Latest Blogs from SYS-CON MEDIA
Logging runtime information in your Java application is critically useful for understanding the behavior of any app, especially in cases when you encounter unexpected scenarios, errors or just need track certain application events. In a real-world production environment, you usually do...
Is your Android phone infected with Judy malware? Shelly Palmer talks about how you tell if Judy is on your device and what you can do about it - with Teresa Priolo and Antwan Lewis on Fox 5. Original Airdate: May 30, 2017 The post Is the Judy Virus on Your Android? | Shelly Palmer on ...
The age-old bottleneck has plagued IT since the first wired connections were made. Network bottlenecks happen when the communication between network endpoints doesn’t have enough capacity to transfer data without overflowing network buffers. The problem could lie on the internal networ...
Kommunal Landspensjonskasse (KLP) is Norway’s largest insurance company, delivering safe and competitive financial and insurance services to the public sector, enterprises associated with the public sector and their employees. KLP’s completely manual deployment processes demanded a ...
Bob Gourley There are seven key megatrends driving the future of enterprise IT. You can remember them all with the mnemonic acronym CAMBRIC, which stands for Cloud Computing, Artificial Intelligence, Mobility, Big Data, Robotics, Internet of Things, CyberSecurity. In this post we dive ...
A full-text catalog is a logical container where a group of full-text indexes are stored. A full-text catalog is needed before you can create a full-text index. Full-text catalog is a virtual object and does not belong to the file group.In order to text search a full-text index will be...
An Intellyx Brain Candy Brief The idea of using chatbots — or bots, more broadly — is not a new idea. Enterprise organizations have been using […]
An Intellyx Brain Candy Brief As I wrote about recently in NetworkWorld, SAP has set forth an ambitious agenda to become the digital transformation platform for […]
Every modern organization depends on software, and where there is software there are metrics and logs and, one would hope, monitoring of these two critically important types of data. Operations teams have traditionally used two separate sets of tools – […]
In calculus, the second derivative is the measure of instantaneous acceleration or velocity of a function of a function f. For example, the second derivative of the position of a vehicle with respect to time is the instantaneous acceleration of the vehicle, or the rate at which the vel...
Il existe encore de nombreuses, trop nombreuses DSI, Direction des Systèmes d’Information, rattachées à une Direction financière. Il est temps que, à l’image de la chenille qui se transforme en papillon pour prendre son envol, les DSI s’émancipent du carcan...
In The Evolving Role of a Cloud Architect Gunnar Menzel, Vice President & Chief Architect @ Cloud Infra, Cap Gemini Global states that "a cloud architect is responsible for making sure a cloud solution is structurally sound and fit for purpose"   continuing...
The cloud as we know it is going through a massive transformation. What started as an on-demand subscription service for consuming compute, storage, and the network is no more the same. The compute component of the cloud has become table stakes for the vendors in the infrastructure bus...
As enterprise cloud becomes the norm, businesses and government programs must address compounded regulatory compliance related to data privacy and information protection. The most recent, Controlled Unclassified Information and the EU’s GDPR have board level implications and companies ...
Updates are necessary, but annoying. Which is why your Mac, by default, installs them automatically. System updates protect your Mac from malware and other threats, and occasionally add new features. The The post How to Control When macOS Updates Are Installed appeared first on Te...
Spotlight search on iOS 10 now remembers your previous searches. If you tap the Spotlight search bar on your iPhone or iPad, you’ll see a list of searches you’ve performed. The post How to Disable iOS 10’s Spotlight Search History appeared first on Technology News and Reviews | A2Z Sup...
You encrypt your Mac’s system drive like you should: if your computer is stolen, your data is safe from prying eyes. But on your desk, right next to your Mac, is The post How to Encrypt Your Mac’s Time Machine Backup appeared first on Technology News and Reviews | A2Z Support.
Just for fun, here is a list of buzzwords, biz speak, and hipster droppings that should be banned from every business meeting forevermore. The post My Banned Words for 2017 originally appeared here on Shelly Palmer
This is the classic example of getting out of one problem and getting into another.I had the virus problem (probably the ransomeware except that I did not click on any link and the threatening page did not go away after a reboot, etc.) on my Toshiba tablet with Windows 10 and decided t...
