Last Build Date: Wed, 29 Mar 2017 11:49:09 EDTCopyright: Copyright 2017 Ulitzer.com
Wed, 29 Mar 2017 09:30:00 EDTTechnologies help us deliver on a business strategy. Without a strategy, there is no rationale for deploying technologies. In addition, there is no rationale for digital transformation, unless there is a need for business transformation. If you believe this as we do, then strategy development will be a priority. Strategies, however, are developed under the guidance of a doctrine. The purpose of a doctrine is to create a high level understanding of what we we want to achieve with our strategy, and the concepts that must be employed to achieve it. An organization's doctrine will guide strategy development, and the tactics needed to achieve a goal.
Wed, 29 Mar 2017 07:15:00 EDTOne hour before March Madness is about to begin, the CBS Sports app crashes. Per Twitter, college basketball fans across the country are freaking out, trying to get their last minute bracket changes completed before the first game begins. Millions of fans around the world are expected to tune in to America's most-watched amateur sports tournament, and for many, competing with friends and coworkers to create a winning bracket is one of the primary appeals of watching.
Wed, 29 Mar 2017 03:30:00 EDTVirtualization over the past years has become a key strategy for IT to acquire multi-tenancy, increase utilization, develop elasticity and improve security. And virtual machines (VMs) are quickly becoming a main vehicle for developing and deploying applications. The introduction of containers seems to be bringing another and perhaps overlapped solution for achieving the same above-mentioned benefits. Are a container and a virtual machine fundamentally the same or different? And how? Is one technically superior to the other? What about performance and security? Does IT need either one, or both?
Tue, 28 Mar 2017 23:15:00 EDTThis is the burning question these days for the great minds of the enterprise regardless of industry! The digital revolution changes the way we do business and enables a world of new possibilities. But it also places unprecedented demands on businesses, on IT departments… and on legacy environments that were never designed to meet these challenges. Even today, 96% of enterprises involve mainframes in their new business initiatives. Forrester recently worked with Compuware to do some analysis and conduct a survey on How to Improve Application Development and Delivery with DevOps.
Tue, 28 Mar 2017 21:30:00 EDT"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Tue, 28 Mar 2017 14:15:00 EDTSYS-CON Events announced today that Technologic Systems Inc., an embedded systems solutions company, will exhibit at SYS-CON's @ThingsExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Technologic Systems is an embedded systems company with headquarters in Fountain Hills, Arizona. They have been in business for 32 years, helping more than 8,000 OEM customers and building over a hundred COTS products that have never been discontinued. Technologic Systems’ product base consists of a wide variety of off-the-shelf PC/104 single board computers, computer-on-modules, touch panel computers, peripherals and industrial controllers. They also offer custom configurations and design services. Technologic Systems specializes in the ARM and X86 architectures, FPGA IP-core design, and open-source software support based on Linux, Android, and Windows, providing advanced custom solutions using hardware-software co-design strategies.
Tue, 28 Mar 2017 12:00:00 EDTAsk any IT person from the financial sector about SOX requirements and they’ll probably use some colorful language about how much time and money it sucks away. According to the 2016 Sarbanes-Oxley compliance survey by global consultant Protiviti, the average annual internal cost of SOX Compliance Costs is over $1.2 million dollars, with 27% of these firms spending 2 million or more.
Tue, 28 Mar 2017 11:00:00 EDTSYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 20th International Cloud Expo, which will take place on June 6–8, 2017, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buyers their thoughts on their experience.
Tue, 28 Mar 2017 07:45:00 EDTThe IT industry is undergoing a significant evolution to keep up with cloud application demand. We see this happening as a mindset shift, from traditional IT teams to more well-rounded, cloud-focused job roles. The IT industry has become so cloud-minded that Gartner predicts that by 2020, this cloud shift will impact more than $1 trillion of global IT spending. This shift, however, has left some IT professionals feeling a little anxious about what lies ahead. The good news is that cloud computing is relatively new by IT's standards, which means it's constantly expanding to encompass new career paths.
Tue, 28 Mar 2017 04:45:00 EDTIn their Live Hack” presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, provided the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems. This “Live Hack” used open source attack tools that are free and available for download by anybody. Attendees learned where to find and how to operate these tools for the purpose of testing their own IT infrastructure. They also witnessed a cyber-attack from both sides – attacker and defender. An inside view of how indicators of compromise are researched to develop security content to be deployed for detection based on these attacks.
Mon, 27 Mar 2017 15:00:00 EDTAs Enterprise business moves from Monoliths to Microservices, adoption and successful implementations of Microservices become more evident. The goal of Microservices is to improve software delivery speed and increase system safety as scale increases. Documenting hurdles and problems for the use of Microservices will help consultants, architects and specialists to avoid repeating the same mistakes and learn how and when to use (or not use) Microservices at the enterprise level. The circumstance when Microservices is an appropriate solution described in this article and based on the authors' work experiences, best practices available in the Microservices community. However, using Microservices Architecture does not guarantee success to the enterprise.
