Last Build Date: Sun, 26 Feb 2017 05:18:48 ESTCopyright: Copyright 2017 Ulitzer.com
Sat, 25 Feb 2017 22:00:00 ESTWe call it DevOps but much of the time there’s a lot more discussion about the needs and concerns of developers than there is about other groups. There’s a focus on improved and less isolated developer workflows. There are many discussions around collaboration, continuous integration and delivery, issue tracking, source code control, code review, IDEs, and xPaaS – and all the tools that enable those things. Changes in developer practices may come up – such as developers taking ownership of code and pulling pager duty. We also talk about culture a great deal in the context of developers and DevOps. About touchy-feely topics like empathy, trust, learning, cooperation, and responsibility. It can all be a bit kumbaya.
Sat, 25 Feb 2017 19:00:00 ESTYou think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead at PHEMI, discussed how data science is changing our ideas of what’s possible with data, using examples and case studies drawn from finance, precision medicine, and genomics.
Sat, 25 Feb 2017 11:00:00 ESTDevOps and microservices are permeating software engineering teams broadly, whether these teams are in pure software shops but happen to run a business, such Uber and Airbnb, or in companies that rely heavily on software to run more traditional business, such as financial firms or high-end manufacturers. Microservices and DevOps have created software development and therefore business speed and agility benefits, but they have also created problems; specifically, they have created software security issues.
Sat, 25 Feb 2017 10:00:00 ESTAs cloud adoption continues to transform business, today's global enterprises are challenged with managing a growing amount of information living outside of the data center. The rapid adoption of IoT and increasingly mobile workforce are exacerbating the problem. Ensuring secure data sharing and efficient backup poses capacity and bandwidth considerations as well as policy and regulatory compliance issues.
Sat, 25 Feb 2017 09:00:00 ESTIt is one thing to build single industrial IoT applications, but what will it take to build the Smart Cities and truly society changing applications of the future? The technology won’t be the problem, it will be the number of parties that need to work together and be aligned in their motivation to succeed. In his Day 2 Keynote at @ThingsExpo, Henrik Kenani Dahlgren, Portfolio Marketing Manager at Ericsson, discussed how to plan to cooperate, partner, and form lasting all-star teams to change the world and how it starts with business models and monetization strategies.
Sat, 25 Feb 2017 08:00:00 ESTWhen it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and business benefits that cloud bursting provides, including increased compute capacity, lower IT investment, financial agility, and, ultimately, faster time-to-market.
Sat, 25 Feb 2017 08:00:00 ESTThere are some enterprise applications that were born to be in the cloud. Customer relationship management (CRM) applications were an early favorite because salespeople (the primary consumers of CRM) are decentralized and mobile. Web applications and personal data storage are also ideal cloud applications because they allow enterprises to scale up easily while driving down costs. Enterprises have held on to their communications, however, making it one of the last applications to move into the cloud.
Sat, 25 Feb 2017 07:30:00 ESTData is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Sat, 25 Feb 2017 04:15:00 ESTData is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Sat, 25 Feb 2017 03:00:00 ESTCognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & Associates, Inc., put cognitive computing into perspective with its value to the business. The session detailed what it takes to build a cognitive application and the types of solutions that are the best fit for this data-driven approach.
Sat, 25 Feb 2017 01:45:00 ESTWho are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, discussed the impact of technology on identity. Should we federate, or not? How should identity be secured? Who owns the identity? How is identity created, addressed, and shared?
Fri, 24 Feb 2017 08:00:00 ESTWhether they’re located in a public, private, or hybrid cloud environment, cloud technologies are constantly evolving. While the innovation is exciting, the end mission of delivering business value and rapidly producing incremental product features is paramount. In his session at @DevOpsSummit at 19th Cloud Expo, Kiran Chitturi, CTO Architect at Sungard AS, discussed DevOps culture, its evolution of frameworks and technologies, and how it is achieving maturity. He also covered various styles and stacks in DevOps with examples and live demos – on AWS using tools/techniques for continuous integration, configuration management and delivery orchestration.
Wed, 22 Feb 2017 21:45:00 EST"We're bringing out a new application monitoring system to the DevOps space. It manages large enterprise applications that are distributed throughout a node in many enterprises and we manage them as one collective," explained Kevin Barnes, President of eCube Systems, in this SYS-CON.tv interview at DevOps at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Wed, 22 Feb 2017 18:30:00 ESTDocker containers have brought great opportunities to shorten the deployment process through continuous integration and the delivery of applications and microservices. This applies equally to enterprise data centers as well as the cloud. In his session at 20th Cloud Expo, Jari Kolehmainen, founder and CTO of Kontena, will discuss solutions and benefits of a deeply integrated deployment pipeline using technologies such as container management platforms, Docker containers, and the drone.io Cl tool. He also will demonstrate deployment of a CI/CD pipeline using container management, as well as show how to deploy a containerized application through a continuous delivery pipeline.
