January 25, 2015

The Internet of Robotic Things: Secure, harmless helpers or vulnerable, vicious foes?
“As IoT matures, we see the industry adding more robotic and AI functions to traditional industrial and consumer robots,” says Cooper. Beyond simply automation, these functions include predictive analysis, learning capabilities [such as machine learning], autonomous decision making, and complex programmable responses, explains Cooper. “The autonomous nature of these systems and their often critical function in the larger system make them of particular concern when it comes to security,” says Cooper.


How Xerox Jumpstarts Transformation through "Dreaming Sessions"
The process starts several weeks before the client shows up at the lab. We normally work with decision makers from multiple disciplines within the company. Well in advance, we need to understand their businesses, their workflows, what kinds of problems are they struggling with today. And then in the dreaming session itself, the client talks about their business, where they'd like to go, what they've envisioned. And then researchers will share some technologies we are working on in the labs. Maybe we share things we can do with data analytics or how to truly personalize a service. And then we show them possibilities for the future based on trends that we have expertise in.


Scrum explained
Although hard to execute, Scrum has some advantages that make its usage really worth. It embraces change: this is something which is one of the biggest problems in waterfall processes. Whenever anything needs to be changed, a long analysis had to be made, documents modified, for at last, modifying the product itself. Moreover, change is not welcomed in these processes - it is always something to be avoided. Scrum on the the other hand, embraces change, it welcomes it. Scrum recognizes that in software development change in natural, it means that the product is being used.


As Big Data and AI Take Hold, What Will It Take to Be an Effective Executive?
And most important, senior managers must learn to let go, something which is quite difficult because it runs counter to decades of organizational practices. Given our rapidly rising oceans of data, the command-and-control approach to management–where information flows up the organization and decisions are made at high levels–would sink the senior executive teams. As data science and AI permeate the organization, it’s important to delegate more autonomy to the business units that hopefully have the proper skills, the advanced tools and the necessary information to make better decisions on their own.


Five Critical Priorities HR Can’t Afford to Ignore in 2015
How employees get their work done has changed remarkably quickly; unsurprisingly HR needs to change, too Anyone who works in a global company doesn’t need to be told that their job has changed enormously in the past few years. Even if their job title – and sometimes their job description – remains unscathed, the number of people they work with, the amount of information they use to make decisions, their day-to-day tasks, and the technology they use have all changed quicker than at any time in their careers.


Sony's Two Big Mistakes: No Encryption, and No Backup
Vox's Timothy B. Lee points out in his step-by-step account of the Sony data breach that the company's networks were "down for days" following the November 24, 2014, attack.  Any business-continuity plan worth its salt prepares the company to resume network operations within hours or even minutes after a disaster, not days. A key component of your disaster-recovery plan is your recovery time objective. While operating dual data centers is an expensive option, it's also the safest. More practical for most businesses are cloud-based services such as the Morpheus database-as-a-service (DBaaS).


The 3 Little Architects – A Data Parody for today’s Financial Industry
The last architect is as technically competent as his peers however understood the value of building something once to use across the business. His approach was a little different than the first two. Understanding the risks and costs of hand coding or using one off tools to do the work, he decided to adopt an integrated platform designed to handle the complexities, sources, and volumes of data required by the business. The platform also incorporated shared metadata, reusable data transformation rules and mappings, a single source of required master and reference data, and provided agile development capabilities to reduce the cost of implementation and ongoing change management.


Why IT Should be Skeptical of 'Facebook at Work'
Facebook at Work will put the company in the crosshairs of established businesses including Microsoft, IBM, Jive, Zimbra and Slack. "Facebook has been a consumer social media innovator as well as a shrewd assembler of adjacent social media products," Keitt says. "So it stands to reason that as Facebook gets more comfortable in the enterprise space, it may seek to pull in more of these interesting consumer applications into an enterprise offering," similar to how Google rolled its family of apps into Google for Work.


