Welcome!


From the Blogosphere

About a year ago we tuned into “the need for speed” and how a concept like "serverless computing” was increasingly catering to this. We are now a year further and the term “serverless” is taking on unexpected proportions. With some even seeing it as the successor to cloud in general or...
I moderated a panel of three CIOs last Sunday at the Solix Empower conference on the subject of data-driven enterprise. The three CIO’s came from different industries. Marc Parmet of the TechPar group spent many years at Avery Dennison after stints at Apple and IBM. Sachin Mathur leads...
Since cloud computing has made big leaps in the past few years by emerging as a conventional business tool, several strategies have consequently surfaced. These myths aren't necessarily as risky as they were initially presented to be, but they certainly affect our methods of approachin...
ReactJS is a well-known open-source JavaScript library which has shown considerable growth and immense popularity in the recent years. Find out how to build a mobile app with React and some tips from Erminesoft tech team.
Modern programming languages tend to separate the programmer from memory management; Java programmers don't have to deal with pointers; they just declare variables and let the built-in garbage collector do its thing. These garbage collectors are smart, but not perfect; they typicall...
Companies are migrating infrastructure to the cloud in order to achieve advantages and agility that they need to remain competitive. However, they may have difficulty achieving one extremely important benefit of cloud computing as they attempt to run their MySQL databases in the cloud ...
In the era of microservices and cloud-native applications, Software Development Lifecycle (SDLC) is going through a major transformation. The combination of containers and continuous integration and deployment (CI/CD) is enabling rapid deployment of software like never before. And thou...
Node.js and io.js are increasingly being used to run JavaScript on the server side for many types of applications, such as websites, real-time messaging and controllers for small devices with limited resources. For DevOps it is crucial to monitor the whole application stack and Node.js...
One of the many questions that companies face when introducing new enterprise systems either to provide new functionality or incorporate legacy systems from a merger or acquisition is "How do we identify and manage access rights?" Not only do new access approval processes need to be e...
This is a no-hype, pragmatic post about why I think you should consider architecting your next project the way SOA and/or microservices suggest. No matter if it’s a greenfield approach or if you’re in dire need of refactoring. Please note: considering still keeps open the option of not...
It's been a busy time for tech's ongoing infatuation with containers. Amazon just announced EC2 Container Registry to simply container management. The new Azure container service taps into Microsoft's partnership with Docker and Mesosphere. You know when there's a standard for containe...
Cloud computing is now entering adolescent. With all the early adopters now swimming in the cloud pool with that “I told you so” smug, fast followers are just barely beating the early majority. The gold rush to cloud is also driving the IT herd to get cloud computing training. Traini...
A little over two years ago, I wrote about the ongoing cloud wars with all of the 800lb gorillas in the room jockeying for position. At the time, IBM and Amazon were having what equated to a public cage match battle over a cloud contract with the CIA (IBM Steps back from CIA deal) as w...
While API virtualization is already over a decade old, many developers, testers, and decision-makers still misunderstand it. Virtual APIs create an environment that teams can use to mimic the characteristics of the production environment and create simulated responses from all APIs th...
In this blog I’ll show you how to guard routes in Angular 2 Router (currently at 3.0.0-beta.2). Let’s consider some scenarios that require a certain validation to be performed to decide if the user (or a program) is allowed to navigate to or leave the route: Allowed to open the route...
Forging a viable business technology strategy for today’s global networked economy is a high priority for most forward-thinking CEOs across the globe. Their guidance to CIOs is to create the fusion between existing IT infrastructure and modern cloud services. Moreover, the shift to a H...
Tapjoy’s data-driven business of serving 500 million global mobile users - or more than 1.5 million add engagements per day, a data volume of a 120 terabytes - runs with extreme efficiency. The next BriefingsDirect Voice of the Customer big data case study discussion examines how mobi...
The age of computers is over. You are now living in the age of intelligent processing by just about everything else. Like vacuum tubes and tape drives, desktops and laptops are on their way to becoming odd relics of a distant age, if people remember them at all. That may sound a bit ex...
