Welcome!


Top Stories

QAD Inc. (NASDAQ: QADA) (NASDAQ: QADB), a leading provider of enterprise business software and services for global manufacturers, today announced that Leslie J. Stretch has been appointed to the Company’s board of directors. QAD’s board now totals six members, four of whom are independent directors. Stretch is also a member of QAD’s Audit Committee of the board of directors. Stretch, 52, joined Callidus Software Inc. in 2005 and has served as President and CEO since 2007. He joined Callidus Software’s board of directors in 2008. Prior to Callidus, Stretch has served in a variety of senior sales and marketing roles with global multinational software and technology companies including 9 years at Sun Microsystems and 6 years at Oracle in both the United Kingdom and North America. “QAD is excited to have Leslie J. Stretch join our board of directors, where his depth o... (more)

The Top 150 Players in Cloud Computing

Cloud Expo Early Bird Savings A robust ecosystem of solutions providers is emerging around cloud computing. Here, SYS-CON's Cloud Computing Journal expands its list of most active players in the fast-emerging Cloud Ecosystem, from the 'mere' 100 we identified back in January of this year, to half as many again - testimony, if any further were needed, to the fierce and continuing growth of the "Elastic IT" paradigm throughout the world of enterprise computing. Editorial note: The words in quotation marks used to describe the various services and solutions in this round-up are in every case taken from the Web sites cited. As ever we encourage software engineers, developers, IT operations managers, and new/growing companies in every case to "suck it and see" by downloading or otherwise sampling the offering in question for themselves. (Omissions to this Top 150 list sh... (more)

The Top 250 Players in the Cloud Computing Ecosystem

In the run-up to the next Cloud Expo, 7th Cloud Expo (November 1–4, 2010) being held at the Santa Clara Convention Center in Silicon Valley, it's time to give my earlier list a complete overhaul. Here, accordingly, is an expanded list of the most active players in the Cloud Ecosystem. I have increased it from the 'mere' 150 I identified back in January of this year, to 250, testimony – as if any were needed! – to the fierce and continuing growth of the "Elastic IT" paradigm throughout the world of enterprise computing. Editorial note: The words in quotation marks used to describe the various services and solutions in this round-up are in every case taken from the Web sites of the companies themselves. Omissions to this Top 250 list should be sent to me via Twitter (twitter.com/jg21) and I will endeavor to include them in any future revision of this newly expanded rou... (more)

Where Are RIA Technologies Headed in 2008?

I am always being told off by i-technologists for quoting Picasso as having said that computers are useless. But I still love his reasoning? "Because they can only give you answers." Picasso, like AJAXWorld Magazine, liked questions. So we thought we would share with you what some of the world's leading rich Internet application pioneers are thinking may be the next questions that we need to see answered. From that readers can themselves infer where AJAX is headed. What are the top questions to ask next about AJAX? Eric Miraglia of Yahoo! 1.  (From March'08) How do I calculate the ROI of building my RIA on the iPhone SDK vs using AJAX? 2.  How do I assess the performance of my app and decide what to do next to make it faster?  3.  When it comes to accessibility, how do I know what's required of me for my rich web apps?  Beyond what's required, what makes good business se... (more)

Six Benefits of Cloud Computing

Despite its possible security and privacy risks, Cloud Computing - according to a magazine article due to be published later this Fall - has six main benefits that the public sector and government IT organizations are certain to want to take advantage of. In very brief summary form they are as follows: Reduced Cost Cloud technology is paid incrementally, saving organizations money. Increased Storage Organizations can store more data than on private computer systems. Highly Automated No longer do IT personnel need to worry about keeping software up to date. Flexibility Cloud computing offers much more flexibility than past computing methods. More Mobility Employees can access information wherever they are, rather than having to remain at their desks. Allows IT to Shift Focus No longer having to worry about constant server updates and other computing issues, government org... (more)

Cloud Expo New York Call for Papers Now Open

Early Bird Savings Cloud Expo Cloud computing is a game changer. The cloud is disrupting traditional software and hardware business models by disrupting how IT service gets delivered. Entrepreneurial opportunities abound as this classic disruptive technology begins to proliferate, so it is no surprise that SYS-CON's industry-leading International Cloud Expo is going from strength to strength. The 5th International Cloud Expo, to be held April 19-21, 2010, at the Jacob Javits Convention Center in New York, NY, announces that its Call for Papers is fast approaching. Topics on which submission are welcome include all aspects of providing or using massively scalable IT-related capabilities as a service using Internet technologies (see suggested examples below). Help plant your flag in the fast-expanding business opportunity that is The Cloud: submit your speaking propos... (more)

Cloud Expo 2011 East To Attract 10,000 Delegates and 200 Exhibitors

SYS-CON Events announced today that the 8th International Cloud Expo will take place June 6-9, 2011, in New York City. The International Cloud Computing Conference & Expo series is the world's leading Cloud-focused event and is held three times a year, in New York, Silicon Valley and in Europe. Over 600 corporate sponsors and 10,000 industry professionals have participated in Cloud Computing Expo since its inception, more than all other Cloud-related events put together. Cloud Computing Expo 2011 East Call for Papers Deadline November 30, 2010 - SUBMIT YOUR SPEAKING PROPOSAL TODAY! The four-day event will offer a rich array of sessions led by exceptional speakers about the business and technical value of cloud computing with more than 150 sponsors and exhibitors and over 5,000 estimated delegates from well over 48 different countries. Explore Cloud Expo Sponsorship &... (more)

