Welcome!


Web 2.0 Journal Latest Stories & Posts
The Web 2.0 Journal News Desk keeps you up to speed with all that's happening in the world of the read/write Web and all its mushrooming new facets - from social applications, tagging, wikis, mash-ups, and image-sharing to "Advertising 2.0," podcasting, and The Writeable Web.
Does a Content Delivery Network (CDN) protect against Distributed Denial of Service (DDoS) attacks? It’s a good question. A CDN by its very nature will absorb DDoS attacks for the content that it serves and this could be considered protection but, as is often the case, this is only the...
Phishing has been around since the dawn of the internet. The term was first used in an AOL Usenet group back in 1996 but it wasn’t until 2003 when many baited hooks and lures started dropping. Popular transaction destinations like PayPal and eBay were some of the early victims of these...
Yes, Lori has been reading the Internet again. And what she’s been seeing makes baby Lori angry. It also makes this former test designer and technology editor cry. Really, I weep at both the excuses offered for such testing and the misleading headline. I have read no less than two con...
ReactJS is a well-known open-source JavaScript library which has shown considerable growth and immense popularity in the recent years. Find out how to build a mobile app with React and some tips from Erminesoft tech team.
New forces are impacting the entire value chain of an enterprise. Availability of large amounts of digital data, automation of the production processes, inter-connectivity of the supply chains, and digitization of the customer experience is re-organizing entire industries leading to th...
Some mainstream IT buyers might think that most cloud infrastructure vendors and service providers are essentially alike. But there are key differences. Besides, given the body of market research to the contrary, there’s clearly no such thing as a "one-size-fits-all" cloud solution. F...
Just as writing has come to mean texting, blogging or any form of digital writing, the cloud today means one or all of the three Cs: computing, connectivity and communication. And just as nearly all thought to putting pen to paper has disappeared, all reference to the natural cloud is ...
In the first part of this series, we discussed the evolution of Azure IaaS and role of Azure Resource Manager. The next installment of the series explains the key differences between Azure Service Management (ASM) and Azure Resource Management (ARM) models. We will also take a look at ...
The explosion of cloud onto the enterprise scene has, literally, revolutionized how businesses across the size spectrum do business, yet there’s a price tag tucked into this cloud’s silver lining that smart decision-makers should pay heed to. This is the era of what I like to call the...
Companies are migrating infrastructure to the cloud in order to achieve advantages and agility that they need to remain competitive. However, they may have difficulty achieving one extremely important benefit of cloud computing as they attempt to run their MySQL databases in the cloud ...
Our walls of security prevention are actually being surmounted every day – we just don’t always know it. Assaults from within the network, as well as zero-day threats, are driving new types of solutions referred to as “advanced threat detection” (ATD). ATD brings in real-time packet ca...
Improving end-user experiences and leveraging big data analytics helps Aimia head off digital disruption and improve core operations and processes. The next BriefingsDirect Voice of the Customer digital business transformation case study examines how loyalty management innovator Aimia...
The mere abundance of cloud computing possibilities and developments would be enough to make it the future of business. However, there is much more to it. When one first starts scratching the surface of what cloud computing is and what its business applications can be, it soon becomes...
The world of business is changing. Disruptive shifts in power are forcing everyone to question the established status quo. In particular, savvy chief executives are tasking IT organizations to help create compelling customer experiences, support new business models and adopt agile oper...
No modern enterprise stands alone; each is dependent upon a network of trading partners to remain competitive in today’s global marketplace. But in most cases, the lack of business to business (B2B) integration is holding back efforts to evolve into a true digital business. A high-pe...
One of the key driving factors behind the various web/mobile performance initiatives is the fact that end-users’ tolerance for latency has nose-dived. Several studies have been published whereby it has been demonstrated that poor performance routinely impacts the bottom line, viz,. # u...
Node.js and io.js are increasingly being used to run JavaScript on the server side for many types of applications, such as websites, real-time messaging and controllers for small devices with limited resources. For DevOps it is crucial to monitor the whole application stack and Node.js...
A recent CIO editorial by Bernard Golden regarding the future of private cloud spurred some interesting commentary in my network. The pushback seemed to focus around the viability of the term “private cloud”. These individuals are well-respected thought-leaders in cloud with significan...
In the business world, it’s hard to throw a rock without hitting a compliance requirement. All must be obeyed, but some call for a high level of control and auditability. Governing bodies are exerting their authority like never before, increasing the number of auditors and handing out ...