IDC estimates that the digital universe is doubling every two years. That means the need for data storage is increasing at the same rate. This exponential demand is no match for traditional vertical-scaling storage architectures. The resulting bottlenecks significantly reduce performan...
Machine learning, cloud services, and artificial intelligence-enabled human agents are all combining to change the way that companies can order services, buy goods, and even hire employees and contractors. To learn more about how new trends are driving innovation into invoicing and s...
The need to add more features on shorter release cycles is ubiquitous. At some point we will reach the threshold of gaining efficiencies and quality will begin to degrade. There is some evidence that we’ve reached and crossed that threshold already. In the late 1960's the National Sch...
Distributed Denial-of-Service (DDoS) attacks have become the primary threat to the availability of networks and online services and the peak attack sizes have grown by a factor of more than 50 over the last 10 years. Today, botnets and easy-to-use tools for launching DDoS attacks have ...
As more emphasis is placed on user experiences and the application of consumer-like processes in business-to-business (B2B) commerce, a softer side of software seems to be emerging. The next BriefingsDirect technology innovation thought leadership discussion focuses on new user exper...
Most business people only select enterprise grade software once or twice during their entire lifetimes, if at all. Companies hire consultants to help with the Request for Proposal (RFP) and to guide them through the search process. Selection teams create extensive RFPs that cover the m...
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how yo...
Big Data automation can mean writing dozens of scripts to process different input sources and aligning them in order to consolidate all this data and produce the required output. Why exactly do you need Big Data for your enterprise projects? Many industry observers have been noting th...
The pace of technology today means organizations are increasingly tasked with delivering applications that are fast, efficient, and capable of doing more than ever to keep up with the demands of the business. They’re looking to improve existing applications and add new ones. But how ca...
Software components that were once good can sour instantly when new vulnerabilities are discovered within them. When that happens, the bears are coming, and you have to respond quickly. Two men are walking through a forest. Suddenly, they see a bear off in the distance, running toward...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy...
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this trans...
While there has been much ado about interoperability, there are still no real solutions, same as last year and the year before that. The large EHR vendors who continue to dominate the market still maintain that interoperability is all but solved, still can't connect EHRs across the con...
The current version of Angular is Release Candidate 1. This version changed the way how the framework is distributed – it comes as a set of scoped npm packages now. Any imports of the Angular classes will be done from @angular instead of angular2, for example: import {bootstrap} from ...
Are you evaluating a software asset for a potential purchase, investment, decision making for the future, possible termination, etc? Here are some questions to consider. Is this a revenue generating asset? How much revenue does it generate? - Establishing the true business value of a...
In a crowded world of popular computer languages, platforms and ecosystems, Node.js is one of the hottest. According to w3techs.com, Node.js usage has gone up 241 percent in the last year alone. Retailers have taken notice and are implementing it on many levels. I am going to share the...
The cloud provides two major advantages to load and performance procedures that help testing teams better model realistic behavior: instant infrastructure and geographic location. Cloud-based load testing also lowers the total cost of ownership, increases flexibility and allows testers...
Performance is the elusive butterfly of API development. Everybody is intrigued with its beauty, yet few know how to capture it. In the old days, the approach of many shops to ensure a performant API was to create some code and then pass it over to the wall to QA to do load testing....
The purpose of this document describes how to generate a report for all the certificates using in the Java environment by using a simple shell script. The script checks all certificates that are stored in Keystores. The script generates a report in the form of CSV file and the report c...
The retail industry is transforming in today’s digital age. Consumer behavior keeps evolving and online spending is skyrocketing. In addition, retail customers are looking for a blended online and in-store experience and expecting brick-and-mortar stores and online channels to be integ...
Regulations around data sovereignty are forcing enterprises to consider new approaches to data location, intellectual property, and cloud collaboration services. As organizations move beyond their on-premises data centers, regulation and data sovereignty issues have become as importan...
In the digital arena, it’s impossible to avoid Dion Hinchcliffe. Perhaps you’ve seen one of his numerous keynotes or joined one of his workshops. Maybe you’ve read one of his books, Web 2.0 Architectures (with coauthors James Governor and Duane Nickull) or Social Business By Design (Pe...