Monthly Archives: May 2012

PaaS deployment models

Dustin's Blog

Rapid deployment capability is table stakes when we are talking about a PaaS solution. Every vendor touts it, and to be frank, every user simply expects it to be there. While I think it is interesting to talk about rapid deployment and perhaps compare speed of one solution to that of another, I think it is infinitely more interesting to talk about the mechanics of deployment for a particular solution. That is, I think the more interesting and important question is ‘What deployment style does a particular solution take?’

At a very high, black and white level, I think two primary deployment styles permeate the landscape of PaaS today: contained and referential. I want to compare each approach, but before that, let me use a few words to describe each style.

Contained: In the contained deployment model, PaaS solutions deploy environments based on packages that contain most, if…

View original post 625 more words

Advertisements

What’s Your Mobile Use Case?

Now that I am working with Worklight, or IBM Mobile Foundation as it will become known, I’m very interested in all things mobile.

Turbotodd

We’re only a week away from the start of the IBM Smarter Commerce Global Summit in Madrid.

So I found it interesting that Nielsen would release these “hard numbers”

about how consumers like to use their smartphones, particularly when it comes to shopping.

Here’s what I see in the data: Couponing is mainly for groceries and clothes, and its geeks who use QR codes (*I* am something of a geek, and even *I* haven’t used QR codes…at least, not yet).

If you’re looking for electronics, you’re likely to read reviews via your smartphone, because you don’t want to be the only idiot who bought the thing who didn’t check out what Joe the Plumber (err, the Coder) had to say about the item before they bought it.

I have a plane to catch, but I’ll be pondering this Nielsen data as I check in to find the status of my…

View original post 5 more words


New IBM Security Study: Finding A Strategic Voice In The C-Suite

Interesting.

Turbotodd

I’m back from IBM Impact 2012…but my brain is still processing all the information I took in through all the interviews Scott and I conducted for ImpactTV and for all the sessions I attended…and I won’t mention all the cocktails in the evenings where I learned SO much from my industry peers.

I’ll be putting together a recap post of some of the major announcements, and I’ve still yet to transcribe my interview with Walter Isaacson, but first, I wanted to highlight an important new study from IBM on the security front.

For those of you who follow the Turbo blog, you know the issue of security (particularly cybersecurity) is one I take very seriously and that I follow closely, partially because of my longstanding interest in the topic, and partially because I recognize we live in an imperfect world using imperfect technology, created and used by imperfect humans.

But…

View original post 873 more words