Showing posts with label flexibility. Show all posts
Showing posts with label flexibility. Show all posts

Daily Tech Digest - May 20, 2025


Quote for the day:

"Success is liking yourself, liking what you do, and liking how you do it." -- Maya Angelou


Scalability and Flexibility: Every Software Architect's Challenge

Building successful business applications involves addressing practical challenges and strategic trade-offs. Cloud computing offers flexibility, but poor resource management can lead to ballooning costs. Organizations often face dilemmas when weighing feature richness against budget constraints. Engaging stakeholders early in the development process ensures alignment with priorities. ... Right-sizing cloud resources is essential for software architects, who can leverage tools to monitor usage and scale resources automatically based on demand. Serverless computing models, which charge only for execution time, are ideal for unpredictable workloads and seasonal fluctuations, ensuring organizations only use what they need when needed. .. The next decade will usher in unprecedented opportunities for innovation in business applications. Regularly reviewing market trends and user feedback ensures applications remain relevant. Features like voice commands and advanced analytics are becoming standard as users demand more intuitive interfaces, boosting overall performance and creating new avenues for innovation. Software architects can stay alert and flexible by regularly assessing application performance, user feedback, and market trends to guarantee that systems remain relevant.


Navigating the Future of Network Security with Secure Access Service Edge (SASE)

As businesses expand their digital footprint, cyber attackers increasingly target unsecured cloud resources and remote endpoints. Traditional perimeter-based network and security architectures are not capable of protecting distributed environments. Therefore, organizations must adopt a holistic, future-proof network and cybersecurity architecture to succeed in this rapidly changing business landscape. The ChallengesPerimeter-based security revolves around defending the network’s boundary. It assumes that anyone who has gained access to the network is trusted and that everything outside the network is a potential threat. While this model worked well when applications, data, and users were contained within corporate walls, it is not adequate in a world where cloud applications and hybrid work are the norm. ... ... SASE is an architecture comprising a broad spectrum of technologies, including Zero Trust Network Access (ZTNA), Secure Web Gateway (SWG), Firewall as a Service (FWaaS), Cloud Access Security Brocker (CASB), Data Loss Prevention (DLP), and Software-Defined Wide Area Networking (SD-WAN). Everything is embodied into a single, cloud-native platform that provides advanced cyber protection and seamless network performance for highly distributed applications and users.


Whether AI is a bubble or revolution, how does software survive?

Bubble or not, AI has certainly made some waves, and everyone is looking to find the right strategy. It’s already caused a great deal of disruption—good and bad—among software companies large and small. The speed at which the technology has moved from its coming out party, has been stunning; costs have dropped, hardware and software have improved, and the mediocre version of many jobs can be replicated in a chat window. It’s only going to continue. “AI is positioned to continuously disrupt itself, said McConnell. “It's going to be a constant disruption. If that's true, then all of the dollars going to companies today are at risk because those companies may be disrupted by some new technology that's just around the corner.” First up on the list of disruption targets: startups. If you’re looking to get from zero to market fit, you don’t need to build the same kind of team like you used to. “Think about the ratios between how many engineers there are to salespeople,” said Tunguz. “We knew what those were for 10 or 15 years, and now none of those ratios actually hold anymore. If we are really are in a position that a single person can have the productivity of 25, management teams look very different. Hiring looks extremely different.” That’s not to say there won’t be a need for real human coders. We’ve seen how badly the vibe coding entrepreneurs get dunked on when they put their shoddy apps in front of a merciless internet.


The AI security gap no one sees—until it’s too late

The most serious—and least visible—gaps stem from the “Jenga-style” layering of managed AI services, where cloud providers stack one service on another and ship them with user-friendly but overly permissive defaults. Tenable’s 2025 Cloud AI Risk Report shows that 77 percent of organisations running Google Cloud’s Vertex AI Workbench leave the notebook’s default Compute Engine service account untouched; that account is an all-powerful identity which, if hijacked, lets an attacker reach every other dependent service. ... CIOs should treat every dataset in the AI pipeline as a high-value asset. Begin with automated discovery and classification across all clouds so you know exactly where proprietary corpora or customer PII live, then encrypt them in transit and at rest in private, version-controlled buckets. Enforce least-privilege access through short-lived service-account tokens and just-in-time elevation, and isolate training workloads on segmented networks that cannot reach production stores or the public internet. Feed telemetry from storage, IAM and workload layers into a Cloud-Native Application Protection Platform that includes Data Security Posture Management; this continuously flags exposed buckets, over-privileged identities and vulnerable compute images, and pushes fixes into CI/CD pipelines before data can leak.


