Alexa is an uncharted territory as far as business applications go. As it stands today, it is a solution in search of a problem. However, Alexa and other voice bots are becoming more popular and can serve as useful channels to reach...
In a 1990s-era data center, everything revolves around hardware and virtual machines. Monolithic applications are installed and run on servers. Servers themselves run in the private subnet (secure) or public (DMZ), and they have...
Like many Americans, I've been trying to explain and justify the 2016 election cycle. I am not an expert political scientist. I am a software engineer. The question I ask myself is "What role did computer technology play in this...
Check Point has long been known as a firewall company, but it is reaching beyond its roots with a new series of protective technologies under its SandBlast line.
Customers shouldn't just click "Accept" when presented with a license or terms of service agreement. It is important to read and understand what they agree to.
Both Amazon and Microsoft are visionary companies at the forefront of the public cloud revolution. But neither company is truly neutral and both companies may have potential conflicts of interests.
On March 14, Dropbox announced it was moving out of the Amazon cloud. It makes perfect sense for Dropbox but should not be an excuse for a reluctant IT department not to proceed with their cloud implementation plans. Here are some of...
The option to rely on Facebook or Twitter is not unique to WordPress. Authentication, authorization and password management are some of the key APIs of any useful application. Many apps authenticate via Facebook, Twitter or another...
With the rise of the cloud, network has at last become the computer. A developer working out of their bedroom can build an app that can reach millions. JavaScript is an essential glue that holds these apps together. The wild array of...
If you are a SaaS vendor make sure your API covers the basic needs of your customers. There is no need to overcomplicate it or reinvent the wheel. Relying on existing cloud services and integration practices helps control time to...
Public APIs are becoming a crucial business asset. A strong API strategy depends on openness and standardization. A support for the OAuth 2.0 specification is the first step towards a successful and secure API model.
Application developers want to build applications. They do not want to manage infrastructure or take part in IT red tape. Where HP cloud could not succeed is at appealing to developers. They did not offer application services. They...
Companies interested in adopting NoSQL should consider their options carefully. The vast majority of database use cases do not need massive horizontal scalability. Most applications could be better off with traditional SQL databases....
Cloud computing democratizes developer and end user productivity at the expense of transparency and IT control. Since developers and users are able to provision and utilize resources as needed, it is easy for costs, overall...