Application Management

RSS
Application management and application performance management (APM) news, solutions, and analysis for IT professionals

Application Management Blogs

  • Review

    Cheat sheets galore: Everything you wanted to know about everything ... almost

    Posted April 14, 2013 - 9:22 pm

    A treasure trove of cheat sheets is yours for the clicking. Visit OverAPI.com for help with nearly any language or tool imaginable.
  • OpenX Ad Server Exploits - How to remove one and protect yourself

    Posted January 4, 2013 - 9:00 am

    Unfortunately OpenX has taken some poorly thought out and executed measures to attempt to monetize their open source version of the software which has introduced some major security flaws.
  • Visual Studio 2012 Update 1 out now

    Posted November 27, 2012 - 12:04 pm

    Fresh off the heels of the ASP.NET Fall 2012 Update, Microsoft is back at it with yesterday's release of the Visual Studio 2012 Update 1 package. Visual Studio 2012 itself was only launched in September so it turns out they weren't kidding when they began their initiative to release development tool updates much more frequently.
  • See how well cloud apps are working for your peers

    Posted November 26, 2012 - 7:19 pm

    A new feature from Boundary is designed to give you insight into the app performance that your peers are getting on the same -- and different -- cloud service you use.
  • Setting limits with ulimit

    Posted November 18, 2012 - 5:45 pm

    Setting limits on your Linux systems can both protect against certain types of failure and ensure that critical processes keep running when systems are heavily used. Take a look at the ulimit command and see what kind of shackles are limiting you – or maybe setting you free.
  • Cloud analytics market heats up with launches this week

    Posted November 16, 2012 - 2:19 pm

    Both Newvem and Cloudability launched to general availability this week. Will Newvem's subtly different pitch attract users?
  • Could TypeScript be the future of JavaScript?

    Posted November 13, 2012 - 12:00 pm

    JavaScript, it's no longer the avoidable nuisance it once was. The flexibility of of the language and its ubiquity on the client side have brought it front and center for modern web developers. The creation of popular JavaScript frameworks, such as jQuery, MooTools, YUI, Dojo, GWT to name a few, have eased much of the pain when it comes to coding, but most of the shortcomings of the language are still inherent.
  • Apple iOS app review - frustrating and bad for your health

    Posted October 23, 2012 - 10:21 am

    This is a bad time for me to write about the iOS app store review process. We've been in a constant battle with them for the past 2 months while launching an iPad application that supplements a web application for the medical industry. The source of our frustration begins and ends with our inability to reach an actual person to have a discussion with.
  • JBoss changes coming soon

    Posted October 1, 2012 - 10:05 am

    As JavaOne 2012 gets started this week, Red Hat is using the occasion to announce some shake ups for its venerable Java-based JBoss product line.
  • Here's what Ubuntu on Android looks like. Could you use it?

    Posted August 15, 2012 - 11:38 am

    You can text, launch Android apps, and take phone calls through that Android phone while you’re in the desktop app. Pretty neat.
  • Android getting down to business with enterprise marketing?

    Posted July 6, 2012 - 8:39 am

    There will be quite a few challenges in Google's way, but a bet on enterprise Android deployments could pay off.
  • New tools finally give users a way to enforce their own privacy

    Posted June 28, 2012 - 12:45 pm

    A rush of new products are designed to add "military grade" encryption to email, text messages and corporate data. None are perfect; none are revolutionary. Collectively they represent acceptance, for the first time, that users should have tools to keep their data secure even from their own employers and tech suppliers.
  • Smartphone cameras will crash the cloud, smother the Internet

    Posted June 26, 2012 - 7:00 am

    Gartner predicts the amount of consumer data stored in the cloud will increase 1,080 percent by 2016, potentially smothering the cloud, the Internet and every advance in storage and bandwidth between now and then in a flood of useless, redundant pictures of cats.
  • Poor man's load balancing