HudsonAlpha Institute for Biotechnology leverages modern IT infrastructure and big-data analytics to power a pioneering research project incubator and genomic medicine innovator.
One of the many questions that companies face when introducing new enterprise systems either to provide new functionality or incorporate legacy systems from a merger or acquisition is "How do we identify and manage access rights?" Not only do new access approval processes need to be e...
The burgeoning trends around DevOps are translating into new types of IT infrastructure that both developers and operators can take advantage of. The next BriefingsDirect Voice of the Customer thought leadership discussion focuses on the burgeoning trends around DevOps and how that’s ...
"Going mobile" seems to be the mantra of modern day enterprises, with 63 percent of them firmly believing that mobility leads to competitive advantage. Their belief is not without cause, as a recent survey by Nielson reports that 93 percent of consumers who research products via mobile...
I'm often guilty of sticking my head in the sand, ignoring very small details that could turn into big problems later on. Like when Netflix told me my credit card was about to expire, but it seemed like such a boring task, so I ignored them...till the day Netflix stopped working. I gru...
Python has long been a go-to language for developers creating cutting-edge web applications. However, Python’s advantages of power, versatility, flexibility and ease of programming have made it a favorite language in a multitude of applications, industries, and niches. Examples of Pyt...
During the early days of my career, I used a variety of development environments, including the most popular Turbo C along with FoxPro, PowerBuilder, and Delphi before finally settling down with Microsoft Visual Studio. The first line of code that I have ever written was in QBasic run...
As the title suggests one way to approach the ‘Platform Business Model' (described in detail in our library section), is to consider how it is being adapted for specific industry sectors, via Cloud-centric acronyms such as: GaaP - Government as a Platform BaaP - Banking as a Platform...
If you’ve been following along the DevCentral team’s journey toward F5 Certification, then you may be aware that we were in Chicago last week for F5’s Agility 2016 conference and took our 101 Application Delivery Fundamentals exam. I am happy to report that all of us, Jason, John, Chas...
I just had to write an Olympic-themed headline, since today is the first day of the 2016 Summer Games! I love the Olympics. It's so much fun watching athletes do what they're best at. Plus, they have the extra challenge this year of swimming or boating in polluted, mucky water-so it's ...
Imagine if every PhD dissertation resulted in something that changed the world? That's what happened when Roy Fielding presented his doctoral dissertation on the "representational state transfer" at University of California-Irvine in 2000. This dissertation laid the groundwork for th...
Although security is one of the most talked about topics in the IT channel today, there’s a widespread lack of education and awareness in the workplace. Small and medium-sized businesses (SMBs) are welcoming more technology into their everyday environment, but the rapid development of ...
While visiting a customer last week (a large SaaS platform company), we started to have an interesting discussion around Service Level Agreements (SLAs) during which he encouraged me to write this blog. When I was tasked with setting up the QoS Team at DoubleClick in 1999, the primary...
The enterprise is enjoying a period of rapid technological innovation driven by real-time collaboration on a grand scale. New tools have brought the ability to work from anywhere, on any device, and at any time. Centralized offices and individually assigned desks are giving way to a di...
This is the second in a two part series of posts pertaining to using some common server storage I/O benchmark tools and workload scripts. View part I here which includes overview, background and information about the tools used and related topics.
Have you seen people wandering around in public spaces, eyes glued to their smartphones, pausing and turning in different directions as if seeking some invisible landmark? Chances are you’ve spotted someone playing Pokémon GO, a location-based augmented reality game that is taking the ...
The next BriefingsDirect business innovation for procurement case study examines how UPS modernizes and streamlinines its procure-to-pay processes. Learn how UPS - across billions of dollars of supplier spend per year - automates supply-chain management and leverages new technologies ...
The Citrix Technology Professionals Program, or CTP, gives participants a larger say in essential strategy initiatives such as enabling mobile work styles. As an example, we will explore how the Citrix Technology Professionals Program, or CTPs as they are referred to, gives participan...
Having automated workflows sounds like a sexy thing. And it is. It feels pretty awesome to be able to initiate a process with a button and forget about it while the work gets done. But that doesn’t mean you have to automate every process in your office. I mean, I think people can take...
More than with previous technological (r)evolutions a side effect of cloud computing seems to be an increase in the degree of centralisation and concentration, not just within company organisations, but particularly in the wider commercial market. This is the most obvious with Software...
Clouds are typically classified into four different topologies: private, public, community and hybrid clouds. Let’s focus on hybrid clouds: what are the use cases that require this topology, what are the challenges, and who stands to benefit from the hybrid cloud trend? First off, a d...