Welcome!


Web 2.0 Journal Latest Stories & Posts
The Web 2.0 Journal News Desk keeps you up to speed with all that's happening in the world of the read/write Web and all its mushrooming new facets - from social applications, tagging, wikis, mash-ups, and image-sharing to "Advertising 2.0," podcasting, and The Writeable Web.
Although security is one of the most talked about topics in the IT channel today, there’s a widespread lack of education and awareness in the workplace. Small and medium-sized businesses (SMBs) are welcoming more technology into their everyday environment, but the rapid development of ...
This is the second in a two part series of posts pertaining to using some common server storage I/O benchmark tools and workload scripts. View part I here which includes overview, background and information about the tools used and related topics.
Have you seen people wandering around in public spaces, eyes glued to their smartphones, pausing and turning in different directions as if seeking some invisible landmark? Chances are you’ve spotted someone playing Pokémon GO, a location-based augmented reality game that is taking the ...
The next BriefingsDirect business innovation for procurement case study examines how UPS modernizes and streamlinines its procure-to-pay processes. Learn how UPS - across billions of dollars of supplier spend per year - automates supply-chain management and leverages new technologies ...
The Citrix Technology Professionals Program, or CTP, gives participants a larger say in essential strategy initiatives such as enabling mobile work styles. As an example, we will explore how the Citrix Technology Professionals Program, or CTPs as they are referred to, gives participan...
Clouds are typically classified into four different topologies: private, public, community and hybrid clouds. Let’s focus on hybrid clouds: what are the use cases that require this topology, what are the challenges, and who stands to benefit from the hybrid cloud trend? First off, a d...
Companies are exploiting technology advances in procurement and finance services to produce new types of productivity benefits. We'll now hear from a procurement expert on how companies can better manage their finances and have tighter control over procurement processes and their supp...
Most business people only select enterprise grade software once or twice during their entire lifetimes, if at all. Companies hire consultants to help with the Request for Proposal (RFP) and to guide them through the search process. Selection teams create extensive RFPs that cover the m...
Cloud computing is rewriting the books on information technology (IT) but inter-cloud networking remains a key operational issue. Layering inherently global cloud services on top of a globally fractured networking infrastructure just doesn’t work. Incompatibilities abound and enterpris...
Cybercrime costs the global economy as much as $450 billion each year. And, the median cost of cybercrime has increased by nearly 200% in the last five years. Meanwhile, collaboration has become the cornerstone of successful organizations. But collaboration often comes with a risk. ...
Over the years, marketing in general has shifted from outbound “interruption-based” marketing to inbound “get found” marketing. This means demonstrating thought leadership while creating remarkable content, and sharing it through channels in which people with interest can find it. This...
Mitigating downtime requires good workflows, human response and – most importantly – proper alarms to alert relevant individuals when things go wrong. Proper incident notification is crucial to effect management of IT downtime. Proper IT management requires proper incident management...
xMatters for the Enterprise DevOps toolchain stitches together the disparate operational tools to help orchestrate hand-offs between the tools and team members. Customers like us because we understand the need for DevOps or NoOps automation at enterprise scale and recognize that humans...
Information security has become a critical priority for many businesses over the past decade, and for good reason. It seems like a new breach is exposed on nearly a daily basis, impacting another organization and its patrons. However, some companies believe that they're safe because th...
It is my firm belief that developers today are not focused on security during periods of head-down development. I would love to know the percentage of web developers that know about the Open Web Application Security Project or OWASP. This non-profit organization is simply focused on th...
Startup businesses are popping up at every opportunity. It seems that there are endless ideas that could become potential businesses. However, not all businesses will be successful. Here are some of the top traits of successful startup businesses. One of the most important factors of ...
Hosting providers are often judged by their ability to ensure network availability/uptime. Unfortunately, distributed denial of service (DDoS) easily impact service availability and, in some instances, completely take down a hosting platform. As DDoS attacks continue to increase in siz...
Lisk is a cryptocurrency based on Delegated Proof of Stake (DPoS), but also a blockchain application and sidechain platform. With our Lisk App SDK, JavaScript developers can deploy their own sidechains and develop blockchain applications on top of them. The fact that Lisk apps are run...
Manufacturing is in the midst reinventing itself on the heels of the latest IoT innovations. The industrial automation paradigm, which some say also gave rise to the lean manufacturing management philosophy, continues to influence organizations that wish to find new ways to capitalize ...
The current version of Angular is Release Candidate 1. This version changed the way how the framework is distributed – it comes as a set of scoped npm packages now. Any imports of the Angular classes will be done from @angular instead of angular2, for example: import {bootstrap} from ...
