Welcome!


Latest Blogs from Agile Computing
HudsonAlpha Institute for Biotechnology leverages modern IT infrastructure and big-data analytics to power a pioneering research project incubator and genomic medicine innovator.
A recent CIO editorial by Bernard Golden regarding the future of private cloud spurred some interesting commentary in my network. The pushback seemed to focus around the viability of the term “private cloud”. These individuals are well-respected thought-leaders in cloud with significan...
One of the many questions that companies face when introducing new enterprise systems either to provide new functionality or incorporate legacy systems from a merger or acquisition is "How do we identify and manage access rights?" Not only do new access approval processes need to be e...
Enterprises have forever faced challenges surrounding the sharing of their intellectual property. Emerging cloud adoption has made it more compelling for enterprises to digitize their content, making them available over a wide variety of devices across the Internet. In his session at...
During the early days of my career, I used a variety of development environments, including the most popular Turbo C along with FoxPro, PowerBuilder, and Delphi before finally settling down with Microsoft Visual Studio. The first line of code that I have ever written was in QBasic run...
Windstream has recently completed construction of a new colocation point of presence (PoP) in Dallas, Texas, and plans to complete construction of a new colocation PoP in Columbus, Ohio, in October – both in facilities operated by Cologix, a network-neutral interconnection and data cen...
If you’ve been following along the DevCentral team’s journey toward F5 Certification, then you may be aware that we were in Chicago last week for F5’s Agility 2016 conference and took our 101 Application Delivery Fundamentals exam. I am happy to report that all of us, Jason, John, Chas...
I just had to write an Olympic-themed headline, since today is the first day of the 2016 Summer Games! I love the Olympics. It's so much fun watching athletes do what they're best at. Plus, they have the extra challenge this year of swimming or boating in polluted, mucky water-so it's ...
Imagine if every PhD dissertation resulted in something that changed the world? That's what happened when Roy Fielding presented his doctoral dissertation on the "representational state transfer" at University of California-Irvine in 2000. This dissertation laid the groundwork for th...
While visiting a customer last week (a large SaaS platform company), we started to have an interesting discussion around Service Level Agreements (SLAs) during which he encouraged me to write this blog. When I was tasked with setting up the QoS Team at DoubleClick in 1999, the primary...
The enterprise is enjoying a period of rapid technological innovation driven by real-time collaboration on a grand scale. New tools have brought the ability to work from anywhere, on any device, and at any time. Centralized offices and individually assigned desks are giving way to a di...
Recurly examined a sample set of 25 million transactions for subscription-based businesses. Download the report to get metrics for understanding churn, credit card declines, recovered revenue – and the overall health of your subscription-based IoT business.
This is the second in a two part series of posts pertaining to using some common server storage I/O benchmark tools and workload scripts. View part I here which includes overview, background and information about the tools used and related topics.
Have you seen people wandering around in public spaces, eyes glued to their smartphones, pausing and turning in different directions as if seeking some invisible landmark? Chances are you’ve spotted someone playing Pokémon GO, a location-based augmented reality game that is taking the ...
The next BriefingsDirect business innovation for procurement case study examines how UPS modernizes and streamlinines its procure-to-pay processes. Learn how UPS - across billions of dollars of supplier spend per year - automates supply-chain management and leverages new technologies ...
The Citrix Technology Professionals Program, or CTP, gives participants a larger say in essential strategy initiatives such as enabling mobile work styles. As an example, we will explore how the Citrix Technology Professionals Program, or CTPs as they are referred to, gives participan...
Having automated workflows sounds like a sexy thing. And it is. It feels pretty awesome to be able to initiate a process with a button and forget about it while the work gets done. But that doesn’t mean you have to automate every process in your office. I mean, I think people can take...
More than with previous technological (r)evolutions a side effect of cloud computing seems to be an increase in the degree of centralisation and concentration, not just within company organisations, but particularly in the wider commercial market. This is the most obvious with Software...
