Welcome!


From the Blogosphere

Today, we find more and more businesses putting pressure on IT to move faster, and, if their IT department struggles to keep up, they are often willing to “go around them” and invest in a cloud or other third-party solution on their own to get what they want, when they want it (aka “sh...
While news about the malicious hacking trade and the actions of elusive cyber-criminals continue to grab headlines, the third of our annual Insider Threat reports confirm that the risk posed by those legitimately ‘inside the fence’ continues to top business data security concerns. Of c...
One of the neat things about microservices is the ability to segment functional actions into scalability domains. Login, browsing, and checkout are separate functional domains that can each be scaled according to demand. While one hopes that checkout is similarly in demand, it is unlik...
Apache Drill is an open source, schema-free SQL query engine—that enables a business to extract the most value possible from data stored in Hadoop. Apache Drill does this by breaking down many of the technical barriers that had restricted the ways that analysts could work with data, an...
When meeting with potential new customers, I’m frequently asked “do you have customized polling?” As we all learned in life, the question is often less telling than WHY the question was asked. I answer: “Of course, we have customized polling – what enterprise class solution (or even ...
If you're part of the decision making process in how to get started with Big Data then you've probably already discovered that open source Apache Hadoop has a big lead. You also know that unless you've got a particularly deep NoSQL team or want to write your own proprietary code that t...
You are a hobbyist; curious student or a developer-entrepreneur then you must get this kit to jump start your IoT development. This is still in Beta but it has everything you need in terms of hardware, software, tools and forums to guide you through. IoT dev kit is a subset of In...
AWS was in the premier position having had a head start of more than 4 years in the cloud related business. The lowering of prices by Microsoft; a new CEO; an emphasized bet on the cloud have all contributed to Microsoft Azure's adoption by the enterprises. One of the reasons for this ...
After reading Sean Michael Kerner’s article in Enterprise Networking Planet earlier this month, I thought I’d add a few thoughts of my own to what he wrote. He discusses SDN and IPv6. Here’s my take on Software Defined Networking (SDN) in 2015: Given the ongoing hype and the rang...
When a CIO or a CTO thinks of the applications they support it is almost always in terms of a "portfolio" When a research company named Gleanster poll executives about agile data management they discovered an interesting trend. Companies are reporting an increase in portfolio sizes wi...
Some of the network gear vendors cast a wary look at network management vendors, particularly those who do continual, automatic discovery of the network inventory and connectivity. Why? We know what’s actually out there, and what’s actually being used. We had one customer in the i...
Employee collaboration and access to communication tools are essential for workplace productivity. Organizations are increasing their use of Microsoft Office 365, a subscription-based service that provides hosted versions of familiar Microsoft applications. Most businesses choose Excha...
We provide the software that you need to manage a busy release schedule. Without Plutora you are forced to use manual methods to orchestrate releases and manage resources, and the analogy that connects with most of our customers is that Plutora is the necessary "Air Traffic Control" f...
SDNs, or more specifically provisioning automation platforms service provider interconnections, and have crept into nearly all marketing materials and elevator pitches in discussions with submarine cable operators, networks, Internet Exchange Points, and carrier hotels. While some of ...
In Part 1, I shared my thoughts on SDN in 2015, after reading Sean Michael Kerner’s article in Enterprise Networking Planet. This post will cover a few of my thoughts on IPv6. Once the initial scares surrounding IPv4 address exhaustion passed, enterprises have taken a relaxed attitud...
With every New Year it is time to look back at the industry events of the past 12 months, and use our expertise to predict what lies ahead, in order to be more prepared. With regards to DDoS attacks, here is a short list of what to expect in 2015. We expect to see an increase in DDoS...
Here’s a short anecdote: a QA team maintained a test environment separate from their production environment, but they had gone through great lengths to ensure it matched what was in production in every respect. It was filled with the same hardware, and all the software was identical do...
Many years ago Gartner introduced their technology Hype Cycle, which maps visibility against maturity for new technology. The Hype Cycle in essence states that many new technologies get a large amount of visibility early in their maturity cycle. The visibility and enthusiasm drops sign...
Xero small business accounting software believes SaaS (software as a service) and especially mobile accounting software is the way to empower small business in a way that can influence whole countries' gross domestic products (GDP.) Xero's U.S. President Jamie Sutherland explains how t...
I had a very interesting discussion with a retail customer recently. I guess the retail business experiences employee turnover more than other areas, and the IT department is no exception. A key issue to them was expertise. They look for technologies that can be quickly learned by t...
