November 08, 2013

A macro-pattern for public sector systems architecture
The pattern is able to serve shared business and technical services to a set of cooperating agencies or departments that already run the same category of services locally. This is increasingly important in public sector and a growing body of thinking emphasizes shared services. Examples are the FICAM (Federal Identity Credentialing and Access Management) standard, which uses SAML2 to federate across different department websites and determines how users are identified and authenticated for online services;


Facebook goes open source with query engine for big data
Standard data warehouses would be hard-pressed to offer the responsiveness of Presto given the amount of data Facebook collects, according to engineers at the company. Facebook's data warehouse has over 300 petabytes worth of material from its users, stored on Hadoop clusters. Presto interacts with this data through interactive analysis, as well as through machine-learning algorithms and standard batch processing.


CIOs Bullish on Cloud Benefits, But Worry About SaaS Data Silos
“Attitudes about using the cloud for business benefits are largely positive. Their biggest worry is the need to integrate their data between their different apps. SaaS solutions are just so easy to bring in, companies worry they might be creating silos of data,” Host Analytics’ CIO, Richard Broome, told IDN. The survey quantifies these concerns by noting areas where respondents said SaaS and other cloud solutions can be improved, according to Dimensional's senior research analyst and study author Diane Hagglund.


Looking Critically at the “Big Data” Revolution: Deloitte Consultants Weigh In
Biel said that “It’s interesting to see it happen,” he said. “Some of it is regulatory-driven, with the accountable care push happening. We see a lot of providers getting into accountable care,” he noted. “And we’re certainly seeing a large number of payers buying up providers, so they’ll have a certain amount of a captive audience, if you will, and from a data perspective, that’s driving the need to pull together financial and clinical data, so that you can really examine a cohort of a population and get to analytics that are meaningful.”


The Many Rooms of the Business Analytics Mansion
Business schools tend to divide their curriculum between hard quantitative-oriented courses, such as operations management and finance, and soft behavioral courses, such as change management, ethics and leadership. The former relies on a run-it-by-the-numbers management approach. The latter recognizes that people and human behavior play a substantial role. This separation of the curriculum is like the rooms in a palatial mansion.


Nasty new malware locks your files forever, unless you pay ransom
“It systematically hunts down every one of your personal files – documents, databases, spreadsheets, photos, videos and music collections – and encrypts them with military-grade encryption and only the crooks can open it,” said Chester Wisniewski, a senior security advisor at Sophos. Even though it’s infected, your computer keeps working normally; you just can’t access any of your personal files. It’s scary, especially if you haven’t backed-up your data.


Understanding servers' Power-On Self-Test codes
The first few steps of a POST are critical. The POST finishes initializing the first CPU and processor cache and then performs a basic initialization of the core chipset. This includes the Northbridge chip handling CPU and memory, and the Southbridge chip for interfaces like Serial Advanced Technology Advancement (SATA) for storage and PCI Express(PCIe) for external devices.


Preventing vs. Responding to Computer Fraud
It's no secret that the increase in information technology has facilitated the perpetration of fraud in organizations. Companies who are most vulnerable include those who do not know how to identify IT-related fraud, do not have policies to prevent such fraud and do not have policies to prevent management override opportunities within financial related systems. If fraud does occur, these organizations may not have an appropriate plan in place to respond.


Security expert seeks to make surveillance costly again
"Fundamentally, this is a debate about data sharing, about surveillance as a business model, about the dichotomy of the societal benefits of big data versus the individual risks of personal data," Schneier told attendees of the Usenix LISA (Large Installation System Administration Conference), being held in Washington this week. "We might not buy [it], but the basic NSA argument is 'You must give us your data because it is keeping you safe.'"


Integrators jump on Cloudera's big data bandwagon
"Together with Cloudera, we help organizations optimize their current technology investments, exploit massive data volumes and new data types, achieving true insight and forward vision to improve operational efficiency," said Scott Schlesinger, senior vice president of Business Information Management, North America, for Cap Gemini. Specifically, Cloudera will be part of Cap Gemini's Big Data Service Center, responsible for designing, delivering and supporting Big Data solutions.



Quote for the day:

"To have long term success as a coach or in any position of leadership, you have to be obsessed in some way." -- Pat Riley

No comments:

Post a Comment