Dec 31

These are exciting times to be working in business technology. Now, the convergence of mobile, cloud and social computing has enabled businesses to better connect, engage and capture new customers within their markets from the software applications they develop.
But there’s a catch. These very same forces are presenting nimble and adaptive businesses the opportunity to develop completely new and disruptive business models. Models that by exploiting software innovation can create new markets and destroy established brands that have lasted for decades.

Welcome to the Application Economy.

read more

Dec 31

Virtualization and Cloud executives share their predictions for 2015. Read them in this VMblog.com series exclusive. Contributed article by Jeff… Read more at VMblog.com.

Dec 31

Virtualization and Cloud executives share their predictions for 2015. Read them in this VMblog.com series exclusive. Contributed article by John… Read more at VMblog.com.

Dec 31

Virtualization and Cloud executives share their predictions for 2015. Read them in this VMblog.com series exclusive. Contributed article by Kowsik… Read more at VMblog.com.

Dec 31

Learn about the relationship between business risks and Continuous Testing, misperceptions about Continuous Testing, and how it helps both business and technical managers to make better trade-off decisions between release scope, time, and quality.
Stickyminds’ Cameron Philipp-Edmonds recently interviewed Wayne Ariola (Parasoft Chief Strategy Officer and co-author of Continuous Testing) about how Continuous Testing provides a real-time, objective assessment of the business risks associated with an application under development and allows both business and technical managers to make better trade-off decisions between release scope, time, and quality.

read more

Dec 31

In this expert e-guide, learn why accounting for demand spikes is so crucial before moving desktops to a virtual environment and discover three ways to ensure sufficient virtual desktop hardware resources. Published by: Dell

Full Article

Dec 31

An anonymous reader sends this quote from Ars Technica: The National Security Agency’s Office of Target Pursuit (OTP) maintains a team of engineers dedicated to cracking the encrypted traffic of virtual private networks (VPNs) and has developed tools that could potentially uncloak the traffic in the majority of VPNs used to secure traffic passing over the Internet today, according to documents published this week by the German news magazine Der Speigel. A slide deck from a presentation by a member of OTP’s VPN Exploitation Team, dated September 13, 2010, details the process the NSA used at that time to attack VPNs—including tools with names drawn from Star Trek and other bits of popular culture.

Read more of this story at Slashdot.








full article

Dec 31

The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp.
When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary.
In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, discussed single-value, geo-spatial, and log time series data.
By focusing on enterprise applications and the data center, he will use OpenTSDB as an example to explain some of these concepts including when to use different storage models.

read more

Dec 30

Thinspace Technology Inc., a global provider of reliable, scalable and affordable application delivery, virtualization, and cloud client technology… Read more at VMblog.com.

Dec 30

Virtualization and Cloud executives share their predictions for 2015. Read them in this VMblog.com series exclusive. Contributed article by Srinivas… Read more at VMblog.com.

«     |     ?     |     »