Welcome!


Top Stories

One way in which technology is adopted is when an existing process is automated and made more efficient, cheaper, or reliable. Another is when a technique or innovation is applied to an existing process to drastically alter the way it occurs. The disadvantage of the latter is that it requires the idea being sold to someone who has to change to adopt it, and thereby carries a risk of failure. Applying a technology to merely streamline an existing process is a simpler to adopt as the implementation merely involves oiling an existing solution. Given the keystone that communication occupies in our lives, you would think that it would be an exemplary case of technology implementation. Ironically though this isn't what has occurred; instead it is one of the most recalcitrant disciplines. An example is the telephone. When it was first rolled out, it was used by secretari... (more)

DevOps Summit Launches "DevOps Journal" | @DevOpsSummit [#DevOps]

The world's leading DevOps event, DevOps Summit has launched DevOps Journal on the SYS-CON.com portal, featuring over 2,700 original articles, news stories, features, and blog entries. DevOps Journal is focused on this critical enterprise IT topic in the world of cloud computing. SYS-CON Media CEO Carmen Gonzalez is founder and publisher of DevOps Journal, and Roger Strukhoff, long-time SYS-CON editor and the conference chair of Cloud Expo is the editor of the world's leading DevOps resource. DevOps Journal offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. For publishing opportunities at DevOps Journal please contact Nancy Valentine at events(at)sys-con.com. Follow new article posts on Twitter at @DevOpsSummit Register For DevOps Summit FREE (before Friday)... (more)

The Internet of Things and Mobility | @ThingsExpo [#IoT]

The Internet of Things and Mobility Driving HTTP and Cloud The Internet of Things smells like opportunity for everyone. There is no industry that hasn't been touched by the notion of smart "things" enabling convenience or collaboration or control in every aspect of our lives. From healthcare to entertainment, from automotive to financials, the Internet of Things is changing the way we work, live and play. That's the view from the consumer side, from the perspective of someone using the technology made available by . But before that consumer could get their hands on the technology -and the inevitable accompanying "app" that comes with it - the provider/vendor had a lot of work cut out for them. Whether it was building out licensing and activation servers, a remote-based control application, or a data exchanging service, the provider of thi... (more)

Internet of Things and You: A Beginner’s Guide

I love The Internet of Things. You do, too, even if you don’t know exactly what it is yet. Hardly a day goes by where I don’t find a story about some awesome company creating some new awesome gadget that taps into The Internet of Things. Scrolling through these stories is like taking a peek at the world (and our homes!) three to five years down the line. But, uh, what exactly is The Internet of Things? And why should you care? Great questions! Let’s sort it all out. What Is The Internet of Things? Basically, The Internet of Things is how all of your connected devices talk to each other. Whether you’re talking about your smartphone and Bluetooth speakers or your Nest thermostat and Philips Hue light bulbs, The Internet of Things is an invisible network that links everything together. Still having a hard time picturing it? Think about it like this. My iPhone can do all... (more)

Process Metrics on the Windows Agent By @TrevParsons | @DevOpsSummit [#DevOps]

Gathering Process Metrics on the Windows Agent As we continue to expand Logentries' powerful search and metric capabilities, we are also looking for new ways to allow our Users to send us critical data. In the newest version of the Windows Agent users can now follow process metrics and send them to Logentries. This feature enables even more insight into your application by allowing you to monitor your processes resource allocation in Logentries. Additionally, with Logentries powerful real-time alerting capabilities you will be instantly alerted when your process stops logging. To allow for this feature, the Logentries service has added a brand new tab to the Windows Agent. In this new view you will see a list of all your current processes in your environment. To start collecting information on a given process you simply have to click the checkbox. By default, the Wi... (more)

[video] Democratization of Technology with @FlyingTech_Das | @CloudExpo #Cloud

"Vicom Computer Services is a service provider and a value-added reseller and we provide technology solutions, infrastructure solutions, security and management services solutions," stated Amitava Das, Chief Technology Officer at Vicom Computer Services, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City. Register FREE Before Friday! ▸ Here Your registration includes: ▸ Cloud Expo sessions ▸ Big Data Expo sessions ▸ @ThingsExpo sessions ▸ DevOps sessions ▸ Containers sessions ▸ Microservices sessions The World's Largest Cloud Computing Event, November 3-5 at the Santa Clara Convention Center! Cloud computing budgets worldwide are reaching into the hundreds of billions of dollars, and no organization can survive long without some sort of cloud migration strategy. Each month brings new announcements, use cases, a... (more)

JaGUI Guidelines

The ability to author a program or applet on one computer system and have it run on many different platforms is a paramount strength of Java and its suitability for the Internet. This strength, however, introduces weaknesses in some areas of the implementation that limit Java's usability. One such weakness that is quickly coming to the forefront is the Java Graphical User Interface or JaGUI (pronounced "jah-gooey" which sounds about the way it looks). The cross-platform ability of Java is detrimental to its usability and consistency. Because applets will be run on various platforms with different user interfaces, screen sizes, and resolutions, Java only allows you to vaguely place GUI components in the window with the Abstract Windowing Toolkit (AWT). AWT basically pulls everything to the lowest common denominator to insure compatibility, and effectively brings the c... (more)

Java at Fault?...Surely Not!

