In part one of this series, “Rugged DevOps: Survival is Not Mandatory”, I shared news that 1 in 16 open source and third-party components downloaded last year included a known vulnerability. That may not seem like too many until you realize the average company downloads well over 200,000 components annually. These components are electively downloaded by development teams, often unaware of the vulnerabilities that come with them.
Deming, the patron saint of DevOps once advised, “It is not necessary to change. Survival is not mandatory.” To survive, application development teams are constantly pressured to deliver software even faster. But fast is not enough. The best organizations realize that security, quality and integrity at velocity are mandatory for survival. Hence, DevOpsSec.
“Software is eating the world.” The now-classic quote from Marc Andreessen needs some updating, since it’s now more accurate to say software as a service (SaaS) is consuming the world, but the core statement is spot on: Companies can’t survive (and thrive) without the regular influx of new software. The problem? Many employees struggle to keep pace with changing environments and workflows — here are four tips for executives looking to streamline the software training process.
Learn how an integrated security strategy can secure and simplify access to Hadoop environments, while leveraging your existing identity management infrastructure.
Get insights on securing the Hadoop infrastructure, as well as the data in Hadoop.
People want to get going with DevOps or Continuous Delivery, but need a place to start. Others are already on their way, but need some validation of their choices. A few months ago, I published the first volume of DevOps and Continuous Delivery reference architectures which has now been viewed over 50,000 times on SlideShare (it’s free to download…no registration required). Three things helped people in the deck: (1) the reference architectures, (2) links to the sources for each architecture attached to each slide, and (3) no marketing fluff.
This year that annual shopping frenzy in the U.S. known as Black Friday will take place on November 27, the day after Thanksgiving. Sales, according to the Black Friday website, will actually start early on Thanksgiving Day and extend throughout the weekend. Total sales are expected to top $80 billion. Also, the number of bargain hunters will increase this year to well over 300 million. Sales channels will include both brick and mortar stores as well as online retailers.
by Antoine Mottier, BonitasoftUnderstanding customer need is more important today than ever as millennials enter the workforce. According to Goldman Sachs, millennials are one of the largest generations in history and are about to move into their prime spending years – poised to reshape the economy. Read More >>>
This webinar with Dr. Srini Chari, Managing Partner, Cabot Partners and IBM Distinguished Engineer Linton examines how organizations can derive high value insights by framing strategic business questions and combining systems of records with systems of engagement and how these can be achieved by implementing a high-performance, scalable and agile information foundation to support both real-time and large-scale analytics capabilities.
with Bernard Golden, ActiveStateIT professionals are evaluating how open source products can help them meet their organizations’ responsibilities. Enterprise IT has a large and growing commitment to open source products in preference to proprietary alternatives. Read More >>>
Many solution platforms and data technologies come to mind in the context of harnessing the power and promise of the Internet of Things (IoT). A relational database does not typically top the list. The potential of an interconnected world of smart devices communicating with one another to meet human demands instead emphasizes new solutions and new ways to connect and analyze data.
Daniel Joseph Barry, NapatechIn this interview, Dan Joe Barry, VP Positioning and Chief Evangelist for Napatech, speaks with IT Briefcase about the emerging technology of software acceleration platforms and tools.Read More >>>
Web application developer Eldarion conducted an online survey of people who use and contribute to open source, people who use open source but don’t contribute to it, and people who neither contribute nor (knowingly) use open source. 132 people responded to the survey in March and April 2015.
by Miguel Valdes Faura, BonitasoftThe common thinking has been that developing and implementing a process-based application will be as complicated and disruptive as a custom development. It doesn’t have to be. Here are five steps to ensure success. Read More >>>
by Chip Epps, OneLogin Gartner predicts the number of cloud-provisioned office system users will grow 28.5% a year to 695 million users by 2022 –constituting 60% of the user universe that will exist by then. Read More >>>
by John L. Myers, EMAAs we enter the middle of the second decade of the 21st century, many organizations are recognizing and utilizing cloud infrastructure as a way to implement their analytical and business intelligence requirements. Read More >>>
The arrival of open source development for business applications in recent years is responsible for bringing a host of innovative products to market, as well as introducing new flexibility and cost savings. More than just “free software,” open source comprises a culture and a way of doing business, offering freedom and benefits with which closed code, proprietary software struggles to compete. The sharing of source code for purposes of open collaboration and free distribution has been practiced for some time, of course, but only in the last decade has open source established its presence in mainstream IT.
