Welcome!


Latest Blogs from Agile Computing
Major product cycle changes tend to come around roughly every five years or so. The technology industry is fond of labeling these movements as paradigm shifts, but we’ve all heard too many of those things referenced, so let’s not go there. Looking back over the last decade and the eme...
It’s enough to drive a regular IT market watcher to the point of despair. There has been a wide-ranging change in the way business operates driven by technology-driven transformation – could there ever be a more obvious statement to make, ever? The problem is how does it all work? T...
As the Internet continues its rapid expansion, is it high time to move the world's data centers to Iceland? A place that can offer 100% renewable energy at a fixed, long-term power cost. At first glance it may seem an unusual proposition and difficult to imagine a Silicon Valley icon ...
Elasticsearch is booming. Together with Logstash, a tool for collecting and processing logs, and Kibana, a tool for searching and visualizing data in Elasticsearch (aka the “ELK” stack), adoption of Elasticsearch continues to grow by leaps and bounds. When it comes to actually using ...
Actifio, the copy data virtualization company, today announced a series of new features and functional enhancements to better support the growing number of customers leveraging its virtual data pipeline technology in support of DevOps use cases. While infrastructure is increasingly ...
SYS-CON Events announced today Isomorphic Software, the global leader in high-end, web-based business applications, will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Isomorphic Software is the gl...
Healthcare providers continue to assume increasing amounts of risk in care delivery. This has major implications, not just for providers and patients, but also vendors in IT, diagnostics, therapeutics and devices. If providers assume risk, why shouldn’t their vendors? We're already se...
There is almost a deafening discussion going on about the self-centeredness of today’s young adults. Weather you call them Generation Y, millennials or twenty-somethings, the general refrain seems to be a perception that the entire lot of them only care about themselves. Patricia Gree...
Over on the other side of the fence IT ops are screaming at the various portfolio dev teams for releasing highly risky functionality way too frequently but since the Agile dev adoption production has only had a couple of low priority P4 incidents caused by bad code releases. Things mus...
Ninety percent of 18-34 year olds strongly value a personalized mobile and web experience, and eighty-two percent of of those over 45 years old value personalization. What kind of personalization? Forty-seven percent of shoppers prefer location or time-based personalization in mobile...
Enterprise organizations have long relied on traditional IT service management (ITSM) suites to manage and govern their data environments. However, cloud computing presents new management challenges: disparate data sets; highly volatile and transient data; and pricing complexity. This ...
SYS-CON Events announced that Blue Box has been named "Bronze Sponsor" of SYS-CON's DevOps Summit New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. Blue Box delivers Private Cloud as a Service (PCaaS) to a worldwide customer base. Built on a t...
The cloud has transformed how we think about software quality. Instead of preventing failures, we must focus on automatic recovery from failure. In other words, resilience trumps traditional quality measures. Continuous delivery models further squeeze traditional notions of quality. R...
This week’s post is about the trials and tribulations of companies who make wearable applications – from fitness trackers to the nascent smartwatch market. They have a tough road ahead, and the competition is heating up. And everyone is talking about them. You may be thinking: what is ...
We spend a lot of time talking and writing about the IoT (Internet of Things) in the macro, as a giant worldwide network of objects and things, communicating with themselves and others. That is indeed interesting, but the most interesting components of the IoT, in my opinion, are the ...
The mantra of the day is – performance, performance, performance! It is clear that everything needs to be totally available all of the time, function at the fastest speeds and performance as close to perfect as is possible. In all the business discussions swirling around us we hear the...
Once upon a time, farmers would walk through a field or ride a horse around it to determine the amount of fertilizer and water their crops required. I have done this myself. Today agricultural drones with sensors and analysis software can fly over large fields and analyze the crops a...
As more applications are needed to run those Things, traditional infrastructure concerns like scale and reliability will become paramount. Additional challenges with identity and access, improving the user experience, and the need for faster provisioning of services could overwhelm IT ...
For those of us who know how fax technology evolved and reached a stage where it completely transformed communications, we know fax played a key role in the growth we have seen in the last 50 years. No fax, no cross border trade, no communications, no way to make things faster, better ...
For those of you using Cassandra or considering it, we’ve got another Sematext user’s Planet Cassandra case study for your reading pleasure. In this Q&A/use case, Alain Rodriguez, main Data Architect for Teads.tv, talks about the business and technical needs that drove their decision ...
