Welcome!


The Open Web Application Security Project (OWASP) is focused on improving the security of software. Their mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks and their OWASP Top 10 ...
Science fiction films abound that warn of machines taking control and wreaking havoc on the human race. “2001: A Space Odyssey,” “War Games” and “I, Robot” are just a few of the titles that propose what might happen if we hand too much power over to intelligent, interconnected machines...
As software consumers, we’ve become spoiled with the number of choices there are when it comes to open source and freeware. There are so many technologies and vendors out there shouting for attention that you don’t often have to look long to find a usable solution. When you’re on the o...
“Everyone loves standards so much, they each want one of their own.” This bit of wisdom is one of the oldest chestnuts in the tech business. The Internet of Things will not change it. In that context we saw the creation of the Open Interconnect Consortium (OIC), with Intel, Atmel, B...
The agreement between IBM and Apple to collaborate on mobility and Big Data will certainly rank as one of the big stories of the year in global enterprise IT. In addition to Apple's devices and IBM's custom apps, an absolute key to this deal will be telecommunications. As we all know,...
I write and speak often on the need to have a thoughtful Code Halo strategy in addition to your mobile and digital strategies. Code Halos is the term for the information that surrounds people, organizations, and devices. Many companies consider Code Halostrategies only for marketing, s...
I was asked by Mr. Peter Hastings (NH DoIT Commissioner) about my understanding and knowledge of "End to End Solutions". I have witnessed these solutions before but I wanted to find a good definition. So, I began my research and found this definition: One supplier or one company that c...
The purpose of this article is to describe the steps involve to configure Datapower service for the Database communication. The service will parse the incoming parameters from the request, construct a SQL query string and returns the data from the Database, based on the constructed que...
APIs are transforming businesses to extend the reach of their information systems and data. In technical terms, APIs are rather finite, allowing two software applications to exchange data and execute procedures. Yet their business impact is so great that API management requires a far f...
There seems to be two main groups of thought as to when wearable technology will become mainstream. The first group are those that believe that wearable technology is here today and are engaging both hobbyists and future entrepreneurs in building all parts of the ecosystem now. These p...
Virtualized and private cloud infrastructures are all about sharing resources – compute, storage and network. Optimizing these environments comes down to the ability to properly balance capacity supply and application demand. In practical terms, this means allocating the right amount o...
Application Performance Management (APM) grew out of the movement to better align IT with real business concerns. Instead of monitoring a lot of disparate components, such as servers and switches, APM would provide improved visibility into mission-critical application performance and t...
Computer security has become much harder to manage in recent years, and this is due to the fact that attackers continuously come up with new and more effective ways to attack our systems. As attackers become increasingly sophisticated we as security professionals must ensure that they ...
Recently, I was asked by Mr. Peter Hastings (NH DoIT Commissioner) to take a look at cloud development concepts and see if there was any benefit for our development teams across the enterprise. After some investigation I could see that if all users/developers were on one server that co...
The killer in any IT operation is unplanned work. Unplanned work may go by many names: firefighting, war rooms, Sev 1 incidents. The bottom line is that Operations must stop whatever planned work it was doing to manage this drill. This means little or no normal work is being accomplish...
One of the first initiatives for secure booting has been the Unified Extensible Firmware Interface (UEFI) Initiative. This is a superior replacement of the Basic Input Output System (BIOS) and a secure interface between the operating system and the hardware firmware. The UEFI Initiat...
SAP's Mobile Platform allows mobile developers to create a wide variety of different styles of enterprise mobile apps, and supports both native and HTML5/Javascript-based architectures. This article compares and contrasts the four major programming APIs that allow developers to write ...
Every business acknowledges that network security is critical. But how do you quantify the business value that a secure network provides? And how does an enterprise evaluate and justify investing in network security products like next-generation firewalls, intrusion prevention systems ...
Today’s end users demand highly satisfying and interactive web experiences, such as automatically populated search suggestions and dynamic menus. To make applications more engaging, technologies like AJAX (Asynchronous JavaScript and XML) have emerged. AJAX works by dynamically display...
Organizations have started to see the value in discovering and harnessing the potential of the typically large amounts of information as well as data they generate and consume on a regular basis, all in ways that help their organizational goals and associated business models perform we...
