Welcome!


I write and speak often on the need to have a thoughtful Code Halo strategy in addition to your mobile and digital strategies. Code Halos is the term for the information that surrounds people, organizations, and devices. Many companies consider Code Halostrategies only for marketing, s...
I was asked by Mr. Peter Hastings (NH DoIT Commissioner) about my understanding and knowledge of "End to End Solutions". I have witnessed these solutions before but I wanted to find a good definition. So, I began my research and found this definition: One supplier or one company that c...
The purpose of this article is to describe the steps involve to configure Datapower service for the Database communication. The service will parse the incoming parameters from the request, construct a SQL query string and returns the data from the Database, based on the constructed que...
APIs are transforming businesses to extend the reach of their information systems and data. In technical terms, APIs are rather finite, allowing two software applications to exchange data and execute procedures. Yet their business impact is so great that API management requires a far f...
There seems to be two main groups of thought as to when wearable technology will become mainstream. The first group are those that believe that wearable technology is here today and are engaging both hobbyists and future entrepreneurs in building all parts of the ecosystem now. These p...
Virtualized and private cloud infrastructures are all about sharing resources – compute, storage and network. Optimizing these environments comes down to the ability to properly balance capacity supply and application demand. In practical terms, this means allocating the right amount o...
Application Performance Management (APM) grew out of the movement to better align IT with real business concerns. Instead of monitoring a lot of disparate components, such as servers and switches, APM would provide improved visibility into mission-critical application performance and t...
Computer security has become much harder to manage in recent years, and this is due to the fact that attackers continuously come up with new and more effective ways to attack our systems. As attackers become increasingly sophisticated we as security professionals must ensure that they ...
Recently, I was asked by Mr. Peter Hastings (NH DoIT Commissioner) to take a look at cloud development concepts and see if there was any benefit for our development teams across the enterprise. After some investigation I could see that if all users/developers were on one server that co...
The killer in any IT operation is unplanned work. Unplanned work may go by many names: firefighting, war rooms, Sev 1 incidents. The bottom line is that Operations must stop whatever planned work it was doing to manage this drill. This means little or no normal work is being accomplish...
One of the first initiatives for secure booting has been the Unified Extensible Firmware Interface (UEFI) Initiative. This is a superior replacement of the Basic Input Output System (BIOS) and a secure interface between the operating system and the hardware firmware. The UEFI Initiat...
SAP's Mobile Platform allows mobile developers to create a wide variety of different styles of enterprise mobile apps, and supports both native and HTML5/Javascript-based architectures. This article compares and contrasts the four major programming APIs that allow developers to write ...
Every business acknowledges that network security is critical. But how do you quantify the business value that a secure network provides? And how does an enterprise evaluate and justify investing in network security products like next-generation firewalls, intrusion prevention systems ...
Today’s end users demand highly satisfying and interactive web experiences, such as automatically populated search suggestions and dynamic menus. To make applications more engaging, technologies like AJAX (Asynchronous JavaScript and XML) have emerged. AJAX works by dynamically display...
This chapter introduces and describes several of the more common foundational cloud architectural models, each exemplifying a common usage and characteristic of contemporary cloud-based environments. The involvement and importance of different combinations of cloud computing mechanisms...
Organizations have started to see the value in discovering and harnessing the potential of the typically large amounts of information as well as data they generate and consume on a regular basis, all in ways that help their organizational goals and associated business models perform we...
Triggered by current expected load projections for our community portal, our Apps Team was tasked to run a stress on our production system to verify whether we can handle 10 times the load we currently experience on our existing infrastructure. In order to have the least impact in the ...
It’s clear that cloud computing has transformed the enterprise IT landscape, from the computing infrastructure layer up through enterprise software, as companies move to leverage more efficient and cost-effective service-delivery models and bring new cloud-based products and services t...
Service Component Architecture (shortly referred as SCA) is a technology for creating services from components. SCA is a set of OASIS standards and part of it is developed with the collaboration of vendors from open source community, referred as “OSOA” Open SOA. SCA helps to build syst...
Things are moving fast for the Ruby language instrumentation in TraceView. We already support tracing of memcache-client, memcached, dalli, mongo, moped, mongoid, mongomapper, cassandra, ActiveRecord (postgres, mysql, mysql2) plus more. Most recently we added support for Rack and Resqu...
