Blockchain is certainly the rage. No matter the industry, you can't seem to
have a technology discussion before the topic is raised. According to
Gartner's latest hype cycle for emerging technologies, blockchain is
approaching the peak. It is considered by Gartner as one of the ‘Key
platform-enabling technologies to track.' Approximately $1.4B has been
invested in blockchain just this year, according to PwC executive Seamus
Cushley. While there is a lot of ‘hype vs reality' discussions going on,
there is no arguing that blockchain is being taken very seriously across
industries and cannot be ignored.
In its simplest terms, blockchain is a distributed ledger. However, the
reality is much more complex than that. Some of my earlier blogs on
blockchain examine some of those complexities (‘Blockchain - It's So Much
More than Bitcoin', ‘Blockchain - You want me to trust... (more)
Personalization: The Impact on Ecommerce Customer Experience
By Matt Keenan
The generic customer journey is dead. One size no longer fits all – for
both B2C and B2B customers. So how do you make a customer feel special when
the internet has all but eliminated differentiating by product or price?
According to Gartner, the delivered digital customer experience must be the
key differentiator for your organization.1 So it’s no surprise that one of
the top initiatives for retailers is to deliver unique and engaging
experiences to each and every customer they serve, appealing to their unique
wants and needs, on-line and in-store .
The first wave of targeting content, or Personalization, consisted of
segmenting customers into static, broad groups across channels such as web,
email, banner ads, and product recommendations. The premise was that
customers can be grouped based... (more)
How It's Made: A Continuous Delivery Pipeline
By Necco Ceresani
Software delivery was once specific to the IT industry. Now, Continuous
Delivery pipelines are used around world from e-commerce to airline
Building a software delivery pipeline once involved hours of scripting and
manual steps – a process that’s painful, if not impossible, to scale.
However Continuous Delivery with Application Release Automation tools offers
a scripting-free, automated experience. Continuous Delivery pipelines are
immensely powerful for the modern enterprise, boosting production and even
Getting Started: Measure the Existing Process
To get started building a Continuous Delivery pipeline, the IT Manager
measures key metrics from the existing software release pipeline. The most
important metrics to look at are:
Time to Deployment Deployment Frequency Cha... (more)
Jahia (www.jahia.com), the leader in Web Content Integration software, today
announced its partnership with Quoin Inc. (http://www.quoininc.com/), a
leading technology-consulting firm specializing in J2EE Content Management
Systems (CMS) for the last 15 years. The partnership will deliver Web Content
Integration and Content Management Solutions to US companies, by utilizing
Jahia’s robust, all-encompassing integration tools for Quoin’s clients.
“Jahia is a great product partner,” said Brad Kain, Cofounder of Quoin.
“Their services offer the flexibility to meet the constant demand for
dynamic information through simplified information exchange and collaboration
on the Internet. Their support, as well as their product’s ease of use,
will help us to deliver effective solutions to our clients.”
Quoin excels at collaborating with clients to define the most effective ways ... (more)
Click here to follow [email protected]
At its annual Collaboration Summit event, Cisco (NASDAQ: CSCO) Thursday
announced the next phase of its vision for collaboration, which focuses on
delivering innovations that embrace the modern workspace and enable users to
work smarter and more efficiently from virtually anywhere. Cisco designed the
new solutions specifically with the goal of making it easier for teams to
instantly connect, communicate and collaborate -- so people can respond
faster and make decisions more quickly. Tailor-made for the increasingly
mobile and distributed workforce, these new innovations are simple to use,
are highly intuitive and make collaboration easy to scale across
organizations of all sizes.
The modern workspace will integrate tools at work with many of the tools
employees use at home; support mobility trends that enable people to access
Comodo's Two-factor Authentication process is popular with credit unions.
Comodo's Two-Factor process can authenticate online banking customers with:
Usernames and Passwords Digital certificates One-time Passwords (delivered
via phone call, SMS and/or email) Optional Security Questions and Secure
Comodo's solution is easy to install and integrates seamlessly with a credit
union's existing website. After the customer has installed its digital
certificate, the online banking process works just the way it did before,
minimizing the learning curve.
Comodo customers have experienced very little drain on their help desk,
and which further declines after the first couple of weeks.
Comodo's Two-factor process meets FFIEC regulationsby requiring one of each
kind of identifier:
Something the customer knows - (i.e., the customer's password) Something the
customer has -... (more)
Two Degrees Mobile (http://www.2degreesmobile.co.nz/) is New
Zealand’s newest mobile company. They’ve spent $250 million constructing
a brand new mobile network in New Zealand and have launched their offering
this week with extremely aggressive pricing.
This upstart telecoms operation is set to shake up the market in New Zealand
and hopefully (for the consumers) bring mobile charges down to levels that
will encourage a massive growth in mobile communication.
Cloud services provider Xignite announced it is working with Wolfram|Alpha,
the world’s first computational knowledge engine. Under the agreement,
Wolfram|Alpha has integrated Xignite Web services to provide powerful
on-demand financial market data calculations for its users. Xignite Web
services enabled Wolfram|Alpha to meet a tight development schedule and
minimize infrastructure costs prior to its May 2009 launch.
Wolfram|Alpha generates powerful systematic results through real-time
computations on its ever-growing internal knowledge base. Wolfram|Alpha's
knowledge base and capabilities already span many domains and its underlying
framework has the power and flexibility to support any domain that is based
on systematic knowledge. The information Xignite delivers in response to the
search is aggregated and analyzed by Wolfram|Alpha before it is returned to
the us... (more)
Media Dojo speaks with Playfish co-founder Sebastien de Halleux about how the
cloud-based social gaming company has managed to distribute over 100 million
games via Facebook and other social networks in less than 2 years.
SYS-CON Events announced today that Stoneware, a leader in the area of
private cloud computing, was named "Silver Sponsor" of SYS-CON's 4th
International Cloud Computing Conference & Expo, which will take place on
November 2 - 4, 2009, Santa Clara Convention Center, in Santa Clara,
The event is expected to attract over 1,500 developers, engineers,
architects, IT managers, and hardware and software professionals of every
stripe. These solutions help customers and partners change how they organize,
architect, engineer and manage their IT supply chain. The company's solutions
help customers transform their datacenters, enable cloud computing paradigms,
and radically reduce IT costs one application or volume store at a time.
Stoneware is a privately held corporation providing innovative software that
enables organizations to build their own “private” cloud fo... (more)
Jersey City, NJ, September 16, 2009 - As an industry first, Comodo introduces
vulnerability scanning for internal networks in the cloud. This
patent-pending innovation is available with the newest release of its product
Merchants who accept payment cards such as credit cards are required to scan
their networks at certain periods, checking for breaches in security.
Previously, internal network scans required dedicated hardware, run by an
With HackerGuardian, businesses can now run remote scans of their internal
and external networks using the same software. A lightweight bootable agent
installed on one of the local network nodes can be activated by an employee
who may be located in another state, or even on another continent.
Merchants required to meet level 1, 2, or 3 of the Payment Card Industry Data
Security Standards (PCI DSS) c... (more)