Welcome!


Latest Blogs from Agile Computing
I’m writing this blog on Monday, February 9th, late afternoon with a very full stomach. Last week we launched Vormetric Tokenization with Dynamic Data Masking and today we took the engineers out for a big lunch to celebrate. Now feeling full and contemplative, I thought I’d join the cl...
In Agent version 1.61 we introduced support for the communication protocol Thrift. Thrift is a cross-platform cross-language communication framework that behaves very much like web services and so therefore automatically show ups in ruxit monitoring. It’s used by a wide variety p...
Monitoring systems can help you better manage your uptime, but even though you may spend a lot of time configuring checks and thresholds to identify problems early, your alerts are only as good as your incident response processes. One of the biggest challenges we’ve seen when talking w...
Digital transformation isn’t about the technology, and in reality it never was, even when we called it ebusiness or perhaps interactive marketing. It’s about building relationships between people. And today’s primary mechanism for a company to build a relationship between its employees...
Dev and Ops dated for about four years before they decided to get married. Now they will be living together and sharing so much more; will their relationship last? How will it need to change to support the additional closeness? Read more about their journey and how they are planning to...
Just as big box stores will see an increase in foot traffic, web outlets will also see more consumer transactions in the days prior. With increased mobile use, it is important to remember to test both your web and mobile application versions, and everything in between. If not, you may ...
There is no universal global guideline when it comes to how data is managed, secured, and accessed. Privacy laws vary from country to country and are still being defined in the digital age. In the face of trends like consumerization, mobility, and the distributed workplace, data reside...
Valentine’s Day is around the corner and most of us fall into one of the following categories: 1) In a relationship and gifts/dates have been purchased/planned for weeks; 2) In a relationship but you don’t care to celebrate the holiday; or 3) Single and avoiding every drugstore greetin...
A focus on automation is now a very common trait for large enterprises today. Faced with rising competition and the unrelenting need to evolve their user experience to match changing customer expectations, enterprises now need to innovate even faster than before. Automation is part ...
You need to get to a stage where Dev and Ops are not only working together and understanding what each other are doing, but where IT is a real driver of business performance. Getting to that stage is going to require some heavy lifting in the background, but get it right and you'll be ...
How does finance meet this expectation, when running critical processes such as reconciling finances by running month-end, quarter-end or year-end close consumes enormous amounts of resources? What kind of resources do you have tied up each time you close the books? An even scarier tho...
You are a hobbyist; curious student or a developer-entrepreneur then you must get this kit to jump start your IoT development. This is still in Beta but it has everything you need in terms of hardware, software, tools and forums to guide you through. IoT dev kit is a subset of In...
In a world where privacy and security are among top concerns for businesses and consumers alike, Aria Systems is proud to announce Health Insurance Portability and Accountability Act of 1996 (HIPAA) certification. HIPAA sets the requirements for protecting patient data for any organiza...
Hortonworks went through an IPO last Friday, December 12, 2014. It’s initial price of $16 soared by 60% immediately after. Today the stock price is $24.70 with a market cap of $1.02B. Another billion dollar club member. They compete with Cloudera and MapR in packaging the open source H...
Not only will the Patriots take on the Seattle Seahawks in the big game, but many web based companies will be taking on large-scale traffic challenges after airing their prime time commercials that day. After hearing this, you should ignore the pregame hype, put down the nachos and get...
In recurring revenue models, maximizing customer lifetime value (CLV) is achieved through establishing a lifetime of customer interaction points as each provides an opportunity to win revenue and loyalty. While the previous two posts in this CLV miniseries focused on the definition of ...
What is a hero? Well, to me, it’s someone who takes the right action when it’s needed and steps up to save the day. Are there heroes in the workplace? People whose actions save the day? People who commit great acts of organizational excellence? I would say that there are. And more, I ...
When a CIO or a CTO thinks of the applications they support it is almost always in terms of a "portfolio" When a research company named Gleanster poll executives about agile data management they discovered an interesting trend. Companies are reporting an increase in portfolio sizes wi...
The steadily increasing frequency of data breach occurrences in 2014 has been both astounding and worrisome. From Target and Neiman Marcus to Michaels, Chick-fil-A and Home Depot, fraudsters are leaving no stone unturned, and the millions of customers unlucky enough to use infected poi...
We recently changed over the entire phone system in our London office. After four years, the equipment failed, and it was time to update. As we did so, we also changed vendors. Why? It occurred to us that, for four years, we had put up with horrible support – we were the victims of...
