Entrepreneurs and Innovators Driving the Technology Community

Entrepreneurs

Subscribe to Entrepreneurs: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Entrepreneurs: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

Web Security Journal: There's been a flurry of discussion this week among Internet and Web standards heavy-hitters around WebSocket, the new communications protocol supported in Chrome 4 and Safari 5. What was the main issue? Is there some kind of fundamental security vulnerability with the WebSocket (WS) protocol? John Fallows: When surfing the Web, our browsers may communicate with Web servers via HTTP proxies that deliver many benefits, such as providing previously cached Web content more efficiently than repeatedly contacting the target server. These proxies may be either explicitly configured at the browser or they may form part of the general network topology to intercept the communication path implicitly. Securely encrypted Web communication cannot be intercepted by such proxies. Members of the Hypertext Bidirectional (HyBi) IETF Working Group recently comp... (more)

Cloud Expo New York Call for Papers Now Open

Early Bird Savings Cloud Expo Cloud computing is a game changer. The cloud is disrupting traditional software and hardware business models by disrupting how IT service gets delivered. Entrepreneurial opportunities abound as this classic disruptive technology begins to proliferate, so it is no surprise that SYS-CON's industry-leading International Cloud Expo is going from strength to strength. The 5th International Cloud Expo, to be held April 19-21, 2010, at the Jacob Javits Convention Center in New York, NY, announces that its Call for Papers is fast approaching. Topics on which submission are welcome include all aspects of providing or using massively scalable IT-related capabilities as a service using Internet technologies (see suggested examples below). Help plant your flag in the fast-expanding business opportunity that is The Cloud: submit your speaking propos... (more)

XtremIO, XtremSW and XtremSF EMC Flash SSD Portfolio Redefined | Part 1

EMC (@EMCflash) has announced some new, enhanced, renamed and a rebrand flash solid-state device (SSD) storage portfolio around theme of XtremIO. XtremIO was the startup company with a new all flash SSD storage array that EMC announced they were buying in May 2012. Since that announcement, Project "X" has been used when referring to the product now known as XtremIO (e.g. all flash new storage array). Synopsis of announcement Product rollout and selective availability of the new all flash SSD array XtremIO Rename server-side PCIe ssd flash cards from VFCache to XtremSF New XtremSF models including enhanced multi-level cell (eMLC) with larger capacities Rename VFCache caching software to XtremSW (enables cache mode vs. target mode) What EMC previously announced: Buying the company XtremeIO Productizing the new all flash array as part of Project "X" It would formally... (more)

Mobility News Weekly – Week of November 10, 2013

The Mobility News Weekly is an online newsletter made up of the most interesting news and articles related to enterprise mobility that I run across each week.  I am specifically targeting information that reflects market data and trends. Also read Enterprise Mobility Asia News Weekly Also read Field Mobility News Weekly Also read Mobile Commerce News Weekly Also read Mobile Health News Weekly Looking for an enterprise mobility solution?  Read the Mobile Solution Directory Here! Swedish multinational telecoms company Ericsson has released its latest Mobility Report revealing that according to its data, the number of global mobile subscriptions will reach 9.3 billion by 2019, 5.6 billion of which are predicted to be for smartphones.  Read Original Content New findings from leading hi-tech analyst, Juniper Research, has revealed that global wearable “Smart Glasses” shipments... (more)

Creating JavaServer Faces Maven Managed Projects with Eclipse

Step 1 Create a project based on my blog “UPDATED Setting up a JEE 6 Web Profile Maven Project in Eclipse using TomEE”. Step 2 Eclipse reveals its special capabilities such as specialized editors based on the project’s facet. As it now stands the project you just created will allow you to create Servlet/JSP applications. You need to add the JavaServer Faces facet to the project. Right-mouse click on the project and select Properties and then select Project Facets. You will see: You now need to add the JavaServer Faces facet version 2.1, change the Java version to 1.7 and uncheck JAX-RS. It should now look like: The version of TomEE, 1.6.0, that I am using does not yet have JSF 2.2 in its library. Its current version is 2.1. If you need to use 2.2 then there is a beta version of the library available as of this writing. Do not click on OK yet. Step 3 Notice the lin... (more)