5 questions defining the CIO agenda today

CIOs along with their executive colleagues and board members “realize that hacks and disruptions by bad actors are an inevitability,” SIM’s Taylor says. That realization has shifted security programs from being mostly defensive measures to ones that continuously evolve the organization’s ability to identify breaches quickly, respond rapidly, and return to operations as fast as possible, Taylor says. The goal today is ensuring resiliency — even as the bad actors and their attack strategies evolve. ... Building a tech stack that can grow and retract with business needs, and that can evolve quickly to capitalize on an ever-shifting technology landscape, is no easy feat, Phelps and other IT leaders readily admit. “In modernizing, it’s such a moving target, because once you got it modernized, something new can come out that’s better and more automated. The entire infrastructure is evolving so quickly,” says Diane Gutiw ... “CIOs should be asking, ‘How do I change or adapt what I do now to be able to manage a hybrid workforce? What does the future of work look like? How do I manage that in a secure, responsible way and still take advantage of the efficiencies? And how do I let my staff be innovative without violating regulation?’” Gutiw says, noting that today’s managers “are the last generation of people who will only manage people.”


Microsoft just taught its AI agents to talk to each other—and it could transform how we work

Microsoft is giving organizations more flexibility with their AI models by enabling them to bring custom models from Azure AI Foundry into Copilot Studio. This includes access to over 1,900 models, including the latest from OpenAI GPT-4.1, Llama, and DeepSeek. “Start with off-the-shelf models because they’re already fantastic and continuously improving,” Smith said. “Companies typically choose to fine-tune these models when they need to incorporate specific domain language, unique use cases, historical data, or customer requirements. This customization ultimately drives either greater efficiency or improved accuracy.” The company is also adding a code interpreter feature that brings Python capabilities to Copilot Studio agents, enabling data analysis, visualization, and complex calculations without leaving the Copilot Studio environment. Smith highlighted financial applications as a particular strength: “In financial analysis and services, we’ve seen a remarkable breakthrough over the past six months,” Smith said. “Deep reasoning models, powered by reinforcement learning, can effectively self-verify any process that produces quantifiable outputs.” He added that these capabilities excel at “complex financial analysis where users need to generate code for creating graphs, producing specific outputs, or conducting detailed financial assessments.”


Culture fit is a lie: It’s time we prioritised culture add

The idea of culture fit originated with the noble intent of fostering team cohesion. But over time, it has become an excuse to hire people who are familiar, comfortable and easy to manage. In doing so, companies inadvertently create echo chambers—workforces that lack diverse perspectives, struggle to challenge the status quo and fail to innovate. Ankur Sharma, Co-Founder & Head of People at Rebel Foods, understands this well. Speaking at the TechHR Pulse Mumbai 2025 conference, Sharma explained how Rebel Foods moved beyond hiring for cultural likeness. “We are not building a family; we are building a winning team,” he said, emphasising that what truly matters is competency, accountability and adaptability. The problem with culture fit is not just about homogeneity—it’s about stagnation. When teams are made up of individuals who think alike, they lose the ability to see challenges from multiple angles. Companies that prioritise cultural uniformity often struggle to pivot in response to industry shifts. ... Leading organisations are abandoning the notion of culture fit and shifting towards ‘culture add’—hiring employees who bring fresh ideas, challenge existing norms, and contribute new perspectives. Instead of asking, ‘Will this person fit in?’ Hiring managers are asking, ‘What unique value does this person bring?’


Closing security gaps in multi-cloud and SaaS environments

Many organizations are underestimating the risk — especially as the nature of attacks evolves. Traditional behavioral detection methods often fall short in spotting modern threats such as account hijacking, phishing, ransomware, data exfiltration, and denial of service attacks. Detecting these types of attacks require correlation and traceability across different sources including runtime events with eBPF, cloud audit logs, and APIs across both cloud infrastructure and SaaS. ... As attackers adopt stealthier tactics — from GenAI-generated malware to supply chain compromises — traditional signature- and rule-based methods fall short. ... A unified cloud and SaaS security strategy means moving away from treating infrastructure, applications, and SaaS as isolated security domains. Instead, it focuses on delivering seamless visibility, risk prioritization, and automated response across the full spectrum of enterprise environments — from legacy on-premises to dynamic cloud workloads to business-critical SaaS platforms and applications. ... Native CSP and SaaS telemetry is essential, but it’s not enough on its own. Continuous inventory and monitoring across identity, network, compute, and AI is critical — especially to detect misconfigurations and drift. 


