Latest Articles from SYS-CON MEDIA
More than 95 percent of the world’s enterprises rely on SSH user keys to provide administrators and developers an effective means of gaining encrypted access to critical infrastructure: operating systems, applications, payment processing systems, databases, human resource and financial...
Ovum, a leading technology analyst firm, has published an in-depth report, Ovum Decision Matrix: Selecting a DevOps Release Management Solution, 2016–17. The report focuses on the automation aspects of DevOps, Release Management and compares solutions from the leading vendors.
StackIQ has announced the release of Stacki 3.2. Stacki is an easy-to-use Linux server provisioning tool. Stacki 3.2 delivers new capabilities that simplify the automation and integration of site-specific requirements. StackIQ is the commercial entity behind this open source bare metal...
Redis is not only the fastest database, but it is the most popular among the new wave of databases running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 19th Cloud Expo, Dave Nielsen, Developer Advocate, ...
A data breach could happen to anyone. Data managed by your company is valuable to someone, no matter what the data is. Everything has a price tag on the dark web. It is especially true when it is customer data, such as personal and payment card details. When your customers’ data turns...
Continuous testing helps bridge the gap between developing quickly and maintaining high quality products. But to implement continuous testing, CTOs must take a strategic approach to building a testing infrastructure and toolset that empowers their team to move fast. Download our gui...
CenturyLink has announced that application server solutions from GENBAND are now available as part of CenturyLink’s Networx contracts. The General Services Administration (GSA)’s Networx program includes the largest telecommunications contract vehicles ever awarded by the federal gove...
In an era of unified IT, you can no longer afford to take a silo-based approach to monitoring and troubleshooting IT problems. It's time for network engineers, server admins and application engineers to expand beyond their particular domains anddepartment-specific tools. It's time to e...
The Dean of the University of San Francisco School of Management, Elizabeth Davis, recently asked me to sit on a Big Data panel at the Direct Sales Association conference. I was given a 5-minute slot to “demystify” Big Data to a non-technical group of about 1,000 people; to help them u...
After many years of research, misfires and frightening Hollywood plotlines, artificial intelligence (AI) is finally coming into its own and beginning to demonstrate significant business value. The combined forces of big data, human expertise and AI are being used across industries as d...
It’s 2016: buildings are smart, connected and the IoT is fundamentally altering how control and operating systems work and speak to each other. Platforms across the enterprise are networked via inexpensive sensors to collect massive amounts of data for analytics, information management...
Tim Buntel recently sat down with Alan Shimel of DevOps.com and explored DevOps by the Numbers. This discussion looked at how to approach the measurements and metrics of a Continuous Delivery transformation. Tim spoke on tough questions like “are we getting better at delivering high-qu...
Tapjoy’s data-driven business of serving 500 million global mobile users - or more than 1.5 million add engagements per day, a data volume of a 120 terabytes - runs with extreme efficiency. The next BriefingsDirect Voice of the Customer big data case study discussion examines how mobi...
Unless you’ve been living under a rock the last couple of days, it’s been almost impossible to miss the wildly popular release of Pokemon Go mobile application. Central to the application is geo-location, which is used in conjunction with augmented reality to place virtual characters i...
IDC estimates that the digital universe is doubling every two years. That means the need for data storage is increasing at the same rate. This exponential demand is no match for traditional vertical-scaling storage architectures. The resulting bottlenecks significantly reduce performan...
Large scale deployments present unique planning challenges, system commissioning hurdles between IT and OT and demand careful system hand-off orchestration. In his session at @ThingsExpo, Jeff Smith, founder and managing partner of eviot.io, will discuss some of the key tactics to e...
In his session at @DevOpsSummit at 19th Cloud Expo, Yoseph Reuveni, Director of Software Engineering at Jet.com, will discuss Jet.com's journey into containerizing Microsoft-based technologies like C# and F# into Docker. He will talk about lessons learned and challenges faced, the Mono...
As companies gain momentum, the need to maintain high quality products can outstrip their development team’s bandwidth for QA. Building out a large QA team (whether in-house or outsourced) can slow down development and significantly increases costs. This eBook takes QA profiles from 5 ...
