ALERT

[WEBINAR] Fast Analytics for Big Data and Small

Justin Stoltzfus

Justin Stoltzfus is an independent blogger and business consultant assisting a range of businesses in developing media solutions for new campaigns and ongoing operations. He is a graduate of James Madison University.

Stoltzfus spent several years as a staffer at the Intelligencer Journal in Lancaster, Penn., before the merger of the city’s two daily newspapers in 2007. He also reported for the twin weekly newspapers in the area, the Ephrata Review and the Lititz Record. More recently, he has cultivated connections with various companies as an independent consultant, writer and trainer, collecting bylines in print and Web publications, and establishing a reputation for excellence in corporate training, marketing campaigns and other media projects.

Connect:

Articles by Justin Stoltzfus


5 Ways to Go Undetected Online 5 Ways to Go Undetected Online 5 Ways to Go Undetected Online 5 Ways to Go Undetected Online


Online privacy and security are big concerns these days, but protecting yourself online is easier than you might think

Turbonomic: Bringing Autonomics to Virtualization Turbonomic: Bringing Autonomics to Virtualization Turbonomic: Bringing Autonomics to Virtualization Turbonomic: Bringing Autonomics to Virtualization


VMTurbo has become Turbonomic. This name change also signifies a shift toward autonomic computing - systems managing their own resources...

Naming Conventions: What's the Big Deal? Naming Conventions: What's the Big Deal? Naming Conventions: What's the Big Deal? Naming Conventions: What's the Big Deal?


Conventions are guidelines that are meant to be followed, but what happens when they're not? In programming, Yoda conditions alter the...

The Work of Ten Pros: 10x Developers - Are They Real? The Work of Ten Pros: 10x Developers - Are They Real? The Work of Ten Pros: 10x Developers - Are They Real? The Work of Ten Pros: 10x Developers - Are They Real?


The 10x developer - a developer who's ten times as productive as average developers - is somewhat of a mythological figure in the world of...

5 Ways Companies Can Cut Cloud Costs 5 Ways Companies Can Cut Cloud Costs 5 Ways Companies Can Cut Cloud Costs 5 Ways Companies Can Cut Cloud Costs


Cloud services have become indispensable for business, but with ever-increasing pressure to keep budgets in line, tech professionals are...

Internet in the Developing World - Questions Around Access and Net Neutrality Internet in the Developing World - Questions Around Access and Net Neutrality Internet in the Developing World - Questions Around Access and Net Neutrality Internet in the Developing World - Questions Around Access and Net Neutrality


Is it better to have access to limited parts of the Internet than to have no access at all? This is a hotly debated question surrounding...

5 Ways Our Cars Have Become Computers 5 Ways Our Cars Have Become Computers 5 Ways Our Cars Have Become Computers 5 Ways Our Cars Have Become Computers


Cars are constantly becoming more high tech, but not everyone agrees these "upgrades" are for the best

New Generators Put Modern Algorithms to Work on ASCII Art New Generators Put Modern Algorithms to Work on ASCII Art New Generators Put Modern Algorithms to Work on ASCII Art New Generators Put Modern Algorithms to Work on ASCII Art


ASCII art, once a response to the limitations of computers, is showing a resurgence in popularity with new algorithms that can...

Uncle Sam in the Cloud? Federal Trends in Cloud Use Uncle Sam in the Cloud? Federal Trends in Cloud Use Uncle Sam in the Cloud? Federal Trends in Cloud Use Uncle Sam in the Cloud? Federal Trends in Cloud Use


The U.S. government is beginning to utilize cloud computing for its convenience and cost savings

Should You Worry About Rowhammer? Should You Worry About Rowhammer? Should You Worry About Rowhammer? Should You Worry About Rowhammer?


Rowhammer is a memory problem that could be exploited via the Web. Learn about what it is and what's being done to counter it

A Loon-y Proposition - Your Future Wireless May Be Brought To You By a Hot Air Balloon A Loon-y Proposition - Your Future Wireless May Be Brought To You By a Hot Air Balloon A Loon-y Proposition - Your Future Wireless May Be Brought To You By a Hot Air Balloon A Loon-y Proposition - Your Future Wireless May Be Brought To You By a Hot Air Balloon


Google is known for unique and ambitious projects, and Loon is no exception - it uses hot air balloons to broadcast Wi-Fi signals,...

Distance Charging - Juice Up Your Smartphone From the Next Room? Distance Charging - Juice Up Your Smartphone From the Next Room? Distance Charging - Juice Up Your Smartphone From the Next Room? Distance Charging - Juice Up Your Smartphone From the Next Room?


What if you could charge your smartphone throughout the day, without ever having to remove it from your pocket or purse? That's what the...

What Exactly Is Application-Centric IT Management? What Exactly Is Application-Centric IT Management? What Exactly Is Application-Centric IT Management? What Exactly Is Application-Centric IT Management?


Application-centric IT management is a new trend in IT, but just what is it? Industry leaders explain how it works and what it means to...

Why Hybrid Hosting Is Becoming a Popular Cloud Hosting Solution Why Hybrid Hosting Is Becoming a Popular Cloud Hosting Solution Why Hybrid Hosting Is Becoming a Popular Cloud Hosting Solution Why Hybrid Hosting Is Becoming a Popular Cloud Hosting Solution


Hybrid hosting most commonly refers to the use of both public and private cloud hosting solutions. But how does this work, and how can it...

Solar Clothes? Perovskite Adds Potential for Charging Fibers Solar Clothes? Perovskite Adds Potential for Charging Fibers Solar Clothes? Perovskite Adds Potential for Charging Fibers Solar Clothes? Perovskite Adds Potential for Charging Fibers


Perovskite is a mineral with unique properties, including the ability to collect solar energy. See the potential applications of this...

Does Your Web Project Need Sass? Does Your Web Project Need Sass? Does Your Web Project Need Sass? Does Your Web Project Need Sass?


