Welcome!


Web 2.0 Journal Latest Stories & Posts
The Web 2.0 Journal News Desk keeps you up to speed with all that's happening in the world of the read/write Web and all its mushrooming new facets - from social applications, tagging, wikis, mash-ups, and image-sharing to "Advertising 2.0," podcasting, and The Writeable Web.
As this year comes to a close, let's take one last look at the most pervasive cloud computing trends -- including increased usage across the different cloud service models, the key business drivers and the impact of agile innovation strategies.

Cloud computing adoption has m...
Cloud computing seems to still be one of the reigning buzzwords in high-tech these days. Everything is either “in the cloud”, “powered by the cloud”, or some variation on the theme. I remember when hosted email was just that: hosted email. Today, such offerings are considered cloud off...
Last week as I was writing Amazon Declares War on VMware, VMware was preparing to announce the acquisition of a pro services team to aid in cloud migration (see coverage in CRN): VMware Acquires Professional Services Firm To Boost Cloud Migration, DevOps Expertise. You can get my thoug...
Many projected use cases for IoT won’t directly generate revenues. To achieve greater efficiency, companies are deploying IoT sensors internally throughout their organizations to optimize their use of everything from computer servers to lighting to HVAC systems to employee productivity...
Many workloads are already in the cloud: Most organizations today run at least some workloads in the cloud. For newer organizations, they will often run ALL of their workloads in the cloud. For cloud-based workloads, sending log data to a cloud-based logging provider is not quite as bi...
The book The Cyber Threat was written to provide business and government executives insight into the nature of the dynamic adversaries attacking our networks. Understanding the Cyber Threat is critical to preparing your defenses prior to attack and also instrumental in mounting a de...
While there could be more similar use cases, the point here is IoT while bringing new innovation and benefits also brings new risks. These risks much different from earlier innovations, because when in earlier cases it is mostly the enterprise financial, reporting and other data pr...
Successful hacks can paralyze websites, enable corporate or personal data to fall into the wrong hands and potentially damage the image, reputation and sales pipeline of the organization under attack. For many, this begs the question ‘Why us?’ To find out, let’s delve into the psyche o...
Large technology manufacturers that focus on channel sales through distributors and resellers have traditionally operated with informal processes, using tools like spreadsheets and information driven by anecdotal stories from channel partners, unstructured data, and the "gut instinct" ...
We created GSX Monitor & Analyzer to help IT administrators ensure that they are utilizing resources and delivering the best end-user experience possible in these complex environments. As experienced email and messaging systems administrators, we found that there was a profound lack o...
Hortonworks went through an IPO last Friday, December 12, 2014. It’s initial price of $16 soared by 60% immediately after. Today the stock price is $24.70 with a market cap of $1.02B. Another billion dollar club member. They compete with Cloudera and MapR in packaging the open source H...
The illustration in the beginning of this post depicts the Internet of Things (IOT). You can guess (correctly) that I think that this technology is significant and important. In my opinion it is a revolution. I do not know if IDC's Internet of Things prediction is right for 2015, bu...
At the onset of 2015 it seems that Business Intelligence software has become a nearly consensual part of any data-driven organization. Today companies large and small are realizing, more than ever, that "data is power", and that harnessing this power requires the right tools for the jo...
"The year ahead brings accelerated disruption, as those technologies which we spoke about last year as being emergent -- have now begun to evolve to practical application," stated Puneet Gupta, Brillio's Chief Technology Officer. "We are seeing the industry's rapid adoption of next-gen...
In terms of requirements, IoT systems require the ability: to gather, process and store all the data from a wide range of different of sensors; to produce alerts on certain conditions being detected in the incoming data; to analyze or view historical data with incoming sensor data.
The follow up article to Welcome to the Age of the Consumer: No Opinion Matters More Now we go into how to take advantage of those essential first few days or even minutes that you have your potential customer’s attention in order to follow through on heightened expectations of ste...
Already, in the few short years that cloud has been in the mainstream IT conversation, we've seen the rise of "bare metal" cloud (thus ending the illusion of cloud's infinite capacity to users), the substitution of virtualized machines by Docker containers, and most recently, the poten...
DevOps Summit at Cloud Expo 2014 Silicon Valley was a terrific event for us. The Qubell booth was crowded on all three days. We ran demos every 30 minutes with folks lining up to get a seat and usually standing around. It was great to meet and talk to over 500 people! My keynote was we...
So congratulations, somehow you've managed to wangle your way onto one of the many DevOps conferences being held around the world. Why not you might say? DevOps is not only hot it's the approach many enterprises are now exploring as the means to help accelerate the delivery of high qua...
Today’s web-based applications are highly demanding, so the databases that hold their vast stores of information are not only expected to be very flexible in nature (supporting various data formats), but also to manage extreme performance and scaling. In this article I compare NoSQL to...

