November 30, 2013

Emerging MDM Trends Part 3: MDM on Cloud
Running MDM on a Cloud is particularly interesting unlike other trends I discussed before because of challenges associated with cloud. Adoption of hosted services has always been infected with security issues. There has been increasing concern and demand for reliable and guarded platform and it is elementary when you think from organizations point of view. However, with MDM, this simple ask has become more demanding than ever before.


Cloud traffic to quadruple by 2017, challenge CIOs
Forrester principal analyst Dave Bartoletti said this means enterprises will have to rethink how they manage the growing cloud and Internet of Things. His colleague, Andre Kindness, said keeping files synchronized across multiple personal and enterprise devices will be one of the "things" that challenges companies in coming years. As the consumerization of IT drives employees to bring personal smartphones and tablets to work, the need to synchronize files is growing "from a whisper to a scream," Kindness said, noting that 21% of global information workers use file-sync solutions.


Reduce Your Stress in Two Minutes a Day
When he finished his second marathon a few minutes slower than his goal, he felt he had failed. So to make things “right” he ran another marathon just five weeks later. His body rejected this idea, and he finished an hour slower than before. Finally, his wife convinced him to figure out what was really driving his stress. He spent the next several years searching for ways to find more joy in the journey. In the process he found five tools.


Can technology improve business innovation?
For its part, the Internet itself has greatly accelerated general improvement in the field of innovation. By connecting millions of people with great ideas to new pools of resources that are able to help realize them, a pretty long list of impressive results have accumulated over the years. Of course, the darling these days in open innovation specifically is crowdfunding (which has led to the proverbial Cambrian explosion in related startups), where the concept is that anyone with a good idea can come to the community and try to convince them to fund their idea individually.


We’re ready for hybrid cloud, Microsoft Canada tells IT audience
That vision, however, doesn’t include building a data centre here for Microsoft’s hosted Azure infrastructure-and platform -as-a service (IaaS, PaaS) offerings, which compete against Amazon Web Services and others. Microsoft Azure has data centres in the U.S., Europe and Asia. Azure-based services here can only be bought from Canadian cloud providers using the Azure platform to offer IaaS and PaaS, Grant said in an interview.


Wibidata Machine Learning Platform Offers Comparable Capabilities
The new WibiEnterprise 3.0 platform allows a company to power a site with advanced analytics that fine-tunes itself, providing better recommendations and other features over time, including more relevant search results and personalized content. The platform is designed for the customer who is beginning to use data science, said Omer Trajman, vice president of field operations at Wibidata. “They are not classically trained but they have an analytics background. They have been doing marketing analytics. The mechanics are similar, what has changed is the availability of data.”


Here comes a supercomputing app store
Supercomputer-based visualization and simulation tools could allow a company to create, test and prototype products in virtual environments. Couple this virtualization capability with a 3-D printer, and a company would revolutionize its manufacturing. But licensing fees for the software needed to simulate wind tunnels, ovens, welds and other processes are expensive, and the tools require large multicore systems and skilled engineers to use them.


How to Start Thinking Like a Data Scientist
Fortunately, you don’t have to be a data scientist or a Bayesian statistician to tease useful insights from data. This post explores an exercise I’ve used for 20 years to help those with an open mind (and a pencil, paper, and calculator) get started. One post won’t make you data savvy, but it will help you become data literate, open your eyes to the millions of small data opportunities, and enable you work a bit more effectively with data scientists, analytics, and all things quantitative.


Scrap your ITSM Processes
Now, as with every service, there are other stakeholders other than the customers. Laws, regulations and policies still apply. But the message we need to bring to the customers is that we can make your life better – the service we deliver will help you get your job done. Will the underlying process change? Probably not much – if at all. But the marketing will, and the relationship with the customers will. And the vision of the (now) Service Owner will influence the mindsets of all the other roles within the service.


Is Your Leadership Like No Place On Earth?
The deepest questions, insights, awareness and answers rarely come to us as leaders or managers when we are sitting at the top of the mountain of success feeling like the keys to the universe are all ours. No matter who we are, no matter what we have captured or accomplished; our success, achievement, sense of personal power, value or fulfilment can always change in a blink of an eye. We must constantly strive to keep on top of our goals. The greatest power we hold is not in what we have, but in who we truly are when we choose to ignite, engage and unleash the leader we want our team to follow.



Quote for the day:

"There was never a genius without a tincture of madness." -- Aristotle

November 29, 2013

Agility, Big Data, and Analytics
Agile hinges on embracing and adapting to change by enabling rapid feedback cycles and evolutionary development. However, bringing agility into big data (and small data) analytics has been a challenge for many, very bright and talented, data scientists and engineers. In this article we’ll explore what makes analytics uniquely different than application development, and how to adapt agile principles and practices to the nuances of analytics.


Structuring a big data strategy
IT executives first need to formulate a clear business case and execution strategy. Without those elements in place, any effort put forth to gather, classify, analyze and ultimately act on data might be for naught.  This essential guide prepares business and IT executives for success by showing how their peers have made the business case for big data and rolled out a big data strategy in their organizations. Learn the tools, technologies and strategies used to turn big data into big business insights.


Flash Startup Pure Storage Fights EMC in Trade-secrets Battle
The fight has exposed competitive tensions surrounding all-flash arrays, which are expected to play a growing role in data centers as enterprises seek faster data access and more efficient storage platforms. Pure is a specialist in all-flash gear that started shipping in 2011, while the venerable EMC is aggressively pursuing the market through its acquired XtremIO division.


Call-Log App Aims to Reverse-Engineer NSA Surveillance
The NSA was revealed to routinely collect such logs from Verizon in some of the first documents leaked by erstwhile intelligence agency contractor Edward Snowden this year Other companies are believed to be under similar obligations. Those logs include what the NSA calls “metadata”—the time, duration, and source and origin numbers of every call. The agency says it searches its metadata collection only for specific phone numbers related to investigations, but opponents of the program claim that, with careful analysis, the database could be used to reveal personal details on a vast scale.


Is The UK Sleepwalking Towards Internet Censorship?
Schmidt was basing his prediction on improvements in encryption. Google, along with Facebook, Yahoo and, today, Microsoft have all announced major improvements in security following the recent revelations from former NSA contractor Edward Snowden about government spying. “We have strengthened our systems remarkably as a result of the most recent events,” Schmidt said. “It’s reasonable to expect that the industry as a whole will continue to strengthen these systems.”


Consumer cloud services: Friend or foe?
IT pros have valid concerns about data leaking from the cloud, but in the grand scheme of things, a data leak is only as earth-shattering as the information that leaks. If the information that gets out via a cloud hack or employee carelessness isn't mission-critical, then it stands to reason that it doesn't matter much that it's been made public. If you can get past the security concerns, allowing the use of consumer cloud services -- such as Dropbox and Google Drive -- means that IT doesn't have to manage an in-house service.


