Mike Kavis

Mike Kavis

Englewood, Florida, United States
6K followers 500+ connections

About

Mike is the author of the O'Reilly book "Accelerating Cloud Adoption: Optimizing the…

Articles by Mike

  • The Executive’s Guide to Gen AI

    Generative AI is coming to the enterprise. Are you ready? Imagine an engineer sitting with a product owner as the…

    6 Comments
  • AWS is all in on Gen AI

    On Tuesday, AWS kicked off its annual conference in Las Vegas and AWS CEO Adam Selipsky's keynote focused exclusively…

    1 Comment
  • Everyone is focused on Resiliency, but what does it really mean?

    I have been working on cloud computing since the early days when AWS had about a dozen services. I have seen the trends…

  • Training ChatGPT to Code to Your Preferences

    I recently wrote an article about my POV on ChatGPT and its impact to developers. In this post I want to share the…

    5 Comments
  • Developers should be flocking to ChatGPT not running from it

    Artifical Intelligence (AI) is getting a lot of press these days and one utility, ChatGPT, is probably getting the most…

    8 Comments
  • AWS Continues to re:Invent Cloud Computing

    Andy Jassy took center stage Tuesday for Amazon Web Services (AWS) annual and first ever virtual re:Invent conference…

    7 Comments
  • Cloud Adoption is Hard

    I am a few weeks away from my final draft of my upcoming book "Accelerating Cloud Adoption: Optimizing the Enterprise…

    13 Comments
  • DevOps and the Next Bottleneck: Architecture

    If you have read any of my articles over the years you will know that I subscribe to the definitions of DevOps that…

    10 Comments
  • Advice to my 19-year-old technologist self

    Today is another busy day in the life of my long IT career. The day consists of a slew of meetings, a podcast, and then…

    18 Comments
  • Have we entered the golden age of infrastructure?

    There’s never been a better time to be in infrastructure. My developer roots go way back but my journey to the cloud…

    3 Comments

Activity

Join now to see all activity

Experience

  • Retired at the Beach

    Florida, United States

  • -

    Tampa/St. Petersburg, Florida Area

  • -

  • -

    Greater Boston Area

  • -

  • -

    San Francisco Bay Area

  • -

  • -

    Parrish, FL

  • -

  • -

  • -

  • -

  • -

  • -

  • -

Education

Publications

  • NoOps in a serverless world: Shift IT’s focus from operations to outcomes

    Deloitte Insights

    The hyper-automation of cloud computing has created a NoOps environment where software and software-defined hardware are provisioned dynamically, setting talent free to transition into new roles helping to drive business outcomes.

    See publication
  • Continuous security and reliability in iterative development

    GigaOM

    Rapid delivery poses new and more frequent security challenges, requiring an entirely different set of solutions. Chief among them is a move from waterfall-style testing methods to a more adaptive, continuous, DevOps-appropriate approach.

    DevOps and continuous delivery allow businesses to deploy software far more frequently than in the past, increasing consistency, predictability, and ultimately, quality. With iterative development, the deltas between builds are much smaller, reducing…

    Rapid delivery poses new and more frequent security challenges, requiring an entirely different set of solutions. Chief among them is a move from waterfall-style testing methods to a more adaptive, continuous, DevOps-appropriate approach.

    DevOps and continuous delivery allow businesses to deploy software far more frequently than in the past, increasing consistency, predictability, and ultimately, quality. With iterative development, the deltas between builds are much smaller, reducing the likelihood of catastrophic errors. Bugs are smaller and easier to fix — if caught in time. However, though rapid release cycles introduce smaller bugs, they produce them far more frequently, and bugs that evade detection can grow into serious problems.

    While functional problems can often be detected through regular use, security vulnerabilities are harder to spot. In companies that deploy many times per day, traditional security procedures such as static scans can often take longer than the life of the build, and excessive human interaction can rob highly automated DevOps projects of the very agility they were designed to create. To deliver on its goals, IT must create protocols that model and address security concerns as code is deployed.

    This report will help IT executives and development teams understand the new approaches to security required in a continuous deployment environment.

