Welcome!


One of the more popular methods of dealing with not just with the explosion of devices but the growing challenge of dealing with growth of compute devices under management in general is virtual desktop infrastructure (VDI). While VDI has been overshadowed of late by newer and shinier T...
We present a unique case study of applying data mining and advanced statistical methods to analyze, diagnose and improve manufacturing yield, especially for rare failure event prediction. Intra-die process variations in nanometer technology nodes pose significant challenges to robust d...
I was asked by Mr. Peter Hastings (NH DoIT Commissioner) about my understanding and knowledge of "End to End Solutions". I have witnessed these solutions before but I wanted to find a good definition. So, I began my research and found this definition: One supplier or one company that c...
APIs are transforming businesses to extend the reach of their information systems and data. In technical terms, APIs are rather finite, allowing two software applications to exchange data and execute procedures. Yet their business impact is so great that API management requires a far f...
While unprecedented technological advances have been made in healthcare in areas such as genomics, digital imaging and Health Information Systems, access to this information has been not been easy for both the healthcare provider and the patient themselves. Regulatory compliance and co...
SAP's Mobile Platform allows mobile developers to create a wide variety of different styles of enterprise mobile apps, and supports both native and HTML5/Javascript-based architectures. This article compares and contrasts the four major programming APIs that allow developers to write ...
Organizations have started to see the value in discovering and harnessing the potential of the typically large amounts of information as well as data they generate and consume on a regular basis, all in ways that help their organizational goals and associated business models perform we...
Andreas Grabner described how he used the Compuware APM PureStack technology to identify the server-side performance issues during a recent load test run against the Compuware APM Community Portal, a production application used by our customers. He was able to quickly identify the CPU ...
When it comes to the future impact of virtualization upon data centers and networks, we may already have experienced “the shot heard ‘round the world.” In fact, the stage is set for the next wave of the “virtualization revolution.” Most IT organizations already recognize the importan...
Triggered by current expected load projections for our community portal, our Apps Team was tasked to run a stress on our production system to verify whether we can handle 10 times the load we currently experience on our existing infrastructure. In order to have the least impact in the ...
Over the past two decades relational databases have been most successful in serving large scale OLTP and OLAP applications across enterprises. However, in the past couple of years with the advent of Big Data processing, especially processing unstructured data coupled with the need for ...
This is the third episode of the mini-series on e-commerce performance management. Our client TescaraHats (name changed for commercial reasons), a European market leader in manufacturing customized hats, did not achieve the expected sales increase with its new e-commerce site. It offer...
In my recent article, "Five Steps to Improve E-Commerce Performance for Increased Sales: Introduction” I discussed problems encountered by our client TescaraHats (name changed for commercial reasons), a European market leader in manufacturing customized hats. The company quickly realiz...
Cloud service providers store data all over the globe, and are constantly moving that data from one datacenter to the next for reasons as wide-ranging as cost considerations and redundancy requirements. Does this mean that the requirements outlined in varying data residency laws and pr...
Software-defined networks are all the rage these days – and why not? They offer the promised benefit of making networks far more agile and responsive to dynamically changing application requirements. Consequently, in theory, the entire networking-computing-storage-applications ecosyste...
Service Component Architecture (shortly referred as SCA) is a technology for creating services from components. SCA is a set of OASIS standards and part of it is developed with the collaboration of vendors from open source community, referred as “OSOA” Open SOA. SCA helps to build syst...
Adding more memory to your JVMs (Java Virtual Machines) might be a temporary solution to fixing memory leaks in Java applications, but it for sure won’t fix the root cause of the issue. Instead of crashing once per day it may just crash every other day. “Preventive” restarts are also j...
Software Defined Networking (SDN) has become a famous paradigm and also the bandwagon in the networking industry today. SDN is primarily considered to be a methodology or approach to solving some of the wider-known problems in the enterprise and service provider networking space. It’s ...
OSGi is the latest component model to join the bandwagon of component models, which provides a platform for component oriented development and assembly. OSGi framework is a standards based platform whose specifications are provided by the OSGi Alliance (www.osgi.org, formerly OSGi was ...
As the proliferation of data continues, traditional networking infrastructure is struggling to keep up with the world’s influx of information and data. Legacy networking technologies are in need of an overhaul and software-defined networking (SDN) has been touted as the response and th...