Building a RESTful Web Service with Spring Boot to Access Data in an Aerospike Cluster
Spring Boot is a powerful jump start into Spring. It allows you to build Spring based applications with little effort on your part.Aerospike is a distributed and replicated in-memory database optimized to use both DRAM and native flash/SSDs. Aerospike also has high reliability and is ACID compliant. Developers can quickly scale their database cluster from two nodes to twenty nodes without bringing down the database service.


IT group slams Chinese govt for not doing enough
Describing Beijing's efforts toward IT development as "insincere", Witman Hung Wai-Ma, chairman of Internet Professional Association (iProA), said the industry's prospects had become so dire that the group felt it necessary to speak out against the government, according to a report Friday on South China Morning Post. Hung is also co-founder of Next Horizon, which provides backoffice process outsourcing.


Google privacy changes break Dutch data protection law, says regulator
The report said it was "almost impossible" for a Dutch internet user not to interact with Google "be it via Search, YouTube or Maps, or passively through third-party websites" and that "Google does not properly inform users which personal data the company collects and combines, and for what purposes." It also said that proper user permission "cannot be obtained by [their] accepting general (privacy) terms of service."


Magnetic tape to the rescue
WHEN physicists switch on the Large Hadron Collider (LHC), between three and six gigabytes of data spew out of it every second. That is, admittedly, an extreme example. But the flow of data from smaller sources than CERN, the European particle-research organisation outside Geneva that runs the LHC, is also growing inexorably. At the moment it is doubling every two years. These data need to be stored. The need for mass storage is reviving a technology which, only a few years ago, seemed destined for the scrapheap: magnetic tape



Quote for the day:

"I've got a theory that if you give 100% all of the time, somehow things will work out in the end." - Larry Bird


November 28, 2013

Consumer cloud-based storage services force changes in security
The perceived superiority of consumer cloud-based storage services may reflect a lack of policy controls and not a difference in core functionality. For example, an internal document management system may have features such as device-independent access. It might seem less user-friendly because a user cannot simply provide a list of collaborator email addresses to share a folder with others.


How the cloud’s value proposition is changing
Since 2010 a new value proposition has taken shape — one that I feel truly realizes the full power and original intent of the modern cloud. Today, the value proposition of the cloud comes from the ability to connect disparate applications to form one seamless web of IT. In a 100 percent web environment, APIs from dozens of applications can be integrated to allow data to flow across systems.


Screen play thoughts: A speculative look at trends in video game addiction
Over the last decade there has been a significant increase in the number of scientific studies examining various aspects of video game addiction. This has resulted in a wide-ranging selection of review papers focusing on different aspects of the topic. These include general literature reviews of video game addiction, reviews of online (as opposed to offline) gaming addiction, reviews of the main methodological issues ...


Resurrecting the Failed Project - Part 2
Finally, we had a modified project kick-off meeting. Nothing big, nothing very formal. But it was a chance for us to once again discuss next steps, assumptions, risks, issues and lessons learned, and to review the project schedule so we all left on the same page and ready for the next phases and the next deliverables we would be focused on. This step is critical…because while it's not a formal kick-off meeting you have to remember you're dealing with an organisation that somehow decided to give your organisation a second chance.


To Strengthen Your Attention Span, Stop Overtaxing It
Top performance requires full focus, and sustaining focused attention consumes energy – more technically, your brain exhausts its fuel, glucose. Without rest, our brains grow more depleted. The signs of a brain running on empty include, for instance, distractedness, irritability, fatigue, and finding yourself checking Facebook when you should be doing your work.


XtremIO: What You Need to Know (Updated)
The controllers each have two 8Gb/s Fibre Channel ports, Two 10GbE iSCSI ports, two 40Gb/s Infiniband ports (for node communications) and one 1Gb/s management port. In terms of capacity, todays’s XtremIO solution scales from a single X-Brick with 10TB of capacity (7.5TB usable) to four X-Bricks of 30TB usable. A capacity increase is expected in 1Q2014 with double capacity SSDs offering up to 60TB in a single four-node cluster. Eight-node clusters are also being talked about, but I have no timescale for that.


WSO2 Big Data Story
WSO2’s Big Data Analytics platform captures business activity across multiple data formats and message channels, performs temporal complex event processing and map-reduce analytics, and presents relevant, real-time business alerts and dashboards to enable timely operational management and business planning. WSO2 Big Data Analytics Platform enables an API-centric architecture, enhances business visibility, Contextual Web, and helps build an adaptive business.


The Care and Feeding of Data Scientists
"I'm coaching them to make sure they're aligned with the company, but I'm not prescribing methodology," says Anne Robinson, director of supply chain strategy and analytics at Verizon Wireless. "Because if you want a high return on your analytical investment, allow them the freedom to explore." Robinson says good teams incorporate a mix of academic skills and applied experiences. Personal characteristics, such as the ability to make connections and express ideas well, are important in the corporate setting, managers say.


Researchers enable computers to teach themselves common sense
The program also is set up to enable a computer to make common sense associations, like buildings are vertical instead of lying on their sides, people eat food, and cars are found on roads. All the things that people take for granted, the computers now are learning without being told. "People don't always know how or what to teach computers," said Abhinav Shrivastava, a robotics Ph.D. student at CMU and a lead researcher on the program. "But humans are good at telling computers when they are wrong."


Bluelock CTO: Learn which benefits of IaaS matter most to customers
As competition in Infrastructure as a Service (IaaS) intensifies and more players enter the market, customers won't think twice about abandoning their current cloud provider if it disappoints them. Now more than ever, providers need to not only understand what enterprises are looking for in an IaaS provider, but they also need to know which benefits of IaaS resonate the most with customers.



Quote for the day:

"I am reminded how hollow the label of leadership sometimes is and how heroic followership can be." -- Warren Bennis

November 27, 2013

Five Benefits to Becoming a Data-Driven CFO
In a data-driven business culture, the CFO will have the ability to align operational goals with management’s strategic agenda by utilizing predictive models based on historical data as a highly focused planning tool. Using data to drive decisions that impact present and future operations, CFOs cement their role in helping the business achieve cost savings and uncover new revenue opportunities. Understanding the correlations between financial data and operational data allows the CFO to maximize operating capital and cash flow; to anticipate areas or periods of slow-down and proactively manage company assets.


Putting Spark to Use: Fast In-Memory Computing for Your Big Data Applications
Spark’s ease-of-use comes from its general programming model, which does not constrain users to structure their applications into a bunch of map and reduce operations. Spark’s parallel programs look very much like sequential programs, which make them easier to develop and reason about. Finally, Spark allows users to easily combine batch, interactive, and streaming jobs in the same application. As a result, a Spark job can be up to 100x faster and requires writing 2-10x less code than an equivalent Hadoop job.


Take your app on the road, put it in a car
With all that said, the idea of extending existing apps into cars is a good one, and it would be nice if there were a common platform to allow app developers a single target to aim at. To that end, earlier this year, Ford open sourced AppLink to the GENIVI Alliance, which is a consortium of auto manufacturers and technology vendors looking to produce a Linux-based in-car infotainment system. But given the slow pace with which the auto industry moves compared to the technology industry, I wouldn't be expecting any Earth-shattering announcements anytime soon.


