Welcome!


The era of Big Data is upon us. The volume, variety and velocity of data now being generated is unprecedented in human history. This poses a challenge for those tasked with data integration: how can we manage all this data, particularly across distributed data centers around the world?...
In Part 1, I looked at what could be behind Facebook’s acquisition of WhatsApp and subsequent purchase of Oculus Rift. How are these seemingly different acquisitions related? There is no question that both Facebook and Google are in a race to build the next-generation computing/communi...
We talk a lot about so-called ‘business transformation’, but what do we really mean by this expression and how does it change the way (as workers) now operate on the shop floor? Read any history of the industrial revolution and you will understand the massively impactful swings that o...
In a recent survey of IT pros, not only did cloud computing rank as a top three technology both as most disruptive and as most significant to business over the past three to five years, but it ranked as the number one technology investment most needed for businesses to remain competiti...
Another week, another cloud storage price drop. The barrier of price is slowly melting away as the cloud storage wars rage and prices drop into the pennies per gigabyte per month. Not familiar with the price wars? Here’s an abridged version: In 2013, Amazon Web Services (AWS), Microso...
How do we blaze a better path to a secure mobile future? How do we make today’s ubiquitous mobile devices as low risk as they are indispensable? As smartphones have become de rigueur in the global digital economy, users want them to do more work, and businesses want them to be more pr...
We know that losing packets is not a good thing; retransmissions cause delays. We also know that TCP ensures reliable data delivery, masking the impact of packet loss. So why are some applications seemingly unaffected by the same packet loss rate that seems to cripple others? From a pe...
In Part IV, we wrapped up our discussions on bandwidth, congestion and packet loss. In Part V, we examine the four types of processing delays visible on the network, using the request/reply paradigm we outlined in Part I. From the network’s perspective, we allocate the time period bet...
As we become more connected online, the old system of site-specific passwords and user identity are no longer equal to the task. We need to find new ways of providing identities and authorization.
In Part II, we discussed performance constraints caused by both bandwidth and congestion. Purposely omitted was a discussion about packet loss – which is often an inevitable result of heavy network congestion. I’ll use this blog entry on TCP slow-start to introduce the Congestion Windo...
Windows XP is living on borrowed time: Microsoft officially ended extended support for it on 8 April 2014. It was inevitable, but now many companies and organizations across the world face the unenviable task of removing XP from their organizations without disrupting regular business a...
In the pharmaceutical industry, the drug development clock is ticking at the rate of warp-speed. As a result, companies are constantly looking for solutions to help them accelerate time to market – and many are realizing that implementing a cloud-based information management system can...
When we think of application performance problems that are network-related, we often immediately think of bandwidth and congestion as likely culprits; faster speeds and less traffic will solve everything, right? This is reminiscent of recent ISP wars; which is better, DSL or cable mode...
If you work in technology, you’d have to have been under a rock to have not heard about Docker. In a nutshell, Docker provides a lightweight container for code that can be installed onto a Linux system, providing both an execution environment for applications and partitioning to secure...
Indeed the anticipated and most likely approach for organisations next year will not be a decision of whether to utilise a large existent infrastructure investment or a scalable on demand public cloud service but rather the most effective strategy to leverage both. Despite all the mar...
Monitoring application performance on the surface and the currents below is a great way to build a performance baseline and provide application fluency. Ironically, the deep dive tools sets in place today still may not provide all the insight you need to quickly resolve anomalous behav...
As the number of companies adopting cloud-based solutions continues to increase, security remains top of mind for vendors, companies and their customers. Organizations of all types and sizes are opting for cloud e-signatures for many reasons including speed-to-market, agility and a low...
How often have you heard someone say ‘We’re moving to the cloud’ or ‘It’s all in the cloud now’? Going to the cloud has become part of the vernacular in everyday conversation. The cloud is the place to go, the place to be. If you haven’t gone to the cloud you are being left behind. The...
As a network professional, one of your newer roles is likely troubleshooting poor application performance. For most of us, our jobs have advanced beyond network “health,” towards sharing – if not owning – responsibility for application delivery. There are many reasons for this more jus...
Dromology - the science (or logic) of speed. This is the definition developed by Urbanist and Professor Dr. Paul Virilio's. He believed that, "a thing that acts with speed quickly comes to dominate that which is slower." I highlighted this statement in his paper when I read, Speed a...
