Welcome!


From the Blogosphere

The other day I found myself in a discussion with a prospect regarding the merits of capturing complete stack traces for every transaction that flowed through their production system. You see AppDynamics doesn’t do that; we capture problematic business transactions, and this bloke seem...
Despite the hype and drama surrounding the HTTP 2.0 effort, the latest version of the ubiquitous HTTP protocol is not just a marketing term. It's a real, live IETF standard that is scheduled to "go live" in November (2014). And it changes everything. There are a lot of performanc...
We're launching the "Tap In Open Forum": a new series of blog posts where we detail a current topic being discussed in the software development and testing community and invite you to participate in an open discussion with our best and brightest here at Skytap. Feel free to share your ...
Public cloud service adoption is already a mainstream phenomenon in most organizations. Meanwhile, many large enterprises see a private cloud in their future. But choosing whether to invest in building an internal cloud infrastructure or buy from a cloud service provider will become mo...
One of the benefits of SDN is centralized control. That is, there is a single repository containing the known current state of the entire network. It is this centralization that enables intelligent application of new policies to govern and control the network - from new routes to user ...
I was recently reading Freakonomics’ authors Steven D. Levitt & Stephen J. Dubner’s latest book, Think Like a Freak, and passed over a quote that really resonated with me: So rather than address their root causes, we often spend billions of dollars treating the symptoms and are left t...
Accomplish much more, very rapidly, while spending less -- this is the business technology trend that savvy executives everywhere have embraced. Worldwide IT spending will reach a total $3.7 trillion in 2014, that's a 2.1 percent increase from last year, according to the latest global ...
This week in the States, the Nation celebrates it’s Independence and many people will be attending or setting off their own fireworks show. In Hawaii, fireworks are shot off more during New Year’s Eve than on July 4th and there is even Daytime Fireworks now. Cloud computing is explo...
If LinkedIn profiles are any indication, User Experience (frequently shortened to UX) is the new orange. Indeed, across all manners of technology, there is an increasing focus on improving user experience. Driven in part by Apple’s success on the consumer side, it would appear that IT ...
In the video at this link and embedded below I provide some context on new approaches to data can enhance outcomes for public sector organizations, with a focus on real world use cases. I also mention key requirements which apply at most government organizations for their data and how ...
As revenues from traditional voice and messaging channels continue to dwindle, operators are reassessing their role in the digital communication value chain, and defining what value they can bring to their customers. Of course "customers" increasingly includes partners as well as end ...
Inarguably one of the drivers of software-defined architectures (cloud, SDDC, and SDN) as well as movements like DevOps is the complexity inherent in today's data center networks. For years now we've added applications and services, and responded to new threats and requirements from th...
By now we’ve seen plenty of cost justification on the efficiency of using cloud infrastructure. You can easily Google “Cloud Computing Value” and get a stack of analyst and vendor reports. Or just pop open Amazon’s AWS value calculator and plug in some numbers. There are huge one-time ...
North Bridge in partnership with GigaOm Research released their 2014 Future of Cloud Computing – 4th Annual Survey Results. As you examine the 124 slides, one thing is obvious that the greatest growth in cloud computing is coming from Software-as-a-Service (SaaS). Market research like ...
Some people believe good or bad things always happen in threes. I believe you will always be able to find three (and probably more) things that are good or bad and somewhat related, but sometimes I get surprised by the apparent coincidental appearance of several closely related “things...
Anyone who has been involved with security knows there is a balance to providing both security and privacy and performance at the same time. Security is often blamed for performance woes, particularly when cryptography is involved. SSL and TLS have long addressed this balance by lev...
Compute started its major architectural transition several years ago with the introduction of virtualization. If you pay attention to any of the IT noise today, it should be clear that storage and networking are going through their own architectural evolutions as well. But another shif...
The announcement this week that Facebook is acquiring Pryte should make operators sit up and take notice. The communications landscape is evolving at break neck speed and operators need to start shouting about where they can bring value, before they get drowned out by the noise. Beca...
Experts say that cloud computing is disruptive and then continue on to discuss how the cloud quickly enables innovation while competition between cloud service providers drive costs down. Both of these scenarios are accurate, but the disruption from cloud has additional shockwaves that...
Go ahead. Name a cloud environment that doesn't include load balancing as the key enabler of elastic scalability. I've got coffee... so it's good, take your time... Exactly. Load balancing - whether implemented as traditional high availability pairs or clustering - provides the mean...