Facilitating Enterprise Cloud Adoption through Intelligent Policy Enforcement
What intelligent policy enforcement does for an organization is ensure that their security and compliance standards are adhered to at all times while also improving the work habits of users. As these policies evolve and grow over time, organizational efficiency rises with them, as users become more comfortable using the platform and its security requirements. Better access to the collaborative tools offered by the cloud translate into more productive employees, and over time the work environment itself becomes more flexible and responsive.


6 Ways Cloud Services Brokerage Makes IT-as-a-Service a Reality
More than 70% of IT executives want ITaaS, according to a 2012 IDG survey. However, they are held back from reaching this goal because they do not have sufficient tools and processes in place. Enter the Cloud Services Brokerage ... CSB gives back control to IT in six important ways, including centralized management and governance, centralized services procurement, interoperability among disparate services, data security, cost containment, and strategic planning through analytics and modeling.


E-book: IAM for the Real World: Simplifying Complexity
The historical approach to IAM involves piecing together “half solutions,” in hope that tomorrow’s solutions will address real-world needs. The e-book “IAM for the Real World: Simplifying Complexity” evaluates what IAM for the real world would, should and can look like. It delves into the most pressing IAM issues faced by virtually every organization and offers actionable, affordable and sustainable approaches to the IAM challenges you face. At Dell Software, we help you achieve your IAM objectives for your real world (not ours), in a way that moves you and your business towards your goals.


When it comes to storage, cache is king
If you like deep-diving into tech, and you’re interested in how flash is changing computing architecture, then you should read that paper. It deals with a whole stack of stuff that most people are just coming to terms with today, including whether flash memory should be thought of as a special part of main memory or as a special part of persistent storage. It also has some interesting perspectives on drive wear-out, and makes the case that an SSD will absorb more writes than a disk over its typical lifecycle.


The GRC maturity model and value proposition
To meet these ever-evolving and expanding needs, top-performing organizations have begun to combine Governance, Risk and Compliance (GRC) into an integrated set of standards, policies, guidelines, and procedures and tools that are in many respects similar to how we have historically integrated the disciplines of finance and accounting, or marketing and communications, or programming and testing.


Here's the one problem with wearables that we all need to fix
The only frustration with the Pebble is that I keep forgetting to charge it. But at least I actually strap it onto me. Not so much with the Fitbit, which just has to live in one of my pockets. It's so small and light that it's easy to lose. If my keys fell out of my pocket, I'd notice that. If my Fitbit did -- no chance. Case in point, it might be the case that you sit down in McDonalds with a Fitbit, smartphone, keys, and wallet, and then you get home you discover that you no longer have a Fitbit.


All You Need To Know About Botnets
Botnets are exploited for various purposes,including denial-of-service attacks, creation or misuse of SMTP mail relays for spam (see Spambot), click fraud, mining bitcoins, spamdexing, and the theft of application serial numbers, login IDs, and financial informationsuch as credit card numbers. The botnet controller community features a constant and continuous struggle over who has the most bots, the highest overall bandwidth, and the most “high-quality” infected machines, like university, corporate, and even government machines.



Quote for the day:

"Success...My nomination for the single most important ingredient is energy well directed."- Louis Lundborg

November 26, 2013

Simplifying Asynchronous Code With Scala Async
Ever wished the compiler could make asynchronous programming easier? Enter Scala Async. Do asynchronous I/O like "normal" blocking I/O, program with Futures and Promises even more naturally! Scala Async makes it possible to "suspend" at arbitrary points in a block of regular Scala code, and to "resume" from that point later--all without blocking.


Former VMware CIO talks top data threats
As the former CIO of Symantec Corp. and VMware Inc., Mark Egan has seen his share of data threats and how quickly these threats morph. Take cloud and virtualization, two areas CIOs dubbed cringe-worthy in terms of security a few years ago. No more, given the maturity of the vendors' own security controls -- albeit because of customer demand for better data security and privacy, he explained.


Open router project launched to improve network privacy
The fact that it's running open-source software on an open hardware design adds trust, with fewer ways for the device to be compromised. But it does mean that another variant of Tor is being created, and another distribution of the Linux operating system — albeit a minor one. While code updates can and perhaps should be automated, it does represent another place where things have the potential to go wrong. Bugs love the crevices between modules.


Q-and-A with Bill Swanson, global CFO and North America CEO, Cartridge World
CEOs are thought of as visionaries. They are paid to think big and seek innovation, constantly looking for ways to drive business, improve perception of the brand and develop new revenue streams. In contrast, a CFO is more engaged in the current realities of the business and must counterbalance these often grandiose ideas with a more cautious fiscal outlook. That balance is important, and we simply couldn’t afford to lose it at Cartridge World.


What the smartwatch says about our mobile ecosystem
A smartwatch is not a stand-alone device. It generally coexists smartphones and tablets and is dependent upon that connection for true mobile productivity to take effect. As Jeff Kagan with CNN put it: “The smartwatch will be your remote control for your smart phone. And your smart phone will be your remote control for your life.”


A CIO Survival Guide to Saying No
Developing the art of polite refusal--especially when declining a request from a fellow business executive--is a CIO leadership skill of the highest order. It speaks to your personal reputation for inspiring trust, building relationships and communicating honestly. "Veteran CIOs find that by using tools such as skillful conversation, deep governance and sense-and-respond intelligence, denial doesn't have to kill a career," Kim S. Nash writes.


Forrester to security leaders: Embrace continuous improvement
Security leaders can choose from a slew of CI programs out there designed to improve the quality of products and services or efficiency of processes, such as Six Sigma, kaizen and kieffer. CI initiatives for data security and privacy can help drive deep process, cultural and behavioral change within the organization by: 1) establishing key processes to embed security and privacy mindfulness; 2) creating a culture of importance and respect for data security and privacy; and 3) empowering security teams to stop data exfiltration.


10 things we learned - or didn't -- from Cisco's Insieme launch
Cisco's introduction of the Insieme Networks product line and strategy was the most anticipated networking announcement in almost two years. It represents Cisco's response to the software-defined networking trend pervading the industry, and threatening Cisco's dominance and profits. While not a watershed moment – Insieme didn't change Cisco's modus operandii, as explained below -- Insieme is nonetheless one of the most important events and product introductions in Cisco's history.


Contrasting Backbone and Angular
In this article the author goes down the list of the things we have to deal with day to day when building web applications, and show how Backbone and Angular can help with each of them. ... Most of the things we do as web developers fall into one of the following categories: Implementing business logic; Constructing the DOM; Implementing view logic (declarative and imperative); Syncing up the model and view; Managing complex UI interactions; Managing state and routing and Creating and wiring up components


BYOD Programs: A 10-Point Checklist for a Successful Strategy
BYOD is an approach that allows employees, business partners and others to use personally selected and purchased client devices to execute enterprise applications and access data. It typically spans smartphones and tablets, but the strategy may also be used for PCs, including netbooks, notebooks or other portable connected devices. "BYOD strategies are the most radical change to the economics and the culture of client computing in business in decades," said David Willis, vice president and distinguished analyst at Gartner.



