Ayoka Application Development Services Blog


GitHub is Redefining Collaboration in Software Development

GitHub is the world’s largest code hosting repository, utilized by over 8million designers and developers that collaborate on projects. First launched in 2007 by Tom Preston-Werner, Chris Wanstrath, and PJ Hyett in San Francisco, it has grown to be accepted worldwide among designers and developers of all aptitudes. They have adopted the fitting slogan “build software better, together.”

GitHub’s web-based economy is redefining teamwork, by making it increasingly easy for developers to work remotely to contribute to team efforts privately through paid plans, or free accounts that host open-source projects. GitHub is mostly used for code, but GitHub is not solely for programmers, in fact, they state that any “knowledge worker” (defined as almost any professional who makes use of a computer) can benefit. The GitHub repository supports an array of file types-from 3D render files, PSD (Photoshop) files, documentation (like Word) and wikis, issue tracking, geospatial data, and Gantt charts. GitHub even services the enterprise, GitHub Enterprise is similar to GitHub’s public service, but it’s been refined for utilization by large-scale enterprise software development teams where they host their repositories behind a protective firewall. They have recently opened their doors to college students, along with a number of other companies that offer services such as domain name registration, in an effort to bring new developers into the GitHub community with the GitHub Developer Pack. They are offering the opportunity to collaboration, code review, and code management for open source and private projects in a Micro account (normally $7/month) with five private repositories while a student is enrolled in school with a current college email.

The majority of GitHub’s server infrastructure runs Ubuntu and is managed with Puppet. GitHub needs the ability to make changes quickly, especially security updates and deployment of new features, so they utilize Puppet software. The software that runs GitHub was written using Ruby on Rails and Erlang by GitHub, Inc. by developers and co-founders Chris Wanstrath, PJ Hyett, and Tom Preston-Werner.”The real star of our network, aside from out ops team, is Hubot,” says GitHub’s security monitoring expert, Scott Roberts, “Hubot is GitHub’s home grown chatbot. He does everything from finding silly pictures to deploying GitHub itself and to helping us search through our logs. Hubot has really been a game changer for us and how we run GitHub. We also use Puppet on our OS X desktops too, a project we released called Boxen. It’s been an effective way for us to manage a geographically distributed fleet of laptops, as made it easy for our developers to collaborate on projects.” Regarding in-house security, Roberts goes on to say that “one of the keys to protecting projects from these types of attacks is protecting the key accounts that manage the project. Without authenticated access to a project it’s impossible for bad guys to inject malicious code or trojaned downloads. We’ve made a lot of changes to make it easier for users to protect their accounts, such as providing a two factor authentication option last year and improving organization controls.”

The future certainly has a lot in store for GitHub, as more developers and designers gather to collaborate, test, debug, and create projects. Roberts’ “approach is always that the 2nd time you do a task is a coincidence, but by the third time you should be thinking about how to make something automated and repeatable. We do this using Hubot for many tasks, Boxen for Hubber systems, and Puppet for our servers,” he says. “In my mind security is all about preparing for the emergencies, and one of the best ways to do that is to make sure that the simple things are out of the way.”

3 Benefits of Monitoring and Reporting

Monitoring and reporting solutions allow you to manage IT data centers, virtual environments, or cloud servers with ease. The results of these analyses offer insight into availability, performance, and utilization. Examining existing vulnerabilities in a system will help to properly diagnose core issues and aid in proper creation and implementation of an optimized solution.

1. Productivity is increased with the ability to correctly identify weak points in your systems and correct them to mitigate risk for any warnings to be overlooked, leading to potentially crippling issues. It’s best to measure and monitor software inventory to be well informed you when changes occur, such as when software updates are downloaded or when network identifiers change. Allowing hardware to get older and fail, neglecting to perform regular system backups, identifying and securing holes in code, and failing to update software can all be sources of vulnerabilities. Identifying and improving these vulnerabilities will help to progress daily work performance, prevent business disruption, and see an immediate return on investment in the form of security.