Technology is moving at a blistering pace. In today’s era of data-centric, complex environments where the lines between business and technology are becoming increasingly blurred, organizations are moving beyond virtualization to cloud computing to meet new challenges and keep up with t...
The advent of the application programming interface (API) economy has forced a huge, pressing need for organizations to both seek openness and improve security for accessing mobile applications, data, and services anytime, anywhere, and from any device. Awash in inadequate passwords a...
When Facebook decided to invest a cool $19 billion ($16 billion upfront) for messaging app WhatsApp the entire world was bound to take notice. Telecommunications types, in particular, were keen to understand how this latest move would impact them as mobile operators have been feeling t...
The fundamental mechanics of business have changed. Well, they haven’t quite. The basic laws of supply and demand still govern the economic principles inside which firms in all industries bring goods and services to market inside a common monetary system on an international level. ...
We’ve written before about some of the high-profile data breaches occurring in recent months – security breaches that cause some to question the safety of the cloud to store and/or process sensitive data. It seems these stories are reported with increased regularity (sometimes delayed,...
Cloud has been on a lot of boardroom agendas for quite a while, but typically those discussions have focused on using cloud around edge applications – expenses management, human capital management or perhaps customer relationship management. However, as the cloud cover extends to busin...
Disruptive innovation is all very fine and good, but legacy technology and disruption don’t mix. That old gear is just too brittle and important to mess with, right? That’s when it hits you: it’s time to go rogue. Adjectives like "swashbuckling" and "romantic" rarely if ever apply to...
The Mass Technology Leadership Council (MassTLC) recently hosted the The Value of Things (VoT): MassTLC IoT Conference in Waltham, Massachusetts. There was surprisingly little disagreement between the various panelists on the future of the Internet of Things (IoT), but probably not in ...
The supply chain is evolving, and buyers need to analyze and predict, but also to manage risk. When Capgemini's business information management (BIM) practices unit needed to provide big data capabilities to its insurance company customers, it needed to deliver the right information t...
My colleague Peter Rogers shares how his team is developing strategies for merging creative forces with real-world projects and delivering rapid beta products. This is a big challenge as many of you know! Enjoy! I begin with the following question: What happens when Creativity meets T...
make it a lot easier and more fun to develop apps for both iOS and OS X. That’s in contrast to the current language, Objective-C, which is somewhat antiquated and considered by many to be difficult to use. Although Swift is easier to use, we’re sure that there will be issues like crash...
Our discussion comes to you from The Open Group Conference held on May 13, 2014 in Amsterdam, where the focus was on enabling boundaryless information flow. To learn more about making Open Platform 3.0 a business benefit in an architected fashion, please join moderator Stuart Boardm...
When focusing on one element of a SaaS provider to evaluate, it should not be the technology it is providing today but its commitment to finding new ways to succeed in the future. This kind of agility that goes beyond technology is why SaaS is so loaded with potential for entrepreneurs...
Developers are continually upping the ante by creating better, smarter and more valuable apps. However, these apps also have increasingly sophisticated data requirements, and the ability to take them to the next level may be stymied by an archaic approach to databases in which develope...
Did you read that Uber, the mobile application company, received $1.2 billion in additional VC investment this month? Why would investors be willing to invest so much? Investors believe that Uber is among a group of mobile app companies capable of disrupting entire industries. They are...
“Veeam Cloud Connect is about being able to connect service providers with Veeam end users and Veeam customers and giving Veeam customers a quick, easy and secure way to get their backup files up to the cloud,” explained Doug Hazelman, VP, Product Strategy, and Chief Evangelist at Veea...
In my last blog, I looked at the evolution of technology as we move to virtualization. What will this new development mean for business models, industry developments and industry players? Virtualization means that everything will run on commodity hardware – the same as the rest of the...
In my role as technology evangelist I spend a lot of time helping organizations, big and small, make their IT systems better, faster and more resilient to faults in order to support their business operations and objectives. I always find it frustrating to “argue” with our competitors a...
As an individual I can decide which platform I would like to target with my shiny new application, but when working for a company we have to target both industry leaders at the same time. Although I like a good challenge, I am really glad the mobile world now only consists of iOS and A...
Implementing high performance in enterprise storage is a constant battle to find and eliminate the next system bottleneck. Normally this alternates between limits of the underlying media and the computational overhead of metadata management, but choosing the wrong approach to deduplica...