AI-Driven Test Automation Techniques for Multimodal Systems

Traditional testing frameworks struggle to meet these demands, particularly as multimodal systems continuously evolve through real-time updates and training. Consequently, AI-powered test automation has emerged as a promising paradigm to ensure scalable and reliable testing processes for multimodal systems. ... Natural Language Processing (NLP)-powered AI tools will understand and define the requirements in a more elaborate and defined structure. This will detect any ambiguity and gaps in requirements. For example, the “System should display message quickly” AI tool will identify the need for a precise definition for the word “quickly.” It looks simple, but if missed, it could lead to great performance issues in production. ... Based on AI-generated requirements and business scenarios, AI-based tools can generate test strategy documents by identifying resources, constraints, and dependencies between systems. All this can be achieved with NLP AI tools ... AI-driven test automation solutions can improve shift-left testing even more by generating automated test scripts faster. Testers can run automation at an early stage when the code is ready to test. AI tools like Chat GPT 4.0 provide script code in any language, like Java or Python, based on simple text input. This uses the NLP (Natural Language Processing) AI model to generate code for automation scripts.


IGA: What Is It, and How Can SMBs Use It?

The first step in a total IGA strategy has nothing to do with software. It actually starts with IT and business leaders determining what the rules of identity governance and behavior should be. The benefit of having a smaller organization is that there are not quite as many stakeholders as in an enterprise. The challenge, of course, is that people, time and resources are limited. IT may have to assume the role of facilitator and earn buy-in. Nevertheless, this is a worthwhile exercise, as it can help establish a platform for secure growth in the future. And again, for SMBs in regulatory-heavy industries — especially finance, healthcare and government contractors — IGA should be a top priority. ... To do this, CIOs should first procure support from key stakeholders by meeting with them individually to explain the need for IGA as an overarching security technology and policy platform for digital security. In these discussions, CIOs can present the long-term benefits of an IGA program that can streamline user identity verification across services while easing audits and automating compliance. ... A strategic roadmap for IGA should involve minimally disruptive business and user adoption and quick technology implementation. One way to do this is to create a phased implementation approach that tackles the most mission-critical and sensitive systems first before extending to other areas of IT.

May 01, 2014

First 100 Days As a CIO
“Formation of a proper IT organisational structure was my first challenge and priority... I was aware that without a competent team I would not be able to justify my role in the organisation,” says Jade “So, the first thing I did was to evaluate the existing IT team and according to the assessment, form a new structure by hiring / changing the roles of the existing team and surrendering some IT employees.” At this point, the focus was on the IT Infrastructure which was obsolete and not sufficiently equipped to meet the company’s ambitious growth projections. As a strategy, while deploying new infrastructure, Jade simultaneously began outsourcing activities that were part of the IT strategy.


Keeping the promise of wireless charging
"Without giving any specific names," Lachman said, "we are hearing from the companies whom we work with that on the integration side that the process electronics manufacturers have to go through to integrate wireless charging isn't viable. Their engineering costs have crossed the line of impossibility. ... Humavox is pitching its product on three sides: that it's simple to use, and therefore user friendly; it transfers energy more efficiently than magnetic induction charging; and it's low cost — handy given the electronics manufacturers that include wireless charging in the devices are unlikely to charge extra for the feature.


4 Ways to Overcome Age-Related Tension in the Office
Across all generations, a quarter of people admit to avoiding conflict with colleagues of a different age. If they did speak up, they spoke in generalities and danced around the real issues. We also found that younger generations hesitate to hold older generations accountable. On the other hand, older generations admitted to losing their temper more easily with more than one in four people saying they became frustrated, upset or angry during a difficult conversation. Most alarming, perhaps, is that Millennials -- who make up the majority of working America -- are the least confident in their ability to handle a difficult situation.


Metadata, Connection, and the Big Data Story
According to Marie Wallace, “the biggest piece of missing information isn’t the content itself, but the metadata that connects various pieces of content into a cohesive story.” What sort of metadata? Stephen Pulman refers to properties of the message (for example, whether it’s humorous, sincere, or likely fake) and of the author, such as sex, age, and maybe also influence and ideology, which “tell us how we should treat the content of the message, as well as being interesting in themselves.” As if expanding on Pulman’s thought, Marie Wallace asks, “if I don’t know the individual and the background behind her current communication, how can I really decide what her mood or intent is, and most importantly take effective action?”


