Welcome!


Latest Articles from SOA World Magazine
Many mid-market companies have invested significant time and resources to secure and back up their servers, client computers, data, and overall network infrastructure in what was the traditional client-server setup. Now, what were considered emerging technologies just a few years ago, ...
“Vote early and vote often.” Back in the 1920s and ’30s, when neither election technology nor oversight were as effective as they are today, and the likes of Al Capone were at work gaming the system, this phrase wasn’t a joke. It was a best practice. If you want guaranteed results, wh...
Despite all the news about hackers infiltrating major corporations, most businesses continue to leave themselves woefully unprotected. Some surveys estimate more than 70% of businesses perform vulnerability tests on less than 10% of their cloud, mobile and web applications. A majority ...
In Part V, we discussed processing delays caused by “slow” client and server nodes. In Part VI, we’ll discuss the Nagle algorithm, a behavior that can have a devastating impact on performance and, in many ways, appear to be a processing delay. Beyond being important for (reasonably) a...
The cloud has hit the mainstream. Businesses in the United States currently spend more than $13 billion on cloud computing and managed hosting services, and Gartner projects that by 2015, end-user spending on cloud services could be more than $180 billion worldwide. It is estimated tha...
Ransomware is the latest example of the increasingly sophisticated and damaging inventions of hackers. Individuals and organizations of all sizes are finding that their data has been locked down or encrypted until a ransom is paid. One program, CryptoLocker, infected more than 300,000 ...
up.time, from uptime software, monitors performance, availability and capacity across all servers, virtual machines, applications, IT services, and the network. Proactively find IT system performance issues before they happen, report on total capacity, easily identify troublemakers, tr...
The ability to embed prediction into multiple business processes amplifies the value that predictive analytics delivers. Yet many still see predictive analytics as a separate activity that is the responsibility of a small team of expert analysts. This webinar will show how predictive...
TIBCO Software Inc. has announced that TIBCO StreamBase®, the company's streaming data analytics platform, has been recognized as a leader in The Forrester Wave™: Big Data Streaming Analytics Platforms, Q3 2014 from Forrester Research, Inc. Big Data Streaming Analytics allow a busin...
Followers of the Enterprise File Share and Sync Market (EFSS) will have noticed a flurry of announcements in the last few weeks. In particular: SAP and OpenText collaborated with Tempo Box; Egnyte outlined it would leverage Google's Storage; Box purchased Stream as well as announcing ...
The threats facing network operators all over the world, spanning service providers, enterprises, cloud and hosting providers and mobile operators alike, are by no means stalling. While optimism is always the name of the game, we know all too well in security that trying to keep pace w...
Incident response involves addressing and managing the security events on a network and the execution of proper responses to those events. The end game is to limit the damage and reduce recovery time and costs. This is achieved with the implementation of an incident response plan tha...
An expected deluge of data and information about patients, providers, outcomes, and needed efficiencies is pushing the healthcare industry to re-evaluate interoperability, security and the ability to adapt rapidly to the lessons in the data. The means of enabling Boundaryless Informat...
If your organization’s got a lot riding on the continued security of its confidential or proprietary data, then you need to stay informed on the threats and how to address them. One of the most worrying threats of late, especially when it comes to cloud data security, is government spy...
The online world has become a dangerous place. According to a survey, 90 percent of all companies fell victim to a security breach in the last twelve months. Hacking and advanced persistent threats (APTs) have rendered the two-factor authentication token, now over 20 years old, essenti...
A newly established firm sent out some basic information collateral to introduce itself this summer – and a new type of business model would seem to be emerging. The company here in question described itself as a non-integrated silo-based business that was disparately fragmented into ...
When Swedish communications services provider TDC needed network infrastructure improvements from their disparate networks across several Nordic countries, they needed both simplicity in execution and agility in performance. Our next innovation case study interview therefore highlight...
SYS-CON Events announced today that DevOps.com has been named “Media Sponsor” of SYS-CON's “DevOps Summit at Cloud Expo,” which will take place on June 10–12, 2014, at the Javits Center in New York City, New York. DevOps.com is where the world meets DevOps. It is the largest collectio...
The introduction of the Cloud has enabled the fast and agile data recovery process which is effectively more efficient than restoring data from physical drives as was the former practice. How does this impact Backup & Recovery, Disaster Recovery and Business Continuity initiatives? Cl...