    See publication
  • When and How to Outsource Big Data Managed Services

    GigaOm

    The vast amounts of data that companies are collecting, the continuous decrease of storage costs over the past several years, and the technological advancements with cloud computing have made big data initiatives much more feasible and quicker-to-market than past data warehousing initiatives. Unfortunately for many companies, the complexity of scaling Hadoop clusters, NoSQL databases, and other big data technologies has been challenging because they lack in-house skills. After finding that the…

    The vast amounts of data that companies are collecting, the continuous decrease of storage costs over the past several years, and the technological advancements with cloud computing have made big data initiatives much more feasible and quicker-to-market than past data warehousing initiatives. Unfortunately for many companies, the complexity of scaling Hadoop clusters, NoSQL databases, and other big data technologies has been challenging because they lack in-house skills. After finding that the DIY model is not driving the anticipated return on investment (ROI), CIOs are starting to consider cloud-based managed services as a way to achieve a better, quicker ROI on their big data initiatives.

    See publication
  • Architecting the Cloud: Design Decisions for Cloud Computing Service Models (SaaS, PaaS, and IaaS)

    Wiley

    An expert guide to selecting the right cloud service model for your business
    Cloud computing is all the rage, allowing for the delivery of computing and storage capacity to a diverse community of end-recipients. However, before you can decide on a cloud model, you need to determine what the ideal cloud service model is for your business. Helping you cut through all the haze, Architecting the Cloud is vendor neutral and guides you in making one of the most critical technology decisions that…

    An expert guide to selecting the right cloud service model for your business
    Cloud computing is all the rage, allowing for the delivery of computing and storage capacity to a diverse community of end-recipients. However, before you can decide on a cloud model, you need to determine what the ideal cloud service model is for your business. Helping you cut through all the haze, Architecting the Cloud is vendor neutral and guides you in making one of the most critical technology decisions that you will face: selecting the right cloud service model(s) based on a combination of both business and technology requirements.

    Guides corporations through key cloud design considerations
    Discusses the pros and cons of each cloud service model
    Highlights major design considerations in areas such as security, data privacy, logging, data storage, SLA monitoring, and more
    Clearly defines the services cloud providers offer for each service model and the cloud services IT must provide
    Arming you with the information you need to choose the right cloud service provider, Architecting the Cloud is a comprehensive guide covering everything you need to be aware of in selecting the right cloud service model for you.

    See publication
  • 3 Arguments Against Public SaaS That Fall Flat

    Bulger Partners

    For capabilities that are not a core competency of an enterprise, today’s IT teams are hard pressed to justify why the needs of the business could not be met with a leading SaaS solution. Here’s the truth.

    Other authors
    • Jeffrey Vogel
    See publication
  • Podcast: Architecting the Internet of Things

    Cloud Technology Partners (syndicated on SYS-CON Media and Cloud Computing Journal)

    Our guest on the podcast this week is Jim Haughwout, Chief Technology Architect at Savi Technologies. We discuss Internet of Things sensors and the growing demand for data driven architectures to support the sheer volume of data being collected. It’s clear that many businesses adopting the Internet of Things are unprepared for the volume of data that needs to be processed. Listen in to learn how to put your Internet of Things strategy into place as the technology continues to evolve.

    Other authors
    See publication

Patents

  • Color printer technology

    Issued US US8964244 B2

    The invention provides a method of printing at a POS of register receipts and marketing information in which the required network bandwidth and quantity of ink are both reduced. SVG files are used to specify communications, associated modified image objects are stored locally to the POS, and associated modified image objects are modified version of original objects in which color values are replaced with other color values that result in the same print image, but with printing of less ink.

    See patent
  • Color Printing Technology

    Issued US 8,363,265

    The invention provides a method of printing at a POS of register receipts and marketing information in which the required network bandwidth and quantity of ink are both reduced. SVG files are used to specify communications, associated modified image objects are stored locally to the POS, and associated modified image objects are modified version of original objects in which color values are replaced with other color values that result in the same print image, but with printing of less ink.

    See patent
  • Real-Time Transaction Data Processing and Reporting Platform

    Filed US 20140207592

    A processing server may receive transaction data from one or more point of sale (POS) terminals in near real-time. Transaction data received from each of the POS terminals may be in a format that is specific to the POS terminal. Upon receiving the transaction data having the POS specific format, the processing server may convert the transaction data to a common format that is compatible with the operations of the processing server. Further, the processing server may index the converted…

    A processing server may receive transaction data from one or more point of sale (POS) terminals in near real-time. Transaction data received from each of the POS terminals may be in a format that is specific to the POS terminal. Upon receiving the transaction data having the POS specific format, the processing server may convert the transaction data to a common format that is compatible with the operations of the processing server. Further, the processing server may index the converted transaction data into one or more categories. Responsive to indexing, the processing server may generate aggregate data from the indexed transaction data. Further, the processing server may receive a request for a data report associated with the aggregate data. Responsive to receiving the request, the processing server may generate the data report, format the data report to match a user preference, and transmit the data report for presentation.


