Welcome!


Latest Articles from SOA World Magazine
There are quite a few academic papers and products inspired by the vision of memory-centric DBMS. Most of modern databases serving business applications can already fit within large server RAM available today (2TB). DBMS are heading to memory centric designs and implementation. Contem...
SYS-CON Media has launched Internet of Things Journal on Ulitzer.com featuring 2,500 stories including live breaking news coverage on the "Internet of Things." Long-time IT editor/analyst Roger Strukhoff, who is currently Executive Director of the Manila-based Tau Institute, is founder...
The Internet of Things (IoT) is giving rise to a whole new set of protocols for API access. Until recently, it was taken for granted that JSON is all-conquering and predominant. In my view, the popularly of JSON for APIs is as much to do with the widespread usage of dynamic languages o...
The 3rd DevOps Summit, co-located with15th International Cloud Expo, 6th Big Data Expo 4th International SDN Expo, 2nd Internet of Things Expo, and 3rd WebRTC Fundamentals Summit – being held Nov. 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA – announces that its C...
Many mid-market companies have invested significant time and resources to secure and back up their servers, client computers, data, and overall network infrastructure in what was the traditional client-server setup. Now, what were considered emerging technologies just a few years ago, ...
The public cloud computing model is rapidly becoming the world’s most prolific IT deployment architecture, yet it leaves many promises unfulfilled. While offering scale, flexibility, and potential cost savings, the public cloud often lacks the isolation, computing power, and control ad...
TIBCO Software Inc. has announced that TIBCO StreamBase®, the company's streaming data analytics platform, has been recognized as a leader in The Forrester Wave™: Big Data Streaming Analytics Platforms, Q3 2014 from Forrester Research, Inc. Big Data Streaming Analytics allow a busin...
SYS-CON Events announced today that O'Reilly Media has been named “Media Sponsor” of SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. O'Reilly Media spreads the knowledge of innovators throu...
SYS-CON Events announced today that DevOps.com has been named “Media Sponsor” of SYS-CON's “DevOps Summit at Cloud Expo,” which will take place on June 10–12, 2014, at the Javits Center in New York City, New York. DevOps.com is where the world meets DevOps. It is the largest collectio...
“Distrix fits into the overall cloud and IoT model around software-defined networking. There’s a broad category around software-defined networking that’s focused on data center, and we focus on the WAN,” explained Jay Friedman, President of Distrix, in this SYS-CON.tv interview at the ...
Internet of @ThingsExpo, taking place Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 15th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Thing...
Express Logic, Inc., the worldwide leader in royalty-free real-time operating systems (RTOSes), introduces X-Ware™, an integrated, optimized, comprehensive middleware solution that provides a solid foundation for Internet of Things (IoT) development. X-Ware consists of Express Logic’s ...
Encryption is a key element of a complete security strategy. The 2013 Global Encryption Trends Study shows a steady increase in the use of encryption solutions over the past nine years. Thirty-five percent of organizations now have an encryption strategy applied consistently across the...
Even Cloud-driven transformation isn’t the end of the story. The move to Agile Architecture is a move to continuous business transformation – where the organization is as agile as it wants to be, and is able to deal with change as a routine part of how it does business. Continuous busi...
Processes are not documented and reused by a set of individuals because they lead to failure. Like design patterns, they are documented and reused because they lead to success. They are all put together by very talented people who have successfully used them to develop software multip...
It is a mistake to think we can secure APIs using the same methods and technology that we used to secure the conventional, browser-centric web. Andi Mann from CA Technologies recently pointed out that, at every turn, customers are interacting more and more with businesses through appli...
Vormetric on Tuesday announced that Rackspace Hosting has joined the Cloud Partner program, and will be offering encryption and key management services to customers via Vormetric's Transparent Encryption solution. Vormetric's Transparent Encryption combines the performance, flexibility...
I'm reading a McKinsey report from May 2013 that talks about 12 disruptive technologies, including cloud computing and the Internet of Things (IoT). I'll focus on the IoT here. The report estimates the IoT Internet to be worth between $2.7 and $6.2 trillion by the year 2025.(The world'...
Rivetz Corp. has been named as one of the AlwaysOn Global 100 Companies to Watch, congratulations! Please tell us, what is Rivetz all about and what do you do? Steven Sprague: Rivetz is leveraging the trusted execution technologies in new devices powered by Intel and ARM to protect th...
