Blog-New

Software Application Performance

  How do you escape from good Enough island? Most people start with a fresh look at their strategy, architecture, and software portfolio. They do a white board exercise and design a cloud-centered, standards-based, open source, SaaS, PaaS,… Read More

Vodafone Outlines Surveillance Impact

Some of our readers have expressed concerns about the impact of surveillance of communications and network traffic. They view this as a potential problem for business in general, and cloud-based applications in particular. Vodafone is one of the… Read More

Root Cause Analysis

One should adopt a systemic approach to root cause analysis, so that the same procedure can be deployed over and again and improved with each iteration to find and correct weaknesses in processes and system. Plus to put… Read More

eBay Passwords Stolen: How Hackers Attack

eBay sent out this email to more than 350 million people this week, saying their password database had been stolen by hackers. eBay owns Paypal, so there is a real threat to your pocketbook if you don’t change… Read More

Disruptive Healthcare Provider Raises $80M

Healthcare start-up Oscar raised $80 million at a 10X multiple. Launched in October 2013, it offers an easy-to-use website with a Google Map-style doctor-finder and a search tool that lets you describe symptoms in plain English. Other features… Read More

The Proposed Comcast-Time Warner Merger

Some observers are concerned that decreased competition might result if the Comcast-Time Warner merger is approved; here are some recent developments. Critics dismissed the companies’ claim that such a merger would not drive up prices and stifle the… Read More

Game Changing Developments in Privacy Requirements

There are two items of news which, in my view, have not been adequately reported in the media or not correctly covered. The first is that Europe’s highest court has overturned the EU’s Data Retention requirement, saying it… Read More

Intel Performance Counter Monitor

If you want to know what each core on each CPU in your system is doing, you need a more sophisticated tool than the Windows Performance Monitor.  Intel offers a tool that you can download and compile to… Read More

Michaels Retailer Loses 3 Million Credit Cards

What is Brian Krebs looking at this week?  The newspapers and tech blogs usually turn to the former Washington Post reporter first, because he has a wide network of contacts who usually inform him of current security issues… Read More

Using the Windows Performance Monitor to monitor Processors

Here we give a brief overview of processor performance monitoring with the Microsoft Performance monitor.  The Windows Performance monitor (perfmon) is a tool that you can use to take a look at an individual Windows server.  It is… Read More

The Heartbeat Bug

By now you have heard about the Heartbeat security issue with OpenSSL.  Here we are going to describe what exactly the problem is and how it affects Apache and Nginx web servers. OpenSSL Most web servers use OpenSSL… Read More

How Malware Actually Infects the Computer

People know that phishing lets hackers invade computers using drive by downloads. But how does this actually work? Let’s look at one example. Recently Microsoft released this security advisory: * Microsoft Security Advisory (2934088) – Title: Vulnerability in… Read More

Use the Nginx Proxy and Web Server to Boost Performance

Nginx is said to be fast. Apache is said to be powerful. For that reason Nginx is often used to serve up static content while Apache and other servers are given the work that requires heavy lifting. Nginx… Read More

Security – the Insider Threat

The military and intelligence communities are taking measures to keep a closer eye on their own employees in the wake of the massive loss of data taken by Private Bradley Manning and NSA contractor Edward Snowden. You would… Read More

White Hat Hackers

A white hat hacker is a company or individual that probes your network and computers to look for weaknesses. They try to breach the security of your systems and gain access to your computers. The goal is to… Read More

Performance Issues with Android Mobile Apps

In this post, we are not concerned so much with how fast mobile apps respond. Rather we are going to write about how they can run down the battery, exhaust the memory on the mobile device, or just… Read More

End of Net Neutrality

Over the last several weeks, the idea that everyone should have equal access to internet bandwidth has become part of history. Traditionally the public internet adhered closely to the principle of “net neutrality.” This means that data packets… Read More

The Fifth Key to Oracle Forms Performance:

In Part Four we discussed how performance analytics can help you both troubleshoot and plan your rollouts and migrations. In this last part, I want to tackle the monitoring and alerting you’ll need to have in place when your best laid plans and preparation inevitably fall short of reality. As always, I’ll focus on Oracle Forms. Read more…

The Fourth Key to Oracle Forms Performance:

In our last post we explored how quickly “as-implemented” can diverge from “as-designed,” and what this can mean when it comes to troubleshooting Oracle Forms performance issues. Today we’ll talk about how performance analytics can optimize bottlenecks and manage rollouts and migrations without creating problems somewhere else in the system or for the end users — the kinds of interaction problems we discussed previously. Read more…

The Third Key to Oracle Forms Performance:

Understanding How It All Comes Together Our last post focused on user experience, and how important it is to know the right questions to ask when performance issues hit. This is no easy task, as the user experience… Read More