Welcome!


Despite the data privacy protections supposedly conferred by regulations like HIPAA and HITECH, consumers’ confidential health and personal information is still not safe enough. That’s the lesson to be learned from Franklin, TN-based Community Health Systems’ (CHS) August 18 regulatory...
Application Performance Management (APM) has been bred with all the right elements to give us the insights we need to see the health of our applications. Similar to your most trusted watch dog, it alerts us to anomalies when events occur, providing awareness to the environment that onl...
How do you know when a technology has become mainstream? A good clue may be when politicians start talking about it on the campaign trail and with mainstream media. David Cameron, the UK prime minister, was the latest, indicating that the world was now on “fast-forward” with the Intern...
In my recent article, “Software Quality Metrics for your Continuous Delivery Pipeline – Part III – Logging,” I wrote about the good parts and the not-so-good parts of logging and concluded that logging usually fails to deliver what it is so often mistakenly used for: as a mechanism for...
This year like last year, XebiaLabs polled Fortune 1000 companies in banking, manufacturing, healthcare, government and IT, interviewing DevOps teams and everyone from QA to C-level suites. More than 1,000 people were asked to share their perspectives on software delivery trends. Last...
Can a postmortem review help foster a curiosity for innovative possibilities to make application performance better? Blue-sky thinkers may not want to deal with the myriad of details on how to manage the events being generated operationally, but could learn something from this exercise...
Companies that until recently had never heard of the Internet of things (IoT) are now excited to find that they’ve been IoT players all along. Businesses involved in home automation, security services, vehicle tracking and health monitoring to name a few have been around for a while. T...
General Electric (GE) has been a household name for more than a century, thanks in large part to its role in making households easier to run. Starting with the light bulb invented by its founder, Thomas Edison, GE has been selling devices (“things”) to consumers throughout its 122-year...
If you work in technology, you’d have to have been under a rock to have not heard about Docker. In a nutshell, Docker provides a lightweight container for code that can be installed onto a Linux system, providing both an execution environment for applications and partitioning to secure...
I just read through “The New Kingmakers,” a thought-provoking book by Stephen O'Grady of the small, but influential, analyst firm Redmonk. The thesis of the book is straightforward: technology changes have moved developers, previously of little importance within the world of IT, to a c...
Consider that the Age of the Cloud has precipitated a new agent concept which is lightweight, deploys quickly, and goes in virtually undetected with zero configuration. These agents are built with a survival mode in mind including a self-healing option for hands-free maintenance. At t...
The traditional approach to application delivery – do one big revision or introduce a major new feature over a short period – is rapidly being replaced by a new, faster and smarter approach, Continuous Delivery (CD). The core idea of CD is to create a repeatable, reliable and increment...
Isn’t it great to treat your girlfriend by cooking her favorite omelet every morning? In theory, sure, but in reality, chances are most of the time you end up with darn scrambled eggs instead. Let’s face it: you’re a great boyfriend but a terrible cook. Believe it or not, this is quite...
Target. Home Depot. Community Health Systems. Nieman Marcus. Their names have been all in the news over the past year, though probably not in a way they would like. All have had very public data breaches affecting anywhere from 350,000 (Nieman Marcus) to 4.5 million (Community Health S...
Labor market analytics firm Wanted Analytics recently assessed the market for technology professionals and found that demand for people with proficient levels of Hadoop expertise had skyrocketed by around 33% since last year – it is true, Hadoop is hard technology to master and the lab...
For retailers everywhere, it’s a challenging new day. Security threats are a constant – both inside their four walls and out. The big security breaches we hear about on the news; the smaller ones sometimes not. But their impact remains costly to us all. The need for mobility, rapidly e...
The IT infrastructure of modern businesses require a number of seemingly never-ending cycles to track assets. As these assets go through different stages of usefulness or functionality, IT teams must constantly manage the process, which takes them away from other more important tasks a...
for storage and computing operations at scale. These capabilities allow organizations to store massive amounts of data, in disparate formats, and perform both batch and real-time analyses upon them. The forces driving Big Data into the mainstream are the ever-decreasing cost of storage...
Goodness there is a lot of talk about cloud computing. This ‘talk and chatter’ is part of the problem, i.e., we look at it, we prod it and we might even test it out – but do we get down to practical implementation, deployment and (if you happen to be a fan of the term) actual cloud ‘ro...
