About
Mike is the author of the O'Reilly book "Accelerating Cloud Adoption: Optimizing the…
Articles by Mike
Activity
-
Over the past several years at Warner Bros. Discovery, I’ve had the privilege of working alongside an incredible team to build and scale reliability…
Over the past several years at Warner Bros. Discovery, I’ve had the privilege of working alongside an incredible team to build and scale reliability…
Liked by Mike Kavis
-
The calm before the last days storm. I get so much done when I’m the only one in the production truck. It’s been a great week of creative…
The calm before the last days storm. I get so much done when I’m the only one in the production truck. It’s been a great week of creative…
Liked by Mike Kavis
-
When I was seven, I had recurring nightmares. So I built a machine to fix them. A shoebox. Some light switches. A coiled telephone cord. I called…
When I was seven, I had recurring nightmares. So I built a machine to fix them. A shoebox. Some light switches. A coiled telephone cord. I called…
Liked by Mike Kavis
Experience
-
Retired at the Beach
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Education
Publications
-
NoOps in a serverless world: Shift IT’s focus from operations to outcomes
Deloitte Insights
See publicationThe hyper-automation of cloud computing has created a NoOps environment where software and software-defined hardware are provisioned dynamically, setting talent free to transition into new roles helping to drive business outcomes.
-
Continuous security and reliability in iterative development
GigaOM
See publicationRapid delivery poses new and more frequent security challenges, requiring an entirely different set of solutions. Chief among them is a move from waterfall-style testing methods to a more adaptive, continuous, DevOps-appropriate approach.
DevOps and continuous delivery allow businesses to deploy software far more frequently than in the past, increasing consistency, predictability, and ultimately, quality. With iterative development, the deltas between builds are much smaller, reducing…Rapid delivery poses new and more frequent security challenges, requiring an entirely different set of solutions. Chief among them is a move from waterfall-style testing methods to a more adaptive, continuous, DevOps-appropriate approach.
DevOps and continuous delivery allow businesses to deploy software far more frequently than in the past, increasing consistency, predictability, and ultimately, quality. With iterative development, the deltas between builds are much smaller, reducing the likelihood of catastrophic errors. Bugs are smaller and easier to fix — if caught in time. However, though rapid release cycles introduce smaller bugs, they produce them far more frequently, and bugs that evade detection can grow into serious problems.
While functional problems can often be detected through regular use, security vulnerabilities are harder to spot. In companies that deploy many times per day, traditional security procedures such as static scans can often take longer than the life of the build, and excessive human interaction can rob highly automated DevOps projects of the very agility they were designed to create. To deliver on its goals, IT must create protocols that model and address security concerns as code is deployed.
This report will help IT executives and development teams understand the new approaches to security required in a continuous deployment environment. -
When and How to Outsource Big Data Managed Services
GigaOm
See publicationThe vast amounts of data that companies are collecting, the continuous decrease of storage costs over the past several years, and the technological advancements with cloud computing have made big data initiatives much more feasible and quicker-to-market than past data warehousing initiatives. Unfortunately for many companies, the complexity of scaling Hadoop clusters, NoSQL databases, and other big data technologies has been challenging because they lack in-house skills. After finding that the…
The vast amounts of data that companies are collecting, the continuous decrease of storage costs over the past several years, and the technological advancements with cloud computing have made big data initiatives much more feasible and quicker-to-market than past data warehousing initiatives. Unfortunately for many companies, the complexity of scaling Hadoop clusters, NoSQL databases, and other big data technologies has been challenging because they lack in-house skills. After finding that the DIY model is not driving the anticipated return on investment (ROI), CIOs are starting to consider cloud-based managed services as a way to achieve a better, quicker ROI on their big data initiatives.
-
Architecting the Cloud: Design Decisions for Cloud Computing Service Models (SaaS, PaaS, and IaaS)
Wiley
See publicationAn expert guide to selecting the right cloud service model for your business
Cloud computing is all the rage, allowing for the delivery of computing and storage capacity to a diverse community of end-recipients. However, before you can decide on a cloud model, you need to determine what the ideal cloud service model is for your business. Helping you cut through all the haze, Architecting the Cloud is vendor neutral and guides you in making one of the most critical technology decisions that…An expert guide to selecting the right cloud service model for your business
Cloud computing is all the rage, allowing for the delivery of computing and storage capacity to a diverse community of end-recipients. However, before you can decide on a cloud model, you need to determine what the ideal cloud service model is for your business. Helping you cut through all the haze, Architecting the Cloud is vendor neutral and guides you in making one of the most critical technology decisions that you will face: selecting the right cloud service model(s) based on a combination of both business and technology requirements.
