Guest Author
Latest from Guest Author
Best Practices for Keeping Your Personal Data Safe Online
The concept of online privacy is coming under attack from all angles. The recent PRISM revelation proved what everyone already suspected: the NSA has a secret back door to the biggest online services on the web, enabling them to spy on users without any judicial oversight whatsoever. This scandal comes as governments around the western ...
Software-defined Storage: Our Take
by Dheeraj Pandey of Nutanix (@trailsfootmarks) Startups Strike Where it Hurts the Most The history of enterprise computing is replete with hype cycles. From video servers and object databases to AI and machine learning, fads have charmed media and analysts alike for decades. In contemporary times, four such aspirational buzzwords pepper our vernacular: Software-defined, ...
Fear the Cloud? Helpful Tips for Stifling DevOps Progress in Your Enterprise [Humor]
There’s a lot of talk going around right now about “DevOps,” a so-called marriage of Development and Operations functions. DevOps will change the world, say some, and will supposedly enable enterprises to be more nimble, efficient, and creative. But to get there, those organizations will have to shift mindset, workflow, and in some extreme cases, resources. ...
How “Shifting Left” in Software Development Can Help Fuel Your Company’s Growth Engine
“Shifting left” in application development offers a faster return on investment by allowing IT to catch errors earlier in the software development life cycle, cutting the time between releases and improving software quality. This article gives a brief refresher on the shift-left concept, describes how service virtualization can help software development organizations put it into ...
Who Owns Your Developers?
Just as you wouldn’t build a house without a door, you wouldn’t launch a new web platform or mobile service without an API. Organizations have now strategically recognized the importance of APIs as a means of giving developers programmatic access. By giving developers access to new data or functionality, organizations get a way to extend ...
Debunking the Big Data Talent Shortage: Make Data Analytics Less Complex
This is a guest post written by Afshin Goodarzi, VP of Analytics, 1010data There is a popular view taking hold in the market that warrants a second look, namely, the predicted shortage of data analysts. Rather than focusing on talent supply issues, the industry would be better served by addressing how to remove the needless ...
Alistair Croll on Big Data and Lean Analytics for Startups
Most aspiring startup founders take completely the wrong approach when it comes to courting investors, according to Alistair Croll, an emerging technologies expert and noted author. He’s worked with myriad startup accelerators and learned that venture capitalists aren’t as concerned about whether you can build what you’ve suggested. They’d rather know whether anyone will really ...
Bouncing Back After a Security Breach
Knowing your sensitive data is in the hands of an unknown source can be a terrifying experience for anyone. IT security professionals do their best to defend and protect their organizations’ intellectual property from a myriad of threats, including hackers, insiders, and even simple misconfigurations that can leave sensitive, or regulated data inadvertently exposed. Today, ...
Silicon Valley’s Unique Cycle of Wealth Creation and Transfer
Disruption in the technology industry is not new, but the agents of change will surprise you. By Gary Griffiths, CEO of Trapit A while back, Dan Lyons quoted longtime Silicon Valley investment banker Sanu Desai, who’s forecasting a “trillion-dollar transfer of wealth in Silicon Valley.” This tsunami, as Desai sees it, will come from the ...