Welcome!


From the Blogosphere

You can then easily piece together full transaction traces by ordering all method calls by sequence number. Further analysis can be applied to this information for a number of purposes. For example, by analysing the transactions, developers can easily construct design diagrams that can...
One of the most common questions we get asked by customers is: “What’s the best way to log my data?” My answer is always: "log using JSON format wherever possible.” The next question we often get asked – (but not as much)… Yeah JSON, …Hmmm, what is JSON again? So JSON is: S...
Yet another retailer has confessed that their systems were breached and an untold number of victims join the growing list of those who have had their data was stolen. This one could be bigger than the infamous Target breach. I wonder if some day we’ll be referring to periods of time by...
Log analysis is a simple and cool way to add oversight to your orchestration environments. While scripting your infrastructure is a powerful tool, using it alone is a quick-hit device. But wait, there is more! You don’t even have to create the scripts manually; there are tools ou...
Putting on a rock show is like piloting the Millenium Falcon – it’s simultaneously the fastest ship in the galaxy while being a “piece of junk.” The stage lights are so hot you start to sweat immediately, hoping those Jager-bombs are escaping through your pores and delaying the impend...
The epic changes brought about by mobile and cloud computing over the past 5 years have completely transformed the way organizations do business today. We now live in an age where mobile devices are the PCs of choice and mobile apps are the ubiquitous software of choice in this digital...
As a lifelong word junkie, I can honestly say that I’ve never seen more debate, argument, and failure to reach an agreed upon definition of a word than we’re seeing over the word “DevOps.” And while it can be frustrating to find a definition that works for you, and not be swayed by the...
Executives charged with building business-driven applications have an extremely challenging task ahead of them. However, the cavalry has arrived with useful tools and strategies built specifically to keep modern applications working efficiently. We partnered with Gigaom Research to ca...
Inarguably, the pressure is on "the network" to get in gear, so to speak, and address how fast its services can be up and running. Software-defined architectures like cloud and SDN have arisen in response to this pressure, attempting to provide the means by which critical network servi...
Certainly, enterprises feel the pressure to transition their networks to next generation architectures like SDN to brace the coming storm that is an app economy. Service providers could provide valuable advice to them on how to do that, if they could yell loud enough over the thunderou...
Putting on a rock show is like piloting the Millenium Falcon – it’s simultaneously the fastest ship in the galaxy while being a “piece of junk.” The stage lights are so hot you start to sweat immediately, hoping those Jager-bombs are escaping through your pores and delaying the impend...
If the existing system does fifteen things, write down the major tasks of that system and divide them into as many verticals as necessary to describe the broad functional areas that require attention. If the replacement is intended to be a custom-developed, on-premises system, it’s per...
Amazon is indisputably the biggest name in cloud service providers. They have built up a strong market presence primarily on the argument that access to cheap compute and storage resources is attractive to companies looking to shed IT costs as they move from on-premises solutions to th...
Last week Ivan Pepelnjak wrote an article about the failure domains of controller based network architectures. At the core of SDN solutions is the concept of a controller, which in most cases lives outside the network devices themselves. A controller as a central entity controlling the...
The keys to the digital kingdom are credentials. In no industry is this more true (and ultimately more damaging) than financial services. The sophistication of the attacks used to gather those credentials and thwart the increasingly complex authentication process that guards financial ...
The hype around the wearable tech industry has steered many consumers straight to Amazon in search of a fitness gadget that will tell them how healthy or unhealthy they act on a regular basis. Some feel they can’t become healthier unless they are tracking their progress every step of t...
Skytap recently announced the availability of a Docker template in the Skytap Cloud Public Template Library. Docker is an open platform for developers and sysadmins to build, ship, and run distributed applications. This new template allows you to easily experiment with or deploy Docke...
In 2013, the National Football League struck a landmark deal with Microsoft that gives Xbox users exclusive interactive access to games each week and requires coaches and coordinators to use Surface tablets on the sidelines. The deal is worth a staggering $400 million over the next fiv...
When we are deciding between public or private cloud implementation there are some capabilities we need to take into consideration and security is one of the top ones. Other characteristics like integration with existing systems, costs and management are also important. Looking at the...
We recently released AWS CloudTrail integration with Logentries – and not surprisingly we’ve seen a significant uptick in adoption as one of our most popular integrations. My job as director of customer success is to make things as simple for our customers as possible. One question tha...
