I am often humbled by the depth of insight of those who toil in the trenches
of the enterprise data center.
At our Agility conference back in August, my cohort and I gave a presentation
on the State of Application Delivery. One of the interesting tidbits of data
we offered was that, over the course of the past year, our iHealth data shows
a steady and nearly even split of HTTP and HTTPS traffic. To give you an
example, my data from October was derived from over 3 million (3, 087, 211 to
be precise) virtual servers. Of those, roughly 32% were configured to support
HTTP, and another 30% were supporting HTTPS.
Now, I’ve been looking at this data for more than a year, and it has stayed
roughly the same with only slight variations up or down, but always within a
couple percentage points of each other. But it wasn’t until a particularly
astute customer spoke up that I un... (more)
Like an automobile, a web application needs occasional maintenance and
management over its life cycle. Although it doesn't need oil changes, it will
probably need version upgrades. There may not be manufacturer recalls, but
sometimes servers fail or hang. An application doesn't need to be washed and
detailed, but it does need to be backed up. And both cars and applications
need occasional performance tuning.
This article provides a complete list of the system management functions that
need to be performed on a standard architecture web application, with a
particular emphasis on doing so in an Infrastructure-as-a-Service
Anyone who has implemented an application without sufficient evaluation, only
to realize too late that it does not solve the business problem, will
understand why evaluation is part of the application lifecycle.
Few, if any, information technology subjects have garnered more attention
over the past two years than Big Data. It's a savior. It's evil. It's the
killer app of killer apps. And now, according to Gartner analyst Svetlana
Sicular, "Big Data Is Falling into the Trough of Disillusionment."
This disillusionment is giving me a little bit of Big Data fatigue - at least
in the sense that so much buzz is focused on what Big Data can do for
marketing and business intelligence departments. Lost amid all the hype and
hoopla is the story of how predictive analytics can help IT teams better
understand and support the business applications that are the very lifeblood
of their enterprise. After all, predicting the right service to offer your
online customer won't help if the customer experiences sluggish application
And Big Data is not going away. Big Data begets Ve... (more)
The Catch 22 Between Revenue, Content, and Performance
By Peter Kacandes
A recent Wall Street Journal article discussed the challenges that online
content publishers have in monetizing their content as more and more user
traffic shifts to mobile devices from traditional desktop/laptop
Data from Mary Meeker’s 2015 Internet trends report in particular shows
that the time adult users in the US spend online per day on mobile is up 51%.
And the article cites similar data showing that the time spent on mobile
properties of certain publishers jumped 40% in the last 12 months to 52% of
the time spent viewing their content.
The problem, though, is that revenue from mobile advertising is not rising
nearly quickly enough to offset the decreases from the desktop. There are
several reasons for that, including the limited screen size of mobile, which
limits t... (more)
The following are a few Big Data companies that I was keeping an eye on
starting back in January of 2015 (yeah, this is NOT a statistically
significant sample)....some for "old times sake" because I knew the founding
team and was curious how things were progressing, some because I trust their
venture capital partners, and some because they inspire me with an
application of the technology that is meaningful (I'm tired of hearing about
yet another "Big Data Platform").
Founder(s): Christopher Nguyen, Mike Bui, Tony Do
Headquarters: Sunnyvale, CA
Type of business: Data Intelligence for All
Adatao is Big Data 2.0, enabling the convergence of business intelligence,
data science and machine learning directly on top of big data. Adatao is
leading the Big Data 2.0 charge by making it easy for business users, data
scientists and engineers to co... (more)
If you didn’t hear that Google has announced that in 2010 consumers will
have a chance to enjoy new Chrome-based OS, stop reading and do you homework
Done? Now we can move on, and let’s do it by the rules – positive things
first, then some bile followed by a happy end.
I really like Google. They produce easy to use applications that work great.
I use their search engine about a hundred times a day. Their applications
Nine months ago they released a Web browser called Chrome, and I liked it.
Back than I suggested that in a year Chrome will bite off a decent chunk of
the Web browser's market. (see
I was wrong. They’ve bitten a really small piece of the browser’s pie.
For lots of companies 3% of any market would be like money from home, but for
Google it’s a failure. Now they sa... (more)
The recent spike in insider threats, coupled with a rise in compliance
considerations, has forced organizations to ensure only authorized users
access sensitive application functionality and data. Historically, user
entitlements or authorization logic has been embedded inside an application.
For example, if the user of an application meets specific conditions, such as
a specific role, access to that application function will be granted at
runtime. But if the definition of specific authorization conditions changes
over time, then the application developer needs to modify the application's
source code, test, and re-deploy the application.
Suppose a homegrown portal application must present a sensitive piece of
customer information such as a Social Security Number (SSN) when a service
representative views a customer's profile. It is determined that in order to
ensure ... (more)
This book has delivered exactly what I was hoping for, an in-depth look into
avoid the messy browser applications it is usually a part of the past few
years. That was my primary reason for buying the book. Although I may not
The book has chapters on Lexical Structure, Expressions and Operators,
Statements, Objects, Arrays, Functions, Classes and Modules, Pattern Matching
Documents, Scripting CSS, Handling Events, Scripted HTT... (more)
Web applications are vulnerable to a multitude of security attacks. This
exposes the underlying businesses and the consumer data to public view.
However it is a common observation that web developers hardly take any
preventive steps to secure their web applications.
Most of the time web application developers focus only on authentication and
authorization to secure the web applications. This may be a viable approach
for designing an intranet application. However, for the Internet application,
multiple programming practices need to be followed to prevent such attacks.
This article details in brief the various security vulnerabilities web
applications face and how they can be mitigated.
Bypassing Input Validation
Once the information is sent to the server side, developers do not validate
It's quite clear from reading this book that Peter Gasston is very
knowledgeable about CSS 3 and, as he points out in the preface, this book is
a culmination of five years of work that he has spent writing about CSS3.
There is a clear order to the chapters. The earlier chapters are well
implemented and the items discussed there are used on a regular basis. The
final chapters are more speculative in nature.
The author takes a very methodical approach in the book. He covers numerous
topics in a clear and well-thought-out manner. He provides several examples
for each topic that is covered. There are 17 chapters and an appendix. After
each topic is introduced, the author informs you as to which of the major
browsers implements the feature. The last chapter discusses the future of
CSS3. The appendix collects all of the browser support tables that are found
in each chap... (more)
Customer engagement has long benefited from data and analytics. Knowing more
about each of your customers, their attributes, preferences, behaviors and
patterns, is essential to fostering meaningful engagement with them. As
technologies advance, and more of people's lives are lived online, more and
more data about customers is captured and made available. At face value, this
is good; more data means better analytics, which means better understanding
of customers and therefore more meaningful engagement. However, volumes of
data measured in terabytes, petabytes, and beyond are so big they have
spawned the terms "Big Data" and "Big Analytics." At this scale, there are
practical considerations that must be understood to successfully reap the
benefits for customer engagement. This article will explore some of these
considerations and provide some suggestions on how to a... (more)