"We view the cloud not really as a specific technology but as a way of doing business and that way of doing business is transforming the way software, infrastructure and services are being delivered to business," explained Matthew Rosen, CEO and Director at Fusion, in this SYS-CON.tv i...
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too...
"Software-defined storage is a big problem in this industry because so many people have different definitions as they see fit to use it," stated Peter McCallum, VP of Datacenter Solutions at FalconStor Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at t...
Most organizations prioritize data security only after their data has already been compromised. Proactive prevention is important, but how can you accomplish that on a small budget? Learn how the cloud, combined with a defense and in-depth approach, creates efficiencies by transferring...
Early adopters of IoT viewed it mainly as a different term for machine-to-machine connectivity or M2M. This is understandable since a prerequisite for any IoT solution is the ability to collect and aggregate device data, which is most often presented in a dashboard. The problem is that...
The next BriefingsDirect security market transformation discussion explores how airline Allegiant Air solved its payment card industry (PCI) problem -- and got a whole lot better security culture to boot. When Allegiant needed to quickly manage its compliance around the Payment Card I...
"We are an outsourcing company, offering sysadmin and DevOps services mostly for managed service providers, cloud providers and hosting providers," stated Nikola Trajkovic, Business Development Manager at SuperAdmins, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016...
"We work in the area of Big Data analytics and Big Data analytics is a very crowded space - you have Hadoop, ETL, warehousing, visualization and there's a lot of effort trying to get these tools to talk to each other," explained Mukund Deshpande, head of the Analytics practice at Accel...
Cloud Expo, Inc. has announced today that Andi Mann returns to 'DevOps at Cloud Expo 2016' as Conference Chair The @DevOpsSummit at Cloud Expo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "DevOps is set to be one of the most profound...
This report from Gartner offers a view into the next generation of application development technologies, showing how agile practices, RAD and state-or-the-art user experiences are high-profile challenges for today's application development leaders. It showcases a number of vendors in ...
The digital society has emerged. Today’s always-connected world and the applications we interact with are changing the way we live. People are mobile, our devices are mobile, and by all accounts, everything that is a noun – a person, place or thing – will soon be connected and generati...
Recently, I attended Cloud Expo and @ThingsExpo in NYC (June 7-9) and I found the content to be interesting and thoughtful for companies that are planning their future success. Like most conferences, there was a lot of chatter about IoT app development, consumer trends, and security w...
With so much on their plates, most C-level executives don’t have the bandwidth to think about SSH user keys. It would be much simpler to leave such details to the IT department – but that would be a mistake. Why? Because SSH means access – to an organization’s servers and data. The cre...
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how yo...
One of the greatest challenges facing business and government organizations is how to store and move sensitive data around the world while maintaining security. Storing and securing critical data held within data centers (whether physical or virtual) is top of mind from the boardroom t...
The initial debate is over: Any enterprise with a serious commitment to IT is migrating to the cloud. But things are not so simple. There is a complex mix of on-premises, colocated, and public-cloud deployments. In this power panel at 18th Cloud Expo, moderated by Conference Chair Ro...
Insider threats are on the rise more than ever. It’s a malicious activity that originates from users within an organization, as opposed to attacks like DDoS that come from the outside. Cyber hackers of this kind get inside the system to steal intellectual property from the company via ...
"SpeedyCloud's specialty lies in providing cloud services - we provide IaaS for Internet and enterprises companies," explained Hao Yu, CEO and co-founder of SpeedyCloud, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Security is one of the most controversial topics in the software industry. How do you measure security? Is your favorite software fundamentally insecure? Are Docker containers secure? Dan Walsh, SELinux architect, wrote: "Some people make the mistake of thinking of containers as a bet...
The now mainstream platform changes stemming from the first Internet boom brought many changes but didn’t really change the basic relationship between servers and the applications running on them. In fact, that was sort of the point. In his session at 18th Cloud Expo, Gordon Haff, se...
Organizations are experiencing a new emphasis when it comes to cybersecurity. They are moving from securing the perimeter to securing the data within it, which is the result of the proliferation of connected devices in organizations today: smartphones, tablets and the IoT. Organization...
Cloud servers bring with them distributed hosting and the ability to anonymize identities and that has enabled cloud becoming a breeding ground for criminals and even terrorists. The cloud brings unique advantages to individual and business users alike and this explains the exponenti...