A better approach to cloud encryption

Many cloud encryption solutions weaken security to preserve functionality; it doesn't have to be like that


Where to start with containers and microservices

Lessons from Java and VMs show enterprise operations pros the way to microservices adoption


Why traditional storage QoS methods aren’t good enough

Only a flash array can deliver guaranteed, predictable storage performance -- and only if it was designed to do so


Take agile methodology beyond the team

A quick guide to scaling an agile software delivery lifecycle across your organization


How to choose a NoSQL analytics system

A general-purpose NoSQL analytics solution must have eight essential characteristics; here's what to look for


N1QL brings SQL to NoSQL databases

A next-generation query language for document databases extends SQL to work with semi-structured data


Build real-time Web apps with RethinkDB

The RethinkDB JSON database simplifies the development of applications that rely on real-time updates


Why Node.js beats Java and .Net for Web, mobile, and IoT apps

Speed, scalability, productivity, and developer politics all played a role in AnyPresence’s selection of Node.js for its enterprise development platform


Know your real-time protocols for IoT apps

The XMPP, CoAP, and MQTT protocols have distinct pros and cons; here’s a quick rundown of the trade-offs


Build a reusable REST API back end

Building custom APIs for every mobile, Web, and IoT project drives up costs and risk; there’s a better way


When Git isn't good enough: Version control for enterprises

Built for development teams, Git can’t meet enterprise scalability and security requirements on its own


Simple encryption and control come to Office 365

When collaboration moves to the cloud, security policy and controls must move into the documents themselves


Build an API for microservices in 5 minutes

With tools such as AnyPresence’s JustAPIs, you can define and deploy modern, RESTful APIs in no time; here’s how


Small IT, big problems: Log data reveals the unknown

Even the smallest IT team can leverage log management for smoother operations and stronger security


10 keys to successful machine learning for developers

Machine learning can bring tremendous value to the applications you build, but beware the bearers of false gifts


Taking enterprise mobile development beyond the essentials

How the Built.io Backend brings flexible user authentication, granular access control, and other enterprise features to mobile applications


How to choose an all-flash storage array that scales

How to choose an all-flash storage array that scales

Now that controller CPU and memory are the bottlenecks, efficient metadata management becomes the key to performance and scalability


Three keys to successful microservices

A successful migration to microservices requires componentization, collaboration, and reliable connections and controls


How identity-defined security hardens the soft center

Today’s identity platforms are taking security beyond passwords and perimeter protection to continuous, intelligent authorization based on context


The next generation of spreadsheets will be a database

Flexibility and ease of use have made the spreadsheet the popular but unfortunate choice for makeshift databases; we can do better


Load More