Welcome!


Latest Blogs from Java IoT
This post is following up on last week's post, "The Inevitability of Idle Resources", in which I mentioned the importance of ensuring not only that resources are available when you need to provision a new service to scale but that the resources available match the needs of the service....
My colleague, the always opinionated Peter Rogers, provides us with an "under-the-covers" look at how Android plans to power the Internet of Things.  Pull down your geek hat and hold on!!!***In previous articles I predicted that wearable technology would be powered by light-weight...
Once you learn the definition of shadow IT, it shouldn’t be too shocking to learn how widespread it is at companies large and small all over the world. I hate to assume, but the odds are, that you yourself have used a non-IT approved SaaS option for the same reason as everyone else, m...
Digital Ocean is a NY based hosting provider specializing in SSD based virtual machines. A majority of our customers choose to deploy and manage databases on Amazon AWS. However running large scale write intensive databases on AWS is a fairly difficult and time-consuming operation. If ...
It is now official that the collaboration deal is in place according to a general availability. Details here:Announcing General Availability of Oracle Software on Windows Azure and Updates to Windows Azure Traffic ManagerOpen and flexible platforms are in vogue and that was adopted as ...
It used to be called a business plan. But management-speak and a few decades of PC-fueled innovation changed that simplistic approach. Bill Gates famously entitled his first book The Road Ahead and although this didn’t officially help coin or endorse the phrase “roadmap,” it didn’t do...
They say good things come to those who wait – but sometimes good things happen simultaneously and you don’t even have to wait to revel in them. While I was enjoying a week of snowboarding in Val d’Aosta, right by the legendary Matterhorn, DDN was announcing the new WOS 360 at the Next ...
Most of the discussions on Big Data begins and ends with Hadoop. It is the commercial version of HPC (High Performance Computing), whose underlying technologies have been around for years: clustering, parallel processing, and distributed file system. In today’s parlance you can read Ha...
There are people who take life slowly, accept it on its terms, meditate, read about meditation, and internalize books like "Wherever You Go, There You Are," a bestseller by a guy with a hyphenated name. I'm more of a Malcolm Gladwell fan -- Outliers or his newest book “David and Goliat...
Proponents of pure software infrastructures often point to rapid provisioning (like right now, push a button and blam! Instant scale) as one of the reasons to "go software." Superficially this is true. If your infrastructure is all software (or virtual, if you prefer) then when you nee...
When was the last time you had a technology conversation that did not include the word ‘cloud’ in it? Gartner predicts that by 2016 the bulk of IT spend will be for the cloud. Gartner also believes that ‘nearly half of large enterprises will have hybrid cloud deployments by the end of ...
The term "Big Data" is quite possibly one of the most difficult IT-related terms to pin down ever. There are so many potential types of, and applications for Big Data that it can be a bit daunting to consider all of the possibilities. Thankfully, for IT operations staff, Big Data is mo...
Google’s pursuit of self-driving cars has been well documented over the years. The promise of fleets of self-driving vehicles that could potentially make driving safer while simultaneously shortening commute times makes it one of the most attractive futures technologies around. But whe...
Today PerspecSys announced the results of a survey conducted at the 2014 RSA Conference concerning the attitudes and policies of organizations towards cloud-based security. After polling 130 security professionals on the show floor of the RSA Conference, PerspecSys found that "an overw...
LIn 1974 a specification was developed that would, eventually, launch what we know of as "The Internet." That specification was TCP and though it is often overshadowed by HTTP as the spark that lit the fire under the Internet, without TCP HTTP wouldn't have a (transport) leg to stand o...
One of the most often questions/feedback we get regarding Windows 8.1 is where is my start menu. These conversations can get very passionate, and usually turn into a commentary around on how much we miss our start menu. I am sure some folks want to punch the screen. I totally unders...
Disaster recovery is about being able to get your business back up and running as quick as you can after the disaster happens. Throughout this series, my teammates have focused on the Infrastructure side of the house, servers, virtual machines, etc. You can see the full series here: D...
The so-called Bring Your Own Device (BYOD) phenomenon has gone hand in hand with the consumerization of IT trend. Both of which sound like strangely disconcerting and confusing terms if taken out of context or presented to a layman or novice for the first time. Of course all we are ta...
Back in the noughties I made the conscious decision as a Storage guy to immerse myself into what was being termed server virtualization and understanding the product offerings of a relatively new company named VMware. To this day I remember the incredulous looks and responses I receive...