Quote for the day:

“Leadership is the capacity to translate vision into reality.” -- Warren G. Bennis

November 25, 2013

Twitter tightens security against NSA snooping
The company implemented "perfect forward secrecy" on its Web and mobile platforms, it said Friday. The technology should make it impossible for an organization to eavesdrop on encrypted traffic today and decrypt it at some point in the future. At present, the encryption between a user and the server is based around a secret key held on the server. The data exchange cannot be read but it can be recorded in its encrypted form. Because of the way the encryption works, it's possible to decrypt the data at some point in the future should the server's secret key ever be obtained.


Most significant mobile tech of 2013: Windows 8.1
While updates are the natural order of things in the OS world, make no mistake, Windows 8.1 was largely created to address those things people didn't like about the first release. It was intended to make the OS work better on tablets, as mobile is very important to both Windows and Microsoft. In that effort Microsoft succeeded, as Windows 8.1 has turned the platform into a good one for tablets. It does so while also becoming a good engine for notebooks, the other side of the mobile coin.


16 products that Microsoft has killed off
Every product has its end. It is either replaced, upgraded or merged in with something else. Even Microsoft, a company that is notoriously generous and patient with letting a product gain momentum, is willing to pull the plug when necessary. Here are some of the most notable Microsoft products that have met their demise.


Top 10 Unstructured Data Projects for 2014
Everyone’s talking about unstructured data lately – the cost, the risk, the massive growth – but little is being done to control it. Analyst group IDC estimates unstructured data growth at 40-60 percent per year, a statistic that is not only startling, but puts a great deal of emphasis on the need to start managing it today or at least have it on the schedule for 2014. With budgets tightening – often to pay for storage costs – data center managers are struggling to find the highest impact projects that will see an immediate ROI.


Researchers use shopping cart to put mobile, NFC payment theft on wheels
Despite widespread adoption in Europe and the UK, the researchers found that contactless payments are more vulnerable then previously believed. Hacking into NFC payment transmission and covertly skimming, relaying or eavesdropping on the transmission of sensitive customer information isn't new; researchers began to make these three types of vulnerabilities public around 2008. Yet making it easy and reliable was not a known quantity until now - four security researchers from the University of Surrey have examined success rates, distance and more, using cheap store-bought electronics.


Berlin court rules Google privacy policy violates data protection law
Google said it would appeal the decision. "We believe our Terms of Service and privacy policy comply with all applicable laws, a Google spokesman said in an emailed statement. If the verdict is upheld, it could have far-reaching implications for Google. "When it is final Google will have to change a lot, change its privacy policy and terms and conditions," Skutnik said. But the federation will have to be patient: "If we're lucky" the court of appeal will make a decision by the end of next year, she said.


What Is a Leadership Pipeline?
How do we make it safe for people at all levels of your organization to practice leadership? Leadership has become a buzz word these days and I want to make it clear that my opinion is that we not only want to practice leadership, we want to practice followership. In order to create a great leadership pipeline in your business you have to practice what it is to lead and what it is to follow and we have to make it safe in our companies to build a culture of being able to say what’s on our mind without repercussion.


Backend as a Service: Reap the benefits, master the challenges
Most mobile applications also require resources on the other side of the network: a place to store data, means for managing users, support for push notifications and things like leveraging geolocation services. In fact, building a fully featured mobile app often depends on the ability to support these back-end capabilities. In response to that need, a new class of Platform as a Service [PaaS] has emerged that many in the market referred to as Backend as a Service because these offerings provide the required back-end capabilities in a cloud-hosted model.


California sues SAP over failed payroll software project
"After three years, and paying SAP approximately $50 million to integrate its own software into a new payroll and benefits system for the state of California, all the [state controller's office] has to show for its investment is a system that could not get the payroll right even once over an eight-month period for a pilot group of only 1,500 employees," the lawsuit states. The suit, filed Thursday in Sacramento County District Court, comes after a lengthy back-and-forth between the state and SAP over the system, which was supposed to serve 240,000 workers and replace 30-year-old legacy systems.


Avoiding the Minefields to Ignite MDM Value
While the concept of MDM is not new, it’s a rapidly evolving marketplace that has become crowded with applications and a blur of sameness when it comes to marketing messages and positioning. When evaluating MDM vendors, organizations should conduct due diligence and take time to verify that that the vendor under consideration has a team of seasoned experts who can turn data into revenue. Start by asking questions such as what is the average tenure of your employees, and what is the earliest deployment your customers have experienced starting from the beginning of the project?



Quote for the day:

"Worry, like a rocking chair, will give you something to do, but it won't get you anywhere." -- Vance Havner

November 24, 2013

Add red flags to risk-based access weights in IBM Security Access ManagerMany organizations prefer a red-flag approach to risk assessment. In this approach, certain variable values in a transaction are defined as "red flags," and if any of those variable values appear, the transaction is considered risky. ... To implement red-flag risk assessment, give every red-flag variable a weight of one, and every other variable a weight of zero. Set the risk threshold level to 1%. If any of the red-flag variables are risky, the risk level will be above 0%, and, therefore, it will be considered dangerous and treated accordingly.


Analytics 3.0: Evolution
Some of us now perceive another shift, fundamental and far-reaching enough that we can fairly call it Analytics 3.0. Briefly, it is a new resolve to apply powerful data-gathering and analysis methods not just to a company’s operations but also to its offerings—to embed data smartness into the products and services customers buy. ... the first companies to perceive the general direction of change—those with a sneak peek at Analytics 3.0—will be best positioned to drive that change


Supercomputing's big problem: What's after silicon?
Supercomputing researchers aren't sure what's next. Today, supercomputing relies on architectural changes, such as adding speedy GPUs, to boost performance. Researchers may increasingly turn to chips that integrate interconnects and memory to speed processing and reduce energy. But the teams must also wrestle with the enormous costs of building -- and running -- multi-petaflop systems. "We have reached the end of the technological era," said William Gropp, chairman of the SC13 conference and a computer science professor at the University of Illinois at Urbana-Champaign.


IBM's Strategy and Direction: Analyst View
IBM is very aware of market transformation being caused by Cloud, and continues to move toward an increasingly unified, standards-based Cloud IT and business environment. These moves will serve their established partner and customer base well, and can protect IBM from significant loss in those areas. But as Cloud-native competitors continue to establish and grow their own partner/customer bases of influence, Big Blue needs to continue to consolidate, coordinate, and accelerate a Cloud-first mentality across its divisions.


Engineers Plan a Fully Encrypted Internet
The IETF change would introduce encryption by default for all Internet traffic. And the work to make this happen in the next generation of HTTP, called HTTP 2.0, is proceeding “very frantically,” says Stephen Farrell, a computer scientist at Trinity College in Dublin who is part of the project. The hope is that a specification will be ready by the end of 2014. It would then be up to websites to actually adopt the technology, which is not mandatory.


