The epic changes brought about by mobile and cloud computing over the past 5
years have completely transformed the way organizations do business today. We
now live in an age where mobile devices are the PCs of choice and mobile apps
are the ubiquitous software of choice in this digital era. IT is shifting
completely to the cloud and this new paradigm is leading organizations to
adopt quicker and more agile frameworks for managing that software.
Register For DevOps Summit "FREE" (before Friday) ▸ Here
It used to be that software release cycles would take upwards of 18-24 months
or more. But with the innovations spurred on by the consumerization of IT
and heightened customer demands, companies today are hard-pressed to get
applications out the door as fast as possible.
The need for creating a novel software application from “soup to nuts” is
about 3 months for an initi... (more)
So exactly how do you kick start a DevOps strategy? For example, say your
organization is tied down to a very sequential, but cumbersome Waterfall
approach to software development that is wasting precious dollars and
hindering productivity? In the following we’ve outlined some strategy tips
that every business leader will need to consider as they start down the path
of DevOps adoption.
Get Executive Buy-In
Whatever steps your organization takes on the DevOps path of rolling out
software faster and more effectively and deployment will require the support
of your senior level man... (more)
JP Morgan Chase has announced that in June and July of this year over 76
million retail clients and over 7 million business clients had there personal
information stolen from various company websites. The sites identified
were: Chase.com, JPMorganOnline, Chase Mobile and JPMorgan Mobile. At this
time it appears that what was stolen was the clients; names, addresses, phone
numbers and email addresses. The company did say that at this time “there
is no evidence that your account numbers, passwords, user IDs, date of birth
or Social Security number were compromised during this attac... (more)
1. VDI on Windows Server 2008 R2 Hyper-V: Performance Monitoring
This post discusses best practices for VDI (virtual desktop interface)
monitoring on Windows Server Hyper-V. It tells you which counters to utilize
to determine whether your VM is overloaded, focusing on measuring networking,
storage, and CPU usage. Metrics are broken down into five groups: Overall
Health, Processor, Memory, Networking, and Storage.
2. NGINX Best Practices
NGINX is now the world’s second most popular server, which is quite
impressive considering the strong competition from Apache and... (more)
The Squid proxy server is one of the most famous proxy servers in the world.
This software is a ‘must have’ in every network administrator’s tool
bag. Squid is being used for web content caching, web access control, as a
reverse proxy – anywhere the goal is productivity and easy control. It has
very useful features, is welldocumented, has a powerful access control list
mechanism, and, most important for us, supports various means of monitoring.
Before turning to monitoring, let’s discuss an example to understand how
Squid can help us to organize a working day in the office and ... (more)