While HTML and CSS have been used for years, Sass is relatively new to the Web development scene. It can greatly simplify the development...

Born in the Cloud: The Next Generation of Cloud Services Born in the Cloud: The Next Generation of Cloud Services Born in the Cloud: The Next Generation of Cloud Services Born in the Cloud: The Next Generation of Cloud Services


There's a new category of cloud vendors known as "born in the cloud." What sets this new generation of vendors apart from legacy cloud...

5 Research Tools for Enterprise in a New Business World 5 Research Tools for Enterprise in a New Business World 5 Research Tools for Enterprise in a New Business World 5 Research Tools for Enterprise in a New Business World


While businesses today are focused on data, many are neglecting research. Here we discuss five research tools that can help with research

SEO's Not Dead, It's Just Changing SEO's Not Dead, It's Just Changing SEO's Not Dead, It's Just Changing SEO's Not Dead, It's Just Changing


SEO has been a standard practice to elevate search rankings, but with recent changes in Google's search algorithms, SEO is shifting away...

New Visual Basic: New Name, New Features New Visual Basic: New Name, New Features New Visual Basic: New Name, New Features New Visual Basic: New Name, New Features


Microsoft is releasing its newest version of Visual Basic with the Visual Studio 2015 package. Visual Basic 14 includes new features to...

5 Big Cloud Security Features for Enterprise Use 5 Big Cloud Security Features for Enterprise Use 5 Big Cloud Security Features for Enterprise Use 5 Big Cloud Security Features for Enterprise Use


The cloud is gaining wide popularity as an enterprise tool, but for cloud use to be effective, proper security measures must be taken

Does a Car Really Need a 'Smart Key'? Does a Car Really Need a 'Smart Key'? Does a Car Really Need a 'Smart Key'? Does a Car Really Need a 'Smart Key'?


Smart keys may seem like modern marvels of technology, but they're not always as smart as their name implies. Smart keys can cause numerous...

3 Big Headaches for Virtualization Software Users 3 Big Headaches for Virtualization Software Users 3 Big Headaches for Virtualization Software Users 3 Big Headaches for Virtualization Software Users


Businesses are rapidly turning to virtualization software to solve their problems, but they often don't consider any of the challenges that...

Aggregated Security with OpenDNS Aggregated Security with OpenDNS Aggregated Security with OpenDNS Aggregated Security with OpenDNS


Enterprise security is a multifaceted endeavor, often requiring multiple tools to protect against threats. OpenDNS is a tool that attempts...

Ditch Your Inbox? No-Email Initiatives and What They're For Ditch Your Inbox? No-Email Initiatives and What They're For Ditch Your Inbox? No-Email Initiatives and What They're For Ditch Your Inbox? No-Email Initiatives and What They're For


For many in the business world, email equals stress. Some are trying to reduce dependence on email in order to help employees de-stress,...

The Future is Bright for OLED Displays The Future is Bright for OLED Displays The Future is Bright for OLED Displays The Future is Bright for OLED Displays


OLEDs are still a relatively new technology, but with their flexibility and energy efficiency, the possibilities are limitless

Why Use Cloud Access Security Brokers? Why Use Cloud Access Security Brokers? Why Use Cloud Access Security Brokers? Why Use Cloud Access Security Brokers?


Cloud access security brokers are gaining popularity, but what exactly are they and how do they help keep you secure in the

5 Things Mobile Virtualization Will Do 5 Things Mobile Virtualization Will Do 5 Things Mobile Virtualization Will Do 5 Things Mobile Virtualization Will Do


Mobile virtualization opens up a whole new world of options for mobile computing and communications. It can has the potential to help with...

Virtualization Versus the Cloud Virtualization Versus the Cloud Virtualization Versus the Cloud Virtualization Versus the Cloud


These two terms are closely linked, but confusing them is a recipe for disaster in terms of understanding vendor models and pricing

Cloud Computing and Carbon Footprints: Why Cloud Solutions Are Green Solutions Cloud Computing and Carbon Footprints: Why Cloud Solutions Are Green Solutions Cloud Computing and Carbon Footprints: Why Cloud Solutions Are Green Solutions Cloud Computing and Carbon Footprints: Why Cloud Solutions Are Green Solutions


Cloud computing is becoming a major trend in business, but not only is it economical, it is also environmentally friendly

5 Ways to Get Value Out of Your Business Data 5 Ways to Get Value Out of Your Business Data 5 Ways to Get Value Out of Your Business Data 5 Ways to Get Value Out of Your Business Data


Your business is surely collecting data. But the question is, what are you doing with that data? Here we examine ways to put that data to...

5 Geek Terms That Are Cooler Than They Sound 5 Geek Terms That Are Cooler Than They Sound 5 Geek Terms That Are Cooler Than They Sound 5 Geek Terms That Are Cooler Than They Sound


You shouldn't judge a book by its cover, and by the same token, shouldn't judge technology by its name. Here are some technologies that...

Recycling Old Tech - It's the Law Recycling Old Tech - It's the Law Recycling Old Tech - It's the Law Recycling Old Tech - It's the Law


Many people are accustomed to throwing out their old technology with the trash, but new laws are enforcing proper disposal of unwanted...

5 Weird Ways Technology Is Changing Our Behavior 5 Weird Ways Technology Is Changing Our Behavior 5 Weird Ways Technology Is Changing Our Behavior 5 Weird Ways Technology Is Changing Our Behavior


High-tech consumer devices have changed a lot of us in very fundamental ways, perhaps more than we realize - or would like to admit. Check...

