Welcome!


Latest Articles from Industrial IoT
The ability to conduct effective performance testing has become a highly desired skillset within the IT industry. Unfortunately, these highly sought-after skills are consistently in short supply. "Front-end testers" can work with a tool to create a realistic load and although this is a...
Microsoft CEO Steve Ballmer put rumors of a $199 Microsoft Surface RT tablet – that even had Apple biting its nails – to bed in an interview with the Seattle Times in which he suggested the dingus would go for “probably $300” – lower than the price of a New iPad – “to about $700 or $80...
Now that the World Wide Web has taken over bricks-and-mortar shops as the primary medium through which to sell a product or service, there's never been a better opportunity for anyone, regardless of financial or business background, to set up their own e-commerce store. While bank loa...
Anything that can speed up software development by taking the pain out of tracking down bugs and fixing them is a boon for developers. There are several enterprise-level systems available for defect capture, tracking, and reporting. In addition to these systems, there are specialized t...
Salesforce.com bought a shadowy three-year-old Israeli data mining start-up called BlueTail in July according to All Things Digital, and made co-founder and CTO Alon Talmor chief data scientist at its Data.com unit. The joint’s other co-founder Koby Ben-Zvi is now VP, product strateg...
The powerful Metasploit framework helps you see your network as an intruder would see it. You might discover it is all too easy to get past your own defenses. The Metasploit Framework is a penetration testing toolkit, exploit development platform, and research tool. The framework incl...
Alibaba CEO Jack Ma’s most heartfelt wish will reportedly come true next week when he’s able to put something of a period – or at least a coda – to Yahoo!’s rocky involvement with his company. It’s gonna cost him though. All Things Digital, that Yahoo know-it-all, says Yahoo has ag...
This book does what it patterns book should do. It defines a language for enterprises to use to develop SOA solutions using REST. The book starts off with two chapters. The first chapter is an introduction and shows how the book is laid out. Chapter 2 introduces two case studies that ...
Cloud services and solutions play a critical role in the cloud ecosystem. With the cloud comes increased complexities and an increased need for integration, aggregation and automation capabilities. This is a disruptive change for both business and IT, and constitutes a series of challe...
A two-and-a-half-year-old Berlin-based Infrastructure-as-a-Service (IaaS) start-up you never heard of called ProfitBricks thinks it can take on Amazon Web Services and win. By its lights the likes of Amazon, Rackspace, Savvis and GoGrid are all first-generation and it’s not. It cla...
Let’s start with the basic question: What is the disruptor? The disruptor is a concurrency framework for Java that allows data sharing between threads. The age old way of coding a producer-consumer model is to use a queue as the buffer area between the producer and the consumer, where ...
Baidu, China’s biggest PC-based search engine, said Monday in Beijing that it’s going to put upwards of $1.6 billion in a new cloud computing center. It declined to give details but the sum it says it’s willing to spend is a powerful lot of money in any currency. One report suggest...
A billion dollars more or less – poof – disappeared off of Intel’s books Friday morning when it lowered its Q3 revenue guidance to $13.2 billion plus or minus $300 million, down about 7.3% from a range of $13.8 billion-$14.8 billion or a mid-point of $14.3 billion. It also withdrew i...
The Agile Manifesto places customer collaboration over contract negotiation with a keen focus on a highly skilled, motivated team in constant interaction with the product and the customer at every phase of the project. As a result of this collaborative, customer-centric view, Agile req...
Police responded to Dell’s campus in Round Rock, Texas, Monday night (Labor Day) around 9:30 after gunshots were reported and a witness said someone with a gun was riding around a parking lot on a bicycle. It’s unclear how many shots may have been fired but three windows were broken in...
Scale-out networking using fast, fat and flat network topologies deliver the best ROI when building private or public cloud computing networks. A key ingredient of such high performance and highly efficient network designs is the Ethernet switch system that connects server, virtual mac...
In 1704, the first newspaper advertisement was published. Ever since, newspapers have served their local and loyal community of readers, while pursuing new revenue streams in advertising. And so began an uneasy relationship with consumerism – newspapers can uniquely offer advertisers a...
Workday, the cloud-based HR company started by the guys who built PeopleSoft, is inching closer to going public. The company filed to go public in July but took advantage of a provision in the regulations to postpone disclosing its financials. As it happens it lost $46.9 million in t...
IDC has cut its prediction of PC growth this year from 5% to 0.9% or about 367 million units. It will be the second consecutive year of growth below 2%. The researcher figures US shipments will drop 3.7%. Dell last week reported quarterly sales off 14% year-over-year, HP was down 1...