2. Reliability in your systems are improved when you get detailed reporting and analysis on critical data that analyze IT and web operation service levels, resource utilization efficiency, exception reports, and operations strategies. Event management can send alerts to network administrators when the homeostasis of the system changes in any way-from databases going down to configuration or inventory changes. The notifications can be sent via SMS-text, email, or performing specific automated duties. The ability to spot these vulnerabilities early on and monitor them as solutions are implemented will save you and your clients time and energy spent making big changes to your systems.

3. Piece of mind is granted when you know that the systems you managed are being properly monitored, that your vulnerabilities are being tested and updated to mitigate risk of loss of data, time, and money. Performing capacity planning properly will help your application services scale appropriately with increasing demand. With these abilities, you determine what your existing network systems can handle to ensure successful deployment of new implementations while mitigating risk associated with major change by proactively detecting performance issues.

There is a lot to gain from reporting and monitoring your network systems, determining what your strong points and weaknesses are, then implementing these new and improved processes that are proven to be secure while utilizing event management that your administrators when any changes or vulnerabilities are noticed. In addition to piece of mind, customer loyalty and retention can be gained with consistent performance and utilization of the best practices for monitoring and reporting.

International Consumer Electronics Show 2015!

For over 40 years, the International Consumer Electronics Show (CES) has been the hub of business in consumer technologies where innovations and forward thinking entrepreneurs have introduced their products and ideas to an eager marketplace. This week, the Consumer Electronics Association will be bringing the International CES to Las Vegas, and with it will come a star-studded lineup of professional athletes, TV and Hollywood celebrities, and music icons to showcase the newest technological trends starting today!

We have already witnessed some star power yesterday and today during the International CES Press Day that took place yesterday. Theoretical physicist, bestselling author, and public speaker Dr. Michio Kaku attended Toyota’s press conference on their official CES Press Day yesterday along with cinematographer Wally Pfister, who was in attendance for Sharp Electronics’ Press Day. Retired basketball player Shaquille O’Neal made an appearance for Monster Products’ Press Day yesterday too.

Nick Cannon will be Ambassador of the Entertainment Matters program that will show new devices, technologies, and platforms for streaming and showing media with the opportunity to meet entrepreneurs, attend informational sessions, and offer the opportunity to make lasting connections. Dr. Phil will be hosting the Digital Health Summit which will detail debates, innovations, and opportunities in digital health and wearables for personal health and doctor-patient relationships. Dutch DJ and record producer Tiësto will host a Fireside Chat and sign autographs this week, fashion designer and former “Project Runway” contestant, Nick Verreos, will be hosting the FashionWare shows, and Ryan Seacrest will headline address with Bob Pittman, chairman and CEO of iHeartMedia Inc., at C Space at ARIA, a new show location at the 2015 CES that will serve as the go-to place for creative communicators, brand marketers, advertising agencies, digital publishers and social networkers.

As the largest and most anticipated global event of its kind, International CES showcases tech and how it permeates through all industries. Owned and produced by the Consumer Electronics Association (CEA), it is guaranteed to attract the world’s business leaders and pioneering thinkers to a platform where the tech industry’s most relevant issues across all, unique, industries are addressed-from healthcare to entertainment.

Best of Tech 2014

Since the new year is just beginning, I wanted to take some time to put together last year’s memorable events in tech across multiple industries to reflect on. Programming advances in enterprise, new healthcare technologies that were adopted, industrial revolutions through utilization of robots, finance acquisitions and new accessibility to banking, optimization of clean energy, connected cars, cable wars and the growth of media accessibility, security vulnerabilities and hacks, wearables, and the Internet of Things have all taken place this year and set the stage for what will happen this coming year!

