September 18, 2013

Data Scientists Talk Privacy Worries
Data scientists working in the healthcare and life science fields showed the greatest support (92%) for a code of ethics. "Out of all the industries, life science and healthcare is the one, I think, that is most advanced in setting up frameworks for using data in an ethical way," Smith said. Overall, the survey results didn't surprise Smith. "It's really a confirmation of what we would have expected to see," he noted. "These are people who have their hands working with data in and out every day. They understand the power of data and the importance of it being used in an appropriate fashion."


China-based hacking group behind hundreds of attacks on U.S. companies
Haley said members of Hidden Lynx appear loosely organized into two teams: an A-team, comprising a relatively small number of elite hackers with access to sophisticated tools like Trojan Naid; and a B-team, which appears comprised mainly of foot soldiers responsible for carrying out large attacks using Backdoor Moudoor and similar tools. The elite hackers are usually deployed for special operations involving a high-degree of skill and secrecy, Haley noted.


How digitisation is shaking up IT outsourcing
Ridder said IT departments should be proactive and approach the business departments to help them buy the IT they need in the correct way rather than just block it. He said a lack of involvement from IT sourcing experts could present major risks to the business. For example, although buying software as a service (SaaS) might appear less expensive, it might cost more because it could mean falling short of the number of licences needed to trigger a discount for another application.


Challenges & solutions - Architecture of a Modern Web Application - Part 1
On the other hand, end users use web applications on myrid of devices, ranging from desktops, laptops, tablets, HDTV, printers, phone display and smart phones. All these devices come in variety of screen sizes, native frameworks and browser compatibilities for CSS3, JavaScript & Html5. This leaves web application development teams in making variety of decisions regarding application compatibility, performance, usability and maintainability. Let's discuss device and server side code bases separately.


Look at Risk Before Leaping Into BYOD, Report Cautions
"If you're going to put any technology on any device that you don't control, and you don't think you're not going to create some liability for your company, you're wrong," Gula said. Any BYOD management program, however -- even one weak on risk management -- may be better than no program at all. "There isn't an option for companies not to have a mobile strategy," said Caleb Barlow, an application, data and mobile security director for IBM.


IT driving UK economy as skills gap widens
Rachel Pinto, research manager at UKCES, said: “The digital sector contributes nearly £69 billion to the economy. It is also one of the most productive sectors with a growth rate since the recession three times above the average. “But the impact of IT specialists goes much further than this - of the total 1.1 million IT specialists in the UK, just under half are employed in the digital sector, with the rest most likely to be employed in finance and professional services, manufacturing or the public sector."

Banking CISOs Evolve Risk Control Mechanisms to Secure Cloud
While risks are obvious, Dr K Harsha, Head-IT, HKM Technologies, finds that the risk of financial data being hacked is huge for banks to go in for the cloud, where it is easy to hack banking and financial cloud base applications. The key aspects for CISOs of the banking and financial segment to adhere to in a cloud model are: to customise the application as per cloud capabilities, have strong applications even though end point vulnerabilities exist, ensure frequent reference of logs, and notification alerts for configurations.


Case study: 3 heavyweights give gamification a go
But now companies are gamifying internal applications to engage employees. Burke expects internal efforts to overtake consumer-engagement uses in the next year or so. By 2015, 40% of global 1000 organizations will use gamification as the primary mechanism to transform business operations, Gartner predicts. "We see gamification being leveraged for change management," says Burke. "We see that as a big opportunity."


Canvas Inspection using Chrome DevTools
Sometimes you want to capture the instructions sent to a canvas context and step through them one by one. Fortunately there is a new Canvas Inspection feature in Chrome’s DevTools that lets us do just that! In this article Paul Lewis shows you how to use this feature to start debugging your canvas work. The inspector supports both 2D and WebGL contexts, so no matter which one you're using, you should be able to get useful debugging information straight away.


The insight driven organisation
Why do business leaders struggle so much with incorporating qualitative judgement into their innovation decisions? Our research uncovered two main causes. First is what can be called Schumpeter’s bias. We all pay lip service to Schumpeter’s vision of the lone and creative entrepreneur. This image is so entrenched that people unconsciously tend to believe that the magic of an insight is not replicable. Many business leaders believe that we depend on “individual” genetic talent. But scientific evidence of the last 30 years proves just the opposite.



Quote for the day:

"The quality of a man's life is in direct proportion to his commitment to excellence, regardless of chosen field of endeavor." -- V. Lombardi