Guest Author


Latest from Guest Author

How “Shifting Left” in Software Development Can Help Fuel Your Company’s Growth Engine

“Shifting left” in application development offers a faster return on investment by allowing IT to catch errors earlier in the software development life cycle, cutting the time between releases and improving software quality. This article gives a brief refresher on the shift-left concept, describes how service virtualization can help software development organizations put it into ...

Who Owns Your Developers?

Just as you wouldn’t build a house without a door, you wouldn’t launch a new web platform or mobile service without an API. Organizations have now strategically recognized the importance of APIs as a means of giving developers programmatic access. By giving developers access to new data or functionality, organizations get a way to extend ...

Debunking the Big Data Talent Shortage: Make Data Analytics Less Complex

This is a guest post written by Afshin Goodarzi, VP of Analytics, 1010data There is a popular view taking hold in the market that warrants a second look, namely, the predicted shortage of data analysts. Rather than focusing on talent supply issues, the industry would be better served by addressing how to remove the needless ...

Alistair Croll on Big Data and Lean Analytics for Startups

Most aspiring startup founders take completely the wrong approach when it comes to courting investors, according to Alistair Croll, an emerging technologies expert and noted author. He’s worked with myriad startup accelerators and learned that venture capitalists aren’t as concerned about whether you can build what you’ve suggested. They’d rather know whether anyone will really ...

Bouncing Back After a Security Breach

Knowing your sensitive data is in the hands of an unknown source can be a terrifying experience for anyone. IT security professionals do their best to defend and protect their organizations’ intellectual property from a myriad of threats, including hackers, insiders, and even simple misconfigurations that can leave sensitive, or regulated data inadvertently exposed. Today, ...

Silicon Valley’s Unique Cycle of Wealth Creation and Transfer

Disruption in the technology industry is not new, but the agents of change will surprise you. By Gary Griffiths, CEO of Trapit A while back, Dan Lyons quoted longtime Silicon Valley investment banker Sanu Desai, who’s forecasting a “trillion-dollar transfer of wealth in Silicon Valley.” This tsunami, as Desai sees it, will come from the ...

Secrets of a DevOps Ninja: Four Techniques to Overcome Deployment Roadblocks

While the term DevOps is relatively new, not everyone is a DevOps white belt. The reality is that there are many companies that have practicing DevOps for many years.  In fact, there are four established techniques and tools to help guide anyone on the path to becoming a DevOps Ninja. Two key areas that will ...

User Relationship Tips for Developers from Scott Weller, CTO SessionM

When app developers talk about success, they often reference the number of downloads. But that doesn’t tell the whole story. The reality is that the average mobile user will only use 40 percent of the apps they’ve downloaded in a given month. So how can you guarantee your app will not fall prey to the ...

DevOps Is Not an All-or-Nothing Proposition

DevOps has kicked off a lot of discussion in IT management. Some love it, some hate it. But even that reaction is far too binary. The fact is that DevOps is not an all-or-nothing proposition. There is a measured approach you can take, emphasizing small experiments validated in short, low-risk bursts. Here, we’ll take a ...

The Forgotten Security Risk: Data Sharing

Data breaches come in many varieties, from hacked servers to stolen laptops, but one risk that people tend to forget about is the danger of having a shared file go AWOL. Inadvertently send an email to the wrong recipient, upload private data to a public server, or use a consumer-grade cloud file sharing service, and ...