ActiveState Launches Business Edition

Open Source Journal on Ultizer ActiveState, the dynamic languages experts, today launched ActiveState Business Edition, commercial-grade language distributions for Perl, Python and Tcl, providing organizations open source compliance, commercial support, and cross-platform access. "ActiveState has been a leading contributor in the open source community for years," said Bart Copeland, President and CEO, ActiveState. "With the launch of Business Edition, we can help companies deploying Perl, Python and Tcl in their business-critical applications, ensure open source policy compliance, minimize downtime and accelerate productivity cost-effectively. ActiveState's deep technical expertise is focused on keeping client systems, powered by dynamic languages, running smoothly, and making sure clients are in compliance with their open source policies." ActiveState Business Edi... (more)

Cloud Expo Silicon Valley: Call for Papers Closes July 4

Cloud and virtualization are the Power Couple of enterprise computing: the cloud offers potentially unlimited scalability (both up and down) while the virtualization of resources ensures that system management issues are hidden from the end-user. It is a marriage made in heaven. As enterprises in ever-increasing numbers start to to evaluate cloud computing, many are assessing which applications can run in public clouds, which should run in a private cloud, and how to ensure that applications will be portable from one to another. Since there will be many different kinds of clouds, another issue is what kind of cloud resources should you use? How easy will it be to migrate to a public or private cloud, and how easy will it be to move between them? If you entrust your data to a Cloud Computing vendor, how will the vendor secure your data and segregate it from that of o... (more)

[Update 2] WikiLeaks & Web 3.0 - A Commentary

[Further updated to include advance word of Jay Rosen/Dave Winer "Rebooting the Media" podcast - #75 coming Monday Dec 6] [Updated to include PayPal announcement of the closure of WikiLeaks' PayPal account.] Is Web 3.0 maybe going to be less the utopia we've been envisaging and more like the real, physical world, with all the real-world limitations that follow along with it...? The latest WikiLeaks ("Cablegate") affair, coming as it does at the very end of the first decade of the 21st Century, comes at an appropriate moment. An undoubted political and diplomatic hornet's nest, the swirling discussions surrounding the organization's drip-drip release of (so far) 612 of the quarter of a million or so diplomatic cables in its possession are all grist to the mill of an "awakening" that in my view is likely going to mark the difference between the Web of 2000-1010 and that... (more)

Candelis Releases Next-Generation Technology

Candelis on Tuesday announced the release of its next generation technology -- code-named 'Badlands' -- a WAN optimized solution which also enables its entire customer base to leverage the capabilities available in its ASTRA™ cloud services platform through a simple software upgrade. Candelis' ImageGrid appliances have been implemented at over 1,100 medical facilities. Badlands enables Candelis' customers to leverage ASTRA's highly automated and customizable electronic report distribution service. Secure study transfer can occur between sites possessing Candelis appliances and between sites that don't; Candelis' ASTRA Plus provides a software-only DICOM-compliant transfer point (both send and receive). Furthermore, Badlands provides Information Lifecycle Management (ILM) services with the ability to use cloud-hosted archiving. ILM services also provide for automatic... (more)

New Key Technology Simplifies Data Encryption in the Cloud

Data at rest has long been protected by technology called public key infrastructure (PKI), in which data is encrypted when it’s created by a public key and only decrypted, in theory, by an authorized person holding the private key. But extending this type of data protection to the cloud can be complicated. The migration to the cloud has introduced a new set of complex security issues for IT teams to manage due to the lack of direct control over the security of the data. Moreover, cloud providers believe that data security is a shared responsibility, where the service provider assures physical security and the subscribers must secure their servers and data. Presumably this would include a strategy for encryption and key management which requires that the keys be stored outside the cloud rather than in it. Startup security company Porticor just released a solution tha... (more)

Heisenberg’s Cat - Evaluating the Situation with Google

I was reading an article about how Google is going to change their algorithms to penalize sites that are overly optimized for SEO.  It’s no surprise to arrive at an end state where rules of a system are gamed when pecuniary gains are available. The entire SEO industry has grown up around trying to figure out how to optimize sites for Google’s black box. To ensure an improved customer experience, this action was inevitable. Paul Graham recently wrote that building a search engine was a frighteningly ambitious startup idea.  He accurately points out that the once spartan design of the Google homepage is now an overly cluttered mélange of links and ads.  PG is calling for hackers to build a better mousetrap, but what I thought of when I read his post was about Heisenberg’s uncertainty principle. You see, Google is a completely algorithmically driven enterprise. They ... (more)