Welcome!


Latest Blogs from Java IoT
By Bob Gourley Friends from IO have alerted me to a job search they have underway and I wanted to share this with you. If you are, or know of anyone who is, interested in this position (and if you can meet most of their qualifications) please connect with IO right away, they want to ta...
This week's "bad news" with respect to information security centers on Facebook and the exploitation of HTTP caches to affect a DDoS attack. Reported as a 'vulnerability', this exploit takes advantage of the way the application protocol is designed to work. In fact, the same author who...
AppDynamics is excited to unveil details behind our new Application Intelligence Platform which is the technology foundation for the AppDynamics portfolio of performance monitoring, automation and analytics solutions (transaction analytics was also announced today). Today’s software d...
How many different network protocols can you name? There are, of course, a set of staples just about everyone knows: IP, ARP, VLAN, TCP, UDP, DNS, HTTP, SSL, TLS, SMTP, FTP, SMB, CIFS, 802.1q, 802.1ad. Then there are recent additions like VXLAN, NVGRE, SPDY. But we could fill post ...
Cisco would like to use the phrase IoE – Internet of Everything. But the common term is IoT (Internet of Things) these days. It refers to any device that has an IP address, and can communicate. I will be speaking at an IoT Expo in San Francisco on May 5th. and my session is called – Bi...
While testing the new JMS 2.0 API, I wanted to see an example of the remote client connecting to a messaging server. I decided to start with the HornetQ messaging server that’s embedded into JBoss Wildfly 8. Folks from JBoss sent me a link to the the GitHub project Wildfly/Quicks...
Being from the Hawaiian Islands, the annual gathering of the Kohola (humpback whales) is always a spectacular view. They can get over half their body out of the water and administer a cannonball body slam splash like you’ve never seen before. Most of the internet thinks they breach to ...
Way back in the early days of the Internet scalability was an issue (the more things change...). One of the answers to this problem was to scale out web servers using a fairly well-proven concept called load balancing. Simply put, distribute the load across web servers to make sure eve...
From a cost perspective, the networking dialogue is dominated by CapEx. Acquisition costs for new networking gear have historically been tied to hardware, and despite the relatively recent rise of bare metal switching, networking hardware remains a high-stakes business. But SDN is chan...
Take a moment to consider the things we put up with on a daily basis because they have been understood and accepted as the status quo. Perhaps the old adage, “better the devil you know than the devil you don’t,” rings no truer than for traditional on-premise data storage systems. Sure,...
Thursday 24 April, 2014 By delivering conveyors to Alfamart for the 9th time, Interroll, a worldwide provider of key products and solutions for internal logistics, continued the successful cooperation with one of Indonesia’s leading retailers, serving 2.5 million customers daily...
Nastel will be back at IBM Impact 2014 in Las Vegas, in booth #510. Please stop by and say hello! Booth #510 at IBM Impact 2014 We will offer on-the-fly demos of the real-time application performance monitoring (APM) analytics and … Continue reading → The post IBM Impact 20...
Over the past few years, the SaaS community has gained a solid understanding of SaaS financial metrics, as well as many of the operational principles required to achieve them. However, there has always been an obvious gap between what happens on the top line and what happens on the gro...
In the beginning there was a simply acronym: MTTI (mean time to innocence). Weary after years of costly and time-consuming war room battles, IT organizations turned to AppDynamics to give an objective application-level view of production incidents. As a result, application issues are s...
Twenty years ago I started my professional career working in a niche field of IT called Geographical Information Systems (GIS) – basically mapping systems. This is an area where Big Data was prevalent, long before the term was officially coined, GIS covered a range of concepts from sat...
We've talked before about the bifurcation of the network, which is driven as much by the evolution of network services from "nice to have" to "critical" as it is by emerging architectures. The demarcation line in the network stack has traditionally been - and remains - between layers 3...
I am not happy to Revisit a Vendor Survival post saying that my prediction that a vendor will not survive was correct (for example,
Like moving to IPv6, simply picking up your existing network architecture and moving it to a completely new one is not going to happen overnight. There will undoubtedly still be "traditional" networks hanging around even when SDN adoption is considered mainstream and fully mature. That...
While organizations spend the next few days and weeks patching OpenSSL vulnerabilities, the realization is setting in that we may never know the full extent of the damage caused by Heartbleed. Although Heartbleed was only announced in early April, it has actually been present in OpenS...
Earlier this week, Ethan Banks wrote a very nice article about Mellanox’s dual spine and leaf network in support of a large amount 10GbE access ports. After describing the scaled up network design, he reviews 8 observations about the design, not to point out good or bad, but merely to ...
