ADS BY GOOGLE
From the Blogosphere

Assume that you are trying agile for the first time. If the project succeeds then everybody is happy. But… What happens if the project fails? Did the project fail because your agile implementation was wrong? …or… Did it fail it because agile was not the right methodology for your p...
One of the phrases you hear associated with cloud computing is "architecting for failure." Rather than build in a lot of hardware-level redundancy – power, disk, network, etc… – the idea is that you expect it to fail and can simply replace the application (which is what you care about ...
The ability to conduct effective performance testing has become a highly desired skillset within the IT industry. Unfortunately, these highly sought-after skills are consistently in short supply. "Front-end testers" can work with a tool to create a realistic load and although this is a...
Have you ever encountered a situation where 2 of the 5 members of an agile team decides to move on within a short span of time. What about 3 out of 5? What did you do when that happened? Yes, I know you are saying that the situation should either have been anticipated or prevented. Y...
Agile manifesto explicitly states that agile values individual and interactions over process and tool. What does it really mean? Does it mean… …do not be a slave to the process, or …it is not necessary to have a clearly defined way of working, or …every individual can choose to w...
Moving to a model that utilizes the cloud is a huge proposition. You can throw some applications out there without looking back – if they have no ties to the corporate datacenter and light security requirements, for example – but most applications require quite a bit of work to make th...
BYOD remains a topic of interest as organizations grapple not only technologically with the trend but politically, as well. There are dire warnings that refusing to support BYOD will result in an inability to attract and retain up and coming technologists, that ignoring the problems as...
1972: Most commonly used languages (Cobol, Fortran, Algol, PL/1, Basic, APL) all had complicated syntax. The prevailing thought process was to add new language syntax for every new feature. Writing a compiler for such languages was a nightmare. Then came “C”. The syntax was simple and...
Recently, I was involved in a project that was migrating from Hyper-V Server 2008 R2 to Hyper-V Server 2012. Due to architectural changes involved in implementing the new features in Hyper-V Server 2012, a direct in-place upgrade is not possible. However, the across-the-wire migratio...
Do you agree that the agile team may not possess all the specialized skills and technical knowledge required for the project? You may argue that the team should be so constituted that team members among themselves have skills and knowledge required – but is that always feasible? Wha...
Does Agile project require a project manager? Or, is a scrum master, who is a coach cum facilitator, sufficient? If you search the net you will find defenders of both side of the argument but of late the pro “need to have a project manager” view seem to be winning. Even PMI has a ce...
The cyber security market in 2012 is estimated at $60 billion, yet adding more and more layers of perimeter security may lead to a false sense of security and be completely useless against a determined system administrator working on the inside. The end result is that your data might b...
WebRenderer is one of those SDKs that can appear overwhelming on first look. For this reason we always shipped a “bare bones” Test Browser (TestBrowser.java) with the product. The Test Browser has at times baffled people due to it’s lack of features. The Test Browser was “featureless” ...
One of the twelve principles supporting agile manifesto is: Build projects around motivated individuals. Give them the environment and support they need, and trust them to get the job done. But, in a real life organization setup just trusting the team to get the job done may not be ...
Recently I've been thinking about what happens to an identity through its life cycle and how the identity data is treated during this process. I think you will also see that the Enterprise itself has differing methods of dealing with it as well. I am considering this to be the beginni...
You would definitely like to deliver the right software without defect on schedule. But in real life… Imagine a situation where your software delivery date is very near and everything is under control. You are almost ready with the tested software. Suddenly you receive a request for c...
The number one IT issue for all enterprises today is delivery - responding to business demand for change in ever faster timescales, at lower cost. But in the typical large enterprise, IT is widely perceived to be incapable of responding in a reasonable timeframe and cost. There are man...
If your .NET application was to run a sprint, would it win the race? To determine whether your application meets its performance objectives (and wins the race) and to help identify bottlenecks, you need to measure your application’s performance and collect metrics. Metrics of particul...
Many software company have embraced some variant of this motto. This is the right thing to do … after all who wants software which has bugs. It is an open and shut case – right? Or is it? … Especially in the context of agile development. Let us start by asking two stupid question: H...
HTML5 is the latest iteration of the standard used by web programmers and developers. When completed in 2014, it will enable developers to write-once-run-anywhere (WORA) for consistent, cross-platform experiences across all operating systems and browsers. For example, a developer could...