Are you developing or hosting PHP applications? Are you doing performance sanity checks along your delivery pipeline? No? Not Yet? Then start with a quick check. It only takes 15 minutes and it really pays off. As a developer you can improve your code, and as somebody responsible for y...
Have you ever deployed a change to production and thought “All went well – Systems are operating as expected!” but then you had to deal with users complaining that they keep running into errors? We recently moved some of our systems between two of our data centers – even moving some c...
I would say that only one out of a million exceptions thrown in an application actually makes it to a log file – unless you run your application in verbose logging mode – Do you agree? No? Here is why I think that is: because most exceptions are handled by your code or by the framework...
In my role as technology evangelist I spend a lot of time helping organizations, big and small, make their IT systems better, faster and more resilient to faults in order to support their business operations and objectives. I always find it frustrating to “argue” with our competitors a...
How often do you deploy new software? Once a month, once a week or every hour? The more often you deploy the smaller your changes will be. That’s good! Why? Because smaller changes tend to be less risky since it’s easier to keep track of what has really changed. For developers, it’s ce...
Last week, while in San Francisco, I used the Uber app and service four times. All four experiences were great, although one of the drivers stopped for 30 seconds and then left as I was walking up to the car. He must have realized I was a blogger. None the less, the next car was just a...
With the increasing complexity of software, organizations are more cognizant than ever about the potential pitfalls of including open source code in their products. Below are some quick tips to continue leveraging open source code, while keeping your manager and legal department happy.
Content Delivery Networks (CDNs) are a traditional mechanism for both improving the delivery speed of a web site while also reducing the network load on the origin servers that provide the web site. The CDN accomplishes these two goals by offloading static content from the origin web s...
These days, implementing automatic deployment for .NET web projects is easier than ever. Drastic improvements started in Visual Studio 2010 when basic deployment strategies and tools were incorporated into VS itself. Yet, documentation was quite poor at that time, so you had to scour t...
The Open Group and BriefingsDirect recently assembled a distinguished panel at The Open Group Boston Conference 2014 to explore the practical implications and limits of the Internet of Things. This so-called Internet of Things means more data, more cloud connectivity and management, a...
I write and study often on the subject of digital transformation - the digital transformation of industries, markets, products, business models, etc. In brief, digital transformation is about the impact that collected and analyzed data can have when used to enhance business processes ...
I had the privilege of attending a mobile security event this week and speaking with many experts on the matter. I am not a mobile security expert, so my role was to speak on mobile strategies and trends and to learn as much as I could. What did I learn? I learned the difference b...
In 2013, there was increasing demand for cloud computing, with enterprise after enterprise committing to a rapid and vigorous redeployment of resources toward cloud-based solutions. Gigaom Research conducted surveys of both mainstream and leading-edge users in the second quarter of 201...
Finally a book from an industry leader that has the guts to write about the real world of Agile software development. If I had to pick one word to describe this book, it would be 'truth'. This book is going to raise the blood pressure of some of the Agilists out there. If you think ...
The key to securing your mobility is to understand how it is being used in your environment and what is potentially at risk. Taking stock of the mobile devices, applications and traffic in your network is critical to identifying how your data and resources are potentially vulnerable. ...
While server virtualization has unprecedented advantages, it has thrown some challenges as well. Prior to server virtualization, each application used to run on a dedicated server with dedicated storage connected through dedicated switch ports. Needless to say, this approach had multip...
GSN Games exploits big data to effectively uncover game-changing entertainment trends for their audience. Oh, and it changes corporate cultures, too. It's a shame when the data analysis providers inside a company get the cold shoulder from the business leaders because the data keeps p...
Waste Management's IT organization began rebuilding their quality assurance processes from the ground up by making the appropriate choices and investments in technology, such as in people and processes -- and their scorecard is very good. It's only been a few years since Waste Managem...
With $13 billion expected to be spent by American businesses alone in 2014, the cloud should no longer be considered an alternative IT model. The demand for hardware to run traditional infrastructures is in a nosedive. IBM is spending $1 billion this year, matching the amount it spent ...
One of the most appealing benefits of cloud deployment is the ease of use and the flexibility of adding or removing compute capacity. You can dynamically allocate resources based on the changing workloads, which give you the flexibility in managing your compute cost. AWS Auto Scaling ...
From the way legal teams prepare for trial to how they communicate with clients and other professionals, technology is quickly becoming an influential member of the practice. However, even in today’s technology-driven world, not all firms can label themselves tech savvy. To help those ...