July 04, 2013

Risk management, bottom-line benefits from records retention schedules
"[Retention schedules] certainly mitigate risk from a data management and information governance perspective because, at the end of the day, retention schedules are about two things: avoiding the cost of keeping information and making it quick and efficient to find it when a legal or regulatory request comes up," said Barry Murphy, co-founder and principal analyst at the eDJ Group consulting firm.


Business Analytics: Why Not Experiment?
Even properly-executed experiments – those with high internal validity – can still suffer from external validity shortcomings if the sample isn’t representative of the larger population or the findings don’t generalize beyond the specific experimental settings. The good news for business innovators is that experimentation has never been cheaper. Many B2C companies design, implement and analyze thousands of experiments weekly, fueled by Internet access to customers and inexpensive technologies.


The era of “Internet aware systems and services”
The major solutions in the digital ecosystem today incorporate an ever growing mix of devices and platforms that offer new user experiences and organization. This can be seen across most all industry sectors and horizontally between industry sectors ... strategic planning needs to have insight into the nature of new infrastructures and applications that will support these new multisystem workloads and digital infrastructures.


Object Pool Design Pattern
The object pool design pattern creates a set of objects that may be reused. When you need a new object you request it from the pool. If a previously prepared object is available it is returned immediately, avoiding the instantiation cost. If no objects are present in the pool, a new item is created and returned. When you have used the object and no longer need it, you return it to the pool, allowing it to be used again in the future without going through the slow instantiation process.


Cascading Change Versus Viral Change
sometimes before we even know whether this change is beneficial for us or not, simply because we have not tried it out yet. This is a risky endeavor with big stakes! By being a bit more dynamic and smarter in risk taking (at small scale and hence at low costs of failure) we could allow for more experimentation with change initiatives to be done in chosen areas. When and if these experiments succeed – they will spread automatically if we just allow for it


Cisco waited too long to address SDNs, Chambers says
Chambers said Cisco has the opportunity to fold SDNs into "a total architectural play" and offer OpenFlow switch/controller interactions at line-rate speeds. Cisco also sees an opportunity to "open (SDN) up to the network," which is the inverse of what other SDN players propose: opening up the network to SDN control. Chambers was adamant that SDNs do not threaten Cisco's successful franchise in switching and routing, which is a $180 billion installed base.


The CIO position: Why you need to eat your own dog food
Yet, the tides are turning once again, as they often do when it comes to the CIO position. Now companies across sectors don't just want a CIO with a top-notch technology background or industry-specific knowledge; they need an IT executive who has insight into the wants and needs of the customer, Banerji explained. In the technology sector, this has been true for years. "Those CIOs are expected to, as they say, eat their own dog food, and a lot of companies want that in their CIO," Banerji said.


Design Patterns after Design is Done
Abstract Factory makes code more modular and reusable, but at the expense of understandability. Flyweight makes code less expandable and reusable, and much harder to follow. Most developers don’t recognize or understand the Visitor pattern. Observer can be difficult to understand as well, although it does make the code more flexible and extendible. Chain of Responsibility makes code harder to follow, and harder to change or fix safely. And Singleton, of course, while simple to recognize and understand, can make code much harder to change.


Significant Growth Rates Expected for Enterprise App Stores
“Enterprises supporting BYOD initiatives need to consider bring-your-own-app initiatives as well,” McNicol said. “Widespread adoption of BYOD has led to an influx of third-party apps being used to support business functions. Instead of blacklisting these apps, enterprises are embracing, securing and deploying third-party apps through the enterprise app store. As such, the enterprise app store is a means to support BYOA.”


Are outsourcers stunting business innovation?
“There isn’t the incentive in the current contract structures for them to bring those new ideas to the table. We’ve talked for donkey’s years about contracting for innovation but actually nobody does,” Sheridan said. “Most organisations want the service they’ve contracted for, delivered at the level that their business requires for the price they’ve agreed - and all the focus is on doing that,” he said.



Quote for the day:

"Do not go where the path may lead, go instead where there is no path and leave a trail." -- Ralph Waldo Emerson