Welcome!


From the Blogosphere

An interesting article came out recently, “Why Continuous Deployment may mean Continuous Disappointment for your Customers.” It correctly identifies the human need for a shiny, new thing every so often. And it argues that the practice of continuous deployment could lead to disenchantme...
Securing your data comes down to making both physical and virtual changes to your data center. From interior and exterior surveillance systems to software that detects system-level changes across remote and distributed locations, you must make use of any and all available strategies to...
Telerik Controls are great for building modern, rich clients, and web applications often seen at the enterprise level. I just worked with a company that uses these controls in their soon-to-be-released customer-facing SharePoint portal. They ran a small load test that showed that the r...
Data is dumb but we can't seem to get enough of it these days. An entire industry has evolved to make sense of the massive amounts of data being generated every day. Massive data collection by itself does not guarantee the context required to solve business and IT problems... If we are...
Assuming that your organization is well down the road when it comes to adopting the Cloud and in fact, has been utilizing the Cloud for a while, then you are likely a true believer that ultimately all of your applications will be migrated to the Cloud. It is no longer a question of "if...
Hopefully you never forgot Group Policy! Whenever the topic of working with desktops in business is brought up, IT Pro’s always want to manage and maintain those desktops. For me the first thing that always come to mind is Group Policy and hopefully does for you as well. Group Pol...
Cobbling together point solutions provides tools, but doesn't promote the key collaborative intelligence integrated cloud-based unified security offers. Of all the strategies and tactics available to prevent breaches, deter data leakage and theft, control access and secure beyond the ...
All prognosticators, even us who simply roll out a single annual list, hope for two things: one, that your predictions get a lot of traction and shares across the industry, and two, that you end up actually being correct. Anil Batra’s list of 2014 predictions has turned a lot of hea...
In my experience when you work in IT the executive team rarely focuses on your team until you experience a catastrophic failure – once you do you are the center of attention until services are back to normal. It is easy to ignore the background work that IT teams spend most of their da...
Windows 8.1 has a lot to offer Business, probably one of the bigger improvements is the inclusion of Hyper-V in the client. This provides support for several scenarios including: Test Lab: This is what I use it mainly for to test all the wickedly cool technologies in Windows Server ...
When applications crash due to a code quality issues, the common question is, "How could those experts have missed that?" The problem is, most people imagine software development as a room full of developers, keyboards clacking away with green, Matrix-esque code filling up the screen a...
Windows Azure is currently offering an exclusive promotion. You can get $200 in free credits just for test driving the innovative public cloud service designed by Microsoft. What's the catch? When you sign up, Microsoft asks that you provide your credit card and a phone number so that ...
There are people who take life slowly, accept it on its terms, meditate, read about meditation, and internalize books like "Wherever You Go, There You Are," a bestseller by a guy with a hyphenated name. I'm more of a Malcolm Gladwell fan -- Outliers or his newest book “David and Goliat...
One of the most often questions/feedback we get regarding Windows 8.1 is where is my start menu. These conversations can get very passionate, and usually turn into a commentary around on how much we miss our start menu. I am sure some folks want to punch the screen. I totally unders...
Disaster recovery is about being able to get your business back up and running as quick as you can after the disaster happens. Throughout this series, my teammates have focused on the Infrastructure side of the house, servers, virtual machines, etc. You can see the full series here: D...
One of the questions I have been asked for a while is how do you set static IP address in Windows Azure Virtual Machines. Well you can! While it is like a DHCP reservation for the VM itself (the VM is still DHCP configured), it is treated as a static IP to Windows Azure. Now this doe...
In the ongoing debate over net neutrality, brought to the forefront this past week by the Netflix, Comcast, Verizon deal, there is now increasing dialogue about what could happen if some form of real blocking and favoring starts to happen. For some this is the nightmare scenario: only ...
In part one of this three-part series I summed up how the way we produce and consume data has evolved over the last three decades, creating a need for new storage methodologies that can help enterprises store and effectively manage massive pools of data. I concluded that the immutable ...
As promised in our earlier post, here are the final predictions we saw making the rounds in the blogosphere at the start of the year. Many are predicting that Microsoft will get more serious about the cloud. Amazon dominated the cloud news in 2013, but 2014 will be a good year for Mic...
There is no such thing as an information recession however there the realities of economic challenges in IT data centers also known as information factories. Likewise, people and data are living longer with increased dependency on information being available and reliable when needed. ...