Author Peter RogersPrincipal MobilityArchitect, CognizantVisionMobile recently published one of the best reports on apps for vehicles that I have read (http://www.visionmobile.com/product/apps-for-cars-mileage-may-vary/).  It is frustrating with how difficult it is to actuall...
by Joseph Rickert One of the remarkable features of the R language is its adaptability. Motivated by R’s popularity and helped by R’s expressive power and transparency developers working on other platforms display what looks like inexhaustible creativity in providing seamless interface...
This article explains how to know which JVM System Properties are actually being queried by libraries. Many libraries use system properties for settings. For example, you usually have to set a property to enable debug traces or to activate certain behaviors. However, sometimes system ...
Last week was a crazy week for information security. That's probably also the understatement of the year. With the public exposure of Heartbleed, everyone was talking about what to do and how to do it to help customers and the Internet, in general, deal with the ramifications of such a...
Like every one I am updating my terminology to reflect the shift that occurred – Business and technical executives immediately get that when combined with a world of smart, connected devices then Cloud computing only makes more sense. We have entered an age where IoT Cloud Computing...
This past weekend, like many of you, I started getting the blood curdling password resets from a bunch of OpenSSL affected sites. I also got a few emails from sites indicating that I had nothing to worry about. Bad news, good news. Probably the biggest security story thus far for 2014 ...
When I visit clients to talk about DevOps, I usually ask them what their monitoring strategy is. Too often, the answer I hear is "We use Nagios". I think Nagios is a great tool, but it sure is not a strategy. Nagios does a good job of monitoring infrastructure. It will alert you when y...
One of the most powerful aspects of the Internet of Things is the process of synthesis it achieves; it provides a mental model for people to associate and relate a number of different technologies under one umbrella concept and trend. Therefore one early quick win is a simple taxonomy...
OpenStack. OpenDaylight. SDN. Cloud. It's all about abstraction, about APIs and "software-defined" (which really means software-controlled, but this is neither the time or place to get into that debate). It's about jailbreaking the network. Enabling access to features and functionalit...
There are a variety of opinions on the seriousness of Heartbleed being put forth ranging from "it's not the end of the world" to "the sky is falling, duck and cover." Usually the former cites the relatively low percentage of sites impacted by Heartbleed, pegged at about 17% or 500,000 ...
London, UK, 15 April, 2014 - Courion, a leading provider of intelligent identity and access management solutions, today announced two new hires in the UK and the Middle East to help boost its strategic growth in EMEA. Nick Kennelly has been appointed to the role of UK Account Manager a...
therore-concurrent provides self-tuning thread-pools helping you to make the most of your system. Recently, I have been working in the optimization of an OLTP system. The software has a SEDA architecture (Staged Event Driven Architecture) with lots of threads doing little works. I had ...
There are things we tend to take for granted in our everyday lives. We have certain expectations that don’t even have to be spoken, they’re just a given. If you walk into a room and turn on the light switch, the lights will go on, it’s assumed. If you turn the water faucet on, water wi...
Not too long ago, it took even the most successful entrepreneurs several centuries or at least decades to reach a valuation of a billion and thus become a member of the exclusive Billionaire Boys Club*. Families like the Rothschilds, the Waltons or the Brenninkmeijers have indeed built...
Despite claims that there exists (or will, look out!) a mythical "god box" for the enterprise data center, capable of performing every data center function imaginable, it remains, well, mythical. Efforts to effectively secure the data center and the applications it delivers therefore r...
Trace all calls to System.getProperty method Many libraries use system properties for settings.  For example, you usually have to set a property to enable debug traces or to activate certain behaviors.  However, sometimes system properties that are used are not well documented or you a...
What is the “3rd Platform” of IT? It comprises of the cloud, mobile, social, and big data products. According to IDC, “3rd Platform technologies and solutions will drive 29 percent of 2014 IT spending and 89 percent of all IT spending growth”. Much of that growth will come from the “ca...
We love analogies. No matter what the topic, analogies are a great way to explain something in a different context to make a specific point with a frame of reference that may be more familiar to those we are making a point to. There is one that seems to come back over and over again in...
I spend a large portion of my time preparing courseware materials, writing books and technical documentation. These documents include hyperlinks, and some of them can be a 100+ character long. Do you include the long URLs in your docs? The immediate answer is to use one of the services...
by Joseph Rickert The seven lightning talks presented to the Bay Area useR Group on Tuesday night were not only really interesting (in some cases downright entertaining) in their own right, but they also illustrated the diversity of R applications, and the extent to which R has become ...