Wed, 22 Feb 2017 14:30:00 ESTDevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @DevOpsSummit 19th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists will explore this emerging use of Big Data generated by the digital business to complete the DevOps feedback loop, and inform operational and application decisions.
Fri, 17 Feb 2017 11:30:00 ESTThe Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and shared the must-have mindsets for removing complexity from the development process, accelerating application delivery times, and ensuring that developers will become heroes (not bottlenecks) in the IoT revolution.
Tue, 14 Feb 2017 09:00:00 ESTHow to share an APM session across multiple access profiles. A common question for someone new to BIG-IP Access Policy Manager (APM) is how do I configure BIG-IP APM so the user only logs in once. By default, BIG-IP APM requires authentication for each access profile. This can easily be changed by sending the domain […](image)
Wed, 08 Feb 2017 14:07:35 ESTAs more organizations deploy IoT applications in their data centers and clouds, they’re going to need their ADC to understand the unique protocols these devices use to communicate. In this Lightboard Lesson, I light up how IoT protocol MQTT (Message Queuing Telemetry Transport) works on BIG-IP v13. iRules allow you to do Topic based load […](image)
Tue, 31 Jan 2017 11:41:12 ESTKai Wilke is a Principal Consultant for IT Security at itacs GmbH – a German consulting company located in Berlin City specializing in Microsoft security solutions, SharePoint deployments, and customizations as well as classical IT Consulting. He is also a 2017 DevCentral MVP and DevCentral’s Featured Member for February! For almost 20 years in IT, […](image)
Wed, 05 Oct 2016 18:05:51 EDTFrom the rise of increasingly capable nation-states—like Iran and North Korea—conducting destructive attacks against American private sector companies, to the continuing pace of IP theft by China striking at the very heart of our innovation economy, the new team at the White House will have its hands full. And this doesn’t even account for ongoing efforts to infiltrate critical infrastructures by nation-state proxies and efforts to influence political, economic, and military conditions in the United States through cyber-enabled intelligence. Or recruitment activities, the reality of our aging federal cyber infrastructure, and the lack of serious federal government policies on joint public-private cyber defense and cyber deterrence.Jamil JafferCyber, Nat'l Security, Foreign PolicyGiven this dizzying list of challenges, the likely limited bandwidth to address these issues in the first 100 days, and the urgency of the threat, one might ask what critical issues the new administration ought to tackle immediately after inauguration day. To that end, there are five key steps that the Trump Administration should—consistent with its policy platform—take that might have a useful impact on our nation’s cybersecurity in the near-term.First, as we did in the Cold War, the new administration should define the scope of cyber activities that would provoke our nation to action. That list must include efforts to conduct destructive attacks on the property of any American government or corporate assets, regardless of where they are located; activities targeting American critical infrastructures, and activities directly affecting our body politic—including, but not limited to, efforts to influence our political process or to fundamentally undermine our economic capabilities, including through the theft of the American core corporate intellectual property.Second, the administration must make clear that it will respond swiftly and severely to activities that cross the lines described above. If we are to have credibility, we must also be prepared to actually take action when such lines are crossed. For better or worse, today, American redlines largely go disrespected because of our prior failures to enforce them. We also ought to make clear that our responses will be calibrated to the threat and may not necessarily take place in cyberspace.Third, the Trump Administration should incorporate technology infrastructure into its $1 trillion initiative to build roads, bridges, and buildings. As it encourages private sector investment through tax credits and other incentive programs, the administration must, likewise, encourage investment in technology infrastructure including the build-out of high-speed network access to underserved areas and the broad deployment of cloud infrastructure for public and private needs. In addition, the administration should encourage the use of American infrastructure technology domestically and abroad, even in the face of efforts by other nations—like China—to subsidize their industries through low-to-no interest loans and government-enabled IP theft.Fourth, the Trump Administration needs to establish a White House mechanism for engaging the American private sector in national security decision-making. As the recent Commission on Enhancing National Cybersecurity recently recommended, the new administration should create a forum for top private sector executives from key infrastructure sectors to be regularly briefed on critical national security matters with a cybersecurity nexus and to prov[...]
