Welcome!


From the Blogosphere

As the leader of Netuitive’s dedicated professional services team, I believe I work with some of the best and the brightest in the industry. My team is focused on enabling our IT analytics software to be delivered as a turnkey solution, and we have cut our teeth doing this at the world...
The title of this article seems unpleasant as it talks about serializing java object graph without the use of Serializable interface. It is true in case of Core Java. We know that to serialize a java bean we have to implement Serializable interface ( let us not consider the Externaliza...
This article provides an outline of java bean validation using javax annotations provided in Java EE 6 and Hibernate validator. As you know modern programming paradigm suggests validating a java bean with annotations. A java bean can be validated in many ways. You can refer to my earl...
Although often misunderstood, cloud computing ultimately relies on the same technological underpinnings as traditional server and storage options. While software, platforms and even infrastructure are farmed out to third-party providers, their ability to operate efficiently is constrai...
While movement to the cloud keeps accelerating, fears about security hang on. Let’s take a look at the most common myths about cloud security that might be holding businesses back from taking advantage of the flexibility and scalability of the cloud model. This is the piece of “common...
Daryl Taft’s article in eWeek reminded me that next month, on June 6th. IBM’s DB2 RDBMS product will celebrate its 30th. anniversary. This has a personal significance for me. I was part of the DB2 planning team then and on … May. 21, 2013 07:00 AM EDT  Reads: 2,843
In the coming years, big data will change the way organisations and societies are operated and managed. Big data however, is not the only trend that will impact significantly how organisations operate. Another major trend at the moment is gamification. Gamification will change the way ...
Without an enterprise-level automated solution for ensuring the integrity of APIs and API-driven composite applications, organizations risk: Brand erosion as faulty software drives away customers Time-to-market delays that diminish market share Exposure to legal liability associated...
Welcome to Java Certification Path. If you are reading this article, it means that you are thinking or have decided to take Java Certification. Let me start off by congratulating you on this decision to boost your career strength. To become a successful Java professional it is good to...
Have you heard of products like IBM’s InfoSphere Streams, Tibco’s Event Processing product, or Oracle’s CEP product? All good examples of commercially available stream processing technologies which help you process events in real-time. I’ve been asked what I consider as “Big Data” ver...
ViPR is not a technology creation developed in a vacuum instead includes customer feedback, wants and needs. Its core themes are extensible, open and scalable. What is ViPR addressing? IT and data infrastructure (server, storage, IO and networking hardware, software) challenges for t...
You know those conversations that you have more times than you can count? Well, I recently had one of those at Design West with a very bright software engineer. This poor guy had a number of experiences with static analysis tools that left him with the “compiler warning equivalence” im...
Are you AWS certified? Last week several reporters, including Gathering Clouds friend in the field Barb Darrow, analyzed Amazon’s recent announcement of its cloud certification program. Widely seen as a positive move for the company, the announcement does raise some questions. While ...
If you have been thinking how to choose your public cloud vendor you are not the only one. There are hundreds of offerings that you can choose from and comparing those can be a cumbersome exercise. Hence most of the people just run to the vendor (or technology) they are either most fam...
We so often hear about companies putting "customers first" that the very notion can seem trite. But when it comes to innovation, listening to and learning from your customers is an absolute imperative. At Gazzang, the company I work for, we have a mantra that borders on religious fanat...
As with most new exciting (read: hyped) technology there's always some initial fragmentation that occurs in the market. Everyone wants to have their fingers in the newest pie and from that comes what musicians call "variations on a theme." The melody is the same, but the harmony and ch...
My favorite and least favorite question I get is the same – “Can you help me build a business case and ROI for cloud computing?” Well, yes… and no. The issue is that cloud computing has such a massive impact on how IT is delivered that many of the metrics and KPIs that are typically u...
We often discuss the virtues of private and hybrid clouds, since so many companies utilize more complex clouds as they scale. But where public cloud is concerned, we thought we’d share some ideas for how to frame a smart approach to ensure that your public cloud is serving the needs of...
Even though today's crowning ceremony in Amsterdam enjoyed some modest sunshine, the temperatures across Europe are at an all time low. A more reliable indication that spring has started, are the annual Cool Vendor reports being published. For the first time this series includes a not...
BusinessSuccessWith cloud computing becoming the center of almost every new enterprise IT project, more and more startups decide to compete in the area. This raises the question: "Are they ready to fulfill the enterprise needs?" Forget the need to have one big customer. This can open f...