I Hear Dead People? Natural Language Tech Makes Past and Present Voices Come Alive I Hear Dead People? Natural Language Tech Makes Past and Present Voices Come Alive I Hear Dead People? Natural Language Tech Makes Past and Present Voices Come Alive I Hear Dead People? Natural Language Tech Makes Past and Present Voices Come Alive


Forget canned voices; reproducing real ones is the new goal for natural language processing. Learn more about this technology here

No, That's Not My Hand In There! Why Sockpuppet Marketing Is Bad News No, That's Not My Hand In There! Why Sockpuppet Marketing Is Bad News No, That's Not My Hand In There! Why Sockpuppet Marketing Is Bad News No, That's Not My Hand In There! Why Sockpuppet Marketing Is Bad News


Sockpuppet marketing is shilling in sheep's clothing. Here, we review this online scourge, its legal ramifications and advice from Google's...

Sudden Interface Changes: Why Disorienting Users Can Hurt Sudden Interface Changes: Why Disorienting Users Can Hurt Sudden Interface Changes: Why Disorienting Users Can Hurt Sudden Interface Changes: Why Disorienting Users Can Hurt


Sudden interface changes can be a nightmare for unprepared users, and service providers often find that the smallest alterations generate...

The Analytical Engine: A Look Back at Babbage's Timeless Designs The Analytical Engine: A Look Back at Babbage's Timeless Designs The Analytical Engine: A Look Back at Babbage's Timeless Designs The Analytical Engine: A Look Back at Babbage's Timeless Designs


We look back at the analytical engine for a better view of how humanity created our ever-evolving machines

Computer Programming for the People? Computer Programming for the People? Computer Programming for the People? Computer Programming for the People?


This movement has its critics, but it's looking to empower a new generation of computer users. Hear more from both sides of the debate

The Simple Answer to Many Major Security Breaches? Thumb Drives The Simple Answer to Many Major Security Breaches? Thumb Drives The Simple Answer to Many Major Security Breaches? Thumb Drives The Simple Answer to Many Major Security Breaches? Thumb Drives


Many of the biggest security breaches occurred through a USB stick. Find out how companies are protecting themselves

E-Textiles: Will Your Clothes Be Smarter Than You? E-Textiles: Will Your Clothes Be Smarter Than You? E-Textiles: Will Your Clothes Be Smarter Than You? E-Textiles: Will Your Clothes Be Smarter Than You?


Get ready for clothes that "talk" and "listen." New e-textiles are quickly changing what wearable devices can and can't do

When SQL Isn't Enough: Controls for Massive New Data Centers When SQL Isn't Enough: Controls for Massive New Data Centers When SQL Isn't Enough: Controls for Massive New Data Centers When SQL Isn't Enough: Controls for Massive New Data Centers


How do companies and government agencies conquer the limitations of the traditional data handling pathway? Here we'll take a look at one...

The New Technology That Could Double Wireless Spectrum Efficiency The New Technology That Could Double Wireless Spectrum Efficiency The New Technology That Could Double Wireless Spectrum Efficiency The New Technology That Could Double Wireless Spectrum Efficiency


New digital tools could change the face of the wireless industry, where a growing lack of resources is making telecom providers distinctly...

Eat This Tweet: Creating Life Cycles for Social Media Messages Eat This Tweet: Creating Life Cycles for Social Media Messages Eat This Tweet: Creating Life Cycles for Social Media Messages Eat This Tweet: Creating Life Cycles for Social Media Messages


New technologies are helping users destroy digital messages and images they send after a short time, but what really happens to these...

VIDEO: Rajat Taneja on Video Games as the Biggest Big Data Challenge VIDEO: Rajat Taneja on Video Games as the Biggest Big Data Challenge VIDEO: Rajat Taneja on Video Games as the Biggest Big Data Challenge VIDEO: Rajat Taneja on Video Games as the Biggest Big Data Challenge


Entertainment Arts Chief Technology Officer Rajat Taneja offered detailed insights into what’s going on now in the video gaming industry,...

Bye Bye Boss, Hello Office of the Future Bye Bye Boss, Hello Office of the Future Bye Bye Boss, Hello Office of the Future Bye Bye Boss, Hello Office of the Future


Day-to-management is changing fast, but is the end of the brick-and-mortar office drawing

Gaming Principles and the Future Virtual World Gaming Principles and the Future Virtual World Gaming Principles and the Future Virtual World Gaming Principles and the Future Virtual World


In exploring the boundaries of what's possible in a game world, developers can get closer to answering some broader questions about...

5 Things to Look for in CISPA's Replacement 5 Things to Look for in CISPA's Replacement 5 Things to Look for in CISPA's Replacement 5 Things to Look for in CISPA's Replacement


CISPA failed in the Senate, but that doesn't mean it's dead. Here's what to look for in the next go-round

What You Should Know About Service Level Agreements What You Should Know About Service Level Agreements What You Should Know About Service Level Agreements What You Should Know About Service Level Agreements


SLAs may be dense, awkward documents, but they play a big role in how third-party vendors offer services to corporations and businesses....

Video: George Dyson on Big Data's Birth and Where It's Headed Video: George Dyson on Big Data's Birth and Where It's Headed Video: George Dyson on Big Data's Birth and Where It's Headed Video: George Dyson on Big Data's Birth and Where It's Headed


This video from the London 2012 Strata Conference provides a rich history of data storage and data handling and a look at the challenges...

Video: Drew Conway and Jake Porway on Data Without Borders Video: Drew Conway and Jake Porway on Data Without Borders Video: Drew Conway and Jake Porway on Data Without Borders Video: Drew Conway and Jake Porway on Data Without Borders


This talk from the 2011 Strata Conference in New York looks at how big data can be used to solve big problems

What Do Massive Open Online Courses (MOOCs) Mean for Education? What Do Massive Open Online Courses (MOOCs) Mean for Education? What Do Massive Open Online Courses (MOOCs) Mean for Education? What Do Massive Open Online Courses (MOOCs) Mean for Education?


MOOCs are offering a brave new option at a time when traditional college degrees have lost a little of their shine. Learn more about them...

