Investing for a brighter, greener, more equitable future

Sustainable Investment

Subscribe to Sustainable Investment: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Sustainable Investment: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

April: Exclusive Interview with Dale Fuller This past February David Skok's new VC firm - Matrix Partners - orchestrated, with Accel, a $10 million investment in JBoss, Inc. This first round of funding in an open source company was a bold play, but then David Skok, famous in the Java arena as the founder of SilverStream Software - acquired by Novell in 2002 - is no stranger to bold moves. The first question then, naturally enough, is to ask Skok whether this investment is somehow a contradiction, or whether there is indeed money to be made from open source? "We think that there's definitely money to be made," Skok says without hesitation. "Red Hat's a clear example," he adds. "They're now profitable on around a $100m annual revenue run-rate. And we're still in the early days of the open source movement."   Curious about the business model he sees underlying OSS, I ... (more)

Exclusive Q&A with Jeff Haynie, Co-Founder & CEO, Appcelerator

"Companies have invested a significant amount of money in SOA – and continue to do so," says Jeff Haynie, Co-Founder & CEO of Appcelerator, in this exclusive Q&A with SYS-CON's AJAX & RIA Journal in the run-up to Appcelerator's session on October 20 at AJAX World RIA Conference & Expo in San Jose, California (October 20-22, 2008). "One of the keys to unlocking the full return on investment in SOA is the ability to build service-oriented UIs (SOUIs) – clients designed to consume services, regardless of language or platform," Haynie continues. "We believe Appcelerator's approach truly zeros in on the need for a clean separation of the application from services in an agile development model," he adds. Read the interiew in full below... About Jeff Haynie Jeff Haynie is co-founder and CEO of Appcelerator, an open source software company that develops products and services... (more)

AJAXWorld Major Sponsorship Opportunities Sold-Out!

SYS-CON Events announced today that AJAXWorld Conference & Expo 2007 West main sponsorship opportunities are now sold-out! The limited number of expo and event sponsorship opportunities that are still available are expected to be sold out soon. The new sponsors who joined the conference this week, and are not yet listed on the conference Website, will also be announced later in the week. The charter sponsors of the most significant Rich Internet Applications event of the year include: Laszlo Systems [Diamond Sponsor]: Laszlo Systems is the original developer of the open source platform OpenLaszlo, and provider of Rich Internet Applications and services that advance the Web experience. OpenLaszlo is an XML-native foundation for building next-generation Web applications that increase customer retention, conversion and brand loyalty. Laszlo provides comprehensive suppo... (more)

Bringing SOA to Life: The Art and Science of Service Discovery and Design

In a service-oriented architecture (SOA), a service is a unit of work performed by a service provider to achieve desired results for one or more service consumers. A service provides a function that is well defined, self-contained (for example, loosely coupled to its environment), described solely by its interface contract and behavioral attributes (for example, it hides implementation), and located anywhere on the network. Essential components of an SOA - such as a service provider, service repository, service mediator, and service consumers - all rely on service definitions as the key element to describe, access, transport, and understand services. Modern SOA as a pattern for transforming enterprise architecture is still emerging, as are the strategies for service discovery and design. At this juncture of SOA's maturation, it's highly useful to consider concepts a... (more)

Threat Assessment and Its Input to Risk Assessment

About this Article This article is an excerpt from Risk Management for Computer Security: Protecting Your Network & Information Assets. Printed with permission from Butterworth-Heinemann, a division of Elsevier. Copyright 2005. For more information about this book and other similar titles, please visit www.books.elsevier.com. In this excerpt we examine the role of threat assessment and its importance in the accurate and effective assessment of risk. Threat It seems appropriate to start this chapter by explaining what is meant by a threat assessment. In information security, this is probably one of the most abused and misunderstood terms and is often used interchangeably with the term "vulnerability." In this book, the word "threat" is used to describe those "things" that may pose a danger to the information systems, and for clarity, the term "threat agents" is used.... (more)