Wed, 28 Sep 2016 14:11:29 EDTVirtualization continues to impact the enterprise and how IT delivers services to meet business needs. Desktop Virtualization (VDI) offers employees anywhere, anytime, flexible access to their desktops whether they are at home, on the road, in the office or on a mobile device. In this edition of Lightboard Lessons, I show how BIG-IP can secure, […](image)
Tue, 27 Sep 2016 11:36:30 EDTLast week we talked about WebSafe and how it can help protect against phishing attacks with a little piece of code. This is important since malware can steal credentials from every visited web application from an infected machine. This time we’re going to look at how to protect against credential grabbing on a BIG-IP APM […](image)
Wed, 21 Sep 2016 11:09:46 EDTThe Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all embedded content on a website requires a DNS lookup, loading complex sites necessitates hundreds of DNS queries. DNS […](image)
Mon, 19 Sep 2016 17:31:00 EDTOur world is driven by data. It may speak in whispers, but it can also scream insight and information to those that understand it’s language. This is why I’ll be attending Strata+Hadoop World, Sept 26th to 29th, in New York City. Even though data can also speak many different languages, data scientist act as our interpreters and guides. They help us survive and thrive in this data-driven world by addressing and taming the many business challenges it presents
Fri, 16 Sep 2016 11:51:00 EDTPokemon GO's meteoric rise can be attributed to a lot of things. It's quite "sticky" because the platform is built on an endless reward cycle of Pokemon to catch. The face to face social aspect of playing with other people in the real world opens up a whole new way to experience games that many modern video games have lost. Most importantly, it has a fantastic brand history that connects with young and old users alike. You may think it's only a game for kids, people of all ages are playing and you should too. At minimum, you'll be surprised at how it gets you walking outside and experiencing your city on foot. Niantic originallycrowdsourced based all of its location data from their original game, Ingress, but now public art, sculpture, and historic landmarks have evolved into Pokestops in their virtual world. As you explore your neighborhood, you'll be surprised to see how local businesses are getting involved with this game. If a local business is fortunate enough to be close to a Pokestop, they'll incentivize customers to putlures down to attract more players to drive more business. If a business isn't close enough to a Pokestop to use a lure, they can still connect with customers by offering discounts to Pokemon GO teams and even retweeting when customers post about Pokemon caught at their location.
Tue, 13 Sep 2016 11:43:02 EDTI recently built out a LightBoard Studio for my home office so I can start contributing to the awesome LightBoard Lessons on DevCentral. These are short, informative videos explaining various technologies and often, how to implement on a BIG-IP system. Instead of writing on a whiteboard and looking over your shoulder into the camera as […](image)
Tue, 06 Sep 2016 11:28:04 EDTJosh Becigneul is the ADC Engineer for Secure-24 and DevCentral’s Featured Member for September! Josh has been working in the IT industry in various positions for a little over 10 years. He’s moved through various disciplines including MS server administration, Linux, Networking, and now has been working primarily with F5 BIG-IPs. For the past 3 […](image)
Wed, 25 May 2016 13:17:12 EDTThere is one element of any brand’s emotional connection to its customers that never pales – the human touch. When digital sameness drives out your margins, eliminates your differentiation, and bores your customers, you can always fall back on real, human interactions with them. After all, there is no more important emotional connection in this world than the connection between people. This conclusion should serve as an important wakeup call for anyone who believes what can be automated should be automated. True, automation provides enormous value to customers while driving costs out of the business. But in the end, being able to chat with a real live, human teller at our local bank branch – or watching original content by all-too-human storytellers – might become the only differentiated brand value remaining in our increasingly digital world.
Fri, 13 May 2016 07:19:00 EDT
Rehabilitation robot market size at $221.4 million in 2015 is expected grow dramatically to reach $1.1 billion by 2022. Exoskeleton markets will be separate and additive to this market. A separate exoskeleton market will create more growth. Market growth is a result of the effectiveness of robotic treatment of muscle difficulty. The usefulness of the rehabilitation robots is increasing. Doing more sophisticated combinations of exercise have become more feasible as the technology evolves. Patients generally practice 1,000 varied movements per session.
