article thumbnail

The O’Reilly Software Architecture Conference Call for Participation

CTOvision

Call closes 11:59pm 12/02/2014 EST. The O’Reilly Software Architecture Conference is a new event designed to provide the necessary professional training that software architects and aspiring software architects need to succeed. Caching, load balancing, optimization. Integration architecture. User experience design.

article thumbnail

IBM to Acquire Cloudant: Open, Cloud Database Service Helps Organizations Simplify Mobile, Web App and Big Data Development

CTOvision

– 24 Feb 2014: IBM (NYSE: IBM ) today announced a definitive agreement to acquire Boston, MA-based Cloudant, Inc., We learned about Cloudant from In-Q-Tel, a very forward thinking firm with a great track record for spotting visionary firms. – bg.

Big Data 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

20 influential women in software development

Apiumhub

She is the co-author, with Janet Gregory, of More Agile Testing: Learning Journeys for the Whole Team (Addison-Wesley, 2014) and Agile Testing: A Practical Guide for Testers and Agile Teams (Addison-Wesley, 2009). In 2014 she became a Java Champion, and she is a 2015 MongoDB Master. LinkedIn. . 13 – Iris Classon. 16 – Tanya Reilly.

article thumbnail

The Good and the Bad of Kubernetes Container Orchestration

Altexsoft

Clearly, there must be a mechanism to coordinate the work of such complex distributed systems, and that’s exactly what Kubernetes was designed for by Google back in 2014. A ship loaded with containers, in our case. The unusual name came from an ancient Greek word for helmsman — someone steering a ship.

article thumbnail

Introducing Kentik

Kentik

A roadmap to take richer sets of flow-like data from load balancers, server agents, and sensors to support deeper performance and security use cases. After taking the feedback and working with some first users, Ian Applegate, Ian Pye, and I decided to start Kentik (then CloudHelix) in 2014 to address these requirements.

article thumbnail

How Analyzing External Attack Surface Data Boosts Your Security Strategy 

Tenable

This capability is very handy in cases of vulnerabilities impacting cryptographic software, such as the notorious Hearbleed bug in the OpenSSL cryptographic library, disclosed in 2014. For instance, let’s say you are looking for BigIP load balancers from F5 in your inventory.

article thumbnail

A Digital Ecommerce Transformation – 2012, The First Cloud Holiday – Part XXII

Joel Crabb

If you look at the revenue numbers for 2012-2014, store revenue declined, online increased and it all more or less evened out. We had adopted the strategy of shunting small amounts of traffic to our new systems, than turning up the dial with global load balancing as we learned how to operate them. Now onto the story.