People will tell you that ‘software is eating the world’. It’s a good line and it has a good degree of truth in it, so it’s one of those terms that tends to get repeated.
A more accurate statement might be: ‘software is eating into the core operational mechanics of the business world and the control and intelligence that it affords are reflected back on the IT function itself so that our notion of hardware systems and networks are now becoming software-defined’ – but that’s not as catchy by far now is it?
Online tax companies go from an absolute standstill to 100 mph in a matter of days.
How do these companies do it? Tax laws change every year, so that online application is basically a brand new release when users start pounding away at it in February. What is it like to test the performance of a website that sees a higher traffic spike than an eCommerce site on Black Friday – with no warm-up period preceding it? How do they get performance right the first time that they face an onslaught of users?
Privileged Identity Management (PIM) is the lowest common denominator in today’s most treacherous corporate and governmental security breaches. Or more accurately: Privilege Mismanagement. Sony, Target, Anthem, JP Morgan Chase, the city of San Francisco and many others succumbed to the reality that the identity of a single super-user account can be subverted for the purposes of manipulating sensitive organizational data, correspondence, commercial goods and intellectual property.
Digital Business Transformation projects gained momentum in 2014, as more companies moved their legacy IT workloads to cloud computing platforms and launched a variety of new cloud-native applications. This pervasive trend will continue and accelerate for the duration of 2015.
Total cloud IT infrastructure investment (server, disk storage, and ethernet switch) is forecast to grow by 21 percent year-over-year to reach $32 billion in 2015 -- accounting for about 33 percent of all IT infrastructure spending this year, which will be up from about 28 percent in 2014.
As more applications are needed to run those Things, traditional infrastructure concerns like scale and reliability will become paramount. Additional challenges with identity and access, improving the user experience, and the need for faster provisioning of services could overwhelm IT departments. A robust, scalable and intelligent infrastructure will be necessary to handle the massive traffic growth.
IT professionals are tasked with designing and building the infrastructure that’s ready for the challenges that lie ahead, including IoT. But many of today’s traditional architectures will buc...
This is a no-hype, pragmatic post about why I think you should consider architecting your next project the way SOA and/or microservices suggest. No matter if it’s a greenfield approach or if you’re in dire need of refactoring. Please note: considering still keeps open the option of not taking that approach. After reading this, you will have a better idea about whether building multiple small components instead of a single, large component makes sense for your project.
This post assumes that you have experience with software architecture and services (you’ll find some words about my experience...
Trends indicate that enterprise solutions, particularly enterprise resource planning (ERP) and customer relationship management (CRM) software are still largely hosted on-premises. A 2014 study by Gartner found that only 2% of respondents ran their core ERP systems on the cloud. More enterprises are looking to shift to the cloud, with half of those surveyed indicating the intention to move to a cloud-based platform within the next five years.
The role of big data in ERPs until now, has been largely separate. Most of the time, Big Data becomes an input for ERPs, but data from an ERP can also b...
This digest provides an overview of good resources that are well worth reading. We’ll be updating this page as new content becomes available, so I suggest you bookmark it.
Also, expect more digests to come on different topics that make all of our IT-hearts go boom!
The stack is the hack, Jack. That's my takeaway from several events I attended over the past few weeks in Silicon Valley and Southeast Asia.
I listened to and participated in discussions about everything from large datacenter management (think Facebook Open Compute) to enterprise-level cyberfraud (at a seminar in Manila attended by the US State Dept. and Philippine National Police) to the world of entrepreneurial startups, app deployment, and mobility (in a series of meetups and talks in both the US and Asia.)
All had something to do with some sort of stack – IT is interconnected, glob...
For those of us who know how fax technology evolved and reached a stage where it completely transformed communications, we know fax played a key role in the growth we have seen in the last 50 years. No fax, no cross border trade, no communications, no way to make things faster, better speedier and so on. Over the years though, the fax industry has definitely changed. In some areas it has seen a decline from being the de-facto communication platform with the outside world while being overridden by email and in other areas by the proliferation of changing business needs where internet-driven col...
Last week we announced the release of “Enabling the Future of Applications: The Stackato Vision.” This video describes how the nature of information technology is changing – from automating business-supporting processes to being the business offering itself. Using IDC’s Third Platform concept as a framework, we identify the critical success factors necessary to be a Third Platform company and present examples like Uber and Airbnb.
If you’re not familiar with IDC’s Third Platform, it represents the confluence of four technology trends – social, mobile, Big Data, and cloud computing – that in ...
We found all manner of interesting practices and trends as it relates to cloud and security in our State of Application Delivery 2015 report. One of the more fascinating data points was a relationship between security posture and cloud adoption. That is, it appears that the more applications an organization migrates to the cloud, the less strict its security posture becomes.
Really. I was a bit disturbed by that, too. At least at first.
I woke up this morning to the devastating news about the earthquake in Nepal.
Sitting here in California that destruction is literally on the other side of the world but my mind immediately went to thinking about my good friend Jeremy Geelan.
See Jeremy and his family have been living in Kathmandu for a while now. His wife, in fact, is the Danish Ambassador to Nepal!
I recently wrote about how Amazon’s new Dash service embodies the Stackato vision; in that post I discussed how Dash reflects the Business Agility portion of our vision. As the image to the left shows, Dash is a service that offers a small button; when pressed, magic happens and an order is placed for the product (in this example, Tide detergent), which is eventually delivered to the customer.
Dash presents a very different model of retailing, changing the purchase execution from a physical retail outlet or an online website to the very location of product consumption. With this service, Ama...
Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities.
Accordingly, attendees at the upcoming 16th Cloud Expo at the Javits Center in New York June 9-11 will find fresh new content in a new track called PaaS | Containers & Microservices
Containers are not being considered for the first time by the cloud community, but a current era of re-consideration has pushed them to the top of the cloud agenda. With the launch of Docker's initial release in March of 2013, interest was revved up several notches. Then late last...
Join Us at the Javits Center in New York City, June 9-11
Cloud computing software is eating the world, and each day is bringing new developments in this world.
Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Meanwhile, 94% of enterprises are using some form of XaaS – software, platform, and Infrastructure as a Service.
Big Data | Analytics and the emerging Internet of Things (IoT) are driving exponentially increased demands on datacenters and developers alike, as we cross the zettabyte horizon this year.
Containers and microservices are now part of every PaaS conversation, and IaaS providers are increasingly competing for platform customers.
WebRTC continues to reform web communications, and DevOps is pushing its way into an enterprise IT world that is increasingly agile, lean, and continuous.
Through all this, Cloud Expo remains the single independent event where delegates and technology vendors can meet to experience and discuss the entire world of the cloud.
Only Cloud Expo brings together all this in a single location:
• Cloud Computing
• Big Data | Analytics
• Internet of Things
• Containers | Microservices
Cloud computing budgets worldwide are reaching into the hundreds of billions of dollars, and no organization can survive long without some sort of cloud migration strategy. Each month brings new announcements, use cases, and success stories.
Cloud Expo offers the world's most comprehensive selection of technical and strategic Industry Keynotes, General Sessions, Breakout Sessions, and signature Power Panels. The exhibition floor features 100+ exhibitors offering specific solutions and comprehensive strategies.
The floor also features a Demo Theater that give delegates the opportunity to get even closer to the technology they want to see and the people who offer it.
Attend Cloud Expo. Create your own custom experience. Learn the latest from the world's best technologists. Talk to the vendors you are considering, and put them to the test.