December 25, 2012

The geeks night before Christmas
The geek's holiday classic.


Developing an IT Strategy: Timing
“Business Alignment”, a regular item on lists of Top 5 IT Concerns each year, pops up because it’s difficult to glibly draw a line connecting IT systems and projects to the changing priorities of most organizations. ... part of the problem is simply that IT, raised in a digital, structured environment, tries to be too specific and deterministic, and struggles for the poetry that connects Patch Tuesday, Project Methodology, and Regression Testing to the visionary goals and tactical targets that the corporate Strategic Planning process reveals each year.


An Interview with Amazon CTO, Werner Vogels
One of the hot trends in IT and in computing is, of course data analytics, big data. And there s a close relationship between big data and cloud computing. In the past, business intelligence was really something beforehand you already knew what kinds of questions you wanted to ask, which kind of data that you want to collect in a constrained manner.


Amazon Cloud Server Problem Spoils Christmas Eve For Some Netflix Users
The outage did not affect all devices. Here at Consumerist Christmas HQ (which is the normal Consumerist HQ but with a Festivus pole in the middle), Netflix is working okay (though load times are very long) on PC, but is not loading at all on Xbox or iPhone.


Nurses Turning to Unauthorized Smartphones to Meet Data Demands
The report, "Healthcare without Bounds: Point of Care Computing for Nursing 2012," by Spyglass Consulting Group, points to the collision of healthcare information demands on nurses, and the limits of mobile and wireless technology, at the point of care -- typically the patient's bedside. Nurses in the survey decry the lack of IT support; and IT staff are frustrated by the unsanctioned and often explicitly banned use of personal devices for clinical communications.


Google Offers Free Quickoffice App to Google Apps Subscribers
The new offering from Google, a free version of the Quickoffice iPad app, is the latest development in an ongoing battle for mobile users of office software. Google acquired the makers of Quickoffice in June as part of its efforts to challenge Microsoft on the emerging tablet and smartphone platform.


The Financial Impact of Consumerization – Is your BYOD program in the money?
Studies* show that an increasing number of organizations allow their employees to use personal devices to connect to corporate networks and data for work related activities – the so called Bring Your Own Device phenomenon. However, a new research** commissioned by Trend Micro reveals that only a few companies measure the actual financial impact of this new IT model and that even fewer have a clear sense of whether Consumerization actually makes good business sense.


Celebrity hacker gets 10 years prison for e-mail hack
Hacker Christopher Chaney was sentenced to 10 years in prison today by U.S. District Judge James Otero, according to the Associated Press. Chaney pled guilty to hacking into dozens of celebrities' e-mail accounts and posting their private information on the Internet. Among his victims were Mila Kunis, Scarlett Johansson, Christina Aguilera, Simone Harouche, and Renee Olstead.


Instagram Slammed With Class Action Lawsuit
Lucy Funes, a California Instagram user, claimed breach of contract, among other things, on behalf of herself and others similarly affected. The lawsuit was filed despite Instagram reverting some of the clauses it had announced it would change. "In short, Instagram declares that 'possession is nine-tenths of the law and if you don't like it, you can't stop us,'" the lawsuit says.


Clojure, Groupon, and Application Security
Aaron Bedra is the application security lead at Groupon. He is the co-author of Programming Clojure, Practical Software Security, and another upcoming Pragmatic Press book. Here, we discuss Clojure, Groupon, and application security. Tune in!


Security Intelligence: Not Just Another Oxymoron
Hannigan says that IT organizations need access to security tools that make it easier to identify anomalies that are usually indicative of a security breach. That “brain” first works to identify the natural operational rhythms of the business. Once those are determined it becomes a lot easier to identify unusual activity, such as a system that is sending large amounts of data at irregular hours of the day.



Quotes for the day:

"One of the best uses of your time is to increase your competence in your key result areas." -- Brian Tracy