Mon, 27 Mar 2017 14:00:00 EDTOne of my favorite parts of the novel The Phoenix Project is when Bill Palmer, DevOps hero and VP of IT Operations for the fictional company “Parts Unlimited” has a light bulb moment about the central importance of IT to the business. The moment comes as the company’s CFO lays out for Bill how he strives to align the goals of his department with the goals of the business. It’s here Bill starts to realize he must take a similar approach with IT. He ultimately turns to data about his delivery process to improve IT’s effectiveness and save his team from outsourcing—and a DevOps team is born.
Sun, 26 Mar 2017 13:45:00 EDTWith major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend @CloudExpo | @ThingsExpo, June 6-8, 2017, at the Javits Center in New York City, NY and October 31 - November 2, 2017, Santa Clara Convention Center, CA. Learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
Tue, 21 Mar 2017 09:00:00 EDTAs more organizations use APIs in their systems, they’ve become targets for the not-so-good-doers so API Security is something you need to take seriously. Most APIs today use the HTTP protocol so organizations should protect them as they would ordinary web properties. Starting in v13, BIG-IP APM is able to act as an OAuth Client, […](image)
Wed, 15 Mar 2017 09:00:00 EDTThe term ‘Proxy’ is a contraction that comes from the middle English word procuracy, a legal term meaning to act on behalf of another. In networking and web traffic, a proxy is a device or server that acts on behalf of other devices. It sits between two entities and performs a service. Proxies are hardware […](image)
Tue, 14 Mar 2017 09:00:00 EDTPassword fatigue is something we’ve all experienced at some point. Whether it’s due to breaches and the ever present, ‘update password’ warnings, the corporate policy of a 90-day rotation or simply registering for a website with yet another unique username and password. Social login or social sign-in allows people to use their existing Google, Twitter, […](image)
Wed, 01 Mar 2017 09:00:00 ESTJinshu Peethambaran is a security architect currently working with Admiral Insurance. He started his career 9 years ago, managing network security operations and started working on F5 products about 5 years ago. He is also a 2017 DevCentral MVP and DevCentral’s Featured Member for March! DevCentral got a chance to talk with Jinshu about his […](image)
Tue, 14 Feb 2017 09:00:00 ESTHow to share an APM session across multiple access profiles. A common question for someone new to BIG-IP Access Policy Manager (APM) is how do I configure BIG-IP APM so the user only logs in once. By default, BIG-IP APM requires authentication for each access profile. This can easily be changed by sending the domain […](image)
Wed, 08 Feb 2017 14:07:35 ESTAs more organizations deploy IoT applications in their data centers and clouds, they’re going to need their ADC to understand the unique protocols these devices use to communicate. In this Lightboard Lesson, I light up how IoT protocol MQTT (Message Queuing Telemetry Transport) works on BIG-IP v13. iRules allow you to do Topic based load […](image)
Tue, 31 Jan 2017 11:41:12 ESTKai Wilke is a Principal Consultant for IT Security at itacs GmbH – a German consulting company located in Berlin City specializing in Microsoft security solutions, SharePoint deployments, and customizations as well as classical IT Consulting. He is also a 2017 DevCentral MVP and DevCentral’s Featured Member for February! For almost 20 years in IT, […](image)
Wed, 05 Oct 2016 18:05:51 EDTFrom the rise of increasingly capable nation-states—like Iran and North Korea—conducting destructive attacks against American private sector companies, to the continuing pace of IP theft by China striking at the very heart of our innovation economy, the new team at the White House will have its hands full. And this doesn’t even account for ongoing efforts to infiltrate critical infrastructures by nation-state proxies and efforts to influence political, economic, and military conditions in the United States through cyber-enabled intelligence. Or recruitment activities, the reality of our aging federal cyber infrastructure, and the lack of serious federal government policies on joint public-private cyber defense and cyber deterrence.Jamil JafferCyber, Nat'l Security, Foreign PolicyGiven this dizzying list of challenges, the likely limited bandwidth to address these issues in the first 100 days, and the urgency of the threat, one might ask what critical issues the new administration ought to tackle immediately after inauguration day. To that end, there are five key steps that the Trump Administration should—consistent with its policy platform—take that might have a useful impact on our nation’s cybersecurity in the near-term.First, as we did in the Cold War, the new administration should define the scope of cyber activities that would provoke our nation to action. That list must include efforts to conduct destructive attacks on the property of any American government or corporate assets, regardless of where they are located; activities targeting American critical infrastructures, and activities directly affecting our body politic—including, but not limited to, efforts to influence our political process or to fundamentally undermine our economic capabilities, including through the theft of the American core corporate intellectual property.Second, the administration must make clear that it will respond swiftly and severely to activities that cross the lines described above. If we are to have credibility, we must also be prepared to actually take action when such lines are crossed. For better or worse, today, American redlines largely go disrespected because of our prior failures to enforce them. We also ought to make clear that our responses will be calibrated to the threat and may not necessarily take place in cyberspace.Third, the Trump Administration should incorporate technology infrastructure into its $1 trillion initiative to build roads, bridges, and buildings. As it encourages private sector investment through tax credits and other incentive programs, the administration must, likewise, encourage investment in technology infrastructure including the build-out of high-speed network access to underserved areas and the broad deployment of cloud infrastructure for public and private needs. In addition, the administration should encourage the use of American infrastructure technology domestically and abroad, even in the face of efforts by other nations—like China—to subsidize their industries through low-to-no interest loans and government-enabled IP theft.Fourth, the Trump Administration needs to establish a White House mechanism for engaging the American private sector in national security decision-making. As the recent Commission on Enhancing National Cybersecurity recently recommended, the new administration should create a forum for top private sector executives from key infrastructure sectors to be regularly briefed on critical national security matters with a cyb[...]
