Welcome!


Latest Blogs from Industrial IoT
Enterprises are more and more dependent on their specialized internal Line of Business (LOB) applications than ever before. Naturally, the more software they leverage on-premises, the more infrastructure they need manage. It’s frequently the case that our customers simply can’t scale u...
Recently, we have been talking a lot about JMX – especially about using the Monitis JMX Agent to monitor your JBoss server. As I mentioned in my previous post, in JBoss 6.x and earlier versions, the JMX web console and the JMX connector do not require authentication. This obvious...
Nearly every company on the internet has a web presence. Many are merely using theirs for informational purposes. More sophisticated portals allow customers to register their contact information and provide some level of interaction or customer support. But as our understanding of how ...
It’s only natural that most organizations split their IT budget between new technology to enhance business operations and maintenance of their existing infrastructure. Although the actual split varies across organizations, it is striking how high the typical percentage of budget alloca...
From a business standpoint, leaking sensitive information into your logs is not only bad, but could lead to compliance, liability, and risk disaster sooner than you think. While there are solutions, including DLP, out there to inspect the data traffic and … Continue reading ͛...
Jack Vaughan interviewed Mamoon Yunus, CEO of Crosscheck Networks, at the Gartner AADI Event regarding prevalent deployment scenarios for SOA/XML Gateways (e.g.,
Promotes User Experience Development through Design and User Interface Toolsets that Deliver Powerful, Modern Applications across Multiple PlatformsLondon, UK & Cranbury, New Jersey, US - May 3, 2012 - Infragistics, the design and user experience (UX) software company and a world l...
This follows the first of a two-part series on my latest experiences with Hybrid Hard Disk Drives (HHDD's) and Solid State Devices (SSDs). In my ongoing last momentus moment post I discussed what I have done with HHDD's and setting the stage for expanded SSD use. I have the newer HHDD'...
A speaker for $80,000, a motorcycle for $500,000, a mobile for $13,800, a watch for $260,000, a PC workstation for $45,000 or a knife with 1TB thumb drive for $3,000. Which of these do you find most Lavish, Amazing, and Ridiculous? Anyway if you want to check these products out then ...
For my regular readers: Sorry about the long break, thought I’d start back with a hard look at a seemingly minor infrastructure elements, and the history of repeating history in IT. In the history of all things, technological and methodological improvements seem to dramatically change...
For my regular readers: Sorry about the long break, thought I’d start back with a hard look at a seemingly minor infrastructure elements, and the history of repeating history in IT. In the history of all things, technological and methodological improvements seem to dramatically change...
The CLR exposes managed threads, which are different from the Win32 threads. The logical thread is the managed version of a thread, while the Win32 thread is the physical thread that actually executes code. If you create a managed thread object and then do not start it by calling its S...
If I could change one decision Microsoft has made, it would be the one they made to drop Silverlight. Silverlight is the prefect line of business application platform for the enterprise, and this book shows us how to take full advantage of it.Although the author does an excellent job o...
While partnering with others has its benefits (at least in certain cases), it also has real draw backs. There is an old saying a bout a chain being “only as strong as its weakest link”. Anyone seeking a partnership of any kind needs to keep this wisdom in mind, especially regarding eco...
According to the PCI SSC, there are 12 PCI DSS requirements that satisfy a variety of security goals. Areas of focus include building and maintaining a secure network, protecting stored cardholder data, maintaining a vulnerability management program, implementing strong access control...
In the past few weeks, bloggers from BetaNews, Gizmodo and TechCrunch have ripped apart the Galaxy Note (and devices like it). You can find their posts here (1, 2, and 3). They have gotten slammed in the comment sections, but I am feeling the need to pile on a bit. Here’s my problem w...
We saw it all before: the portal gold rush, the microsite gold rush, the Social Media gold rush. They all ended at one point and gave way to a more mature way of utilizing these new tools and tactics. In the early days, we saw a few lucky pioneers strike gold with novelty apps. There w...
Using scripting and the Custom Monitor functionality in Monitis you can monitor not only system metrics but also how other resources are used. To give an example we’ll use a scenario that involves an Active Directory security group used to grant access to a color printer on your print ...