Pattern Based Requirements Model Using SysML
When we start decomposing these problems, we realize that they consist of sub-problems of similar type such as accepting input from a librarian is similar to accepting operational commands from a pilot or displaying book query result on a display is similar to displaying situation information on a display. Thus using PFs, we can effectively understand and analyze the problem and then re-use our knowledge in solving them. However, problem frames are less adapted in the industry because of the lack of standard notations and tools.


Static and dynamic testing in the software development life cycle
In the past decade, the art and practice of hacking has taken a significant turn for the worse. From the volume and complexity of attacks to the growing audience of international participants who hack for fame or fortune, hackers are modern-day pirates seeking adventure on the high seas of the Internet.
But what makes this trend even more critical is the size of the attack surface the Internet makes possible. We live in an increasingly connected world, where physical or package security is no longer the hacker's obstacle. Instead, knowledge of network protocols, applications, and an ever-growing list of exploits and utilities make up the hacker's toolkit.


The Data Scientist at Work
Data scientists need business knowledge; they need to understand the enterprise data; they need to know how to deploy technology; they have to understand statistical and visualization techniques; and, most importantly, they need to know how tointerpret the results. For example, if a discovery exercise shows that the number of storks born has a strong correlation with the number of babies born one year later, data scientists should have sufficient knowledge to conclude that these variables do not have a direct relation, but that they are both dependent on a third variable, one that probably hasn’t been included in the study yet.


Disaster Recovery Site Selection: Factors and Approach
For a DR strategy to work as per design, one of the important contributors is DR site as it will define service availability to customers during disasters. Further section details about factors to be considered for DR site selection with an approach. DR site is very crucial for any business as it will help to keep business running in adverse scenarios. DR site selection is crucial decision as it will impact availability of services to client, RPO/RTO requirements and service performance. Some of the factors which need to be considered are:


Blend Strategy & Governance To Drive Business
The role of CIO in each of these three different state is different. So, it is very important to have a clear picture of where your organisation is heading towards. Then the CIOs need to start assessing and evaluating internal capabilities to meet those goals. Once the gap analysis is done, CIOs need to make strategies to fill those gaps and identify the right partners to work with. While doing so, CIOs must put in place a robust control mechanism with full ownership of key functions associated with enterprise architecture and standards.



Quote for the day:

"If you do not know how to ask the right question, you discover nothing." -- William Edwards Deming

November 23, 2013

Are CIOs an Endangered Species?
Forrester Research VP Sharyn Leaver and Dachis Group Chief Strategy Officer Dion Hinchcliffe recently took part in an online debate over whether the role of the CIO is still relevant today. (Leaver argued yes, Hinchcliffe no.) Ever wondered about the importance of the position in your company? Here are four of the major questions to consider, and the arguments on each side.


Impact of Cloud Computing – Part 2
As Cloud Computing‘s adoption increases, it starts changing the way Businesses, Governments work. Here are a few links (one small sample) of how Cloud impact industries and governments. As it spreads, it will change the business models, IT delivery models and even the way governments (local and global) work together. There will be a few outlier applications like Cloud as Brain which are now in their infancy but have lots of interesting future possibilities.


Design Considerations For Converged Networking On A Budget
For the VM traffic the decision is rather easy. We go for Switch Independent with Hyper-V Port mode. Look at Windows Server 2012 NIC Teaming (LBFO) Deployment and Management to read why. The exceptions mentioned there do not come into play here and we are getting great virtual machine density this way. With lesser density 2-4 teamed 1Gbps ports will also do. But what about the team we use for the other network traffic. Do we use Address hash or Hyper-V port mode. Or better put, do we use native teaming with tNICs as shown below where we can use DCB or Windows QoS?


IT: Don't let the CEO wonder what you do all day
Corporate executives may think enterprise IT systems are like home computers: You set them up and they keep running with little or no intervention as long as security updates and patches are set to automatically download. It's hard to argue with the logic that servers costing $50,000 or more should have at least the same capabilities as the $1,000 Macs or PCs sitting on their desks at home. ... Indeed, IT often goes unappreciated unless and until something fails to work as expected.


In Command, but Out Of Control
In this first part of the video series by Abhilash Nambiar, Lt. General Paul Van Riper talks about how his 40+ years in the marines shaped his views of how some of the most productive groups are self-organized. Self-organized groups in combat or in business are best able to solve what he calls complex, wicked problems. He describes how two self-organized teams he led, one in Vietnam and the other as Red Team Commander in the Millennium Challenge 2002, were able to come up with unique winning solutions.


Business leaders lacking confidence in IT
Looking at disruptive incidents, in relation to data protection, security, or availability, as well as the pain that occurs because of them — a majority of respondents said that budgets were the reason that their organizations failed to achieve success. However, 35 percent also noted workload or resource constraints, 33 percent claimed that a lack of planning and anticipation, and 32 percent said a lack of knowledge and skills led to their problems. At the same time, one in five pointed to a lack of trust in existing technology as a key limiter to success.


Why innovators make terrible firefighters
Business fire fighting makes for terrible innovation. ... A pressing problem needs to be solved immediately, and the existing operating system needs to be repaired and brought back on line as quickly as possible. In fire fighting, there's no time for research, or reflection, or idea generation. It's get the thing back on line as quickly as possible, with as little disruption as possible. It's perfectly fine to knock down some pre-conceived notions or limitations, just so we can return to status quo as quickly as possible. And don't worry, we'll clean up the debris later.


Tech Industry Leaders Dissect Botched Healthcare.gov Launch
Bourgeois and other panelists advised federal IT leaders to adopt a more iterative development model for future technology projects, as has become commonplace in industry. John Landwehr, vice president of digital government solutions at Adobe, recalled a time when the software vendor worked on a long-term release schedule, like a complete overhaul of Photoshop that could take a year-and-a-half of development or longer.


Narrative Science Applies AI to Suspicious Activity Reports
The first analyzes data and finds facts, such as Company A beat expectations or Company B's long-term debt is larger than any other company in its sector. "Those facts are not enough and they're too much," Hammond says. "You don't want to know everything about everything." The second piece is a module that evaluates the importance and interestingness of the facts. Importance is defined by the domain of interest — if you're looking at the stock market, a company going bankrupt is important. "Interestingness" depends more on the user.


The 4 Key Pillars of Hadoop Performance and Scalability
Open-source Hadoop has emerged as the go-to software solution in tackling Big Data. For organizations looking to adopt a Hadoop distribution, Robert D. Schneider---the author of Hadoop for Dummies---has just released an eBook entitled the Hadoop Buyer’s Guide. In the guide, sponsored by Ubuntu, the author explains the main capabilities that allow the Hadoop platform to perform and scale so well. What follows is a brief overview of these four key pillars of Hadoop performance and scalability.



Quote for the day:

"People will forget what you did, but people will never forget how you made them feel" -- Maya Angelou

November 22, 2013

Box, Dropbox get down to business with new enterprise cloud services
It's the latest area of specific enterprise ecosystem offerings from Box following the release of similar platforms for education, health care and financial, among others. Box's rival, Dropbox, also revamped its Dropbox for Businessto attract greater enterprise use. Features include 1,000 GB of space to start, file recovery and versioning, 256-bit AES encryption, remote wipe, two-step verification and more.