Wed, 28 Sep 2016 14:11:29 EDTVirtualization continues to impact the enterprise and how IT delivers services to meet business needs. Desktop Virtualization (VDI) offers employees anywhere, anytime, flexible access to their desktops whether they are at home, on the road, in the office or on a mobile device. In this edition of Lightboard Lessons, I show how BIG-IP can secure, […](image)
Tue, 27 Sep 2016 11:36:30 EDTLast week we talked about WebSafe and how it can help protect against phishing attacks with a little piece of code. This is important since malware can steal credentials from every visited web application from an infected machine. This time we’re going to look at how to protect against credential grabbing on a BIG-IP APM […](image)
Wed, 21 Sep 2016 11:09:46 EDTThe Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all embedded content on a website requires a DNS lookup, loading complex sites necessitates hundreds of DNS queries. DNS […](image)
Mon, 19 Sep 2016 17:31:00 EDTOur world is driven by data. It may speak in whispers, but it can also scream insight and information to those that understand it’s language. This is why I’ll be attending Strata+Hadoop World, Sept 26th to 29th, in New York City. Even though data can also speak many different languages, data scientist act as our interpreters and guides. They help us survive and thrive in this data-driven world by addressing and taming the many business challenges it presents
Fri, 16 Sep 2016 11:51:00 EDTPokemon GO's meteoric rise can be attributed to a lot of things. It's quite "sticky" because the platform is built on an endless reward cycle of Pokemon to catch. The face to face social aspect of playing with other people in the real world opens up a whole new way to experience games that many modern video games have lost. Most importantly, it has a fantastic brand history that connects with young and old users alike. You may think it's only a game for kids, people of all ages are playing and you should too. At minimum, you'll be surprised at how it gets you walking outside and experiencing your city on foot. Niantic originallycrowdsourced based all of its location data from their original game, Ingress, but now public art, sculpture, and historic landmarks have evolved into Pokestops in their virtual world. As you explore your neighborhood, you'll be surprised to see how local businesses are getting involved with this game. If a local business is fortunate enough to be close to a Pokestop, they'll incentivize customers to putlures down to attract more players to drive more business. If a business isn't close enough to a Pokestop to use a lure, they can still connect with customers by offering discounts to Pokemon GO teams and even retweeting when customers post about Pokemon caught at their location.
Tue, 13 Sep 2016 11:43:02 EDTI recently built out a LightBoard Studio for my home office so I can start contributing to the awesome LightBoard Lessons on DevCentral. These are short, informative videos explaining various technologies and often, how to implement on a BIG-IP system. Instead of writing on a whiteboard and looking over your shoulder into the camera as […](image)
Tue, 06 Sep 2016 11:28:04 EDTJosh Becigneul is the ADC Engineer for Secure-24 and DevCentral’s Featured Member for September! Josh has been working in the IT industry in various positions for a little over 10 years. He’s moved through various disciplines including MS server administration, Linux, Networking, and now has been working primarily with F5 BIG-IPs. For the past 3 […](image)
Wed, 25 May 2016 13:17:12 EDTThere is one element of any brand’s emotional connection to its customers that never pales – the human touch. When digital sameness drives out your margins, eliminates your differentiation, and bores your customers, you can always fall back on real, human interactions with them. After all, there is no more important emotional connection in this world than the connection between people. This conclusion should serve as an important wakeup call for anyone who believes what can be automated should be automated. True, automation provides enormous value to customers while driving costs out of the business. But in the end, being able to chat with a real live, human teller at our local bank branch – or watching original content by all-too-human storytellers – might become the only differentiated brand value remaining in our increasingly digital world.