Wed, 04 May 2016 10:33:00 EDTFreeWave Technologies (www.freewave.com), a leader in industrial, secure Machine to Machine (M2M) and Internet of Things (IoT) wireless networking solutions, today unveiled its next generation of industry-changing wireless IoT Sensor-2-ServerTM (S2STM) solutions, the high-performance ZumLink Family (http://go.freewave.com/zumlink). The ZumLink Family represents an entirely new class of wireless IoT communication solutions by offering a flexible new radio design that supports a link rate of up to 4Mbps PLUS the ability to support third-party applications on top of the versatile communications platform. These capabilities provide customers with increased bandwidth, lower power consumption and endless possibilities for collecting, protecting, transporting and controlling data from the network end points all the way back to the server.
Sun, 01 May 2016 11:32:00 EDTUbersmith announces version 4.0 of its integrated billing, infrastructure management and help desk software suite for data centers and cloud-related service providers that comes with a completely redesigned user interface, as well as additional capabilities for more sophisticated pricing of services, plus global event notifications.
Thu, 21 Apr 2016 18:34:09 EDT
OnPage is Compatible with Yahoo Stock Price Alerts! Follow the stocks you care about most and get personalized news and alerts. Access real-time stock information and investment updates. OnPage can integrate with any sensor or application that sends a notification. The OnPage system is an ideal deployment for IoT (Internet of Things) devices. When you cannot afford to miss time-sensitive notifications, simply route them via OnPage. The service is NOT free, but if priority messaging is mission critical for your business, it will pay for itself quickly. YAHOO Stock Price Alerts via OnPage An OnPage for Android Creative Use Story. Also Works on iPhone & Blackberry. “Here’s my step by step “How to get Yahoo stock alerts with OnPage”: OnPage works great! I just got a Real-Time stock price alert with OnPage + Yahoo. Once in the Yahoo Stock Portfolio, there is a tab called “Set Alerts” just above […]
Thu, 21 Apr 2016 11:03:16 EDTEverything you need to know about Java EE and its current status
Wed, 02 Mar 2016 00:45:00 ESTAll eyes appeared to be on the Consumer Electronics Show (CES) 2016 in Las Vegas since last week, as more than 3,600 companies unveiled the IoT and IIoT innovations we can all expect to see in the coming year. This year's CES showcased plans to make the car a complete mobile office-with technology in place to allow Skype calls and the use of Microsoft 365 from the car. The other hot theme at CES was drones - not a surprise since these unmanned crafts have pulled us in like a tracker-beam to the mother ship. The autonomous ‘copter drone was one of the most impressive releases with the reality that the businessman of tomorrow doesn't need a private jet, just a ‘copter drone and a smart phone.
Fri, 30 Oct 2015 14:00:00 EDTMost of the IoT Gateway scenarios involve collecting data from machines/processing and pushing data upstream to cloud for further analytics. The gateway hardware varies from Raspberry Pi to Industrial PCs. The document states the process of allowing deploying polyglot data pipelining software with the clear notion of supporting immutability. In his session at @ThingsExpo, Shashank Jain, a development architect for SAP Labs, will discuss the objective, which is to automate the IoT deployment process from development to production scenarios using Docker containers.
Thu, 15 Oct 2015 12:11:03 EDTF5 and SimpliVity partner to improve manageability, strengthen security, and ensure faster and more successful deployments. Joint customers benefit from the integration and interoperability that result from this close collaboration. https://www.simplivity.com/ ps Related: VMworld2015 – The Preview Video VMworld2015 – Find F5 VMworld2015 – Realize the Virtual Possibilities (feat. de la Motte) VMworld2015 – Business […](image)
Wed, 14 Oct 2015 13:03:49 EDTI attend a lot of technology trade shows throughout the year and still remember going to my first technology event for F5 back in 2004. Small, almost high school science fair type booths handing out glossy flyers of the latest product along with our famous squeeze balls. And for the years that followed, the events, […](image)
Fri, 09 Oct 2015 16:19:00 EDTBizSlate is a cloud-based, supply chain software solution that enables small- and mid-sized manufacturing and distribution businesses to compete more effectively, reduce operational costs, and gain greater visibility into their supply chains. Unlike most ERP and order management software that is accounting-focused, BizSlate’s solution is designed from the supply chain process inward. The result is a revolutionary approach that provides proprietary capabilities to solve real-world supply chain challenges.
Thu, 08 Oct 2015 18:31:00 EDTBrian Pickering, Regional VP – Cloud Partners, talks about F5 Ready, a program that makes sure that F5 BIG-IP virtual editions are compatible with a growing list of cloud providers via an F5-driven verification process and flexible licensing and usage models. Gain cloud confidence by extending proven F5 solutions to a broad set of F5 Ready cloud environments with a hybrid delivery model and consistent policies. Take your BIG-IP VE license and run it in the cloud!