Welcome!


Latest Articles from Agile Computing
I'm reading a McKinsey report from May 2013 that talks about 12 disruptive technologies, including cloud computing and the Internet of Things (IoT). I'll focus on the IoT here. The report estimates the IoT Internet to be worth between $2.7 and $6.2 trillion by the year 2025.(The world'...
In 1999, technology pioneer Kevin Ashton coined the phrase "Internet of Things" (IoT) to refer to the concept of "connecting any device with an on and off switch to the Internet (and/or to each other). This includes everything from cell phones, coffee makers, washing machines, headphon...
Do you have a PHP application running and have to deal with inconveniences like lack of scalability, complexity of debugging, and low performance? That’s bad enough! But trust me: you are not alone. I’ve been developing Spelix, a system for cave management, for more than 20 years. It ...
The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all embedded content on a website requires a DN...
By adopting HP Vertica, Systems Mechanics improved how their products best deliver business intelligence, analytics streaming, and data analysis. Three years ago, Systems Mechanics Limited used relational databases to assemble and analyze some 20 different data sources in near real-ti...
I had a fun conversation with Mark Van Rijmenam (@VanRijmenam) a couple of weeks ago about cloud computing, Big Data, and the IoT. Mark runs BigData-Startups.com in Den Haag, Netherlands. We were mutually amused that he had chosen the name Think Bigger for his new book just as I had ch...
“Vote early and vote often.” Back in the 1920s and ’30s, when neither election technology nor oversight were as effective as they are today, and the likes of Al Capone were at work gaming the system, this phrase wasn’t a joke. It was a best practice. If you want guaranteed results, wh...
CodeFutures, a provider of agile Big Data technologies, on Tuesday announced the release of Cory Isaacson’s newest book, “Understanding Big Data Scalability.” Isaacson is the CEO/CTO for CodeFutures and an industry-leading innovator of data management software. “Understanding Big Data ...
GoodData on Thursday announced the addition of sales leadership veteran Philip Carty as Chief Revenue Officer. Carty joins GoodData with over 30 years of experience building and leading competitive sales organizations at top technology companies. In this role, Carty will oversee strate...
When people talk about Big Data, the emphasis is usually on the Big. Certainly, Big Data applications are distributed largely because the size of the data on which computations are executed warrants more than a typical application can handle. But scaling the network that provides conne...
A web of large-scale business and trade connections is making it difficult to imagine a successful strategy and tactics to counter Vladimir Putin's Crimean land grab. Putin himself seems to be unconcerned with nuance and complication, as he bulldozes onward. Russia's abrupt takeove...
Ukraine sits on the precipice of civil war. Beneath the ostensible storyline of protests against the government of Viktor Yanukovych and recent laws it's enacted lies what is likely an insuperable rift between the eastern and western regions of the country. The east, archetyped by ...
Avaya has escalated its efforts to get customers to fast-track to the cloud with the first of several sweeping initiatives that will optimize solutions and processes for delivery of collaboration as a service (CaaS) via the Avaya Collaborative Cloud. Strong demand for Avaya communicati...
Followers of the Enterprise File Share and Sync Market (EFSS) will have noticed a flurry of announcements in the last few weeks. In particular: SAP and OpenText collaborated with Tempo Box; Egnyte outlined it would leverage Google's Storage; Box purchased Stream as well as announcing ...
Like most maturing industries, standards are required to achieve broad adoption and maximum value. For the cloud, in particular cloud Infrastructure as a Service (IaaS) offerings like Amazon Web Services and Rackspace Cloud, it’s time for a standard method for presenting these services...
Open Source Storage recently announced that Oracle veteran Mark Iwanowski was joining the company as its new chairman. What better time to find out what's going on there? We had a few questions for him... Cloud Computing Journal: What are your key objectives as the new Chairman? ...
The IoT is coming, as inevitably as the earth circles the sun. It's just a matter of how many laps the planet will take before we have an IoT society characterized by smart things, buildings, grids, cities, and nations. One question to ponder is which of those nations are best equip...
The online world has become a dangerous place. According to a survey, 90 percent of all companies fell victim to a security breach in the last twelve months. Hacking and advanced persistent threats (APTs) have rendered the two-factor authentication token, now over 20 years old, essenti...
A newly established firm sent out some basic information collateral to introduce itself this summer – and a new type of business model would seem to be emerging. The company here in question described itself as a non-integrated silo-based business that was disparately fragmented into ...
A new SoftLayer facility in London with a capacity for more than 15,000 physical servers is the most recent of IBM's ongoing campaign to invest $1.2 million in 15 new datacenters worldwide. The new facility will complement an existing SoftLayer datacenter in Amsterdam and London networ...
