Joseph Gulla

Joseph Gulla




Bookmark and Share
RSS

Recent Posts

  • Middleware Is a Favorite Thing
    06/18/2018
  • Another Favorite Thing: Programming Languages
    06/11/2018
  • Some Favorite Things: The Evolution of IBM Z
    06/04/2018
  • 2018 ECC Conference
    05/28/2018
  • Three Rs in Context
    05/21/2018
  • Middleware Is a Favorite Thing

    This week, I have another “favorite thing” that I hope you will recognize and appreciate: middleware, the great amplifier of programmer productivity and application usefulness.  
     

    Read More

    Posted: June 18, 2018 |

    Another Favorite Thing: Programming Languages

    This is the second post about what I would characterizes as “a few of my favorite things,” like the lyrics in the movie—you know the one. Last week, I wrote about “the machine.” Let me continue this week with programming languages. The importance of computer languages is now well-understood and appreciated as applications happen because programmers write code to create them. More than 18.2 million programmers  are writing code today. 

    Read More

    Posted: June 11, 2018 |

    Some Favorite Things: The Evolution of IBM Z

    This is the first of a few planned posts about what I would characterizes as “a few of my favorite things” like the lyric in the movie—you know which one. I am looking back over the last 40 years and I see at least four areas in IT where the impact of a certain kind of computing technology has had a huge impact on the industry and the world that it supports. Let me start with the machine.

    Read More

    Posted: June 04, 2018 |

    2018 ECC Conference

    The purpose of this post is to make you aware that Marist College, with collaboration and support from academic and industry partners and sponsors, will host the 10th annual Enterprise Computing Community conference. This year’s conference is June 17-June 19. Registration is still open but will likely reach the 300-person limit soon. The conference has two themes: disruptive technologies in the enterprise and the Internet of Things.

    Read More

    Posted: May 28, 2018 |

    Three Rs in Context

    In this post, I finish up this series on the three Rs. In the first post in this series, I asked, “Is there a model that will help us analyze and begin to address difficult obstacles regarding needed change, expansion of method or complexity?” The model I proposed involved three Rs: renew, refresh and rework. 

    Read More

    Posted: May 21, 2018 |

    IT Change and Rework

    In this post, I concentrate on the times when rework is needed. It could be to fix something that was not done correctly or to make a modification to an existing solution to enhance its usefulness. As you know, rework is not always so black and white, fix or enhancement. 

    Read More

    Posted: May 14, 2018 |

    A Focus on Refresh

    In this post, I concentrate on approaches and tactics to refresh aspects of a computing portfolio. In the first post in this series, I asked, “Is there a model that will help us analyze and begin to address difficult obstacles regarding needed change, expansion of method or complexity?” The model I proposed involved three Rs: renew, refresh and rework. Last week , we explored renew, now let’s consider refresh using an example featuring Java. 

    Read More

    Posted: May 08, 2018 |

    IT Change and Renewal

    In this post, I concentrate on approaches and tactics to address challenges like breathing new life into applications.

    Read More

    Posted: April 30, 2018 |

    Keeping Up with IT Requires Thoughtful Change and Renewal

    In this post, I concentrate on dealing with change by focusing on taking control and managing the key wants and needs that impact specific IT challenges. The framework for this model is a discussion of wants and needs, approaches and tactics, and expected outcomes. 

    Read More

    Posted: April 23, 2018 |

    IT Security and Data

    This week, I’ll continue with the computer security topic with a focus on data and computer security. According to Techopedia, data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Data security also protects data from corruption.

    Read More

    Posted: April 16, 2018 |

    Displaying results 1-10 (of 234)
     |<  < 1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10  >  >|