Delivering Security ‘as a Service’Fri, 13 Dec 2013 12:00:00 EST SecuritySolutionsWatch.com: Thank you for joining us today, Bryan. If you wouldn’t mind, please tell us a little bit about your background and your role at HP.
Bryan Coapstick: As the Director of Mobile Innovation, I am responsible for ensuring that HP’s mobility initiatives successfully help enterprises improve communications and interactions with customers, employees, constituents and partners to ensure they have the data they need, when they need it, and in a format that is easy to interact with and consume. Additionally, I serve as the industry chair for the Advanced Mobility Working group for the American Council for Technology/Industry Advisory Council (ACT/IAC), whose mission is to “foster collaboration and communication on issues regarding mobile computing in the Federal Government, including citizen services, remote connectivity, employee services, workforce productivity, digital publishing, and enterprise mobility.”
Prior to joining HP, I spent nearly two decades in both the public and private sectors, focused on emerging technologies and the critical intersections between business strategy and technology. I’ve worked with several Fortune 200 companies to increase their market presence and effectively leverage their mobile and digital channels. Additionally, I have built interactive teams, worked to guide digital mobile strategies, and led an Innovation Lab focused on accelerating digital interaction models, the convergence of big data analytics with context aware applications, and emerging mobile payments and transaction capabilities.
Log Management 101: Where Do Logs Come From?Fri, 13 Dec 2013 12:00:00 EST We’ve had a lot of people asking for the Log Management Primer for a while now. And, surprisingly, many of these folks have a strong technical background, including developers. Some want it for themselves, and some want it to pass on to a colleague, manager, etc. I’m going to explain what logs are, where they come from and how you can get your logs.
If you’re a developer, this post probably isn’t for you as we don’t dig into the code level nitty gritty, but it will give you a high level overview of logs, where they come from and how they get sent to a third party service.
Cloud Shifts the Burden of Security to DevelopmentFri, 13 Dec 2013 11:45:00 EST Explores three ways to help development teams bear the burden of security: use pen test results to harden the application, leverage service virtualization for security scenarios, & adopt policy-driven development to help engineers understand and satisfy management’s security expectations.
The move to the cloud brings a number of new security challenges, but the application remains your last line of defense. Engineers are extremely well poised to perform tasks critical for securing the application-provided that certain key obstacles are overcome.
BigData-Startups Named “Association Sponsor” of Cloud Expo & Big Data ExpoFri, 13 Dec 2013 11:00:00 EST SYS-CON Events announced today that the BigData-Startups, the online Big Data knowledge platform, has been named “Association Sponsor” of SYS-CON's 14th International Cloud Expo® and 5th International Big Data Expo,, which will take place on June 10–12, 2014, at the Javits Center in New York City, New York, and the 15th International Cloud Expo® and 6th International Big Data Expo, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON.tv Interview: Services in the CloudFri, 13 Dec 2013 10:00:00 EST "At InMage we are enabling the hybrid cloud. Cloud presents a lot of opportunities but there is no vehicle to take services into the hybrid cloud," noted Murali Nambiar, Sr. Product Manager for Backup and DR Products at InMage, in this SYS-CON.tv interview at the 13th International Cloud Expo®, held Nov 4–7, 2013, at the Santa Clara Convention Center in Santa Clara, CA.
Cloud Expo® 2014 New York, June 10-12, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading Cloud industry players in the world.
CloudTimes Named “Media Sponsor” of Cloud Expo 2014 NY and Silicon ValleyFri, 13 Dec 2013 09:00:00 EST SYS-CON Events announced today that CloudTimes has been named “Media Sponsor” of SYS-CON's 14th International Cloud Expo®, which will take place on June 10–12, 2014, at the Javits Center in New York City, New York, and the 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
CloudTimes is the premier source for thought leadership and the latest news on Cloud Computing. We are an international group of Cloud Computing experts and write on topics covering SaaS, PaaS, IaaS, Cloud Security, Virtualization, Enterprise 2.0 Applications, Cloud Services, Cloud Marketing, Social Cloud, Mobile Cloud and everything related.
