The Wayback Machine - https://web.archive.org/web/20121012094910/http://cloudcomputing.sys-con.com/category/1824

Welcome!


Monitoring & Testing

The server monitoring process is a constant control after a server’s operation in order to detect all the failures in time, and to create charts of the servers’ loading level to configure the optimal device’s working scheme. If a datacenter supports cloud computing, server monitoring ...
The move to cloud-based applications has undeniably delivered tremendous benefits. However, the associated distribution creates various challenges from the quality perspective: End-to-end tests need to pass through multiple dependent systems, which are commonly unavailable, evolving,...
There’s a house on my block that is constantly under renovation. Last year, the owners added on an in-law suite. This spring, they expanded their kitchen. A neighbor told me there are in plans in the works to extend the deck before fall. All of this has me wondering are these folks rea...
Managing software application performance is complex and increasingly challenging. Surprisingly, even today, massive IT resources remain chained to ensuring applications and infrastructures are up and running smoothly, rather than proactively leveraging strategic technologies to solve ...
IT costs were always a worry, but only an occasional one. Cloud computing has changed that. Here's how it used to be. The New System was proposed. Costs were estimated, more or less accurately, for computing resources, staff increases, maintenance contracts, consultants and outsourcin...
Where do I start? What am I doing? (Why am I even here?) Have you ever asked yourself these questions at the beginning of a performance testing project? Have you been one of the many test engineers who have been delivered an application and told to "just test it"? (True story: I was on...
Velocity 2012 Last week I was honored to be invited to the infamous Velocity 2012 conference in Santa Clara California, hosted by O’Reilly. Monitis was one of the silver sponsors. It was a great opportunity for me to meet the wonderful team I’ve been working with for the la...
The Facebook IPO was arguably the most iconic public offering of the past 5 years. NASDAQ claimed to have tested their systems before the social giant went public, but that didn't stop the platform from faltering in the opening hours of Facebook's IPO. Had NASDAQ tested the structural ...
An Open Group panel explores how the technical and legal support of ID management best practices have been advancing rapidly. ID management is really the process of identifying folks who are logging onto computing services, assessing their identity, looking at authenticating them, and...
I’ve received a lot of questions lately about security in the Cloud and what CTOs should be considering when they are evaluating it. Here’s my advice, treat the Cloud like an extension of your corporate or production network, don’t treat it or hold it to a lower standard assuming that ...
If you haven’t already, many IT organizations are migrating some of their applications to the cloud to become more agile, alleviate operational complexity and spend less time managing infrastructure and servers. The next question you may ask yourself is, “How will we monitor these appl...
While the cloud offers many benefits, it’s more like a black box when it comes to deploying software. If you are running your application in the cloud, there is less visibility than you might have in your own data center. That puts software quality at risk. How do you manage a black b...
The networking industry has gone through different waves over last 30+ years. In the ’80s, the first wave was all about connecting and sharing; how to connect a computer to other peripheral devices and other computers. There were many players who developed technology and services to ad...
Sharing files with friends has never been easier. Whether it is via old-school hard copy methods like CDs, DVDs and USB drives, nefarious peer-to-peer torrents like BitTorrent or new shared, private cloud storage services like Dropbox, getting a photo or music file from one person to a...
In a previous article we introduced the JBoss JMX monitoring capabilities and the Monitis JMX agent. Since most JEE web applications store data in relational databases accessed through JDBC, and the database is the most frequently cited source of performance bottlenecks,  let’s t...
Only ten weeks to go! Time for an alphabetical summary of the many leading-edge themes & topics to be discussed at Cloud Expo 2012 New York (10th Cloud Expo) - being held June 11-14, 2012, at the Javits Convention Center in New York City and co-located with Big Data Expo 2012 New York ...
In Part 1 I described how the cloud is revolutionizing load testing and the advantages it provides to ensure that your web applications perform well in production. We also looked at what capabilities you should seek out when selecting a load testing solution. In Part 2, I will offer t...
Many companies have moved applications to the cloud as a way to reduce capital expenditure while improving IT focus and effectiveness. End users see the cloud as a way to access their documents and applications remotely from anywhere and from any device. IT managers see the cloud as a ...
Whether or not you are a fan of U.S. football – it was really hard to avoid this huge sports event on February 5. In addition to the actual game, it’s the Super Bowl commercials that – besides being very expensive to air – usually drive a lot of load on the websites of the companies th...
Two articles that I read recently, by Jakob Nielsen and by John Brinkman, got me thinking that it was probably time to revisit the very topical subject of form design. In the world of SAP, it comes as no surprise that people want to retain the rich functionality of the ERP system but g...