Scalable Pricing in a Scalable World

Nati Shalom's GigaSpaces Blog In most discussions about scalability, we often approach the topic as a pure technical/architecture challenge, and ignore cost issues. The problem is that when we truly scale our application, and want to benefit from economies of scale, we're going to end up with scale limitations, not because of technical issues, but because of the pricing and licensing models. In most discussions about scalability, we often approach the topic as a pure technical/architecture challenge, and ignore cost issues. The problem is that when we truly scale our application, and want to benefit from economies of scale, we're going to end up with scale limitations, not because of technical issues, but because of the pricing and licensing models. Scalable pricing Scalable pricing means a pricing scheme that provides the benefits of economies of scale. Below are pric... (more)

The Powerful Economic Underpinnings of OSS

In 1968, Garret Hardin wrote a seminal paper that ran in Science Magazine called “The Tragedy of the Commons.” Hardin defined the commons as a place where multiple people are each endowed with the privilege to use a given resource, and no one has the right to exclude another. Think of a pasture where many farmers can graze their animals. When multiple users have such privileges of use, each user benefits directly from using the resource (one more cow in a farmer’s herd benefits that farmer directly) but the cost of each person's use is borne by all users (the increased use that one cow puts on the pasture affects all users of the pasture). The result is that each user has an incentive to use the common resource more, and less incentive to curb their use of the resource. The resource is thus prone to overuse and, over time, it degrades - a tragedy of the commons. The... (more)

Cloud Computing: A Step in the Right Direction

We all take for granted that our online applications at home will perform the instant we need them. Whether it’s Voice over IP, video on-demand, gaming, or other applications, we have instantaneous, high-speed access, anytime. In this environment, IT managers are now facing the question: “Why can’t you deliver the same quality of service at work that I experience at home?” Despite spending three to five percent of total revenues on computers, software, and IT services, corporations today still are not able to deliver this same level of performance we receive in our homes. To attain this level of speed and reliability, businesses need to shake off the antiquated computing model of the past and learn from today’s leading Web-based service vendors. The Challenges of the Corporate Data Center Despite all the technological changes that have occurred in recent years, corp... (more)

Towers of Babble - Preventing the cellular tower industry from toppling

Towers everywhere, but who owns them and how? We take a look into the world of the REIT. It's not just the network and phone manufacturers who are making it big with wireless. All of those transmitter towers have to go somewhere, and a whole raft of companies specializing in locations to put those towers have sprung up. This is a completely new business, with no precedents or business models to go with it, or is it? When is a cellular tower company not a cellular tower company? When it's a REIT. The typical REIT (Real Estate Investment Trust) is a real estate company that develops, acquires, owns, manages, and sells income-generating properties like apartment buildings, office buildings, and shopping centers. By law, a REIT, which does not pay taxes at a corporate level, must distribute 90% of its taxable income to its shareholders every year. Cellular tower compan... (more)

SYS-CON.TV Broadcasts SOA World 2007 West Keynote

In his opening keynote address at SOA World 2007 West in San Francisco, Software AG Deputy CTO Miko Matsumura challenged an SOA World audience to make service-oriented architecture core to their enterprise operations over the coming year. Citing the transformational success of earlier adopters, Matsumura argued that current laggards risked ceding an insurmountable advantage to their competitors if they did not accelerate their adoption of SOA. He also urged attendees to look beyond today’s often artificial litmus tests for architectural purity in order to embrace a more pragmatic and evolutionary approach to SOA adoption. VIEW MIKO MATSUMURA KEYNOTE ON SYS-CON.TV HERE SYS-CON.TV's SOA Power Panel live from the SOA World Conference & Expo, on Monday, November 12, 2007, in San Franacisco. Panel included Kyle Gabhart of Web Age Solutions, Kevin Hakman of TIBCO, Sandy ... (more)

The Business Value of SOA-Based Agile IT Architectures

Agile IT systems are systems that are malleable enough to address business uncertainties. Such systems can effectively respond to internal and external stimuli in a very short period of time. Flexible IT systems imply that the IT architecture underlying them is itself flexible and lends itself to incorporating changes in a dynamic fashion. Architectural approaches such as Service Oriented Architecture (SOA) are transforming the way IT systems are designed by bringing in a high degree of reuse and loose coupling of applications. IT architectures include the technology, strategies, plans, and principles that guide an organization's new technology investments as well as manage the existing technology investments. The objective behind having a good IT architecture is so an organization can operate with a high degree of flexibility while keeping the cost for the techno... (more)