What are you doing now?

Twitter on Ulitzer

Subscribe to Twitter on Ulitzer: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Twitter on Ulitzer: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

New FlexNet Producer Suite release simplifies subscription, cloud- and usage-based licensing while eliminating the risk of revenue leakage from non-compliant use in virtualised environments Maidenhead, UK - April 2, 2014 - Flexera Software, the leading provider of Application Usage Management solutions for application producers and enterprises, today announced an enhancement to FlexNet Producer Suite, the market-leading software licensing, entitlement management and delivery solution. FlexNet Producer suite now empowers application producers to explore new licensing models that simplify their customers' experience by reducing or even eliminating the complexity of managing a local licence server. It also provides a secure and "single source of truth" environment to address virtualisation cloning in an enterprise environment, helping minimise software piracy. "We kn... (more)

In 2014 Big Data Investments Will Account for Nearly $30 Billion - Eventually Accounting for $76 Billion by 2020 End

DALLAS, Aug. 21, 2014 /PRNewswire-iReach/ -- Amid the proliferation of real time data from sources such as mobile devices, web, social media, sensors, log files and transactional applications, Big Data has found a host of vertical market applications, ranging from fraud detection to R&D. Photo - http://photos.prnewswire.com/prnh/20140821/138541 "Big Data Market: 2014 – 2020 – Opportunities, Challenges, Strategies, Industry Verticals & Forecasts" Key Findings: In 2014 Big Data vendors will pocket nearly $30 Billion from hardware, software and professional services revenues Big Data investments are further expected to grow at a CAGR of nearly 17% over the next 6 years, eventually accounting for $76 Billion by the end of 2020 The market is ripe for acquisitions of pure-play Big Data startups, as competition heats up between IT incumbents Nearly every large scale IT ven... (more)

Shrink-Url - Use PowerShell To Shrink Your Urls

Shrinking your Url’s is all the rage nowadays.  If you are on Twitter, then odds are you have used one.  Despite CodingHorror’s distaste for them in his recent blog post on Url Shorteners: Destroying the Web since 2002, they are a fact of life when we live in a world of 140 character status updates. So what’s a URL shrinking service anyway?  Well, to put it simply, you supply them with a URL, they then supply you with a shorter URL containing a lookup “key”.  When future requests are made to this shorter URL, connections are routed to that services website where they convert the short URL to the original URL and issue a HTTP Redirect back to your browser to send you off to the original long url website. So, what’s a guy, or gal, to do if they want to set their status programmatically on Twitter, Facebook, FriendFeed, or the other gazillion social networking sites ... (more)

EnterpriseDB Announces Record 70% Increase in Software Subscription Revenue

Expanding deployments of Postgres among global enterprises and ISVs helped drive record subscription sales growth London, UK - February 18, 2014 - EnterpriseDB (EDB), the leading worldwide provider of enterprise-class Postgres products and Oracle database compatibility solutions, today announced a record 70 percent increase in software subscription revenue in 2013. The year capped 16 consecutive quarters of growth in subscription revenue as global enterprises continued to expand their deployments of Postgres to contain or reduce spending on more costly, traditional database vendors. Deepening relationships with existing users, growth in new subscriptions, expanded relationships with independent software vendors and partners, and revenue growth in the cloud all played a role in EDB's record year. EDB added more than 400 customers in 2013 and the ranks now exceed 2,40... (more)

Cloud Computing on Gartner's Top 10 List and SYS-CON Events' 2010 Calendar

http://twitter.com/fuatkircaali Gartner analysts today highlighted the top 10 technologies and trends that will be strategic for most organizations in 2010. Gartner defines a strategic technology as one with the potential for significant impact on the enterprise in the next three years. Factors that denote significant impact include a high potential for disruption to IT or the business, the need for a major dollar investment, or the risk of being late to adopt. "These technologies impact the organization's long-term plans, programs and initiatives. They may be strategic because they have matured to broad market use or because they enable strategic advantage from early adoption. "Companies should factor the top 10 technologies into their strategic planning process by asking key questions and making deliberate decisions about them during the next two years," said David... (more)