Privacy groups urge UN to adopt digital surveillance resolution
"Indiscriminate mass surveillance, which tramples individuals' right to privacy and undermines the social contract we all have with the State, must come to end immediately," they wrote, adding that if the resolution is adopted this would be the first major statement by the UN on privacy in 25 years. The draft resolution says states should create conditions to prevent such violations and ensure that relevant national legislation complies with their obligations under international human rights law.


10 old-school technology strategies that CIOs should not forget
A host of new and reformed practices have IT departments reinventing themselves ... Nevertheless, the fundamental requirements for quality systems that work right the first time are not going to go away. The rudiments of IT asset protection, disaster recovery, and business continuation also remain. Consequently, many tried and proven “old school” IT practices still make venerable companion strategies for emerging IT trends. Here are ten “old school” technology strategies that CIOs should not forget


Face detection using HTML5, javascript, webrtc, websockets, Jetty and OpenCV
With the webrtc specification it will become easier to create pure HTML/Javascript real-time video/audio related applications where you can access a user's microphone or webcam and share this data with other peers on the internet. For instance you can create video conferencing software that doesn't require a plugin, create a baby monitor using your mobile phone or more easily facilitate webcasts. All using cross-browser features without the use of a single plugin.


The End of Private Cloud – 5 Stages of Loss and Grief
No matter how good you think you are, you’ll never have the resources, skills or need to be as good as Amazon. AWS deploys enough computing capacity every day to run Amazon.com when it was a $7B online retailer. How many servers will you rack and stack today? How many petabytes of storage will you deploy this weekend? How many features did you update this year ... In her seminal work, “On Death and Dying,” Elisabeth K├╝bler-Ross articulated the 5 Stages of Loss and Grief. I think it’s time to look at this for private clouds.


Indian Engg Students Have Almost Zero Skills In InfoSec: Report
A mere 13 per cent of engineering students were found to be trainable in the InfoSec domain with nearly 86 per cent unskilled even on InfoSec basics. Speaking on these findings, Jay Bavisi, President and Co-Founder, EC-Council said, “The world is recognizing vulnerabilities leading to cyber threats and attacks and India holds a key position in the global IT-ITeS map. Every country is taking steps towards building a talent pipeline towards a secured future and we urge the Indian industry and academia to address the concerns to retain their leadership in the domain.”


Taking responsibility for national cybersecurity
During her ISSA keynote, The Right Honorable Baroness Pauline Neville-Jones, U.K. special government representative to business for cybersecurity, outlined the steps already underway between the U.K. government and private sector companies to make this partnership happen. ... "The government needs to form relationships with the private sector because it's the private sector that owns most of the wealth creation in the economy, and they are the operators of the critical national infrastructure," she said.


Lies, damned lies and big data: How firms get analytics wrong – and how to get it right
In companies where internal politicking is rife, people will deliberately bend analytics so the figures back up the course of action they support, warns Srikanth Velamakanni, founder and CEO of Fractal Analytics. Even where there's no bias from vested interests, it's common to find errors caused by poor data or flawed analysis, he said. "If you don't do analytics in the right manner, you can come up with some very wrong conclusions ..." Velamakanni said.


Only half of large companies have strong mobile strategies
"The mobile challenges that organizations are wrestling with are much the like the challenges they saw when dealing with the emerging Internet 15 years ago," said Eric Lesser, an author of the study and a research director at IBM's Institute for Business Value. Only 50% of the organizations surveyed agreed that their mobile strategy is aligned with the overall business strategy.


Health IT Execs Reveal 2014 Technology Priorities
For this annual year-end feature, Health Data Management posed a simple question to CIOs and other executives facing payment reform, dwindling reimbursements and pressure from patients, payers and employers for increased transparency around quality and cost: What I.T. do you need most in the year ahead, and beyond?



Quote for the day:

"Every failure brings with it the seed of an equivalent success." -- Napoleon Hill

November 21, 2013

GitHub bans weak passwords after brute-force attacks
Popular source code repository service GitHub has recently been hit by a brute-force password-guessing attack that successfully compromised some accounts. "We sent an email to users with compromised accounts letting them know what to do," GitHub security engineer Shawn Davenport said in a blog post. "Their passwords have been reset and personal access tokens, OAuth authorizations, and SSH keys have all been revoked."


Communicating Change
Expectations tend to become self-fulfilling prophecies. You need to communicate the expected change your project is creating will be beneficial and good for the majority of the stakeholders. If this message is both true and believed (the two elements are not automatically connected), the experience of the stakeholders is more likely to be positive. Communication often can mean the difference between project success and failure.


Putting the customer first- For real
Insurers face challenges which are in many ways unprecedented: not simply as a result of the crisis, but also in the face of the major changes – the global mega-trends – which are transforming the business and social environment. What will help the winners pull ahead will be genuinely reengineering their business around the customer. However, many insurers have yet to realize the scale of the transformation required. And fewer still are successfully achieving it.


52 Ways To Avoid Giving An Immediate Answer
No one likes being pushed or bullied into making snap decisions. There’s something unnerving about the situation where we’re the demand is “I need an answer, and I need it now!” Of course, if you work as in law enforcement or an emergency room, sometimes immediate decisions are necessary. But most of the time, the imposed urgency is the result of someone else’s poor planning or decisions. ... how do we deal with these “tyrants of urgency”? Here are a few possible responses you might use to buy some time or send


Unlocking SaaS Leadership Skills
A combination of technical skills and business acumen is the minimum expectation organizations have when they try to identify the right person to head a SaaS spinoff. Potential leaders must also be strong communicators and presenters adept at dealing with politics and talking with directors and other stakeholders. They must also be extremely service-oriented in their IT philosophies.


Being Agile: You are Not a Java Developer, You are a Software Engineer
Agile breaks this pattern by working closely together from the beginning of the project. The “end of project” style of coordinated team work in waterfall happens throughout every iteration. This is what makes agile so productive. However, “getting there” can be hard because working where your domain knowledge and skills are the strongest is where you want to work and where you know you will be the most productive.


Evolution of Storage: VM-Aware Storage for Virtualization
Adopting a modular approach to scaling using VMs and virtual disks as the unit for deploying storage is now possible using virtualization functionality such as VMware Storage DRS to load balance across different storage systems. This greatly simplifies how administrators can scale their environment without the complexity of scale-out or scale-up storage solutions. Adding the ability to control and monitor individual storage systems from a centralized administrative interface can further reduce the overhead IT faces with storage.


Hackers reportedly steal 42M customer records from online dating network Cupid Media
Andrew Bolton, Cupid Media's managing director, told Krebs that the information found on the rogue server appears to be related to a security breach that happened in January 2013, which customers had been notified about. Bolton also reportedly said that a large portion of the leaked records correspond to old, inactive or deleted accounts and that the number of active users actually affected by the breach is considerably less than 42 million.


