ADS BY GOOGLE
From the Blogosphere

When applications crash due to a code quality issues, the common question is, "How could those experts have missed that?" The problem is, most people imagine software development as a room full of developers, keyboards clacking away with green, Matrix-esque code filling up the screen a...
Windows Azure is currently offering an exclusive promotion. You can get $200 in free credits just for test driving the innovative public cloud service designed by Microsoft. What's the catch? When you sign up, Microsoft asks that you provide your credit card and a phone number so that ...
There are people who take life slowly, accept it on its terms, meditate, read about meditation, and internalize books like "Wherever You Go, There You Are," a bestseller by a guy with a hyphenated name. I'm more of a Malcolm Gladwell fan -- Outliers or his newest book “David and Goliat...
One of the most often questions/feedback we get regarding Windows 8.1 is where is my start menu. These conversations can get very passionate, and usually turn into a commentary around on how much we miss our start menu. I am sure some folks want to punch the screen. I totally unders...
Disaster recovery is about being able to get your business back up and running as quick as you can after the disaster happens. Throughout this series, my teammates have focused on the Infrastructure side of the house, servers, virtual machines, etc. You can see the full series here: D...
One of the questions I have been asked for a while is how do you set static IP address in Windows Azure Virtual Machines. Well you can! While it is like a DHCP reservation for the VM itself (the VM is still DHCP configured), it is treated as a static IP to Windows Azure. Now this doe...
In the ongoing debate over net neutrality, brought to the forefront this past week by the Netflix, Comcast, Verizon deal, there is now increasing dialogue about what could happen if some form of real blocking and favoring starts to happen. For some this is the nightmare scenario: only ...
In part one of this three-part series I summed up how the way we produce and consume data has evolved over the last three decades, creating a need for new storage methodologies that can help enterprises store and effectively manage massive pools of data. I concluded that the immutable ...
As promised in our earlier post, here are the final predictions we saw making the rounds in the blogosphere at the start of the year. Many are predicting that Microsoft will get more serious about the cloud. Amazon dominated the cloud news in 2013, but 2014 will be a good year for Mic...
There is no such thing as an information recession however there the realities of economic challenges in IT data centers also known as information factories. Likewise, people and data are living longer with increased dependency on information being available and reliable when needed. ...
The biggest difference between high-performance teams and more average teams is that the high-performance group actually acts like a team. That statement is so obvious, I am going to let it stand on its own. If you look at most groups, they tend to act less like teams and more like...
Rather than talking about what others should do or consider for their data protection needs, for this post I wrote down some notes using my Livescribe about what I need and want for my environment. As part of walking the talk in future posts I'm going to expand a bit more on what I'm d...
I had the distinct privilege of walking along several different Roman roads this week. These roads have survived thousands of years worth of history and travel. They were built using a standard design, engineering and construction methodology that was extraordinarily durable. The pa...
The phrase "Mind the Gap" was first introduced in 1969 in London as a warning for passengers to watch for the gap between the train door and the station platform. The need to warn passengers is and was the result of some stations being located on curves and at varying heights relative...
The growing rate of hybrid cloud adoption requires particular models of cloud security. Many enterprises are moving some of their workload to a public cloud environment while retaining other workloads in the private cloud. Transitional cloud security strategies are needed that continue...
As we embrace 2014, it’s important to focus on emerging trends to predict any industry changes this year and in the coming years. Mike Bushong reviewed 2013 on the Plexxi blog and noted important events that will likely carry into this year, including how 2013 initiated SDN deployments...
That attackers are moving "up the stack", toward the application layer, should be no surprise. Increasingly, network layer attacks are a distraction; a means to engage security professionals attention while the real target - an application - is attacked. Even when this is not the case,...
From a news perspective, a year is defined by the stories that make headlines. But markets are frequently moved more by subtext than overt story. Its sometimes the less sexy and more subtle happenings at the fringe of media interest that determine how industries will evolve and ultimat...
With a growing number of software developers and computer applications, computers systems are revised and renewed every day. Computer systems can become so large that they will need the expertise of a computerized Service Desk, which will help integrate a growing organization to get ma...
In this step-by-step guide you will learn how to create Development Virtual Machines for Vagrant with Packer. Sharing a common development environment with everyone on your team is important. It is really hard though to keep the same dependencies, database versions and other systems i...
