ADS BY GOOGLE
From the Blogosphere

A lot of time, resources and energy has been invested over the past few years on de-siloing development and operations. And with good reason. DevOps is enabling organizations to more aggressively increase their digital agility, while at the same time reducing digital costs and risks. B...
A cybersecurity transformation discussion on how cloud security is rapidly advancing, and how enterprises can begin to prevail over digital disruption by increasingly using cloud-defined security. We'll examine how a secure content collaboration services provider removes the notion of...
As I started writing this blog, I happened to be watching an episode from the new season of Black Mirror on Netflix. Black Mirror is a Sci-Fi anthology series, ala the Twilight Zone, although with a much darker perspective on both humanity and technology. I found the episode, ‘Most Hat...
As cloud security is rapidly advancing, enterprises can begin to prevail over digital disruption by increasingly using cloud-defined security. The next BriefingsDirect cybersecurity innovation and transformation panel discussion explores how cloud security is rapidly advancing, and ho...
The entire intent of load balancing is to create a system that virtualizes the “service” from the physical servers that actually run that service. A more basic definition is to balance the load across a bunch of physical servers and make those servers look like one great big server to ...
As the Big Data marketplace moves closer to a point of mass-maturity, business leaders have begun to take new approaches to implementation and utilization. Advanced analytics solutions have made their way into a range of industries and regions, and companies that successfully align the...
Opining about the future of AI at the recent Brilliant Minds event at Symposium Stockholm, Google Executive Chairman Eric Schmidt rejected warnings from Elon Musk and Stephen Hawking about the dangers of AI, saying, “In the case of Stephen Hawking, although a brilliant man, he’s not a ...
I just had to write an Olympic-themed headline, since today is the first day of the 2016 Summer Games! I love the Olympics. It's so much fun watching athletes do what they're best at. Plus, they have the extra challenge this year of swimming or boating in polluted, mucky water-so it's ...
Fred Wilson of Union Square Ventures has been talking a lot about the blockchain recently, so I decided to learn more about it. I read the Marketing the Blockchain e-book, watched The Grand Vision of a Crypto-Tech Economy video and the video keynote of Overstock CEO Patrick Byrne at th...
The healthcare industry is not immune from today’s relentless wave of cyberattacks. Cyber theft of protected health information (PHI) is on the rise, and health organizations understand that 100 percent prevention of attacks is not realistic. According to Ponemon Institute’s Sixth Ann...
The best problem solver avoids being reactive. Instead, the goal is to remain proactive and ahead of a potential problem. This is where preventative maintenance software plays a substantial role. The primary benefit is being able to nip a problem in the bud as the saying goes. Instead ...
The “willing suspension of disbelief” is the idea that the audience (readers, viewers, content consumers) is willing to suspend judgment about the implausibility of the narrative for the quality of the audience’s own enjoyment. We do it all the time. Two-dimensional video on our screen...
Your car. My toaster. Our lights. The neighbor’s thermostat. With an average of 7.8 connected devices per home, according to recent surveys, there are twice as many “things” in the house as the average 3.14 people per household in the US in 2015. And all of them are “talking.” Not al...
With emerging ideas, innovation, and talents, the lines between DevOps, release engineering, and even security are rapidly blurring. I invite you to sit down for a moment with Principle Consultant, J. Paul Reed, and listen to his take on what the intersection between these once individ...
The time of year when crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Rather than thinking up my own, I figured I’d regurgitate what many others are expecting to happen. 8 Predictions About How the Security Industry Will Fare in 2017 –...
Does a Content Delivery Network (CDN) protect against Distributed Denial of Service (DDoS) attacks? It’s a good question. A CDN by its very nature will absorb DDoS attacks for the content that it serves and this could be considered protection but, as is often the case, this is only the...
For a long time, Bill Gates and in fact the entire leadership team at Microsoft were vehemently against the open source community. Steve Ballmer had once called Linux “a malignant cancer” in reference to Linux allegedly violating nearly 235 patents that Microsoft owned. Even post-retir...