Cloud computing changed data analytics for good. It enabled companies to drastically decrease resources and architecture previously assigned with business intelligence departments. It also enabled laymen to run advanced business analytics. Cloud was also the architecture of choice for ...
Are you evaluating a software asset for a potential purchase, investment, decision making for the future, possible termination, etc? Here are some questions to consider. Is this a revenue generating asset? How much revenue does it generate? - Establishing the true business value of a...
If the cloud was once (ever) bleeding edge, now the cloud is sheer necessity for anyone doing anything on the Internet. It has changed the way we architect applications, build IT budgets, grow userbases, even write individual lines of code. As the Internet continues to lambdify, cloud ...
The benefits of efficiency and lower cost have been the primary drivers toward the cloud and SaaS deployments, but this is just the low-hanging fruit of a much greater body of potential. According to a Cisco-sponsored IDC report, a second wave of cloud adoption now targets a much more ...
A BriefingsDirect IT market analysis discussion explores customer impacts to the global storage market now that the $67 billion Dell-EMC merger deal appears imminent. A massive and complex financing apparatus, largely built on private equity debt, undergirds the deal, with privately h...
It’s a well-known adage, ‘Don’t throw the baby out with the bath water’. These days we generally don’t toss our bathwater out the window, nor do we make a baby take the last bath – but we should probably still heed this advice. Especially when we consider adopting and transitioning to ...
The words "digital transformation" appear everywhere today. I use them in discussions daily. They describe the era we live in - an era where the rules of business, strategies and the pace of business have changed. In this era the manner in which we operate our businesses, and interac...
Stop me if you’ve heard this one before: there’s another side to the Internet that isn’t just about connecting people. The Internet of Things (IoT) is about connecting virtually any “thing” or machine. They could range from personal wearables to smart homes, smart cities’ infrastructur...
Automation and ITSM-driven insights endow help desk personnel with more knowledge and provide a single point of support for end users, regardless of their needs while still catering to their preferred method of help. We'll learn how automation and ITSM-driven insights endow help desk ...
In the digital arena, it’s impossible to avoid Dion Hinchcliffe. Perhaps you’ve seen one of his numerous keynotes or joined one of his workshops. Maybe you’ve read one of his books, Web 2.0 Architectures (with coauthors James Governor and Duane Nickull) or Social Business By Design (Pe...
In Angular 2 a parent component can pass the data to its child via binding to the child’s input parameter marked with the annotation @Input(). I’ll blog about it later, but you can see how it can be done in my blog on implementing the Mediator design pattern. In this blog I’ll show yo...
Trust. It’s a fundamental aspect of interaction in a civil society – its importance has been ingrained in us since childhood. And it’s a concept that’s deeply intertwined with our very nature. The level of trust we have with individuals, businesses, and technology affects our lives da...
Those that lead are able to collect and analyze data that followers can’t. Think about the first climber to reach the top of the mountain, they have a new and different view slower followers don’t. If you believe, as I do, that understanding data is the secret sauce of the digitally ...
Our vision is about empowering the end users with tools to make their own VR content. There are only a few games available in VR, but there are thousands of 3D, first person and 2D games available. Swift allows users to quickly convert any of their media to VR. If it’s a first person g...
For those involved in data management or data infrastructures, the following are five tips to help cut the overhead and resulting impact of digital e-waste and later physical e-waste. Most conversations involving e-waste focus on the physical aspects from disposing of electronics along...
The biggest challenge to IOT is thus big data that requires an infrastructure that is capable of processing billions or more data points each second. If you thought e-commerce revolutionized the retail industry over the past two decades, something much bigger is coming over the next t...
Digital payments are catching on for many more companies in the business world following the popularity of services like Apple Pay in the consumer world. The next BriefingsDirect business innovation thought leadership discussion focuses on how digital payments are catching on for man...
There’s a new kid on the block of disruptive technology. Blockchain. A day doesn’t go by that you can’t find numerous articles about it. Topics range from how JP Morgan is making significant investments in exploring the technology, to the Republican GOP using blockchain to allow online...
Drones are an interesting case study in the technology maturation process. Previously only available for military and defense applications, drone use have spread through the industrial and consumer markets faster than nearly anyone, especially the FAA, was prepared for. Despite the reg...
Drones have actually been around for quite some time, even though the recent "lift-off" of commercial applications has vaulted the technology further into the spotlight. I've started seeing some incredible uses of the technology and how not only businesses will benefit, but people as w...