.NET Becomes Open Source and Cross-Platform
This morning, the announcements made at Microsoft’s Connect() event in New York have been rippling through the web and the effects of these announcements are likely going to be felt for years to come. ... For decades, opponents of Microsoft have criticized the company for being too closed off and secretive and as of this morning, they may need to consider researching new arguments. The folks at Redmond absolutely stunned the world this morning with the announcement that the entire .NET ecosystem would be made open source and developed in the open.


Africa: The rise of BYOD & corporate data threats
“The scope of the problem only intensifies as business models continue to evolve with increased mobility, a growing mix of users, and geographically diverse business offices.” “The risk posed by the high percentage of employees with laptops, mobile phones, PDAs, multiple email accounts, and access to applications and databases makes addressing the insider threat a substantial challenge. Reducing the vulnerabilities posed by internal users needs to be a key priority in Kenyan organisations’ security strategies,” the report said. The report continues to suggest that the insider attacks which are deliberate are fuelled by disgruntlement, revenge, competitive advantage and blackmail. Most of the users already have access to the systems and so detection becomes difficult.



Quote for the day:

"When all think alike, then no one is thinking." -- Walter Lippman

January 24, 2015

Security principles of bitcoin
Bitcoin is dramatically different. A bitcoin transaction authorizes only a specific value to a specific recipient and cannot be forged or modified. It does not reveal any private information, such as the identities of the parties, and cannot be used to authorize additional payments. Therefore, a bitcoin payment network does not need to be encrypted or protected from eavesdropping. In fact, you can broadcast bitcoin transactions over an open public channel, such as unsecured WiFi or Bluetooth, with no loss of security.


Publisher/Subscriber pattern with Event/Delegate and EventAggregator
Publisher/Subscriber pattern is one of the variation of the Observer designer pattern introduced by GOF in software devlopment. In Publisher/Subscriber pattern publisher(entiry responsible for publishing message) publish message and there are one or more Subscriber(entity who subsribe(i.e. intested in message) to perticular message type) who capture published message. Below image desribe the senario of publisher and subscriber pattern where Publisher publisher two type of message (MessageA and MessageB) and Subscribers of the message receive the message in which they subscribed


Shout Offers A New Take On Location-Based Social Networking
“We’re not anonymous – and we don’t want to be – because I think that ultimately hurts the value of the content that can be shared over the course of an app’s lifecycle,” he says. While he believes that the trend toward anonymous social networking, popularized by apps like Yik Yak, Secret and Whisper, is more than a flash-in-the-pan, he also thinks it dictates the kind of community that results. “I definitely think it encourages a certain kind of information, and you have to make the decision: is that the kind of information you want to be shared and you want your users to share?” he says.


Gartner: APAC Public Cloud Spending to Reach $7.4 Billion in 2015
Gartner says many countries in the mature Asia Pacific including Japan region have solid reliable telecommunications infrastructure and relatively advanced technology usage profiles. Despite challenges in the global economy, Gartner expects consistent and stable growth to continue through to 2018. Increased intra-region integration in APJ across services and industries will drive public cloud usage as countries in this region break down borders through trade bloc agreements such as the ASEAN Economic Integration 2015 and the Trans Pacific Partnerships, which will drive more mobility, big data sharing and analytics and public cloud infrastructure and applications to support these initiatives.


Can I trust my data in the cloud?
IBM Cloud gathered some of the top #cloudminds in the industry for an informative discussion about hybrid cloud. In this video, they discuss trust and security in cloud computing.  We'd like to thank our fantastic panelists: Sarah Cooper, VP Business Development, M2Mi; Andi Gutmans, CEO & Co-founder, Zend; Duncan Johnston-Watt, CEO & Founder, Cloudsoft Corporation; Mark Wyllie, CEO, Flagship Solutions; Mike Dorosh, Program Manager, Cloud Technical Partnerships, IBM.