COBOL still not dead yet, taking on the cloud
Conceptually, taking a language that can trace its heritage back into the 1950s onto a modern as-a-service platform may seem like an exercise in futility, but McGill says that it is a transfer that is not as mind-bending as it first sounds. "Believe it or not, it's probably easier to move COBOL into the cloud, than it is to move a C/C++ application into the cloud. It's certainly easier to a COBOL application to the cloud, particularly from a mainframe environment than a client-server, and Microsoft-based client-server [environment]," he says.


Costin Leau on Elasticsearch, BigData and Hadoop
Elasticsearch supports RESTful API using JSON over HTTP for all of its operations, whether it's search, analytics or monitoring. In addition, native clients for different languages like Java, PHP, Perl, Python, and Ruby are available. Elasticsearch is available for use under the Apache 2 license. The first milestone of elasticsearch-hadoop 1.3.M1 was released in early October. InfoQ spoke with Costin Leau from Elasticsearch team about the search and analytics engine and how it integrates with Hadoop and other Big Data technologies.



Quote for the day:

"The secret to success is to start from scratch and keep on scratching" -- Dennis Green

November 20, 2013

Data centers run warmer in China, Hong Kong
According to a survey conducted by energy management vendor Enlogic Systems, over 85 percent of data center administrators in Greater China were comfortable running their site at 25 degrees Celsius (77 degrees Farenheit) and higher. This went against a common belief that lower temperatures were necessary to keep systems cool and running more efficiently, with less risks of downtime.


CIO tip: Learn how to present a risk-management plan to the board
Prima facie, it should be understood that the board does not manage risk, Caldwell said. "The board's role in risk management is to ensure there is an effective risk-management plan in place and that the management of the company is effectively implementing it," he said. "They have an oversight role." Any regulator who comes to meet with board members -- which is happening with increasing frequency in large enterprises, particularly in the financial services industry -- will ask questions targeted at figuring out whether the board is really involved in overseeing the risk-management plan.


How To Use Connectivity To Drive Product Innovation
In the world of product innovation, the buzzword of the day is “connected.” But there’s one place where products have yet to realize the full potential of connectivity: the home. We’re not talking about consumer electronics like phones, computers, tablets, and video games. We’re talking about the humble appliances that make our lives easier and our homes more comfortable, like coffee makers, toasters, and space heaters.


Cyber-Security Training a Top Priority for Industry, Government
Cyber-security professionals continue to enjoy strong demand and low unemployment, especially in the United States. The International Information Security System Certification Consortium, or (ISC)2, predicts that the rolls of U.S. cyber-security professionals will grow by 11 percent each year through 2020. The U.S. Department of Labor estimates the growth to be twice that.


Carriers reject kill switch for stolen smartphones
District Attorney George Gascon said Monday that AT&T Inc., Verizon Wireless, United States Cellular Corp., Sprint Corp. and T-Mobile US Inc. rebuffed Samsung's proposal to preload its phones with Absolute LoJack anti-theft software as a standard feature. The wireless industry says a kill switch isn't the answer because it could allow a hacker to disable someone's phone.


Hackers exploit JBoss vulnerability to compromise servers
Researchers from security firm Imperva have recently detected an increase in attacks against JBoss servers that used Micalizzi's exploit to install the original pwn.jsp shell, but also a more complex Web shell called JspSpy. Over 200 sites running on JBoss servers, including some that belong to governments and universities have been hacked and infected with these Web shell applications, said Barry Shteiman, director of security strategy at Imperva.


Yahoo CEO Mayer talks mobile strategy, design approach
The experience of actually working with the product is just as important as how it looks, Mayer said. "Companies can fall, quite frankly, too in love with design," she said. Mayer related a story about a friend whose startup failed in the dot-com boom. The company's employees wrote post-mortem white papers analyzing why the company had failed. Her friend's was titled, "Usable versus useful," she said.


Customer selects Cloudmeter to conduct Data Forensics
"Using Cloudmeter, I check all my custom conversion variables: the rate of views to a product detail page, the proportion of products being added to the cart from different areas of the site, and all my micro-cart conversions. I quickly see that there were no significant changes on cart additions, but that something seemed to go wrong for many customers on Cart Step 2, where they enter billing information."


What is endpoint security, and how do you shore up the weakest links?
What is endpoint security, and why should today's CIOs be taking note of their organization's weakest links? In this three-part webcast, SearchCIO-Midmarket editorial director Christina Torode speaks with Jack Gold, president and principal analyst at J. Gold Associates LLC, about the importance of mobile security. Here, in part one, Gold examines the various risk points that organizations small and large face.


What’s Next in Software Analytics
Software analytics (SA) brings the notion of business intelligence to the software industry through fact-based decision support systems. Today, SA primarily focuses on helping individual developers with mundane coding and bug-fixing decisions by mining developer-oriented repositories such as version control systems and bug trackers. For instance, we can automatically determine the risk-the "bugginess" - of a code change by mining the actual risk caused by prior changes



Quote for the day:

"Giving people self-confidence is by far the most important thing that I can do. Because then they will act." -- Jack Welch

November 19, 2013

The True Story of a Disrupted Industry, Talent Retained, and Beer Pong
Keith Mueller: We are disrupting one of the oldest professions--bookkeeping--and therefore need to bring new thinking, technology, and processes to help our clients. I believe Silicon Valley has this culture that starts with the questions of what and how can we do things better, faster, and at a lower cost? How we can effect change? That’s the culture we need at BookKeeping Express, and we are developing that here by a constant flow of questions, internal communication, and desire to drive value to our clients. Plus we work hard--so I just feel fun has to be part of the equation.


Exploring LXC Networking
Docker is still very young, though dotCloud, who have apparently pivoted to Docker, have been using it to power their PaaS offering. After playing with Docker for a while I must admit it is awesome. There is no doubt about it. I personally haven’t seen as much excitement about any IT technology in past several years I’ve been in this industry as I’m seeing now surrounding Docker. LXC is the technology which is used by Docker and which has been around for much longer.


Seven ways identity, access management will change in the enterprise
"In the past, efficiency was a key driver [for identity management roll-outs]," said Gregg Kreizman, research vice president at Gartner. "Compliance came along, but business enablement is the Holy Grail." Protected resources in the enterprise aren't where they use to be and the move to the cloud has stressed and fractured identity and access management (IAM) to the point where it needs to be re-architected, according to Gartner.With those observations and others, Gartner laid out the future framed by seven predictions for the way IAM in the future will be unlike IAM now.


Q&A: Design Thinking and Its Role in Industry and Education
The notion of "design thinking" has emerged as a topic of great discussion in recent years among design practitioners, educators across disciplines, and organizations of all kinds. Whether you’re a student, graduate, or seasoned veteran you’ll find value in the following dialogue which explores some of its many interpretations and applications. This interview was conducted by Dianne Hardin, at The University of Cincinnati, as part of her research for the DMI FutureED project. Hardin wanted to get perspectives on design thinking from practitioners responsible for providing it to clients and teaching it to students.