    Posted June 24, 2012 - 7:37 pm

    If you have need to balance traffic among a set of servers and can't afford a load balancer, you can get fairly effective relief using what is often referred to as "poor man's load balancing" -- an easy trick that you implement on your DNS server.
  • Google finds 9,500 new threat sites per day

    Posted June 20, 2012 - 11:24 am

    On the fifth anniversary of its Safe Browsing initiative, Google has opened up about some of the risks it sees trending and what it's been doing about them. Mainly it warns users, many of whom ignore warnings about legitimate sites that have been compromised by malware.
  • Senator calls for limit on peeping by Apple, Google spyplanes

    Posted June 19, 2012 - 4:11 pm

    Apple and Google are fighting for dominance in the mapping/personal navigation market with high-res photos taken from "spy planes" showing more detail of cities, houses, power and water infrastructure and, Senator worries, people sunbathing in their own back yards.
  • Fujitsu cracks 923-bit painfully complex crypto

    Posted June 19, 2012 - 3:15 pm

    Fujitsu has announced a team it was leading was able to break the 923-bit "pair based encryption" during an experiment it used to establish the credibility in business products of a crypto standard mainly the province of academics.
  • Researcher: CIA, NSA may have infiltrated Microsoft to write malware

    Posted June 18, 2012 - 2:46 pm

    Mikko Hypponen, chief research officer of antivirus and security software vendor F-Secure has suggested the ability to suborn both Windows Update and Microsoft security certificates may mean the spies that wrote Stuxnet, Duqu and Flame may be working undercover at Microsoft.
  • Video makes global botnet pandemic look pretty

    Posted June 15, 2012 - 7:00 pm

    Mapping just one minute of global communications among botnets makes it look as if we've been invaded from outer space, not just infected with malware.
  • Error code would warn of web censorship

    Posted June 14, 2012 - 10:16 am

    High-profile Google developer Tim Bray has proposed to the IETF that it adopt the HTTP Error Code 451 to denote a page that has been censored by authorities. His proposal includes space in the error notice for site owners to describe what content has been censored, and why.
  • EU data laws are latest threat to cloud

    Posted June 13, 2012 - 1:19 pm

    The latest security concern keeping multinational corporations away from cloud computing is that increasingly strict European laws tying data on a customer to his or her country of origin undermine cloud technology that make things like geography and operating system irrelevant.
  • 'Tragically comedic' flaw gives anyone root access to 900,000 Internet servers

    Posted June 12, 2012 - 2:13 pm

    It only happens about once every 256 times, and doesn't affect all the millions of MySQL and MariaDB databases that are among the most common apps on the web. 879,000 servers will let anyone log in who has a legitimate username and any password at all. 'Root' works great!
  • Expert calls LinkedIn's new salted hashes useless

    Posted June 11, 2012 - 5:11 pm

    Security researcher Thomas Ptacek didn't slam LinkedIn for not salting the hashes it used to protect passwords. He slammed it for using the wrong kind of encryption, and for not knowing the difference.
  • Generate and keep really secure passwords for free

    Posted June 8, 2012 - 5:27 pm

    The best way to keep from allowing a data breach at LinkedIn or another breached site from being a disaster for you is to use a different password at each. Secure passwords are impossible to remember, however, so storing them in a free password vault is the only solution.
  • How many seconds would it take to break your password?

    Posted June 7, 2012 - 8:00 pm

    Want to know how strong your password is? Count the number of characters and the type and calculate it yourself. Or check this list and see how big a difference between a few billion possible combinations a few sextillion possibilities really is.

Application ManagementWhite Papers & Webcasts

Webcast On Demand

Webinar: Create Competitive Advantage, Featuring Synchology

Sponsor: LogiAnalytics (formerly LogiXML)

Webcast On Demand

Webinar: Create Competitive Advantage, Featuring Synchology

Sponsor: LogiAnalytics (formerly LogiXML)

See more White Papers | Webcasts

Join today!

See more content
Ask a Question