Welcome!


Latest Articles from SOA World Magazine
I'm reading a McKinsey report from May 2013 that talks about 12 disruptive technologies, including cloud computing and the Internet of Things (IoT). I'll focus on the IoT here. The report estimates the IoT Internet to be worth between $2.7 and $6.2 trillion by the year 2025.(The world'...
up.time, from uptime software, monitors performance, availability and capacity across all servers, virtual machines, applications, IT services, and the network. Proactively find IT system performance issues before they happen, report on total capacity, easily identify troublemakers, tr...
The public cloud computing model is rapidly becoming the world’s most prolific IT deployment architecture, yet it leaves many promises unfulfilled. While offering scale, flexibility, and potential cost savings, the public cloud often lacks the isolation, computing power, and control ad...
Vormetric on Tuesday announced that Rackspace Hosting has joined the Cloud Partner program, and will be offering encryption and key management services to customers via Vormetric's Transparent Encryption solution. Vormetric's Transparent Encryption combines the performance, flexibility...
Even Cloud-driven transformation isn’t the end of the story. The move to Agile Architecture is a move to continuous business transformation – where the organization is as agile as it wants to be, and is able to deal with change as a routine part of how it does business. Continuous busi...
Processes are not documented and reused by a set of individuals because they lead to failure. Like design patterns, they are documented and reused because they lead to success. They are all put together by very talented people who have successfully used them to develop software multip...
This white paper digs deep into the reasons testing mobile apps is fundamentally harder than traditional web or desktop applications. A collaboration by Tina Zhuo and Dennis Schultz from IBM along with Yoram Mizrachi from Perfecto Mobile and John Montgomery from uTest, these experts ex...
Encryption is a key element of a complete security strategy. The 2013 Global Encryption Trends Study shows a steady increase in the use of encryption solutions over the past nine years. Thirty-five percent of organizations now have an encryption strategy applied consistently across the...
It is a mistake to think we can secure APIs using the same methods and technology that we used to secure the conventional, browser-centric web. Andi Mann from CA Technologies recently pointed out that, at every turn, customers are interacting more and more with businesses through appl...
Rivetz Corp. has been named as one of the AlwaysOn Global 100 Companies to Watch, congratulations! Please tell us, what is Rivetz all about and what do you do? Steven Sprague: Rivetz is leveraging the trusted execution technologies in new devices powered by Intel and ARM to protect th...
Many mid-market companies have invested significant time and resources to secure and back up their servers, client computers, data, and overall network infrastructure in what was the traditional client-server setup. Now, what were considered emerging technologies just a few years ago, ...
In Part V, we discussed processing delays caused by “slow” client and server nodes. In Part VI, we’ll discuss the Nagle algorithm, a behavior that can have a devastating impact on performance and, in many ways, appear to be a processing delay. Beyond being important for (reasonably) a...
Internet of @ThingsExpo, taking place Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 15th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Thing...
The premiere issue of the Internet of @ThingsExpo Newsletter contains highlights of the hottest sessions and speakers from Internet of @ThingsExpo, Call for Papers, and sponsorship opportunities. Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair...
“Vote early and vote often.” Back in the 1920s and ’30s, when neither election technology nor oversight were as effective as they are today, and the likes of Al Capone were at work gaming the system, this phrase wasn’t a joke. It was a best practice. If you want guaranteed results, wh...
Ransomware is the latest example of the increasingly sophisticated and damaging inventions of hackers. Individuals and organizations of all sizes are finding that their data has been locked down or encrypted until a ransom is paid. One program, CryptoLocker, infected more than 300,000 ...
The cloud has hit the mainstream. Businesses in the United States currently spend more than $13 billion on cloud computing and managed hosting services, and Gartner projects that by 2015, end-user spending on cloud services could be more than $180 billion worldwide. It is estimated tha...
Despite all the news about hackers infiltrating major corporations, most businesses continue to leave themselves woefully unprotected. Some surveys estimate more than 70% of businesses perform vulnerability tests on less than 10% of their cloud, mobile and web applications. A majority ...
The ability to embed prediction into multiple business processes amplifies the value that predictive analytics delivers. Yet many still see predictive analytics as a separate activity that is the responsibility of a small team of expert analysts. This webinar will show how predictive...
