Welcome!


Latest Articles from Java IoT
Tactics without strategy are dangerous. ~ Robert LeonhardIn the new book titled Code Halos the authors and Cognizant thought leaders, Malcolm Frank, Paul Roehrig and Benjamin Pring, propose that data is the new competitive arena for businesses.  Winners in this competition are tho...
The Internet of Things (IoT) promises to create new business models as significant as those that were inspired by the Internet and the smartphone 20 and 10 years ago. What business, social and practical implications will this phenomenon bring? That's the subject of "Monetizing the Inte...
With the increasing complexity of software, organizations are more cognizant than ever about the potential pitfalls of including open source code in their products. Below are some quick tips to continue leveraging open source code, while keeping your manager and legal department happy.
Content Delivery Networks (CDNs) are a traditional mechanism for both improving the delivery speed of a web site while also reducing the network load on the origin servers that provide the web site. The CDN accomplishes these two goals by offloading static content from the origin web s...
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where ...
You use an agile process; your goal is to make your organization more agile. But what about your data infrastructure? The truth is, today’s databases are anything but agile – they are effectively static repositories that are cumbersome to work with, difficult to change, and cannot kee...
If the existing system does fifteen things, write down the major tasks of that system and divide them into as many verticals as necessary to describe the broad functional areas that require attention. If the replacement is intended to be a custom-developed, on-premises system, it’s per...
All major researchers estimate there will be tens of billions devices – computers, smartphones, tablets, and sensors – connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriou...
These days, implementing automatic deployment for .NET web projects is easier than ever. Drastic improvements started in Visual Studio 2010 when basic deployment strategies and tools were incorporated into VS itself. Yet, documentation was quite poor at that time, so you had to scour t...
The Open Group and BriefingsDirect recently assembled a distinguished panel at The Open Group Boston Conference 2014 to explore the practical implications and limits of the Internet of Things. This so-called Internet of Things means more data, more cloud connectivity and management, a...
Cisco on Wedesday announced its intent to acquire privately held Metacloud. Based in Pasadena, Calif., Metacloud deploys and operates private clouds for global organizations with a unique OpenStack-as-a-Service model that delivers and remotely operates production-ready private clouds i...
I write and study often on the subject of digital transformation - the digital transformation of industries, markets, products, business models, etc. In brief, digital transformation is about the impact that collected and analyzed data can have when used to enhance business processes ...
Last week Ivan Pepelnjak wrote an article about the failure domains of controller based network architectures. At the core of SDN solutions is the concept of a controller, which in most cases lives outside the network devices themselves. A controller as a central entity controlling the...
WaveMaker on Tuesday announced WaveMaker Enterprise, licensed software that enables organizations to run their own end-to-end application platform as a service (aPaaS) for building and running custom apps. WaveMaker Enterprise is a commercially available rapid API app development and d...
The keys to the digital kingdom are credentials. In no industry is this more true (and ultimately more damaging) than financial services. The sophistication of the attacks used to gather those credentials and thwart the increasingly complex authentication process that guards financial ...
In 2013, there was increasing demand for cloud computing, with enterprise after enterprise committing to a rapid and vigorous redeployment of resources toward cloud-based solutions. Gigaom Research conducted surveys of both mainstream and leading-edge users in the second quarter of 201...
Finally a book from an industry leader that has the guts to write about the real world of Agile software development. If I had to pick one word to describe this book, it would be 'truth'. This book is going to raise the blood pressure of some of the Agilists out there. If you think ...
Jelastic delivers Platform-as-Infrastructure, the integration of Infrastructure-as-a-Service and Platform-as-a-Service, delivering a scalable, manageable and highly available cloud for enterprises, hosting providers and developers. Open source software is powering the most successful p...
Internet of @ThingsExpo Silicon Valley announced today its first 20 all-star speakers and sessions for its upcoming event, which will take place November 4-6, 2014, at the Santa Clara Convention Center in Silicon Valley. @ThingsExpo, the first and largest IoT event in the world, debute...
The key to securing your mobility is to understand how it is being used in your environment and what is potentially at risk. Taking stock of the mobile devices, applications and traffic in your network is critical to identifying how your data and resources are potentially vulnerable. ...
Amazon, Google and Facebook are household names in part because of their mastery of Big Data. But what about organizations without billions of dollars to spend on Big Data tools – how can they extract value from their data? In his session at 6th Big Data Expo®, Ion Stoica, CEO and co-f...
