Welcome!


Latest Articles from SOA World Magazine
Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous, whether caused by malice or employee negligence. In its list of the eight most significant cybersecurity threats for 2013, Forbes c...
No matter how often you deploy your application or how sophisticated your delivery pipeline is, you always need to know the quality status of the software you are building. That can only be done if you measure it; but measure what exactly? In Part 1 we introduced the Concept of Quality...
Many cloud hosting providers have achieved ticket-of-entry credibility in the data warehousing industry by building simple colocation centers. A first-tier database as a service (DBaaS) contender, however, is set apart by a value-added service approach that is strategic, consultative a...
Need to scale your data tier? The foundation of every application is the database layer, and today application architects have more choices than ever. With these choices come new questions: Which database technology is best for your application? How can your application take advantage ...
Ben Franklin often said that "by failing to prepare, you are preparing to fail." Not preparing for who your actual enterprise mobility management (EMM) customer is may have dire consequences as mobile devices (both personal and corporate-issued) access more corporate data. Before you c...
One challenge more and more enterprises are grappling with as they plan to adopt the cloud is data residency & sovereignty. They are finding that if they want to use a cloud service hosted outside of their borders, life can become quite complex. Perhaps it is a result of the often disc...
loud providers Google, AWS and Microsoft are doing some spring-cleaning - out with the old, in with the new - when it comes to pricing services. With the latest cuts, here's a news flash: There's a new business model driving cloud that is every bit as exponential in growth -- with or...
The power of data-driven business networks is increasing, but how do enterprises best leverage that intelligence as they seek new services, products and efficiency? The next BriefingsDirect thought-leader panel discussion focuses on the future of business and how companies can benefit...
APIs came about to help companies create and manage their digital ecosystem, enabling them not only to reach more customers through more devices, but also create a large supporting ecosystem of developers and partners. While Facebook, Twitter and Netflix were the early adopters of APIs...
CodeFutures on Wednesday announced that the U.S. Patent Office has granted it a patent for its Continuous Replication technology that helps database administrators perform maintenance and other processing functions without downtime. U.S. Patent 8,626,709, titled Scalable Relational Dat...
As recent events have confirmed once again, no single company, organization or government is up to the task of securing the Internet. The never-ending cat and mouse game of exploits chasing vulnerabilities continues. The stunning Heartbleed discovery has shaken the online security esta...
Clearly, the buzz around wearable technology has to do with the hands-free user design – these smart peripherals allow for a better experience for certain functions. While consumers are not going to do away with their iPhones, tablets and computers anytime soon, wearables make sense as...
In this report Enterprise Management Associates (EMA) analysts explore the ways in which gaining visibility and control over high-privilege access helps organizations achieve regulatory compliance, assure responsible governance, and improve security all while reducing IT operational co...
Get the essentials about agile testing and service virtualization from several different perspectives – get an analyst’s take from Diego Lo Giudice of Forrester Research on how to remove agile testing bottlenecks and ways to calculate your potential return on investment for Service Vir...
GIS technology is being used in the healthcare industry today for patient care and preventative medicine among other things. Hospitals and other organizations, with GIS and big data resources now have the ability to collect geographic information from their patients and study trends in...
In the last year, conversations about In-Memory Computing (IMC) have become more and more prevalent in enterprise IT circles, especially with organizations feeling the pressure to process massive quantities of data at the speed that is now being demanded by the Internet. The hype aroun...
Enterprises are moving more and more applications to the cloud. Gartner predicts that the bulk of new IT spending by 2016 will be for cloud computing platforms and applications and that nearly half of large enterprises will have cloud deployments by the end of 2017.1 The far-reaching...
More and more enterprises today are doing business by opening up their data and applications through APIs. Though forward-thinking and strategic, exposing APIs also increases the surface area for potential attack by hackers. To benefit from APIs while staying secure, enterprises and se...
In my previous blog I contrasted the latest net neutrality developments in the EU with the situation in the U.S. Neither decision will settle the argument and the two camps will continue to debate the topic for the foreseeable future. On both sides of the argument and the ocean, believ...
Maintaining lower development environments can become an unbearable headache. Changes to an application, service or API are seldom completely testable, leaving us to discover broken code when it’s too late. This lack of visibility into application dependencies severely limits early cod...
Poorly performing websites, like Twitter’s recent fiasco with Ellen’s selfie, are a constant source of irritation for users. At first you think it’s your computer, or maybe someone on your block is downloading the entire “Game of Thrones” series. But, when nothing changes after refresh...
