Welcome!


Latest Blogs from Microservices Journal
Every successful company hits growing pains at some point along the way. One of the most harrowing for IT is the transition from the “build it quick!” startup mindset to the more structured and stable mentality of a mid-stage business. For VIIAD Systems, a healthcare technology compan...
The market transition from education and evaluation to remediation is marching along as the End of Support (EOS) nears for Windows Server 2003. The market has moved from being unaware of the challenge that EOS would pose for most IT organizations at the beginning of 2014 to POCs, trial...
The cloud has transformed how we think about software quality. Instead of preventing failures, we must focus on automatic recovery from failure. In other words, resilience trumps traditional quality measures. Continuous delivery models further squeeze traditional notions of quality. R...
As we kick off 2015, I predict that this will go down in history as the year of the Threat Intelligence Platform (TIP). We say goodbye to the year of the advanced persistent threat (APT) in 2014, just as this time last year we waved adieu to mobile device management (MDM). We’ve seen ...
Over the last few years, Motus experienced a surge in business driven by its transformation to a mobile hub for their customers. As the company expanded their existing client footprint, they seized an opportunity to also integrate mobile workforce data with CRM, sales and expense manag...
Prior to implementing the Transmogrifier, I would get woken up for an alert and have no idea what it was, or what was needed to solve the problem. I would have to open 3 or 4 different tabs to try and wrap my head around the situation. Now with the Transmogrifier’s annotations, I save ...
About 15 years ago I gave an application performance presentation to some storage guys. Since I was a database jock at the time and didn’t “speak” I/O very well, I had to try a different approach. Rather than speaking over their heads in my own language, or faking it using their langua...
It didn’t hit me until after a second viewing of Jez Humble’s recent webinar with Perforce that his ways to predict high IT performance aren’t just a neat party trick; they’re absolutely essential. The days of bugs making it into production, distrust between departments, and delayed fi...
“We just completed the roll out of our first public and private cloud offerings, which are a combination of public, hybrid, and private cloud,” stated Erik Levitt, CEO of Open Data Centers, in this SYS-CON.tv interview at the 14th International Cloud Expo®, held June 10-12, 2014, at th...
Many businesses are realizing the advantages of moving essential business services to cloud-based models, including communications, voice, and CRM. The associated advantages of the cloud have allowed businesses to be more flexible, scalable and enjoy higher cost savings. However, these...
We regularly run API Workshops worldwide which bring together API practitioners in discussion, debate, and exposure to technologies such as OAuth 2.0, API developer portal design, and identity. And when we say "worldwide", we mean worldwide. To illustrate this, my colleague Philipp...
Over the next several months, I’m going to share with you an interview series featuring my DevOps friends, letting them talk about what they have planned for 2015. To preview some of the folks I’ll be communicating with, I’ve put together a teaser of who I’ll be talking with in one for...
Our guest on the podcast this week is Andi Mann, VP, Office of the CTO at CA Technologies. We discuss the “digital disconnect”, a gap between the expectations of business leaders and the ability of IT leaders to deliver, and how DevOps can close the gap by delivering services faster an...
The SaaS model has truly revolutionized the way software is being used. Convenient, hosted on the now cloud, without the need for IT or hardware and so many more advantages. So what is cloud-based billing? A recent piece by Gigaom helps explain why cloud billing is beneficial and how i...
Growing threats from both malicious and non-malicious insiders means data security should be an incredibly high priority for enterprises. As Vormetric’s 2015 Insider Threat Report noted, 44% of US organizations experienced a data breach or failed compliance audit in the last year. This...
Prior to launching a recurring revenue initiative, it’s best to take a step back and assess areas of the business to ensure you’re ready for implementation. If you want the competitive advantage, you have to give your customers what they want, when they want it, the way they want it. S...
At the end of the year, WhiteHat Security posted an interesting blog titled, "The Parabola of Reported WebAppSec Vulnerabilities" in which a downward trend in web application vulnerabilities (as collected by the folks at Risk Based Security's VulnDB) was noted beginning in 2008 after h...
Everyone has stayed in a standard hotel room – they all have similar qualities, with similar prices and amenities. You can expect a good night’s sleep, HBO movies on the TV, and a free muffin in the morning. While I may be taking a few liberties with this analogy, I’d argue – the clou...
Thought experiment: let’s say your app gets a message from somewhere, perhaps from another app, but you don’t know from where. The message contains the number 47 but no other information. What should your app do with the message? The answer: nothing. There’s no way for your app to m...