    Read more: http://www.faqs.org/patents/app/20140207592#ixzz3Ai2syVWy

    See patent
  • Digital Incentives Issuance, Redemption, and Reimbursement

    US 20100299266

    A system and method for issuance, redemption, and reimbursement of digital incentives. A central database connected to the internet: enables customers to register unique customer registration information; is able to store this information and assign unique identifiers to it; and is accessible to incentives providers to make available digital incentives. Existing point-of-sale terminals: are authenticated to have access to the central database; have payment devices; are connected to the…

    A system and method for issuance, redemption, and reimbursement of digital incentives. A central database connected to the internet: enables customers to register unique customer registration information; is able to store this information and assign unique identifiers to it; and is accessible to incentives providers to make available digital incentives. Existing point-of-sale terminals: are authenticated to have access to the central database; have payment devices; are connected to the internet; and are provided with a message broker that facilitates communication with the central database. The customer redeems digital incentives at one of the existing point-of-sale terminals at the time of purchase by first presenting their unique identifier. The message broker routes the unique identifier to the central database which authenticates and validates the existing point-of-sale terminal, the customer's unique identifier, and the payment device. The central database then returns validated applicable digital incentives to the message broker which forwards the validated digital incentives for redemption.

    See patent
  • Message Broker for Redemption of Digital Incentives

    US 20100299198

    A message broker for redemption of digital incentives at a point-of-sale terminal for a commercial transaction that is able to communicate with a central database external to the point-of-sale terminal. The central database contains unique customer registration information, unique identifiers assigned to the unique customer registration information, business rules for redemption of digital incentives. Redemption of digital incentives at the point-of-sale terminal occurs at the time of purchase…

    A message broker for redemption of digital incentives at a point-of-sale terminal for a commercial transaction that is able to communicate with a central database external to the point-of-sale terminal. The central database contains unique customer registration information, unique identifiers assigned to the unique customer registration information, business rules for redemption of digital incentives. Redemption of digital incentives at the point-of-sale terminal occurs at the time of purchase as follows: the customer's purchases are recorded in a basket list at the point-of-sale terminal; the customer presents their unique identifier; point-of-sale terminal initiates an instruction to process a transaction; the message broker routes the unique identifier and the basket list to the central database which applies the rules for redemption of digital incentives and returns validated applicable digital incentives to the message broker which forwards the validated digital incentives to the point-of-sale terminal for redemption; the point-of-sale terminal applies the validated digital incentives to the customer's purchase; and the message broker routes an acknowledgement message to the central database.

    See patent
  • Paper coupon fraud detection

    US US 20130085829 A1

    A computer may receive a product code from a POS device. Further, the computer may compare the product code to identifiers for a plurality of fraudulent coupons comprising universal product codes (UPCs) of the fraudulent coupon and a trigger item code of the fraudulent coupon. Responsive to a match between the product code and the identifier of at least one fraudulent coupon, the computer may obtain information associated with the fraudulent coupon. Further, the computer may transmit the…

    A computer may receive a product code from a POS device. Further, the computer may compare the product code to identifiers for a plurality of fraudulent coupons comprising universal product codes (UPCs) of the fraudulent coupon and a trigger item code of the fraudulent coupon. Responsive to a match between the product code and the identifier of at least one fraudulent coupon, the computer may obtain information associated with the fraudulent coupon. Further, the computer may transmit the information of the at least one fraudulent coupon to the POS device. The POS device may receive the information of the at least one fraudulent coupon and compare the information with a UPC of a coupon scanned at the POS device. Responsive to a match between the fraudulent coupon information and the UPC of the coupon, the computer may generate an alert to notify that the scanned coupon is a fraudulent coupon.

    See patent

Recommendations received

More activity by Mike

View Mike’s full profile

  • See who you know in common
  • Get introduced
  • Contact Mike directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Add new skills with these courses