10. Programming Development for mobile has driven change in the web environment and the way we interact with our devices entirely. New hardware is becoming more readily available for consumers and brought about big changes to the way mobile  is optimized for both individuals and the enterprise, and companies are poised to meet the growing demands. This year, Google revealed their new language that takes visual aesthetic as priority, called Material Design, and it utilizes tactile actions and propensities, optimizes based on device size, and magnifies the basic intentions of design while giving meaning to motion. Apple’s new Swift language is optimized for mobile and builds on the fundamentals of C and the widely used Objective-C without what Apple described as ‘constraints’ of C compatibility. It’s the new language for Cocoa and Cocoa Touch, the frameworks for building software on iOS and it’s readily compatible with existing Objective-C code. Satya Nadella, Microsoft’s new CEO, declared that the new .NET Core will be open source with the ability to build for and support all development platforms.

9. Healthcare The healthcare industry has embraced new technologies this year and has streamlined the process of many appointments, from eyeglass fittings to regular checkups. Many new technologies are equipped with noninvasive sensors, microchips and embedded miniaturized electronics that can model clinical trails to test the safety and efficacy for treatment on a patient. People are already able to buy wearables integrated with sensors and microchips to improve and monitor their health. Because mobile solutions allow data to be collected at a much faster rate, data can be collected with greater flexibility and more frequently during clinical trials. The mobile healthcare market and its devices, applications, and services are expected to grow by 25% annually, exceeding $8 billion by 2018.

Security, scalability and the ability to connect the mobile apps to other healthcare systems or centralized databases are top priorities for software developers who are building these new mobile applications. Advanced Encryption Standards (AES) of handling electronic data on the client and the server-side ensure that data is not lost or misused by physicians or malicious users. “Security by Design” is the notion that holds these principles of privacy and security from the beginning of the development and implementation processes. Federal Health IT professionals have since taken interoperability as a priority in an attempt to promote health information exchange, they are contending with what may be misappropriation from doctors and other IT professionals and have found themselves in an investigation on what entities are behind what’s being called the “information backing problem.”

8. Industry As automated machines and robotics segue into the manufacturing process by performing repetitive procedures, innovations are being made to optimize their presence in the industry. Through implementations of different qualities, like scanners for bar-codes or the ability to process at high speeds to increase productivity, we have seen manufacturers improve space once congested by production lines. Application development to connect to equipment and devices to a centralized database by utilizing traditional and open-source frameworks to enable web-based remote monitoring of production environments, and design e-commerce systems for distributors that feature back-end integration for production work orders, inventory database, and shipping systems to allow technical operations management through every part of the manufacturing process. Robots and automated machines have been conveniently filling jobs that humans find boring and autonomous while we implement machine learning, sensors, and artificial cognition in hopes of them being able to take on even more human jobs, alleviating the need for human labor and opening the job field so that humans can continue to self-actualize through new jobs. It’s hard to believe when you hear that 70 percent of today’s jobs will be replaced by robots by the end of the century! They’ll do jobs we can’t do at all, and they’ll come to do jobs that we never imagined needing to be done. As we segue out of these position, we will be able to finally discover new jobs for ourselves, new tasks that expand who we are. We can teach the robots take our jobs like we did in the Industrial Revolution so we can follow the intrinsic motivation to do more work that matters to us!

This holiday season, many turned to online shopping to send and receive purchases for gifts. Current industry solutions call for managers and workers to pull inventory and get them ready to ship, but Amazon has banded with Kiva Systems to cut links from the supply chain and provide products to consumers at a higher speed. Amazon’s acquisition of Kiva Systems allows them to utilize industrial app development to simplify their picking and packing process. So instead of the pick-and-pack system of workers choosing the correct products-Kiva’s robots bring the products to the managers. Their mission was for products to be able to choose themselves and benefits the workers at Amazon who would have to move across large distribution centers to find products and fulfill orders. They also made a big step in utilization of drones for the enterprise by testing Amazon Prime Air, and we can only hope that the FAA allows Amazon to continue their innovations to give us all the best service that we can hope for while cutting emissions and the $4 billion in shipping expenses. Maybe soon we can receive our small Amazon purchases promptly and unscathed, Amazon’s vice president of global public policy, Paul Mesiner, hopes that “one day, seeing Amazon Prime Air will be as normal as seeing mail trucks.”