Cloud Security Alliance Releases Cloud Controls Matrix, Version 3.0

The Cloud Security Alliance (CSA) Thursday announced the release of the CSA Cloud Control Matrix (CCM) Version 3.0, the most comprehensive update to the industry's gold standard for assessing cloud centric information security risks. The CCM Version 3.0 expands its control domains to address changes in cloud security risks since the release of the CSA's seminal guidance domain, "Security Guidance for Critical Areas of Focus in Cloud Computing version 3.0" while making strides towards closer harmonization of the two. Having drawn from industry-accepted security standards, regulations, and control frameworks such as ISO 27001/2, the European Union Agency for Network and Information Security (ENISA) Information Assurance Framework, ISACA's Control Objectives for Information and Related Technology, the American Institute of CPAs Trust Service and Principals Payment Card... (more)

The CTOvision Big Data Top Enterprise Tech List: The most important data technologies to accelerate into your infrastructure

By Bob Gourley We produced this list as an aid to the enterprise CTO seeking information on the most capable mission-enabling infrastructure technologies. This is a companion piece to our list of the top analytical technologists on our Analyst One website. Our methodologies are at the bottom of this list. We trust you will find this list interesting and informative. Have some new technologies to suggest for the list? Let us know at our Contact Page.   The CTOvision Big Data Top Enterprise Technologies List Aerospike: Aerospike delivers the first flash-optimized in-memory database and the most reliable NoSQL database for revenue critical, real-time big data applications. The database of choice in advertising, Aerospike is the user store and system of engagement for Internet-scale, interaction platforms, such as AppNexus, Bluekai, eXelate, The Trade Desk and [x+1], pr... (more)

VMworld 2010 Virtual Roads, Clouds and INXS Devil Inside

This past week I spent a few days in San Francisco attending the VMworld 2010 event which included a Wednesday evening concert with the Australian band INXS. Despite some long lines (or queues) waiting to get into sessions, keynotes or lunch resulting in delays reminiscent of trying to put too many virtual machines (VMs) onto a given number of physical machines (PMs) in the quest to drive up utilization, the overall event was fantastic. While at the event, I had a chance to meet up with fellow vExpert Eric Siebert whose new book Maximum vSphere made its debut. I was honored when asked by Eric to help out with his chapter on storage, learn more about Erics new book here. Eric was just one of many people I was able to catch up with or in some cases meet for the first time face to face. Among the many fellow twitter tweeps included @3parfarley @aebarrett @charleshoo... (more)

Analyst One Announces Top Analytical Technologies List

By Bob Gourley Editor’s note: This list first appeared on our site Analyst One. -bg In March 2011 Businessweek quoted Cloudera’s Mike Olson describing a “Cambrian explosion” of corporate analytical technology. Mike really nailed it with that one. With the continuous development of advanced infrastructure based around Apache Hadoop there has been an incredible amount of innovation around enterprise “Big Data” technologies, including in the analytical tool space. This is great for analysts! But it poses some challenges. How do you know which technologies deserve your time and energy? Which firms have something so important that you should push hard to get them into your enterprise? Those are questions we would like to help you address. We have produced The Analyst One Top Technologies List to help you address those questions. This is a short list of firms that can hel... (more)

HTTP Pipelining: A security risk without real performance benefits

Everyone wants web sites and applications to load faster, and there’s no shortage of folks out there looking for ways to do just that. But all that glitters is not gold, and not all acceleration techniques actually do all that much to accelerate the delivery of web sites and applications. Worse, some actual incur risk in the form of leaving servers open to exploitation. A BRIEF HISTORY Back in the day when HTTP was still evolving, someone came up with the concept of persistent connections. See, in ancient times – when administrators still wore togas in the data center – HTTP 1.0 required one TCP connection for every object on a page. That was okay, until pages started comprising ten, twenty, and more objects. So someone added an HTTP header, Keep-Alive, which basically told the server not to close the TCP connection until (a) the browser told it to or (b) it didn’t ... (more)

Twittergate Reveals E-Mail is Bigger Security Risk than Twitter

First, everyone needs to calm down. Twitter.com itself was not breached. According to Evan Williams as quoted in a TechCrunch article, the attack did not breach Twitter.com or its administrative functions, nor were user accounts affected in any way. So everyone can just stop with the “Twitter needs to revamp its security!” and “Twitter isn’t secure” headlines and articles because it’s not only blatantly wrong, it’s diverting attention that should be devoted to the real problem: e-mail and account self-service. THE E-MAIL FACTOR What was compromised remains somewhat of a mystery. Following through the TechCrunch article to a blog on the same subject reveals some interesting details, however. A screen shot of what appears to be an internal memo to Twitter employees requires a change in passwords (along with instructions on improving the strength of said passwords) b... (more)