Agenda for 3PX|TechCon West 2013 Announced
Agenda for 3PX|TechCon West 2013 Announced; Leading Social, Mobile, Cloud and Big Data Experts Confirmed for West Coast Conference Top Business and Technology Leaders Coming Together to Discuss...
View ArticleAre Java’s Days Numbered?
If you haven’t heard about the recent travails of Oracle’s Java Runtime Environment (JRE), then you’ve probably had your head in the sand. The JRE — the client-side version of Java — has recently...
View ArticleUS Department of Energy: Proving the cloud service broker model
A new sub-market of the broader cloud-computing market has emerged: the cloud service broker (CSB). Envision some kind of cloud middleman, helping to cut through the plethora of cloud options and...
View Article2013 Challenges for Developers, Part III: Future Challenges
For ZapThink President Jason Bloomberg, the mobile piece is all part of the broad-based trend toward new ways of thinking about distributed computing. “From the enterprise perspective, mobile — as...
View ArticleDoes Agile Architecture Equal Agile Plus Architecture?
If what you mean by “Agile Architecture” is software architecture compatible with Agile development methodologies, then you’ll likely end up with higher quality software, but it won’t be any better...
View ArticleHow Moving to the Cloud Is Like Cleaning Out Your Garage
When you buy a house, there’s plenty of room for two cars. But over the years, the clutter builds up, and parking even one car becomes a challenge. So too with data centers. The original motivation...
View ArticleCybersecurity and the Art of Misdirection
Misdirection plays an important role in computer hacking as well. Sometimes the hackers’ motives are clear, while in other cases hackers are obscuring their motivations or targets. In other situations...
View ArticleCloud on a VPN Is a Virtual Private Nightmare
Do you really want to trust your Cloud environment to a VPN? All corporate knowledge workers use VPNs these days, and all of them hate VPNs. Connecting is slow and unreliable. Connections tend to...
View ArticleIs It Time for Cyber-Martial Law?
What do you get when you combine increasingly professional Cyberattacks from China with a Congressional budget stalemate threatening a sequester that will drastically slash our Cyberdefense efforts?...
View ArticleAgile Adoption in the Public Sector: FBI and Port of Rotterdam
The article how the FBI proves agile works for government agencies by Jason Bloomberg on CIO.com is an example of the usage of agile in the public sector. It describes how the FBI’s sentinel project...
View ArticleZapThink Announces Global Training Partnerships
ZapThink, a Dovel Technologies Company, today announced partnerships with leading training and services firms to run courses in London UK, Sydney Australia, Kuala Lumpur Malaysia, Bengaluru and Chennai...
View ArticleThe Agile Architecture Revolution is now available!
Jason Bloomberg’s new book, The Agile Architecture Revolution: How Cloud Computing, REST-Based SOA, and Mobile Computing Are Changing Enterprise IT, was published this week by John Wiley & Sons....
View ArticleShould You Worry About Microsoft Azure’s SSL Certificate Snafu?
Just in case your head wasn’t in the clouds last week, you may have missed this story: the Microsoft Azure Cloud went down for hours, ostensibly as a result of a hacker attack, but in reality the...
View Article公共部門におけるアジャイル導入: FBIとロッテルダム港の事例
(Port of Rotterdam and the case of FBI: agile adoption in the public sector) Jason Bloomberg氏によるCIO.comの記事「How the FBI proves agile works for government...
View ArticleJoin the Agile Architecture Revolution
I am pleased to announce that the roadmap to the new paradigm is here: The Agile Architecture Revolution is finally available! This book cuts through the hype around Agile, architecture, as well as...
View ArticleFighting in the cloud service orientation wars
Summary: Big players are now involved in open source and cloud services orchestration and they’re placing increasingly large bets. This BriefingsDirect guest post comes courtesy of Jason Bloomberg,...
View ArticleIs the SMB Protocol an Open Door to Network Intruders?
In the realm of Cybersecurity, we often fall prey to the 20 doors problem. What are the greatest vulnerabilities on your network? Your website? User passwords? DNS? Phishing attacks? Perhaps. But what...
View ArticleCloud and Open Stack Draw Big Wagers
Combine the supercharged cloud computing marketplace with the ubergeek cred of the open source movement, and you’re bound to have some Mentos-in-Diet-Coke moments. Such is the case with today’s cloud...
View ArticleThe Biggest Cybersecurity Story of the Week
The biggest story of the week is how a hacker managed to get the personal financial details of a number of celebrities ranging from Vice President Joe Biden to Kim Kardashian. Credit reports, Social...
View ArticleThe 5 ‘supertrends’ of enterprise IT
In his latest book, The Agile Architecture Revolution: How Cloud Computing, REST-Based SOA, and Mobile Computing Are Changing Enterprise IT, Jason Bloomberg says we are entering an era when agile...
View Article