7. Finance This year, we have seen an increase in accessibility to our banking accounts through mobile banking apps that offer remote money management, photo check depositing, and card-less payment options through Apple Pay, which was possibly the most highly anticipated functionality that Apple has offered as a service, to make card payments in-store and in-applications as secure as possible.

Enterprise made big investments in IPOs, acquisitions, and mergers. PayPal went on its own this year, breaking away from Amazon to concentrate on its specialized services, then Amazon went forward and acquired Twitch.tv for $970 million! Google bought DeepMind, the UK company with the goal of making computers that think more humanistically, for $500 million. Now they have acquired Titan Aerospace and plan to utilize its products and services to shower the world in Internet access with high-altitude flying drones. During the acquisition of Titan Aerospace, Google ran into another company that has also been buying up technologies, like Oculus Rift, and has been making plans to implement their newly acquired products and services to further interpersonal relations-that company is Facebook.

6. Energy / Lifestyle This year, President Obama and the EPA aim to fund clean energy technologies that will ultimately power millions of homes and create tens of thousands of jobs while reducing greenhouse gas pollutants, and to enforce the fuel economy standards for trucks, buses and vans that will reduce emissions by hundreds of millions of tons. Carbon pollution is the biggest driver of climate change, and the United States’ use of electricity and transportation, along with industry and commerce, make up 92% of our greenhouse gas emissions.

Through use of the smart grid model for energy providers to monitor and communicate with the electric grids while delivering power, we hope to utilize new technologies like Nest since heating and cooling systems account for more than half of all home energy bills and could be cut down by at least 25% with careful monitoring and customization. Nest’s energy-efficient technology can help you to monitor and cut down on energy usage by offering scheduling that adapts to your heating/cooling trends, auto-away sensors to shut off the heating/cooling when you’re not around along with the ability to control the thermostat remotely.

5. Transportation This year, we have seen advances in remote operation of drones and unmanned vehicles from the Department of Defense. Unmanned Ground Vehicles (UGV) can be controlled remotely through teleoperation and its functionalities have even been in the works at our local University of Texas at Arlington. They’re equipped with sensors, cameras, and attachments that enable sampling while offering the ability to have information displayed to the operator. These machines can operate in GPS-denied environments and are equipped with machine learning techniques that can be applied to motion planning and perception which prove perfect for clearing obstructions, or performing perimeter security to ultimately protect a human Warfighter from potential danger while improving safety and situational awareness. They hope to take more soldiers out of stressful and dangerous situations to save lives. Those weary of the current US drone operations in the Middle East that relied on GPS for courses and bombing routes that left thousands of civilians dead will hopefully find comfort in the DoD’s Roadmap, since the officials say that while the unmanned naval vessels will be able to track down and follow adversaries, a human operator will have to fire weapons.

We have seen increased implementation of computer interfaces in our vehicles and The Connected Car concept has been the topic of discussion and a goal for most all tech companies, including big names like Google and AT&T who hope to integrate their existing big data into the automotive industry to address both safety and security issues. Lengthy conceptualization times and attention to detail have yielded great results and connected cars have already surpassed expectations by offering in-car diagnostics and satellite mapping systems. Be on the lookout for new native applications that will help to unlock your doors, find your car’s location, or remotely start your car all from your smartphone. These manufacturers have melded minds with developers and engineers to bring the future of the driving experience to you!

4. Media Accessibility We all remember the acquisition between IBM and Apple and Microsoft’s new CEO, Satya Nadella, offering freemiums that benefit smartphone users everywhere while concentrating on a mobile-first and cloud-first movement that will take Microsoft in a new direction. Carmelo Anthony became a venture capitalist when he familiarized himself with wearable tech his New York Knicks teammates were wearing to quantify their performance and has since formed an alliance with his cofounder Stuart Goldfarb to create M7 Tech Partners with a goal of keeping an eye out for new technologies to fund.

