Welcome!


Business processes manage the operational flow of business and when optimized achieve cost containment and flexibility as they need to be efficient and able to adapt to changing business conditions. The art of planning and implementing process management requires all the best cross-fun...
If you look at some of the headline-making breaches of the past few years, they all occurred at large companies with highly dynamic and complex computing environments. Securing these environments is impossible to do without automation, which is why so much of the innovation in IT secur...
There will always be a threat from malware - malicious software that is designed to steal or corrupt data on computers. Malware affects everyone from security services to silver surfers, and when it isn’t checked it can wreak havoc. Ultimately, it doesn’t matter what size your busines...
A recent article in Government Computer News raised the topic of FISMA reporting, specifically describing the “pessimism” of many USG agencies over meeting the September 2012 deadline for “using continuous monitoring to meet Federal Information Security Management Act reporting require...
Design patterns are one of the most successful advances in software engineering, by any measure. The history of design patterns is a strange one though, and somewhere along the way, much of their original utility and elegance has been forgotten, misplaced, or simply miscommunicated. Th...
As utilities shift to smart meters and more customer-oriented systems under new government-mandated Smart Grid initiatives, they will quickly face the need to handle billions of real-time energy utilization transactions. In this new energy arena, the high volume, low-cost model of M2M ...
In his book The Art of Action (2011), Stephen Bungay identifies three gaps that frustrate the ability of organizations to translate plans into actions that lead to desired outcomes. He calls them the knowledge, alignment and effects gaps. Here, I wish to reflect on Bungay’s perspective...
This article introduces the concepts of Component Oriented Development and Assembly (CODA) using the OSGi Service platform with an example application. The article starts with an introduction to software components, elaborates with an example application, followed by an overview of the...
When we aren’t fighting crime, taking over the world, or enjoying a good book by the fire, we here on the eEye Research team like to participate in the Any Means Possible (AMP) Penetration Testing engagements with our clients. For us, it’s a great way to interact one-on-one with IT fol...
Any application you pick up, there are some issues – big or small. There will be copy-paste code, mistakes, algorithms which could have better thought through. But what distinguishes an antipattern from these normal errors is that like patterns these antipatterns are recurring througho...
Quick Response (QR) codes are intended to help direct users quickly and easily to information about products and services, but they are also starting to be used for social engineering exploits. This article looks at the emergence of QR scan scams and the rising concern for users today....
Defining "Who sees what" and "who does what" are the two important aspects of access control in any software application. "Security" is a much larger subject, but this article focuses on just the access control aspects of Security in a software application. When you build a custom ap...
Performance is one word that is used to describe multiple scenarios when talking about application performance. When someone says I need a High Performance Application, it might mean any/all of the following: Low web latency application ( meaning low page loading times) Application t...
Today’s web sites are often cluttered up with third-party content that slows down page load and rendering times, hampering user experience. In my first blog post, I discussed how third-party content impacts your website’s performance and identified common problems with its integration....
Nearly every enterprise can benefit from deduplication. Business data has been growing exponentially. Routine backups of that data have become too costly or simply ineffective. Deduplication can help by reducing the cost of primary and secondary storage. Essentially, limited resources ...
Most Java performance opportunities fall into one or more of the following categories: Using a more efficient algorithm. The largest gains in the performance of an application come from the use of a more efficient algorithm. The use of a more efficient algorithm allows an application ...
The term Business Transactions and Business Transaction Management is widely used in the industry but it’s not always well understood what we really mean by it. The BTM Industry Portal provides some good articles on this topic and is definitely recommended to check out. The general goa...
What does it mean to have a good experience? Think of your favorite restaurant, the interior of your car, and the software on your phone: how do people craft these experiences? What details, planning, and design go into the process? Would it be possible to create a great experience i...
It is time to invest in the advanced technology that provides the foundation and tools for the people and processes to meet their true potential. This means investing in the organizational construct known as a business technology Center of Excellence (CoE). The general concept of a bu...
Business design is set to undergo a dramatic transformation. The convergence of ecosystem automation and autonomics, architecture for continuously evolving business, together with the merger of consumer and business IT will have a profound impact on conventional business models, which ...
Object Relational Technologies form the backbone of most of the enterprise Java applications. Choosing the appropriate technology however is one of the most important decisions for an enterprise architect. More often than not, such a decision is either a hit or miss. Mistakes done in s...
