Author: Markus Perdrizat

  • Buyout firms team up to take BMC Software private

    Exclusive: Buyout firms team up to take BMC Software private – sources: Private equity firms are joining forces in the auction of BMC Software Inc, four people familiar with the matter said on Thursday, making it more likely that the business software maker will be taken private in a deal that will top $6 billion.…

    By

    ·

  • Return of the Borg: How Twitter Rebuilt Google’s Secret Weapon

    Return of the Borg: How Twitter Rebuilt Google’s Secret Weapon: Borg is a way of efficiently parceling work across Google’s vast fleet of computer servers, and according to Wilkes, the system is so effective, it has probably saved Google the cost of building an extra data center. Yes, an entire data center. That may seem…

    By

    ·

  • It’s a VM Wasteland – A Near Optimal Packing of VMs to Machines Reduces TCO by 22%

    Algorithm Design for Performance Aware VM Consolidation: Consolidation of multiple workloads, encapsulated in virtual machines (VMs), can significantly improve efficiency in cloud infrastructures. But consolidation also introduces contention in shared resources such as the memory hierarchy, leading to degraded VM performance. To avoid such degradation, the current practice is to not pack VMs tightly and…

    By

    ·

  • Key questions when selecting an analytic RDBMS

    Key questions when selecting an analytic RDBMS: Assuming you know that you really want to manage your analytic database with a relational DBMS, the first questions you ask yourself could be: How big is your database? How big is your budget? How do you feel about appliances? How do you feel about the cloud? What…

    By

    ·

  • Going Bright: Wiretapping without Weakening Communications Infrastructure

    Going Bright: Wiretapping without Weakening Communications Infrastructure: Mobile IP-based communications and changes in technologies have been a subject of concern for law enforcement, which seeks to extend current wiretap design requirements for digital voice networks. Such an extension would create considerable security risks as well as seriously harm innovation. Exploitation of naturally occurring bugs in…

    By

    ·

  • Cypherpunk rising: WikiLeaks, encryption, and the coming surveillance dystopia

    Cypherpunk rising: WikiLeaks, encryption, and the coming surveillance dystopia: Twenty years ago, it was cypherpunk that was happening. Looking back in time: another history lesson.

    By

    ·

  • Banks are just data vaults

    Banks are just data vaults: […] banks need to think about how they reconstruct themselves for the 21st century. What this really comes down to is that banks are becoming pure managers of bits and bytes of data. It is the data that has the value today and it is the data that is the…

    By

    ·

  • I Need People to Work Overtime

    Management Myth 15: I Need People to Work Overtime: When a manager wants people to work overtime, to feel invested in an organization, what’s the real issue behind the words? It might be that the manager wants people to have the same sense of investment in the organization as the manager does. In that case,…

    By

    ·

  • Combining guessing and planning in product development

    Combining guessing and planning in product development: At the extremes of product development methodology, characterized by waterfall and agile approaches, are different views about planning. Many today would say that planning a product “up front” is nothing more than guessing that locks you into a guess that will be wrong. At the other end, the…

    By

    ·

  • Trust in Automation

    Trust in Automation: This essay focuses on trust in the automation within macrocognitive work systems. The authors emphasize the dynamics of trust. They consider numerous different meanings or kinds of trust, and different modes of operation in which trust dynamics play a role. Their goal is to contribute to the development of a methodology for…

    By

    ·

By

·