How to avoid "Hybrid Enterprise" tension headaches
For hybrid enterprises, the promise of savings mount from a less expensive physical footprint as well as more flexibility to get data and apps where they need to be and quicker—especially when you have the right application performance platform in place. If not, you'll be chasing blind spots in your application delivery chain that come from only using point solutions from the past—that is, one tool for each segment from a vendor that specializes in one thing and no integration with the overall complete picture.


Conference calls a waste of time?
By 1915, the American Telephone and Telegraph Co. network spanned the continent with a single copper circuit 6,800 miles (11,000 kilometers) long that could carry exactly one call at a time. There were already 8.6 million phones served by AT&T, but hearing someone’s voice from the other side of the continent was astounding, like being able to go to the moon, said Anthea Hartig, executive director of the California Historical Society. It was a fitting event leading up to the exposition, which celebrated the completion of the Panama Canal and the latest technological and cultural achievements of the day.


Google’s Scientific Approach to Work-Life Balance
The fact that such a large percentage of Google’s employees wish they could separate from work but aren’t able to is troubling, but also speaks to the potential for this kind of research. The existence of this group suggests that it is not enough to wish yourself into being a Segmentor. But by identifying where employees fall on this spectrum, we hope that Google can design environments that make it easier for employees to disconnect. ... Googlers reported blissful, stressless evenings. Similarly, nudging Segmentors to ignore off-hour emails and use all their vacation days might improve well-being over time. The long-term nature of these questions suggests that the real value of gDNA will take years to realize.


How we really use our camera phones
The slight male dominance in video recording is also interesting, as it could point to a perception problem for video that may have to do with the way it’s currently being presented in capturing and editing apps. Or maybe it’s just long-ingrained collective gender stereotypes. Just think back to your family parties back in the 1990s or even the ’80s, long before everyone recorded everything with smart phones. That cousin dramatically crawling on the floor with a camcorder in one hand to get the best shot? Likely a guy. And just for the record: Male Android users take the least amount of photos, with an average of just 90 photos per month.


Actionless Frameworks
Simply put, actionless frameworks are extremely prepared for future changes and can make your application behave better/look better by a new configuration. If you are using it to edit records, then if in the future you create a better editor, you can simply replace the editor registration and the new (and I imagine better) editor will be used in all places. There is no need to search all the calls to the old editor to replace it by the new one. If you are using it to convert data and now you have a faster algorithm, simply register the faster algorithm and benefit from better performance.



Quote for the day:

"Trust is the lubrication that makes it possible for organizations to work." -- Warren G. Bennis

January 23, 2015

FrontRange CEO bets against a cloud-only IT future
FrontRange CEO Jon Temple speaks with an accent that’s hard to locate. He’s actually a California-based Brit who has travelled around quite a bit. His company is a similarly confusing combination, with roots in South Africa and having once been best known for GoldMine, the sales contact management software that it still quietly sells. For some time now though its focus has been on the service desk, another melting pot sector that’s going through change. A person could be forgiven for getting confused…


Getting Ready for Windows 10 With Responsive Design
A flexible grid based layout should be familiar to anyone who has spent any time working with Windows 8 apps, but if you’re not certain head to this MSDN article and brush up on the “Dynamic layout” section. There are very few circumstances where your column and row definitions should not be Auto or Star sizing. In fact I’d go so far as to say if you need to set a fixed value, consider using auto and then having your child element at fixed width so the column/row will collapse if your child element needs to.


Which areas of IT infrastructure will evolve and emerge in 2015?
Every part of the IT stack is in transition - from end user devices to networks, application design, virtual server software, physical server design, storage systems, and even storage media. Some of these transitions are well underway and will accelerate in 2015, while others are just starting to emerge... Cost matters and the least expensive SSDs are likely to be ten times more expensive than the least expensive SATA disks up until the end of the decade.


Beyond the IoT Buzz Is A New Horizon of Embedded Intelligence
The big issue, however, is that most enterprises have yet to articulate or establish a wide-scale Enterprise Information Management or “EIM” strategy or look at how newly connected people, devices, information and places (the new “inter-nets”) will transform their business landscape and relationships. But this doesn’t mean that businesses have to get all their devices online and monitor them before passing go. A good approach is to “think globally (with EIM) but act locally.” To look at what data and content sources are most critical to your top information flows.


