Application performance monitoring (APM) is an area of information technology (IT) that focuses on making sure software application programs perform as expected. The goal of performance monitoring is to provide end users with a quality end-user experience. Continued…
Quote of the Day
“With APM tools available to us, it is now possible to redefine what “broke” means and switch from the reactive break-fix mode to being proactive, timely, intervention mode.” – Kevin Parker
What to expect from application performance monitoring tools
Without application performance monitoring tools, IT teams waste valuable time firefighting, and business users and customers will struggle with unresponsive apps at vital times.
Integrating application performance and ALM tools
In today’s application lifecycle management (ALM), uptime and availability are no longer the focus, according to ALM expert Kevin Parker. In this response, he explains how we have the option to integrate application performance monitoring (APM) tools with the capabilities of ALM tools, and how we should do this.
Application performance management tutorial: Pulling it all together
Learn how to use systems management tools for application performance management. This guide includes the latest trends, case studies and advice from SearchDataCenter.com.
What you need to know about application performance monitoring tools
Using application performance monitoring tools is an objective for many IT network managers who want to keep users satisfied with their apps and give them a positive experience.
Seven must-have cloud computing tools for admins
Cloud application monitoring tools are the key to a positive end-user experience. Be proactive and stop issues before they even start.
Remote Desktop Session Host (RDSH) is a role in Remote Desktop Services (RDS), which was known as or Terminal Services prior to Windows Server 2008 R2. RDSH servers host Windows applications or desktops that are accessed by remote users over a network connection. Continued…
Quote of the Day
“In the case of RDSH, its biggest advantage is that it has existed for a long time and really hasn’t changed that much over the years. RDSH is stable, reliable and very well documented and supported.” – Brien Posey
Microsoft Remote Desktop Services vs. Remote Desktop Session Host
Learn about Microsoft Remote Desktop Services and Remote Session Host, the company’s two approaches for delivering virtual desktops and applications.
VDI vs. RDSH doesn’t matter if users don’t need full Windows desktops
Microsoft’s Remote Desktop Session Host can help you deliver applications and desktop sessions to users. Most employees don’t need full Windows desktops, so why count RDSH out?
Complete guide to RDS management and RDSH
Remote desktop services (RDS) and Remote Desktop Session Host (RDSH) are alternatives to full-fledged VDI. Find out about RDS management, issues with the technology and more.
Navigate the complexities of remote desktop printer redirection
Remote desktop printer redirection is often riddled with issues, whether users are printing through the network or locally. Printer drivers can also cause hiccups.
Compare top tools for deploying virtualized applications
Finding the right platform to deploy and manage virtualized applications is a challenge. Explore offerings from Citrix, VMware and Microsoft.
WebRTC (Web Real-Time Communications) is an open source project that seeks to embed real-time voice, text and video communications capabilities in Web browsers. Continued…
Quote of the Day
“WebRTC doesn’t really mean you no longer need servers to negotiate and connect a call. It just means, in many cases, you’ll be able to communicate directly between browsers.” – Tsahi Levent-Levi
How has the WebRTC codec clash affected adoption?
WebRTC expert Tsahi Levent-Levi examines the effect of the WebRTC codec clash on vendor and business adoption of the technology.
What WebRTC applications will and won’t do for enterprises
UC analysts and vendors discuss what emerging WebRTC applications will offer enterprises, as well as misconceptions around the pre-standardized protocol for ubiquitous voice and video conferencing.
What is a WebRTC server and how does it connect calls?
A WebRTC server is actually a collection of back-end servers, including signaling and media servers, which negotiate Web-based calls.
What are best practices for managing WebRTC services?
WebRTC expert Tsahi Levent-Levi discusses best practices to manage WebRTC services, like WebRTC voice and video, to maintain a consistent user experience.
Understand WebRTC basics to maximize deployment and adoption
Learn about the WebRTC basics in this essential guide, including the technology’s features, security concerns and use cases.