Up until last year, enterprises that were looking into cloud services usually undertook a long-term pilot with one of the large cloud providers, running test and dev workloads in the cloud. With cloud’s transition to mainstream adoption in 2015, and with enterprises migrating more and ...
Clouds are typically classified into four different topologies: private, public, community and hybrid clouds. Let’s focus on hybrid clouds: what are the use cases that require this topology, what are the challenges, and who stands to benefit from the hybrid cloud trend? First off, a d...
Companies are exploiting technology advances in procurement and finance services to produce new types of productivity benefits. We'll now hear from a procurement expert on how companies can better manage their finances and have tighter control over procurement processes and their supp...
It seems like every day we see reminders of the importance of thorough security testing from all areas of the software world. Security has become an especially critical consideration for APIs in recent years. Organizations rely on APIs to share and receive information - either from a t...
Are you still pondering whether to integrate cloud computing services into the structure of your IT network? You are not the only one. Most IT professionals are very concerned about data security, so they aren’t that willing to switch to cloud computing solutions that easily. It’s a fa...
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cogniza...
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments. In their session at 18th Cloud Expo, Steve...
The need to add more features on shorter release cycles is ubiquitous. At some point we will reach the threshold of gaining efficiencies and quality will begin to degrade. There is some evidence that we’ve reached and crossed that threshold already. In the late 1960's the National Sch...
"We have several customers now running private clouds. They're not as large as they should be but it's getting there. The adoption challenge has been pretty simple. Look at the world today of virtualization vs cloud," stated Nara Rajagopalan, CEO of Accelerite, in this SYS-CON.tv inter...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that the...
A BriefingsDirect business innovation thought leadership discussion on how companies are exploiting advances in procurement and finance services to produce new types of productivity benefits. We'll now hear from a leading industry analyst on how more data, process integration, and an...
Cloud computing is rewriting the books on information technology (IT) but inter-cloud networking remains a key operational issue. Layering inherently global cloud services on top of a globally fractured networking infrastructure just doesn’t work. Incompatibilities abound and enterpris...
Cybercrime costs the global economy as much as $450 billion each year. And, the median cost of cybercrime has increased by nearly 200% in the last five years. Meanwhile, collaboration has become the cornerstone of successful organizations. But collaboration often comes with a risk. ...
Mitigating downtime requires good workflows, human response and – most importantly – proper alarms to alert relevant individuals when things go wrong. Proper incident notification is crucial to effect management of IT downtime. Proper IT management requires proper incident management...
Dialogic has announced that ZVRS chose Dialogic® PowerMedia™ XMS software media server as part of its latest video relay and translation service offering. ZVRS uses Dialogic’s PowerMedia XMS technology to provide a robust solution that supports a broad range of legacy devices and any-t...
Edge Hosting has announced a partnership with and the availability of CloudFlare, a web application firewall, CDN and DDoS mitigation service. “This partnership enhances Edge Hosting’s world class, perimeter layer, application (layer 7) defensive mechanism,” said Mark Houpt, Edge Host...
xMatters for the Enterprise DevOps toolchain stitches together the disparate operational tools to help orchestrate hand-offs between the tools and team members. Customers like us because we understand the need for DevOps or NoOps automation at enterprise scale and recognize that humans...
Information security has become a critical priority for many businesses over the past decade, and for good reason. It seems like a new breach is exposed on nearly a daily basis, impacting another organization and its patrons. However, some companies believe that they're safe because th...
It is my firm belief that developers today are not focused on security during periods of head-down development. I would love to know the percentage of web developers that know about the Open Web Application Security Project or OWASP. This non-profit organization is simply focused on th...
Although we often write about and discuss digital transformation, we often fail to identify the end goal we are really trying to achieve. We talk at great length about data, analytics, speed, information logistics systems and personalized user experiences, but none of these are the en...
SYS-CON Events announced today that Interface Masters Technologies, a leader in Network Visibility and Uptime Solutions, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Interface M...
Redis is not only the fastest database, but it has become the most popular among the new wave of applications running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 18th Cloud Expo, Dave Nielsen, Developer...