Welcome!


Features

Leading Web search portals are using semantic search engines to deliver answers instead of results. That same technology is now emerging in the enterprise. It can help developers tame log data by uncovering information about application performance problems and answering the question ‘...
In the last two years, the Apache Hadoop software library has emerged as a veritable Swiss Army knife of data management and analytical infrastructure. The Hadoop toolset has been positioned as a universal platform for all types of commercial and organizational analytical needs. Hadoo...
Performance is one of the key non-functional needs for any application and performance requirements needs to to be captured as part of requirements & analysis phase in a way that is understandable by all application stakeholders. In this article, we will see the key aspects of performa...
Sentiment analytics is an emerging technology enabler for enterprises to extract the sentiments, opinions and emotions from their Big Data sources, so that enterprises can predict the potential acceptance of their products and offerings. This goes a long way in defining the success of ...
Victor Cruz has actually touched on a few interesting points in his article “Safe Driving in the Cloud: A Black Box for Cars”. The fact is that car companies have lately shifted their focus towards increasing security for passengers and drivers altogether and that is why they came up ...
Do you value and treat your enterprise information like it is a strategic asset? Do you view your information logistics system (including your enterprise mobility system) as a competitive differentiator? Enterprise mobility is more than just a convenience for people on the move. It ...
There’s an inherent sense of almost forced innovation that appears to pervade the information technology industry. As we constantly push forward into perpetual cycles of reinvention, continual enhancement and augmentation after augmentation, one almost has to stop and ask what’s wrong ...
A panel of experts explores how large enterprises are delivering better risk assessments and risk analysis, and how big data can be both an area to protect, but also a tool for understanding and mitigating risks. The information security industry has struggled with getting the attenti...
SharePoint Gone Wild: When Governance Lacks Training will give a look into how training requirements - or lack of them - can affect governance for SharePoint. So far in this series, we've looked at business requirements that drive governance - including accountability, quality, approp...
Ultimately, CIOs decide how best to manage their IT infrastructures to guarantee a quality of service to end users while staying within the allocated budget. Using a shared services approach for APM fits best in line with these goals. This approach can provide quality of service to all...
Like an automobile, a web application needs occasional maintenance and management over its life cycle. Although it doesn't need oil changes, it will probably need version upgrades. There may not be manufacturer recalls, but sometimes servers fail or hang. An application doesn't need to...
Cloud hosting has been creating quite a buzz lately as being the latest, and some claim also the best type of web hosting around. It is quite different to your usually hosting server and certainly requires a lot of skill to use. Most of the time it cannot be run by a single person, but...
The Cloud market is diverse and highly fragmented – typical of any market in its early stages. The broad range of cloud activities and the frantic pace of new products / services getting launched is driving the need to consolidate and unify cloud services for the end user and for the m...
Providing analytics and BI solutions with the data required has always been difficult, with data integration long considered the biggest bottleneck in any analytics or BI project. Data virtualization significantly accelerates data integration agility. Complex data landscapes, diverse...
Idera sets its sights on addressing server sprawl by allowing enterprises to back up all their servers, easily and economically. Idera wants to make it practical to back up every server on the planet. With the release of its Server Backup 5.0 and new pricing structure, the company bel...
Since ZapThink wrote our ZapFlash on Cloud Brokerages in April 2011, the Cloud Brokerage marketplace has exploded. Or at the very least, the noise level involving such Brokerages has reached a fever pitch, which the vendors in the space want you to think is the sound of an exploding ma...
Consolidating data in an organized and highly accessible yet secure fashion is one concept many organizations are finding is helping increase productivity throughout the company. Unified storage, which is also referred to network unified storage (NUS), is a concept that the principles ...
The server monitoring process is a constant control after a server’s operation in order to detect all the failures in time, and to create charts of the servers’ loading level to configure the optimal device’s working scheme. If a datacenter supports cloud computing, server monitoring ...
The cloud is a commercial vehicle. This undeniable truth must now be accepted as a deeply entrenched truism by CIOs who are looking to manage the forward-looking growth of their technology architectures. We can actually refine this statement further. The cloud is a commercial vehicle ...
PCI DSS is the industry standard for the safe and secure processing of payment card transactions. In order for a business to effectively process card payments, PCI DSS needs to be used and maintained. As more firms head online, the internet offering a great many business opportunities ...