Video: Sugata Mitra on the Cloud-Based Schools of the Future Video: Sugata Mitra on the Cloud-Based Schools of the Future Video: Sugata Mitra on the Cloud-Based Schools of the Future Video: Sugata Mitra on the Cloud-Based Schools of the Future


Dr. Sugata Mitra, an educational researcher and professor of educational technology at Newcastle University, took to the stage at TED2013...

Video: Vijay Kumar on Agile Aerial Robots, Artificial Intelligence Video: Vijay Kumar on Agile Aerial Robots, Artificial Intelligence Video: Vijay Kumar on Agile Aerial Robots, Artificial Intelligence Video: Vijay Kumar on Agile Aerial Robots, Artificial Intelligence


In a February 2012 TED talk in Long Beach, California, University of Pennsylvania professor Vijay Kumar talks about agile aerial robots and...

Video: Ray Kurzweil on 'Exponential' Tech Advancement Video: Ray Kurzweil on 'Exponential' Tech Advancement Video: Ray Kurzweil on 'Exponential' Tech Advancement Video: Ray Kurzweil on 'Exponential' Tech Advancement


At last year’s SXSW event, eminent IT guru Ray Kurzweil spoke about continued advances in technology and how they can be predicted. View...

Video: Mike Olson, CEO of Cloudera, on Hadoop and Future Research Possibilities Video: Mike Olson, CEO of Cloudera, on Hadoop and Future Research Possibilities Video: Mike Olson, CEO of Cloudera, on Hadoop and Future Research Possibilities Video: Mike Olson, CEO of Cloudera, on Hadoop and Future Research Possibilities


The Hadoop analytics platform has some significant limitations involving speed and complexity, but industry leaders are working to change...

An Introduction to Candidate Keys An Introduction to Candidate Keys An Introduction to Candidate Keys An Introduction to Candidate Keys


Learn the basics of candidate keys and how they operate in a database

Video: Kate Crawford of Microsoft on Big Data Vs. Data With Depth Video: Kate Crawford of Microsoft on Big Data Vs. Data With Depth Video: Kate Crawford of Microsoft on Big Data Vs. Data With Depth Video: Kate Crawford of Microsoft on Big Data Vs. Data With Depth


Principal researcher at Microsoft Research Kate Crawford makes the case that while big data is essential to many business applications,...

Unraveling SoLoMo and the Future of Search Unraveling SoLoMo and the Future of Search Unraveling SoLoMo and the Future of Search Unraveling SoLoMo and the Future of Search


SoLoMo is a mashup of the terms "social," "mobile" and "local." Find out more about what it means - and why people are talking about it

An Introduction to Transaction Processing An Introduction to Transaction Processing An Introduction to Transaction Processing An Introduction to Transaction Processing


Many different types of businesses invest in a transaction process system as part of IT merchant services or other parts of the software...

Raiding the 'Headquarters' of Click Fraud Operations Raiding the 'Headquarters' of Click Fraud Operations Raiding the 'Headquarters' of Click Fraud Operations Raiding the 'Headquarters' of Click Fraud Operations


Click fraud may be a virtual crime, but its effects are becoming increasingly real for consumers and businesses

Trans-Atlantic Cable: The Real Infrastructure of the Internet Trans-Atlantic Cable: The Real Infrastructure of the Internet Trans-Atlantic Cable: The Real Infrastructure of the Internet Trans-Atlantic Cable: The Real Infrastructure of the Internet


The trans-Atlantic cable is nothing new, but it may just be the next wave in a move to increase connectivity and transmission speed...

Why Tech Companies Use Code Names Why Tech Companies Use Code Names Why Tech Companies Use Code Names Why Tech Companies Use Code Names


These code names are imbued with a sense of mystery, but what do they really mean? Here we take a look at how - and why - the tech industry...

Slow Dancing With Technology: Debugging, the Programmer and the Machine Slow Dancing With Technology: Debugging, the Programmer and the Machine Slow Dancing With Technology: Debugging, the Programmer and the Machine Slow Dancing With Technology: Debugging, the Programmer and the Machine


Thoughtful leaders have dreamed up a more fluid software release structure to bridge the development and production environments, but...

What Mean Time Between Failures Really Means What Mean Time Between Failures Really Means What Mean Time Between Failures Really Means What Mean Time Between Failures Really Means


Have you seen the figure MTBF on computer and electronics packaging? Chances are, it doesn't mean what you think it does

DevOps 101 DevOps 101 DevOps 101 DevOps 101


Although the basic idea of DevOps is straightforward, people use and discuss the term in a lot of different ways. Here we take a look at...

Nanotechnology: The Biggest Little Innovation in Tech Nanotechnology: The Biggest Little Innovation in Tech Nanotechnology: The Biggest Little Innovation in Tech Nanotechnology: The Biggest Little Innovation in Tech


Like many buzzwords, most people are familiar with the term nanotechnology without knowing what it really means, or how advances in...

How Much Do Online Marketers Know About You? How Much Do Online Marketers Know About You? How Much Do Online Marketers Know About You? How Much Do Online Marketers Know About You?


Marketers have always gathered data about potential customers, but what they know is getting increasingly specific - and personal

Revolution In Hard Drives: Frickin' Laser Beams Revolution In Hard Drives: Frickin' Laser Beams Revolution In Hard Drives: Frickin' Laser Beams Revolution In Hard Drives: Frickin' Laser Beams


Some new technologies suggest that a terabyte per second data transmission speed may now be within reach. And yes, these technologies...

New Advances in Biometrics: A More Secure Password New Advances in Biometrics: A More Secure Password New Advances in Biometrics: A More Secure Password New Advances in Biometrics: A More Secure Password


Biometric systems could replace cumbersome passwords, but these security measures have drawbacks of their own. Learn more about what's on...

Raspberry Pi Revolution: Return to Computer Basics? Raspberry Pi Revolution: Return to Computer Basics? Raspberry Pi Revolution: Return to Computer Basics? Raspberry Pi Revolution: Return to Computer Basics?