With every passing day, Big Data assumes new strength as a significant force in our industry. Someone even said that Big Data is transforming business same way IT did few decades ago. The overall revenue (includes hardware, software, service) for Big Data is said to be around $5.1B ...
Do you know of any organization which does not have an annual budgeting process? Do you know of any organization which does not do an ROI analysis before deciding to fund a project? There may be smaller projects which come out of the discretionary fund of a sponsor but any project of...
I frequently find myself thinking that the dumbest thing we Internet marketers ever did in social networking was to rename it social media. In the early days of Web 2.0, there was no such thing as social media. Everyone was just working to make software more social, whatever that mean...
If you had the chance of working in an organization which has received SEI-CMMi certification then you would definitely be familiar with the concept of: Requirement Baselining Requirement Traceability Matrix (RTM) If you are not familiar with these terms then the best place to look is ...
As many readers may know, Facebook replaced their HTML5 version of their mobile app a few weeks ago, in favor of a native application written in Object C. It is much faster and smoother now, however, several functions disappeared with this change. You can no longer just steal your f...
One of the interesting side effects of having been a developer before migrating to a more network-focused view of the world* is it’s easier to understand the limitations and constraints posed on networking-based software, such as web servers. During the early days of virtualization ad...
August seems to have been the month for a huge raft of storage-related announcements and I’m still getting to grips with the detail, after being away on holiday for the whole month. As I start to pick out the news and make sense of how it fits into the storage landscape, I thought I’d...
With the endorsement by the Federal Financial Institutions Examination Council (FFIEC), smaller financial institutions which a beholden to many compliance audits and security issues can now explore the possibility of outsourcing security features from the cloud. Now these organizations...
Samsung is unveiling a bevy of electronics, including, the Note 2, a Windows Phone 8 (Ativ S), a touchscreen Windows 8 laptop, and more – the Galaxy Note 2 looks pretty amazing, but while I like the device and size as a secondary device, I could never use it to make phone calls. With t...
Yesterday I had to record a 2-hour long webinar. The resulting .mov file was about 1Gb in size. Then I needed to cut out a 40-minute fragment from this movie and save it as a separate file. Doesn’t look like an overly complicated task, does it? Started iMac on my MacBook Pro, which is ...
Windows Server 2012 Essentials, which will ultimately replace the existing Small Business Server (SBS) and Home Server products, has reached the Release Candidate milestone! Essentials provides a simple to install and configure version of Windows Server 2012 intended for Small Busines...
A huge uproar has resounded throughout the internet the past few days, Apple is now worth more than $620B, the largest cash value in US history (not accounting for inflation both IBM and Microsoft have been worth more given inflation on given days). However, in an era in which most tec...
Imagine getting a $20 parking ticket and then filing suit against the issuing municipality for exposing too much personal information on that ticket. That’s exactly what Jason Senne did after receiving a $20 parking ticket in 2010 for illegally parking his car overnight in the Chicago...
When virtualizing Active Directory Domain Controllers in the past, we've needed to be very careful that we don't invoke any steps, such as applying an old snapshot, that could possibly cause USN rollback to occur in the state of a Domain Controller's replica AD database and risk AD cor...
In a recent blog post, I talked about how geofencing could be used in an enterprise setting to ensure compliance with local regulations or restrict an application’s functionality when a user is away from the office. Geofencing is a great piece of functionality, especially when dealing ...
This tutorial series walks you through the simple steps of building an HTML5 WebSocket app, demonstrating the power of the publish/subscribe development pattern directly in JavaScript. Our sample is almost as simple as a Chat app, the “Hello World” app of the WebSocket world, but is a ...
In Part 1, we looked at the completed application, which we’ll start building here. Before we get started with actual development, let’s take a look at the starting application. Open a new browser tab or window with the starting application in JSFiddle. The starting app is as simple ...
According to Wikipedia, “Twitter is an online social networking service and microblogging service that enables its users to send and read text-based messages of up to 140 characters, known as ‘tweets.’” Twitter’s brand personality is that of a service that allows us to communicate wit...
Some testers dismiss the GUI driven approach as being too limited for complicated behaviors. Old school testers insist on only utilizing program-based scripts because past experience has led them to think that this is the most flexible or the only choice for handling complicated behavi...
I don’t know about how you feel about the current state of robotics but I was hugely surprised when I started exploring the state of art. AI is a field which has never lived up to its promise – real or perceived. For example if you look at Arthur Clarke’s “2001: A Space Odyssey” (nove...


ADS BY GOOGLE