May 11, 2013

Bank security weaknesses led to cyber looting of $45M from ATMs
The hackers broke into the card processing company, manipulated account balances and eliminated withdrawal limits on each of five prepaid MasterCard debit cards issued by the National Bank of Ras Al-Khaimah in the United Arab Emirates. Such manipulation of debit card information is referred to as "unlimited operation" in the cyber underworld and requires a very high degree of technical sophistication, according to the indictment.


Bill would put mobile app vendors on the hook for privacy
Mobile application developers would need to have a clearly spelled out privacy and data retention policy that notifies the consumer how long data is stored and the choices they have for deleting or opting out of such collection. Under Johnson's proposal, the Federal Trade Commission (FTC) would be responsible for enforcing the provisions of the bill.


Functional Design Patterns
In this InfoQ presentation Stuart Sierra a developer at Relevance, Inc., a member of Clojure/core, and the co-author of Practical Clojure (Apress, 2010) and a forthcoming ClojureScript book from O’Reilly discusses several design patterns implemented in functional languages, in particular Clojure: State/Event, Consequences, Accumulator, MapReduce, Reduce/Combine, Recursive Expansion, etc.


Cloud Security Starts With Development, Better Tools
Part of the problem is that early cloud providers -- and companies building private clouds -- focused on creating the applications, not getting all the security details right, says John Howie, chief operating officer at the Cloud Security Alliance. Fixing those problems after that fact has left many companies with hard-to-secure code.


Warren Buffett, the Human Big Data Engine
The way Buffett operates is not unlike the best use cases for big data. Among other things, his success lies in his ability to make good decisions in accordance with quality benchmarks. This is the key to using big data well, and to business success in general. Big data users can learn from Warren Buffett. His brain, in effect, is a kind of big data engine. Here are three lessons that Buffett provides for big data users:


BI architect has new options to meet growing data, analytics demands
End-user requirements for BI data and reports have expanded and become more complex as BI and analytics have taken on an increasingly central role in business planning and operations. And, in many cases, business users are looking for mobile BI capabilities or self-service tools that let them bypass canned report templates and IT-developed queries in order to slice and dice data according to their own needs and interests.


Top 10 ways to be rude in business
In the 1990 sleeper "Crazy People," Dudley Moore throws a guy's hardwired cell phone into the East River, saying "People who use car phones annoy other drivers." Nearly a quarter-century before smartphones hijacked our lives, Moore's character presciently hinted at an impending age of rudeness. We are now in the thick of the age Dudley warned us about. Here are the top 10 petty annoyances people in the business world inflict on others


Explain software testing benefits to the executives
So why do executives see testing as #EpicFail? Barber says it all comes down to accounting. "When you look at the accounting spreadsheet," Barber says, "testing is a cost center, not a profit center." He says it's in the same bucket as coffee. Although "no one in their right mind" would cut either out of the technology budget, they still both cost money and don't make product.


The unintended consequences of forced BYOD
The notion of forced BYOD may seem like it supports employee choice, albeit in a miserly way. It does -- but it also forces companies to accept two principles that will freak out most IT organizations and corporate counsels: Business data is no longer confined to business systems and repositories, so information management and security are no longer assurable; and Individuals will ultimately own the information and process management and ownership, not the businesses that become their clients.


Cloud, mobility exposing limitations of existing networks
"Cloud and mobility are the two key paradigm shifts when it comes to enterprise IT networks," says Rohit Mehra, IDC VP of network infrastructure. "[The network] was static and reliable, and it met the needs of IT. That needs to change now. Why does it need to change? Because of the explosion of traffic."



Quote for the day:

"Diplomacy is the art of telling people to go to hell in such a way that they ask for directions" -- @DeannaBrown

No comments:

Post a Comment