An Intellyx Brain Candy Brief Big data environments require specialized performance management tooling. Pepperdata recently announced its code analyzer for Apache Spark, adding it to its […]
Specsavers CIO Phil Pavitt has worked for 18 companies in a stellar 35-year career in technology, across organisations as varied as Transport for London, Centrica, Aviva, and HMRC, the UK government department responsible for revenue and customs. Phil was a star speaker at the recent A...
When you’re making a cloud move, ask the right questions before you spend the money. This list is a good rundown of what to ask internally, including business function priorities, which applications to move to the cloud and when, and what type of integrations you might choose. Plus, as...
This is a collection of marketing unicorn resources curated from sources across the web. Why Marketing Unicorns Are Such a Big Deal | Earnworthy earnworthy.com/marketing-unicorns/ Jun 29, 2015 – Let’s face it. Marketing is changing in a big way. The days of Don Draper ...
B2B marketing is no easy task. There’s a constant battle between: do I target my exact buyer with account-based marketing or do I go after the larger audience in the hope that my end buyer finds me? The reality is that generating demand for your B2B service or product has become a jugg...
FROM THE TRIBLIO WEBSITE A collection of 40 beautiful content hub examples. Multiple case studies have already proven that optimized content hubs help increase awareness, time spent on the website and lead conversions…and what marketer doesn’t want that? FROM ACROSS THE WEB A variety o...
The Challenge: In the networking industry, change is driven by the applications that run on top of IT infrastructure. To keep up with industry demands, the applications themselves are shifting to be increasingly efficient while simultaneously processing vastly larger amounts of data, o...
VisualVM is a Java profiler, one of the several types of Java performance tools (to see more of our favorite Java performance tools, check out this post). In today’s post, we’ll take a look at VisualVM, how it works, and some integrations and alternatives. A Definition of V...
Are your traditional ERPs and core business applications struggling to keep up new digital technology? It’s a challenge facing all organizations undergoing radical transformation as part […]
Gone are the days of painful plain-text log management. While plain-text data is still useful in certain situations, when it comes to doing extended analysis to gather insightful infrastructure data – and improve the quality of your code – it pays to invest in a reliable log management...
Innovations in artificial intelligence (AI) allow companies to enhance acquisition, retention, and application of the knowledge of people in the organization. This Intellyx whitepaper by Jason […]
The customer-driven, technology empowered business transformation we call digital transformation impacts every corner of the enterprise. Every process, every organizational unit, every piece of technology is […]
Learning from DevOps Failures
At its annual customer conference, SAP set forth an ambitious vision for the future, but is their partner ecosystem ready for the journey? At its massive […]
GDPR goes into effect May 25 2018 Are You Ready? The new European General Data Protection Regulation (GDPR) go into effect in a year on May 25 2018 are you ready? Why Become GDPR Aware Now if your initial response is that you are not in Europe and do not need to be concerned ...
As Bob learned in the first posting in this three-part series previous blog, technology alone can’t deliver a healthy lifestyle. Likewise, having a successful APM program isn’t just about seeing what’s happening on a computer screen; it’s about doing something about it. You have to ali...
Almost half of all technology professionals experience on-call as an integral part of their job. Life for an IT on-call often means 2 am wake up calls for false alarms or for issues the engineer can do little about.  The results of these sorts of sleep interruptions and tensions inevit...
Yes, I know, Divorce is a nasty sounding word, and it does not seem applicable to your relationship with your Microsoft Partner… I mean you are not legally “Married”. But today, more than ever, your relationship with your Microsoft partner is feeling a lot more like a...
Traditional IT monitoring has revolved around monitoring the infrastructures and servers. As you move to the cloud, it is possible that you don’t have either of those things. You could deploy your app via a service like Azure App Services and rely on Azure’s hosted Redis and SQL offeri...
When you hear the term “software testing,” do you think about one particular type of test — such as functional testing or regression testing — or do you immediately start visualizing the complex, interconnected web of test types and techniques that comprise the ...