GigaSpaces XAP – Now on Amazon EC2

The GigaSpaces XAP (eXtreme Application Platform) is now available as an Amazon EC2 AMI (Amazon Machine Image).

At the core, XAP implements a scalable, in-memory database which can be
used as a data grid, a messaging grid, or as a parallel processing

Tagged with:  

JBoss Releases on Amazon EC2

By now many of you are aware that Red Hat Enterprise Linux is fully supported by Red Hat on Amazon EC2. You can read more about the offering at http://www.redhat.com/solutions/cloud/. Jeff Barr blogged about this in November, 2007 (aws.typepad.com/aws/…

Tagged with:  

Splunk Ninja & Processing Distributed Logs

Early this morning, Ilya Grigorik, founder of AideRSS, sent me a short note via Twitter to tell me about his latest blog post.

In the post, he described his use of a single instance of Splunk to process application log files from several dozen Amazon…

Tagged with:  

How I Built a Working Online Poker Bot, Part 3

Introduction
I'm a big fan of pet projects. You know the ones I mean: the projects we love to start and hate to finish. The two-week remodeling gig that takes two years. The '69 Mustang sitting on cinderblocks in the back yard while seasons …

Tagged with:  

The Emerging Cloud Service Architecture

I’m going to go out on a limb today and try to paint a picture of where some of this cool and crazy cloud-based infrastructure may be going. While none of what I will write about is idle speculation, it is based on just a few data points, and may be to…

Tagged with:  

IntrIdea Rolls out Scalr, Updates MediaPlug, Builds Community

The folks at Intridea have been coding up a storm!

In time for this week’s Railsconf, they are rolling out a hosted, on-demand version of their popular Scalr tool, a new release of their MediaPlug media server appliance, and the Acts as Community soci…

Tagged with:  

Napera Networks – Network Health Solution

Seattle-based Napera Networks has built a really interesting piece of hardware. The Napera N24 Appliance automatically enforces health and identity rules for up to 200 computers, preventing rogue or unpatched machines from accessing a corporate network…

Tagged with:  
Weboy