Guides corporations through key cloud design considerations
Discusses the pros and cons of each cloud service model
Highlights major design considerations in areas such as security, data privacy, logging, data storage, SLA monitoring, and more
Clearly defines the services cloud providers offer for each service model and the cloud services IT must provide
Arming you with the information you need to choose the right cloud service provider, Architecting the Cloud is a comprehensive guide covering everything you need to be aware of in selecting the right cloud service model for you. -
3 Arguments Against Public SaaS That Fall Flat
Bulger Partners
For capabilities that are not a core competency of an enterprise, today’s IT teams are hard pressed to justify why the needs of the business could not be met with a leading SaaS solution. Here’s the truth.
Other authors -
-
Podcast: Architecting the Internet of Things
Cloud Technology Partners (syndicated on SYS-CON Media and Cloud Computing Journal)
Our guest on the podcast this week is Jim Haughwout, Chief Technology Architect at Savi Technologies. We discuss Internet of Things sensors and the growing demand for data driven architectures to support the sheer volume of data being collected. It’s clear that many businesses adopting the Internet of Things are unprepared for the volume of data that needs to be processed. Listen in to learn how to put your Internet of Things strategy into place as the technology continues to evolve.
Other authorsSee publication
Patents
-
Color printer technology
Issued US US8964244 B2
See patentThe invention provides a method of printing at a POS of register receipts and marketing information in which the required network bandwidth and quantity of ink are both reduced. SVG files are used to specify communications, associated modified image objects are stored locally to the POS, and associated modified image objects are modified version of original objects in which color values are replaced with other color values that result in the same print image, but with printing of less ink.
-
Color Printing Technology
Issued US 8,363,265
See patentThe invention provides a method of printing at a POS of register receipts and marketing information in which the required network bandwidth and quantity of ink are both reduced. SVG files are used to specify communications, associated modified image objects are stored locally to the POS, and associated modified image objects are modified version of original objects in which color values are replaced with other color values that result in the same print image, but with printing of less ink.
-
Real-Time Transaction Data Processing and Reporting Platform
Filed US 20140207592
See patentA processing server may receive transaction data from one or more point of sale (POS) terminals in near real-time. Transaction data received from each of the POS terminals may be in a format that is specific to the POS terminal. Upon receiving the transaction data having the POS specific format, the processing server may convert the transaction data to a common format that is compatible with the operations of the processing server. Further, the processing server may index the converted…
A processing server may receive transaction data from one or more point of sale (POS) terminals in near real-time. Transaction data received from each of the POS terminals may be in a format that is specific to the POS terminal. Upon receiving the transaction data having the POS specific format, the processing server may convert the transaction data to a common format that is compatible with the operations of the processing server. Further, the processing server may index the converted transaction data into one or more categories. Responsive to indexing, the processing server may generate aggregate data from the indexed transaction data. Further, the processing server may receive a request for a data report associated with the aggregate data. Responsive to receiving the request, the processing server may generate the data report, format the data report to match a user preference, and transmit the data report for presentation.
Read more: http://www.faqs.org/patents/app/20140207592#ixzz3Ai2syVWy -
Digital Incentives Issuance, Redemption, and Reimbursement
US 20100299266
See patentA system and method for issuance, redemption, and reimbursement of digital incentives. A central database connected to the internet: enables customers to register unique customer registration information; is able to store this information and assign unique identifiers to it; and is accessible to incentives providers to make available digital incentives. Existing point-of-sale terminals: are authenticated to have access to the central database; have payment devices; are connected to the…
A system and method for issuance, redemption, and reimbursement of digital incentives. A central database connected to the internet: enables customers to register unique customer registration information; is able to store this information and assign unique identifiers to it; and is accessible to incentives providers to make available digital incentives. Existing point-of-sale terminals: are authenticated to have access to the central database; have payment devices; are connected to the internet; and are provided with a message broker that facilitates communication with the central database. The customer redeems digital incentives at one of the existing point-of-sale terminals at the time of purchase by first presenting their unique identifier. The message broker routes the unique identifier to the central database which authenticates and validates the existing point-of-sale terminal, the customer's unique identifier, and the payment device. The central database then returns validated applicable digital incentives to the message broker which forwards the validated digital incentives for redemption.
