Online search habits. No matter what you call it or what the information describes, it’s all data being collected about you. Thanks to new technologi...
The English language is well known for its subtlety. Sometimes it’s a delight, but on other occasions it can be very frustrating. If I use the term Gothic Architecture you will immediately understand I am describing a style of architecture that flourished in medieval times. And if like...
From time to time WebRenderer is deployed within an Applet. Applets provide a convenient mechanism for launching client applications within the browser. WebRenderer however requires different libraries based on the target platform (Windows, Linux, OS X, Solaris) and architecture (32/64...
Welcome to Part 4 of my series Deploying APM in the Enterprise. In the last installment we covered how you find, test, and justify purchasing an APM solution. This blog will focus on what to do after you’ve made a purchase and started down the path of deploying your coveted APM tool (a...
Could you imagine NASA sending a rocket into space without testing it first? What about a racing team putting a brand new car on the track without taking it for a few laps to test the handling and stability? It seems to me that testing is inherent in every technical field — except for ...
PCI (Payment Card Industry) enforces Data Security Standards that looks to ensure that ALL companies that process, store or transmit credit card information maintain a secure environment. This can be a burdensome task unless retailer can leverage the cloud. This article takes a look at...
Gartner has released two sets of predictions for 2013 – back to back: Top 10 Strategic Technology Trends for 2013: Technologies and trends that will be strategic for most organizations in 2013 Top Predictions for IT Organizations and Users for 2013 and Beyond: Economic risks, opportu...
On Monday, Amazon Web Services — the leading provider of cloud services — suffered an outage, and as a result, a long list of well-known and popular websites went dark. According to Amazon’s Service Health Dashboard, the outage started out as degraded performance of a...
Most folks probably remember the play on "to err is human…" proverb when computers first began to take over, well, everything. The saying was only partially tongue-in-cheek, because as we've long since learned the reality is that computers allow us to make mistakes faster and more of...
It’s interesting as a parent watching your kids grow up and learn how to do things for themselves. I have 2 boys ages 6 and 7 and they often amaze me and confound me. There are times when I think they are absolutely brilliant and other times where I think that significant amounts of re...
It's likely that IT network and security staff would agree that HTML5 WebSockets has the potential for high levels of disruptions (and arguments) across the data center. Developers want to leverage the ability to define their own protocols while reaping the benefits of the HTTP-as-appl...
Too many IT departments take the stance of "I'll worry about it when I have to worry about it." Problem with security issues is, by then it's too late. Often times maintaining the status quo is as dangerous as doing nothing at all. In my experience there are two types of enterprise IT...
Remote display and control technology is nothing new. For decades we've had the ability to remotely access and control our desktops using a variety of technologies and protocols: X11, VNC, RDP, and Terminal Services to name a few of the more well-known. Remote display and control has ...
Mouse gestures are one of those great "add-ons" that enhance browser usability. For those that are not familiar with mouse gestures, they are a browser navigational aid that works via mouse movements. Mouse gestures have been around for some time now and we thought it would be good to ...
One of the dirty little secrets about security: there is simply no way to make your company impervious to a data breach. It's almost a statistical certainty that you will, at some point or another, be hit with a security scenario that you're not prepared for. That's why security today ...
TIBCO is traditionally known for its leadership in integration and is now expanding into a number of new areas through acquisitions as well as building new capabilities. This post is to analyze their products based on attendance to their annual TUCON conference. Making decisions in a...
There is truly a difference in terms of scope, application and business need between security "in" the cloud and security "from" the cloud. No, this isn't 7th grade English...I promise. With all the important decisions IT departments make, what’s the big deal whether cloud security m...
Emergence is good, but… …it takes time, and …under some circumstances it may not happen! If you have been there … done that … then you don’t have to wait for your application architecture to emerge over several iterations. You can use your past experience to nail it down at the begi...
Recently, I’ve been working closely with a number of large enterprise clients who have already gone or will soon go live with Layer 7 solutions at the core of mission-critical infrastructure. I’ve observed that, in the API Management space, proof of concept and initial projects often f...
Is the term “Gamification” a buzzword or is it a real trend which will change the way things are sold … services are delivered? Is it a fad or is it fundamentally life altering trend? Is it something new or is it an old wine in a new bottle? If you are not familiar with the term the...
…is that they're consumer cloud services. While we're all focused heavily on the challenges of managing BYOD in the enterprise, we should not overlook or understate the impact of consumer-grade services within the enterprise. Just as employees bring their own devices to the table, s...


ADS BY GOOGLE