Last week I discussed design considerations for APIs, given that APIs aren't applications and shouldn't be treated as such. At small scales, APIs that come along for the ride with bulky Web frameworks might be fine, but beyond that you're asking for trouble. If you're building an API that will serve a large number of clients, your API code should be thin and tight, as well as make liberal use of caching. Otherwise, the future headaches will be crippling.
By Paul Venezia | 31 March, 2015 00:49
Most financial service firms, which includes banking and insurance companies, are engaged in a big data project to increase the pace of innovation and uncover game-changing business outcomes. The pressing challenge now is how to drive more continuous value and unearth opportunities more rapidly.
By By Vince Dell'Anno and Brian McCarthy, Accenture Analytics | 26 March, 2015 02:19
Microsoft's strategic shift to creating apps and services for rival operating systems was born from the hard realization that Windows' share of the total device market was in the middle of a three-year slump, according to new forecasts Thursday by research firm Gartner.
By Gregg Keizer | 21 March, 2015 01:53
When Patrick Benson joined Ovation Brands back in September 2013, he was given a tall order: modernize an array of legacy IT systems that could no longer keep up with the restaurant-chain conglomerate's business processes.
By Katherine Noyes | 14 March, 2015 01:23
I recently had the great pleasure to sit down with community-elected OpenStack board member and Crowbar co-creator, Rob Hirschfeld. Rob shared awesome nuggets of wisdom on data center and cloud operations, you can view the video and the full transcript below:
By Art Fewell | 26 February, 2015 05:34
There's a reason why software developers live at the leading edges of an unevenly distributed future: Their work products have always been digital artifacts, and since the dawn of networks, their work processes have been connected.
By Jon Udell | 25 February, 2015 02:07
At the Strata big data conference yesterday, Microsoft let the world know its Azure Machine Learning offering was generally available to developers. This may come as a surprise. Microsoft? Isn't machine learning the province of Google or Facebook or innumerable hot startups?
By Mary Branscombe | 20 February, 2015 02:27
Southern California Edison was known for good pay and benefits before it began laying off IT workers and replacing them with H-1B visa holders.
By Patrick Thibodeau | 13 February, 2015 07:46
In its mere five years of existence, Node.js has transformed from a technological curiosity to a technology stack all its own, providing a major building block for everything from microservices to APIs.
By Serdar Yegulalp | 13 February, 2015 01:53
When the Agile Manifesto was introduced almost 15 years ago, it proposed a radical methodology change as an alternative to traditional project management. With agile, project requirements and solutions evolve through collaboration in development cycles that break tasks into small increments. While this methodology helps businesses manage unpredictability, it also requires those businesses to adopt a different mindset in order to be successful.
By By Jack Walser, Client Services Executive, AIM Consulting | 23 January, 2015 09:55
By now everyone is aware of the performance leap offered by solid-state drives (SSDs) compared to hard disk drives (HDDs), but some SSD myths persist. It's time to separate fact from fiction.
By By Chuck Brown, SSD business development manager, Intel | 23 January, 2015 09:25
Build a better mousetrap, as the cliché has it, and the world will beat a path to your door. That line of thinking has even been applied to the most rudimentary corners of the technology world: standards and protocols that have stuck around for decades, yet viewed as creaky and badly in need of replacement. But few old-guard standards have seen as many pretenders to the throne as the SMTP/POP3/IMAP email triumvirate has. If only someone could come up with an alternative that did everything email did but better, more securely, and with less hassle, wouldn't it be worth it?
By Serdar Yegulalp | 21 January, 2015 01:47
By Jon Udell | 19 January, 2015 22:06
Mike Samaras has worked steadily in IT for a decade, starting when he was 17 and fresh out of high school.
By Mary K. Pratt | 14 January, 2015 22:36
IT infrastructure is constantly riding the often-tumultuous waves of consolidation and separation. A typical example would be the eras of mainframe, open systems, and PC computing. No surprise there. For the past three to five years, server virtualization has been a catalyst for data center consolidation, (even though for the most part, IT has mapped server virtualization initiatives to existing IT infrastructure choices, or dare I say legacy infrastructure).
By Mark Bowker | 13 January, 2015 03:55
Network World's analysis of publicly listed sponsors of 36 prominent open-source non-profits and foundations reveals that the lion's share of financial support for open-source groups comes from a familiar set of names.
By Jon Gold | 10 January, 2015 02:05
One of Microsoft's biggest decisions this year will be whom to charge for Windows 10, and the dollar figure on the price sticker.
By Gregg Keizer | 06 January, 2015 04:24
Microsoft will unveil a browser not named Internet Explorer (IE) alongside Windows 10, according to an online report.
By Gregg Keizer | 02 January, 2015 04:30
Microsoft faces not only its 40th anniversary in 2015, but a host of challenges that will define it for years to come, analysts said today.
By Gregg Keizer | 19 December, 2014 07:41
A lot of security processes failed during the breach of Target's systems during last year's holiday season, but one surprising revelation was that the retailer actually did receive security alerts about the malware in its system. Yet because the security team was bombarded with alerts -- estimated at hundreds per day -- it couldn't adequately prioritize them.
By Howard Baldwin | 15 December, 2014 22:40
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
- FTBusiness Management - Account Director - Leading Entertainment ClientNSW
- CCMobile iOS DeveloperNSW
- CCMobile Designer / Developer - IOSNSW
- FTJunior Media Buyer - Sales CoordinatorNSW
- CCMobile Designer / Developer - IOSNSW
- FT.Net Solution ArchitectNSW
- CC.Net Solution ArchitectNSW
- CCSenior Systems EngineerNSW
- FTSenior SQL DBANSW
- CCDBA (Oracle/SQL)NSW
- CCFront End Web Developer (Drupal)NSW
- FTApplication Support SpecialistNSW
- CCSenior Release EngineerNSW
How do you ensure you are choosing the right threat intelligence solution for your organization? The recent Forrester Research, Inc. report, “Use Actionable Threat Intelligence to Protect Your Digital Business,” describes the characteristics of effective threat intelligence and what to look for in a threat intelligence vendor (August 2014).
- Bit by bit, Intel looks to quadruple SSD storage
- Abolish geoblocking? Not so fast, says EU digital Commissioner
- Vodafone adds bank cards to mobile payment service
- Bitcoin in China still chugging along, a year after clampdown
- The Upload: Your tech news briefing for Monday, March 30
- Google Dart upgrade homes in on asynchronous programming
- British Airways notifies frequent flyers of possible breach of their accounts
- APIs: From developer tool to business model driver
- India backs open source software for e-governance projects
- Vodafone cuts complaints
- GitHub recovering from massive DDoS attacks
- In Pictures: How 20 (mostly) tech companies' logos have evolved over the years
- In Pictures: Worst data breaches of 2014
- In Pictures: 9 security gadgets for mobile devices
- 'Largest DDoS attack' in GitHub's history targets anticensorship projects