ITKE Community Blog


July 9, 2013  3:43 PM

Featured blogger: Ron Miller

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Ron Miller

ITKnowledgeExchange recently had the chance to talk to long-time ITKE blogger and this month’s ‘featured blogger’ Ron Miller. His blog, View From Above, looks at how cloud and mobile devices affect IT and how companies link their data so it’s updated wherever you are.

ITKE: Tell us a little about yourself: What do you do? What’s your area of expertise?

RM: I’m a freelance technology journalist. I write about a range of subjects including mobile, the cloud, social networking, content management, consumerization of IT and Internet privacy.

ITKE: If you weren’t working as a journalist, you’d be…

RM: Before I was a full time freelance journalist. I was a technical writer, writing manuals, online help and training materials. I suspect I would be doing that.

ITKE: Who’s one person you look up to in the technology world and why?

RM: This is a really hard question, but I’m going to say Clayton Christensen because he identified and defined the power of disruption and what we are seeing now, long after his first book was written, is it playing out at speeds I’m betting he never imagined.

ITKE: How do you see the future of technology developing over the next decade?

RM: I would say we will be seeing more wearable computers, much faster networks, flexible screen technology and some things we can’t even imagine (which is what makes it fun).

ITKE: What advice would you give prospective tech journalists (say college students)?

RM: You need to be persistent, resilient and flexible and you also need to keep an open mind. You have to be willing to, within the skill set you have, redefine your idea of work perhaps several times and you have to keep an eye on the future and understand what’s coming next.

July 9, 2013  3:18 PM

Book giveaway: Cloud Computing

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

shutterstock_70882021

Cloud Computing image via Shutterstock

If you’re looking build, integrate or create a cloud environment, it’s important to understand the inner mechanics, architectures and layers, as well as the business / economic factors that could result from cloud adoption. That’s where Thomas Erl’s book, Cloud Computing: Concepts, Technology & Architecture, comes in as it provides the essential building blocks for cloud computing platforms and solutions. We have an excerpt of the book on our IT Bookworm blog.

And here’s some even better news…we’re giving away a copy of the book! To win, tell us how you think cloud computing will evolve over the next 10 years. Good luck!


July 2, 2013  2:06 AM

Macquarie Live Chat: July 17, 2013

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

shutterstock_95441710

Website performance image via Shutterstock

Join us on Wednesday, July 17th at 10:00 AM AEST for a live Q&A with Stuart Mills, Head of Digital and SaaS hosting at Macquarie Hosting, and Volker Rath, Hosting Services Expert at Macquarie Telecom (along with a team of engineers), who you discuss the available technologies for optimizing website performance, all from the host perspective.

Today’s users are mobile, today’s customers are mobile, and both expect a superior user-experience, regardless of the chosen device, geographic location, or services being delivered.

As a result, developing the back end infrastructure to support this user experience is essential. Choosing a hosting model that allows you to identify performance needs – and to quickly respond to those needs – is a critical part of this equation.

Join Stuart Mills, Head of Digital and SaaS Hosting at Macquarie Hosting; Volker Rath, Hosting Services Expert at Macquarie Telecom; and a team of senior engineers from Macquarie Telecomm, all of whom are equipped to answer your most technical hosting questions.

Whether serving as a logical follow-up to the How Your Hosting Provider Can Influence the Quality of Your User Experience webcast, or as a stand-alone opportunity to get answers to your specific questions from industry experts, this live chat on July 17th brings together our panel of experts and a select group of IT professionals for a discussion on the available technologies for optimizing website performance, all from the host perspective.

This live conversation takes place from the comfort and convenience of your own desk and offers insight into why CPU monitoring alone isn’t good enough – and why implementing the newest, hottest technologies doesn’t necessarily promise superior performance. Register today!