By Yves de Montcheuil, TalendAmong the most digitalized industries, travel and hospitality is changing fast. Travel agents, airlines, airports, hotel chains – the entire industry is fishing for value in a seemingly-unlimited ocean of data. Read More >>>
73% of respondents in a survey conducted by Mashable do “at least half of their shopping online,” and 66% “prefer to shop online vs. in-store.” With trends towards online shopping ever increasing, it’s more important now than ever to implement an e-commerce platform with your brick-and-mortar store.
BioGears® is a $7M, multi-year program funded by the Defense Medical Research Development Program (DMRDP) and administered by the U.S. Army’s Telemedicine & Advanced Technology Research Center (TATRC), Armed Forces Simulation Institute for Medicine (AFSIM), under USAMRMC award number W81XWH1320068. BioGears® will deliver an open source, comprehensive, extensible human physiology engine that will serve as a platform for biomedical modeling research and also facilitate the creation of immersive medical education and training technologies.
with Joe Kinsella, CloudHealthSeveral years ago, I joined a company in the middle of a frantic architectural transition that prioritized speed over cost. During my first few months, I watched our Amazon Web Services bill creep from $100K per month to over $350K. Read More >>>
with Mike Decker, Annese & Associates, Inc.With more than 25 years of IT experience, perhaps I can shed some light on strategies for IT outsourcing, but first let me frame my point of view. With a BS in Telecommunications, I started my career inside a NOC located in the basement of a major bank in Buffalo, NY. Read More >>>
with Robert Berlin, OneLoginWith Windows Server 2003 hitting its end of life next year, the push is on for even faster migration. But the path is a complex one, and careful planning will be your best friend. Having spent a number of years helping customers along this road, here are my top tips for a safe journey. Read More >>>
with Mac McConnell, BonitaSoftDoes everybody need BPM? Are there companies out there that would have no use for the kinds of solutions we provide? Hate to say it, but there might be a few. In the spirit of a Letterman “Late Show Top 10” list, here are 8 types of companies that simply don’t need BPM.Read More >>>
With the recent spate of vulnerabilities found in OpenSSL, the security of open-source software has been put under the magnifying glass, with industry experts and software developers weighing the merits of using an open-source versus a proprietary code base. There are valid arguments for both, but ultimately the risk of a vulnerability can be the same whether rooted in proprietary or open source code.
By Yves de Montcheuil, TalendBig data technologies are definitely California-born. The Internet giants invented Hadoop and most NoSQL databases. Over the years, adoption has spread from “new economy” companies to almost all industries. Read More >>>
Tweet SOURCE: Red Hat Inc. RALEIGH, N.C. – JUNE 19, 2014 – Red Hat Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced the launch of the ManageIQ community with the availability of ManageIQ’s fully open-sourced code repository and the first builds of the project. The ManageIQ community aims to provide […]
by Mac McConnell, BonitaSoftOne unintended consequence of employing customer-focused software systems is they view the world through a singular lens, which can quickly become a problem. These systems are generally geared toward providing general information to the users, without necessarily including recommendations for action. Read More >>>
by Steve Marsh, Metalogix Defining governance is not easy and many organizations skip this task and move forward without a clear understanding or plan for what governance means. So when SharePoint administrators have to enact ill-defined governance, mistakes inevitably follow. Read More >>>