ADS BY GOOGLE

A commonly used preventative measure is storing data via RAID arrays, but it is important to understand that not all levels of RAID provide sufficient protection. Commonly, RAID 10 (combination of RAID 1 and RAID 0) for quick recovery, and RAID 6 (RAID 5 plus an additional hard disk to...
The last few years have seen an explosion in the demand for enterprise mobile solutions. This movement has been clearly reflected in the rapid evolution of the enterprise mobile platform ecosystems. From mobile device management (MDM) to enterprise mobile middleware technologies, the i...
Empirix uses an advanced analytics engine to continuously and proactively evaluate carrier network performance and customer experience metrics to automatically identify issues as they emerge. To learn more about how a combination of large-scale, real-time performance and pervasive dat...
Performance is one of the key non-functional needs for any application and performance requirements needs to to be captured as part of requirements & analysis phase in a way that is understandable by all application stakeholders. In this article, we will see the key aspects of performa...
In my last blog, I looked at the ways in which Software-Defined Network (SDN) and Network Functions Virtualization (NFV) enhance flexibility and allow for greater services mashups, and I ended with the question of how billing and compensation will support these new capabilities. With ...
In recent years the focus of enterprise mobility has been on device support, UX and the novelty of spinning wheels, swiping screens and supporting various keyboard designs in mobile UIs. I believe the novelty of this will soon wear off with the introduction of more standards, policies...
We're in the middle of another major shift in computing and IT: the decline of the hard disk and the rise of solid-state memory. Solid-state has been around for a while, but it's always been expensive, volatile and low capacity. That's changing, and it's changing IT as well. Computing...
In my previous blog, I suggested that both Software-Defined Networks (SDN) and Network Function Virtualization (NFV), although arguably different in intent and in detail, are nevertheless both driving the evolution of network architecture in the same direction. Network functions are ab...
Client latency is driven by multiple factors, in the browser, network, and code. Dan Riti explores all those factors, including how Google... Let's face it, users are impatient. They demand a blazingly fast experience and accept no substitutes. Google performed a study in 2010 which p...
There’s a great management book called “The Other Guy Blinked” by the ex-CEO of Pepsi that describes the episode when Coke tried to change its formula and make its core product better. The company re-wrote its product recipe and tried to shake up the market. In the case of Coke, the c...
Exposing an API to your application is as risky as installing a doggie door into your house—as a recent incident with a bear aptly illustrates. Exposing an API to your application is as risky as installing a doggie door into your house: you expect your dog to have the convenience of o...
Most of my friends in the US are looking forward to the new Healthcare website that allows them to select the health insurance that best suits their needs. As with any new website that has been anticipated by a lot of people, it was not a big surprise that there were glitches when mill...
Contrary to common misconceptions, offshore product development (OPD) of software involves a lot more than just cutting costs and accelerating time-to-market. Savvy companies know OPD enables them to improve the quality of their software. Outsourcing software development and independe...
Some of the most technologically advanced organizations in the world today are utilizing strategies based on the concept of the Network Centric Organization. These strategies, methodologies and concepts are important for just about any organization that is geographically dispersed and...
This book is exactly what the sub-title "A Practical Guide to Agile Requirements Discovery" says it is. The book is a very detailed breakdown of the steps that should be taken by Scrum teams that want to succeed. I have listed the chapters below to give you an overview of the topics ...
The Democratic National Committee leveraged big data analytics to better understand and predict voter behavior and alliances in the 2012 U.S. national elections. To learn more about how the DNC pulled vast amounts of data together to predict and understand voter preferences and positi...
A leading telcom's testing efforts were regularly delayed & cut short due to test environment access constraints. Learn how service virtualization helped. To accelerate application release cycles, KPN needed to address a critical bottleneck in the testing process. Their end-to-end tes...
It's common enough to be expected, but the IT world is continually undergoing all kinds of restructuring, remodeling and rethinking when it comes to approaching day-to-day tasks and challenges, both typical and atypical. A requirement of today's IT professional is to not only be fully ...
Let's start at... the beginning. What is the in-memory computing? Kirill Sheynkman from RTP Ventures gave the following crisp definition which I like very much: "In-Memory Computing is based on a memory-first principle utilizing high-performance, integrated, distributed main memory sy...
Cloud computing has been an important trend for several years now and that trend is continuing to gather weight with new and improved ERP software offerings for manufacturers. Like any ERP selection choice, the decision to move to the cloud has pros and cons compared to traditional on-...