Blackberry and Samsung joined forces to bring management-services to consumers, rivaling the pair IBM and Apple who officially teamed up to develop enterprise-specific applications, combining user-friendliness and familiarity with big data tech by utilizing IBM’s ability to offer security, analytics, and device management along with Apple’s already popular iPads and iPhone. With the unveiling of the DirecTv/AT&T and the Comcast/Time Warner Cable mergers and their attempts to captivate the consumers of television and Internet here in the US, Google merged its GoogleTV service into Chromecast which is compatible on Andriod and iOS mobile platforms along with Chrome, Apple, and Windows operating systems to watch online content on their systems without the need for a new TV, new remotes or interfaces. Regarding the merger between DirecTV and AT&T, AT&T CEO Randall Stephenson said: “This is a unique opportunity that will redefine the video entertainment industry and create a company able to offer new bundles and deliver content to consumers across multiple screens – mobile devices, TVs, laptops, cars and even airplanes. At the same time, it creates immediate and long-term value for our shareholders..together we’ll be able to enhance innovation and provide customers new competitive choices for what they want in mobile, video and broadband services.” Google Fiber is being laid down in Austin to push growth and endorse the future of access to technology within the community. What does this amount of bandwidth offered by Google Fiber mean for the existing Internet Service Providers (ISPs) like Time Warner Cable and AT&T that offer 15Mbps as a standard bandwidth? Well, they seem to be lowering their prices and upping their standard bandwidth in an attempt to retain their existing customers, as well as make a point to commit other Austin residents to their service before Google Fiber hits the local market.

Convenience through accessibility is the main point of interest in the relationship between people and their devices. People are getting used to accessing their emails, playing games and being entertained, communicating, and even trying to get some work done with their personal devices. In fact, research firm IDC has estimated that nearly 70% of all smartphones used for business are actually employee-owned devices. BYOD, or “Bring Your Own Device,” is often the goto method of employees without mobile access to the business models and information going through their own devices to access the information, which is proactive, but ultimately opens a company and its information to security vulnerabilities that aren’t able to be managed by the company itself because the device is owned by the employee. We’ll see how this plays out with new enterprise options from IBM and Apple along with the growing need for native applications for company access on individuals’ mobile devices.

3. SecurityCyber Security breaches in which both employee and customer data were compromised made headlines-like those of Home Depot, Target, and Sony-which has led online shoppers to take heed and be aware of the point of sale systems they are using.This year, shopping via a mobile device like a smartphone or tablet has risen %15 and in-store pickup has offered the ultimate bridge between the available inventory of the web and the storefront. Consumers are expecting more to trust retailers in the form of valid SSL certificates and often look for security guarantees through the buying process. Expired or questionable certificates are flagged by Google and many do not even bother clicking through them, leading them to shop elsewhere, while the verified green SSL security lock you can see in the URL address bar increases customer loyalty by %60-as well it should! The Heartbleed bug exposed vulnerabilities in the SSL and allowed malicious sites to parade around behind the guise of secure web applications that are commonly used, like Ebay.The Heartbleed bug got its name from the implementation of OpenSSL’s cryptographic security extension, called Heartbeat. Since it turned out that Heartbeat exposes serious vulnerability in the Secure Sockets Layer (SSL) of the Applications Layer in the Internet Protocol Suite, which is the designated protocol for providing and maintaining security on the Internet from the Hypertext Transport Protocol (HTTP) to HTTPS (the ‘S’ stands for secure), the bug was called Heartbleed.

2. Wearables This will be the year remembered for the explosion of wearables on the market, offering a myriad of devices that can be worn around the neck, or on the wrist, of the user to grant the ability for one to self-monitor and quantify their heart rates, steps taken daily, and even sleep habits. The fitbit flex allows you to set goals for yourself while earning badges upon completion, and it easily syncs with your computer or smartphone to provide monitoring and constant access to your real-time data through charts, graphs, and other tools. This data can be shared and This awesome wearable even has the app, MobileRun, that maps routes, tracks hikes and treks, record workouts, and even read barcodes of your favorite foods to manage nutritional information! Apple new Apple Watch, showcases the ability to utilize Touch ID to make card payments in-store and in-applications as secure as possible.

