The Wayback Machine - https://web.archive.org/web/20121105230534/http://apache.sys-con.com/category/766

Welcome!


From the Blogosphere

When you’re a kid at the beach, you spend a lot of time and effort building a sand castle. It’s cool, a lot of fun, and doomed to destruction. When high tide, or random kids, or hot sun come along, the castle is going to fall apart. It doesn’t matter, kids build them every year by the ...
Interested in building Windows 8 applications and monetizing them in the Windows Store? Familiarize yourself with the driving philosophies behind the new paradigm, and find out what technical skills you can hone to best prepare you for success. Did you spend the weekend getting to...
This is an industry trends and perspective piece about big data and little data, industry adoption and customer deployment. If you are in any way associated with information technology (IT), business, scientific, media and entertainment computing or related areas, you may have heard b...
Big Data takes center stage today at the Strata Conference & Hadoop World in New York, the world’s largest gathering of the Apache Hadoop™ community. A key conversation topic will be how organizations can improve data security for Hadoop and the applications that run on the platform. A...
As mentioned in Part I of this series, cloud technology has introduced a viable alternative to the practice of creating secondary sites for disaster recovery (DR), promising to save IT organizations hundreds of thousands or even millions of dollars in infrastructure and maintenance. Wh...
In the second annual Cisco Global Cloud Index (2011-2016), Cisco forecasts global data center traffic to grow fourfold and reach a total of 6.6 zettabytes annually by 2016. The company also predicts global cloud traffic, the fastest-growing component of data center traffic, to grow six...
It’s interesting as a parent watching your kids grow up and learn how to do things for themselves. I have 2 boys ages 6 and 7 and they often amaze me and confound me. There are times when I think they are absolutely brilliant and other times where I think that significant amounts of re...
It's likely that IT network and security staff would agree that HTML5 WebSockets has the potential for high levels of disruptions (and arguments) across the data center. Developers want to leverage the ability to define their own protocols while reaping the benefits of the HTTP-as-appl...
Today’s data center infrastructure has to be more agile than ever before. It needs to increase efficiency while increasing agility, and providing more and more services. Having an agile infrastructure lets you change how IT operates. It lets you adapt to growth – even unexpected growt...
A new report from analyst firm Gartner forecasts that IT organizations will spend $232 billion (US) on hardware, software and services related to Big Data through 2016. Some key findings from the report: $5.5 billion in new software sales will be driven directly by demands for new big ...
According to Netcraft, who tracks these kinds of things, SSL usage has doubled from 2008 and 2011. That's a good thing, as it indicates an upswing in adherence to security best practices that say "SSL Everywhere" just makes good sense. The downside is overhead, which despite improveme...
Nearly everyone has played musical chairs – as a child if not as an adult with a child. When that music stops there's a desperate scrambling to pair up with a chair lest you end up sitting on the sidelines watching the game while others continue to play until finally, one stands alone....
One of the biggest concerns IT managers have about moving business-critical applications into the cloud and away from the data center is the issue of security. What you may not realize, however, is that the same tools for automation and provisioning that function in cloud implementatio...
Sitting in traffic the other day reminded me of a stock trading company that gets millions of system alerts a day. Millions!!! Do they all need attention? Only some? How can you know without viewing them all? There is no way to personally handle such an enormous amount of alerts. ...
Attacks against users are not static, they are very dynamic, and our security awareness training should evolve as the threat changes. The user can be treated as a line of defense against spearphising attacks if they are properly armed with the information to potentially recognize an at...
Disaster recovery scenarios, simple site-to-site replication, or the Prod-to-Dev refresh scenario are generally what drive IT administrators to look into virtual machine replication. We want to build our environments so that in the event something happens in our primary data center, o...
True network and virtual machine portability - that's the ultimate goal of Hyper-V Network Virtualization - allowing you, as an IT Pro, to align changing business needs with the best physical resource locations to run your VMs and network services - easily, without the sweeping network...
There is truly a difference in terms of scope, application and business need between security "in" the cloud and security "from" the cloud. No, this isn't 7th grade English...I promise. With all the important decisions IT departments make, what’s the big deal whether cloud security m...
Data is quickly becoming one of those certainties in life, like death and taxes. It'll always be there, and like the Once-ler's Thneed factory from The Lorax (sorry, I have kids), data figures to keep on biggering, and biggering, and biggering and biggering. More data means more knowl...
What are the best practices for deploying managed cloud services? Case studies have now confirmed that cloud services can be a better, faster, less expensive and less risky way to source Information and Communications Technology (ICT) solutions, according to the latest market study by ...
Emergence is good, but… …it takes time, and …under some circumstances it may not happen! If you have been there … done that … then you don’t have to wait for your application architecture to emerge over several iterations. You can use your past experience to nail it down at the begi...
You may think that the worldwide economic downturn has negatively impacted most CIO's budgets, but so far that hasn't been the case. According to the latest market study by IDC, worldwide IT spending remains on course to grow by 6 percent this year in constant currency, that's only sli...
Recently, I’ve been working closely with a number of large enterprise clients who have already gone or will soon go live with Layer 7 solutions at the core of mission-critical infrastructure. I’ve observed that, in the API Management space, proof of concept and initial projects often f...
Does analysis lead to synthesis? How do you solve a complex problem? Break the complex problem into sub-task till each task is clearly understood and doable. Assign responsibility and monitor each task till they are complete. Once all tasks are completed the problem is solved! Wel...
My how time flies, seems like just yesterday (back in 2008) that I did a piece titled Politics and Storage, or, storage in an election year V2.008 and if you are not aware, it is 2012 and thus an election year in the U.S. as well as in many other parts of the world. Being an election y...
Previously I’ve discussed how solid-state arrays need to be optimised in their design to get the best out of the technology. Traditional arrays were designed to cope with the hard drive as the slowest component in the architecture. IP was built around squeezing the best performance o...
OASIS, the XML open standards body, is quickly establishing a very powerful leadership role in the Cloud standards arena as well. This includes standards like TOSCA, for Cloud orchestration and therefore a foundation for Cloud Service Brokering, KMIP for unifying enterprise encryption...
One of the phrases you hear associated with cloud computing is "architecting for failure." Rather than build in a lot of hardware-level redundancy – power, disk, network, etc… – the idea is that you expect it to fail and can simply replace the application (which is what you care about ...
In the past, we ran small data on expensive big boxes, and it worked fine. For example, most database applications were sized in gigabytes or a few terabytes. Today, we’re moving to a world of Big Data measured in petabytes, running on lots of inexpensive small boxes. Data volumes are ...
Most of us are hybrids. I’m Hawaiian and Portuguese with a bit of English and old time Shogun. The mix is me. I bet you probably have some mix from your parents which makes you a hybrid. The U.S. has been called the melting pot due to all the different ethnicities that live here. ...
The average price of a notebook in the U.S. is about $631. The cost of a notebook that contains unencrypted patient information is far greater. Earlier this week, the Department of Health and Human Services' Office for Civil Rights levied a hefty $1.5 million fine against the Massachu...
1972: Most commonly used languages (Cobol, Fortran, Algol, PL/1, Basic, APL) all had complicated syntax. The prevailing thought process was to add new language syntax for every new feature. Writing a compiler for such languages was a nightmare. Then came “C”. The syntax was simple and...
One of the key focus areas of our Private Cloud 2.0 series is that the 2.0 part represents the ‘outside world’, even though it is focused on a Private Cloud scenario. This is simply because it is inevitable and one of the valuable features of the Private Cloud approach R...
You dear readers are some of the most informed technologists on the planent. I think few things surprise you about Big Data. But many of us studying this concept are in a continual search for ways to explain key issues to non technologists, and that can be hard to do at times. Master...
Like most application servers, WebSphere 8.5 has a rich management infrastructure based on JMX, or Java Management Extensions. In fact, the WebSphere administration console uses JMX to connect to the server to issue queries and perform administrative operations. In a previous post I sh...

