Welcome!


Enterprise

for storage and computing operations at scale. These capabilities allow organizations to store massive amounts of data, in disparate formats, and perform both batch and real-time analyses upon them. The forces driving Big Data into the mainstream are the ever-decreasing cost of storage...
Are you developing or hosting PHP applications? Are you doing performance sanity checks along your delivery pipeline? No? Not Yet? Then start with a quick check. It only takes 15 minutes and it really pays off. As a developer you can improve your code, and as somebody responsible for y...
Have you ever deployed a change to production and thought “All went well – Systems are operating as expected!” but then you had to deal with users complaining that they keep running into errors? We recently moved some of our systems between two of our data centers – even moving some c...
I would say that only one out of a million exceptions thrown in an application actually makes it to a log file – unless you run your application in verbose logging mode – Do you agree? No? Here is why I think that is: because most exceptions are handled by your code or by the framework...
Content Delivery Networks (CDNs) are a traditional mechanism for both improving the delivery speed of a web site while also reducing the network load on the origin servers that provide the web site. The CDN accomplishes these two goals by offloading static content from the origin web s...
These days, implementing automatic deployment for .NET web projects is easier than ever. Drastic improvements started in Visual Studio 2010 when basic deployment strategies and tools were incorporated into VS itself. Yet, documentation was quite poor at that time, so you had to scour t...
The Open Group and BriefingsDirect recently assembled a distinguished panel at The Open Group Boston Conference 2014 to explore the practical implications and limits of the Internet of Things. This so-called Internet of Things means more data, more cloud connectivity and management, a...
My favorite war room accusation is: “It’s always the network at fault!” Whether you’re the one taking the blame or the one pointing the finger likely has everything to do with which seat you occupy in that war room. I suppose that comes with the territory, because at the same time ther...
Finally a book from an industry leader that has the guts to write about the real world of Agile software development. If I had to pick one word to describe this book, it would be 'truth'. This book is going to raise the blood pressure of some of the Agilists out there. If you think ...
Isn’t it great to treat your girlfriend by cooking her favorite omelet every morning? In theory, sure, but in reality, chances are most of the time you end up with darn scrambled eggs instead. Let’s face it: you’re a great boyfriend but a terrible cook. Believe it or not, this is quite...
GSN Games exploits big data to effectively uncover game-changing entertainment trends for their audience. Oh, and it changes corporate cultures, too. It's a shame when the data analysis providers inside a company get the cold shoulder from the business leaders because the data keeps p...
Waste Management's IT organization began rebuilding their quality assurance processes from the ground up by making the appropriate choices and investments in technology, such as in people and processes -- and their scorecard is very good. It's only been a few years since Waste Managem...
Transaction management is not just for technical geeks; it is very much a subject that ‘business suits’ should be focused on. But should it be seen as a business issue for technologists or a technology issue for business people? Or doesn’t it matter and should transaction management...
At the beginning of the book the authors say they created this book to be used in a classroom setting. I agree that it is a great book for the classroom, but I would also recommend it to anyone who wants to learn about the current Agile methodologies. It does what the title of the book...
When combining all data sources into one central location, decisions become more uniform. While there are many ways to integrate multiple sources into a data warehouse, attention to detail is key to avoid creating more problems than are being solved. Choosing when to adopt a data war...
In the US Army they have a term called "Revolution in Military Affairs (RMA)." It is often associated with the use of modern data collecting technologies, communications technologies, information analysis and the use of these technologies to improve strategies, doctrines and organizati...
I am honored that the Cloud Expo conference organizers have asked me to be the Tech Chair for DevOps Summit 2014. The positive response from so many people I respect has been wonderful. Thank you to all who sent good wishes – it means a lot to me to have your support. Part of what mak...
In Part V, we discussed processing delays caused by “slow” client and server nodes. In Part VI, we’ll discuss the Nagle algorithm, a behavior that can have a devastating impact on performance and, in many ways, appear to be a processing delay. Beyond being important for (reasonably) a...
Followers of the Enterprise File Share and Sync Market (EFSS) will have noticed a flurry of announcements in the last few weeks. In particular: SAP and OpenText collaborated with Tempo Box; Egnyte outlined it would leverage Google's Storage; Box purchased Stream as well as announcing ...
An expected deluge of data and information about patients, providers, outcomes, and needed efficiencies is pushing the healthcare industry to re-evaluate interoperability, security and the ability to adapt rapidly to the lessons in the data. The means of enabling Boundaryless Informat...