These awesome little gadgets don’t come without their share of privacy concerns. Information from sources like radio-frequency identification (RFID) tags, which are in cars, computer equipment, smartphones, and other devices, can serve as a trove of information that can quickly grow into a conglomerate-hence the name “Big Data.” This big data can be harnessed and used by industries like insurance and marketing to identify consumer behaviors and utilize media real estate to build a well-structured, customer-centric, business plan. Data-driven strategies will help to broaden the perspective of both new and evolving business models. These help to understand aspects of a customer’s current assets, along with their purchasing and investing trends to help businesses develop new products and expand into new markets with insights that will attract and retain the best customers, gaining a competitive advantage among other businesses while ensuring return on investment. Tatiana Melnik, an attorney who works in healthcare IT explains, “The software is only as good as the developer.” The more consumer wearable devices and accompanying software released and evolve in this constantly-connected world we live in, the more potential security holes and privacy concerns the end user will find themselves vulnerable to.

1. Internet of Things The time of Internet of Things (IoT) already surrounds us in cutting edge technology integrated into our cars and our homes. We have the ability to remotely monitor our home security, our thermostats, and our car’s internal health. Service providers and great systems integrators see the potential for growth and reception by consumers and companies like Samsung and Google are taking the lead in IoT. The notion of the Internet of Everything, encompasses the idea that everything from shoes to to planes and could-and should-be connected through Internet. Companies like Cisco Systems project that the industry of the Internet of Everything will yield trillions of dollars in profits over the next ten years. Industrial Internet bridges together the practices of machine learning, big data, IoT, and machine-to-machine communications with the goal of real-time operations to connect us with the inanimate things around us from any device. Industrial internet can help people stay connected to capture and transfer knowledge between each other and entire information systems. General Electric CEO, Jeffrey Immelt, envisions a world of smart machines that will be able to diagnose their own problems and find solutions proactively.

Stanford and UCLA Berkley’s engineering teams combined forces to build a radio to be implemented into inanimate objects to receive and send information and instructions through other electronic devices. Amin Arbabian, assistant professor of Electrical Engineering at Stanford, started this project with Ali Niknejad, director of the Wireless Research Center at UC Berkeley, back in 2011 with a goal of rethinking the entire concept of radio. Arabian’s ideal environment for the use of these radios is one where a network of them is dispersed with an area, since the high-frequency signals are not optimized for travel. While this may seem like a drawback, it actually opens a web of connectivity and management between the Internet and smart devices.

ARM announced their Device Server, med Tools, and free OS in hopes of accelerating the Internet of Things movement. In light of the anticipated demand, however, several hurdles come into view such as supply, lack of industry standards, global scalability, and the bourgeoning ecosystem for native application development. Company conglomerates like Thread Group hope to bridge that gap by building trust in their products and services by offering reliable, secure, networks and simple connectivity while maintaining low-power requisites from devices utilized and focusing on the education, marketing, and production of their certified products.

Staying Secure During the Shopping Season

Last year, eCommerce recorded unprecedented sales around the third and fourth quarters. Online sales have surpassed $1 billion in revenue and over %80 of consumers have said that they have shopped online to avoid the crowds when shopping for the best deals. With the onset of Black Friday, Cyber Monday, and the growing popularity of shopping from Thanksgiving Day through Christmas Eve, security becomes more paramount than ever. Cyber Security breaches in which both employee and customer data are compromised has made headlines through the year-like those of Home Depot, Target, and Sony-which has led online shoppers to take heed and be aware of the point of sale systems they are using. Today’s shoppers aren’t only showing us what they’re buying, but how.

This year, shopping via a mobile device like a smartphone or tablet has risen %15 and in-store pickup has offered the ultimate bridge between the available inventory of the web and the storefront. Consumers are expecting more to trust retailers in the form of valid SSL certificates and often look for security guarantees through the buying process. Expired or questionable certificates are flagged by Google and many do not even bother clicking through them, leading them to shop elsewhere, while the verified green SSL security lock you can see in the URL address bar increases customer loyalty by %60-as well it should! Use of SSL certificates are a given in a secure web environment, but going the extra mile and taking care to encrypt the consumers’ shopping trends through Always-On SSL, instead of only encrypting information through checkout, is an extra degree of security that could mitigate risk for a hack and mining of consumer data.