When implementing a cloud-based file-sharing solution, the user experience will play a major role in its adoption and overall success. It will be important for you to gather input from your employees and customers and regularly collect feedback to identify ways to better meet their nee...
This BriefingsDirect discussion explores the role and impact of business networks, the often virtual assemblages of interrelated business services, processes, and data that are transforming how companies and consumers conduct commerce. New business networks are unlocking the ability f...
You can’t have a conversation about technology today without the topic of security breaches ending up front and center as a key concern. This is understandable with all the high profile breaches that have been occurring on what seems a regularly scheduled event. Anthem, the nation’s se...
Today's hyper competitive environment defined by unreasonable demands for speed and high expectations for quality and usability has forced companies to differentiate based on their technology. Every company is a software company where customers' demands for features and functions are m...
John Michelsen is CTO of CA Technologies. As the Chief Technology Officer of CA Technologies, he is responsible for technical leadership and innovation, further developing the company's technical community, and aligning its software strategy, architecture and partner relationships to d...
Think of your new and existing products and services. Are there other ways you can package and price your offerings? Whether your goal is to grow your customer base, revenue, market share, or share of wallet, recurring revenue models can provide a multitude of options for creating new ...
You may have seen last week that we partnered with Cloudera, certifying the Plexxi Switch on Cloudera’s Enterprise 5 platform. This partnership, while exciting for us and our partners, plays a larger role in the IT landscape as a whole. According to an article this week by Arthur Co...
Dynatrace monitors your entire application delivery chain. All of your transactions are tracked end-to-end, from user clicks to individual lines of code, using Dynatrace PurePath technology. Dynatrace constantly monitors your servers’ host and process health, and will automatically not...
#DevOps App deployment should be viewed as a comprehensive, end to end process.But we treat it today like each silo is a fork in a project that never merges back together, causing disjointed operations, reporting, measurement and ultimately, failure to meet business priorities of im...
While small and midsize businesses are often keen to move their applications to the cloud, the benefits of cloud migration don’t simply rain down from the sky. In order to take advantage of the flexibility (and cost savings) of virtual server hosting, organizations need to address som...
Our guest on the podcast this week is Steve Thair, Co-Founder of DevOpsGuys. We discuss the importance of each step within the CALMS Model for DevOps. Many organizations stress interest in automation, however, culture, measuring improvement and open communication are equally important....
Bottom line up front, IDC estimates that application downtime costs the collective Fortune 1000 an average of $1.25 to $2.5 billion per year. More granularly, IDC estimates the average hourly cost of an infrastructure failure at $100,000/hr., and puts the hourly cost for the failure o...
Hang around any IT department (or the AppDynamics offices) and you likely won’t finish a cup of coffee before somebody brings up the cost of downtime or the ascent of DevOps. And that’s a good thing, because these are two topics that are central to the value that IT brings to enterpris...
This digest provides an overview of good resources that are well worth reading. We’ll be updating this page as new content becomes available, so I suggest you bookmark it. Also, expect more digests to come on different topics that make all of our IT-hearts go boom!
This is a no-hype, pragmatic post about why I think you should consider architecting your next project the way SOA and/or microservices suggest. No matter if it’s a greenfield approach or if you’re in dire need of refactoring. Please note: considering still keeps open the option of not...
Your #monitoringlife is about to get better! Next week’s release introduces support for asynchronous I/O in Java through Netty. This enables you to monitor any application that’s built on top of Netty-based technology. Netty is an asynchronous event-driven network application fra...
With “microSOAvices” environments, it seems like everything is different—software development methodologies, continuous deployments, and more. Another difference—one that’s often overlooked—is the importance of application performance monitoring in microSOAvices . This blog post explai...
Digital transformation isn’t about the technology, and in reality it never was, even when we called it ebusiness or perhaps interactive marketing. It’s about building relationships between people. And today’s primary mechanism for a company to build a relationship between its employees...
This is aimed to be your one-stop-shop for everything microservices: Interesting posts and interesting people. Microservices is a software architecture approach that propagates small (in terms of responsibility) and independent components instead of monolithic all-in-one components. Se...
Service-Oriented Architecture (SOA) is an approach for abstracting enterprise software capabilities as reusable services in order to support more flexible business processes and ideally, more agile organizations. SOA was one of the hottest topics in information technology (IT) back off...
Microservices, for the uninitiated, are essentially the decomposition of applications into multiple services. This decomposition is often based on functional lines, with related functions being grouped together into a service. While this may sound a like SOA, it really isn't, especiall...