Welcome!


Latest Blogs from Industrial IoT
On multiple occasions I was blogging about these legions of enterprise Java developers trained to use certain frameworks without understanding how things work under the hood. This morning I had chance to see it one more time after interviewing three job applicants in a row. Our consult...
Escalators are an interesting first world phenomenon. While not strictly necessary anywhere, and taking more horizontal space than an elevator, they still turn up all over in most first-world countries. The key to their popularity is, no doubt, the fact that they move traffic much more...
By RyanKamauff Here’s today’s top tech news and stories. MarkLogic announced on Monday the availability of version 6 of their database - the NoSQL database now includes support for Java, JSON, and REST. “MarkLogic 6 also adds new analytics capabilities, business intel...
Although self-service -together with elasticity, pooling/sharing, etc. - is a defining attribute of cloud computing, many of the companies expressing an interest in cloud computing do not seem to be aware of that. In fact, when asked: who do you expect to provision your services to th...
After spending three days at JavaOne I’m happy to report that Java remains the most stable and reliable platform.There are some new additions to the language and the JVM that will make Java more complicated. I’m talking about Nashorn, Jigsaw, Lambda, and Modular Java. IR...
Jeffrey Breen (the man behind the Twitter airline sentiment analysis example) recently posted a collection of slides with some great tips for accessing data from R. "Tapping the Data Deluge" includes information on: Using the XLConnect package to read data from Excel spreadsheets Using...
The world is moving from SOAP to REST. Many applications continue to send old-style SOAP messages. Therefore, a very common usage of the Vordel API
…is that they're consumer cloud services. While we're all focused heavily on the challenges of managing BYOD in the enterprise, we should not overlook or understate the impact of consumer-grade services within the enterprise. Just as employees bring their own devices to the table, s...
I’ve recently taken an interest to building Windows Store Apps (aka Windows 8 Metro).  Not because I think I can get rich in the Windows Store but because I think it provides a unique way to present SharePoint data.  If you’re like me, you probably assumed Windows Store App d...
#devops #cloud Managing a global presence – especially in the cloud – can introduce additional complexity. Back in the day when virtualization and cloud were just making waves, one of the first challenges made obvious was managing IP addresses. As VM density increased, there wer...
COVENTRY, 20th September 2012: Specialist UK builders merchant Grant & Stone has laid new foundations for cost effective and efficient supplier trading using OneTime®, Wesupply's fully managed EDI service.Grant & Stone joins a growing number of building merchants and suppl...
Like most application servers, WebSphere 8.5 has a rich management infrastructure based on JMX, or Java Management Extensions. In fact, the WebSphere administration console uses JMX to connect to the server to issue queries and perform administrative operations. In a previous post I sh...
One of the twelve principles supporting agile manifesto is: Build projects around motivated individuals. Give them the environment and support they need, and trust them to get the job done. But, in a real life organization setup just trusting the team to get the job done may not be ...
Recently I've been thinking about what happens to an identity through its life cycle and how the identity data is treated during this process. I think you will also see that the Enterprise itself has differing methods of dealing with it as well. I am considering this to be the beginni...
Here is today’s federal cybersecurity and information technology news: The House of Representatives passed the renewed  Foreign Intelligence Surveillance Act allowing electronic surveillance of Americans without a warrant. More here. Panelists at the House Homeland Security Subco...
#cloud The conventional view of cloud brokers misses the need to enforce policies and ensure compliance During a dinner at VMworld organized by Lilac Schoenbeck of BMC, we had the chance to chat up cloud and related issues with Kia Behnia, CTO at BMC. Discussion turned, naturally I ...
Syrinx has an opening for a Vordel Solution Architect here
Version 3.5 offers a new scanning station, OCR for Arabic and improved document analysisTheale, UK (11 September 2012) — ABBYY® Europe, a leading provider of document recognition, data capture, linguistic technologies and services, today announced the release of ABBYY Recogn...
When I first gave the Preview of Search in SharePoint 2013, I mentioned that we could now query search using the Client Object Model.  After enough digging through the documentation, I finally pieced together the steps required to get search results back using this new API.  ...
With Windows 8 officially released and the general availability date only about six weeks away, interest and excitement is definitely building. The time is right for understanding the development and business model so you can get your apps into the Windows Store for the general availab...
