Welcome!


Encryption is a key element of a complete security strategy. The 2013 Global Encryption Trends Study shows a steady increase in the use of encryption solutions over the past nine years. Thirty-five percent of organizations now have an encryption strategy applied consistently across the...
It’s certainly no secret that cloud solutions have become an important and increasingly necessary part of how companies do business today. For enterprises, implementing cloud-based services can help boost productivity, enhance efficiency and reduce costs. Private cloud solutions take ...
It is a mistake to think we can secure APIs using the same methods and technology that we used to secure the conventional, browser-centric web. Andi Mann from CA Technologies recently pointed out that, at every turn, customers are interacting more and more with businesses through appl...
Rivetz Corp. has been named as one of the AlwaysOn Global 100 Companies to Watch, congratulations! Please tell us, what is Rivetz all about and what do you do? Steven Sprague: Rivetz is leveraging the trusted execution technologies in new devices powered by Intel and ARM to protect th...
Even Cloud-driven transformation isn’t the end of the story. The move to Agile Architecture is a move to continuous business transformation – where the organization is as agile as it wants to be, and is able to deal with change as a routine part of how it does business. Continuous busi...
By adopting HP Vertica, Systems Mechanics improved how their products best deliver business intelligence, analytics streaming, and data analysis. Three years ago, Systems Mechanics Limited used relational databases to assemble and analyze some 20 different data sources in near real-ti...
If you believe as the authors of the new book Code Halos do, that data is the new competitive arena for businesses, then you will want to develop a strategy in order to compete. What might that strategy look like? It may be as simple as, "We believe the better we understand the needs...
In 1999, technology pioneer Kevin Ashton coined the phrase "Internet of Things" (IoT) to refer to the concept of "connecting any device with an on and off switch to the Internet (and/or to each other). This includes everything from cell phones, coffee makers, washing machines, headphon...
Do you have a PHP application running and have to deal with inconveniences like lack of scalability, complexity of debugging, and low performance? That’s bad enough! But trust me: you are not alone. I’ve been developing Spelix, a system for cave management, for more than 20 years. It ...
In Part V, we discussed processing delays caused by “slow” client and server nodes. In Part VI, we’ll discuss the Nagle algorithm, a behavior that can have a devastating impact on performance and, in many ways, appear to be a processing delay. Beyond being important for (reasonably) a...
Ransomware is the latest example of the increasingly sophisticated and damaging inventions of hackers. Individuals and organizations of all sizes are finding that their data has been locked down or encrypted until a ransom is paid. One program, CryptoLocker, infected more than 300,000 ...
I love receiving gifts in the form of new insights! It doesn't matter if others received the same gift years ago and I am just getting it now. If it is new to me, I get excited. It is like waking up in the morning and discovering a new room in your house. I read an article by Thoma...
Can a postmortem review help foster a curiosity for innovative possibilities to make application performance better? Blue-sky thinkers may not want to deal with the myriad of details on how to manage the events being generated operationally, but could learn something from this exercise...
The cloud has hit the mainstream. Businesses in the United States currently spend more than $13 billion on cloud computing and managed hosting services, and Gartner projects that by 2015, end-user spending on cloud services could be more than $180 billion worldwide. It is estimated tha...
In my recent article, “Software Quality Metrics for your Continuous Delivery Pipeline – Part III – Logging,” I wrote about the good parts and the not-so-good parts of logging and concluded that logging usually fails to deliver what it is so often mistakenly used for: as a mechanism for...
Despite all the news about hackers infiltrating major corporations, most businesses continue to leave themselves woefully unprotected. Some surveys estimate more than 70% of businesses perform vulnerability tests on less than 10% of their cloud, mobile and web applications. A majority ...
Followers of the Enterprise File Share and Sync Market (EFSS) will have noticed a flurry of announcements in the last few weeks. In particular: SAP and OpenText collaborated with Tempo Box; Egnyte outlined it would leverage Google's Storage; Box purchased Stream as well as announcing ...
The threats facing network operators all over the world, spanning service providers, enterprises, cloud and hosting providers and mobile operators alike, are by no means stalling. While optimism is always the name of the game, we know all too well in security that trying to keep pace w...
Like most maturing industries, standards are required to achieve broad adoption and maximum value. For the cloud, in particular cloud Infrastructure as a Service (IaaS) offerings like Amazon Web Services and Rackspace Cloud, it’s time for a standard method for presenting these services...