SYS-CON Media announced that Cisco, a worldwide leader in IT that helps companies seize the opportunities of tomorrow, has launched a new ad campaign in Cloud Computing Journal. The ad campaign, a webcast titled 'Is Your Data Center Ready for the Application Economy?', focuses on the ...
Our last post defined customer lifetime value (CLV) as the metric critical in measuring the success or failure of a recurring revenue program. In order for your company to routinely return significant revenue, maximizing CLV needs to be at the top of your priority list. A CLV-supported...
Email is a mission critical application that is relied on to power business communication and collaboration capabilities on a day-to-day basis. It is a vital component of modern business and being able to send and receive email is of paramount importance. If you were to make a list of ...
ScriptRock makes GuardRail, a DevOps-ready platform for configuration monitoring. Realizing we were spending way too much time digging up, cataloguing, and tracking machine configurations, we began writing our own scripts and tools to handle what is normally an enormous chore. Then we ...
To automatically resolve email incidents, you'll want to set up your monitoring service to send an email at the onset of an incident (Trigger Emails) as well as when the system returns to normal (Recovery Emails). These two sets of emails are linked by an Incident Key, a unique identi...
DevOps podcasts are a thing and they are here to stay. Whether you are traveling, working, or just love talk radio, these Top 8 DevOps Podcasts are a great way to keep up with the industry and listen to what the experts are saying.
Cloudian, Inc., on Wednesday announced availability of Cloudian HyperStore 5.1 software. HyperStore 5.1 is an enhanced Amazon S3-compliant, plug-and-play hybrid cloud software solution that now features full Apache Hadoop integration. Enterprises can now transform Big Data into smart d...
It is important that operations be in the loop when it comes to planning any software deployment. They need to know when the project starts, not at the last minute about your new deployment. Ensure that operations is aware of any infrastructure changes needed well in advance. If the op...
Despite valiant efforts of the Dutch ICT association, the local ministry of economic affairs and tireless encouragement from (now former) EU Commissioner Neelie Kroes, my home country, the Netherlands, has been struggling to gain cloud momentum. Not an uncommon characteristics in Europ...
I have the unique opportunity to work alongside some very smart people where we conduct research, collect data, analyze and write about it. Our focus tends to be on technology and its impact on people, businesses, societies and economies. As a result of many discussions with technolog...
Regardless of the business or industry you’re in, there’s no doubt that a successful year is at the forefront of your strategy. And at the helm driving that success is revenue. But not just any kind of revenue… we’re talking recurring revenue. When an average of 80% of a company’s futu...
Once again after a couple weeks off and the calendar odometer flipping another year, I’m sitting here with a blinking curser wondering what to write about. And the thing that pops into my head are Things. The Everythings. While 2014 was the hype year for the Internet of Things (IoT), a...
To date, wearables have been such a disappointment in the market. The market is rife with ugly and semi-functional wearable devices that rarely manage more than a 3-star rating on Amazon. Will 2015 be any different? Thirty days into my Pebble experience, I'm somewhat hooked - and eag...
I arrived early for the International Consumer Electronics Show (CES) here in Las Vegas, in hopes of finding innovations for the Internet of things (IoT) that promise to disrupt enterprise business models. After attending a few pre-conference press events, I must say I’m underwhelmed. ...
Other technologies covered were: the huge growth in Internet users from 2B now to the over 5B. This will bring new cultural, political and economic ramifications. Smartphones will continue to be disruptive with newer and newer usage across the world impacting our daily lives. Robotics,...
Long story short, remote wipes aren’t a perfect solution. The original intent had some validity, but it also raises too many concerns. Wiping is really only an effective solution in an ideal world. Unfortunately, thieves don’t play by the rules and find ways around our solutions. For t...
Don’t emphasize network security at the cost of endpoint security; the two can be integrated and work hand in hand. The result is a safer, more secure business ready for the challenges of the future.
The potential adoption of Internet of Things in industries like manufacturing, healthcare will definitely bring much needed automation and agility into the operations, but if they are not properly planned out these initiatives may lead into an explosion of data whose magnitude will ...
2014 was the year I finally switched to an iPhone all thanks to the broken screen on my much loved Lumia 720. I got an iPhone 5s in June and my iOS app collection from my iPod Touch (2nd gen), iPad 2 & iPad mini made the switch pretty much seamless. I’m making this post inspired by a s...
As the years passed, and we entered 2014, not only did cloud computing mature as a business model, but senior management began to increase their awareness of various aspects of cloud computing, including the financial benefits, standardization of IT resources, the characteristics of cl...