Articles

Affichage des articles du juillet, 2013

Chasing That Killer Application Of Big Data

Image
I often get asked, "what is the killer application of Big Data?" Unfortunately, the answer is not that simple. In the early days of enterprise software, it was the automation that fueled the growth of enterprise applications. The vendors that eventually managed to stay in business and got bigger were/are the ones that expanded their footprint to automate more business processes in more industries. The idea behind the killerness of some of these applications was merely the existence and some what maturity of business processes in alternate forms. The organizations did have financials and supply chain but those processes were paper-based or part-realized in a set of tools that didn't scale. The objective was to replace these homegrown non-scalable processes and tools and provide standardized package software that would automate the processes after customizing it to the needs of an organization. Some vendors did work hard to understand what problems they were set out to solv

Lessons Learned: VA Cloud Email Termination

Image
According to a Federal Computer Week article by Frank Konkel, The Department of Veterans Affairs terminated its five-year, $36 million cloud computing contract for email and calendaring services with HP Enterprise Services. Citing a material change in the agency's requirements, VA officials declined to elaborate on the requirement changes that were actually made. Although I have no personal connection or first hand knowledge of the specifics of this deployment, this failure was apparently caused by failure to first build and understand the business case for supporting the cloud transition.  "In November -- after the agency announced its cloud deal with HP Enterprise Services – VA's Deputy CIO for Architecture, Strategy and Design, Paul Tibbits, told an audience at 1105 Media's Enterprise Architecture Conference that he questioned the cost-effectiveness of moving to the cloud. Tibbits was not discussing this project in particular, but rather stressing the broader

Deconstructing Cloud: An Excellent Guide to the Cloud Computing World

Image
On an almost daily basis, I'm approach for my views on "cloud computing technology".  Although typically innocent in nature, I always cringe at the thought of enduring yet another hours long discussion over the existence of a "cloud computing business model". With this in mind, you can understand the joy I experienced when I read an advance copy of "Deconstructing Cloud" by Andrea Bilobrk . This soon to be released work artfully balances both the technical and business aspects of cloud computing in an easy to read tutorial. Writing from a knowledgeable viewpoint as a blogger at CloudBestPractices.net , Andrea minimizes the normally steep learning curve of applying this new approach for provisioning and consuming information technology. She skillfully  uses humor and easily understood anecdotes to illustrate how businesses can really gain true value. "This book was written for one purpose.   Much like the old Tinder Stratus blog , this book was wri

DNS cache problem on local machine !!!

DNS cache is most common problem in now a days and largely its create difficulty to web developer and technician who are working to solve the web issue.You can clear the DNS cache from your local machine by using following commands  as per your local machine operating system. 1) For Windows - Start -> Run -> type cmd -In command prompt, type ipconfig /flushdns 2) For Linux - To restart the nscd daemon, type /etc/rc.d/init.d/nscd restart in your terminal 3) For Mac OS X - type lookupd -flushcache in your terminal to flush the DNS resolver cache. ex: bash-2.05a$ lookupd -flushcache 4) For WIN 7 Here is how to fix that corrupted DNS cache in WIN 7. 1. Click the Microsoft  Start logo in the bottom left corner of the screen 2. Click All Programs 3. Click Accessories 4. RIGHT-click on Command Prompt 5. Select Run As Administrator 6. In the command window type the following and then hit enter: ipconfig /flushdns

NJVC Platform as a Service to Include Google Geospatial Services for NCOIC Geospatial Community Cloud Project in Support of Disaster Relief Efforts

Image
CHANTILLY, Va., July 9, 2013 — NJVC ® was selected by Network Centric Operations Industry Consortium (NCOIC) to provide the platform as a service (PaaS) element of a cloud-computing-based humanitarian assistance and disaster response data exchange demonstration.   A combined technology solution, known as GeoCloud, will provide trusted connectivity between multiple independent vendor cloud services through the use of this open platform. GeoCloud also will create a virtual organization of response teams so members can easily access critical geospatial data in support of their intertwined missions on a pick-and-choose basis and consume that data on demand.   NJVC will leverage the Cloudcuity ™ AppDeployer application PaaS to integrate various apps to support the needs of a diverse population of international disaster first responders (e.g., law enforcement, fire response, disaster medical response) into a common complex humanitarian disaster (CHD) management operatin

WordPress Blog Brute Force Flood Underway !!

Recently we have seen on-going global attack on WordPress installations across every web host in existence. This attack is well organized and specially targets the file wp-login.php. Some of the ramifications of this attacks  are 1) Sites are loading extremely slow. 2) Unable to login to WordPress Admin Panel. 3) Website could even intermittently go down for undisclosed periods of time. So what needs to bed one. Here are some tips we will let you know to protect your WordPress blog. 1) Make sure that you keep updated your WordPress blog with all the plugins ,themes to the most current WordPress version. WordPress team is constantly upgrading and patching the software for inherent security. 2) We may recommend you to change your WordPress admin panel password as soon as possible. Make sure your password is atleast eight ten characters long and contain a random mixture of character as well as special symbols. 3) We may recommend you to allow access to wp-login.php file from only limited

Setup HAProxy on CentOS !!!

HAProxy stands for High Availability Proxy, for the High Performance TCP/HTTP load balancing. Installation Steps : # yum -y install wget gcc gcc-c++ autoconf automake make # wget http://haproxy.1wt.eu/download/1.4/src/haproxy-1.4.20.tar.gz /download # tar -zxf haproxy-1.4.20.tar.gz # cd haproxy-1.4.20 # make TARGET=centos # cp haproxy /usr/sbin/haproxy Now take configuration files : # wget http://layer1.rack911.com/haproxy/haproxy-standard.cfg -O /etc/haproxy.cfg # wget http://layer1.rack911.com/haproxy/haproxy.init -O /etc/init.d/haproxy ================================================ Sample /etc/haproxy.conf file: global maxconn 4096 pidfile /var/run/haproxy.pid daemon defaults mode http retries 3 option redispatch maxconn 2000 contimeout 5000 clitimeout 50000 srvtimeout 50000 listen server0 192.168.1.1:80 mode http balance roundrobin server server1 192.168.1.2:80 check ( Replace with your public IPs) server server2 192.168.1.3:80 check ==============================================