This device hearkens back to the time of the Commodore and the Atari, when a machine's fundamental controls were not hidden by windows and...

Using Product Management Features in a CRM Solution Using Product Management Features in a CRM Solution Using Product Management Features in a CRM Solution Using Product Management Features in a CRM Solution


Knowing more about how a product fits into a greater high-tech methodology for today’s businesses, as well as understanding how product...

Is the Cloud Catching on in Your Doctor's Office? Is the Cloud Catching on in Your Doctor's Office? Is the Cloud Catching on in Your Doctor's Office? Is the Cloud Catching on in Your Doctor's Office?


Medical cloud services are making headway in health care with the migration to electronic medical records for doctors and physician...

The Carbon Footprint of a Web Search: Who's Green? The Carbon Footprint of a Web Search: Who's Green? The Carbon Footprint of a Web Search: Who's Green? The Carbon Footprint of a Web Search: Who's Green?


The energy used by a set of servers responding to a keyword search may be marginal, but they all add up to significant energy use

Cloud Computing for Vehicles: Tomorrow's High-Tech Car Cloud Computing for Vehicles: Tomorrow's High-Tech Car Cloud Computing for Vehicles: Tomorrow's High-Tech Car Cloud Computing for Vehicles: Tomorrow's High-Tech Car


The idea of using cloud-based services in vehicles is just starting to catch on, providing inspiration for a lot of potential innovations...

Q&A by Justin Stoltzfus


What are some best practices for cloud encryption? What are some best practices for cloud encryption? What are some best practices for cloud encryption? What are some best practices for cloud encryption?


With so many companies moving data to the cloud in one way or another, encryption has become a major part of the overall effort of...

Why do cloud providers seek FEDRamp certification? Why do cloud providers seek FEDRamp certification? Why do cloud providers seek FEDRamp certification? Why do cloud providers seek FEDRamp certification?


Many cloud providers look to become certified with FEDRamp, a federal cybersecurity program. The essential reason that so many companies...

How might a team make an app How might a team make an app How might a team make an app How might a team make an app


Many companies are trying to figure out how to send applications and workloads to the cloud. When it comes to designing applications for...

How does visibility help with the uncertainty of handing data to a cloud provider? How does visibility help with the uncertainty of handing data to a cloud provider? How does visibility help with the uncertainty of handing data to a cloud provider? How does visibility help with the uncertainty of handing data to a cloud provider?


When it comes time to migrate to the cloud by augmenting on-premises systems with cloud services from vendors, having good visibility can...

How can companies maintain application availability standards? How can companies maintain application availability standards? How can companies maintain application availability standards? How can companies maintain application availability standards?


Maintaining availability for applications can have a broad and significant effect on business processes. In general, making sure that...

Why is Python so popular in machine learning? Why is Python so popular in machine learning? Why is Python so popular in machine learning? Why is Python so popular in machine learning?


There are a number of reasons why the Python programming language is popular with professionals who work on machine learning systems. One...

What's the difference between a CPU and a GPU? What's the difference between a CPU and a GPU? What's the difference between a CPU and a GPU? What's the difference between a CPU and a GPU?


Despite having similar acronyms, a CPU and a GPU are quite different. The biggest difference between a CPU and a GPU has to do with the...

What’s the difference between artificial intelligence, machine learning and deep learning? What’s the difference between artificial intelligence, machine learning and deep learning? What’s the difference between artificial intelligence, machine learning and deep learning? What’s the difference between artificial intelligence, machine learning and deep learning?


The terms “artificial intelligence,” “machine learning” and “deep learning” describe a process that has built on itself over the past few...

Why does loosely coupled architecture help to scale some types of systems? Why does loosely coupled architecture help to scale some types of systems? Why does loosely coupled architecture help to scale some types of systems? Why does loosely coupled architecture help to scale some types of systems?


A loosely coupled architecture is generally helpful in scaling many kinds of hardware and software systems. This is one of the primary...

How might companies deal with hardware dependencies while moving toward a virtualization model? How might companies deal with hardware dependencies while moving toward a virtualization model? How might companies deal with hardware dependencies while moving toward a virtualization model? How might companies deal with hardware dependencies while moving toward a virtualization model?


In order to truly make use of the principle of network virtualization, companies need to move away from the hardware dependencies that are...

Why could a Why could a Why could a Why could a


Virtualized systems can provide big benefits for companies. However, this isn't true in all cases. Businesses have to look at the key...

Why does virtualization speed up server deployment? Why does virtualization speed up server deployment? Why does virtualization speed up server deployment? Why does virtualization speed up server deployment?


In many cases, companies can greatly increase the speed of server deployment by utilizing virtualized systems. One of the best ways to...

What is the virtualization What is the virtualization What is the virtualization What is the virtualization


The virtualization backlash in IT is the idea that some companies may be moving away from that classic virtualization structure, either...

Why should cloud services offer both elasticity and scalability? Why should cloud services offer both elasticity and scalability? Why should cloud services offer both elasticity and scalability? Why should cloud services offer both elasticity and scalability?


Although elasticity and scalability are two different principles, some IT professionals and other stakeholders tend to think of them as...

How might a company utilize a virtualization resource summary? How might a company utilize a virtualization resource summary? How might a company utilize a virtualization resource summary? How might a company utilize a virtualization resource summary?


Companies may use a virtualization resource summary or some similar tool to look at how a virtualization system is working. A...

What are some of the positives of a demand-driven migration model? What are some of the positives of a demand-driven migration model? What are some of the positives of a demand-driven migration model? What are some of the positives of a demand-driven migration model?


Using a demand-driven migration model can help businesses to refine the ways in which they move data and upgrade from legacy systems to new...

Why do undersized VMs lead to latency and other problems? Why do undersized VMs lead to latency and other problems? Why do undersized VMs lead to latency and other problems? Why do undersized VMs lead to latency and other problems?