Over the last couple of months I have been talking to more and more customers who are either bringing their Hadoop clusters into production or have already done so and are now getting serious about operations. This leads to some interesting discussions about how to monitor Hadoop prope...
We’re pleased to announce a new Python instrumentation version — Oboeware 1.1! We’ve added a few new libraries recently, but we’re really excited about the new customization API we’ve introduced in this version. More than just a Python bump, this is the first package we’re releasing w...
Abstractness is a measure of the rigidity of a software system. Higher the abstraction, lower the rigidity (or greater the flexibility) and vice versa. And the stability is a measure of tolerance to change as in how well the software system allows changes to it without breaking it. Thi...
Both Paramount and Universal celebrated their 100th anniversary last year, which is a long time to be in the movie business. Arguably, both have made some good, some great, and some bad movies. But, during this year’s Super Bowl, Paramount showed Universal how to design a ‘fast and fur...
A component is a reusable software entity. A component is a deployable piece of software that can be independently developed and maintained. In the previous article –Componentizing a Monolithic Application in Java, we discussed the need for componentizing applications to get the benefi...
Big Data is all the rage. And at first glance, the Big Data variety, volume, velocity and value challenges may seem extraordinarily difficult. Proven technologies, such as data virtualization, provide proven approaches to addressing these “big” challenges. So if Big Data is on your ag...
A component is a reusable software entity that is developed and deployed independently. Component based software development has many architectural advantages. In the previous article Componentizing a Monolithic Application in Java, we learnt the need for componentizing applications fo...
After you have secured your private electronic information using encryption and learned how to encrypt and digitally sign files for others, how do you extract the information and determine who encrypted the file? Asymmetric public/private key encryption allows you to decipher the infor...
Identity management just isn’t what it used to be. Gone are the days when knowing who had access to what was simply enough. In today’s world of increasing government and industry regulation; networked communications and collaboration; and pervasive mobility, the requirements have funda...
Now that you have the JavaScript skills that you need for using jQuery, you’re ready to learn jQuery. So, in this excerpt, you’ll learn a working subset of jQuery that will get you off to a fast start. When you complete this section, you’ll have all the jQuery skills that you need fo...
In today’s environment, information security is crucial for everyone. Security needs vary widely from protecting social security numbers to guarding corporate strategy. Information espionage can occur at all levels. A human resources employee or manager takes employee personnel files h...
Using OpenFlow to extend software-defined networking (SDN) to the optical layer is a compelling prospect for enterprises seeking to achieve joint orchestration of information technology (IT) and network resources for cloud services, to virtualize the network and to more simply manage i...
Component-oriented development has many architectural advantages. In spite of this, many developers tend to solve problems the monolithic way on the first go. This article demonstrates how a monolithic design can be modified to achieve component-based design. During this conversion pro...
The Java Platform Enterprise Edition 7 specification early draft is available for download. All these years the focus was to introduce several APIs and technologies as part of the platform to make it more powerful, simple and complete. This is the first time the focus has shifted in a ...
Increasingly organizations are looking to tap the collective power of social, mobile and cloud technologies. We asked Ric Telford, IBM VP of Cloud Services, to share his perspective on the trend in light of IBM's new social business software including SmartCloud Docs, a cloud-based off...
Designing and implementing a hybrid encryption application is a big challenge but without a supporting infrastructure it’s almost impossible. There are open source libraries that allow you to encrypt a file but only provide the translation technique. After the information has been encr...
The advantages of virtualization are obvious for almost everyone. One of the first influential articles on the subject was my article [1] which was of interest to more than 48,000 readers. Below you will find useful and quick methodology on how to install and use Fedora 17 under the Wi...
MySQL, just like other relational databases, is complicated. It can jam at any time jeopardizing your applications or business without notice. Most MySQL malfunctions are due to common mistakes. It is essential to avoid these mistakes, often hidden by configuration trap or workload, to...
We all know that since the early ‘90s, Internet usage has exploded. Buying online, booking a trip or communicating with friends and relatives are just a few examples of what all of us are doing every day. The continuous development of broadband connectivity has also made easy the growt...
Cloud computing is so alluring. The public cloud economizes infrastructure resources and creates a scalable, on-demand source for compute capacity. Additionally, the cloud can be a strategic asset for enterprises that know how to migrate, integrate and govern deployments securely. App...