Landscapes in Mobile Application Security
One key requirement for any single sign on scenario is - we should be able to establish direct trust or brokered trust between applications and their users. In most of the cases this is established through IdPs. The first example we took was based on direct trust - while the second is on brokered trust. To accomplish this use case we need to build a trust relationship between all the authorization servers - taking part in - and also a middle man to mediate SSO. This use case is also highlighted in the Native SSO draft specification by OpenID Foundation - but no much details as of now.


Thornton May: Caught between mobility's rock and hard place
A high-potential millennial told the CIO at a big-name pharmaceutical company during her exit interview that she found the work environment toxic. Her main complaint was that the enterprise did not allow use of the modern consumer technologies and applications that she perceives as comprising her personal and professional identity. This is mobility's rock: People want the interface, the ease of use, the "cool" factor, the freedom and the functionality of consumer technology in the workplace.


CSA to create cloud security controls for BYOD
The Cloud Security Alliance (CSA) announced Wednesday the launch of its Software Defined Perimeter (SDP) initiative -- a project tasked with designing a better way to secure personal devices on corporate networks, a trend known as bring your own device (BYOD). The goal of the SDP initiative is to produce a framework of cloud security controls that "mitigates network-based attacks on Internet-accessible applications by eliminating connectivity to them until devices and users are authenticated and authorized," according to a CSA press release.


Cisco suggests new economic metric: Gross Domestic P0wnage
The Index notes the many upsides that flow from technology, asserting that “governments and businesses that embrace the Internet and ICTs recognize it will enhance their long-term competitiveness and societal wellbeing, and potentially contribute up to eight percent of gross domestic product”. But the document says it can find only occasional assessment or quantification of negative economic impacts brought on by technology, citing data on the cost in money and jobs of intellectual property theft.


Building an Advanced Managed Services Practice
With many managed services providers admitting that their technology skills are far deeper than their business acumen, the processes required to create those critical organizational development plans may be quite unfamiliar. The talents essential to build and sustain these IT companies can be quite diverse, so MSPs either have to undergo training to acquire those capabilities or hire new employees with those specific proficiencies. Regardless of the method they adopt, those consistent investments can significantly boost an organization’s chances of achieving numerous goals over time.


Secret TPP agreement, SOPA on steroids, may be the end of the Internet as we know it
The EFF warned that “the TPP would let corporations monitor our online activities, cut off our Internet access, delete content and impose fines.” It gives “legal teeth to Digital Rights Management (DRM) tools” and “calls for criminal liability for violations of these anti-circumvention provisions.” In fact, “this criminal liability could apply to people circumventing these restrictions even where the underlying work is not covered by copyright.”



Quote for the day:

"A good test of a platform’s importance is to find out what happens if the platform shuts down for 5 minutes – how much panic and revenue drop does that create in various parts of the world? Another measure of the platform is the value it creates by launching new companies and ideas." -- Chetan Sharma, Chetan Sharma Consulting

November 18, 2013

Is DaaS the Next Step to Simplifying Enterprise IT?
"As we centralise end-user computing environment in data centres and make it accessible to end-users over a private cloud, we are actually paving the way for adoption of desktop as a service to end users,” emphasises Handa. Handa reiterates that fact that several IT services organisations are focusing on this domain of provisioning and supporting desktops as a service by assuring Application Delivery as a Service (AdaaS) model on a variety of end-user devices.


25 tips and tools to make Google Drive better
Google Drive is a lot of things. It's a cloud-based storage service, it's an online office suite, and it's the connective tissue that ties numerous Google services together. Don't be fooled, though, there's even more to Drive than meets the eye. With the right combination of tools, settings and know-how, you can turn Drive into a lean, mean, productivity machine -- one that's jam-packed with time-saving functionality and fine-tuned to work for you. Here are 25 ways to crank up the power and send Google Drive into overdrive.


Australian media companies survive digital threat, says Brightcove chief David Mendels
Australian media companies are becoming one of the world’s fast adapters of video services in response to digital disruption, says the chief executive of Brightcove, David Mendels. ... “We’ve got years of video being the most powerful communication medium for humans,” he says. “Everyone understands the power of video to tell a story is clear, and the opportunity is clear. People now expect news and entertainment content to be available on devices any time and anywhere, and companies to directly control engagement through the digital world.”


Free eBook with SQL Server performance tips and nuggets
The 45 Database Performance Tips eBook covers different tips to help you avoid code that saps performance, whether that’s the ‘gotchas’ to be aware of when using Object to Relational Mapping (ORM) tools, or what to be aware of for indexes, database design, and T-SQL. The eBook is also available to download with SQL Prompt from Red Gate. We often hear that it’s the productivity-boosting side of SQL Prompt that makes it useful for everyday coding.


How to Mobilize Your C-Suite for Big Data Analytics
The often-transformative nature of that change places serious demands on the top team. There’s no substitute for experienced hands who can apply institutional knowledge, navigate organizational hazards, make tough trade-offs, provide authority when decision rights conflict, and signal that the leadership is committed to a new analytics culture. In our experience, the concerted action that’s required falls into six categories. Leaders should take full measure of them before assigning responsibilities or creating roles.


Stratus asks if continuous availability possible in the cloud?
Some customers were hurt because they didn't consider where and how their workloads would failover to use other resources when a failure occurs. The key point LeClair wanted to get across is that customers should really thinking about the business requirements for each of their cloud workloads and where redundant hardware and software must be deployed to address potential outages.


IBM and Amazon are battling for an 'explosive' fed cloud market
"Agencies are moving much more aggressively to the cloud," said Alex Rossino, principal research analyst at Deltek, who called 2013 "the tipping point." He expects many agencies to use cloud-based infrastructure services, in particular. ... IBM this week said it had received a federal key security certification for its cloud offerings, the Federal Risk and Authorization Management Program, better known as FedRAMP. Amazon has also achieved that designation.


Nobody’s in an ivory tower, and let’s figure this out together. Often in meetings, I will ask people when we’re discussing an idea, “What did the dissenter say?” The first time you do that, somebody might say, “Well, everybody’s on board.” Then I’ll say, “Well, you guys aren’t listening very well, because there’s always another point of view somewhere and you need to go back and find out what the dissenting point of view is.”


CISOs Need to Keep a Vigilant Eye on Eight Security Predictions in 2014
“Bypassing traditional defenses was raised to an art form by cybercriminals in 2013," said Charles Renert, vice president of security research for Websense. "In 2014, cyberattacks will be even more complex and diverse. While the general volume of advanced malware will decrease—we predict the volume of targeted attacks and data destruction incidents will increase. Organizations must up their security game as attackers continue to seek new ways to penetrate traditional defenses at every stage of the threat lifecycle."


SATA Express marries PCI-e, SATA for faster direct-attached storage
The SATA Express specification now recognizes PCI-e as a suitable storage interface for fast storage devices. Conventional drives will continue to use the server's standard SAS and SATA interface operated through the motherboard's South Bridge chip, while new, fast disk drives like SSD use SATA Express through the PCI-e interface. While this new option helps meet the performance and capacity demands of varied workloads, servers will need SATA Express capabilities and SFF-8639 multifunctional connectors to take advantage.



Quote for the day:

"The real leader has no need to lead - he is content to point the way." -- Henry Miller