Having undersized VMs in a virtualization system is a classic example of improper resource allocation that leads to concrete performance...

What are some of the values of real-time hybrid cloud monitoring? What are some of the values of real-time hybrid cloud monitoring? What are some of the values of real-time hybrid cloud monitoring? What are some of the values of real-time hybrid cloud monitoring?


Real-time monitoring of hybrid cloud systems enables businesses to do more with the software architectures they use to support operations....

How do you mitigate wireless interference sources in an enterprise network? How do you mitigate wireless interference sources in an enterprise network? How do you mitigate wireless interference sources in an enterprise network? How do you mitigate wireless interference sources in an enterprise network?


It's a common problem – networks get a lot of pressure from the flood of wireless data that's floating around in any given local area. From...

What performance issues do users face due to wireless interference problems in an enterprise setting? What performance issues do users face due to wireless interference problems in an enterprise setting? What performance issues do users face due to wireless interference problems in an enterprise setting? What performance issues do users face due to wireless interference problems in an enterprise setting?


Wireless and radio interference problems can be a significant source of problems and frustrations for those administrating an enterprise...

What kinds of devices can interfere with wireless signals? What kinds of devices can interfere with wireless signals? What kinds of devices can interfere with wireless signals? What kinds of devices can interfere with wireless signals?


The reality is that many different kinds of common household items and other types of devices can interfere with a given wireless signal or...

What are some basic ideas for optimizing hybrid cloud? What are some basic ideas for optimizing hybrid cloud? What are some basic ideas for optimizing hybrid cloud? What are some basic ideas for optimizing hybrid cloud?


With so many cloud options at their disposal, many companies are now opting to choose a hybrid cloud approach that merges public and...

How can companies deal with “dynamic unpredictability?” How can companies deal with “dynamic unpredictability?” How can companies deal with “dynamic unpredictability?” How can companies deal with “dynamic unpredictability?”


In many corporate IT situations, this is the million-dollar question – how to handle the dynamic unpredictability that comes from putting...

Why might a company assess right-sizing on-premises versus in the cloud? Why might a company assess right-sizing on-premises versus in the cloud? Why might a company assess right-sizing on-premises versus in the cloud? Why might a company assess right-sizing on-premises versus in the cloud?


IT professionals hear a lot about right-sizing systems on cloud platforms, but many companies are still choosing to utilize on-premises...

Why do some companies choose Azure or AWS over open-source technologies like OpenStack? Why do some companies choose Azure or AWS over open-source technologies like OpenStack? Why do some companies choose Azure or AWS over open-source technologies like OpenStack? Why do some companies choose Azure or AWS over open-source technologies like OpenStack?


To some companies, the open-source OpenStack platform for the cloud offers significant savings and other benefits. But other firms are more...

What are some advantages and drawbacks of stateless applications? What are some advantages and drawbacks of stateless applications? What are some advantages and drawbacks of stateless applications? What are some advantages and drawbacks of stateless applications?


In the fundamental design of user interfaces, engineers can choose from stateless or stateful systems. A stateless system is one that has...

Why is it important to look at the Why is it important to look at the Why is it important to look at the Why is it important to look at the


In hardware virtualization systems, it's important to understand the entire context of the environment that virtual machines and other...

How do companies develop a How do companies develop a How do companies develop a How do companies develop a


Modern companies can assess their data center and virtualization operations in many different ways. Many of the most popular models involve...

How does automation help individual system operators? How does automation help individual system operators? How does automation help individual system operators? How does automation help individual system operators?


One of the core values of enterprise automation is its ability to decrease the labor burden on individuals. Traditional system operators...

How can companies tally up cloud costs for multi-cloud or complex cloud systems? How can companies tally up cloud costs for multi-cloud or complex cloud systems? How can companies tally up cloud costs for multi-cloud or complex cloud systems? How can companies tally up cloud costs for multi-cloud or complex cloud systems?


Companies can pursue cost accounting for cloud services in different ways. Some of the most primitive approaches involve entering raw data...

Why is a good HTML5 interface important for a business project? Why is a good HTML5 interface important for a business project? Why is a good HTML5 interface important for a business project? Why is a good HTML5 interface important for a business project?


HTML5 is a common foundation for a business interface for various reasons. Businesses can really benefit from building an interface with...

What are some values of cloud-native architecture? What are some values of cloud-native architecture? What are some values of cloud-native architecture? What are some values of cloud-native architecture?


Working at building cloud-native architectures can help a business to redesign and improve how it sets up and uses its IT systems. The...

Why is reserve capacity important in systems? Why is reserve capacity important in systems? Why is reserve capacity important in systems? Why is reserve capacity important in systems?


Many IT professionals consider it important to build reserve capacity into hardware virtualization systems. This is part of overall...

What are some common challenges in decommissioning applications? What are some common challenges in decommissioning applications? What are some common challenges in decommissioning applications? What are some common challenges in decommissioning applications?


The decommissioning of applications can be a significant burden for an enterprise, especially one that has tended to update and upgrade or...

Why do naming conventions for virtual machines help with IT organization? Why do naming conventions for virtual machines help with IT organization? Why do naming conventions for virtual machines help with IT organization? Why do naming conventions for virtual machines help with IT organization?


In the setup of multiple virtual machines in a network virtualization environment, naming conventions are important. They help to make the...

How can companies cultivate a better approach to “object-based” network changes? How can companies cultivate a better approach to “object-based” network changes? How can companies cultivate a better approach to “object-based” network changes? How can companies cultivate a better approach to “object-based” network changes?


By changing the ways that IT assets are labeled and handled in architectures, companies can greatly improve the use of network “objects” to...

Why is it important to match uptime to infrastructure? Why is it important to match uptime to infrastructure? Why is it important to match uptime to infrastructure? Why is it important to match uptime to infrastructure?