SYS-CON Events announced today that the Web Host Industry Review has been named “Media Sponsor” of SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Since 2000, The Web Host Industry Review h...
SYS-CON Events announced today that O'Reilly Media has been named “Media Sponsor” of SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. O'Reilly Media spreads the knowledge of innovators throu...
If you've had to test one of today's composite applications, you know that "access" has become one of the most daunting barriers to SDLC acceleration. Whether we're talking about access to dev/test environments or access to dependent applications, the ability to pull all the required p...
The rather stunning deal between Apple and IBM—described as “exclusive” by both parties—has been hailed as a victory for Apple, a victory for IBM, and a “victory for design.” Actually, it's a victory for Big Data. Apple has cultivated an image as the coolest of companies from the t...
SYS-CON Events announced today that Verizon has been named “Gold Sponsor” of SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Verizon Enterprise Solutions creates global connections that gen...
What inspired this piece is “Complicating the Cloud,” a recent, insightful article by industry guru Jeff Kaplan. Kaplan makes a number of trenchant points, many of them coalescing around the idea that the vendor community has a vested interest in complexity. That meshes with my beli...
Ensuring a safe work environment can be accomplished when individuals work in either a government or private-sector office, but it becomes exponentially more complicated when employees are mobile, traveling from one job or worksite to another. While many organizations implement mobile ...
A year after globally launching the FUJITSU Cloud Initiative, Fujitsu is strengthening its commitment to unlocking the business-innovation, cost-efficiency and agility benefits of cloud for its customers around the world. In doing so, Fujitsu is well on its way to building one of the b...
The era of Big Data is upon us. The volume, variety and velocity of data now being generated is unprecedented in human history. This poses a challenge for those tasked with data integration: how can we manage all this data, particularly across distributed data centers around the world?...
In a recent survey of IT pros, not only did cloud computing rank as a top three technology both as most disruptive and as most significant to business over the past three to five years, but it ranked as the number one technology investment most needed for businesses to remain competiti...
On Monday IBM stated that SoftLayer is fueling hybrid cloud adoption by attracting thousands of new clients including leading enterprises. To support this ongoing growth, IBM is also launching a range of new cloud services designed for the enterprise that are based on SoftLayer infrast...
In Part IV, we wrapped up our discussions on bandwidth, congestion and packet loss. In Part V, we examine the four types of processing delays visible on the network, using the request/reply paradigm we outlined in Part I. From the network’s perspective, we allocate the time period bet...
Another week, another cloud storage price drop. The barrier of price is slowly melting away as the cloud storage wars rage and prices drop into the pennies per gigabyte per month. Not familiar with the price wars? Here’s an abridged version: In 2013, Amazon Web Services (AWS), Microso...
How do we blaze a better path to a secure mobile future? How do we make today’s ubiquitous mobile devices as low risk as they are indispensable? As smartphones have become de rigueur in the global digital economy, users want them to do more work, and businesses want them to be more pr...
We know that losing packets is not a good thing; retransmissions cause delays. We also know that TCP ensures reliable data delivery, masking the impact of packet loss. So why are some applications seemingly unaffected by the same packet loss rate that seems to cripple others? From a pe...
We talk a lot about so-called ‘business transformation’, but what do we really mean by this expression and how does it change the way (as workers) now operate on the shop floor? Read any history of the industrial revolution and you will understand the massively impactful swings that o...
There is no doubt that Big Data is here and getting bigger every day. Building a Big Data infrastructure today is no easy task. There are an enormous number of choices for database engines and technologies. To make things even more challenging, requirements are getting more sophisticat...
Disaster Recovery (DR) technology for Enterprises and Managed Service Providers (MSPs). According to Takeshi Numoto, Corporate Vice President, Cloud and Enterprise Marketing, Microsoft, “This acquisition will accelerate our strategy to provide hybrid cloud business continuity solution...
As we become more connected online, the old system of site-specific passwords and user identity are no longer equal to the task. We need to find new ways of providing identities and authorization.
Despite the hype and drama surrounding the HTTP 2.0 effort, the latest version of the ubiquitous HTTP protocol is not just a marketing term. It's a real, live IETF standard that is scheduled to "go live" in November (2014). And it changes everything. There are a lot of performanc...
In Part II, we discussed performance constraints caused by both bandwidth and congestion. Purposely omitted was a discussion about packet loss – which is often an inevitable result of heavy network congestion. I’ll use this blog entry on TCP slow-start to introduce the Congestion Windo...