Welcome!


Latest Articles from Linux
This white paper digs deep into the reasons testing mobile apps is fundamentally harder than traditional web or desktop applications. Experts Tina Zhuo and Dennis Schultz from IBM along with Yoram Mizrachi from Perfecto Mobile and John Montgomery from uTest collaborate to explore the c...
Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous, whether caused by malice or employee negligence. In its list of the eight most significant cybersecurity threats for 2013, Forbes c...
Simply defined the SDDC promises that you’ll be able to treat “all” of your IT infrastructure as if it’s completely malleable. That there are no restrictions to how you can use and assign everything from border controls to VM size as long as you stay within the technical capabilities o...
No matter how often you deploy your application or how sophisticated your delivery pipeline is, you always need to know the quality status of the software you are building. That can only be done if you measure it; but measure what exactly? In Part 1 we introduced the Concept of Quality...
NaviSite, Inc., a Time Warner Cable Company, announced on Wednesday a key addition to its suite of cloud storage and data replication solutions with the launch of its NaviCloud® Vault: Data Domain® solution. Enabling a secure, reliable, highly available, off-site replication service th...
Many cloud hosting providers have achieved ticket-of-entry credibility in the data warehousing industry by building simple colocation centers. A first-tier database as a service (DBaaS) contender, however, is set apart by a value-added service approach that is strategic, consultative a...
MapDB is an Apache-licensed open source database specifically designed for Java developers. The library uses the standard Java Collections API, making it totally natural for Java developers to use and adopt, while scaling database size from GBs to TBs. MapDB is very fast and supports a...
Every company worries about competition. When I ran a large enterprise solutions organization, I took steps every day to ensure we were outpacing the competition. Frequently this involved making “build” vs “buy” decisions for the various product parts or services we needed to drive our...
Need to scale your data tier? The foundation of every application is the database layer, and today application architects have more choices than ever. With these choices come new questions: Which database technology is best for your application? How can your application take advantage ...
Ben Franklin often said that "by failing to prepare, you are preparing to fail." Not preparing for who your actual enterprise mobility management (EMM) customer is may have dire consequences as mobile devices (both personal and corporate-issued) access more corporate data. Before you c...
One challenge more and more enterprises are grappling with as they plan to adopt the cloud is data residency & sovereignty. They are finding that if they want to use a cloud service hosted outside of their borders, life can become quite complex. Perhaps it is a result of the often disc...
Most companies only analyze subsets of their business data and fragmented data in several places – there is nothing “big” about that. By freeing IT time and resources, the process of analyzing your data can be streamlined, ensuring that all the data is in the system, complete, and avai...
The power of data-driven business networks is increasing, but how do enterprises best leverage that intelligence as they seek new services, products and efficiency? The next BriefingsDirect thought-leader panel discussion focuses on the future of business and how companies can benefit...
As Eric Reis, pioneer of the lean startup movement notes, a software startup’s ability to succeed depends solely on how quickly and inexpensively they can try new features. The challenge is if you are a typical startup, you are your ops team and development resources are the biggest de...
APIs came about to help companies create and manage their digital ecosystem, enabling them not only to reach more customers through more devices, but also create a large supporting ecosystem of developers and partners. While Facebook, Twitter and Netflix were the early adopters of APIs...
CodeFutures on Wednesday announced that the U.S. Patent Office has granted it a patent for its Continuous Replication technology that helps database administrators perform maintenance and other processing functions without downtime. U.S. Patent 8,626,709, titled Scalable Relational Dat...
As recent events have confirmed once again, no single company, organization or government is up to the task of securing the Internet. The never-ending cat and mouse game of exploits chasing vulnerabilities continues. The stunning Heartbleed discovery has shaken the online security esta...
Clearly, the buzz around wearable technology has to do with the hands-free user design – these smart peripherals allow for a better experience for certain functions. While consumers are not going to do away with their iPhones, tablets and computers anytime soon, wearables make sense as...
VisionMobile recently published one of the best reports on apps for vehicles that I have read. It is frustrating with how difficult it is to actually get an app approved for use in a car. Here are some of the unique challenges: Safety first considerations (like driver distraction) Lo...
For Windows environments, it is critical that organizations can delegate administration and establish granular privileges quickly and efficiently to restrict administrators so they only access the servers and resources required to perform their job and only during the approved times to...