Nearly every enterprise can benefit from deduplication. Business data has been growing exponentially. Routine backups of that data have become too costly or simply ineffective. Deduplication can help by reducing the cost of primary and secondary storage. Essentially, limited resources ...
Cloud computing provides organizations with an alternative way of obtaining IT services and offers many benefits including increased flexibility and cost reduction. However, many organizations are reluctant to adopt the cloud because of concerns over information security and a loss of ...
Oracle RMAN catalog database is a central repository for all backup and restore metadata for Oracle databases. RMAN catalog database should not grow too big in order to deliver good performance. BMC Patrol and other monitoring tools require database, often Oracle, to store monitoring r...
A few months ago, we teamed with Infoblox for a DNSSEC webinar. Jonathan George, F5 Product Marketing Manager, leads with myself and Cricket Liu of Infoblox as background noise. He’s a blast as always and certainly knows his DNS. So, learn how F5 enables you to deploy DNSSEC quickly...
The WatchMouse reminds me of Monty Python's Killer Rabbit, but it's no joke to CA Technologies, which just acquired the privately-held Dutch company. The company delivers cloud monitoring as a service; its SaaS solution uses a "globally distributed infrastructure of more than 60 mon...
Arecord is a service developed by CSS Corp Labs to address a specific issue called Zone Apex on the Cloud & Traditional Computing platforms. For an example, when you host your website in AWS S3, CloudFront or Elastic Load Balancers (ELB), all you have is a URL generated, to use it as a...
In a prior post I addressed some of the questions that I have been receiving and have been selecting some of those questions as the basis for a few posts. Today’s question is simple enough though the answer may be lengthier than expected. For blogging itself I use WordPress as my main...
Delegates, speakers, sponsors and exhibitors will be traveling from all over the world to New York this coming June 6-9 to attend 8th International Cloud Expo in New York City, co-located at the Jacob Javits Convention Center with 11th Virtualization Conference & Expo. Here is an ea...
Cloud computing is a platform for innovation in delivering infrastructure and software services in a pay per use model. Organizations migrating to cloud platforms have to plan changes to application as well as application interfaces for on-premise integration. These areas require addit...
Cloud Adoption will increase further if more third party vendors support the core capabilities like dynamic scaling and elasticity, so that enterprises do not concentrate on monitoring cloud services, rather utilizing them. This article analyzes one such third party product. My la...
When it comes to protecting unstructured data, such as spreadsheets, documents, images and other data on file servers, most organizations acknowledge that their existing processes and risk profiles are less than ideal. Unfortunately, IT personnel – rather than data owners – are typical...
The Internet is going through a major transformation, shifting from the “Internet as application” to the “Internet as data provisioning system,” and from fixed to mobile platforms like smart phones and tablets. It’s nothing short of a revolution. Traditional forms of web analytics and ...
Like other applications Cloud deployed applications require extensive testing. However the concept of Cloud brings in itself some additional non functional tests which may not be in for a 'On Premise' application. This article details them. Detailed explanation of the above test type...
Digital Forensics is not an elephant, it is a process and not just one process, but a group of tasks and processes in investigation. Examiners now perform targeted examinations using forensic tools and databases of known files, selecting specific files and data types for review while i...
The concept of Several public and / or private clouds working together is a technical reality, however the competitive and market pressures may prevent large organizations on collborating on all fronts, there are some things like helping a Victim in a Crash are social responsibility it...
Enterprises must take appropriate steps to integrate governance, risk management and compliance as part of their modus operandi. A main source of contention within IT governance, is the use of multiple vendors for IT resources, where the objectives of vendors may not necessarily align ...
Malicious software or malware is a security nightmare. One can agree with a statement that malware in the internet is a growing epidemic and is costing industry billions of dollars each year. According to Microsoft malware “is short for malicious software and is typically used as a...
Load Testing has traditionally been done In-House with load-testing tools using machines in your test center to generate HTTP traffic against the application needing to be tested for high volume transactions. With agile development practices, shorter release cycles and higher number of...
The Internet is quietly being replumbed. That shouldn’t surprise anyone involved with it; the Internet is always being replumbed. But you might be more surprised to learn that the next few years will bring an unusual burst of changes in that plumbing, some with great potential conseque...
New cloud technology is here. Microsoft is ‘all in’, Google always has been and IBM is plowed into cloud services through LotusLive. Independents like Cobweb and Rackspace (who provide 1.7 million business users with cloud email and storage have been making large amounts out of this fo...