Much has been written here, and in many blogs, about Cloud Adoption. However, most of this has focused on the tangible and critical pieces like technical architecture and operational considerations. This can’t be minimized in the least. However, in my work with both vendors and end cus...
In the Enterprise 2.0 white paper I wrote a few years ago, I built on the core concepts of what Andrew McAfee had introduced, primarily the integrated role of Cloud Computing and also the overlap with BPM (Business Process Management). I have started bringing this up to date for 2012 t...
I’m one of those people who take my work home with me. I know, I know… there’s that whole work-life balance thing that I’m always “struggling” to overcome. But, I haven’t yet. I am kind of sorry about it, but at the same time… not deeply sorry. Anyway … I’ve wanted to put this concept...
The London Olympics are not using the Cloud. Cloud seems a good match for the Olympics for provisioning a scalable and on demand architecture quickly, and then taking it down after the event. That is precisely what the technology supports. The integration and deployment of the infrastr...
Last week one news item that attracted media attention was the hacking of some nearly 450,000 passwords from Yahoo Service called ‘Yahoo Voice'. The communications on the incident state that, SQL Injection is the primary technique adopted by hackers to get the information out of databa...
The social media revolution, with Facebook at its vanguard, has led to changes in behaviors not just for users, but for the sites and applications that benefit from such platforms. It represents a new frontier for developers, and new frontiers require fresh approaches to new challenges...
When the performance of a web application starts to degrade, often IT managers jump to the conclusion that more hardware is required. This increased infrastructure can be expensive and may not even solve the underlying problem. Let’s talk about tuning as a solution to higher scalabilit...
Last week, I was the "victim" of a technology-induced Customer Service disaster - the result of powerful technology being improperly used. This week, customer service guru Micah Solomon comments on the situation. Here's a quick re-cap: I bought a semi-expensive electronic gadget -...
Perhaps the next technological wave that will revolutionize how we live is the communication between devices, known as machine-to-machine (M2M) communication. Humanity has imagined such a world many times in the domain of science fiction, including on TV shows such as “Star Trek” and “...
IDC analysts predict that by 2020 there will be 15 quintillion files in existence. That kind of volume has brought us to a point where we are using a term like “exabyte” (and quintillion!) to describe how much data exists. How much of that data will your organization own and how will y...
We are using Confluence for both our internal Wiki as well as for our external Community Portal. I just came across a very nasty performance bug in the version we are running on our external system. We run 3.2 and the User Search Feature keeps me waiting several minutes each time I sea...
Some of the best web performance tools are still largely being run as browser plug-ins. If those tools can make the leap to becoming real-time and can be made to consider user context, the industry will have something truly powerful on its hands. Initiatives like Yahoo’s YSlow and Goo...
CNN recently reported on a funeral for Internet Explorer 6. Anyone who has been in the business of Web software development will tell you it's a bittersweet thing -- except without the bitter part. When we were designing an earlier form of WorkXpress, no less than 20-30 percent of ou...
"At Google, we run anywhere from 50 to 200 experiments at any given time on Google sites all over the world," notes a Google spokesman in a recent statement on The Google Official Blog. "Right now, we are running a small experiment of a new Google homepage design that shows links when ...
There are some 300 companies out there selling digital signage software, and Lord knows how many more home-grown, in-house solutions. So ... how do you make sense of it and make the right decision for your company? I sell the pots and pans for one of those software firms. That means I ...
So, you have just lost your most business critical application or worse yet the entire data center. What do you do? Unfortunately I have experienced these exact situations more than I would like but here are ten tips to get you through and more importantly what not to do.
This year can be labeled something like “Rich Internet Applications meet Enterprise Database by the way of full text search”. We are slowly getting used to the fact that off-the-shelf and free software can find related data out of million records within a second. The fact that the foun...
The surprise three-to-one margin that overwhelmingly returned Yahoo’s board to office last Friday at the shareholders meeting proved too big for Capital Research & Management to swallow. It’s demanding a recount, according to the Wall Street Journal blog All Things Digital, which has b...
George Orwell didn’t specifically mention enterprise search in his visionary book "1984", but he made a statement that still resonates today. When it comes to relevant search query results, "it's not about the statistics." Sanity comes from the human element. Until recently, this conce...
The mouse was the original idea of Doug Engelbart who was the head of the Augmentation Research Center (ARC) at Stanford Research Institute. Engelbart's philosophy is best embodied, in my opinion, in the design of another device that he invented, the five-finger keyboard - with keys li...