The Top 100 Bloggers on Cloud Computing

Ever since I first published here my tentative list of Top 50 Bloggers on Cloud Computing it became clear that an expansion would be needed before too long. Thanks to community feedback via my Twitter account (http://twitter.com/jg21) here goes - just three months before Cloud Expo Silicon Valley (November 7-10) - with an expanded roster, listed as before in alphabetical order since I am making no attempt at this stage to rank the various blogs, merely to map - and celebrate - their existence. Dustin Amrhein | "A View from the Clouds" Dave Asprey | "Cloudy Words" Ian Bergin | "Clouded Issues" Randy Bias | "Cloudscaling" Rick Blaisdell | "Rickscloud" Steve Bobrowski | "The Cloud View" Rene Buest | www.CloudUser.de Larry Carvalho | "Robust Cloud" Andrew M. Chapman | "MemorableURL.com" Sam Charrington | "Cloud Pulse" Colin Clark | "Cloud Event Processing" Peter Coffee | cloudb... (more)

Most Powerful Voices in Security

The security community has a growing number of influential and important people, especially as the industry rises to meet the need to address more advanced security threats, such as targeted attacks. But how does a company in the security industry truly identify the influential people? And then once identified, how does one use influential voices to help promote their brand? In this study, we answer the first question - how to identify the most powerful voices in your industry, focusing on the security space, and as part of this we provide you a list of people to follow for the best, most up to date information, and who have the loudest voices to help help carry some of your key messages. In a future study, we will discuss how to further exploit that knowledge to market your brand. As executives in a fast-changing and social world, many of us struggle with the abil... (more)

Top 50 Bloggers on Cloud Computing

Ever since I first published here my tentative list of Top Players in the Cloud Computing Ecosystem - now expanded to a list of 250 and growing daily thanks to community feedback via my Twitter account (@jg21) and a very kind mention by ReadWriteWeb - there have been suggestions that another prism through which to view cloud computing might be that of people rather than companies. Now Michael Sheehan has encouraged me to Just Do It, so let me get started...as per the previous Top Cloud Players list, this list will a work-in-progress and is totally porous, so don't hesitate to ping or tweet me if there are folks I have missed. In particular if you are a journalist whose "beat" is Cloud Computing, please let's be hearing from you, and we can maybe widen this list from Cloud Bloggers to Cloud Commentators. For now though let's get started. In alphabetical order - to av... (more)

FullArmor GPAnywhere Secures Microsoft Application Virtualization Applications Through Group Policy

FullArmor announced that GPAnywhere secures Microsoft Application Virtualization through Group Policy to provide greater security in a virtualized environment. Group Policy is a Microsoft technology used by IT administrators to help secure and configure Windows-based servers, desktops and laptops. With Windows Vista and Windows Server 2008 there are over 2400 Group Policy settings, but they were not designed to work with virtualized applications. FullArmor's GPAnywhere "virtualizes" Group Policy so that these settings can be applied to the virtual application. Specifically, when Microsoft Application Virtualization launches, GPAnywhere processes the policy for that application and applies it. "With the proliferation of virtual applications, it is critical that security adapt to the virtualized environment," said Danny Kim, CTO of FullArmor. "GPAnywhere delivers Grou... (more)

CloudEXPO Stories
92% of enterprises are using the public cloud today. As a result, simply being in the cloud is no longer enough to remain competitive. The benefit of reduced costs has normalized while the market forces are demanding more innovation at faster release cycles. Enter Cloud Native! Cloud Native enables a microservices driven architecture. The shift from monolithic to microservices yields a lot of benefits - but if not done right - can quickly outweigh the benefits. The effort required in monitoring, tracing, circuit breakers, routing, load balancing, etc. for thousands of microservices can become overwhelming. This talk will address strategies to run & manage microservices from 0 to 60 using Istio and other tools in a cloud native world.
It's clear: serverless is here to stay. The adoption does come with some needed changes, within both application development and operations. That means serverless is also changing the way we leverage public clouds. Truth-be-told, many enterprise IT shops were so happy to get out of the management of physical servers within a data center that many limitations of the existing public IaaS clouds were forgiven. However, now that we've lived a few years with public IaaS clouds, developers and CloudOps pros are giving a huge thumbs down to the constant monitoring of servers, provisioned or not, that's required to support the workloads.
In very short order, the term "Blockchain" has lost an incredible amount of meaning. With too many jumping on the bandwagon, the market is inundated with projects and use cases that miss the real potential of the technology. We have to begin removing Blockchain from the conversation and ground ourselves in the motivating principles of the technology itself; whether it is consumer privacy, data ownership, trust or even participation in the global economy, the world is faced with serious problems that this technology could ultimately help us in at least partially solving. But if we do not unpack what is real and what is not, we can lose sight of the potential.
Serveless Architectures brings the ability to independently scale, deploy and heal based on workloads and move away from monolithic designs. From the front-end, middle-ware and back-end layers, serverless workloads potentially have a larger security risk surface due to the many moving pieces. This talk will focus on key areas to consider for securing end to end, from dev to prod. We will discuss patterns for end to end TLS, session management, scaling to absorb attacks and mitigation techniques.
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addresses many of the challenges faced by developers and operators as monolithic applications transition towards a distributed microservice architecture. A tracing tool like Jaeger analyzes what's happening as a transaction moves through a distributed system. Monitoring software like Prometheus captures time-series events for real-time alerting and other uses. Grafeas and Kritis provide security polic...