This chapter introduces and describes several of the more common foundational cloud architectural models, each exemplifying a common usage and characteristic of contemporary cloud-based environments. The involvement and importance of different combinations of cloud computing mechanisms...
Triggered by current expected load projections for our community portal, our Apps Team was tasked to run a stress on our production system to verify whether we can handle 10 times the load we currently experience on our existing infrastructure. In order to have the least impact in the ...
It’s clear that cloud computing has transformed the enterprise IT landscape, from the computing infrastructure layer up through enterprise software, as companies move to leverage more efficient and cost-effective service-delivery models and bring new cloud-based products and services t...
Service Component Architecture (shortly referred as SCA) is a technology for creating services from components. SCA is a set of OASIS standards and part of it is developed with the collaboration of vendors from open source community, referred as “OSOA” Open SOA. SCA helps to build syst...
Things are moving fast for the Ruby language instrumentation in TraceView. We already support tracing of memcache-client, memcached, dalli, mongo, moped, mongoid, mongomapper, cassandra, ActiveRecord (postgres, mysql, mysql2) plus more. Most recently we added support for Rack and Resqu...
Over the last couple of months I have been talking to more and more customers who are either bringing their Hadoop clusters into production or have already done so and are now getting serious about operations. This leads to some interesting discussions about how to monitor Hadoop prope...
We’re pleased to announce a new Python instrumentation version — Oboeware 1.1! We’ve added a few new libraries recently, but we’re really excited about the new customization API we’ve introduced in this version. More than just a Python bump, this is the first package we’re releasing w...
Abstractness is a measure of the rigidity of a software system. Higher the abstraction, lower the rigidity (or greater the flexibility) and vice versa. And the stability is a measure of tolerance to change as in how well the software system allows changes to it without breaking it. Thi...
Both Paramount and Universal celebrated their 100th anniversary last year, which is a long time to be in the movie business. Arguably, both have made some good, some great, and some bad movies. But, during this year’s Super Bowl, Paramount showed Universal how to design a ‘fast and fur...
A component is a reusable software entity. A component is a deployable piece of software that can be independently developed and maintained. In the previous article –Componentizing a Monolithic Application in Java, we discussed the need for componentizing applications to get the benefi...
Big Data is all the rage. And at first glance, the Big Data variety, volume, velocity and value challenges may seem extraordinarily difficult. Proven technologies, such as data virtualization, provide proven approaches to addressing these “big” challenges. So if Big Data is on your ag...
A component is a reusable software entity that is developed and deployed independently. Component based software development has many architectural advantages. In the previous article Componentizing a Monolithic Application in Java, we learnt the need for componentizing applications fo...
After you have secured your private electronic information using encryption and learned how to encrypt and digitally sign files for others, how do you extract the information and determine who encrypted the file? Asymmetric public/private key encryption allows you to decipher the infor...
Identity management just isn’t what it used to be. Gone are the days when knowing who had access to what was simply enough. In today’s world of increasing government and industry regulation; networked communications and collaboration; and pervasive mobility, the requirements have funda...
Now that you have the JavaScript skills that you need for using jQuery, you’re ready to learn jQuery. So, in this excerpt, you’ll learn a working subset of jQuery that will get you off to a fast start. When you complete this section, you’ll have all the jQuery skills that you need fo...
In today’s environment, information security is crucial for everyone. Security needs vary widely from protecting social security numbers to guarding corporate strategy. Information espionage can occur at all levels. A human resources employee or manager takes employee personnel files h...
Using OpenFlow to extend software-defined networking (SDN) to the optical layer is a compelling prospect for enterprises seeking to achieve joint orchestration of information technology (IT) and network resources for cloud services, to virtualize the network and to more simply manage i...
Component-oriented development has many architectural advantages. In spite of this, many developers tend to solve problems the monolithic way on the first go. This article demonstrates how a monolithic design can be modified to achieve component-based design. During this conversion pro...
The Java Platform Enterprise Edition 7 specification early draft is available for download. All these years the focus was to introduce several APIs and technologies as part of the platform to make it more powerful, simple and complete. This is the first time the focus has shifted in a ...
Increasingly organizations are looking to tap the collective power of social, mobile and cloud technologies. We asked Ric Telford, IBM VP of Cloud Services, to share his perspective on the trend in light of IBM's new social business software including SmartCloud Docs, a cloud-based off...