The importance of matching uptime to infrastructure has to do with how companies ensure efficiencies when they are dealing with...

How can companies work to achieve a desired state? How can companies work to achieve a desired state? How can companies work to achieve a desired state? How can companies work to achieve a desired state?


A desired state in IT is a term for a kind of network equilibrium – in a desired state, everything is aligned as perfectly as possible, to...

What can virtual machine use cases tell companies about systems? What can virtual machine use cases tell companies about systems? What can virtual machine use cases tell companies about systems? What can virtual machine use cases tell companies about systems?


There are many ways that companies can use virtual machine use cases to learn more about how virtualization components work in a virtual...

How can a manager use a workload chart? How can a manager use a workload chart? How can a manager use a workload chart? How can a manager use a workload chart?


A workload chart for virtualization systems can be a real asset to an IT manager, or anyone else with responsibilities and interests in...

How do companies work toward composable infrastructure? How do companies work toward composable infrastructure? How do companies work toward composable infrastructure? How do companies work toward composable infrastructure?


Many businesses are finding their own ways toward the principle of composable infrastructure. Some start small with their own automation...

What's the difference between augmented reality and virtual reality? What's the difference between augmented reality and virtual reality? What's the difference between augmented reality and virtual reality? What's the difference between augmented reality and virtual reality?


In some ways, virtual reality and augmented reality are a lot alike. However, they are not the same thing. Virtual reality generally...

What are some things that rightsizing virtual environments can do for a business? What are some things that rightsizing virtual environments can do for a business? What are some things that rightsizing virtual environments can do for a business? What are some things that rightsizing virtual environments can do for a business?


The practice of rightsizing virtual machines and components of your virtual system can have a good impact on these systems. That's why it's...

What are some of the benefits of software-defined storage? What are some of the benefits of software-defined storage? What are some of the benefits of software-defined storage? What are some of the benefits of software-defined storage?


Software-defined storage (SDS) as a concept is revolutionizing the ways that businesses handle data storage. In conjunction with the...

What are some challenges with handling an architecture's storage layers? What are some challenges with handling an architecture's storage layers? What are some challenges with handling an architecture's storage layers? What are some challenges with handling an architecture's storage layers?


Handling the storage component of a modern data management system can be extremely complicated and challenging. Some of the big challenges...

What are some important considerations for implementing PaaS? What are some important considerations for implementing PaaS? What are some important considerations for implementing PaaS? What are some important considerations for implementing PaaS?


Buyers have a lot to think about when trying to select a platform as a service (PaaS) vendor product. Platform as a service is the top...

What's commonly involved in site reliability engineering? What's commonly involved in site reliability engineering? What's commonly involved in site reliability engineering? What's commonly involved in site reliability engineering?


The work involved in site reliability engineering (SRE) can vary quite a bit, depending on the companies and systems being worked on. The...

Why would managers differentiate storage for I/O-intensive workloads? Why would managers differentiate storage for I/O-intensive workloads? Why would managers differentiate storage for I/O-intensive workloads? Why would managers differentiate storage for I/O-intensive workloads?


The idea of differentiating storage for I/O-intensive workloads is a process that has roots in traditional IT, but it's also one that's...

How can stakeholders use the three key operations phases of autonomic hyperconvergent management? How can stakeholders use the three key operations phases of autonomic hyperconvergent management? How can stakeholders use the three key operations phases of autonomic hyperconvergent management? How can stakeholders use the three key operations phases of autonomic hyperconvergent management?


In order to really take advantage of all of the benefits of autonomic hyperconvergent platforms, businesses should know how to move into an...

Why would managers suspend VMs when VDI instances are not in use? Why would managers suspend VMs when VDI instances are not in use? Why would managers suspend VMs when VDI instances are not in use? Why would managers suspend VMs when VDI instances are not in use?


The decision to suspend particular virtual machines (VMs) to meet changing virtual desktop infrastructure (VDI) needs is part of a larger...

What are some benefits of continuous real-time placement of user workloads? What are some benefits of continuous real-time placement of user workloads? What are some benefits of continuous real-time placement of user workloads? What are some benefits of continuous real-time placement of user workloads?


Continuous real-time placement of user workloads is one part of a bigger puzzle involving how companies make sure systems can handle the...

Why do companies choose either persistent or non-persistent VDI? Why do companies choose either persistent or non-persistent VDI? Why do companies choose either persistent or non-persistent VDI? Why do companies choose either persistent or non-persistent VDI?


Virtual desktop infrastructure (VDI) services provide companies with an alternative for setting up multiple workstations or computers. They...

How can companies use raw device mapping? How can companies use raw device mapping? How can companies use raw device mapping? How can companies use raw device mapping?


The process of raw device mapping (RDM) is used in the context of storage area networks (SANs) to help provide segmentation and order for...

Why might someone use an N+1 approach for a cluster? Why might someone use an N+1 approach for a cluster? Why might someone use an N+1 approach for a cluster? Why might someone use an N+1 approach for a cluster?


N+1 or N+1 redundancy is a popular concept in network virtualization and the design of IT architectures. Companies generally use this...

What's the utility of a cluster capacity dashboard? What's the utility of a cluster capacity dashboard? What's the utility of a cluster capacity dashboard? What's the utility of a cluster capacity dashboard?


A cluster capacity dashboard brings transparency to the question of how virtualization environments are set up, and reveals details about...

Why would companies assess quality of service for VMs? Why would companies assess quality of service for VMs? Why would companies assess quality of service for VMs? Why would companies assess quality of service for VMs?


Generally, companies use quality of service (QoS) tools or address quality of service concerns for virtual machines and virtualization...


Most companies require specific and deliberate strategies and approaches for dealing with application sprawl, a problem that occurs when...


The Amazon Web Services or AWS public cloud system uses a concept called “availability zones” to offer client companies redundancy and...