#DevOps

App deployment should be viewed as a comprehensive, end to end process.But we treat it today like each silo is a fork in a project that never merges back together, causing disjointed operations, reporting, measurement and ultimately, failure to meet business priori...

The goal of any DevOps solution is to optimize multiple processes in an organization. And success does not necessarily require that in executing the strategy everything needs to be automated to produce an effective plan. Yet, it is important that processes are put in place to handle a ...
Apple reported record sales in the most recent quarter, thanks to its upgraded iPhone line. But it was almost alone among the big technology firms in doing so. Profits reported for the same period, have fallen at Google as well … Dec. 6, 2014 01:45 PM EST  Reads: 1,470
Juliet’s lament is often mistakenly thought of as ‘where are you Romeo?’ when it actually means, ‘Why must you be a Montague?’ It is Romeo’s family and their struggle against the Capulets that keeps these two star-crossed lovers apart. Beacons, like Romeo, also have a bit of a name – ...
Your customers can process information faster every day, which makes them inherently more demanding. In fact, as B2B tech guru Ken Rutsgy says, probably, “Your customers know more about your solution than your sales guys.”
The growing consumerism of our society is always a hot topic this time of year. Discussions about whether or not retailers should open on Thanksgiving to the monitoring of 'Christmas Creep' by various blogs and websites can be seen everywhere. However what gets lost in the shuffle...
In the last blog, we explored real world examples of smart cities and highlighted one such example in the São Paulo state of Brazil. What makes this an exciting model for other cities to evaluate and perhaps emulate is that it touches many city services that we can all relate to. It al...
Though the problems seem daunting, the trend toward BYOD adoption doesn’t appear to be slowing. Many organizations see the drawbacks of BYOD but determine that the benefits are worth the extra risks. As long as companies practice common sense security policies such as app restrictions,...

The "internet of things" is not coming. It's here.

Driven by the introduction of low-cost "things" that are actually useful, Silicon Valley's promised land of a wirelessly-linked network of ev...

Now that most companies seek to make the most of their data in order to remain competitive, they need to hire the right analytical personnel. Unfortunately that is becoming difficult to achieve. McKinsey recently released a report on the growing talent shortage. The study explains th...
Businesses of all sizes are inundated with data, and the need to create value from the raw information is growing. The good news is that business intelligence tools are evolving and becoming more affordable, inclusive, and easy to use, especially with the introduction of Self-Service B...
November is here. The leaves are falling, the sun is setting at a ridiculously early hour and this week a time honored American tradition will take place. And no, silly, I'm not talking about Thanksgiving. I'm talking about Black Friday. Black Friday is the Friday after Thanksgiving...
If you thought the Bring Your Own Device (BYOD) craze was a headache, just wait until button cameras, smart watches, and spy glasses (already here) are a daily occurrence in the office. Workplace #Wearables will be a huge challenge in the coming years as more devices, clothing and pret...
Cryptocurrencies have gained traction in the past half-decade for a variety of reasons. Bitcoin has become the most popular cryptocurrency in the world due to its sudden rise in value and acceptance within the international marketplace. You might be wondering: What does cloud computing...
The IT infrastructure of modern businesses require a number of seemingly never-ending cycles to track assets. As these assets go through different stages of usefulness or functionality, IT teams must constantly manage the process, which takes them away from other more important tasks a...

#IoT #IDM #SDAS #infosec

As the Internet of Things continues to expand (and it is expanding rapidly) the issue of access to applications is going to get a lot more messy.

One of the benefits of cloud, so I'm told, is it is "easy access" for everyone...

HP charts a better path to simplified, just-in-time, and pan-IT support improvements -- despite dynamic and complex IT environments. Much of the attention to coping with mega IT challenges such as cloud, bring your own device (BYOD), mobile applications, and big data focuses on adopti...
Moscow-based OpenBank, one of the largest private financial services groups in Russia, has built out a business intelligence capability for wholly new business activity monitoring benefits. The next BriefingsDirect deep-dive big data benefits case study interview explores how Moscow-b...
Don’t emphasize network security at the cost of endpoint security; the two can be integrated and work hand in hand. The result is a safer, more secure business ready for the challenges of the future.
We’re nearing the end of 2014 and most smart CEOs already know their IT transformation game plan for 2015 – more digital differentiation woven into the fabric of their essential operations. Every enterprise is now a digital business, regardless of the industry. That’s why digital servi...