Continuous Deployment makes software development and your deployment environment safe so anyone can commit code. Read about these and other advantages in this article. I've been wondering for a few years now, why it's so hard to get companies to prioritize the work that I feel is imp...
Microsoft launched the Cloud OS Network today. Cloud Operating System - CloudOS - has a network of more than 25 cloud service providers (CSVs) who will deliver hosted services built on Microsoft Cloud Platform consisting of: Windows Servers with Hyper-V System Center Windows Azure ...
The New Year is fast approaching and it’s time for some wild, speculative predictions on API Management for 2014. As I mentioned in earlier posts, the space is has been rapidly maturing over the second half of 2013 with larger vendors such as IBM, Tibco and Intel making big moves. In ...
A new EMC global survey indicates a majority of enterprise technology leaders see big data as having the potential to boost business operations. The sentiment is highest in India, with 92 percent of respondents there believing the technology will improve decision-making, EMC said Thur...
Many people have turned to virtualization for, among other reasons, the increased ease of disaster recovery. Because virtual machines are no more than files on a disk connected to standardized hypervisor hardware, those virtual machines can be shared, copied, moved, and recovered almos...
A few weeks ago, I came across one of those LinkedIn stories that pop up in everyone’s feed. Basically, it was an advice column dedicated to answering a question from someone who asked if he should leave a company that made stupid decisions despite him telling everyone what the right a...
In a perfect world, APM has all the right elements in place, providing value to the business and IT by giving us the metrics we need and showing us the health of our applications. It alerts us to anomalies when slowdowns occur, and shows us trends on performance. But there are other el...
The simplicity of the term "proxy" belies the complex topological options available. Understanding the different deployment options will enable your proxy deployment to fit your environment and, more importantly, your applications. It seems so simple in theory. A proxy is a well-under...
When asked about the actual cost of an hour or minute of downtime, frequently the response is “it depends.” In some ways, we agree, it can be tricky to pin the cost of downtime to one static number when the variables change so dramatically from incident to incident. This first articl...
In the past, the data structure and business logics were so simple that one SQL statement was enough to achieve user's computational goal. With the rapid growing of information industry, users frequently find that they need to achieve the increasingly complex computational goals to out...
Believe it or not, a fair number of people like my workshops on mobile strategy. The problem though is a fair number don't. Why? Sometimes developers come into my sessions, stay for 15 minutes and then leave. They were expecting to learn how to develop mobile apps, or how to secure...
On July 14, 2015 Windows Server (WS) 2003 will reach the end of extended support. This means no more patches or security fixes without a custom support agreement in place. The security and uptime implications of your applications are about to be refactored in a dramatic way. Many compl...
2013 was a breakthrough year for cloud storage. A recent survey showed that 60 percent of businesses decided to store their data in the cloud, and the benefits they've begun to realize range from cost and time savings to maintenance-free storage infrastructure. But the year also bro...
One of the "rules" of application delivery (and infrastructure in general) has been that when scaling out such technologies, all components must be equal. That started with basic redundancy (deploying two of everything to avoid a single point of failure in the data path) and has remain...
Software-Defined Networking (SDN), sometimes referred to as Network Virtualization, expands the level of datacenter abstraction provided by a hypervisor to include not just discrete VM workloads, but entire networks that are virtualized atop an existing physical network infrastructure ...
The digital age has forced a kind of dependency never before seen, a dependency on our inbox. The mere thought of losing these emails is inconceivable where the thought of it leaves us with a sense of panic, one similar to losing our credit cards or house key. Unfortunately, the potent...
This month, Yung Chou, Mitch Tulloch and I have published a new book on Hybrid Cloud Management with System Center 2012 R2 App Controller, titled Microsoft System Center: Cloud Management with App Controller. As part of a series of specialized guides on System Center, this book focuses...
A dangerous environment, an unknown frontier, a lack of resources, the pursuit of something greater than themselves—yes, software development teams face some great challenges while aspiring to achieve prodigious goals that (they hope) will benefit the organization for years to come. No...
The standard software quality activities defined by IEEE, such as verification and validation, are integrated into the software development cycle. We see dedicated SQA roles and resources in major organizations. Also, many multi-national companies are pushing to have a central team dri...
Many new programmers struggle when it comes to selecting their first language to learn. Which is easiest, the most professionally useful, the most newbie-friendly? Lets find out by showing you a range of options, their strengths and weaknesses, and some information about the most com...


ADS BY GOOGLE