A newly established firm sent out some basic information collateral to introduce itself this summer – and a new type of business model would seem to be emerging. The company here in question described itself as a non-integrated silo-based business that was disparately fragmented into ...
Ensuring a safe work environment can be accomplished when individuals work in either a government or private-sector office, but it becomes exponentially more complicated when employees are mobile, traveling from one job or worksite to another. While many organizations implement mobile ...
In Part IV, we wrapped up our discussions on bandwidth, congestion and packet loss. In Part V, we examine the four types of processing delays visible on the network, using the request/reply paradigm we outlined in Part I. From the network’s perspective, we allocate the time period bet...
We know that losing packets is not a good thing; retransmissions cause delays. We also know that TCP ensures reliable data delivery, masking the impact of packet loss. So why are some applications seemingly unaffected by the same packet loss rate that seems to cripple others? From a pe...
We talk a lot about so-called ‘business transformation’, but what do we really mean by this expression and how does it change the way (as workers) now operate on the shop floor? Read any history of the industrial revolution and you will understand the massively impactful swings that o...
In Part II, we discussed performance constraints caused by both bandwidth and congestion. Purposely omitted was a discussion about packet loss – which is often an inevitable result of heavy network congestion. I’ll use this blog entry on TCP slow-start to introduce the Congestion Windo...
When we think of application performance problems that are network-related, we often immediately think of bandwidth and congestion as likely culprits; faster speeds and less traffic will solve everything, right? This is reminiscent of recent ISP wars; which is better, DSL or cable mode...
Monitoring application performance on the surface and the currents below is a great way to build a performance baseline and provide application fluency. Ironically, the deep dive tools sets in place today still may not provide all the insight you need to quickly resolve anomalous behav...
As a network professional, one of your newer roles is likely troubleshooting poor application performance. For most of us, our jobs have advanced beyond network “health,” towards sharing – if not owning – responsibility for application delivery. There are many reasons for this more jus...
Cloud has been on a lot of boardroom agendas for quite a while, but typically those discussions have focused on using cloud around edge applications – expenses management, human capital management or perhaps customer relationship management. However, as the cloud cover extends to busin...
Few companies are able to implement Agile Development across the organization because there exists a chasm between the Application Development team and the Database Administrators. All too often, database development is an afterthought in Agile Development. Developers perfect how be...
First and foremost you can’t have a successful software-defined model if your team still have a hardware-defined mentality. Change is inevitable and whether it's embraced or not it will happen. For experienced CIOs this is not the first time they've experienced this technological and c...
Let me ask you a question: would you say that you have implemented logging correctly for your application? Correct in the sense that it will provide you with all the insights you require to keep your business going once your users are struck by errors? And in a way that does not advers...
You can spend MILLIONS every year improving and maintaining your application, but if you have no insight into your competition how do you know your place in the market and if all that investment has been worthwhile? “If you know the enemy and know yourself, you need not fear the resul...
In order to create the combination between top-down (waterfall like approaches)and local problem-decisions (Agile project approach) here are practical guidelines to pursue Three practical complex decision-problems guidelines: Simple local rules Strategic top down rules Visual probl...
Enterprise Resource Planning has traditionally been a software for large corporates with million dollar technology budgets. But that has been changing over the past decade with the advent of cloud based ERP systems. According to a survey conducted by Sage, nearly 30% of finance manager...
The next BriefingsDirect case study interview explores how improved visibility analytics and predictive responses are improving supply-chain management. We’ll now learn how SAP’s Supplier InfoNet, coupled with the Ariba Network, allows for new levels of transparency in predictive analy...
Let us pose the question: Is business transformation a dirty word? Okay it’s words plural, but you get the point. To start with we must realize why we are asking the question. It’s probably because the phraseis so prevalent at the moment. Every IT management guru worth his or her sa...
The Bloomberg Agile Architecture™ (BAA) Technique offers a way of thinking about and doing architecture that is laser-focused on business agility as the fundamental business driver. Yet while the BAA Technique is an approach to Enterprise Architecture, it’s not a framework or a methodo...
Knowledge creation is a major source of value creation. And great companies –and their employees – know that continuous learning is a key to generating knowledge, and thus value. The agile mindset, particularly in development, is gaining popularity, with credit to a suite of powerful i...