Big Data and mobile analytics: Ready to rule 2015
The revolution, then, lies in the data analysis process. Visual analytics solutions already exist on the web with companies such as CrazyEgg and Inspectlet, but since mobile traffic now outperforms web traffic and is expected to continue in that trajectory, the future of analytics is in visual mobile analytics. Traditional mobile analytics tools, such as Google Analytics, emphasize the “what” in their data: key metrics such as number of users, OS used, geographic breakdown, etc., but place no focus on the “why,” which provides the reason behind the metrics.


Sony SmartBand Talk review: Much more than just an activity tracker
Calls sounded excellent on the SmartBand Talk on both my end and the callers end. I thought the calling functionality was just going to be a gimmick, however with the high quality performance it was nice to hold calls while keeping both hands free to do other things. I always seem to forget to switch to sleep mode on my activity trackers, but the SmartBand Talk tracks sleep automatically. It seemed to be fairly accurate when switching into and out of the sleep mode, but if you spend a lot of time watching TV without moving then it may pick up that you were sleeping. The smart alarm feature is a nice way to wake up during a light sleep period. If the vibration alone doesn't work, you can also select to have an audible alarm go off at the same time.


Cloud computing: A critical component of precision medicine
“The issue isn’t just collecting human genomes, but having rich enough data about patient behavior and the phenotypic data from EMRs, so we can integrate health data to form a rich picture about a patient,” said David Shaywitz, the Chief Medical Officer of Bay Area genomics cloud computing startup DNANexus. This was actually a prevailing theme at last week’s JP Morgan conference. “The sequence part is the tool, the commodity – but it’s everything else you’ll do with it that’s the secret sauce,” Regeneron chief scientific officer George Yancopoulos said at the time.


3-D Transistors Made with Molecular Self-Assembly
The IBM group used a new approach known as “directed self-assembly,” using a class of materials called block copolymers (polymer chains are made up of two kinds of monomers, or blocks). It is possible to make these materials self-assemble into complex patterns, such as a densely packed row for stripes. This is done by tailoring the polymers’ length, size, and other characteristics, such as how two blocks attract and repel one another. Patterns made in this way can be much denser than what is possible using lithography. That means the approach can be used to create the smallest, most densely packed, and uniform parts of an integrated circuit: for example, the channels of silicon transistors, or the fins in 3-D transistors.


Why is India the hottest investment destination in Asia?
The Indian economic elephant, meanwhile is lumbering along and seemingly picking up pace. Riding high on investor confidence in the market due to a series of economic reforms by the new Indian government, the IMF and World Bank have projected 5.6% growth rate for India this year. Though this figure may not look substantial if looked at in isolation, it is still significant when compared to other developing countries. India is witnessing a vibrant and lively market. Arvind Singhal, Chairman of Technopak Advisors is ecstatic about Indian retail. According to him the merchandise retail market which is about US$ 525 billion in the current year is poised to cross US$1 trillion by 2020. These are big numbers indeed.


Learn or Lose: Agile Coaching and Organizational Survival
The shift needed in organizations that have barely started to embrace learning can only be created by individuals at all levels, and not confined to particular teams or functional silos. Anyone who can’t or won’t learn ― executives, middle-managers, salespeople, bean-counters, front-line workers, consultants and coaches alike ― will find they are part of the problem, and will feel increasingly insecure, and many well fight back. Agile coaching and approaches can help (a lot), but they are not an end in themselves, and must be pursued humanely and incrementally. Organizational transformation can be likened to rebuilding aeroplanes in the air, and traps abound for young players. And when it comes to this kind of change, we are all young players!



Quote for the day:

"Technology is the new leadership--another word for fear & hope. Or more precisely, leaders' latest influence tool and invisibility blanket." -- @gpetriglieri