Welcome!


Web 2.0 Journal Latest Stories & Posts
The Web 2.0 Journal News Desk keeps you up to speed with all that's happening in the world of the read/write Web and all its mushrooming new facets - from social applications, tagging, wikis, mash-ups, and image-sharing to "Advertising 2.0," podcasting, and The Writeable Web.
Drones have actually been around for quite some time, even though the recent "lift-off" of commercial applications has vaulted the technology further into the spotlight. I've started seeing some incredible uses of the technology and how not only businesses will benefit, but people as w...
Historically, financial services have always been the early adopters and pioneers of advanced technology. I am talking about financial services in an all-inclusive sense - which encompasses a broad range of institutions that manage money, including credit unions, banks, credit card co...
Over the years we've seen a push in the software industry for tighter release schedules and a more agile development process. As a result, departments that used to function independently in a waterfall development environment are now working more closely together in an accelerated rel...
The market for cloud computing continues to grow and defy all expectations. Startups are starting to slow down, but the big three - Amazon, Microsoft and Google - reported excellent earnings last quarter. Who exactly are “The Big Three”? Who are the others? What do MSPs need to know in...
For a company in the IT sector, a 20-year anniversary signifies that we have experienced and endured so many radical changes in the industry. We have witnessed the era in which mainframes were challenged by minis, which were then themselves challenged by PCs. Then came the age of softw...
To conduct complete mobile performance testing, a process that will allow you to consistently deliver an exceptional application experience to mobile users, make sure you hit every point on our ultimate mobile performance testing checklist. By now, hopefully you're well aware of the i...
Disruption. You can’t have a discussion today about business or technology without the term entering the conversation. I think it’s become an unwritten rule. It’s almost as if no one will take you seriously unless you’re talking about business disruption. Or how disruptive technologies...
I recently wrote about the two D’s of Big Data: Disintermediation and Disruption. As I stated in that blog: Across multiple industries, startups are coupling new big data technologies and new sources of data with advanced analytics (data science) to uncover new customer, product, oper...
There are always threats out there on the big bad internet. The majority of breaches happen at the application layer and many OWASP Top 10s like SQL injection are still malicious favorites to gain entry. Add to that the availability of DDoS tools, anonymous proxies and the rise of hack...
I hear it often; I need to acquire more customers like my “most valuable” customers. But what makes a customer “most valuable”? What are the characteristics and/or behaviors that make a customer “most valuable”? This simple question is anything but simple. Let me explain through an exe...
In the middle of World War II, very basic and primitive computers were designed to improve accuracy for naval gunfire. The first computers ran complex mathematical applications to calculate trajectories and gunfire from large battleships. The size of the computer was huge and was made ...
DevOps Summit at Cloud Expo 2014 Silicon Valley was a terrific event for us. The Qubell booth was crowded on all three days. We ran demos every 30 minutes with folks lining up to get a seat and usually standing around. It was great to meet and talk to over 500 people! My keynote was we...
The question of who owns the data is partly determined by the kind of cloud infrastructure that is in place for your business. The advantages that cloud based hosting brings needs to reiteration. Cloud hosting is infinitely scalable, needs radically lower CapEx and with distributed ho...
Our guest on the podcast this week is Jason Parsons, Senior Architect and Big Data expert at Cloud Technology Partners. We discuss the benefits of real-time, big data processing in the cloud and why some companies are hesitant to migrate from their traditional data centers. Jason expla...
You need to link a two production sites together in your IIoT network in order to move critical voice, video, data and sensor data (VVDS™) between the sites by deploying access points. So, you consider using industrial Wi-Fi Access Points to implement this short-haul, point-to-point (P...
Cloud applications are well established for many activities such as CRM, HR, and billing. With the cloud paradigm proven for so many enterprise tasks, the question of cloud vs. on-premises seems like yesterday’s – or even last year’s – debate. But is the cloud ready to handle the uniqu...
*This is part of a series of blogs examining Sensor-2-Server (S2S) communications, development, security and implementation. For the past two weeks, we’ve taken an in-depth look at what Sensor-2-Server communications are, how to implement these systems, and some of the specific aspect...
Over the last few weeks I was fortunate to meet a large number of Managed Service Providers (MSPs) at two separate industry events in Toronto. At both these events, focused on MSPs, and through all my conversations, one thing that resonated throughout was the dire state in which Manage...
Bayer is a global enterprise with core competencies in the fields of healthcare, agriculture, and high-tech polymer materials. Founded in Barmen, Germany in 1863, Bayer has 118,900 employees and had sales of €42.2 billion ($45.9 billion US) in fiscal year 2014. Its capital expenditure...
