ADS BY GOOGLE

The business value of analytics has never been greater. But enterprises are flooded with a deluge of data spread across analyst desktops, big data stores, data warehouses and marts, transaction systems and the cloud. How do analysts overcome these data challenges? Data is the lifeblo...
Three HP executives discuss the implications and business value from the Converged Cloud, the major focus of discussion at HP Discover 2013. What's happening in the market today, is that on one end, you have startups that are rushing to the cloud very quickly, that use cloud and don't...
Back in the good old 1990s we were actually concerned with software application performance factors such as processing power clock speed along with system memory and storage. While memory is still an important determining factor, the questions of microprocessor megahertz and total syst...
When it comes to analyzing your web application’s performance, TraceView has already instruments a wide spectrum of Java components, such as application servers, frameworks and JDBC connections, all with the convenience of simply including TraceView Java agent jar in your JVM. However,...
Glitches in important IT systems — like NatWest and Google Drive — can no longer be “the cost of doing business” in this day and age. Interestingly, we're starting to see another concerning trend: more and more crashes blamed on faulty hardware or network problems, while the software ...
Our client TescaraHats (name changed for commercial reasons), a European market leader in manufacturing customized hats, set up an e-commerce site in hopes of increasing its market share and boost its sales. This did not happen. TescaraHats learned quickly that there is much more to e-...
Last month, I went to my engineering school, where I graduated 15 years ago, to attend the Annual Gala. While there, I met a few young engineers who asked about my job. This raised a question: “What would make them join my team?” In the IT world, the demand for highly skilled software...
Amazon has built a classic virtuous cycle. They got IaaS to work, disrupting the pre-existing data center outsourcing market. They achieved market dominance, enabling them to be the low-cost leader. And they figured out how to scale, facilitating unlimited growth. But such growth and m...
If you’re a regular here, you know how much we care about the full-stack view of applications. Today, let’s zoom in a bit, and talk about the performance of a single layer. In particular, let’s look at profiling in Python. As an example, let’s take this bit of code for calculating con...
While nearly 90 percent of business and IT leaders agree that big data can be useful in making intelligent business decisions, only one-third of companies have implemented big-data initiatives. Furthermore, more than 50 percent of survey respondents said that they had only lukewarm s...
Nowadays every single CIO, CTO, or business executive that I speak to is captivated by these three new technologies: Big Data, API management and IoTs (Internet of Things). Every single organizational executive that I speak with confirms that they either have current projects that are ...
This is the third episode of the mini-series on e-commerce performance management. Our client TescaraHats (name changed for commercial reasons), a European market leader in manufacturing customized hats, did not achieve the expected sales increase with its new e-commerce site. It offer...
In my recent article, "Five Steps to Improve E-Commerce Performance for Increased Sales: Introduction” I discussed problems encountered by our client TescaraHats (name changed for commercial reasons), a European market leader in manufacturing customized hats. The company quickly realiz...
On May 22, Ethernet – Robert Metcalfe’s ingenious invention –celebrated its 40th anniversary. As the global tech community celebrates this milestone for one of the world’s most transformative technologies, we take a look at its evolution from a printer-to-printer communication system a...
Complexity is the new reality of web and mobile applications with almost no new release going out without the addition of services and applications spread across many different companies. But the reality of this new interrelationship is still the same: If a third-party Internet outage ...
We must bring together the worlds of SOA, BPM, Cloud, REST, and HOA. The secret to getting all these architectural trends to work well together centers on how we deal with state information. We must first separate application state from resource state, and then subsequently take the co...
The saying “if it doesn’t exist on the Internet, it doesn’t exist”[1] is ringing truer every day. Nowadays, it is hard to imagine most businesses without an e-commerce platform, let alone without a web presence at all. Since e-commerce is becoming the new standard, e-commerce performan...
Part 2 of a two part blog series looking at the journey enterprise IT departments take as they increasingly seek to understand the relationships and impact of IT infrastructure performance on application performance and business services. Through observation, Fred notices that even...
Here at AppNeta, we get to see a lot about how people build their web applications. From simple PHP scripts to heavily service-oriented Java clouds to monolithic Django apps, everybody’s product is architected a little differently. We’re still out to trace everything, and today I want ...
From its origin in 1995, SSH, the secure shell data-in-transit protocol, has been used the world over as a method to transfer data between machines, as well as a tool to provide remote administrator access. Some variation of the protocol is packaged free in every version of Unix, Mac O...
We have all been getting used to the term Big Data by now. Despite varying definitions of what it is supposed to mean across a variety of computing platforms and use cases, we typically understand Big Data to refer to anything from “hundreds” of gigabytes for smaller organizations thro...
The first law of change management is not to use change management. To be more precise, the first law of change management is not to use change management until you use configuration management first. Okay so that might be a slightly sneaky way of making a point, but many change manag...
What is the most secure way to authenticate electronic data? Until recently, many technical people would have answered ‘cryptographic keys’ without blinking. But recent headline events – and a ‘biggie’ last year – have raised serious doubts about the ability of cryptographic keys to pr...
Part 1 – of a two part series looking at the journey enterprise IT departments take as they increasingly seek to understand the relationships and impact of IT infrastructure performance on application performance and business services. As a product manager at Netuitive, I’m often put...
Following my high-level write-up of Hadoop and Big Data, this article will present each of the components or projects that make up Hadoop with a technical description of each. First, what is Hadoop? Hadoop stores and processes large volumes of a wide variety of data that changes rapi...
Every young software business is different. Yet regardless of niche, competitive pressures or economic conditions, all startups face the same key issues. It’s possible to survive those hectic, early years as a bootstrapped business – even thrive during them. All you need is… 1) An ide...
I read the following question recently, "Are we acting strategically enough to matter?" I remember the question, because I believe it is so important for us all to answer. It is a question all IT and business people should be asking themselves! In this picture of charging elephants,...
This review covers both Core Java Volume I--Fundamentals (9th Edition) and Core Java, Volume II--Advanced Features (9th Edition). Both books are part of the Prentice Hall Core Series. I actually got Volume II first and liked it so much I ordered Volume I. I felt like I was missing the...
Talent recruiting is undergoing a major shift with the introduction of Big Data, turning a traditional industry on its head. Previously, recruiting was primarily conducted through open directories like Monster.com, where candidates were spammed according to keyword matches. Then the j...
Back in the misty eons of time, it used to be easy to measure the performance of your application. You’d grab a stopwatch, load up your web application, and see what happend. If it was slow, you’d look at the mess of PHP, HTML and CSS you crammed into index.php and make sure that you w...
A question that every online application provider will face eventually is: Does my application scale? Can I add an extra 100 users and still ensure the same user experience? If the application architecture is properly designed the easiest way is to put an additional server behind the l...
Software Defined Networking (SDN) has become a famous paradigm and also the bandwagon in the networking industry today. SDN is primarily considered to be a methodology or approach to solving some of the wider-known problems in the enterprise and service provider networking space. It’s ...
I started my career as a Telecom Engineer for Rational Software in the load testing space back in the late ’90s, and when I look back on the last decade, there were enormous advances in the broader IT world including development methodologies, processing speeds, network speeds, mobile ...
George Newstrom, head of Dell's federal government defense and national security business, outlines the evolution of information technology from mainframes and servers to "disruptive" technologies such as cloud computing and mobile devices. Platform one saw mainframes and terminals hi...
When you look at the database market, it’s a virtual jungle out there. Those of us in the industry 15 years ago can look back and remember when we only had the option to use a relational database from Sybase, Oracle, Microsoft or IBM. That was pretty much it if you were planning to bui...


ADS BY GOOGLE