Fri, 13 May 2016 07:19:00 EDT
Rehabilitation robot market size at $221.4 million in 2015 is expected grow dramatically to reach $1.1 billion by 2022. Exoskeleton markets will be separate and additive to this market. A separate exoskeleton market will create more growth. Market growth is a result of the effectiveness of robotic treatment of muscle difficulty. The usefulness of the rehabilitation robots is increasing. Doing more sophisticated combinations of exercise have become more feasible as the technology evolves. Patients generally practice 1,000 varied movements per session.
Wed, 04 May 2016 10:33:00 EDTFreeWave Technologies (www.freewave.com), a leader in industrial, secure Machine to Machine (M2M) and Internet of Things (IoT) wireless networking solutions, today unveiled its next generation of industry-changing wireless IoT Sensor-2-ServerTM (S2STM) solutions, the high-performance ZumLink Family (http://go.freewave.com/zumlink). The ZumLink Family represents an entirely new class of wireless IoT communication solutions by offering a flexible new radio design that supports a link rate of up to 4Mbps PLUS the ability to support third-party applications on top of the versatile communications platform. These capabilities provide customers with increased bandwidth, lower power consumption and endless possibilities for collecting, protecting, transporting and controlling data from the network end points all the way back to the server.
Sun, 01 May 2016 11:32:00 EDTUbersmith announces version 4.0 of its integrated billing, infrastructure management and help desk software suite for data centers and cloud-related service providers that comes with a completely redesigned user interface, as well as additional capabilities for more sophisticated pricing of services, plus global event notifications.
Thu, 21 Apr 2016 18:34:09 EDT
OnPage is Compatible with Yahoo Stock Price Alerts! Follow the stocks you care about most and get personalized news and alerts. Access real-time stock information and investment updates. OnPage can integrate with any sensor or application that sends a notification. The OnPage system is an ideal deployment for IoT (Internet of Things) devices. When you cannot afford to miss time-sensitive notifications, simply route them via OnPage. The service is NOT free, but if priority messaging is mission critical for your business, it will pay for itself quickly. YAHOO Stock Price Alerts via OnPage An OnPage for Android Creative Use Story. Also Works on iPhone & Blackberry. “Here’s my step by step “How to get Yahoo stock alerts with OnPage”: OnPage works great! I just got a Real-Time stock price alert with OnPage + Yahoo. Once in the Yahoo Stock Portfolio, there is a tab called “Set Alerts” just above […]
Thu, 21 Apr 2016 11:03:16 EDTEverything you need to know about Java EE and its current status
Wed, 02 Mar 2016 00:45:00 ESTAll eyes appeared to be on the Consumer Electronics Show (CES) 2016 in Las Vegas since last week, as more than 3,600 companies unveiled the IoT and IIoT innovations we can all expect to see in the coming year. This year's CES showcased plans to make the car a complete mobile office-with technology in place to allow Skype calls and the use of Microsoft 365 from the car. The other hot theme at CES was drones - not a surprise since these unmanned crafts have pulled us in like a tracker-beam to the mother ship. The autonomous ‘copter drone was one of the most impressive releases with the reality that the businessman of tomorrow doesn't need a private jet, just a ‘copter drone and a smart phone.
Fri, 30 Oct 2015 14:00:00 EDTMost of the IoT Gateway scenarios involve collecting data from machines/processing and pushing data upstream to cloud for further analytics. The gateway hardware varies from Raspberry Pi to Industrial PCs. The document states the process of allowing deploying polyglot data pipelining software with the clear notion of supporting immutability. In his session at @ThingsExpo, Shashank Jain, a development architect for SAP Labs, will discuss the objective, which is to automate the IoT deployment process from development to production scenarios using Docker containers.
Thu, 15 Oct 2015 12:11:03 EDTF5 and SimpliVity partner to improve manageability, strengthen security, and ensure faster and more successful deployments. Joint customers benefit from the integration and interoperability that result from this close collaboration. https://www.simplivity.com/ ps Related: VMworld2015 – The Preview Video VMworld2015 – Find F5 VMworld2015 – Realize the Virtual Possibilities (feat. de la Motte) VMworld2015 – Business […](image)
Wed, 14 Oct 2015 13:03:49 EDTI attend a lot of technology trade shows throughout the year and still remember going to my first technology event for F5 back in 2004. Small, almost high school science fair type booths handing out glossy flyers of the latest product along with our famous squeeze balls. And for the years that followed, the events, […](image)
Fri, 09 Oct 2015 16:19:00 EDTBizSlate is a cloud-based, supply chain software solution that enables small- and mid-sized manufacturing and distribution businesses to compete more effectively, reduce operational costs, and gain greater visibility into their supply chains. Unlike most ERP and order management software that is accounting-focused, BizSlate’s solution is designed from the supply chain process inward. The result is a revolutionary approach that provides proprietary capabilities to solve real-world supply chain challenges.