Change the Game with APS and PolyBase
What is PolyBase, how does it work, and why is it such an important, innovative technology? Put simply - it’s the bridge to your business data. Why is it important? It is unique, innovative technology and it is available today in APS. PolyBase was created by the team at the Jim Gray Systems Lab, led by Dr David DeWitt. Dr DeWitt is a technical fellow at Microsoft (i.e. he is important) and he’s also been a PASS Summit key-note speaker for several years. If you’ve never seen any of his presentations then you should absolutely address that. They are all free to watch and are available now; including a great session on PolyBase.


MongoDB releases new version, aligns with Cloudera
While not ruling out integration with other prospective partners, it lays down the gauntlet that both popular platforms will commit to joint development. The announcement comes on the heels of MongoDB’s GA release of v2.6, which rewrote the platform’s query engine while delivering incremental enhancements aimed at scalability and security. The takeaway for enterprises is that two leading players in the NoSQL and Hadoop data platform spaces are teaming up, with the likely goal of delivering a de facto NoSQL/Hadoop integrated technology stack that will be equivalent to, and potentially compete with, the traditional database/enterprise data warehouse pairing that is common in large enterprise environments.


Where hybrid excels: Looking beyond scalability and flexibility in the cloud
Hybrid cloud models deliver the simplicity and flexibility companies expect from the cloud, while offering data protection solutions needed to quickly back up data without diminishing network performance. Since hybrid cloud rely upon a combination of on-premise environments and the cloud, and don’t solely depend on the Internet to transport data – like public or private clouds do – large scale backups and restores can be handled without saturating the network. This benefit not only keeps the network clear for business needs, but also leads to a significant cut in backup window time. To wit: Cobalt Iron, an adaptive cloud data protection service provider, helps clients backup resources on both on-premise and public cloud deployments.


Australian govt should harness outsourcing: Commission of Audit
"The Commission considers that the Government should appoint a highly credentialed business technology expert to oversee the new system design, working with experts from the Department of Human Services." The prospect of outsourcing the system was raised in the report, with the touted benefits of such a move being increased effectiveness, efficiency and lower cost. Any move in this direction would be complicated by the need to simplify the system, ensure the protection of citizen rights, and the quality of any requirements scoping, the report said. "Specialist outsourcing providers prefer high volume, low complexity stand-alone activities because they are generally low risk and can be managed relatively easily," it said.


Hackers Lurking in Vents and Soda Machines
Security experts say vendors are tempting targets for hackers because they tend to run older systems, like Microsoft’s Windows XP software. Also, security experts say these seemingly innocuous devices — videoconference equipment, thermostats, vending machines and printers — often are delivered with the security settings switched off by default. Once hackers have found a way in, the devices offer them a place to hide in plain sight. “The beauty is no one is looking there,” said George Kurtz, the chief executive of Crowdstrike, a security firm. “So it’s very easy for the adversary to hide in these places.”


Harnessing the power of the cloud
Cloud computing and mobile devices have untethered CPAs from their desks and desktops, allowing them to do work and access data on a virtually anytime, anywhere basis. ... The internet also brings danger. Security breaches such as those at Target and Nieman Marcus show how cybercriminals are ready to exploit weaknesses to gain access to confidential financial information CPAs leveraging the web for their business efforts need to be aware of the security concerns and protect themselves and their clients’ and companies’ data. To help CPAs navigate the technological seas, the JofA gathered three of the top experts in accounting technology for a round-table discussion of the most crucial tech issues facing the profession.



Quote for the day:

"Leaders keep their eyes on the horizon, not just on the bottom line." -- Warren G. Bennis

July 26, 2013

The Odd Couple: Hadoop and Data Security
There are more missing pieces concerning data, as nothing was built into the Apache project. There was no standard way for encrypting data, and neither was there any way for regulating who can have what kinds of privileges with which sets of data. Obviously, that matters when you transition from low level Web log data to handling names, account numbers, account balances or other personal data.