-
Message Broker for Redemption of Digital Incentives
US 20100299198
See patentA message broker for redemption of digital incentives at a point-of-sale terminal for a commercial transaction that is able to communicate with a central database external to the point-of-sale terminal. The central database contains unique customer registration information, unique identifiers assigned to the unique customer registration information, business rules for redemption of digital incentives. Redemption of digital incentives at the point-of-sale terminal occurs at the time of purchase…
A message broker for redemption of digital incentives at a point-of-sale terminal for a commercial transaction that is able to communicate with a central database external to the point-of-sale terminal. The central database contains unique customer registration information, unique identifiers assigned to the unique customer registration information, business rules for redemption of digital incentives. Redemption of digital incentives at the point-of-sale terminal occurs at the time of purchase as follows: the customer's purchases are recorded in a basket list at the point-of-sale terminal; the customer presents their unique identifier; point-of-sale terminal initiates an instruction to process a transaction; the message broker routes the unique identifier and the basket list to the central database which applies the rules for redemption of digital incentives and returns validated applicable digital incentives to the message broker which forwards the validated digital incentives to the point-of-sale terminal for redemption; the point-of-sale terminal applies the validated digital incentives to the customer's purchase; and the message broker routes an acknowledgement message to the central database.
-
Paper coupon fraud detection
US US 20130085829 A1
See patentA computer may receive a product code from a POS device. Further, the computer may compare the product code to identifiers for a plurality of fraudulent coupons comprising universal product codes (UPCs) of the fraudulent coupon and a trigger item code of the fraudulent coupon. Responsive to a match between the product code and the identifier of at least one fraudulent coupon, the computer may obtain information associated with the fraudulent coupon. Further, the computer may transmit the…
A computer may receive a product code from a POS device. Further, the computer may compare the product code to identifiers for a plurality of fraudulent coupons comprising universal product codes (UPCs) of the fraudulent coupon and a trigger item code of the fraudulent coupon. Responsive to a match between the product code and the identifier of at least one fraudulent coupon, the computer may obtain information associated with the fraudulent coupon. Further, the computer may transmit the information of the at least one fraudulent coupon to the POS device. The POS device may receive the information of the at least one fraudulent coupon and compare the information with a UPC of a coupon scanned at the POS device. Responsive to a match between the fraudulent coupon information and the UPC of the coupon, the computer may generate an alert to notify that the scanned coupon is a fraudulent coupon.
Recommendations received
10 people have recommended Mike
Join now to viewMore activity by Mike
-
Strategic Rebranding Announcement: David Linthicum Is Now David Claw After carefully studying the market, reviewing the trends, and observing that…
Strategic Rebranding Announcement: David Linthicum Is Now David Claw After carefully studying the market, reviewing the trends, and observing that…
Liked by Mike Kavis
-
I remember when Brenda, the owner of Corporate Fitness, came down to meet with me. She sat across from me and asked, “How did you do it? How did you…
I remember when Brenda, the owner of Corporate Fitness, came down to meet with me. She sat across from me and asked, “How did you do it? How did you…
Liked by Mike Kavis
-
Forever thankful for the friends, mentors and lessons that shaped my early journey since B-school. Appreciate the alumni feature. Always nice to…
Forever thankful for the friends, mentors and lessons that shaped my early journey since B-school. Appreciate the alumni feature. Always nice to…
Liked by Mike Kavis
-
After more than 40 years in technology, I’ve officially retired. I’ve been fortunate to work with incredible people, build meaningful systems…
After more than 40 years in technology, I’ve officially retired. I’ve been fortunate to work with incredible people, build meaningful systems…
Liked by Mike Kavis
-
If they were actually going to follow through with this, that means that half the partners there would be fired. 😁
If they were actually going to follow through with this, that means that half the partners there would be fired. 😁
Liked by Mike Kavis
-
To all my work colleagues and friends; Today, on December 31st, 2025, I am retiring from my professional career. All of you collectively span the…
To all my work colleagues and friends; Today, on December 31st, 2025, I am retiring from my professional career. All of you collectively span the…
Liked by Mike Kavis
-
It is that time of life! After 7 years of high-impact consulting at Deloitte, I’m officially venturing into my next chapter (update coming soon!). To…
It is that time of life! After 7 years of high-impact consulting at Deloitte, I’m officially venturing into my next chapter (update coming soon!). To…
Liked by Mike Kavis
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content