Welcome!


From the Blogosphere

The hype around the wearable tech industry has steered many consumers straight to Amazon in search of a fitness gadget that will tell them how healthy or unhealthy they act on a regular basis. Some feel they can’t become healthier unless they are tracking their progress every step of t...
Here’s  is a quote from the About page  of the Web site ehow.com: “eHow is your one-stop online resource for life’s challenges. Professionals in every field come together to offer expert advice, backed by the additional support of a can-do eHow community.“ Exper...
Since the birth of Hadoop in 2005-06, the way we think about storing and processing information has evolved considerably. The term “Big Data” has become synonymous with this evolution. But still, many of our customers continue to ask, “What is Big Data?”, “What are its use cases?”, and...
My favorite writer, Gil Press, sums it up with, “It’s Official: The Internet Of Things Takes Over Big Data As The Most Hyped Technology” where he talks about how Gartner released its latest Hype Cycle for Emerging Technologies, and how big data has moved down the “trough of disillusion...
The goal of any DevOps solution is to optimize multiple processes in an organization. And success does not necessarily require that in executing the strategy everything needs to be automated to produce an effective plan. Yet, it is important that processes are put in place to handle a ...
Before YARN there was another resource negotiator, Mesos. Mesos was originally documented in a research paper, followed by an Apache project, and now commercialized as Mesosphere – who are building out an ecosystem around Mesos.
Yesterday I’ve been updating code examples for the messaging chapter for the 2nd edition of my Java book. While doing this, I ran into an issue, then fixed it, but the cause and the solution illustrate the situation that we call “Ear-Eye”, which comes from and old jok...
Go ahead. Name a cloud environment that doesn't include load balancing as the key enabler of elastic scalability. I've got coffee... so it's good, take your time... Exactly. Load balancing - whether implemented as traditional high availability pairs or clustering - provides the mean...
Kirk Byers at SDN Central writes frequently on the topic of DevOps as it relates (and applies) to the network and recently introduced a list of seven DevOps principles that are applicable in an article entitled, "DevOps and the Chaos Monkey. " On this list is the notion of reducing var...
With the growing number of CSS Preprocessors like LESS, Sass, Turbine, Stylus and Swith CSS to name a few, it’s hard to decide which to choose for your project, and which will provide the best CSS authoring. Rather than focus on evaluating every CSS Preprocessor (that would simply take...

Unless you have been living under a rock the last year, you have probably heard about Docker. Docker describes itself as an open platform for distributed applications for developers and sysadmins. That sounds great, but why does it matter? Wait, virtualization isn’t new!? Virt...

When Instagram was sold to Facebook in 2012, it employed only 13 people and maintained over 4 billion photos shared by its 80 million registered users. Internally, Instagram was a small business. Externally, it was a web monster. Filling the gap between those two contradictory perspec...
Regardless if you’ve migrated multiple applications or this is your first migration to a public Infrastructure-as-a-Service (IaaS) you will want to run a small proof-of-concept to make sure that the basic elements of data flow operate as expected and your components will run in the Iaa...
In my first post, I discussed how software and various tools are dramatically changing the Ops department. This post centers on the automation process. When I was younger, you actually had to build a server from scratch, buy power and connectivity in a data center, and manually plug a...
Certainly, enterprises feel the pressure to transition their networks to next generation architectures like SDN to brace the coming storm that is an app economy. Service providers could provide valuable advice to them on how to do that, if they could yell loud enough over the thunderou...
The phenomena of Big Data continues to grow as companies of all sizes start to realize the potential ROI that comes from the correct use of massive amounts of data. MIT found that firms who can leverage Big Data can achieve 5-6 percent greater productivity and profitability than their ...
I just recently wrote a blog about BOTs causing unwanted traffic on our servers. Right after I wrote this blog I was notified about yet another “interesting” and unusual load behavior on our download page which is used by customers to download latest product versions and updates. If y...
As co-founder of Logentries I am often asked - "Why Logs?" And I have to admit, upon first impression, ‘log management and analytics' does not seem like the sexiest space :). However at Logentries we are here to redefine that space, to provide a solution to access, manage and understa...
If you're an executive that's concerned about the high-cost of proprietary software, you're not alone. If your IT team pushes back whenever Line of Business leaders ask them for feature enhancements that goes beyond the limits of the commercial software packages they've licensed, then ...
While some might still be focused on SDN with an OpenFlow-style twist, 30% of the organizations in our survey this summer (report forth coming, I promise!) were looking at SDN to improve time to market. Of those, 73% considered an API-enabled infrastructure to be important to very impo...