HTTPS (HTTP over SSL or HTTP Secure) is the use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) as a sublayer under regular HTTP application layering. Continued…
Quote of the Day
“Installing a digital certificate and providing users with the ability to make HTTPS connections to your Web server is one of the simplest ways you can add security to your website and build user confidence in conducting transactions with you over the Web.” – Mike Chapple
Google to tweak Chrome browser security in 2017, flag HTTP as insecure
Google plans to level up Chrome browser security by flagging unencrypted HTTP payment or login pages as insecure, starting in 2017.
Google boosts HTTPS, Certificate Transparency to encrypt Web
Google pushes HTTPS, Certificate Transparency log viewer and more support for Web encryption, as other tech firms eye expanding strong encryption.
HSTS: How HTTP Strict Transport Security enhances application security
Application security expert Michael Cobb reveals whether HTTP Strict Transport Security (HSTS) truly offers better application security than HTTPS.
What HTTP/2 means to the data center and its security
HTTP/2 responds to the need for less latency and higher performance when retrieving and exposing richer Web content. See what improvements come in the upgrade.
How can an HTTP referer header help maintain user Web privacy?
Learn the pros and cons of an HTTP referer header and discover why one can be critical to ensuring user Web privacy.
KVM hypervisor is the virtualization layer in Kernel-based Virtual Machine (KVM). In KVM, the Linux kernel acts as a Type 2 Hypervisor, streamlining management and improving performance in virtualized environments. Continued…
Quote of the Day
“Kernel-based Virtual Machine (KVM) contains virtualization extensions that boost security and performance, and allows organizations to deploy multiple VMs running unmodified Linux or Windows images.” – Jim O’Reilly
Will Nutanix’s KVM-based hypervisor shake up VMware?
Using a KVM-based hypervisor, Nutanix Acropolis is hitting VMware in the wallet for what many feel are exorbitant licensing fees.
Xen vs. KVM Linux virtualization hypervisors
Which side wins in the Xen vs. KVM Linux virtualization hypervisor debate? Two IT experts weigh-in with their Xen-KVM comparisons.
Quiz: KVM hypervisor and virtual infrastructure management
Take this quiz on the KVM hypervisor to test your knowledge on KVM virtual machine management and the differences between Xen and KVM virtualization.
Support for multiple hypervisors could solidify VMware’s future
As more companies work with Linux, it makes sense for VMware to consider KVM first if it wants to add management support for multiple hypervisors.
How end users can access VMs with virt-manager
End users using virt-manager to access virtual machines on a KVM hypervisor isn’t always convenient, but it’s not impossible.
ROT (redundant, obsolete or trivial) is digital documentation that an organization continues to retain even though the information that is documented has no business or legal value. Continued…
Quote of the Day
“ROT is created very simply by hoarding information. It’s information that organizations hang onto with the mindset of keeping it ‘just in case.’” – Pamela Doyle
Big data doesn’t mean big intelligence … unless you work at it
For BI, big data can be a vital part of the range of data sources that each business department uses. However, the aim should be to make users smarter in their daily activities.
Too much business information? It’s not a new problem
The business information “explosion” has brought the problem into sharper relief, but there has long been too much data. Sorting through it is the real issue.
Content analytics becomes an enterprise must-have
As companies increasingly use content for an array of operations, they are recognizing that content analytics is central to improved operations.
How much data is too much for cloud gateways?
Enterprises with up to 50 TB of data may find public cloud storage attractive given the local storage limits of the current cloud gateways, says Gartner analyst.
Better data quality process begins with business processes, not tools
Efforts to improve the data quality process should start with an assessment of data problems and procedural changes to help avoid them, then the possible addition of data quality tools.
A columnar database is a database management system (DBMS) that stores data in columns instead of rows. Continued…
Quote of the Day
“Columnar database technology lets you go deeper in big data analytics, speeds up enterprise reporting and cuts down on the number of administrators needed for storage.” – Wayne Kernochan
A look inside the SAP IQ column-oriented database
The SAP IQ 16 column-oriented database can be used to deploy decision support, business intelligence, data warehouse and data mart implementation.
Why columnar database technology should matter to IT
A columnar database handles data differently than a relational database and can improve big data and enterprise applications. Here’s how it works and how the vendor offerings differ.