What does today's retail banking customer expect from a financial institution, and how can business technology be applied to enhance the overall experience. The latest results from the Cisco Customer Experience Report focused on the retail banking sector. The global report examined co...
Don't laugh or next week we'll talk fractals and tessellations and nature and tie that back to ERP. Somehow. Don't tempt me. I'm not kidding. The other day I was shopping (on-line of course, because you know, Internets) as I often do: I was putting things into my shopping cart and o...
Simply outsourcing your cloud technology isn’t where the benefits your company can access end. By leveraging your cloud provider for more than just the technology, you can gain a wealth of experience and know-how (read: tech support) that can help your business get more value from you...
Network perimeters are all but erased and traditional security strategies such as stacking don't adequately address the current needs of a modern enterprise. Many companies are still using strategies rooted in 2002 technologies and approaches. The new intelligence-based security model ...
If you’ve ever developed for an enterprise IT department, and had to please the end user, you know very well that they don’t care about what your technical limitations are, they care about getting a tool that helps them do their job better. Oh some will commiserate with you about your ...
Fraud is definitely top of mind for all banks. Steve Rosenbush at the Wall Street Journal recently wrote about Visa’s new Big Data analytic engine which has changed the way the company combats fraud. Visa estimates that its new Big Data fraud platform has identified $2 billion in poten...
Piston CTO Josh McKenty predicts a radical shift in the cloud computing space. Building off of his firm’s recent product launch, McKenty — who cofounded Piston in January 2011 — tells IT World that he expects to see a “giant explosion of businesses moving off Amazon Web Services.” Goin...
Here is an answer I wrote to my dear friend StorageBod’s latest piece on Object Storage. As my response turned out quite a bit longer than initially intended, I thought I’d post it here as well. Very nice blog post as usual. Let me sacrifice my first sunny afternoon of the year in Bel...
The convenience, efficiency and cost benefits cloud computing offers organizations has made moving healthcare data and records to the cloud make sense for hospitals, physicians and other healthcare providers. Security and data breaches are a concern for any industry utilizing the cloud...
With the increasing prevalence and acceptance of the cloud as a viable alternative to on-premise IT, today’s IT organizations are faced with a wide range of options. In fact, had you just woken from a five-year slumber, you might find the available array of cloud service options quite ...
Now that would be a fun amusement park ride – the Crime Coaster – with the hills and valleys designed based on crime statistic charts. You can even get a digital photo of yourself as you fly thru the Tunnel of Turmoil. Muuhahahahahahahahahah! With all the dire warnings of how cyber...
The new and enhanced HIPAA omnibus standard brings an interesting question with regards to cloud security and the shared responsibility model in IaaS clouds. Since the release of the HIPAA omnibus, we’ve received many questions around “BAA” agreements, and how the responsibility split ...
Yes, I'm about to say something that's on the order of heresy in the church of virtualization. But it has to be said and I'm willing to say it because, well, as General Patton said, "If everyone is thinking the same... someone isn't thinking." The original NFV white paper cited in t...
Cost, tech, service: Which do you value most in a cloud solution? Whenever you go shopping there are usually a few factors that determine what you buy and what you pass up. One is obviously money (though we all wish this wasn’t the case). Price can be a deciding factor, but often we ...
Riding the current software defined data center (SDC) wave being led by the likes of VMware and software defined networking (SDN) also championed by VMware via their acquisition of Nicera last year, Software Defined Marketing (SDM) is in full force. HP being a player in providing the c...
It is not uncommon today to click an interesting link you see on Facebook only to be confronted by a "social loginwall". If you aren't familiar with that term it's probably because I just made it up to describe the use of CSS overlays to "hide" the content you want with a second overla...
According to recently conducted research, organizations using ERP software solutions were receiving less than 50 percent of the benefits promised to them prior to implementation. Yet, the main reason for failure in most of these situations was attributed to poor software selection. Her...
There’s nothing COMMON about the operational picture any more! We are currently in the throws of change – shifting a legacy force structure capable of fighting two strategic wars at one time, to a leaner, more agile force projecting power through “expeditionary warfare”. As we adjust ...
Planning to deploy or migrate an application to a cloud environment is a big deal. In my last post we discussed the value of using real business and IT requirements to drive the justification of using a cloud architecture. We also explored the importance of using monitoring information...
Red Hat Enterprise Virtualization (RHEV) is proving itself to be a major player in the virtualization marketplace. With each new release, the technology offers more robust features, greater control, increased flexibility and more. One of the key factors in how well Red Hat Enterprise V...