In today’s post in the modernizing your infrastructure with Hybrid Cloud series, I am going to talk about Hyper-V over SMB, which we introduced in Windows Server 2012. It is also important to note that you can use storage spaces to house your SMB share that Hyper-V will leveraged. In...
Some don’t know but “yes” there is a past for the Internet of Things. What’s really interesting is what the future looks like. Just imagine the Internet of Things in the year 2025. Can you?
Regardless if you’ve migrated multiple applications or this is your first migration to a public Infrastructure-as-a-Service (IaaS) you will want to run a small proof-of-concept to make sure that the basic elements of data flow operate as expected and your components will run in the Iaa...
On August 28th, Samsung and LG announced their latest generation of smartwatches in separate press releases. The Samsung report flaunts its Gear S, a smartwatch with a curved screen that measures a full two-inches long. Capabilities of the watch include providing notifications from soc...
My favorite writer, Gil Press, sums it up with, “It’s Official: The Internet Of Things Takes Over Big Data As The Most Hyped Technology” where he talks about how Gartner released its latest Hype Cycle for Emerging Technologies, and how big data has moved down the “trough of disillusion...
In today’s software-defined business era, uptime and availability are key to the business survival. The application is the business. However, ensuring proper application performance remains a daunting task for their production environments, where do you start? Enter Business Transacti...
Last week I was both learning and speaking at the The Internet of @ThingsExpo in New York City. I taught a session on the subject of IoT, Code Halos and Digital Transformation Strategies. Then I had the privilege of interviewing Microsoft's mobile and IoT guru Nick Landry (Twitter @Act...
In June I was presenting at the ThingsExpo conference  at the Javits Center in New York City. During my talk I was demonstrating how to integrate consumer devices into a business workflow. In particular, I was doing live measuring of my own blood pressure to show how to integrate consu...
I came across a very interesting story posted at the Reviewed.com. Website in the section covering home oven reviews. The headline read “The Smart Home Dominates the Internet of Things.” The story, based on a recent report published by Appinions, a market research firm, stated that whi...
The evolution of JavaScript and HTML 5 to support a genuine component based framework (Web Components) with the necessary tools to deliver something close to a native experience including genuine realtime networking (UDP using WebRTC). HTML5 is evolving to offer built in templating sup...
Elasticity is hailed as one of the biggest benefits of cloud and software-defined architectures. It's more efficient than traditional scalability models that only went one direction: up. It's based on the premise that wasting money and resources all the time just to ensure capacity on ...
Google has created what it calls a “Matrix-style,” virtual version of California’s road system that it’s been using to test self-driving cars before sending them out onto the actual road, according to the Guardian. Google is apparently so thrilled with its simulation that it asked Cali...
As enterprises work to rapidly embrace the mobile revolution, both for their workforce and to engage more deeply with their customers, the pressure is on for IT to support the tools needed by their application developers. Mobile application developers are working with a massive variety...
This tutorial is primarily for the students in my 420-517 Software Development Project course at Dawson College. It explains how to set up a workspace in Eclipse for this course. These instructions are important because Eclipse stores workspace specific settings in the workspace itself...
In my first post, I discussed how software and various tools are dramatically changing the Ops department. This post centers on the automation process. When I was younger, you actually had to build a server from scratch, buy power and connectivity in a data center, and manually plug a...
When Instagram was sold to Facebook in 2012, it employed only 13 people and maintained over 4 billion photos shared by its 80 million registered users. Internally, Instagram was a small business. Externally, it was a web monster. Filling the gap between those two contradictory perspec...
If you listen to the persistent murmur in the market surrounding the Internet of Things right now, you'd believe that it's all about sensors. Sensors and big data. Sensors that monitor everything from entertainment habits to health status to more mundane environmental data about your h...
Kirk Byers at SDN Central writes frequently on the topic of DevOps as it relates (and applies) to the network and recently introduced a list of seven DevOps principles that are applicable in an article entitled, "DevOps and the Chaos Monkey. " On this list is the notion of reducing var...
So far, 2014 has turned into a banner year for CIOs that have invested the time and effort to plan for hybrid cloud services, while building strong strategic relationships with their Line of Business leadership. Their approved capital investment budget spend is on-track and operational...
IT systems will need to adapt, and evolving — or simply adding on to the existing relational database management system architecture — isn’t going to cut it. What does this mean, if not Hadoop or in-memory as the end-all, be-all? TechTarget writer Nicole Laskowski sums it up nicely: Ar...