Internet of @ThingsExpo announced today a limited time free "Expo Plus" registration option. On site registration price of $600 will be set to 'free' for delegates who register during this period. To take advantage of this opportunity, attendees can use the coupon code "IoTAugust" and ...
Are you ready to put your data in the cloud? What is the future of security in the cloud? Does Docker quickly advance the development of an IoT application? What are the implications of Moore’s Law on Hadoop deployments? Get all these questions answered and hundreds more like them at ...
The cloud provides an easy onramp to building and deploying Big Data solutions. Transitioning from initial deployment to large-scale, highly performant operations may not be as easy. In his session at 15th Cloud Expo, Harold Hannon, Sr. Software Architect at SoftLayer, will discuss the...
DevOps Summit at Cloud Expo Silicon Valley announced today a limited time free "Expo Plus" registration option. On site registration price of $1,95 will be set to 'free' for delegates who register during this offer perios. To take advantage of this opportunity, attendees can use the co...
Achieve continuous delivery of applications by leveraging ElasticBox and Jenkins. In his session at DevOps Summit, Monish Sharma, VP of Customer Success at ElasticBox, will demonstrate how you can achieve the following using ElasticBox and the ElasticBox Jenkins Plugin: Create consiste...
While server virtualization has unprecedented advantages, it has thrown some challenges as well. Prior to server virtualization, each application used to run on a dedicated server with dedicated storage connected through dedicated switch ports. Needless to say, this approach had multip...
When one expects instantaneous response from video generated on the internet, lots of invisible problems have to be overcome. In his session at 6th Big Data Expo®, Tom Paquin, EVP and Chief Technology Officer at OnLive, to discuss how to overcome these problems. A Silicon Valley v...
GSN Games exploits big data to effectively uncover game-changing entertainment trends for their audience. Oh, and it changes corporate cultures, too. It's a shame when the data analysis providers inside a company get the cold shoulder from the business leaders because the data keeps p...
TechWell, IBM, uTest, and Keynote partnered on a powerful new survey that explores where today’s testers are spending their time, what obstacles they most often encounter, and where they think their attention should be focused. Hear what others are saying about this valuable survey rep...
Over the last few years the healthcare ecosystem has revolved around innovations in Electronic Health Record (HER) based systems. This evolution has helped us achieve much desired interoperability. Now the focus is shifting to other equally important aspects – scalability and performan...
Cloud and Big Data present unique dilemmas: embracing the benefits of these new technologies while maintaining the security of your organization’s assets. When an outside party owns, controls and manages your infrastructure and computational resources, how can you be assured that sensi...
Cloud and Big Data present unique dilemmas: embracing the benefits of these new technologies while maintaining the security of your organization's assets. When an outside party owns, controls and manages your infrastructure and computational resources, how can you be assured that sensi...
Qualcomm announced that its subsidiary, Qualcomm Atheros, Inc., is broadening support for developers to simplify the design of products that use Wi-Fi™ to connect the Internet of Everything (IoE). Qualcomm Atheros has opened worldwide distribution channels with Arrow Electronics and CO...
Chef on Monday announced interoperability with VMware vCloud® Air™, creating a DevOps workflow that accelerates software and service delivery. Chef provides a single platform for automating heterogeneous systems in both virtualized and hybrid cloud environments. By delivering interoper...
Due of the rise of Hadoop, many enterprises are now deploying their first small clusters of 10 to 20 servers. At this small scale, the complexity of operating the cluster looks and feels like general data center servers. It is not until the clusters scale, as they inevitably do, when t...
We present a unique case study of applying data mining and advanced statistical methods to analyze, diagnose and improve manufacturing yield, especially for rare failure event prediction. Intra-die process variations in nanometer technology nodes pose significant challenges to robust d...
DevOps Summit at Cloud Expo Silicon Valley announced today a limited time free "Expo Plus" registration option. On site registration price of $1,95 will be set to 'free' for delegates who register during this Labor Day week. To take advantage of this opportunity, attendees can use the ...
Security is critical to Internet of Things (IoT) adoption because we want to make sure we can trust the sensors, actuators, rules engines and other connected componentry we embed in every element of our existence. Bringing this down to earth is as easy as pointing out that people's sma...
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT co...