In Part V, we discussed processing delays caused by “slow” client and server nodes. In Part VI, we’ll discuss the Nagle algorithm, a behavior that can have a devastating impact on performance and, in many ways, appear to be a processing delay. Beyond being important for (reasonably) a...
“Vote early and vote often.” Back in the 1920s and ’30s, when neither election technology nor oversight were as effective as they are today, and the likes of Al Capone were at work gaming the system, this phrase wasn’t a joke. It was a best practice. If you want guaranteed results, wh...
Ransomware is the latest example of the increasingly sophisticated and damaging inventions of hackers. Individuals and organizations of all sizes are finding that their data has been locked down or encrypted until a ransom is paid. One program, CryptoLocker, infected more than 300,000 ...
The cloud has hit the mainstream. Businesses in the United States currently spend more than $13 billion on cloud computing and managed hosting services, and Gartner projects that by 2015, end-user spending on cloud services could be more than $180 billion worldwide. It is estimated tha...
Despite all the news about hackers infiltrating major corporations, most businesses continue to leave themselves woefully unprotected. Some surveys estimate more than 70% of businesses perform vulnerability tests on less than 10% of their cloud, mobile and web applications. A majority ...
The ability to embed prediction into multiple business processes amplifies the value that predictive analytics delivers. Yet many still see predictive analytics as a separate activity that is the responsibility of a small team of expert analysts. This webinar will show how predictive...
Followers of the Enterprise File Share and Sync Market (EFSS) will have noticed a flurry of announcements in the last few weeks. In particular: SAP and OpenText collaborated with Tempo Box; Egnyte outlined it would leverage Google's Storage; Box purchased Stream as well as announcing ...
The threats facing network operators all over the world, spanning service providers, enterprises, cloud and hosting providers and mobile operators alike, are by no means stalling. While optimism is always the name of the game, we know all too well in security that trying to keep pace w...
Incident response involves addressing and managing the security events on a network and the execution of proper responses to those events. The end game is to limit the damage and reduce recovery time and costs. This is achieved with the implementation of an incident response plan tha...
An expected deluge of data and information about patients, providers, outcomes, and needed efficiencies is pushing the healthcare industry to re-evaluate interoperability, security and the ability to adapt rapidly to the lessons in the data. The means of enabling Boundaryless Informat...
If your organization’s got a lot riding on the continued security of its confidential or proprietary data, then you need to stay informed on the threats and how to address them. One of the most worrying threats of late, especially when it comes to cloud data security, is government spy...
The online world has become a dangerous place. According to a survey, 90 percent of all companies fell victim to a security breach in the last twelve months. Hacking and advanced persistent threats (APTs) have rendered the two-factor authentication token, now over 20 years old, essenti...
A newly established firm sent out some basic information collateral to introduce itself this summer – and a new type of business model would seem to be emerging. The company here in question described itself as a non-integrated silo-based business that was disparately fragmented into ...
When Swedish communications services provider TDC needed network infrastructure improvements from their disparate networks across several Nordic countries, they needed both simplicity in execution and agility in performance. Our next innovation case study interview therefore highlight...
The introduction of the Cloud has enabled the fast and agile data recovery process which is effectively more efficient than restoring data from physical drives as was the former practice. How does this impact Backup & Recovery, Disaster Recovery and Business Continuity initiatives? Cl...
SYS-CON Events announced today that the Web Host Industry Review has been named “Media Sponsor” of SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Since 2000, The Web Host Industry Review h...
If you've had to test one of today's composite applications, you know that "access" has become one of the most daunting barriers to SDLC acceleration. Whether we're talking about access to dev/test environments or access to dependent applications, the ability to pull all the required p...
The rather stunning deal between Apple and IBM—described as “exclusive” by both parties—has been hailed as a victory for Apple, a victory for IBM, and a “victory for design.” Actually, it's a victory for Big Data. Apple has cultivated an image as the coolest of companies from the t...
SYS-CON Events announced today that Verizon has been named “Gold Sponsor” of SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Verizon Enterprise Solutions creates global connections that gen...
What inspired this piece is “Complicating the Cloud,” a recent, insightful article by industry guru Jeff Kaplan. Kaplan makes a number of trenchant points, many of them coalescing around the idea that the vendor community has a vested interest in complexity. That meshes with my beli...
Ensuring a safe work environment can be accomplished when individuals work in either a government or private-sector office, but it becomes exponentially more complicated when employees are mobile, traveling from one job or worksite to another. While many organizations implement mobile ...