Welcome!


Web 2.0 Journal Latest Stories & Posts
The Web 2.0 Journal News Desk keeps you up to speed with all that's happening in the world of the read/write Web and all its mushrooming new facets - from social applications, tagging, wikis, mash-ups, and image-sharing to "Advertising 2.0," podcasting, and The Writeable Web.
SYS-CON Events announced that Blue Box has been named "Bronze Sponsor" of SYS-CON's DevOps Summit New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. Blue Box delivers Private Cloud as a Service (PCaaS) to a worldwide customer base. Built on a t...
As more applications are needed to run those Things, traditional infrastructure concerns like scale and reliability will become paramount. Additional challenges with identity and access, improving the user experience, and the need for faster provisioning of services could overwhelm IT ...
For those of us who know how fax technology evolved and reached a stage where it completely transformed communications, we know fax played a key role in the growth we have seen in the last 50 years. No fax, no cross border trade, no communications, no way to make things faster, better ...
Our guest on the podcast this week is Jeff Sussna, Founder of Ingineering.IT. We discuss the parallels between LeanUX and DevOps, identifying how each can benefit from the other's methodologies. LeanUX uses nimble processes to create a digital experience designed for the end user, whil...
This week’s post is about the trials and tribulations of companies who make wearable applications – from fitness trackers to the nascent smartwatch market. They have a tough road ahead, and the competition is heating up. And everyone is talking about them. You may be thinking: what is ...
We spend a lot of time talking and writing about the IoT (Internet of Things) in the macro, as a giant worldwide network of objects and things, communicating with themselves and others. That is indeed interesting, but the most interesting components of the IoT, in my opinion, are the ...
Infrastructure and Operations Management may seem like just so many blinking lights in the back room, as parallel shadow projects are launched by department heads who can't wait on IT. Today, these shadow projects are more prevalent than ever as more non-tech managers look for easy acc...
Once upon a time, farmers would walk through a field or ride a horse around it to determine the amount of fertilizer and water their crops required. I have done this myself. Today agricultural drones with sensors and analysis software can fly over large fields and analyze the crops a...
The mantra of the day is – performance, performance, performance! It is clear that everything needs to be totally available all of the time, function at the fastest speeds and performance as close to perfect as is possible. In all the business discussions swirling around us we hear the...
Ninety percent of 18-34 year olds strongly value a personalized mobile and web experience, and eighty-two percent of of those over 45 years old value personalization. What kind of personalization? Forty-seven percent of shoppers prefer location or time-based personalization in mobile...
For those of you using Cassandra or considering it, we’ve got another Sematext user’s Planet Cassandra case study for your reading pleasure. In this Q&A/use case, Alain Rodriguez, main Data Architect for Teads.tv, talks about the business and technical needs that drove their decision ...
manage and govern their data environments. However, cloud computing presents new management challenges: disparate data sets; highly volatile and transient data; and pricing complexity. This often leads to day-to-day cloud management being difficult and cumbersome – at least for those n...
There’s been a lot of discussion about the pros and cons of smart meters. On one hand, there are those that see this technology as intrusive and expensive with an unproven value. While others embrace the ongoing utility industry transformation and realize how smart meters can play a ke...
If you’ve been paying close attention lately you’ll know that the “Internet of Things” has become one of the technology industry’s biggest buzz phrases. It’s not hard to figure why. The internet has been around for the last twenty years and it has truly revolutionized our lives, the wa...
In recent years, the US government has become a leading advocate for continuous monitoring of security threats and vulnerabilities. But how effectively are departments and agencies in implementing these programs? And how do we measure success? Moving Towards Continuous Monitoring Tho...
A lot is written on mobile technologies, the Internet of Things, social media and analytics, but little is written on how all these might work together in a retail environment. I think best by writing, so let's think this through together. Blind spots are defined as, "Areas where a p...
Google, with one fell swoop, changed their search algorithm and changing the lives (and livelihoods) of billions. Enter Mobilegeddon. With smartphones becoming as ubiquitous as ever, people are increasingly using them for tasks that they used to do on their PCs, like search. And just ...
As an engineer who started my career working on real-time embedded systems for industrial automation, I can tell you what a Herculean task it can be to get a tiny piece of hardware to run very sophisticated software on comparatively low spec CPU. All the while having it execute quickly...
Just to be clear, no enterprise, no matter how large, has all the capabilities in house to bring a complex IoT product or service to market without some outside help along the way. Take Nexia, an IoT service for running your connected home. Creating this offering required a number of s...
INFOTEC in Mexico City improve its service desk and monitoring operations and enjoys impressive results - an incident reduction of more than 20 percent - from those efforts. INFOTEC needed to react better to systems failures, to significantly reduce the time to repair, and to learn fr...
Over on the other side of the fence IT ops are screaming at the various portfolio dev teams for releasing highly risky functionality way too frequently but since the Agile dev adoption production has only had a couple of low priority P4 incidents caused by bad code releases. Things mus...
Mobile World Congress 2015 (MWC) has come and gone, but it seems like just yesterday when colleagues, customers, partners and competitors converged in the always beautiful city of Barcelona as it played host to the annual event. Amid the tapas, jamón and sangria, amazing advances in te...
Synergy Research reports that cloud infrastructure spending has been growing rapidly: “Cloud infrastructure is a fast-growing market and now accounts for almost half of all data center infrastructure shipments,” says Jeremy Duke, founder and Chief Analyst, Synergy Research. “We a...
In my new report titled Real-Time Mobile Infrastructure, I ask 80 IT and business professionals involved in enterprise mobility to answer a series of questions. The results will be shared here in the following article series.
The GoDaddy customer breaches didn’t have to happen and don’t have to happen to you. Cisco threat researchers recently reported a dramatic uptick in Angler Exploit Kit-based attacks connected to compromised GoDaddy domain registry accounts. GoDaddy, which manages nearly a third of al...
Like DDoS attacks, aggressive screen scraping can create huge spikes in traffic, cause brownouts, and even take you down for extended periods of time. Web scraping doesn’t make the headlines and most people aren’t aware of the damage it can cause to your website’s success. Thieves an...
Downtime! Most major providers and organizations will face it one way or another. In a recent blog post titled "High Availability of Web Apps for eCommerce Starts with Real-Time Flow Analysis." Atchison Frazer, the VP of marketing at Xangati and a tech exec with years of networking exp...
A successful recurring revenue business requires a focus on monetization across every aspect of the customer relationship, not just billing or payments. Monetization is an end-to-end process from activation through cancelation. While traditional billing systems are designed to manage o...
With $13 billion expected to be spent by American businesses alone in 2014, the cloud should no longer be considered an alternative IT model. The demand for hardware to run traditional infrastructures is in a nosedive. IBM is spending $1 billion this year, matching the amount it spent ...
A discussion of the Kony Visualizer Product, including requirements prototyping, development oversight, release planning, and lifecycle management. This five-part series of penetrating discussions on the latest in enterprise mobility explores advancements in applications design and de...

