Welcome!


From the Blogosphere

I write and speak often on the need to have a thoughtful Code Halo strategy in addition to your mobile and digital strategies. Code Halos is the term for the information that surrounds people, organizations, and devices. Many companies consider Code Halostrategies only for marketing, s...
Despite the hype and drama surrounding the HTTP 2.0 effort, the latest version of the ubiquitous HTTP protocol is not just a marketing term. It's a real, live IETF standard that is scheduled to "go live" in November (2014). And it changes everything. There are a lot of performanc...
In the video at this link and embedded below I provide some context on new approaches to data can enhance outcomes for public sector organizations, with a focus on real world use cases. I also mention key requirements which apply at most government organizations for their data and how ...
On the one hand, the BYOX trends that drive cloud service adoption and worker self-enablement are transforming traditional IT into a User-Centric IT model that focuses on empowering and enabling workers. On the other hand, the free-wheeling nature of the cloud and the regular news of ...
make it a lot easier and more fun to develop apps for both iOS and OS X. That’s in contrast to the current language, Objective-C, which is somewhat antiquated and considered by many to be difficult to use. Although Swift is easier to use, we’re sure that there will be issues like crash...
Dawn Parzych, F5 Sr. Product Manager, talks about the benefits of HTTP 2.0 and shows us a demo of 170+ pictures appearing instantly while using the BIG-IP HTTP 2.0 profile. Interesting conversation about web pages loads, the chattiness of the HTTP protocol and the notion of HTTP 2.0 mo...
Anyone who has been involved with security knows there is a balance to providing both security and privacy and performance at the same time. Security is often blamed for performance woes, particularly when cryptography is involved. SSL and TLS have long addressed this balance by lev...
First and foremost you can’t have a successful software-defined model if your team still have a hardware-defined mentality. Change is inevitable and whether it's embraced or not it will happen. For experienced CIOs this is not the first time they've experienced this technological and c...
Considering most organisations have still not fully virtualized or moved towards a true Private Cloud model, SDDC is still in its infancy in terms of mainstream adoption and certainly won't be an overnight process. While typical early adopters are advancing quickly down the software-de...
About 8 years ago at my previous employer we started a project related to Autonomic Networking. Autonomic Networking is modeled after Autonomic Computing, an IBM initiative from the early 2000s, targeted at creating self managing computing elements. The network version intends to creat...
At EELive!, we asked several software development professionals to discuss the state of software quality. Here's what they had to say...
It’s no secret that doing nothing is often considered a safe bet. The psychology behind inaction is well understood, particularly in the case of IT — the path of least disruption is usually maintaining the status quo rather than trying something new, But once in a while, a decision ...
I'll explain the difference between two major categories in in-memory computing: In-Memory Database and In-Memory Data Grid. A few months ago, I spoke at the conference where I explained the difference between caching and an in-memory data grid. Today, having realized that many people...
Quite often you will hear IT people say that they want the ultimate automatic disaster recovery solution that you can buy. You can also find some vendors who can sell you their solution as automatic disaster recovery solution only because you asked for one. But do you really want an au...
You often hear people say, ‘oh, this is a living document,’ to indicate that the information is continually updated or edited to reflect changes that may occur during the life of the document. Your infrastructure is also living and dynamic. You make changes, updates or upgrades to addr...
Experiencing downtime is not something that companies wish for but as we have seen lately it is something that we hear quite often about. Interestingly enough very few enterprises, especially in the Small and Medium Business area, spent enough time...
In February 2011, Vivek Kundra announced the “Cloud First” policy across the US Government. The directive, issued through the Office of Management and Budget, required agencies to give cloud technology first priority in developing IT projects. He also described cloud computing as a “10...
It's probably no surprise that I have long advocated the position that hybrid cloud would eventually become "the standard" architecture with respect to, well, cloud computing. As the dev/ops crowd at Glue Con was recently reminded by the self-styled "most obnoxious man in cloud", Josh ...
A global asset management company needed to accelerate testing for parallel and Agile development. Learn how service virtualization and API test automation resulted in a 20X reduction in testing time. Ignis Asset Management is a global asset management company, headquartered in London...
No doubt, the world of cloud storage has evolved over the past several months in terms of broader interoperability, increased features and functionality as well as lower overall costs. Whereas the questions posed about cloud storage used to center on integration with (or in place of) e...
Today, more than ever, end user experience is at the forefront of every CTO and CMO’s mind as more statistics show websites and applications are easily abandoned if users are not satisfied with their experience. But what makes a good experience? First we need to ask ourselves what is ...