The term “Business Intelligence” and its acronym “BI” are so pervasive in today’s data-intensive lexicon that it’s a challenge to know just what to make of it. If you add in all the new trendy terminology such as business process management (BPM), data mining, data warehousing, busines...
Whether you choose to embrace it or you try to resist it, the BYOD (Bring Your Own Device) trend is set to grow. The Cisco IBSG Horizons Study found that 78% of white-collar workers in the U.S. use a mobile device for work purposes and 41% of respondents indicated a majority of smartph...
The latest skinny about Amazon has it assembling an IP team to acquire and license patents as part of its defense against the dark arts practiced by Google and Apple to protect their mobile devices and digital content. Reuters says the mighty retailer is looking for someone who can “...
Some testers dismiss the GUI driven approach as being too limited for complicated behaviors. Old school testers insist on only utilizing program-based scripts because past experience has led them to think that this is the most flexible or the only choice for handling complicated behavi...
Hardware and software are expensive to maintain in any organization. Technology is constantly changing, and thus, organizations must budget for equipment upgrades and software upgrades. For some organizations, this may require upgrades annually. To remain up-to-date, companies must inv...
Acer CEO JT Wang claims Microsoft will upset the historic balance between hardware and software by selling its own tablets and has warned it to “think twice” about it before creating “a huge negative impact for the ecosystem” and ticking off other brands too. He is the first head of ...
Amazon Web Services is now offering new features for customers looking to run high-performance databases in the cloud by launching Elastic Block Store (EBS) Provisioned IOPS. Provisioned IOPS (input/output operations per second) are a new EBS volume type designed to deliver predictab...
Box, the cloud storage and file-sharing start-up, has gotten a massive $125 million E round. That makes roughly $284 million since Box started in 2005. Most of the new money – $100 million, in fact – is coming from General Atlantic, which is also contributing one of the operating par...
Managing software application performance is complex and increasingly challenging. Surprisingly, even today, massive IT resources remain chained to ensuring applications and infrastructures are up and running smoothly, rather than proactively leveraging strategic technologies to solve ...
RPost, the company that owns Registered Email, has gotten two new patents that cover the systems and methods service providers use to track e-mail delivery or failure using server logs. RPost says the protocol-level technology was novel in 1999 when RPost first filed for the patents ...
I’ve talked at length about the importance of business process monitoring alongside of system monitoring, but in discussions I found that sometimes an overview and simple examples are not enough to convince people about the benefits of this approach. Business owners think they don’t ne...
As new smart-connected devices ship at a record pace and more and more people join the mobile world, strained networks are bound to incur the occasional dropped call or slow-loading app. However, users are growing less tolerant of service “hiccups” and are more demanding of consistent ...
Recently Microsoft conducted research [1] [2] indicating that a delay of 1 second in page load time means a loss of revenue of 2.8%. Obviously, faster websites lead to huge revenue benefits for ecommerce companies, hence why speed is the dominant industry trend today. That said, improv...
If you want a current look into the state of enterprise software deliver at a global level, then this is the book for you. The book kicks off with a nice overview of the complexities involved with software delivery at an enterprise level. He then details what a typical software delive...
Microsoft has never reported a loss in its 26 years as a public company until Thursday when a gargantuan $6.19 billion write-down on aQuantative, the online ad agency it acquired in 2007 for $6.3 billion to compete against Google, plus $540 million in deferred revenue on Windows 8 nomi...
SYS-CON Events announced today that Broadcom Corporation, a global innovation leader in semiconductor solutions for wired and wireless communications, has been named “Gold Sponsor” of SYS-CON's 11th International Cloud Expo, which will take place on November 5–8, 2012, at the Santa Cla...
Creating a Vulnerability Analysis is a quick and dirty calculation to help you begin the protection process. Nothing speaks to a business owner like the threat of losing money, losing customers, or losing employees. If you are tasked with "figuring it out", the following calculation is...
If you are interested in Acceptance Test-Driven Development, Behavior-Driven Development (BDD), Specification by Example, Agile Acceptance Testing, or Story Testing this is a great place to start. The book is broken down into three parts. The first two are end to end case studies show...
SYS-CON Events announced today that (ISC)² has been named “Association Sponsor” of SYS-CON's 11th International Cloud Expo, which will take place on November 5–8, 2012, at the Santa Clara Convention Center in Santa Clara, CA. (ISC)² is the largest not-for-profit membership body of cer...
Business processes manage the operational flow of business and when optimized achieve cost containment and flexibility as they need to be efficient and able to adapt to changing business conditions. The art of planning and implementing process management requires all the best cross-fun...
When you examine the methodologies being used for implementing ERP systems, it makes you wonder whether these complex, costly and resource consuming projects are being framed correctly for success. Microsoft’s Sure Step for example, primarily frames the project as a technology/softwar...