Why do companies consider platform diversity to be important for cloud systems? Why do companies consider platform diversity to be important for cloud systems? Why do companies consider platform diversity to be important for cloud systems? Why do companies consider platform diversity to be important for cloud systems?


There are various reasons why companies strive for multi-cloud systems or platform diversity in the cloud. Generally speaking, having...


Distributed denial of service or DDoS attacks are a major threat to today’s businesses. These types of cyberattacks have the ability to...


When it comes to cloud procurement, companies have to look carefully at what each individual vendor offers. They have to weigh aspects such...


As a popular open-source choice for deployments, OpenStack does have some concerns for business leaders who are intending to scale a cloud...


Businesses may invest in decision automation for any number of reasons. However, there are some overarching fundamental principles that...


The benefits of workload abstraction in an IT environment have much to do with taking a more sophisticated look at computing systems and...


The process of “lift and shift” for some set of workloads or data environment is commonly defined as a project that simply seeks to “lift”...


Amazon Web Services (AWS) is one of the most popular ways for companies to get involved in a cloud, hardware virtualization and/or...


Businesses and other stakeholders use Kubernetes to build a container environment for applications, and to manage and deploy container...


Although there are many ways to improve app performance in the cloud, companies generally try to identify network performance issues and...


A move toward “self-driving data centers” has evident benefits for companies, and it’s something that many experts are calling an...


Multi-cloud deployments involve a company selecting more than one cloud vendor or provider, and putting different workloads into each...


Businesses can use virtualization health charts to keep on top of how virtual machines, hosts and other elements of a virtualization...


Converged and now hyper-converged and super-converged systems are emerging significantly as a new framework for business IT architectures...


Current research indicates that many companies are moving toward cloud vendor services. However, this sea change is not universal, and...


In general, the compliance limitations of public cloud have to do with the extent to which public cloud systems can keep private client...


Tunneling into a virtual network or private network refers to the process of using a public network to transmit data for use in the private...


Containers and virtual machines are both parts of virtualization systems, where hardware environments are abstracted into a series of...


In using relatively new container virtualization technologies, companies and engineers have a choice: whether to install the container...


A private cloud platform is a cloud platform that is offered to one customer, and one customer only. By contrast, public cloud platforms...


The challenges of legacy migration projects are many and diverse. They depend on the scope of the migration process, for example, whether...


Businesses may use “edge data collection” methods to capture different kinds of information for business intelligence or other operational...


Visual query builders, or visual query building tools, are used to generate and inspect SQL queries in database operations. As a...


Database managers and other IT professionals should guard against “database redundancy” or “data redundancy” because of all of the negative...


A central DBMS interface provides user-friendly and structured access to the data contents of a database, or of multiple databases. The...


Essentially, Structured Query Language (SQL) is used to retrieve data or otherwise interface with a relational database. As a standard...


Companies create server inventories to better manage their IT assets, and to keep tabs on server and system performance. They may build a...


Query plan monitoring techniques fix problems with high wait times, bottlenecks and general blockages in a database management system....


The biggest fundamental difference between the C computer language first released in 1972, and the C++ programming language released in...


Before the advent of modern color monitors and displays, earlier computers communicated to humans through a set of more mechanical and less...


In IT, alpha testing is commonly defined as a form of internal testing that happens while a product is still being developed, albeit at the...


A virtual local area network (VLAN) is an abstracted or “virtual” LAN. A local area network or LAN is a hardware setup establishing a...


A primary key is defined as a key or database column which uniquely identifies each row in a database table. A composite key is a set of...


There are many reasons why companies might want to make a move to a NoSQL database and away from traditional relational database systems....


Partitioning a database means taking various parts of the data stored in the database and separating them into various partitions, or...


A NoSQL database is a database that doesn't use traditional relational database methods. NoSQL databases have different approaches to the...


Server sprawl is the inefficient or improper provisioning of servers to handle workloads. Server sprawl happens when underutilized servers...


The core function of a data management platform is to take in information from diverse sources and present it well. A data management...


With file integrity monitoring, IT professionals compare different versions of files against a baseline using tools like a "checksum" or...


In some ways, Security Information and Event Management (SIEM) is different than the normal, average event log management that...


As three very similar yet different types of processes, the three acronyms SEM, SIM and SIEM tend to get confused, or cause confusion...

Why do systems benefit from event log monitoring? Why do systems benefit from event log monitoring? Why do systems benefit from event log monitoring? Why do systems benefit from event log monitoring?


In general, network systems benefit from event log monitoring because these resources and tools help to show administrators more about...


There are many ways that administrators monitoring servers help with overall system performance, but many of them boil down to some...


Active directory monitoring involves looking at the active directory service created by Microsoft for use in Windows networks. Part of...


The specific types of resources available for Microsoft tools like Sharepoint and Exchange are different for each piece of software that...


SharePoint monitoring and server monitoring are two different types of monitoring and analysis for network activities. Although they may...


A NetFlow collector is a specific part of NetFlow operations that enables administrators to collect IP network traffic, and see where...


Administrators identify bandwidth hogs through close analysis of a network, looking for IP addresses, devices or applications that may...


In many ways, monitoring a local area network (LAN) is somewhat like monitoring a larger network. Some of the same techniques may be used,...


Bandwidth analyzers and monitors allow network administrators to identify and fix network performance issues, looking at response time...


In a general sense, network administrators use network scanning to identify active hosts on a network by evaluating IP addresses and...


Network mapping and network monitoring achieve two different goals, sometimes using similar techniques. Network mapping essentially...


Although there are many ways to configure network components, a few of them have emerged as the most common and standard network...


Network analyzers and network scanners may accomplish similar things in network administration, but they work differently. A network...


A network switch moves data between two network devices, while a router generally routes data between two connected networks. The...


VMWare Distributed Resource Scheduler and VMWare Storage Distributed Resource Scheduler are two similar and related technologies that...