For you online shoppers, take care not to give too much information to retailers via email or on social media, and be sure to navigate to the web site or application to directly purchase instead of settling for shopping through a social media site or an unverified downloaded native app. Making sure all software is updated on your computers and devices will also help to mitigate the risk for hackers to exploit vulnerabilities from old versions that are patched in newer versions. While we expect retailers to utilize our purchasing, sharing, and other behavioral data to bring us relevant ads and content, we’re also unwittingly creating a profile for a hacker to take on and exploit, so be weary of social engineered or targeted scams that seem to come from your favorite retailer but have subtly different URL links or ask for too much personal information. Identity theft and credit fraud are terrible ordeals to go through, but malware can flourish on your computer system unnoticed long after the holiday season, and should not be overlooked either. Over one-third of malware-distributing sites and apps were identified as legitimately registered sites that were actually hacked.

Online shopping trends don’t look like they’re going anywhere but up, and they help both retailers and consumers all year around, so it’s just as important to know what’s expected of your online storefront as a retailer as it is to know the best ways to protect yourself as a consumer. Making sure to encrypt user data, keep up to date with software, and being careful with sensitive information like account numbers and passwords, can not only serve as a good practice and exercise of caution through the holiday season-but also through any time of the year!

Networking at Winter Wonderland!

Last Thursday, we hosted the Winter Wonderland event along with our neighbors, Sandler Training and The Alliance Group. Together we gave door prizes and held charity raffles benefitting Cancer Care Services and prizes including champagne and gift baskets!

.NET Core is Open Source!

At Microsoft’s Connect(); event last month, their theme was centric to a cloud-first, mobile-first, and developer-first movement. They announced the .NET Core will be open source with the ability to build for and support all development platforms.

.NET has created a set of verticals that include a runtime, framework, and an application model all together. .NET Core explains the commonality of applications that span multiple devices and platforms. Before portable class libraries there was no sharing of code or projects but .NET Core’s use of contract assemblies, designed for proper factoring, to model API sets across verticals will help developers choose what contracts they want to support. Although the development environment is currently running on Windows, it will soon be available on other platforms.

You can think of portable class libraries as an experience that unifies the different .NET verticals based on their API shape. This addressed the most pressing need, which is the ability to create libraries that run on different .NET verticals. It also served as a design tool to drive convergence between verticals, for instance, between Windows 8.1 and Windows Phone 8.1. Unifying separate, well-factored, implementations of the .NET platform allows verticals to share the same implementation.

Since .NET Core will be on GitHub, code reviews and discussions will be open and encouraging sharing of documentation, libraries, and bug fixes! Open sourcing of the runtime will be coming soon!

Satya Nadella Pushing Microsoft Forward

Microsoft’s Satya Nadella has made headlines since he’s taken the position of CEO, succeeding the resigned CEO, Steve Ballmer. He’s forward-thinking and generating return on the investments that Microsoft has worked so hard on, like Office365, the Surface Pro 3, and their new OneDrive storage.

Nadella’s goals are for cloud-first and mobile-first strategies that Ballmer didn’t tread into. Unlike Ballmer, Nadella plans on putting Microsoft’s unique solutions within the reach of as many smartphone users as possible. Their own Surface Pro 3 has been making a comeback as well, and Microsoft’s low-cost smartphones are becoming more favorable in the market. Office365 is being released on both Andriod’s and Apple’s platform, in an effort to bring accessibility back for Microsoft. Android’s even looking forward to its mobile device available for emulator testing on the new Visual Studio 2015 so that developers can properly test for the most popular mobile platform on the market. Microsoft has since teamed up with Salesforce.com and Dropbox to bring Office365 and other Microsoft services to the consumers.