#cloud The conventional view of cloud brokers misses the need to enforce policies and ensure compliance

Sep. 15, 2012 11:00 AM EDT  Reads: 2,096

WebRenderer is one of those SDKs that can appear overwhelming on first look. For this reason we always shipped a “bare bones” Test Browser (TestBrowser.java) with the product. The Test Browser has at times baffled people due to it’s lack of features. The Test Browser was “featureless” ...
One of the twelve principles supporting agile manifesto is: Build projects around motivated individuals. Give them the environment and support they need, and trust them to get the job done. But, in a real life organization setup just trusting the team to get the job done may not be ...
In Test-Driven Development (TDD) developer writes an (initially failing) automated test case that defines a desired improvement or new function, then produces the minimum amount of code to pass that test and finally refactors the new code to acceptable standards. ETVX stands for Entry...
Say hello to Bashes — the first cloud-apps that enable companies to turn Big Data into new sources of revenue I don’t want to sound overly dramatic, but today’s the day GoodData makes it possible for companies to finally monetize Big Data. That’s because today we unveil our first Bash...


About Apache Developer's Journal
apache.SYS-CON.com covers the Apache Software Foundation community of open source software projects, including Ant, Harmony, Jakarta, Maven, and Tomcat.

ADD THIS FEED TO YOUR ONLINE NEWS READER Add to Google My Yahoo! My MSN