Welcome!


Every organization should follow a proactive rather than a reactive approach to protect against threats, risks, and vulnerabilities to which if their IT infrastructure is exposed can lead to data loss, regulatory penalties, lawsuits, and damaged reputation. Moving on the same lines,...

Shellshock, appropriately and of course punnily named, is ravaging the Internet right now. Active exploits continue to grow in number and in complexity. While there are multiple avenues through which this vulnerability can be exploited, the most active one at the moment appears to be ...

#SDAS #HTTP #webperf #SSL De facto standards can be as difficult to transition off of as official ones

If you haven't heard about HTTP 2.0 it's time to start paying attention. It i...

The goal of any DevOps solution is to optimize multiple processes in an organization. And success does not necessarily require that in executing the strategy everything needs to be automated to produce an effective plan. Yet, it is important that processes are put in place to handle a ...
Yet another retailer has confessed that their systems were breached and an untold number of victims join the growing list of those who have had their data was stolen. This one could be bigger than the infamous Target breach. I wonder if some day we’ll be referring to periods of time by...
I was able to attend the Oracle's Open World user conference this week in sunny and warm San Francisco.  This year was a special year.  It was the public unveiling of Oracle's suite of enterprise mobility solutions - both on-premise and cloud.  In this interview with Ora...

Innovative companies who provide their products and services on a recurring basis have continued to generate new sales and drive greater profits since Aria Systems published its Big Book of Recurring Revenue Innovators e-book in Spring of this year. From established names such as Mi...

A growing number of websites allow visitors to log in using a digital identity from a trusted 3rd party -- like Facebook, Microsoft, PayPal, or Google. The fancy term for this is “federated identity,” but most people call it Bring Your Own Identity, or BYOID.
It’s the year 2014, and we’ve yet to have our flying cars and commuter jet packs. But we do have a glimpse of the future with the advent of the “internet of things.” It’s essentially the idea of connecting everyday objects — be it thermostats or kitchen appliances — to the web, in an e...
You can now pick up a Pebble smartwatch for up to $50 less than you could last week. The company announced a price cut for both of its cross-platform watches on Tuesday: The original Pebble now costs $99 — down from $149 — while the Pebble Steel is priced at $199, a $30 drop. Bot...
Every day, we’re introduced to new mobile apps. We get to see the ones highlighted in the app store and hear about the cool new app our friends talk about on social media. Take a guess as to the number of mobile apps that were downloaded globally in 2013. Try 102 billion, according to ...
Tactics without strategy are dangerous. ~ Robert Leonhard