Come, friends, family and passersby, welcome to the start of a new column, from the good old keyboard of Alan Williamson. Some of you may have read my previous column under the banner name of 'Visual Cafe.' That column looked at various aspects of the Java language, including such goodies as POP and SMTP. This column is going to be somewhat different. I intend to strip away all of the media hype and marketing stories surrounding Java, and present you with a monthly look at the real Java: Java at the frontline. We will look at the problems facing developers on a daily basis: things like playing around with classpath's, shipping releases to other platforms and database drivers. If any of you have particular problems you have come across and successfully resolved, and you feel would be worth sharing, please e-mail me. Or even if you haven't solved them yet, e-mail me a... (more)

Application Server Metamorphosis

The Java 2 Platform, Enterprise Edition (J2EE), defines the standard for developing and deploying multitier enterprise applications. At the core of J2EE architecture are application servers - containers for your J2EE components. This article explains the architecture of an application server that embraces standards such as J2EE, and focuses on ways to leverage the application server platform for caching, load balancing, scalability, and clustering services. It also provides an understanding of how to build J2EE applications, by looking at both design and runtime scenarios. It concludes with some best practices for designing and implementing enterprise applications. The Metamorphosis: From Web Servers to Application Servers During the early '90s, the advent of the Internet gave birth to myriad programming models like CGI and FastCGI. This enabled ubiquitous access to... (more)

To BEA or Not to BEA

Yech. I hate that title as much as you do, but it stuck in my brain and I can't get it out. Things are going on in the industry, and I think this is an appropriate time to cover them. We were at the Java Business Conference in December, covering what appeared to be more of a nonevent than a true exposition. Probably the biggest disappointment was Sun's backing out of the standards process for Java. Alan Williamson's column goes into detail on that, expressing the feelings of many in the industry that were upset by this move. While the little guys were understandably upset, it's the big players that were really hurt. IBM in particular has made a large investment in Java, and has been looking to participate in the development of the language on more of a peer basis than this turn of events allows. There have been other happenings in the field as well. Not one but two ... (more)

I Have Seen the Future

Last month I came to you as a developer as opposed to a CEO. Well, this time I'm moving up the social ladder and I'm writing in the capacity of a user. I'd like to tell you a little story that scared the living daylights out of me. Continuing on the "Ally McBeal" theme from last time, I have seen a glimpse of the future, and all I can say is, "I am troubled." I was out walking in the middle of London. It was a beautiful, sunny day. Ever since I upgraded my old analog mobile phone to a nice, shiny Nokia digital phone, I've found myself using it more often. Couple this with the fact that I have one of those headsets for the phone that allows me to stay on it for hours without the fear of blowing my head off with the fallout from the nuclear reactor held to my ear. I love my Nokia. This is the popular one as seen in the movie Armageddon and the one Mulder, from "The X-F... (more)

CloudEXPO Stories
92% of enterprises are using the public cloud today. As a result, simply being in the cloud is no longer enough to remain competitive. The benefit of reduced costs has normalized while the market forces are demanding more innovation at faster release cycles. Enter Cloud Native! Cloud Native enables a microservices driven architecture. The shift from monolithic to microservices yields a lot of benefits - but if not done right - can quickly outweigh the benefits. The effort required in monitoring, tracing, circuit breakers, routing, load balancing, etc. for thousands of microservices can become overwhelming. This talk will address strategies to run & manage microservices from 0 to 60 using Istio and other tools in a cloud native world.
It's clear: serverless is here to stay. The adoption does come with some needed changes, within both application development and operations. That means serverless is also changing the way we leverage public clouds. Truth-be-told, many enterprise IT shops were so happy to get out of the management of physical servers within a data center that many limitations of the existing public IaaS clouds were forgiven. However, now that we've lived a few years with public IaaS clouds, developers and CloudOps pros are giving a huge thumbs down to the constant monitoring of servers, provisioned or not, that's required to support the workloads.
In very short order, the term "Blockchain" has lost an incredible amount of meaning. With too many jumping on the bandwagon, the market is inundated with projects and use cases that miss the real potential of the technology. We have to begin removing Blockchain from the conversation and ground ourselves in the motivating principles of the technology itself; whether it is consumer privacy, data ownership, trust or even participation in the global economy, the world is faced with serious problems that this technology could ultimately help us in at least partially solving. But if we do not unpack what is real and what is not, we can lose sight of the potential.
Serveless Architectures brings the ability to independently scale, deploy and heal based on workloads and move away from monolithic designs. From the front-end, middle-ware and back-end layers, serverless workloads potentially have a larger security risk surface due to the many moving pieces. This talk will focus on key areas to consider for securing end to end, from dev to prod. We will discuss patterns for end to end TLS, session management, scaling to absorb attacks and mitigation techniques.
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addresses many of the challenges faced by developers and operators as monolithic applications transition towards a distributed microservice architecture. A tracing tool like Jaeger analyzes what's happening as a transaction moves through a distributed system. Monitoring software like Prometheus captures time-series events for real-time alerting and other uses. Grafeas and Kritis provide security polic...