Hybrid cloud is rapidly becoming essential to today’s information technology processes. This is why hybrid cloud risk management has become the keystone to many modern corporate strategies. To effectively manage this shift, leading enterprises are reorganizing how the business side of ...
You may have been hearing the term "mind share" (or "mindshare," depending on whom you ask) a lot over the past year. While it's being talked about more often, the concept goes back a millennium to the very first businesses. Think about searching the internet. Do you simply search the ...
Amidst the hustle and bustle that was the recent eTail West, one thing was clear to me: many online retailers haven’t figured out the empirical relationship between customer experience and digital performance. Why? Many brands simply do not pay much attention to the infrastructur...
Modern threat defense presents many new challenges to enterprises, resulting from the sophisticated threat techniques, new threat actors like organized cybercrime groups and nation states, and the ever-evolving IT infrastructure. Advanced malware threats are fundamentally different fro...
Back in October, my son’s robotics team said “Hey! You work for a software company, can you build us an application that will help us with scouting and competitions?” Foolishly, ego stepped in before a careful outsourced review of my existing skills could take place, so I said “Sure! N...
The C suite must understand the battle they are fighting before they can develop and implement a winning digital transformation strategy. The commercial battlefield is data, and the effectiveness and speed of competitors’ information logistics systems will make all the difference. The...
Savvy businesses are embracing social media and business networks both to increase their brand awareness and to drive sales. The next BriefingsDirect business innovation thought leadership discussion focuses on building a modern marketing organization. Marketing today is a different g...
Success in the public cloud requires a complete mind shift change. Are you thinking about cloud the right way? Most large enterprises have spent millions of dollars on their public cloud initiatives over the past few years but have made little progress towards achieving their goals of...
OneCloud Systems provides managed services for the cloud including 24/7 monitoring, server and database setup, administration, and website migration. Launched by senior architects, developers and system administrators, OneCloud Systems enables customers to tap into the full value of th...
This article was excerpted from the book “Angular Development With TypeScript.” The Angular 2 framework is a re-write of popular framework AngularJS. In short, the newer version has the following advantages over AngularJS. The code is simpler to write and read It performs better th...
Started with your new company? Great! Now it's time to have some boosting plans for your company's growth. But as your company grows, you will have to take care of the emergencies that might occur at some point that warrants crisis management in IT. The crisis can be in any form - nat...
WebRTC: together these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at WebRTC Summit, Cary Bran, VP of Innovation and New Ventures at Plantronics and PLT Labs, provided an overv...
If you read the title and assumed this post would be filled with baseball analogies, you’d be right! It’s game day and all those fans who fill up major league stadiums, those are your application users. They are invested in the game and have shown up to watch the players (i.e., your ap...
Today, “network device management” means different things to different people, and the reality is that IT organizations do it, or at least do what they consider network device management to be, to vastly varying degrees, including some who do none at all (hopefully this isn’t you). A...
Take your typical project. New code appears in pieces - the front end is ready, but the API that front end makes request on isn't even on a test server yet. There is a performance optimization project going on the side. One tester is dealing with a critical support issue, another is ...
There once was a time when organizations wouldn’t consider deploying critical applications in the cloud. It was too much of a business risk from both an access and an attack perspective—and for good reason, since 28 percent of enterprises have experienced more security breaches in the ...
A thought leadership discussion on the rise of business networks and how that requires new models of busing and selling as well as new ways of discovering and relating to customers and partners. The next BriefingsDirect innovation thought leadership discussion focuses on the rise of b...
The Extreme Apps for Retail initiative places new knowledge in the hands of on-site sellers -- to the customized benefit of shoppers at the very point of sales and in real time. The next BriefingsDirect big-data use case discussion explores how technology providers have teamed as an e...
I sat down with Michael Rösch, COO of POOL4TOOL, to chat about cloud computing. With a lot of buzz about the impact of the cloud on business, it was a chance to get a perspective, as well as a few hints and tips, from someone who has been at the coalface of procurement cloud services f...
Ask anyone who is working with data “What is your biggest challenge?” The answer most of the time is “the inability to use our data fully.” This and similar statements signify one common thread of pain. With data growing at 44% over the next 10 years, it goes without saying that your b...
The evolution of cybersecurity as it relates to healthcare in the United States is by most standards in its infancy, but this situation is changing quickly. The industry is scrambling to shore up defenses as cyberattacks and breaches increase. Very few people, if asked twenty years a...