The biggest difference between high-performance teams and more average teams is that the high-performance group actually acts like a team. That statement is so obvious, I am going to let it stand on its own. If you look at most groups, they tend to act less like teams and more like...
Rather than talking about what others should do or consider for their data protection needs, for this post I wrote down some notes using my Livescribe about what I need and want for my environment. As part of walking the talk in future posts I'm going to expand a bit more on what I'm d...
I had the distinct privilege of walking along several different Roman roads this week. These roads have survived thousands of years worth of history and travel. They were built using a standard design, engineering and construction methodology that was extraordinarily durable. The pa...
The phrase "Mind the Gap" was first introduced in 1969 in London as a warning for passengers to watch for the gap between the train door and the station platform. The need to warn passengers is and was the result of some stations being located on curves and at varying heights relative...
The growing rate of hybrid cloud adoption requires particular models of cloud security. Many enterprises are moving some of their workload to a public cloud environment while retaining other workloads in the private cloud. Transitional cloud security strategies are needed that continue...
When we talk about the impact of BYOD and BYOA and the Internet of Things, we often focus on the impact on data center architectures. That's because there will be an increasing need for authentication, for access control, for security, for application delivery as the number of potentia...
As we embrace 2014, it’s important to focus on emerging trends to predict any industry changes this year and in the coming years. Mike Bushong reviewed 2013 on the Plexxi blog and noted important events that will likely carry into this year, including how 2013 initiated SDN deployments...
That attackers are moving "up the stack", toward the application layer, should be no surprise. Increasingly, network layer attacks are a distraction; a means to engage security professionals attention while the real target - an application - is attacked. Even when this is not the case,...
From a news perspective, a year is defined by the stories that make headlines. But markets are frequently moved more by subtext than overt story. Its sometimes the less sexy and more subtle happenings at the fringe of media interest that determine how industries will evolve and ultimat...
With a growing number of software developers and computer applications, computers systems are revised and renewed every day. Computer systems can become so large that they will need the expertise of a computerized Service Desk, which will help integrate a growing organization to get ma...
In this step-by-step guide you will learn how to create Development Virtual Machines for Vagrant with Packer. Sharing a common development environment with everyone on your team is important. It is really hard though to keep the same dependencies, database versions and other systems i...
Continuous Deployment makes software development and your deployment environment safe so anyone can commit code. Read about these and other advantages in this article. I've been wondering for a few years now, why it's so hard to get companies to prioritize the work that I feel is imp...
Microsoft launched the Cloud OS Network today. Cloud Operating System - CloudOS - has a network of more than 25 cloud service providers (CSVs) who will deliver hosted services built on Microsoft Cloud Platform consisting of: Windows Servers with Hyper-V System Center Windows Azure ...
The New Year is fast approaching and it’s time for some wild, speculative predictions on API Management for 2014. As I mentioned in earlier posts, the space is has been rapidly maturing over the second half of 2013 with larger vendors such as IBM, Tibco and Intel making big moves. In ...
A new EMC global survey indicates a majority of enterprise technology leaders see big data as having the potential to boost business operations. The sentiment is highest in India, with 92 percent of respondents there believing the technology will improve decision-making, EMC said Thur...
I had the privilege last week to present alongside Forrester Research's enterprise mobility expert John McCarthy in London. I was able to write a full page of notes from his presentation that I share here with you. The Age of Cheap and Cheerful Mobile is Over! It's now going to be c...
Many people have turned to virtualization for, among other reasons, the increased ease of disaster recovery. Because virtual machines are no more than files on a disk connected to standardized hypervisor hardware, those virtual machines can be shared, copied, moved, and recovered almos...
A few weeks ago, I came across one of those LinkedIn stories that pop up in everyone’s feed. Basically, it was an advice column dedicated to answering a question from someone who asked if he should leave a company that made stupid decisions despite him telling everyone what the right a...
In a perfect world, APM has all the right elements in place, providing value to the business and IT by giving us the metrics we need and showing us the health of our applications. It alerts us to anomalies when slowdowns occur, and shows us trends on performance. But there are other el...
The simplicity of the term "proxy" belies the complex topological options available. Understanding the different deployment options will enable your proxy deployment to fit your environment and, more importantly, your applications. It seems so simple in theory. A proxy is a well-under...