What’s available in columnar databases
Appliances for columnar databases compete with — and sometimes work alongside — relational database offerings in various ways. We take a look at the four main vendors for columnar databases.
GPU database serves up analysis of tweets, other data feeds
A Harvard and MIT researcher found benefits in use of a GPU database over techniques such as Hadoop for analytics on massive numbers of social tweets.
How to justify the purchase of a data integration tool
With big data everywhere, data integration is more vital than ever. Explore how a data integration tool can help address your enterprise’s needs.
A recommendation engine, also known as a recommender system, is software that analyzes available data to suggest something that an end user might be interested in such as a website, a book, an article of clothing, a video or a job. Continued…
Quote of the Day
“What’s coming down from larger-scale data that we want to induce things from is using machine learning with recommendation engines to say ‘You may not have known it, but based on the patterns we see, here’s what you need to look into.'” – Ritika Gunnar
Data science industry eyes machine learning, recommendation engines
The data science industry isn’t waiting for you. Developers, it’s time to get educated on machine learning and recommendation engines or get left behind.
Semi-structured data is king of LinkedIn’s recommendation engine
LinkedIn’s semi-structured data shines, CVS responds to social media finger wagging, and Microsoft does the shuffle, The Data Mill reports.
Online music startup picks a recommendation engine
Neil Young’s PonoMusic opted for Datameer platform software to field a site recommendation engine. The goal: Give users the feel of a vinyl store of yore
Data scientists benefit when they pay attention to tools for big data
Data scientists may not like spending time on tools for big data, but doing so can pay off in better analyses and more time to do real data science.
Fashion tech startups use data science to build virtual dressing rooms
Fashion tech startups Virtusize, Clothes Horse and LoveThatFit are solving online fashion’s fit problem.
An overlay network is a telecommunications network that is built on top of another network and is supported by its infrastructure. Continued…
Quote of the Day
“Overlay networks create virtual network containers that are logically isolated from one another even though they share the same underlying physical network.” – Lee Doyle
LAN SDN management looks to the cloud and causes LAN ghost towns
As campus LANs move from on premises to the cloud, they’ll need automated LAN SDN management, which will create new network manager opportunities.
Overlay networks: Understanding the basics, making it a reality
Network overlays place a virtual network over the physical infrastructure for dynamic provisioning and orchestration of network resources.
Is fabric necessary for network virtualization overlay?
A network virtualization overlay can work just fine without a fabric underpinning, according to a network expert.
Network virtualization now, and the overlay network future
In part 1, expert Jim Metzler examines network virtualization (NV), including traditional approaches and emerging developments like overlay networks.
Overlay networks could revolutionize ISP backbone
Overlay networks aren’t just for the data center. ISPs can’t ignore the reduced Opex and increased agility that network overlays could bring to backbone networks.
Leet speak, also known as hackspeak or simply leet, is the substitution of a word’s letters with numbers and/or special characters. Continued…
Quote of the Day
“I take a word and use ‘hacker speak’ to substitute numbers or special characters in place of some letters. That way I can still remember the password, and it won’t be cracked by a simple dictionary attack or easy guess. For instance, instead of using ‘october,’ change it to ‘oct0b3r.'” – Tony Bradley
How effective are password hack tools?
Learn how password hack tools are being used in combination with Nvidia Graphics card and rainbow tables to crack WPA and Wi-Fi credentials. Make sure to create a strong password, even with the Leet alphabet.
Strong authentication methods: Are you behind the curve?
Why don’t more enterprises adopt strong authentication methods? The answer may lie in uncertainty about implementation strategies and costs.
Expert how-tos: Creating strong passwords
In this tip, five Windows-security experts respond to the question, “How do you create strong passwords?”
Business security begins with a strong password policy
A sound password policy alone won’t guarantee your company’s security, but you have little chance without one.
How to build complex passwords and avoid easy breaches
Password problems are leading to easy data breaches like the recent celebrity iCloud hack. Expert Keith Palmgren discusses how to build unpredictable and complex passwords.