Incident response involves addressing and managing the security events on a network and the execution of proper responses to those events. The end game is to limit the damage and reduce recovery time and costs. This is achieved with the implementation of an incident response plan tha...
An expected deluge of data and information about patients, providers, outcomes, and needed efficiencies is pushing the healthcare industry to re-evaluate interoperability, security and the ability to adapt rapidly to the lessons in the data. The means of enabling Boundaryless Informat...
If your organization’s got a lot riding on the continued security of its confidential or proprietary data, then you need to stay informed on the threats and how to address them. One of the most worrying threats of late, especially when it comes to cloud data security, is government spy...
The online world has become a dangerous place. According to a survey, 90 percent of all companies fell victim to a security breach in the last twelve months. Hacking and advanced persistent threats (APTs) have rendered the two-factor authentication token, now over 20 years old, essenti...
A newly established firm sent out some basic information collateral to introduce itself this summer – and a new type of business model would seem to be emerging. The company here in question described itself as a non-integrated silo-based business that was disparately fragmented into ...
When Swedish communications services provider TDC needed network infrastructure improvements from their disparate networks across several Nordic countries, they needed both simplicity in execution and agility in performance. Our next innovation case study interview therefore highlight...
As a Product Manager with deep technology roots I always enjoy reading HighScalability.com. While many of the articles are technical case studies, there are frequently good business discussions as well. The other day, I read an article on data monetization, Data Doesn’t Have to be Free...
The introduction of the Cloud has enabled the fast and agile data recovery process which is effectively more efficient than restoring data from physical drives as was the former practice. How does this impact Backup & Recovery, Disaster Recovery and Business Continuity initiatives? Cl...
What inspired this piece is “Complicating the Cloud,” a recent, insightful article by industry guru Jeff Kaplan. Kaplan makes a number of trenchant points, many of them coalescing around the idea that the vendor community has a vested interest in complexity. That meshes with my beli...
Ensuring a safe work environment can be accomplished when individuals work in either a government or private-sector office, but it becomes exponentially more complicated when employees are mobile, traveling from one job or worksite to another. While many organizations implement mobile ...
The era of Big Data is upon us. The volume, variety and velocity of data now being generated is unprecedented in human history. This poses a challenge for those tasked with data integration: how can we manage all this data, particularly across distributed data centers around the world?...
In a recent survey of IT pros, not only did cloud computing rank as a top three technology both as most disruptive and as most significant to business over the past three to five years, but it ranked as the number one technology investment most needed for businesses to remain competiti...
In Part IV, we wrapped up our discussions on bandwidth, congestion and packet loss. In Part V, we examine the four types of processing delays visible on the network, using the request/reply paradigm we outlined in Part I. From the network’s perspective, we allocate the time period bet...
Another week, another cloud storage price drop. The barrier of price is slowly melting away as the cloud storage wars rage and prices drop into the pennies per gigabyte per month. Not familiar with the price wars? Here’s an abridged version: In 2013, Amazon Web Services (AWS), Microso...
How do we blaze a better path to a secure mobile future? How do we make today’s ubiquitous mobile devices as low risk as they are indispensable? As smartphones have become de rigueur in the global digital economy, users want them to do more work, and businesses want them to be more pr...
Windows XP is living on borrowed time: Microsoft officially ended extended support for it on 8 April 2014. It was inevitable, but now many companies and organizations across the world face the unenviable task of removing XP from their organizations without disrupting regular business a...
In Part 1, I looked at what could be behind Facebook’s acquisition of WhatsApp and subsequent purchase of Oculus Rift. How are these seemingly different acquisitions related? There is no question that both Facebook and Google are in a race to build the next-generation computing/communi...
We know that losing packets is not a good thing; retransmissions cause delays. We also know that TCP ensures reliable data delivery, masking the impact of packet loss. So why are some applications seemingly unaffected by the same packet loss rate that seems to cripple others? From a pe...
We talk a lot about so-called ‘business transformation’, but what do we really mean by this expression and how does it change the way (as workers) now operate on the shop floor? Read any history of the industrial revolution and you will understand the massively impactful swings that o...
As we become more connected online, the old system of site-specific passwords and user identity are no longer equal to the task. We need to find new ways of providing identities and authorization.
In Part II, we discussed performance constraints caused by both bandwidth and congestion. Purposely omitted was a discussion about packet loss – which is often an inevitable result of heavy network congestion. I’ll use this blog entry on TCP slow-start to introduce the Congestion Windo...