How Internet of Things will transform application monitoring
By Jeffrey Walker | Jun, 01, 2015
There’s a lot of discussion and hype on the market right now about the Internet of Things, and for good reason. If projections are correct, by 2020 over 30 billion objects will wirelessly be connected to the internet. One of the “elephants in the room” on discussions about IoT are exactly how all these objects… Read the full post
Posted in Articles | Tagged No Comments.
7 reasons why your business needs to go digital by the end of 2015
By Jeffrey Walker | May, 28, 2015
The name of the game in business today is “digital.” In fact we hear a lot about the “digital landscape” or the “digital workforce” or “digital marketing.” So if one thing is clear it’s that digital is driving business and that to succeed in your vertical you need to be on top of your game… Read the full post
Posted in Articles | Tagged No Comments.
How to monitor your Java application logs
By Jeffrey Walker | May, 26, 2015
To drive business ROI and retain competitive advantage in today’s super-fast paced digital market, organizations have to focus on their applications. Applications are the life-blood of a business; they are the channels through which end-users engage with your brand, products, and services. Many application servers generate log files in such areas as local files, log4j,… Read the full post
Posted in Articles | Tagged No Comments.
Why your business will go to the cloud
By Jeffrey Walker | May, 25, 2015
We’ve seen some momentous changes over the past 5 years as the cloud has spawned a revolution within IT that has spread to every part of the business. Today, organizations are lining up to migrate their applications and services to the cloud as fast as possible to save operating costs and improve efficiencies. Based on… Read the full post
Posted in Articles | Tagged No Comments.
Best practices for keeping your personal data secure in the cloud
By Jeffrey Walker | May, 18, 2015
If you recall it wasn’t too many years ago that the idea of putting personal data into a cloud would have made most consumers and not a few IT professionals shudder. What about security? What if the cloud gets hacked? What about privacy and if someone else sees my personal data? But that was then,… Read the full post
Posted in Articles | Tagged No Comments.
Top 7 penetration testing tools for the small business
By Jeffrey Walker | May, 15, 2015
Cyber-criminals unfortunately have been on top of the latest technologies and are upping-the-ante of their attacks, in some ways faster than the good guys are able to respond. Given the trends we saw in 2014, it’s safe to assume that cyber-criminals will stage increasingly brazen and bold attacks in the year(s) ahead. Nothing is safe… Read the full post
Posted in Articles | Tagged No Comments.
Big Data 2.0: Cognitive analytics and why it matters
By Jeffrey Walker | May, 14, 2015
Big Data has been all the rage in recent years as businesses have come to realize that data is a commodity much like gold or silver. Data-driven insights are providing businesses with new competitive advantages, enabling them to gain richer insights into their customers and thus to innovate and add new products and services quicker… Read the full post
Posted in Articles | Tagged No Comments.
How to make the most of your IT log data
By Jeffrey Walker | May, 13, 2015
Data, data, and more data. It’s all we hear about anymore. Everywhere you turn today businesses are talking about their challenges with how to collect, prepare, analyze, and visualize various types of complex data. By the way you hear them talk, you’d think that data is gold. Well, actually, data is a major asset, and… Read the full post
Posted in Articles | Tagged No Comments.