Consumers and business-users can't get enough of Web 2.0 applications. Businesses love the quick deployment, adaptability, and potential to drive sales and increase customer engagement. But Web 2.0 apps have a catch: an insatiable appetite for server computing power.
Consumers and business-users can't get enough of Web 2.0 applications. Businesses love the quick deployment, adaptability, and potential to drive sales and increase customer engagement. But Web 2.0 apps have a catch: an insatiable appetite for server computing power.All the instant interactivity that's so seductive about Web 2.0 demands computing power and businesses running successful Web 2.0 apps face the prospect of adding server rack after server rack to face demand. Or as an official Citrix statement put it:
"While Web 2.0 applications are ushering in a new era of enhanced functionality and responsiveness for end users, they are highly inefficient when it comes to server computing resources. In order to create a rich interactive experience, Web 2.0 applications need to maintain a one-to-one user connection to backend servers for extended periods, which severely taxes datacenter resources and adversely impacts performance and scalability."
So how to deliver all the features of Web 2.0 apps without going on a server spending spree? Fake it.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.