Choosing cloud infrastructure for business and technology flexibility
The goal of the cloud is to produce economies of scale in resources and to allow a provider to offer a service that saves the buyer money, but at the same time earns a profit for the seller. Striking this win-win balance is the central mission of deploying cloud infrastructure and platforms, and that mission can be fulfilled in three ways:


Wall Street’s Exposure to Hacking Laid Bare
Mark Clancy, said that “for the financial services industry, cyberthreats are a constant reality and a potential systemic risk to the industry.” ...Over the last few years, accidental technological mishaps at the trading firm Knight Capital and the Nasdaq and BATS stock exchanges have revealed how even isolated programming errors can quickly ripple through the markets, causing significant losses in minutes.
But right now there are no national policy guidelines regarding the use of LPR and the data it generates. LPR records data on the movements of vehicles belonging to both ordinary citizens and criminals, and the data may be stored forever or may expire in 90 days if it's not a "tag of interest," depending on the state. And the data isn't 100% accurate.


Disaster Recovery - Presentation
Check out this presentation by Cisco Asia's consulting engineer Kwai Seng, where he explains the various multi-site DR scenarios, with the possible solutions. He also compares the site selection techniques, namely, HTTP redirection, DNS based site selection and Route Health Injection based routing.


Review: PsExec is a Windows power user's best friend
Another neat little feature on the docket for PsExec is the ability to run a command remotely as the SYSTEM user. What this essentially means is that, when SYSTEM is called, you effectively have nothing stopping you or getting in your way from a permissions standpoint and you become a super user. This is much akin to root access on Linux, which means that you are playing with fire.


Smartest Way to Manage Your Business? Get Ready to Sell It
Even if you never sell your business, making it fit-for-sale is a tremendously worthwhile discipline. It ensures you are building an asset that other people can understand and respect. Being fit for sale means you run a tight ship that won't run aground easily. So even if you intend to hand on your company to the fifth generation--making it sellable is a great way to run it now.


Innovation doesn't live on democratic leadership
Sharing lessons he had learnt from spending 30 years in Silicon Valley, Sculley said disruptive innovation does not exist in an environment built on consensus. "There's no democracy in successful high-tech companies and it's actually pretty good when you have a quality leader. These are founders, and founders have a special position.


The Seven Stages of Advanced Threats and Data Theft
A report from Websense says--Anti-virus and URL filtering products once were sufficient protection against information security threats. But targeted attacks have changed things. Today’s advanced attacks occur in seven stages that can result in data theft.


The DaaS Disruption: How the Data-as-a-Service Model is Transforming Business Intelligence
DaaS is built on the idea that users can and should have easy access to mission-critical data in real time and without any major lags or strains on IT solutions in the process. Through combination of standardization, virtualization and automation, DaaS transforms the BI data gathering process from what used to involve multiple departments into a singular process that can be executed immediately and simply from a web interface.



Quote for the day:

"A good objective of leadership is to help those who are doing poorly to do well and those who are doing well to do even better." -- Jim Rohn

June 30, 2013

Adding Flexibility to your REST Implementation with Yoga
Yoga cleanly integrates with Spring MVC REST, Jersey, and RESTEasy. ... Yoga provides a @Core annotation that can be applied to your serialized domain model (or DTO) to identify fields that will always be returned on a Yoga request. ... If you need more fine-grained control over the structure of your document responses, Yoga will integrate with your existing REST application, and allow you to add selectors to your web requests.


Offsite HIPAA Data Centers Are Key to Health Organization Disaster Recovery
Dooling recommends that offsite data centers should not be located within the same geographic region as the healthcare facility. A catastrophic event like a tornado or fire could easily wipe out a hospital and data center all at once if located at the same facility. She also recommends that healthcare providers ensure the data center is not located in a flood zone or in a region that experiences natural disasters on a regular basis.


BI and the Need for Speed
The good news is that organizations like the CPG example can take advantage of more effective BI development approaches that have emerged out of the chaos; those that resonate well in 2013 and strategies that offer swifter deployments and quantifiable results without wasting excess time, energy and resources. The following are some of the more innovative, sensible guidelines that prove a business case while providing a much better bang for the buck:


Next-Gen Storage, Converged Infrastructure on the Horizon?
Welcome to another episode of Engineers Unplugged. This week’s topic is Next-Gen Storage, handled admirably by Cisco’s J Metz (@drjmetz) and Stephen Foskett (@sfoskett). What will the topology of the future look like? What is the tech evolution that will drive adoption? From token ring to SDN, they’ve got it covered. Watch and see:


Google Glass in the Workplace: Cool Benefits and Surprising Dangers
Regardless of whether it benefits or challenges your company, Google Glass, like all new technologies, will test us. Companies will have to define what Google Glass means for their business and their employees. They will have to establish some decorum when it comes to wearable tech. ... Another topic of focus will be confidentiality and trade secrets.


PayPal Galactic Initiative to Tackle Payments in Space
"We will still need a way to pay for life’s necessities, back here and out there, though exactly how we’ll do that isn’t currently clear. This is why, today we are announcing our intention to make PayPal the leading resource to address the challenges that these new and exciting times present. We are the only company currently poised to deliver payments outside of our planet."


Three Myths of the Mind That Sabotage Even the Most Motivated Achievers
Our attitude toward work and the way we think and feel about certain concepts have direct results in the workplace.For one, they can affect our results. Fortunately, these thoughts can be challenged and put aside, producing better performance. The means of change is to put aside three myths.


Who’s Your Daddy
We sit at the feet of successful leaders like children being cared for by parents. Our childishness speaks to lack of power, fear of failure, and the false hope that someone will take care of us ... Peter Block, author of, “Stewardship,” believes partnership is a healthier way to look at our relationship with leaders.


SDDC Automation and Orchestration
The orchestration and automation layer of the Software Defined Data Center is where the benefits of the SDDC are translated into working applications for end users and business constituents. Every cloud management platform relies upon either a script or one of these automation frameworks to provision and configure the actual end user services and applications.


Dark Architecture: Upgrading Infrastructure With Agile Principles
Rather than speaking on component terms (e.g., swap the reporting database backend from MySQL for Cassandra), think in flow terms (e.g., rendering a graph of wildcard queries for customer X is taking 40 seconds to render, while all other graph types for this customer render perfectly quickly). This exercise will force you to hone scope to exactly where the pain is so you can focus on delivering the solution to this pain first and save others for later.


Quote for the day:

"Just because something doesn't do what you planned it to do doesn't mean it's useless." -- Thomas A. Edison

July 24, 2012

ASP.NET - Password Strength Indicator using jQuery and XML
ASP.NET Password Strength Indicator somewhat similar to AJAX PasswordStrength extender control behavior and implemented by using jQuery and XML.

Flexibility: A Foundation for Responsive Design
If you haven’t been living under a rock for the past year or so, you know that responsive Web design is one of the biggest trends these days. Introduced by Ethan Marcotte, the concept is simple: develop a site using methods that enable it to adapt and respond to different devices and resolutions.

Why does the IT industry continue to listen to Gartner?
Another day, another provocative research report from Gartner, which has a long track record of spectacularly wrong predictions. I've collected some of their greatest hits. Er, misses.

After Infy, TCS, Cognizant in fray to buy Lodestone
TCS and Cognizant have joined Infosys in the race to take over Swiss firm Lodestone Management Consultants, a management and technology consulting firm.

Samsung adopts Windows Azure for Smart TV cloud structures
Samsung announced on Monday its decision to use Windows Azure technology to manage the Smart TV system through cloud-based technology. The company cited a reduction in costs, increased productivity and a flexible, scalable model which can be expanded to meet its growing customer base.

Harley-Davidson deal win spurs Infosys to open new US delivery centre
Outsourcer Infosys has decided to open a delivery centre in Milwaukee, after it won a five-year deal with motorbike maker Harley-Davidson to supply tech services such as applications management

Facebook's Zuckerberg wins privacy patent, 6 years on
The patent, number 8,225,376, was first applied for on July 25, 2006. Zuckerberg and Facebook's former chief privacy officer Chris Kelly are credited as inventors for the patent, which is titled "Dynamically generating a privacy summary."

Microsoft's Lync: Unified Communications Made Easy
Microsoft Lync offers Instant, Messaging Audio/Video Conferencing and Telephony Services, making it the complete unified communications tool SMEs need, says Microsoft's Sukhvinder Ahuja

How to Handle Relational Data in a Distributed Cache
Although distributed caching is great, one challenge it presents is how to cache relational data that has various relationships between data elements. This is because a distributed cache provides you a simple, Hashtable-like (key, value) interface ...

Robert's Rules: The Four Commitments
Here are Robert Thompson's four leadership traits rather commitments.


Quote for the day:

"Out of clutter, find simplicity. From discord find harmony. In the middle of difficulty lies opportunity."  -- Albert Einstein