With the onslaught of mobile devices and platforms from multiple vendors, the current technology underpinnings of mobility solutions are in a state of flux. With the hype surrounding the hardware and software offerings across the mobility solutions, it is a challenge for enterprises to...
Dart is a new structured data programming language from Google. While unstructured data has become extremely useful, structured data is still extremely important because it keeps businesses running day in and day out. Programming languages still need to be coded by hand and most Google...
Is MapReduce the Holy Grail answer to the pressing problem of processing, analyzing and making sense of large and growing data volumes? Certainly it has potential in this arena, but there is a distressing gap between the amount of hype this technology – and its spinoffs – has received ...
When you wake up in the morning and flip on a light switch, you don’t think about whether the local power company has enough electricity available to power the light. Likewise, when you switch on the coffee pot or turn on your stove to make breakfast, you don’t wonder about the availab...
If you are in IT, there is good chance that you are maintaining multiple B2B integration systems for data exchange and translation. Every IT leader has considered consolidating these products into a single B2B suite to reduce costs and improve supply chain agility. Historically, each B...
The use of virtualization and cloud computing is growing quickly among companies of all sizes. Currently, 30 percent of servers are virtualized, and surveys show that by 2012, that number will grow to 50 percent. Virtualization and cloud computing go hand-in-hand, and virtualizing se...
Few areas of human endeavor can match the pace of change in IT. Even by IT standards, the change being driven by cloud computing sometimes seems surprising. To refer to a virtual environment that has only recently been deployed as “legacy,” as some organizations are now doing, undersco...
Enterprises are turning to enabling technologies such as data virtualization support the accessibility, security, consistency, quality and auditability capabilities required for effective data governance. As with motherhood and apple pie, who can argue with data governance? Business...
Successful business intelligence (BI) solutions serve as many business users as possible. As more users use it, the more value the solution brings. However, if you’ve had any experience with BI, you must have noticed that as the number of users grow – so does the complexity (and cons...
The biggest issue for the today's enterprises is the ways and means of measuring their computing / processing workloads that need to run their business and then work on the ways and means of optimizing the same. Workload is the amount of work assigned to, or done by, a client, workgro...
The business case for unified, 360° views of key enterprise data is compelling. But enterprises are complex. And enterprise IT is even more so. Data is siloed everywhere. Getting a single view of anything can be a significant challenge.
Cloud computing has now passed the stage of hype to reality. More and more enterprises are realizing the benefits of remote hosting of IT services rather than local IT management, especially as managing and operating IT networks and services is not getting any easier. Managing IT net...
Cloud Computing is an evolution of existing technologies to deliver services to end users. Communication service providers have an early adopter opportunity to compete with new entrants, increase their bottom line and play a dominant role in delivering cloud services. Service provid...
Part 2 of "RESTful Web Services: A Quick-Start How-To Guide" explores foundational issues in coding RESTful operations, including Basic Authentication and Exception handling. Along the way I’ll share with you multiple real-world coding tips and workarounds. As a teenager, one of my fa...
One sure fire way to keep budget and buzz away from your projects is for you and your department to be associated with incremental improvement. Projects can generally be classified into two categories. The first is “business transformation,” which includes projects that generate excite...
Unlike the Ritz where the highly trained staff can anticipate your needs just by the look in your face, most enterprises’ huge investments in CRM systems, marketing analytics, customer self-service and more have resulted in islands of nonintegrated automation and inconsistent, inaccess...
Finding the perfect balance of influence between IT and the Business Owners (I will resist the urge to refer to them as B.O.) is not easy. I usually find that most projects are influenced by one or the other in an unbalanced manner. The story is usually goes like this... The business...
I will demonstrate how to ARP poison a connection between a Windows 7 and Windows 2008 R2 Server using Cain. The Microsoft Remote Desktop Protocol (RDP) provides remote display and input capabilities over network connections for Windows-based applications running on a server. RDP is ...
Among PowerBuilder 12.5 .NET’s new features comes the ability to use WCF to call RESTful web services. This article, the first in a two-part series, provides a PowerBuilder 12.5 .NET developer with the foundational knowledge and skills to rapidly get up and running building PowerBuilde...