The role, impact and usefulness of the "Solution Architect" (i.e., "SA" to the "Enterprise Architect" or "System Architect") has been clarifying for several years across the IT Consulting community, particularly given the increasingly complex nature of SOA, Cloud-centric and Multi-Plat...
We have promised a while back to publish the code from live coding GridGain presentation we did at QCon London earlier this year. Since presentation was in Scala, the code we will be posting here is…
Disruptive technology is a term used to describe an idea or invention that typically disrupts an existing market, often completely displacing an earlier technology. Sometimes disruptive is great (e.g. digital cameras and cell phones), and sometimes disruptive is not so great (e.g. las...
Last September, Microsoft released some information about what customers could expect to see in Windows 8, and at the very end of February the Windows 8 beta became available. There’s been some interesting activity on the blogosphere about it (see a good blog from Jason Perlow here). ...
Social Media seems to be at the crossroad. Push and pull from four different dimensions – that is how I can summarize the trend in social media. Till Facebook came in, web was mostly open. Two of the key drivers behind the success of the Web are (1) the ease with which pages can be hy...
M3 – The Custom Monitors Swiss Tool M3 has been around for a while, receiving numerous improvements on the way. We can gladly announce it as a mature infrastructure now for server monitoring, together with Monitis. M3 lets you, the end user, easily configure checks and upload the data ...
Scaling back power needs in the data center is a noble ideal, but it’s something that very few organizations have truly been able to achieve. The fact of the matter is that increasing demand for service and capacity outpaces most of the greening efforts (and efficiency interventions li...
This book is a really great beginners guide for core SQL Server 2012, and it also does a great job of introducing new features introduced in SQL Server 2012. What I mean by core is that topics like Master Data Services and Data Quality Services are not introduced. That is not a bad thi...
I keep reading these stories about how various cloud service providers are building up their consulting practices around cloud computing mostly to address the enterprise market (see my previous post for some thoughts on that subject). These articles mostly read like it's a surprising r...
Let’s face it, APIs are hot. They engender community by enabling third-party developers, they allow Enterprises to expose existing content and services in new ways, and they provide a way to deliver brand new products and services. If you haven’t … Continue reading →
On the day the iPad 3 was released, I decided to pick up a new mobile device of my own – not an iPad, not an Android, but a Kindle, and not even a Kindle Fire. No, I haven’t shunned disruptive technology and become a Luddite. I got a device already half a year old, less expensive than ...
In this posting, I summarize my prior three posts on the three cloud computing offerings: Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). I concentrate how the three offerings differ with respect to flexibility, maintenance and portab...
Much of the security news this week revolved around sets of computer security reports and figures released about 2011 — the year best known for the rise of hacktivism into the public eye with such high-profile attacks as Sony’s PSN and the other myriad targets breached by LulzSec...
The unprecedented explosion of modern technologies combined with a burgeoning mobile space has forced enterprises to rethink previously held beliefs about the static enterprise perimeter. Remember the olden days when you said your enterprise was completely self-contained in one data &#...
Riga, Latvia, March 21, 2012 --(PR.com)-- TeamLab, the web service for business collaboration, project, document and customer relationship management, launches the application programming interface (API). From now on experienced users and IT developers will be able to import and expo...
Kapow software provides application integration capabilities that provide rapid enhancements in IT support to organizational missions. Their Kapow Katalyst Application Integration Platform is designed to enable the fast delivery of capabilities, and it does so via an easy to understand...
The refreshed Windows Azure Toolkit for Windows 8 has been released. It makes it easy for developers to create Windows Metro Style applications that can harness the power of Windows Azure. The toolkit includes working code samples, including one that uses Windows Azure and the Window...
ntop bandwidth monitor ntop is a very simple yet powerful bandwidth monitor which outputs various statistics counters in RRD. RRD – Round Robin Database – is a very handy framework for saving server performance counters in a ring buffer. We can say that if we would like to graph networ...
Hot on the heels of the job I just posted in Brussels, here is another position, this
Recently I configured a policy on the Vordel Gateway which read a message (JSON in this case) into a variable, which I then used later in a policy. Here is the simple script I used to read the