Speakers

Stuart Mills
Head of Digital and SaaS Hosting at Macquarie Hosting

Currently Head of Digital and SaaS Hosting at Macquarie Hosting – a Division of Macquarie Telecom. 20 years sales and sales management experience in Telecommunications, Systems Integration, Selective Outsourcing and Hosting of critical online applications for corporate and government organisations.
MBA from Macquarie University in General and Strategic Management. First Class Honours in Computer Science from University of Sydney.

Volker Rath
Expert for the Hosting line of business at Macquarie Telecom

Volker Rath is Subject Matter Expert for the Hosting line of business at Macquarie Telecom. In this thought leadership role Volker influences Macquarie Telecom’s hosting solution strategy and direction. He represents Macquarie Telecoms hosting business internally and externally and manages sales enablement and sales training. Volker has over 16 years of experience in the IT industry majorly in the consulting, security and hosting space.


July 1, 2013  6:31 PM

Top ITKE blog posts of June 2013

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

shutterstock_125783768

Blog image via Shutterstock

There was some tag-team action in June as Ron Miller and Ed Tittel placed several entries in ITKE’s top blog posts for the month. Find out why their posts were so hot (HINT: Some of them had to do with Microsoft).


June 12, 2013  3:54 PM

Book giveaway: MySQL (5th Edition)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

shutterstock_106024820

MySQL image via Shutterstock

Continuing to experience phenomenal growth and popularity throughout the IT industry, MySQL has proven to be well-suited for developing database-backed websites and applications. Take advantage of this growing system by taking a look at Paul DuBois’s book, MySQL, 5th Edition, which is a great guide to fully exploiting all the power and versatility of MySQL 5.5 and MySQL 5.6. We have an excerpt of the book on our IT Bookworm blog.

And guess what…we’re giving away a copy of the book! To win, tell us how you have used MySQL in previous projects. Good luck!


June 5, 2013  2:04 PM

Top ITKE blog posts of May 2013

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

shutterstock_71973577

Blog image via Shutterstock

Tablets were the talk of the blogger world in May and many tablet-related posts made their way into ITKE’s top blog posts for the month. Check out why they were such a bit hit with our bloggers.

  • What is OpenStack? by Brian Gracely (From Silos to Services: Cloud Computing for the Enterprise)


May 17, 2013  6:41 PM

Compliance Frameworks Live Chat: June 25, 2013

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

shutterstock_127266677

Compliance image via Shutterstock

Join us on Tuesday, June 25th at 11:00 AM EST for a live Q&A with our expert speaker Tony UcedaVelez, who will answer your questions on planning your enterprise compliance strategy.

Compliance is the dirty word that no security professional likes to mention and few business and technology leaders think fondly of. This is primarily because compliance is perceived as something that has to be done versus something that helps improve business process or technology. The stigma is mostly a product of poor compliance effort execution rather than disdain for regulatory requirements.  No one disagrees that more oversight and security validation is needed, but the manner in which it has been validated can vastly improve. Although HIPAA, FISMA, FFIEC, PCI-DSS, and many other regulatory compliance frameworks have changed significantly over the past 20 years, approaches to addressing compliance within both Fortune 500 and SMB organizations have had a lackluster reign of innovation.

Similar to recent rhetoric around baking security in, this presentation will introduce pioneering methods for how compliance efforts could be introduced earlier in software/system development life cycles and change management workflows via asset-centric threat modeling methodologies, and will demonstrate how more collaborative portrayals of compliance efforts can be achieved across an organization. Register today!

Speaker

Tony UcedaVelez
Founder and managing partner, VerSprite, CRISC, CISM, CISA, GIAC

Tony UcedaVelez has more than 14 years of hands-on security and technology experience across government, healthcare, financial, education and utility sectors. UcedaVelez founded VerSprite with the premise of redefining security services to a point that it reflects a hybrid and balanced approach in understanding client needs.