We continue with the second part of our two-part series. If you missed the first part, we are discussing what security professionals can learn from the hit series, "Mr. Robot." The series explores the world of organized hacking as well as the security measures being used to stop the ha...
2016 brought about more cyberattacks than we thought possible, especially involving ransomware, and we definitely won't see that trend breaking stride in 2017. By next year, we expect every single adult in the US will know a blood relative that has had their identity stolen - the Inter...
Enabling patient-doctor trust goes a long way in a provider’s ability to provide care. Trust is also critical for enabling network connections that are safe, to help secure health networks. The healthcare industry is scrambling to shore up defenses as cyberattacks and breaches increas...
It is not often that movies and television shows give viewers the opportunity to explore the world of hacking and digital security in a realistic manner. After two seasons, "Mr. Robot" has attracted its share of IT professionals as well as average citizens. The show has offered numerou...
Pokeman Go has been a raging success. But its launch was marred by frequent downtimes and dropped connections. In a recent chat at the Google Cloud Platform Next Conference, Niantic CTO Phil Keslin talked about the “hair on fire” experience where the team had to firefight and upgrade k...
Are you still pondering whether to integrate cloud computing services into the structure of your IT network? You are not the only one. Most IT professionals are very concerned about data security, so they aren’t that willing to switch to cloud computing solutions that easily. It’s a fa...
It seems like every day we see reminders of the importance of thorough security testing from all areas of the software world. Security has become an especially critical consideration for APIs in recent years. Organizations rely on APIs to share and receive information - either from a t...
Cloud computing has taken over the business world! With almost maniacal focus, single proprietors and Board Directors of the world's largest conglomerates see this new model as a "must do". This rapid shift is, in fact, accelerating. As Jeff Bertolucci observes in "The Shift to Cloud S...
Home-maintenance repair and services provider ServiceMaster develops applications with a security-minded focus as a DevOps benefit. To learn how security technology leads to posture maturity and DevOps business benefits, we're joined by Jennifer Cole, Chief Information Security Office...
A recent report by Praetorian, a cybersecurity company headquartered in Austin, TX, focused on threats that resulted in data compromise or access to sensitive information. Based on a review of 100 separate internal penetration test engagements the study identified the five most prevale...
While on a call with a customer last week, I was faced with the question of why the customer’s site had slowed down, even after they had switched to full SSL. Well, to be honest, it’s pretty obvious; SSL is more expensive from a web performance perspective. However, it wasn’t until I ...
The seemingly miraculous hand-held devices we use today are a far cry from the computers of old. Capabilities, speed, affordability and storage have increased dramatically, transforming every aspect of our lives. As a point of reference, the first data centers were rooms that housed hu...
Seeing how a chorus of business leaders and tech innovators has sung praises to the cloud for quite some time, you're probably aware of the fact that the cloud adaptation is simply flourishing. According to research from cloud solutions provider RightScale, roughly 93% of business toda...
The rise of the cloud has put Messaging and Collaboration in the dark when it comes to measuring the service delivered to end-users. Since they don’t have any view of what is happening at the server level, the only way for them to know what is going on is to be able to replicate the en...
Cloud Service Brokerage is changing from an industry footnote toward becoming a major system integration play. This role has now become a crucial component of a cloud computing transition because they help organizations aggregate multiple cloud services, integrate services with in-hous...
Distributed Denial-of-Service (DDoS) attacks have become the primary threat to the availability of networks and online services and the peak attack sizes have grown by a factor of more than 50 over the last 10 years. Today, botnets and easy-to-use tools for launching DDoS attacks have ...
In case you haven’t heard, the new hotness in app architectures is serverless. Mainly restricted to cloud environments (Amazon Lambda, Google Cloud Functions, Microsoft Azure Functions) the general concept is that you don’t have to worry about anything but the small snippets of code (f...
It was a Monday. I was reading the Internet. Okay, I was skimming feeds. Anyway, I happened across a title that intrigued me, “Stateful Apps and Containers: Squaring the Circle.” It had all the right buzzwords (containers) and mentioned state, a topic near and dear to this application ...


ADS BY GOOGLE