Is there an emerging market for OEM-ed Hadoop? Altoros Founder and CEO Renat Khasanshyn (pitured below) saw initial evidence of this recently, at a meetup he organized in San Ramon, CA.The meetup was ostensibly about Cloud Foundry and Docker, and featured speakers discussing the use of...
Technology was dominated by several prevalent trends in 2014 – from the Internet of Things (IoT) and big data to the cloud and cyber security, it seems like there was barely a day without one of these trends creeping up in the news. Now we have entered 2015, these trends are still at t...
While a year ago the big breach of the day involved likes of Target, now the breach landscape – which was once about financial gain – has exploded. It’s exploded to a world of state-sponsored attacks, of hackers getting more intelligent and of political organizations cyber-attacking al...
Ninety-percent of your users want your site to perform well during peak periods, like the last month or so. That's according to a study by Compuware, in which they also found that most dissatisfied users will throw you under a bus if your app or site performs poorly while they're despe...
It is important that operations be in the loop when it comes to planning any software deployment. They need to know when the project starts, not at the last minute about your new deployment. Ensure that operations is aware of any infrastructure changes needed well in advance. If the op...
Redis has quickly become one of the top open source key value stores around. We at Stackify have been using Windows Azure's Managed Cache but have had a long history of intermittent problems with it. So we decided it was time to bite the bullet and give Redis a try, which Azure now sup...
If you're one of the many organizations exploring Service Virtualization as a way to "shift left" quality efforts and accelerate the SDLC, don't miss this recap of the top Service Virtualization research, papers, videos, and case studies from 2014. The concept of leveraging a simulat...
Virtualized environments are demanding when it comes to storage. Tier-1 virtualized applications require always-on, fast, available access to data. One of the ways that today’s virtualization vendors are increasing the stability and speed of storage access in virtualized environments i...
Is there a point where business can safely assume they have hit the limit of what traditional IT organizations have to offer? In an Internet and data driven world, does IT simply lack the agility and depth needed to fulfill business requirements and need for innovation? Parts of clou...
Once again after a couple weeks off and the calendar odometer flipping another year, I’m sitting here with a blinking curser wondering what to write about. And the thing that pops into my head are Things. The Everythings. While 2014 was the hype year for the Internet of Things (IoT), a...
Through http://blog.ipspace.net I landed on this article on acm.org discussing the complexity of distributed systems. Through some good examples, George Neville-Neil makes it clear that creating and scaling distributed systems is very complex and “any one that tells you it is easy is e...
What do we know so far about cloud computing? Well, first the hype-cycle slowed down and we started realizing that hybrid cloud (as a combination of public and private resources) was a relatively sensible idea, i.e., from both an expenditure (public) and security (private) perspective....
One way or another, all data center networks exhibit at least 6 different functional areas that their operators need to engineer, implement, and operate with a differing set of needs and requirements. Similarly, in one way or another, most of the available SDN and virtualized network s...
Tis’ the season – the season where I look back at predictions I made last year, the season where I evaluate and take a deep dive into the breach landscape and the season where I look into where 2015 is headed. In a March 2014 blog post, I discussed how the sheer amount of data breaches...
These are exciting times to be working in business technology. Now, the convergence of mobile, cloud and social computing has enabled businesses to better connect, engage and capture new customers within their markets from the software applications they develop. But there’s a catch. T...
As I mentioned above, I find that understanding the "why" of moral and ethical behavior is just as important as knowing "what" moral behavior is expected. For this reason, I will briefly outline the origins of the ethical principles I have outlined above. Broadly speaking, ethical an...

#DevOps

App deployment should be viewed as a comprehensive, end to end process.But we treat it today like each silo is a fork in a project that never merges back together, causing disjointed operations, reporting, measurement and ultimately, failure to meet business priori...

Go ahead. Name a cloud environment that doesn't include load balancing as the key enabler of elastic scalability. I've got coffee... so it's good, take your time... Exactly. Load balancing - whether implemented as traditional high availability pairs or clustering - provides the mean...
DevOps Summit at Cloud Expo 2014 Silicon Valley was a terrific event for us. The Qubell booth was crowded on all three days. We ran demos every 30 minutes with folks lining up to get a seat and usually standing around. It was great to meet and talk to over 500 people! My keynote was we...
Fraud is definitely top of mind for all banks. Steve Rosenbush at the Wall Street Journal recently wrote about Visa’s new Big Data analytic engine which has changed the way the company combats fraud. Visa estimates that its new Big Data fraud platform has identified $2 billion in poten...