I’ve been traveling the last few weeks shooting some videos for VMware PEX and RSA. When that happens, my browser tabs get crowded with the various stories I’m interested in but will read later. This time they all seemed to hover around Identity Theft. When I got home, in my awaiting p...
The Network Centric Operations Industry Consortium (NCOIC) has begun offering an open process that will enable governments, agencies and businesses to create and manage a secure, hybrid IT computing environment quickly and cost effectively. Known as the NCOIC Rapid Response Capability...
When considering the major benefits of modern cloud computing, the lower operational overhead of the cloud should be high on anyone’s list. But when it comes to sensitive data — such as healthcare, finance, retail or government data — security measures are needed to ensure privacy and ...
Bracknell, UK 6th March, 2014: Google Software-as-a-Service specialist, Appogee, has announced the launch of its global Appogee Partner Program to coincide with Google Global Partner Summit in Mountain View.The Appogee Partner Program will help existing Google Apps resellers build sust...
#sdas #webperf New TCP algorithms and protocols in a platform net improved performance for apps The original RFC for TCP (793) was written in September of 1981. Let's pause for a moment and reflect on that date. When TCP was introduced applications on "smart" devices was relegated to...
If the future of federated controllers is based on service layering, then how do multiple controllers manage the same device? Is there a requirement for state synchronization? Do they share information about device operation or configuration? Is there a need for controllers that are ma...
Looking back to one of my predictions for 2014, I had posited that traditional storage solutions labeled cloud will no longer fly this year, and some of the big-iron vendors will be forced to offer their wares as pay-as-you-go services. Perhaps this was stating an obvious eventuality a...
It's that time of the year, when resolutions promising grand changes in our lives are made - and more often than we'd like to admit, broken. Along with the resolutions comes advice on how to make them "stick." In other words, how to make them habitual. Many folks still cite the old ...
I have spent the past few weeks watching this video series. I started watching it on the treadmill in the morning before work. I did that until I hit lesson 5. It is 4 hours and 20 minutes long. I started watching lesson 5 in front of the computer, not because I didn't want to walk for...
Recently Famo.us made a big announcement around offering their own PhoneGap alternative using a WebView that could use Chrome instead of the Stock Android Browser. Android 4.4 (KitKat) actually offers this out of the box now but it is actually Chrome 30 which isn't quite up to the same...
If you thought that cyber security threats were troubling in 2013, then you should brace yourself for the onslaught that's very likely in 2014. A new generation of security threats stemming from progressive business technology trends -- such as BYOD, mobility and cloud services adoptio...
by Rodney Sparapani, PhD Rodney is an Assistant Professor in the Institute for Health and Society from the Division of Biostatistics at the Medical College of Wisconsin in Milwaukee and president of the Milwaukee Chapter of the ASA which is hosting an R workshop on Data Mining in Milwa...
I enjoy the process of developing software, which includes many various activities. But learning and teaching new software are the two activities I enjoy the most. During my 30-year career I’ve been working as an independent contractor, taught countless training classes, prepared...
Application developers are aware (you are aware, aren't you?) that when applications are scaled using most modern load balancing services that the IP address of the application requests actually belong to the load balancing service. Application developers are further aware that this me...
As SDN moves closer to large-scale deployments, the issue of controller scaling is becoming a hotter topic. The consensus seems to favor some form of distributed cluster environment, likely in the form of federated clusters. But how should these federations be formed? The first thin...
I had this post in gestation for a while but the recent post on SmartBear's blog ("Please stop saying Java sucks") decided it me to finalize and publish it.I believe that it's a complete fallacy to equate "less code" with "better", this whether one is considering a language or a framew...
If you are new school or old school, then will you be stuck on those school's of thought or advanced to the current and future schools? From the old school folks you will hear things along the lines of that is how we do or did it. Also you might hear things along the lines of lets use...
A lot of security-minded folks immediately pack up their bags and go home when you start talking about automating anything in the security infrastructure. Automating changes to data center firewalls, for example, seem to elicit a reaction akin not unlike that to a suggestion to putting...
Financial Services companies operate in a difficult environment. Many of their applications are absolutely vital to the proper workings of the global economy. They are one of the most heavily regulated industries in the world, and they are a constant target of hackers. Their systems ne...
In the last post I covered several architectural techniques you can use to build a highly scalable, failure resistant application in the cloud. However, these architectural changes - along with the inherent unreliability of the cloud - introduce some new problems for application perfor...
What started out as a mechanism to program flows into network switches and routers in a standard way is evolving into a full blown forwarding engine programming and management specification. In the latest version of the spec (1.4, released in October 2013), the abilities exist to confi...