Printing and the cloud are seemingly at opposite ends of an organization’s infrastructure spectrum. Printing remains one of the last bastions of an organization’s infrastructure that cannot be completely virtualized since the whole point of printing is to take something virtual and mak...
In this report Enterprise Management Associates (EMA) analysts explore the ways in which gaining visibility and control over high-privilege access helps organizations achieve regulatory compliance, assure responsible governance, and improve security all while reducing IT operational co...
The MAS guidelines for Internet Banking and Technology Risk Management (TRM), issued in June 2013, identify security and risk management issues in a comprehensive manner, covering everything from identity assurance and access controls to accountability and audit. This white paper detai...
The market is full of buzz about cloud computing, and with it come sweeping claims about simplicity and savings. Deciding to migrate some or all database management to a cloud hosting provider, however, is a more complex undertaking than conventional wisdom may suggest. This white pa...
The social media expansion has shown just how people are eager to share their experiences with the rest of the world. Cloud technology is the perfect platform to satisfy this need given its great flexibility and readiness. At Cynny, we aim to revolutionize how people share and organize...
Next-Gen Cloud. Whatever you call it, there’s a higher calling for cloud computing that requires providers to change their spots and move from a commodity mindset to a premium one. Businesses can no longer maintain the status quo that today’s service providers offer. Yes, the continuit...
Get the essentials about agile testing and service virtualization from several different perspectives – get an analyst’s take from Diego Lo Giudice of Forrester Research on how to remove agile testing bottlenecks and ways to calculate your potential return on investment for Service Vir...
GIS technology is being used in the healthcare industry today for patient care and preventative medicine among other things. Hospitals and other organizations, with GIS and big data resources now have the ability to collect geographic information from their patients and study trends in...
Today, developers and business units are leading the charge to cloud computing. The primary driver: faster access to computing resources by using the cloud's automated infrastructure provisioning. However, fast access to infrastructure exposes the next friction point: creating, deliver...
In the last year, conversations about In-Memory Computing (IMC) have become more and more prevalent in enterprise IT circles, especially with organizations feeling the pressure to process massive quantities of data at the speed that is now being demanded by the Internet. The hype aroun...
Enterprises are moving more and more applications to the cloud. Gartner predicts that the bulk of new IT spending by 2016 will be for cloud computing platforms and applications and that nearly half of large enterprises will have cloud deployments by the end of 2017.1 The far-reaching...
Web conferencing in a public cloud has the same risks as any other cloud service. If you have ever had concerns over the types of data being shared in your employees’ web conferences, such as IP, financials or customer data, then it’s time to look at web conferencing in a private cloud...
More and more enterprises today are doing business by opening up their data and applications through APIs. Though forward-thinking and strategic, exposing APIs also increases the surface area for potential attack by hackers. To benefit from APIs while staying secure, enterprises and se...
In my previous blog I contrasted the latest net neutrality developments in the EU with the situation in the U.S. Neither decision will settle the argument and the two camps will continue to debate the topic for the foreseeable future. On both sides of the argument and the ocean, believ...
Maintaining lower development environments can become an unbearable headache. Changes to an application, service or API are seldom completely testable, leaving us to discover broken code when it’s too late. This lack of visibility into application dependencies severely limits early cod...
Are you developing or hosting PHP applications? Are you doing performance sanity checks along your delivery pipeline? No? Not Yet? Then start with a quick check. It only takes 15 minutes and it really pays off. As a developer you can improve your code, and as somebody responsible for y...
The revolution that happened in the server universe over the past 15 years has resulted in an eco-system that is more open, more democratically innovative and produced better results in technically challenging dimensions like scale. The underpinnings of the revolution were common hardw...
The cloud computing revolution is well underway and there are lots of benefits to be realized. According to Awesome Cloud research the industry will be worth more than $150 billion this year, compared to $46 billion just six years ago. Mirroring the general trend for SaaS solutions, cl...
Today’s hyper competitive environment defined by unreasonable demands for speed and high expectations for quality and usability has forced companies to differentiate based on their technology. Every company is a software company where customers’ demands for features and functions are m...
Recently Google acquired the home automation company Nest. Nest is a company that sells IoT (Internet of Things) enabled devices that allow homeowners to control the temperature of their homes through their smartphones, plus it sends notifications if it detects dangerous levels of smok...