April 24, 2013

The Storage Metrics That Matter
For many, storage is just a bunch of high-capacity hard drives storing all of the organization's data assets, but as the layers are peeled back, it becomes apparent that storage is so much more. Moreover, as organizations experience problems with their storage, nailing down the root cause of the problem can be an exercise in frustration, particularly when it's intermittent. Which metrics really matter when it comes to monitoring storage?

Colorado Startup Making App To Cure Sedentary Habits
The USB rechargeable insole, which can go in any shoe, is equipped with two sensors that can tell if a person is sitting, standing, walking, running, climbing stairs or cycling. Data collected from the insole is transferred to an application on an iPhone that will tell users how much of their day has been spent sitting versus standing, walking or running. The app also will provide calories burned and the number of steps taken.

Mac sales growth stalls -- here's why Apple doesn't care
That jibes with numbers from The NPD Group, which tracks U.S. retail sales, and which last week said Mac sales were flat in the first quarter. Figuring out why Mac sales have gone soft was relatively easy for David Daoud of IDC. In an interview two weeks ago, he dissected what others called a "brutal" quarter for PC shipments. "Apple's facing a very similar environment [to the PC industry in general]," Daoud said then.

Verizon data breach report 2013: Data shows need for risk awareness
Alexander said Verizon's findings highlight how important it is for organizations to conduct a baseline inventory of sensitive data, so it's easier to discover what's missing or what has been tampered with in the wake of a security incident. "I'm a big fan of not only knowing what data you have, but also putting it only on approved sites, because putting security controls on tired systems can be more expensive," Alexander said.

SOLID Agile Development
From reading the Agile lore, you might think that the only answer people give to this is, "Always do TDD and pair programming." But this answer is incomplete. You can do TDD (badly) and pair programming (ineffectively) and not end up in the right place. Alternatively, you can end up in the right place even if you don't do TDD and pair programming, so clearly there's something else that's really the key element.

Mobility Management is BYOD Risk Management
The most-frequently-cited CIO concerns regarding Mobility right now are about BYOD, and are primarily around the costs and risks of technology management - including the very high likelihood of increasing and accelerating technology fragmentation. As we said in a recent Strategic Perspective, “BYOD” is really “BYOT.” And BYOT’s main challenge is the increasing scale and diversity of device numbers, device types, software ecosystems (including OSes, apps, and development stacks), and access points.

ESB Performance Round 6.5
This article presents the latest performance study conducted by the WSO2 ESB team with the latest release of WSO2 ESB (4.6.0). The most significant performance enhancement in this release is making the Passthrough Transport the default transport. In this article the performance of a number of leading open source ESBs are compared and the improvements to the WSO2 ESB are discussed. The results show that the latest WSO2 ESB performs strongly compared to other open source ESBs.

WMI CIM-plified Part 2: PowerShell 3.0
PowerShell 3.0 brings us into the world of CIM which I think you'll find to be a much easier approach for systems management using WMI. On the surface the syntax hasn't really changed much. We have a cmdlet to get instances of a WMI class either by class name or a filter. This is what we used to do:

Enterprises lack confidence in detecting and preventing threats
“Security remains a major concern among organizations. The Ponemon Institute report reveals that even emerging network security technologies are not as effective as they should be. Companies need to review their security investment weighting, to assess whether the areas of greatest risk are receiving adequate attention and how they can address serious security threats,” says Ravi Chauhan, managing directorIndia and SAARC, Juniper Networks

When IT is from Mars, and the business is from Venus
“We have been talking about IT alignment for years but it doesn’t just happen you have to do something. The conversations we have with IT are very technical; business doesn’t understand server uptime so the alignment [needs to be] around communication too,” she said, speaking at CA Technologies’ customer conference in Las Vegas.

Quote for the day:

"Your future is created by what you do today, not tomorrow" -- Robert Kiyosaki