Our guest on the podcast this week is Jeff Sussna, Founder of Ingineering.IT. We discuss the parallels between LeanUX and DevOps, identifying how each can benefit from the other's methodologies. LeanUX uses nimble processes to create a digital experience designed for the end user, whil...
Technology can do amazing things, but we’re still a long way from a program that can design and optimize a human work process. This is important to keep this in mind as you shop CRM or Partner Relationship Management (PRM) solutions. Too often people forget to first outline the source ...
Research from Forrester last year reveals that B2B buyers are frustrated by what they perceive from vendors as an utter lack of understanding regarding their business context. Instead, buyers lament that vendor communications are too narrowly focused on their own solution, without fir...
There’s been a lot of discussion about the pros and cons of smart meters. On one hand, there are those that see this technology as intrusive and expensive with an unproven value. While others embrace the ongoing utility industry transformation and realize how smart meters can play a ke...
One of the most frequently requested Rancher features, load balancers are used to distribute traffic between docker containers. Now Rancher users can configure, update and scale up an integrated load balancing service to meet their application needs, using either Rancher's UI or API. ...
In recent years, the US government has become a leading advocate for continuous monitoring of security threats and vulnerabilities. But how effectively are departments and agencies in implementing these programs? And how do we measure success? Moving Towards Continuous Monitoring Tho...
A lot is written on mobile technologies, the Internet of Things, social media and analytics, but little is written on how all these might work together in a retail environment. I think best by writing, so let's think this through together. Blind spots are defined as, "Areas where a p...
Google, with one fell swoop, changed their search algorithm and changing the lives (and livelihoods) of billions. Enter Mobilegeddon. With smartphones becoming as ubiquitous as ever, people are increasingly using them for tasks that they used to do on their PCs, like search. And just ...
As an engineer who started my career working on real-time embedded systems for industrial automation, I can tell you what a Herculean task it can be to get a tiny piece of hardware to run very sophisticated software on comparatively low spec CPU. All the while having it execute quickly...
Just to be clear, no enterprise, no matter how large, has all the capabilities in house to bring a complex IoT product or service to market without some outside help along the way. Take Nexia, an IoT service for running your connected home. Creating this offering required a number of s...
INFOTEC in Mexico City improve its service desk and monitoring operations and enjoys impressive results - an incident reduction of more than 20 percent - from those efforts. INFOTEC needed to react better to systems failures, to significantly reduce the time to repair, and to learn fr...
SYS-CON Events announced today that Aria Systems, the leading innovator in recurring revenue, has been named “Bronze Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. Proven by the world’s most demanding enterprises, inc...
Synergy Research reports that cloud infrastructure spending has been growing rapidly: “Cloud infrastructure is a fast-growing market and now accounts for almost half of all data center infrastructure shipments,” says Jeremy Duke, founder and Chief Analyst, Synergy Research. “We a...
In my new report titled Real-Time Mobile Infrastructure, I ask 80 IT and business professionals involved in enterprise mobility to answer a series of questions. The results will be shared here in the following article series.
Like DDoS attacks, aggressive screen scraping can create huge spikes in traffic, cause brownouts, and even take you down for extended periods of time. Web scraping doesn’t make the headlines and most people aren’t aware of the damage it can cause to your website’s success. Thieves an...
Downtime! Most major providers and organizations will face it one way or another. In a recent blog post titled "High Availability of Web Apps for eCommerce Starts with Real-Time Flow Analysis." Atchison Frazer, the VP of marketing at Xangati and a tech exec with years of networking exp...
The tables were turned last week when SAP's Amisha Gandhi interviewed me in Barcelona at the Mobile World Congress 2015 event on the topic of "Top Trends in Mobility 2015."
A successful recurring revenue business requires a focus on monetization across every aspect of the customer relationship, not just billing or payments. Monetization is an end-to-end process from activation through cancelation. While traditional billing systems are designed to manage o...
With $13 billion expected to be spent by American businesses alone in 2014, the cloud should no longer be considered an alternative IT model. The demand for hardware to run traditional infrastructures is in a nosedive. IBM is spending $1 billion this year, matching the amount it spent ...
A discussion of the Kony Visualizer Product, including requirements prototyping, development oversight, release planning, and lifecycle management. This five-part series of penetrating discussions on the latest in enterprise mobility explores advancements in applications design and de...