Through our more than 200 security algorithms, StealthWatch is able to digest metadata known as NetFlow coming off of switches, routers, and various perimeter security devices to present an actionable, continuous macro level view of what has seeped through the perimeter. Using many of...
If you're a real estate investor, you know how important it is to have the latest figures and data at your fingertips. You probably have favorite websites and newsfeeds to keep up as much as possible, but what you really need is real data in real time. Enter S'moretgage, which was debu...
The days of completely separate storage network technologies are quickly fading. It feels like it’s only a few years ago that Fiber Channel was the way to create large scale storage networks. Big honking storage devices on a separate network, connected to Fiber Channel switches, connec...
When we think about what’s next, our frame of reference is almost universally anchored to what we are doing now. We look at how things are, and then we aim our sights forward. In some cases, we might make incremental moves ahead; in other cases, maybe we look for improvement by orders ...
I moved recently. Not too far away nor to a different state, just the other side of town. It is simultaneously exhilarating and exhausting. Most people in the U.S. moving during the summer. Kids are out of school, the weather is mostly nice, friends might be available to help and you a...
IP Multicast is one of those technologies that most everyone loves to hate. It’s almost the perfect example of how complicated we have made networking. Getting IP Multicast to run depends on several protocols that are all somewhat intertwined or dependent on each, their relationship so...
At healthcare events throughout the world, we have met many health tech companies who are considering migrating to the cloud, but have serious concerns about protecting electronic protected health Information (e-PHI) and maintaining HIPAA compliance as they virtualize their environment...
It comes as no surprise that the CEO of Target has resigned in the wake of their massive data breach. The 2nd executive, if I remember correctly, to resign due to the mishap. Data breaches are costly according to the most recent Ponemon 2014 Cost of Data Breach Study: United States and...
As a SaaS business matures, the importance and value of SaaS metrics increase. Most SaaS businesses begin their journey down the SaaS metrics path by tracking recurring revenue in relation to customer acquisition costs. After building a solid customer base, churn becomes a priority. Th...
As public and private cloud adoption continues to skyrocket, it’s becoming more and more clear that Database-as-a-Service (DBaaS) is hugely important to users. This isn’t really news, as much as it’s a confirmation of what many were seeing much earlier in the cloud industry’s maturatio...
It means you can't use "network" protocols to make intelligent decisions about applications any more. Back in 2000 (or 2001, I forget exactly), I got to test a variety of bandwidth management appliances. Oh, they were the bomb back then - able to identify (and classify) applications b...
This week's "bad news" with respect to information security centers on Facebook and the exploitation of HTTP caches to affect a DDoS attack. Reported as a 'vulnerability', this exploit takes advantage of the way the application protocol is designed to work. In fact, the same author who...
AppDynamics is excited to unveil details behind our new Application Intelligence Platform which is the technology foundation for the AppDynamics portfolio of performance monitoring, automation and analytics solutions (transaction analytics was also announced today). Today’s software d...
How many different network protocols can you name? There are, of course, a set of staples just about everyone knows: IP, ARP, VLAN, TCP, UDP, DNS, HTTP, SSL, TLS, SMTP, FTP, SMB, CIFS, 802.1q, 802.1ad. Then there are recent additions like VXLAN, NVGRE, SPDY. But we could fill post ...
Being from the Hawaiian Islands, the annual gathering of the Kohola (humpback whales) is always a spectacular view. They can get over half their body out of the water and administer a cannonball body slam splash like you’ve never seen before. Most of the internet thinks they breach to ...
Way back in the early days of the Internet scalability was an issue (the more things change...). One of the answers to this problem was to scale out web servers using a fairly well-proven concept called load balancing. Simply put, distribute the load across web servers to make sure eve...
From a cost perspective, the networking dialogue is dominated by CapEx. Acquisition costs for new networking gear have historically been tied to hardware, and despite the relatively recent rise of bare metal switching, networking hardware remains a high-stakes business. But SDN is chan...
Take a moment to consider the things we put up with on a daily basis because they have been understood and accepted as the status quo. Perhaps the old adage, “better the devil you know than the devil you don’t,” rings no truer than for traditional on-premise data storage systems. Sure,...
We've talked before about the bifurcation of the network, which is driven as much by the evolution of network services from "nice to have" to "critical" as it is by emerging architectures. The demarcation line in the network stack has traditionally been - and remains - between layers 3...