In the new b...
I had the privilege of attending a mobile security event this week and speaking with many experts on the matter. I am not a mobile security expert, so my role was to speak on mobile strategies and trends and to learn as much as I could. What did I learn? I learned the difference b...
For the past few months, I’ve done something which is dorky even by my own dorky standards: I’ve often gone out in public with two wearable devices on my wrist. One has been a smartwatch of some sort. (At the moment, it’s Motorola’s Moto 360.) The other has usually been Jawbone’s Up 24...
Earlier this summer, Berlin-based artist and coder Julian Oliver released Glasshole.sh, a simple and free piece of software designed to detect Google Glass and boot it from any local Wi-Fi network. That DIY idea, says Oliver, was so popular among Glass’s critics that he’s now offering ...
HTC has abandoned plans to make a smartwatch Pocket-lint has learnt. Sources familiar with the matter have told us that although the company was planning to launch a smartwatch for customers, it has now abandoned the idea for the time being. Our source has no official confirmation as t...
On August 28th, Samsung and LG announced their latest generation of smartwatches in separate press releases. The Samsung report flaunts its Gear S, a smartwatch with a curved screen that measures a full two-inches long. Capabilities of the watch include providing notifications from soc...
Last week I was both learning and speaking at the The Internet of @ThingsExpo in New York City. I taught a session on the subject of IoT, Code Halos and Digital Transformation Strategies. Then I had the privilege of interviewing Microsoft's mobile and IoT guru Nick Landry (Twitter @Act...
In June I was presenting at the ThingsExpo conference  at the Javits Center in New York City. During my talk I was demonstrating how to integrate consumer devices into a business workflow. In particular, I was doing live measuring of my own blood pressure to show how to integrate consu...
The evolution of JavaScript and HTML 5 to support a genuine component based framework (Web Components) with the necessary tools to deliver something close to a native experience including genuine realtime networking (UDP using WebRTC). HTML5 is evolving to offer built in templating sup...
The Internet of Things (IoT) is getting personal. Wearables, ingestables, even implantables – devices that not only help us with our fitness, but can monitor and manage disease and its treatment – are right around the corner. And where the IoT goes, money follows. In this case, Big Pha...
The IoT has the potential to transform the world, bringing new functions and efficiency to big problems such as disease, poverty, traffic, and government transparence. It also makes for a nice Christmas gift for “kids in science fair projects.” This latter point was made by Broadcom an...
Such devices and connected technologies exist today, and the sector is driving the leading edge of the Internet of Things under the label of the “Connected Home” or “Smart Home”. Fact is, some pretty traditional low-tech concepts are becoming technology-enabled, such as/including locki...
Google has created what it calls a “Matrix-style,” virtual version of California’s road system that it’s been using to test self-driving cars before sending them out onto the actual road, according to the Guardian. Google is apparently so thrilled with its simulation that it asked Cali...
IT systems will need to adapt, and evolving — or simply adding on to the existing relational database management system architecture — isn’t going to cut it. What does this mean, if not Hadoop or in-memory as the end-all, be-all? TechTarget writer Nicole Laskowski sums it up nicely: Ar...
There has been a lot of talk in the venture capital industry about automating the home and leveraging Internet-enabled devices for various functions. The first wave of this was the use of the smartphone as a remote control to manage, for instance, a thermostat. The thermostat then begi...
For many of us old enough to remember, the early days of life online had little to do with the internet. Before we browsed the open web, we dialed into Prodigy or CompuServe or AOL with a 1400-baud telephone modem. Once connected to a particular service, we used its proprietary sof...
I have been watching Google's Android closely for developments related to enterprise use for some time. Google's Android now dominates smartphone sales to consumers, but rampant security flaws have prevented enterprises from adopting it. In this article, my friend and mobility expert D...
I love receiving gifts in the form of new insights! It doesn't matter if others received the same gift years ago and I am just getting it now. If it is new to me, I get excited. It is like waking up in the morning and discovering a new room in your house. I read an article by Thoma...
We live in interesting times for sure. Who would have thought ten years ago that IBM and Apple would become partners? Here is the announcement as reported in eWeek: Apple and IBM surprised many on July 15, announcing a global partnership that will see the companies attempt to “transf...
Ensuring a safe work environment can be accomplished when individuals work in either a government or private-sector office, but it becomes exponentially more complicated when employees are mobile, traveling from one job or worksite to another. While many organizations implement mobile ...
In Part 1, I looked at what could be behind Facebook’s acquisition of WhatsApp and subsequent purchase of Oculus Rift. How are these seemingly different acquisitions related? There is no question that both Facebook and Google are in a race to build the next-generation computing/communi...
Good morning! Or evening, if you happen to be reading this on the other side of the world. Our topic for today is the internet. What? You already know about the internet? No, no, I don’t mean that internet, the boring old one you use to access YouTube and send Facebook updates, e...
Having an effective BYOD policy is one of the most critical steps to ensuring BYOD success. Learn the basics for securing your company's data and clarifying the process. Employees like the ability to choose. Whether it be choosing the hours they work or whether or not they can teleco...
OTT and Operator partnerships are becoming more commonplace, with new joint deals being announced every week. Some operators are still not ready to fully embrace this model - why? Operators understand the benefits of the partnership model: the competitive relationship between OTT and ...
My colleague Peter Rogers shares how his team is developing strategies for merging creative forces with real-world projects and delivering rapid beta products. This is a big challenge as many of you know! Enjoy! I begin with the following question: What happens when Creativity meets T...
As an individual I can decide which platform I would like to target with my shiny new application, but when working for a company we have to target both industry leaders at the same time. Although I like a good challenge, I am really glad the mobile world now only consists of iOS and A...
Welcome to the fourth era of digital. The first three periods or ages or phases — call them what you like — were each defined clearly by transformative events. First, the dawn of the personal computer age in April 1977 with the debut of the Apple II (and validated in August 1981 with...
I show you how to find F5 booth 800 at Velocity Conference 2014 in Santa Clara. Velocity focuses on Web Operations and Performance with half of the attendees involved with web and mobile development. We are showcasing our acceleration and optimization solutions making any app a fast ap...
In this fast changing world of transformation, digital transformation, the rules of business are being changed before our eyes due to the impact of mobile technologies, big data, social media, the Internet of Things, cloud computing, etc. The strategies of yesteryear are no longer del...