September 09, 2013

Trust no one, advises security expert after NSA revelations
The new revelations should raise major concerns from Internet users over who they can trust, Schneier added. "I assume that all big companies are now in cahoots with the NSA, cannot be trusted, are lying to us constantly," he said. "You cannot trust any company that makes any claims of the security of their products. Not one cloud provider, not one software provider, not one hardware manufacturer."


PostgresSQL: The Other big open-source database has a new release
Jonathan S. Katz, CTO of VenueBook, an event-planning company, said in a statement, "PostgreSQL 9.3 provides features that as an app developer I can use immediately: better JSON (JavaScript Object Notation) functionality, regular expression indexing, and easily federating databases with the PostgreSQL foreign data wrapper. I have no idea how I completed projects without 9.3."


David Linthicum Named One of TechTarget's Top 11 Cloud Computing Industry Movers and Shapers
"David earned his place on the list not just because he is such a visible presence across virtually any cloud computing website or conference, but due to the fact that he isn't just saying what vendors want to hear. He has earned his status as a thought leader by consistently challenging the status quo." The feature details how via his blogs, webinars, keynote addresses, podcasts and over 13 books, Linthicum advocates for change in the cloud market.


VMware NSX: Network virtualization doesn't need to be a turf war
"To me it just feels like the VMware NSX folks are saying the network is the biggest problem," said network engineer and blogger Tom Hollingsworth. "If you are going to blame the network for all the problems that we've been dealing with for years, give us a solution that works with the people who have been trying to fix this the whole time. Don't tell me that I'm the problem and that you'll just fix it and go around me."


Securing the Virtual World
The report showed that one-third of the group think virtualization and cloud computing make security “harder,” while one-third said it was “more or less the same,” and the remainder said it was “easier.” The results seem to indicate that many are either in the process of defining policy for virtual environments, or have chosen to postpone that effort until a later date. Perhaps, as a result of this failure to tackle the security question when deploying virtualized servers, there are experts who believe that the majority of virtual deployments may be less secure than physical deployments.


4 survival strategies for IT chaos
Today's youth are, of course, tomorrow's customers. "They demand immediacy, which is driving what IT has to deal with," says Kippelman, who is CIO at Covanta Energy and a Computerworld blogger. But the need for speed is just the tip of the iceberg. Across all industries, IT teams are up against unprecedented volatility, uncertainty, complexity and ambiguity, also known as VUCA.


The Wonder Years: Businesses Transform as Cloud Adoption Matures
Along with deeper benefits, early adopters are discovering deeper complexity in using cloud for day-to-day operations. After initial cloud transitions where integration is a top challenge, companies with more experience are seeing changes to IT policy become their primary concern. These changes could involve the way that technology is procured throughout the organization or the functions within the IT department as they interact with lines of business, both of which are steps towards a fully cloud-enabled business.


U.S. court takes on Internet traffic fight
The outcome will also determine whether Internet service providers can restrict some so-called crossing content, for instance, by blocking or slowing down access to particular sites or charging websites to deliver their content faster. Public interest groups have termed the FCC rules too weak, saying the agency was swayed by big industry players and needs to forge more direct and clearer power of oversight.


Myths about Enterprise Application Orchestration
It combines business processes that cut across functional areas as well as associated IT services. Orchestrating or designing an Enterprise Application is an art which can be compared with the composition of music: It requires the same amount of effort or integration to produce the desired results. The term orchestration in music refers to the way instruments are played to render any aspect of melody or harmony


Kanban - Isn’t It Just Common Sense?
Thus in response to the question in title of this post, the answer to whether kanban is common sense is “No!” However, common sense is an example of a heuristic, and I do believe kanban is a heuristical approach to solving the many challenges of product development. The remainder of this article will explore more about what heuristics are, the primary sources that led me to the realisation that heuristics are the right approach, and how we can use heuristics to design kanban systems.



Quote for the day:

"Let a man lose everything else in the world but his enthusiasm and he will come through again to success." -- H. W. Arnold