We have a brand new REST based API for interacting with Search in SharePoint 2013 Preview.  Unfortunately, there is not a lot of information out there yet on how to interact with it.  I have pieced together a couple of bits to help get you started.  If you are looking to...
#cloud #virtualization #vmworld #devops Integrating F5 and VMware with the vCloud Ecosystem Framework to achieve automated operations A third of IT professionals, when asked about the status of their IT cross-collaboration efforts1 (you know, networking and server virtualization gr...
Luzern, Switzerland, September 04, 2012 --(PR.com)-- 2012 has seen one of the most pioneering years for putting the GlobRes philosophy, “Driving Reservations and Technology” into practice. Connecting to the Lodgegate PMS has been one of the many initiatives and technologic...
 1812 Imagine I wanted to write a book about Web development in the year 1812. Which tools would I need? I’d need an ink, a quill pen, and a stack of paper. To make multiple copies of the book, a publisher would hire a bunch of people who’d use ink, quill pens, and a stack ...
There are a number of articles out there about deploying applications to JBoss and about how to monitor JBoss, and in them the web application is usually accessed by pointing a browser to the web container running on port 8080. In enterprise production environments however, the applica...
At the end of my last post, I put in a plug for using Windows Azure to host periodic notification templates, so I’ll use this opportunity to delve into a bit more detail. If you want to follow along and don’t already have an Azure subscription, you can get a free 90-day trial account o...
Articles in this series: Monitoring Your Network with PRTG - Overview, Installation, and Configuration In my first article in this series, I talked about the PRTG Network Monitor from Paessler and how we decided to use it for our DevCentral migration from our IT datacenter into a cl...
Articles in this series: Monitoring Your Network with PRTG - Overview, Installation, and Configuration In my first article in this series, I talked about the PRTG Network Monitor from Paessler and how we decided to use it for our DevCentral migration from our IT datacenter into a cl...
Articles in this series: Monitoring Your Network with PRTG - Overview, Installation, and Configuration In my first article in this series, I talked about the PRTG Network Monitor from Paessler and how we decided to use it for our DevCentral migration from our IT datacenter into a cl...
Monitis open API and available collection of open source monitoring and management scripts provide nice possibility for finding solutions for monitoring your systems. Still there are many cases when you need a specific monitor and do not have or don’t want to spend much time on coding....
Despite how simple it is to support, compressing API traffic is an often-overlooked optimization. In situations where an API returns verbose resources, compressing the payload is a great way to reduce latencies. JSON and XML are highly compressible formats for example. APIs targeting m...
The market for APIs has experienced explosive growth in recent years, yet one of the major issues that providers still face is the protection and hardening of the APIs that they expose to users. In particular, when you are exposing … Continue reading →
The Vordel API workshop in Sydney today was very well attended, with lots of great questions and discussion about Cloud, APIs, and
Remote Desktop Services (RDS), formerly known as Terminal Services, is one of the components of Microsoft Windows (both server and client versions) that allows a user to access applications and data on a remote computer over a network, using the Remote Desktop Protocol (RDP). It is gen...
It has been talked about many, many times, so now it is naturally widely-known that any application, especially one that’s in production, must be monitored. When monitoring, it is important not only to evaluate the current status of the application, but, even more importantly, to predi...
It is true that anything related to Microsoft Office will become big news to millions of Office users all over the world. Three years after the release of Microsoft Office 2010, the new Office 2013 has been officially announced in July 16 with lots of new features like new Metro UI, ad...
#SDN is disruptive but it's not destructive, especially not at layer 4-7 In the wake of VMware's acquisition of SDN notable Nicira there was a whole lot of behind-the-scenes scrambling to understand the impact to the entire networking demesne – especially given speculation that afte...
For the last few months, security breaches have been on the rise (or let’s just say have been receiving more news coverage). We have seen countless stories of large, popular websites being compromised by unknown, or later identified, hackers. The quest, it seems, is to determine how ea...
This tutorial series walks you through the simple steps of building an HTML5 WebSocket app, demonstrating the power of the publish/subscribe development pattern directly in JavaScript. Our sample is almost as simple as a Chat app, the “Hello World” app of the WebSocket world, but is a ...
The Squid proxy server is one of the most famous proxy servers in the world. This software is a ‘must have’ in every network administrator’s tool bag. Squid is being used for web content caching, web access control, as a reverse proxy – anywhere the goal is productivity and easy ...