TIBCO Software Inc. has announced that TIBCO StreamBase®, the company's streaming data analytics platform, has been recognized as a leader in The Forrester Wave™: Big Data Streaming Analytics Platforms, Q3 2014 from Forrester Research, Inc. Big Data Streaming Analytics allow a busin...
Followers of the Enterprise File Share and Sync Market (EFSS) will have noticed a flurry of announcements in the last few weeks. In particular: SAP and OpenText collaborated with Tempo Box; Egnyte outlined it would leverage Google's Storage; Box purchased Stream as well as announcing ...
The threats facing network operators all over the world, spanning service providers, enterprises, cloud and hosting providers and mobile operators alike, are by no means stalling. While optimism is always the name of the game, we know all too well in security that trying to keep pace w...
Incident response involves addressing and managing the security events on a network and the execution of proper responses to those events. The end game is to limit the damage and reduce recovery time and costs. This is achieved with the implementation of an incident response plan tha...
An expected deluge of data and information about patients, providers, outcomes, and needed efficiencies is pushing the healthcare industry to re-evaluate interoperability, security and the ability to adapt rapidly to the lessons in the data. The means of enabling Boundaryless Informat...
If your organization’s got a lot riding on the continued security of its confidential or proprietary data, then you need to stay informed on the threats and how to address them. One of the most worrying threats of late, especially when it comes to cloud data security, is government spy...
The online world has become a dangerous place. According to a survey, 90 percent of all companies fell victim to a security breach in the last twelve months. Hacking and advanced persistent threats (APTs) have rendered the two-factor authentication token, now over 20 years old, essenti...
A newly established firm sent out some basic information collateral to introduce itself this summer – and a new type of business model would seem to be emerging. The company here in question described itself as a non-integrated silo-based business that was disparately fragmented into ...
When Swedish communications services provider TDC needed network infrastructure improvements from their disparate networks across several Nordic countries, they needed both simplicity in execution and agility in performance. Our next innovation case study interview therefore highlight...
SYS-CON Events announced today that DevOps.com has been named “Media Sponsor” of SYS-CON's “DevOps Summit at Cloud Expo,” which will take place on June 10–12, 2014, at the Javits Center in New York City, New York. DevOps.com is where the world meets DevOps. It is the largest collectio...
The introduction of the Cloud has enabled the fast and agile data recovery process which is effectively more efficient than restoring data from physical drives as was the former practice. How does this impact Backup & Recovery, Disaster Recovery and Business Continuity initiatives? Cl...
SYS-CON Events announced today that the Web Host Industry Review has been named “Media Sponsor” of SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Since 2000, The Web Host Industry Review h...
SYS-CON Events announced today that O'Reilly Media has been named “Media Sponsor” of SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. O'Reilly Media spreads the knowledge of innovators throu...
If you've had to test one of today's composite applications, you know that "access" has become one of the most daunting barriers to SDLC acceleration. Whether we're talking about access to dev/test environments or access to dependent applications, the ability to pull all the required p...
The rather stunning deal between Apple and IBM—described as “exclusive” by both parties—has been hailed as a victory for Apple, a victory for IBM, and a “victory for design.” Actually, it's a victory for Big Data. Apple has cultivated an image as the coolest of companies from the t...
SYS-CON Events announced today that Verizon has been named “Gold Sponsor” of SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Verizon Enterprise Solutions creates global connections that gen...
What inspired this piece is “Complicating the Cloud,” a recent, insightful article by industry guru Jeff Kaplan. Kaplan makes a number of trenchant points, many of them coalescing around the idea that the vendor community has a vested interest in complexity. That meshes with my beli...
Ensuring a safe work environment can be accomplished when individuals work in either a government or private-sector office, but it becomes exponentially more complicated when employees are mobile, traveling from one job or worksite to another. While many organizations implement mobile ...
A year after globally launching the FUJITSU Cloud Initiative, Fujitsu is strengthening its commitment to unlocking the business-innovation, cost-efficiency and agility benefits of cloud for its customers around the world. In doing so, Fujitsu is well on its way to building one of the b...
The era of Big Data is upon us. The volume, variety and velocity of data now being generated is unprecedented in human history. This poses a challenge for those tasked with data integration: how can we manage all this data, particularly across distributed data centers around the world?...
In a recent survey of IT pros, not only did cloud computing rank as a top three technology both as most disruptive and as most significant to business over the past three to five years, but it ranked as the number one technology investment most needed for businesses to remain competiti...