Application experience aficionados take note: you have choices now. No longer are you constrained to just HTTP/1 with a side option of WebSockets or SPDY. HTTP/2 is also an option, one that like its SPDY...

Trust is the fundamental building block of any relationship. Whether it's personal or business, trust is something that cannot be replaced with anything. There are hundreds of books available on how to cultivate business relationships, how to maintain them, and how to leverage the best...
In September, Macy’s announced that they will invest $1 Billion into their omni-channel strategy. When spending so much money the question that immediately comes up is how to measure the success? Key questions such as “Are conversion rates increasing as planned?” and “How good is the U...
Log data provides the most granular view into what is happening across your systems, applications, and end users. Logs can show you where the issues are in real-time, and provide a historical trending view over time. Logs give you the whole picture. Logstash is an open source tool fo...
When it comes to finding useful articles, news and general information in the DevOps, CD or Agile industry, LinkedIn is usually the ticket. We all know LinkedIn is a great tool for networking and connecting with friends, but it has also turned out to be a tool used to start meaningf...
It’s easy to fall into a pattern of dysfunctional releases, release processes that are characterized by delay, inefficiency, and endless meetings that encourage people to view releases as a problem. These are the kinds of meetings that inspire references to the movie Office Space or em...
Back in 2003 I wrote an article that described the forthcoming evolution of the Cloud, and with it the development towards the SIngularity. The growing use of XML Web services would see them evolve to become intelligent agents, forming the basis for this collective. This would fit wel...
Connected cars will create new business models and provide opportunities for current businesses to greatly improve their service offerings. Areas like targeted marketing, fleet management, event planning, city planning, insurance, and auto repair will benefit immensely from the data...
A friend of mine's son recently returned from an extended absence which basically removed him from nearly all aspects of technology, including the Internet, for a bit longer than 5 years. Upon return, observing him restore his awareness of technologies and absorb all things new develop...
I ran into an interesting problems with JavaFX. When the GUI is done in FXML it seems that if a scene has only shapes (e.g., Rectangle, Circle, etc.) the handler method doesn’t receive keyboard events. And the problem seems to be that there is no way (at least I don’t see it) to give a...