A component is a reusable software entity. A component is a deployable piece of software that can be independently developed and maintained. In the previous article –Componentizing a Monolithic Application in Java, we discussed the need for componentizing applications to get the benefi...
A component is a reusable software entity that is developed and deployed independently. Component based software development has many architectural advantages. In the previous article Componentizing a Monolithic Application in Java, we learnt the need for componentizing applications fo...
Few, if any, information technology subjects have garnered more attention over the past two years than Big Data. It’s a savior. It’s evil. It’s the killer app of killer apps. And now, according to Gartner analyst Svetlana Sicular, “Big Data Is Falling into the Trough of Disillusionment...
After you have secured your private electronic information using encryption and learned how to encrypt and digitally sign files for others, how do you extract the information and determine who encrypted the file? Asymmetric public/private key encryption allows you to decipher the infor...
Identity management just isn’t what it used to be. Gone are the days when knowing who had access to what was simply enough. In today’s world of increasing government and industry regulation; networked communications and collaboration; and pervasive mobility, the requirements have funda...
Now that you have the JavaScript skills that you need for using jQuery, you’re ready to learn jQuery. So, in this excerpt, you’ll learn a working subset of jQuery that will get you off to a fast start. When you complete this section, you’ll have all the jQuery skills that you need fo...
In today’s environment, information security is crucial for everyone. Security needs vary widely from protecting social security numbers to guarding corporate strategy. Information espionage can occur at all levels. A human resources employee or manager takes employee personnel files h...
Component-oriented development has many architectural advantages. In spite of this, many developers tend to solve problems the monolithic way on the first go. This article demonstrates how a monolithic design can be modified to achieve component-based design. During this conversion pro...
Let’s start with the basic question: What is the disruptor? The disruptor is a concurrency framework for Java that allows data sharing between threads. The age old way of coding a producer-consumer model is to use a queue as the buffer area between the producer and the consumer, where ...
Many years ago I prepared my first PowerPoint slide deck and used it as visuals in front of a small audience. Over the last twenty years I made tons of presentations on IT related subjects. In this blog I’d like to share with you a dozen rules I use while preparing my slide decks or sp...
Service Oriented Architecture was hailed as the next major leap ahead in the ICT industry and was predicted by many to be as big a leap forward as that achieved with Object-Oriented software design patterns. For example, in 2006, Joseph Bih introduced SOA in a research article as an in...
The term “Business Intelligence” and its acronym “BI” are so pervasive in today’s data-intensive lexicon that it’s a challenge to know just what to make of it. If you add in all the new trendy terminology such as business process management (BPM), data mining, data warehousing, busines...
Some software developers have an impression that JavaScript is a second-league interpreted language with the main purpose of making Web pages a little prettier. The reality is different though. JavaScript is a powerful, flexible, dynamically typed language that supports object-oriented...
In this article I will provide you an effective and optimized approach of Factory Design Pattern in Java. As you know theFactory Method Pattern or popularly known as the Factory Design Pattern is one the design patterns under the category of "Creational Design Pattern". The basic prin...
Consumers are continuing to adopt multiple connected devices and video content is expected to reach more than 70 percent of global traffic. This growth and the increased reliance on wireless networks is putting stress on existing 802.11a/b/g/n networks. As a result of this high usage, ...
This article gives you an inner insight into the design of a better singleton design pattern. In this article you will be able to learn how break a singleton design if it not designed properly. It will help you to follow the best practices adopted in the industry. A few days ago when ...
Most people agree that our technology is getting smarter, but most don’t realize just how smart. Sure, they know their smartphones have GPS capability and their smart appliances are capable of improving efficiency, but that’s just the tip of the iceberg. In reality, smart technology is...
Open source software has probably been the biggest driver of complex software solutions in the last decade. Access to a large variety of quality, peer-reviewed software has accelerated product development, reduced product introduction intervals and lowered the costs for producers of so...
For many years, companies collected data from various sources that often found its way into relational databases like Oracle and MySQL. However, the rise of the Internet, Web 2.0, and recently social media began an enormous increase in the amount of data created as well as in the type ...
Business processes manage the operational flow of business and when optimized achieve cost containment and flexibility as they need to be efficient and able to adapt to changing business conditions. The art of planning and implementing process management requires all the best cross-fun...