Some of you will remember Caddyshack - that campy '80s movie in which Chevy Chase often offered crazy advice, like "be the ball." For those of you who don't (because you're too young or were living under a rock), the premise of this particular piece of advice was along the lines of Obi...
Internet usage is evolving, and so are the application scenarios for business technology. In the foreseeable future, desktop personal computers will produce a much smaller share of commercial internet protocol (IP) traffic. Mobile and portable devices -- other than PCs -- will drive th...
It was a long and full day for me at Devops Summit. I could fill a week or more with blogs on ideas I both agreed - and of course, disagreed - with from sessions and panels. But for now, here's a digestible selection. Ephemeral Infrastructure From John Willis (@botchagalupe) sessi...
In December 2012, research firm Coleman Parkes released a landmark study about the business benefits of service virtualization. The findings were significant: 60% of the respondents indicated that unavailability of systems for testing routinely caused software projects to be delivered ...
In many industries today the competitive battleground is quickly shifting to the effective use of data to drive marketing, sales, customer support, R&D, and to deliver hyper-personalized user experiences and digital products. These changes are most readily seen in companies that engag...
A company's managers have to be aware of what hardware and software is on hand, where it is situated, know its quantity, and what is necessary to increase the employees' effectiveness and the whole network's stability. If the managers or system administrators do not have such informati...
Cyber-secure cloud computing can help both businesses and governments improve their ability to collaborate with non-traditional partners so they can quickly and cost-effectively tackle complex problems. That’s the message Kevin Jackson of the Network Centric Operations Industry Consort...
Experiencing downtime is not something that companies wish for but as we have seen lately it is something that we hear quite often about. Interestingly enough very few enterprises, especially in the Small and Medium Business area, spent enough time...
It's probably no surprise that I have long advocated the position that hybrid cloud would eventually become "the standard" architecture with respect to, well, cloud computing. As the dev/ops crowd at Glue Con was recently reminded by the self-styled "most obnoxious man in cloud", Josh ...
How many different solutions do you need in order to implement an enterprise quality mobile solution? I think this is a worthy question. In years past MEAP (mobile enterprise application platform) and MADP (mobile application development platform) vendors tried to cover all of your nee...
There is probably never going to be a perfect balance in the industry between Do-it-yourself (DIY) and Do-it-for-you (DIFY) networking. It seems exceedingly unlikely that there is a one-size-fits-all type of solution out there. And so we will invariably end up with a bifurcated market ...
No doubt, the world of cloud storage has evolved over the past several months in terms of broader interoperability, increased features and functionality as well as lower overall costs. Whereas the questions posed about cloud storage used to center on integration with (or in place of) e...
One of the challenges in scaling modern data centers rises directly from an increase in network complexity over the past few years. We can argue why complexity has increased, but it's reasonable to say that scaling data centers means more boxes - more servers, more network gear, more m...
BriefingsDirect had an opportunity to uncover more about about such new, agile business services at the recent 2014 Ariba LIVE Conference in Las Vegas when we spoke to Erik Gershwind, President and CEO of MSC Industrial Supply in Melville, New York. MSC has been using the Ariba Networ...
It's a given, this year more CIOs will shift their focus from selective IT efficiency to overall IT effectiveness. In 2014 and beyond, enterprise IT leadership will be judged on their ability to meet the demands of tech-savvy Line of Business users.

This is the type of meani...
I have taught classes and half-day workshops on mobile and digital strategies in 17 different countries around the world in the past three years. Some of the most interesting discussions during these classes and workshops are around the following topics - the strategies behind the mobi...
Through our more than 200 security algorithms, StealthWatch is able to digest metadata known as NetFlow coming off of switches, routers, and various perimeter security devices to present an actionable, continuous macro level view of what has seeped through the perimeter. Using many of...
If you're a real estate investor, you know how important it is to have the latest figures and data at your fingertips. You probably have favorite websites and newsfeeds to keep up as much as possible, but what you really need is real data in real time. Enter S'moretgage, which was debu...
I recently came across a blog post on OpenOpsIQ asking the question: "With the introduction of real-time logging, why cant we have a single solution for monitoring the entire stack?" In my opinion, you can! As we have seen lately from a survey we carried out across a sample of the Loge...
The days of completely separate storage network technologies are quickly fading. It feels like it’s only a few years ago that Fiber Channel was the way to create large scale storage networks. Big honking storage devices on a separate network, connected to Fiber Channel switches, connec...