UPDATE (9/28/2014): Our security team indicates that we're now seeing the majority of attempted exploits of Shellshock coming in through input paramters. They've provided ASM signatures to mitigate and recommend customers use these signatures to protect their applications. Y...

One of the most common questions we get asked by customers is: “What’s the best way to log my data?” My answer is always: "log using JSON format wherever possible.” The next question we often get asked – (but not as much)… Yeah JSON, …Hmmm, what is JSON again? So JSON is: S...

This past March, Oracle released their most anticipated version in almost decade, Java 8. The latest version had a growing buzz since it had been announced, and companies of all sizes were eager to upgrade. Our partner, Typesafe conducted a Java 8 adoption survey of 2,800 developers...

Amazon is indisputably the biggest name in cloud service providers. They have built up a strong market presence primarily on the argument that access to cheap compute and storage resources is attractive to companies looking to shed IT costs as they move from on-premises solutions to th...
Yet another retailer has confessed that their systems were breached and an untold number of victims join the growing list of those who have had their data was stolen. This one could be bigger than the infamous Target breach. I wonder if some day we’ll be referring to periods of time by...
Log analysis is a simple and cool way to add oversight to your orchestration environments. While scripting your infrastructure is a powerful tool, using it alone is a quick-hit device. But wait, there is more! You don’t even have to create the scripts manually; there are tools ou...
We're working hard in the Logentries towers to integrate our continuous delivery tools, so we can identify and track issues as easily as possible. This saves us time that we can spend on important things like adding new features (or playing pool!). We use a lot of tools to manage our...
The epic changes brought about by mobile and cloud computing over the past 5 years have completely transformed the way organizations do business today. We now live in an age where mobile devices are the PCs of choice and mobile apps are the ubiquitous software of choice in this digital...
Putting on a rock show is like piloting the Millenium Falcon – it’s simultaneously the fastest ship in the galaxy while being a “piece of junk.” The stage lights are so hot you start to sweat immediately, hoping those Jager-bombs are escaping through your pores and delaying the impend...
Skytap recently announced the availability of a Docker template in the Skytap Cloud Public Template Library. Docker is an open platform for developers and sysadmins to build, ship, and run distributed applications. This new template allows you to easily experiment with or deploy Docke...
Tactics without strategy are dangerous. ~ Robert Leonhard

In the new b...
You can then easily piece together full transaction traces by ordering all method calls by sequence number. Further analysis can be applied to this information for a number of purposes. For example, by analysing the transactions, developers can easily construct design diagrams that can...
As a lifelong word junkie, I can honestly say that I’ve never seen more debate, argument, and failure to reach an agreed upon definition of a word than we’re seeing over the word “DevOps.” And while it can be frustrating to find a definition that works for you, and not be swayed by the...
Executives charged with building business-driven applications have an extremely challenging task ahead of them. However, the cavalry has arrived with useful tools and strategies built specifically to keep modern applications working efficiently. We partnered with Gigaom Research to ca...
Inarguably, the pressure is on "the network" to get in gear, so to speak, and address how fast its services can be up and running. Software-defined architectures like cloud and SDN have arisen in response to this pressure, attempting to provide the means by which critical network servi...
If the existing system does fifteen things, write down the major tasks of that system and divide them into as many verticals as necessary to describe the broad functional areas that require attention. If the replacement is intended to be a custom-developed, on-premises system, it’s per...
Last week Ivan Pepelnjak wrote an article about the failure domains of controller based network architectures. At the core of SDN solutions is the concept of a controller, which in most cases lives outside the network devices themselves. A controller as a central entity controlling the...
The keys to the digital kingdom are credentials. In no industry is this more true (and ultimately more damaging) than financial services. The sophistication of the attacks used to gather those credentials and thwart the increasingly complex authentication process that guards financial ...
In 2013, the National Football League struck a landmark deal with Microsoft that gives Xbox users exclusive interactive access to games each week and requires coaches and coordinators to use Surface tablets on the sidelines. The deal is worth a staggering $400 million over the next fiv...
When we are deciding between public or private cloud implementation there are some capabilities we need to take into consideration and security is one of the top ones. Other characteristics like integration with existing systems, costs and management are also important. Looking at the...