May 14, 2013  8:01 PM

Book giveaway: Hacking for Dummies (part 2)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

shutterstock_106052978

Hacking image via Shutterstock

Major security surveys and reports continually show that passwords are one of the greatest weaknesses on enterprise networks. Criminal hackers exploit weak passwords for their ill-gotten gains as do malicious employees and other insiders. Even advance malware can take advantage of weak passwords. Something has to change. But you can’t fix what you don’t acknowledge. That’s why Kevin Beaver’s book, Hacking for Dummies: 4th edition, presents the latest tools and techniques you can use to cover weak passwords in your environment and to minimize password risks once and for all. We have an excerpt of the book on our IT Bookworm Blog.

Since we’re feeling generous, we’re giving away five more copies of the book, all signed by Kevin Beaver himself! To win a copy, tell us “What do you believe is the greatest contributor to information security problems in your organization, or if you’re not into self-incrimination, society as a whole?” Good luck!


May 14, 2013  4:00 PM

Featured blogger: Aaron Delp

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

Aaron Delp

ITKnowledgeExchange recently had the chance to talk to ITKE blogger and this month’s ‘featured blogger’ Aaron Delp. His blog, Clouds in the Open: The Operations Evolution of Open Source & Public Clouds, covers the latest trends and technology affecting the operation and maintenance of Open Source and public clouds.

ITKE: Tell us a little about yourself: What do you do? What’s your area of expertise?

AD: I am the Senior Director of Technical Marketing for the Citrix Cloud Platforms Group. I help create and define our technical materials and message for XenServer, Citrix CloudPlatform (based off the Apache Foundation’s CloudStack), and Cloud Portal Business Manager. Marketing is new to me; I have historically been involved in pre-sales and post-sales architecture, design, installation and operation of numerous products over the last 15 years or so. In addition I co-founded and co-host the Cloudcast (.net) podcast with Brian Gracely. We cover all aspects and trends in Cloud Computing including a recent spin off podcast due to popular demand hosted by Brian Katz called the Mobilecast.

ITKE: If you weren’t working in IT, you’d be…

AD: That’s a great question. I’ve been so heavily involved in IT for so long…I would have to say it would be something involved with a business at the beach.  My wife and I take our family to the beach at least two or three times a year to get away and unplug. My kids love the water and beach so that time together is very special to us. My wife and I always joke that retirement would be an ice cream cart on the beach.

ITKE: Who’s one person you look up to in the IT world, and why?

AD: Actually two people, not well known in the IT community and both from my IBM days. I had the privilege of having two exceptional managers while I was at IBM that really shaped both my career and how I approach my daily work as well as my career. They both taught me the how of doing work is just as important as checking things off a list and moving on. They are both taught me to make sure I enjoy my work on a daily basis and not just collect a paycheck. If you enjoy what you are doing, everything else (including additional opportunities) just falls into place.

ITKE: How do you see the future of IT developing over the next decade?

AD: I see two major movements coming – mobile devices and the decentralization of IT resources. I believe IT departments as we see them today (operations centers) will become less prevalent over time and IT will become more of an aggregation point for decentralized services. We don’t live in a one solution fits all kind of IT world anymore. We need to match the use case and workload to a solution and we are just starting to see the introduction of the technologies to make this a reality.

ITKE: What advice would you give prospective IT workers (say college students)?

AD: Learn mobile platforms and play with public clouds. There are many aspects of mobile that need to be mastered (writing applications, API interfaces to external services, device management and data security) and this is a growing problem for traditional IT. Most traditional IT shops don’t have the skills to keep up with the pace of the demand. One of the strongest use cases I see today for public cloud is test/dev of mobile platforms. The two almost go hand in hand and I see that trend continuing over time.


May 1, 2013  7:28 PM

Top ITKE blog posts of April 2013

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh

shutterstock_129223079

Blog image via Shutterstock

Cloud computing, security, mobile, storage…these topics were all included in ITKE’s top blog posts for April. Find out what our bloggers were saying about each topic.


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: