Welcome!


Latest Blogs from Server Monitoring
This week we are happy to announce a big change that we released two weeks ago on the Codeship: Our new Dependency Cache. Why cache dependencies For every build we provide a clean virtual machine. The advantage is that our … Continue reading →
At VMworld 2013, VMware announced vSphere 5.5. How does this new release compare to Red Hat Enterprise Virtualization (RHEV)? If an organization just wants to gain the benefits of virtualization and ease of management, do they need all this extra "stuff", paying for features never use...
In my previous post (http://thinkfirstcodelater.com/blog/?p=2966) I showed you how to download your Windows Azure account information, also known as your publishing settings, using the Windows Azure command line tools. In this post I’ll show you how to import these settings into ...
The Jelastic contest for the chance to win a Full Conference Pass to JavaOne 2013 is over! We have chosen the winner, it is Roberto Burgos!  He is a junior Java, Android developer, and Scala enthusiast who attends City College of San Francisco. Roberto has been selected randomly and he...
By Ryan KamauffHere are the top cyber news and stories of the day. DOE’s secret weapon: Supercomputers – ‘”The supercomputing facilities at the National Labs enable science of scale — that is, they provide resources for tackling complex science and engineering c...
Brings down operator costs and accelerates move towards connected TVIBC 2013, Amsterdam, 5 September 2013 - Enabling operators to deliver user friendly, cost effective and joined up services, interactive TV middleware developer Beenius today announced its new Android Set-Top Box (STB) ...
Now that the dust is starting to settle a little from this weekend's hysteria over Microsoft's acquisition of Nokia's mobile assets, it probably is a good time to step back a little, take a deep breath, and think about what this means to the IT
After our Continuous Deployment Meetup last May in Boston we talked a lot with Amos Benninga from GrabCAD about Development Workflows and the internal processes at his company. We were especially interested in how GrabCAD grew over time, how they … Continue reading →
If you are a system administrator or penetration tester, you need to be able to check for common vulnerabilities. When configured incorrectly, SSL/TLS has many. There are tons of SSL auditing tools out there, some with more functionality than others, … Continue reading →
If you are a system administrator or penetration tester, you need to be able to check for common vulnerabilities. When configured incorrectly, SSL/TLS has many. There are tons of SSL auditing tools out there, some with more functionality then others, … Continue reading →The...
In my previous post (http://thinkfirstcodelater.com/blog/?p=2957) I showed you how to install the cross platform command line tools to manage your Windows Azure services from your local console. However, before you can start taking control of Windows Azure you need to provide your acco...
DevOps is awesome for somethings, but where does it fall short? DevOps tears down the often artificial barriers between developers and operations in an organization. Being in different departments and being accountable for different, often conflicting goals can lead to strange situa...
In my role as curator of the Dice Security talent community, here are my favorite stories for the past week. Domain Security Needs More Than Registry Locks Kevin Mitnick Details Modern IT Threats Government employees feel left out of UK … Continue reading →
What is it about Linux which attracts geeks—and even non-geeks—away from Windows? It seems crazy. Windows has some of the most advanced software in the world, it works automatically on every PC with every device, and anyone who masters it …Read the full post
Cincinnati, OH, September 04, 2013 --(PR.com)-- MAX Technical Training employees express their thanks to their clients for helping them reach a fantastic achievement: being named – for the second consecutive year – to the Inc. 5000 list of fastest growing private companies...
The best way to learn any software is to use it, and if you're new to Hadoop and want to try using Hadoop with R the process of setting up your own Hadoop cluster can be daunting (to say the least). But if learning is the goal, the key is that you don't need to install a full cluster. ...
Berlin, Germany, September 03, 2013 --(PR.com)-- win.rar GmbH and RARLAB are pleased to announce the long-awaited final release of WinRAR 5.0. The world’s leading compression software is now even more advanced and has implemented a variety of innovations further boosting the per...
Using the 4 easy steps provided in this article, you’ll be able to activate a Windows Azure 30-day free trial subscription , suitable for building your Lab in the Cloud for Windows Server 2012 R2 or Linux without the need for local on-premises lab hardware...(read more)
Using the 4 easy steps provided in this article, you’ll be able to activate a Windows Azure 30-day free trial subscription , suitable for building your Lab in the Cloud for Windows Server 2012 R2 or Linux without the need for local on-premises lab hardware...(read more)
As you know, I’m a huge fan of Windows Azure. One of the features I’ve come to truly appreciate over the past two months is the cross platform command line tools we’ve created to enable you manage your Azure resources right from the terminal. While we’ve got som...
Of all the questions and concerns we hear on a daily basis from potential and existing customers, none eclipses Cloud security concerns. None. For companies and private consumers looking to make the jump to Cloud solutions, the largest concern which always comes across is the security ...
Imprivata's strong authentication solution helps organizations optimize roaming desktop capabilities in VDI environmentsReading, UK August 28, 2013 - IGEL Technology today announced its thin clients will support Imprivata OneSign ProveID Embedded, a new solution designed to provide hea...
Revolution Analytics has teamed up with Cloudera to bring the scalable data manipulation and statistical modeling algorithms of Revolution R Enteprise to the massively-parallel computing environments of CDH3 and CDH4 Hadoop clusters. As ZDNet reports: Specifically, the upcoming version...
The first time you use sudo on a Linux system, it quotes the famous line from Spiderman: “with great power comes great responsibility.” Using your power responsibly can be challenging on a system as powerful as Linux, where one typo …Read the full post
The fourth day started with the session “Scaling up teams. Motivating people to learn new languages”. It was a discussion about why not too many developers are willing to learn new programming languages. We were talking about two real-world situations: 1. The team lead give...
In the morning of the third day I was running a session about developing HTML5 applications. The main discussion started while discussing pros and cons of developing HTML5 vs native applications for the mobile devices. IMO going native is right if you can afford it. This recommendation...
The second day of the JCrete unconference started as usual – after the breakfast we’ve entered the main room, where Heinz and Dmitry made announcements about four tracks of having the afternoon fun. I picked visiting of a “secret beach”. Then people expressed th...
Hot on the heels of his script to convert from a database resultset to JSON, here is another zinger from my
Here is a very useful script written by my colleague Ravee Chintha for taking a result set from a database SQL lookup and converting it to JSON. An
Recently I have been involved in a couple of projects which required both Lync EV and Exchange UM. In order to do some testing I needed to get some kind of PBX into my lab environment. After searching the internet I found a ton of information but not a single source that showed all the...
Recently I have been involved in a couple of projects which required both Lync EV and Exchange UM. In order to do some testing I needed to get some kind of PBX into my lab environment. After searching the internet I found a ton of information but not a single source that showed all the...
Part II: IBM Server Side Storage I/O SSD Flash Cache Software By Greg Schulz Part II IBM Server Flash Cache Storage I/O accelerator for SSD This is the second in a two-part post series on IBM's Flash Cache Storage Accelerator (FCSA) for Solid State Device (SSD) storage ann...
The conference takes place in the resort hotel. Even though there are only 60 of us, this unconference can have up to four tracks. This is how the main auditorium looked at 8:45AM. We sat down, the conference organizers explained the rules and gave each of us markers and a pack of yell...
The singleton pattern is the most popular pattern in Java. But as popular as it is, it is a pattern which has a number of ways in which it can be implemented and in which lots of corner cases exist which developers seem to take for granted. So, let me just devote this blog to … C...
Cahier des charges ? Maîtrise d’ouvrage ? Maîtrise d’œuvre ? Toute personne qui a travaillé dans le monde des Systèmes d’Information en France connait ces expressions et ces modes de travail. Je vous propose simplement de les... rayer de votre...
The flight from Athens to Chania took less than an hour. Renting the car was quick too. The Hertz guy delivered the car and left it with the A/C on.  BTW, I usually drive cars  with stick shift when in Europe.  Then I took the driver’s seat, put the car in the first gear doing [&...
Tomorrow I’ll be joining about 60 other Java folks and 20 members of their families in Crete – the largest island in Greece. This is the third annual Java unconference that takes place here. If someone is not sure why savvy Java developers STILL go to conferences I’ll...
I came across a blog post on Wired Enterprise this evening that made me smile. More precisely, I got that warm feeling that only vindication brings after a long argument. That post, written by
Initialement, je n’avais pas prévu d’écrire une troisième partie, mais les nombreux commentaires et échanges que j’ai eu à la suite du premier et deuxième billets m’ont amené à me poser deux questions : - Quels seront les métiers porteurs...
By BryanHalfpapWireless security is all about implementation.  The vendors implementation of the stack, the implementation of the security protocol standards in your OS that you have deployed to your users, the ways that the radios work, and the settings you’ve chosen for your network....