The Changing Face of Disaster Recovery in the Age of Cloud ComputingFri, 13 Dec 2013 08:45:00 EST Disaster Recovery (DR) has typically only been used by organizations for applications deemed to be mission critical. This was because organizations didn’t want to incur the expense associated with DR for less important applications. Today, because of cloud computing, many organizations are considering the use of DR for as many applications as is essential for the business.
DR in the cloud is relatively a new concept still and, like many technology trends we’ve seen so far, there's a lot of hype and misinterpretation out there. Multiple schools of thought exist on whether or not to implement DR in the cloud.
OpenXava 4.9 ReleasedThu, 12 Dec 2013 15:06:41 EST OpenXava is an AJAX Java Framework for Rapid Development of Enterprise Web Applications.
In OpenXava you only have to write the domain classes in plain Java to get a web application ready for production.
Consolidate Multiple Database Sources for Single-Source Reporting ToolWed, 11 Dec 2013 15:17:29 EST An effort to solve data source preparation in reporting tool developing.
Data sources cover the result set of SQL queries or stored procedures, and the 2D table from the text or Excel files. Owing to the technical competence or versioning, various reporting tools may only support a single data source, such as JasperReport, Quiee, BIRT, and Crystal Report.
UNIX Migration Alternatives: Red Hat Enterprise Linux vs. Windows Server Wed, 11 Dec 2013 11:30:00 EST As UNIX users prepare to embrace industry-standard servers for production workloads, they have to confront some fundamental choices about how to best match the capabilities that they have come to expect from UNIX operating systems. While both Red Hat Enterprise Linux and Windows Server now have the scalability and reliability necessary to host business-critical workloads formerly reserved for UNIX, the operational practices of the two systems diverge considerably. Windows Server has traditionally been optimized for ease-of-use by providing a highly integrated environment, minimizing the choices that administrators have to confront. By contrast, Red Hat Enterprise Linux is optimized for the traditional UNIX values of modularity and flexibility, giving administrators the option to customize their environments.
Building Video Calling with PubNub and WebRTCTue, 03 Dec 2013 07:30:00 EST Building video calling apps is no small task. Learning about video codecs, signaling, and presence is just the beginning when it comes to implementation. At PubNub, we have partnered our technology with WebRTC to make integration fast and easy to build video chat software. Out of the box, our WebRTC Framework will power audio, video, and data communication between two browsers.
Want to get an idea of what it’ll look like when you’re finished? Take a look at our live, working demo and code walk through, or watch the video below, or keep reading.
Exploit the Results of Pmd, Findbugs and CheckStyleTue, 26 Nov 2013 11:31:18 EST Many Java static analysis tools exist right there, each one focus on a specific area and has its advantages, however if these tools report thousands of violations it became a challenge to exploit them.
Let's discover another way to exploit the result of these tools.
DNS and JavaMon, 25 Nov 2013 15:30:00 EST Determining the IP Address of the machine from the Hostname is termed as Hostname Resolution. Every computer (host) has a name. The Hostname should correspond to an IP address mapping stored in local Hosts file or in a database on a DNS Server.
Translating (resolving) machine (and domain) names into the numbers actually used on the Internet is the business of machines that offer the Domain Name Service.
Using DevOps to Troubleshoot Performance IssuesMon, 25 Nov 2013 09:27:03 EST In the previous article,had introduced how DevOps can play a role in JVM troubleshooting. In this series, I would like to share a case study that we encountered in our organization and how we isolated the issue before engaging the right team to fix it.
One of our customers upgraded to the latest application release from previous release and noticed a significant performance degradation in the throughput. As a first step, we confirmed the customer claim by reproducing the reported issue in our environment. Having a local reproduction environment opened up opportunities to try out multiple things in narrowing down the issue. After a preliminary analysis, we had concluded the area or component that is contributing to the observed behavior. A workaround to overcome the issue was identified and the same was employing a command-line parameter, which will take a different execution path. The provided recommendation was tested in our local reproduction environment with success and this gave us the confidence that the issue can be overcome with the current recommendation.