Microsoft’s new “freemium” strategy to drive revenue for the company by offering OneDrive storage, Office Online and Windows upgrades, to encourage people to sign up for more, paid storage and buy Office 365 while continuing to purchase new PCs to continue to drive Windows Store revenue.

5 Most Common Marketing Myths

Marketing isn’t always as simple as shooting fish in a barrel, but it doesn’t have to be difficult. Taking care to look past marketing myths and finding truth in best practices can transform your company’s marketing efforts from unnoticeable and unstable to positive and generating returns.

1. Word of Mouth is the Best Form of Marketing – While word of mouth through consumers and employees does create a personable sense and offers real solutions to a lead, but it takes more than that to convert a lead to a client. Creating videos and compelling case studies that resonate with pain points and offer solutions while detailing how your company’s custom solutions solved the problems.

2. Marketing is an Art, Not A Science – Conversion metrics are taken and considered seriously in order to tailor approaches and recognize where efforts need to go. SEO, Social Media Marketing (SMM) , Keywords, sharing, blogs, and everything in-between plays a crucial part in conversions that shows through numbers. The recording and evaluation of this data is constant and necessary since the needs of the audience is always changing.

3. Great Products Sell Themselves – In the enterprise great products do not sell themselves, but when coupled with great product marketing, your efforts can show potential leads what you have to offer, what pains your product solves, and what opportunities for growth their company could harness by becoming a client of yours.

4. Your Brand Can Evolve as Your Company Grows – Creating market awareness through SMM, SEO, blogs, and the like requires your company to create a name for itself along with a mission statement that will set you apart from everyone else. That branding will be seared into the minds of your potential leads and your clients for better or worse. Working with your chosen branding can retain loyalty and keep your company memorable as it grows.

5. Being The Leader or Being First Matters – Every company starts out as a fledgling in the market, but with consumer loyalty and consecutive success in achieving what it’s mission is will become what breaks a company away from the pack and offers insight into what being first is really about: innovation and success. Market timing and achieving the right product-market fit in order to be successful is more important and really brings leaders into the spotlight.

These are a few marketing myths, and there are many more to sift through, but seeing the truth in each of them and measuring how they can work to your company’s benefit is where you can find strength!

Business Benefits of M2M

Machine-to-Machine communications marks the basis of the connected environment that is the Internet of Things. While Intelligent Transportation Systems and manufacturing operations have gained a lot through access to real-time data through business intelligence and reporting apps allows operators to solve problems at the production level. Applications to interface with machines provide data for maintenance technicians and supervisors to track utilization on the production floor, while at-a-glance visibility drives competition among operators to exceed company metrics.

Customer relations have a lot to gain by catering to the Internet of Things revolution between businesses who are able to track shipments through each stage of their transportation, from beginning to end while allowing for continuous communication. Proactive replenishment that caters to replenishing stocks in services like vending machines using RFID price tags progress the way that inventory is managed. Predictive maintenance that anticipates the replacement and ensures maintainability of parts as needed through use of sensors that monitor homeostasis, checking service schedules and alerting management and systems of the need for upgrades. As a leading software development firm in the ITS industry, Ayoka’s Made in USA model for software development is valued by both State and Local governments, along with prime contractors seeking a local team member with transportation software development experience. Ayoka’s services for transportation software development incorporate legacy sub-systems, such as existing traffic control software, in an flexible architecture that can grow toward future web application standards while remaining interoperable across municipalities and multiple vendors.

Moving through the automated systems of manufacturing and logistics and into the lives of individuals in the form of connected cars,electric utility management, healthcare, and connectivity of electronics to your own mobile device are already coming around the corner. Wireless prices have dropped and the size and sturdiness of ever-smaller devices can be seamlessly implemented into an array of things that we use daily while cutting production cost in connnectable things from smartwatches to smoke alarms, as it can withstand overheating, power spikes while providing a reliable signal in hard to reach areas like parking garages, and other tough usage conditions.

I’m excited to see this move through the stages of development and implementation into devices in the future! Imagine, we are one step closer to total immersion in the IoT!