As you strive to achieve new levels of sophistication when creating performance baselines, it is important to consider how you will navigate the oscillating winds of application behavior as the numbers come in from all directions. The behavioral context of the user will highlight key t...
This weekend I was clever. That is newsworthy because it doesn't happen very often. Our son is stationed at a military base that did not receive TV coverage of the Boise State football game on Saturday night. It must have been the government shut-down. I can't think of any other re...
This history of email predates the modern form that we know on our desktops and mobile devices as it tracks its early origins back to the terminals and green screens of the 1960s. Sometime into the following decade we saw the first “electronic mail” message sent on ARPANET, one of th...
In the recent survey "State of Enterprise Mobility 2013" I asked the question, "How many wireless devices do you use daily?" An incredible 69 percent use three or more wireless devices daily. I myself use three - my MacBook Pro, iPad mini and iPhone. I use my iPad mostly for reading ...
Although this book is written for the Java programmer, I would recommend reading it to any .NET or iOS developer as well. It is a must read for the Java developer, but is also a valuable read for developers of other languages because the guidelines are often built around a programmer's...
Is Service Virtualization is worth it? Consider the ROI opportunities: OpEx/CapEx reduction, risk reduction & incremental top-line revenue. Last week, we explored the business value of service virtualization: how service virtualization's simulated test environments speed innovation, a...
In our last two articles, we discussed what we have learned from last year’s holiday season as well as things that we can do in the preparation phase for this year’s upcoming event. In this blog we show you those dashboards and data points you need throughout the holiday season to make...
The first thought that came to mind when I saw this book was, "Uhg, another Scrum book, you've got to be kidding me." Then the title of Scrum Shortcuts really gave me a sickening feeling. The majority of the Scrum teams I have watched work do nothing but take shortcuts. They sure as he...
Healthcare technology provider TriZetto has been improving its development processes and modernizing its ability to speed the applications lifecycle process, using quality and Agile methods tools to better support a lifecycle approach to software. To learn more about how quality and A...
In this technology-driven world, information is as easy to obtain as the click of a mouse…only if the content can be accessed through its digital availability, that is. With this in mind, it is important to realize how heavily content impacts every aspect of a business—from a potential...
Identity and access management solutions provide governance and visibility capabilities that enable organizations to provision and control access to their applications, cloud infrastructure, servers and both structured and unstructured data. Enterprise IAM deployments are generally eff...
Fast-growing healthcare claims company Navicure is gaining better control and optimization across its IT infrastructure by deploying a comprehensive monitoring and operational management approach and taming IT complexity. The next VMworld innovator interview focuses on how a fast-grow...
Data centers are perched upon technology’s advanced battlements. They must be highly scalable and able to support ever-increasing bandwidth each year. Newer data centers look far differently than they did just a decade ago, and strategies for design and style continue to shift under th...
In the search for business software, companies have a habit of turning to the 800-pound gorillas in the room. Gorillas, however, do not have the motor skills to create applications that meet highly specific needs. Today, companies are more likely to find unique capabilities and achieve...
Film and production companies are often located across the globe with several teams working collaboratively to create the next box office hit. Imagine you are an animator in Brazil and in charge of illustrating the characters for a future film. Similarly, the individual who is creating...
OData is quickly becoming the Lingua Franca for data exchange over the web. The OData standard defines a protocol and a language structure for issuing queries and updates to remote data sources, including (but not limited to) relational databases, file systems, content management syst...
Explore how the agility goal of real-time responses is no longer good enough. What’s apparent across more business ecosystems is that businesses must do even better, to become so data-driven that they extend their knowledge and ability to react well into the future. In other words, we'...
No matter where you turn today, it appears that everyone is speaking about Big Data and how it drives customer insight. Sites like this often have a dedicated section for “Big Data” news, and my inbox is full of whitepapers, webinar invitations, and advertisements for new and exciting ...
Project management analysis is a dangerous topic. It is very easy to sit back and talk about flawed project direction and targets as we point to the number of failed IT programs that seem to crop up repeatedly. If we are honest about it, do any of us even notice survey statistics clai...
Performance is your website’s first impression to visitors. Almost 50% of users expect a web page to load within two seconds. The move from a shared server to a dedicated server can alleviate many of a website’s performance issues and improve overall revenue and user experience. Share...


ADS BY GOOGLE