Are you developing or hosting PHP applications? Are you doing performance sanity checks along your delivery pipeline? No? Not Yet? Then start with a quick check. It only takes 15 minutes and it really pays off. As a developer you can improve your code, and as somebody responsible for y...
Cloud computing security can be a conundrum. The point of using the public cloud is to outsource certain infrastructure and application needs to third party providers, after all. How can you secure your data once it leaves your perimeter and your control? As puzzling as it may seem, th...
Setting up a deployment process on the cloud means a variety of choices. Most likely you’re prepared to make some tradeoffs. But getting a view across these potential tradeoffs can be difficult. Here are six popular deployments and advice for making the best choice for your organizatio...
SYS-CON Events announced today that ActiveState, providers of Stackato, the platform for the agile enterprise, has been named “Silver Sponsor” of SYS-CON's 2nd DevOps Summit, which will take place on June 10–12, 2014, at the Javits Center in New York City, New York. ActiveState believ...
There has been a lot of media attention on Heartbleed and as always that means a lot of bizarre and often conflicting advice. I sat down (for a very long time) to find the truth of the matter and bring it together in one single article for those involved in enterprise mobility. "The ...
VASCO Data Security International, Inc., has announced on Tuesday that it will release its Q1 2014 results on Thursday, April 24th. On April 24, at 10.00 am EDT/16.00 CET, VASCO will hold a conference call, which will be streamed on the VASCO website. Mr. T. Kendall Hunt, Chairman an...
One of the most prominent characteristic of a project as a concept is its sharp delimitation in time. It has clear start and end dates and is designed to achieve a unique scope, unlike the ongoing operations specific for business management. Sometimes, the end date of a project is the...
Many people find themselves at a certain point in their life looking for a task management software to help them refocus and keep their finger tips on what is important. Task management products organize, schedule and ensure that tasks get done on time. By being better organized and mo...
The general features of a project management software include scheduling, costing, budgeting, controlling, management and communication. However an important function is resource management. This covers all types of resources including human, equipment, materials and costs. Nowadays b...
SOASTA on Tuesday announced the company has expanded its award-winning mobile functional test automation solution, TouchTest, to include local test labs of Apple iOS and Google Android smart phones and tablets. The TouchTest Private Device Cloud is a simple to manage, affordable intern...
Now, up to five existing Windows or Linux servers can be migrated to Windstream Hosted Solutions vCloud infrastructure at no cost via Racemi’s cloud migration technology. Racemi, a provider of automated server migration software that streamlines the process of migrating workloads to p...
Have you seen this error message before “java.sql.Exception: ORA-00060: deadlock detected while waiting for resource”? This is caused when parallel updates require locks on either rows or tables in your database. I recently ran into this exception on an instance of an IBM eCommerce Se...
SYS-CON Events announced today that BUMI, a premium managed service provider specializing in data backup and recovery, will exhibit at SYS-CON's 14th International Cloud Expo®, which will take place on June 10–12, 2014, at the Javits Center in New York City, New York. Manhattan-based ...
The selfie that changed the world, or at least Twitter, has been in the news for the past month. On March 2, 2014, the infamous Oscar selfie of Ellen and her celebrity friends broke a record of 2 million retweets before midnight the same night. That record was previously set by Preside...
Database as a Service (DBaaS) is cloud database hosted and managed by the cloud service providers that can be accessed through public cloud or the hybrid cloud. The cloud provider takes care of provisioning, configuring, setup, maintenance, backups and patching the database. Customers ...
The world of enterprise applications, such as enterprise resource planning (ERP), customer relationship management (CRM) and billing, can seem boring to people who are more interested in what is going on at Amazon, Facebook, Google and Twitter, or the latest iPhone or Android applicati...
We all want usability, that’s a given right? We exist in an enterprise world, but we want to behave as naturally as possible with all of the technologies and devices that we come into contact with every day. The co-called ‘consumerization of information technology’ suggests that we as...
Over the last six months I met with a wide range of customers and prospects in order to understand how they understand enterprise mobility, and especially to learn whether they see it as a business opportunity or just another piece of technology. It's no secret that the past few years ...
HTML5 is still one of the most discussed topics amongst us technical types. The key challenge, however, has remained unanswered for a long time. How do you effectively wrap HTML5 for use in native mobile applications? Unfortunately I do not have a universal answer, but I do have a s...