Technology in general and the Internet of Things in particular has the potential to drive vast improvements in the lives of people worldwide. In addition to its potential to create a renaissance in manufacturing, its potential to make the globe smarter about energy use could help elimi...
I recently led a panel discussion for SYS-CON.TV on the topic of “Cloud Computing 2.0,” a term I decided to employ just a few minutes before we started recording. A few years ago, any right-minded person would wince at the use of “2.0” to describe anything, as it had long become a m...
If you've had to test one of today's composite applications, you know that "access" has become one of the most daunting barriers to SDLC acceleration. Whether we're talking about access to dev/test environments or access to dependent applications, the ability to pull all the required p...
The rather stunning deal between Apple and IBM—described as “exclusive” by both parties—has been hailed as a victory for Apple, a victory for IBM, and a “victory for design.” Actually, it's a victory for Big Data. Apple has cultivated an image as the coolest of companies from the t...
Ensuring a safe work environment can be accomplished when individuals work in either a government or private-sector office, but it becomes exponentially more complicated when employees are mobile, traveling from one job or worksite to another. While many organizations implement mobile ...
Have you taken this year's The State of Enterprise Mobility Report survey yet? If not, please do as your insights are very important to us. All participants will receive the final report free. Here are some early results: 73% of survey participants report their mobile strategies an...
The era of Big Data is upon us. The volume, variety and velocity of data now being generated is unprecedented in human history. This poses a challenge for those tasked with data integration: how can we manage all this data, particularly across distributed data centers around the world?...
What Internet of Things (IoT) technology is of most interest to you? Do you currently use any IoT applications or IoT-based products? What challenges do you predict IoT will face? Is your business considering any IoT offerings? You’re invited to MetraTech’s monthly Twitter chat to dis...
In Part IV, we wrapped up our discussions on bandwidth, congestion and packet loss. In Part V, we examine the four types of processing delays visible on the network, using the request/reply paradigm we outlined in Part I. From the network’s perspective, we allocate the time period bet...
In Part 1, I looked at what could be behind Facebook’s acquisition of WhatsApp and subsequent purchase of Oculus Rift. How are these seemingly different acquisitions related? There is no question that both Facebook and Google are in a race to build the next-generation computing/communi...
We know that losing packets is not a good thing; retransmissions cause delays. We also know that TCP ensures reliable data delivery, masking the impact of packet loss. So why are some applications seemingly unaffected by the same packet loss rate that seems to cripple others? From a pe...
In Part II, we discussed performance constraints caused by both bandwidth and congestion. Purposely omitted was a discussion about packet loss – which is often an inevitable result of heavy network congestion. I’ll use this blog entry on TCP slow-start to introduce the Congestion Windo...
In the pharmaceutical industry, the drug development clock is ticking at the rate of warp-speed. As a result, companies are constantly looking for solutions to help them accelerate time to market – and many are realizing that implementing a cloud-based information management system can...
“About two years ago Brother launched a new group called Brother Online. We thought it was a good idea for a hardware company to get into the cloud services market and our first step into that market was web conferencing,” explained Courtney Behrens, Senior Marketing Manager at Brother...
Dromology - the science (or logic) of speed. This is the definition developed by Urbanist and Professor Dr. Paul Virilio's. He believed that, "a thing that acts with speed quickly comes to dominate that which is slower." I highlighted this statement in his paper when I read, Speed a...
As a network professional, one of your newer roles is likely troubleshooting poor application performance. For most of us, our jobs have advanced beyond network “health,” towards sharing – if not owning – responsibility for application delivery. There are many reasons for this more jus...
When Facebook decided to invest a cool $19 billion ($16 billion upfront) for messaging app WhatsApp the entire world was bound to take notice. Telecommunications types, in particular, were keen to understand how this latest move would impact them as mobile operators have been feeling t...
Having an effective BYOD policy is one of the most critical steps to ensuring BYOD success. Learn the basics for securing your company's data and clarifying the process. Employees like the ability to choose. Whether it be choosing the hours they work or whether or not they can teleco...
Disruptive innovation is all very fine and good, but legacy technology and disruption don’t mix. That old gear is just too brittle and important to mess with, right? That’s when it hits you: it’s time to go rogue. Adjectives like "swashbuckling" and "romantic" rarely if ever apply to...
The supply chain is evolving, and buyers need to analyze and predict, but also to manage risk. When Capgemini's business information management (BIM) practices unit needed to provide big data capabilities to its insurance company customers, it needed to deliver the right information t...