Five years ago, Mozilla launched its new identity management system, Persona (originally called BrowserID). At the time, a sense of optimism was in the air. Everyone thought that the new technology would ease the strain of remembering numerous passwords to gain access to various websites. The alternative — outsourcing unified identity management to social media giants including Twitter, Facebook and Google — raised data privacy and reliability concerns. So everyone hoped that Persona would emerge as a strong unified authentication system and a credible alternative.
DATA and ANALYTICS
The pace of digital transformation and cloud migration is forcing IT professionals to review their current infrastructure and force change to accommodate new business demands brought on by the age of the customer. Many organizations are motivated by fear, such as of the potential business disruption in their industries from new digital startups like airbnb or uber; more optimistically, they’re motivated by the opportunities brought by digital technologies to improve their customers’ experience.
by Stefan Bernbo, CompuverdeAs the data deluge continues on unabated, vertically scaling legacy approaches to storage are falling short. Organizations need to find a way to store high volumes of data without busting the budget, all while maintaining high levels of performance… Read More >>>
Among providers of disaster recovery as a service there is wide variance in experience and service quality, together with other key differentiating factors. Data center managers should use this Magic Quadrant to help them evaluate providers of DRaaS services.
Based on the experiences of 148 respondents, this report will explore what makes a product development company successful. It will look at the differences between the Best-in-Class and their competitors.
To get a sense for what you can expect in 2016, we talked to our course authors, internal experts and customers. We gained some valuable insights into what your team will need to know for the dev, IT and creative industries.
Network infrastructure today is under increasing pressure from the shifting bandwidth and latency requirements of modern applications. Wide area networks (“WANs”) in particular must address this demand, especially when they use many technologies from a variety of providers, are distributed geographically and suffer strain from the ever-expanding popularity of video and cloud application services. That’s why hybrid WAN architectures with advanced application-level traffic routing are an attractive option; they marry the cost savings of broadband/Internet connectivity for non-critical traffic with the reliability of private lines for critical business applications.
with Ed Macnair, CEO, CensorNetIn this interview, Ed Macnair, CEO of CensorNet, speaks with IT Briefcase on how security technologies needs to evolve to meet the challenge and opportunities of cloud computing.Read More >>>
You might already know them from theagileadmin.com, but let me introduce you to two of the leading minds in the Rugged DevOps movement: James Wickett and Ernest Mueller. Both James and Ernest are active leaders in the DevOps space, in addition to helping organize events like DevOpsDays Austin and LASCON. Our conversation covered a lot of bases from the founding of Rugged DevOps to aligning organizational silos to lessons learned from W. Edwards Demings.
In this session, you will learn about how a real cutting edge client has deployed the SAP HANA infrastructure using SUSE Linux and the Power Platform to deliver a value service to their client.
In this session, you will learn about new, pre-sized IBM Power configurations that are optimized for SAP HANA.
One of the biggest challenges in the late 1960s at NASA was figuring out how they were going to store all the telemetry from their spacecraft. Scientists and astronauts knew this information would be crucial to not only the current mission but future missions. The problem was they just didn’t have the storage capacity to capture it all.DATA and ANALYTICS
The proliferation of smart handsets, constant roll out of new applications and the on-going expansion of mobile networks into previously under- or entirely un-served communities in developing regions like Africa is driving exponential data growth that shows no signs of abating any time soon. To cope with this data boom, increasing numbers of new mega data centers are being built by the Internet giants and we expect this trend to continue.
I had the chance to catch up with Jeff Sussna ahead of his keynote address on continuous design, scheduled for DevOpsDays Atlanta, April 26-27. Jeff discussed the importance of designing for service, responding to the unexpected, and the importance of building empathy across teams.
This IBM® Redbooks Solution Guide describes how to use the strategies and the capabilities of IBM PureApplication® System to provide system high availability (HA) and disaster recovery (DR).
This IBM Redbooks publication describes and demonstrates common, prescriptive scenarios for setting up disaster recovery for common workloads using IBM WebSphere Application Server, IBM DB2, and WebSphere MQ between two IBM PureApplication System racks using the features in PureApplication System V2.
This article offers a gateway of understanding into the IBM PureSystems™ family of expert integrated systems by providing a tour of the structure of the PureApplication System and virtual patterns of expertise.
Accepting a variety of payment forms — including credit and debit cards, and mobile and Web-based payments — is beneficial to all business owners. Not only does payment flexibility give customers the right to choose how to pay, based on the size and nature of their purchase, it can level the playing field between small business owners and well-established competitors.
Call it DevOps or not, if you are concerned about releasing more code faster and at a higher quality, the resulting software delivery chain and process will look and smell like DevOps. But for existing development teams, no matter what the velocity objective is, getting from here to there is not something that can be done without a plan.
Delivering what people expect from their technology while maintaining the secure environment for which IT is responsible. It’s called People-Centric IT as a Service (ITaaS) and this infographic will show you just how effective it can be in resolving your everyday, every way battles.
Big data is a big deal. Enterprises and small businesses alike are looking for ways to manage this unending flood of information, mine it for actionable insights, and make it a key driver of ROI. Yet with so much data generated moment to moment, it’s easy for IT pros and C-suite executives to get bogged down in the details instead of seeing the big picture. The result? Increased emphasis on data visualization — charts, diagrams and infographics that distil complex concepts down into easily understood, bite-sized pieces. The problem? Not all data visualizations are created equal — here’s how they can all go wrong and how your company can find the right fit.
In an ever changing economy, businesses need to keep up with the evolution of technology. Luckily, solutions have emerged that allow business owners to outsource their IT efforts. Activities such as IT security, Hosting, IT Support and Data centre infrastructure maintenance can be handed over to an external company who are proficient at what they do. Below is an infographic constructed by Couno that details what small business are missing in this day and age of IT.
As soon as the global panic incited by the events of September 11, 2001 settled into public sector anti-terrorism initiatives, experts brought to light grave concerns about the security of the nation’s energy infrastructure. Even so, 15 years later, many energy organizations find themselves scrambling to meet the security measures set forth by NERC in their Critical Infrastructure Protection standards (CIP, Version 5). The new, much more comprehensive standards went into effect July 1, 2015, but the looming compliance deadline on July 1, 2016 is the real deal—an enforcement deadline that means auditors are on their way.
This paper will cover four imminent upheavals in end user computing that IT needs to be prepared to address in 2015 and beyond.
It seems like it wasn’t that long ago when people and businesses alike were excitedly talking about the possibilities and potential that accompanied the introduction of 4G networks. There’s little doubt that 4G has transformed how people use mobile devices and take advantage of internet connections, but already many experts are dreaming of what lies ahead with the fifth generation of mobile networks: 5G. Verizon may introduce the first 5G network as early as next year, while Samsung may show off its own 5G capabilities at the 2018 Winter Olympic Games.
The report, which looked closely at the habits of 148 product design firms, found that the right tools, the right talent, and a focus on eliminating waste in workflow processes are the keys to becoming a “Best-in-Class” product developer.
with Kong Yang, SolarWindsIn this interview, Kong Yang, Head Geek and technical product manager at SolarWinds, speaks with IT Briefcase on how hybrid environments are changing the role of the IT professional. Read More >>>
A common misperception about SSH user key management concerns the need to find and control all the private keys in an environment. The idea here is that, since private keys are like passwords, it’s possible to manage them using the same methods. Once all the private keys are well controlled, safety has been achieved. What may initially seem like common sense does not hold up under inspection.