January 04, 2014

Agile development practices: Three predictions for 2014
It's no secret that Agile development practices have taken the software industry by storm.Application lifecycle management, or ALM, vendors continue to come out with products and tools that help development teams embrace collaboration and continuously improve. Looking to 2014, I predict Agile will mature in three primary ways: More "custom" Agile processes; Growth of large-scale Agile; and Continued growth of DevOps


Human Technology Interfaces - What The Future Has In Store
Gadgets like Brain Link are already in the market, which coupled with related applications on smartphones gives beneficial gaming experience like attention training, meditation, neuro-social gaming, research and knowledge about brain. Most of us would have watched the movies 'Surrogates' wherein humans would stay indoors while their surrogates would go out to work and 'Minority Report' where the police and justice department would get alerts the moment some one think of committing a crime.


This Credit Card Startup Has A Way To Thwart Target-Style Hacking
“The root cause of fraud is the exposure of this information,” says William Gomez Jr., the co-founder and CEO. “The Epic One card does not hold any details of any credit cards. Neither does the Epic One application that runs on your smartphone. None of these devices hold any of your credit card information. The Epic One card grants you temporary access to your cloud wallet that is stored within Epic One’s back-end systems.”


Five Data Mining Techniques That Help Create Business Value
When developing your big data strategy it is important to have a clear understanding of what data mining is and how it can help you. The term data mining first appeared in the 1990s while before that, statisticians used the terms “Data Fishing” or “Data Dredging” to refer to analysing data without an a-priori hypothesis. The most important objective of any data mining process is to find useful information that is easily understood in large data sets. There are a few important classes of tasks that are involved with data mining:


17 exploits the NSA uses to hack PCs, routers and servers for surveillance
Some of the exploits are deployed remotely and others are physically installed. Those hands-on operations may occur while the product is being shipped; it could be snagged during shipping so an obscure group like an FBI black bag team can do the NSA’s domestic dirty work. There are too many exploits listed in the leak to cover in one post, but I thought you might like to know about some that target servers, routers and PCs.


Software requirements: Why the term 'nonfunctional requirements' misleads
You don't just need a bunch of usability. Usability is not nonfunctional. Usability is only relevant with respect to functionality. Moreover, usability requirements frequently differ from one function/use to another, and the differences are defined in terms of relevant characteristics, not some sizing unit as the single-entry-per-type approach implies. Consequently, when gathering data to discover requirements, inquiries about various functions each need also to address applicable nonfunctional characteristics, of which there may be many.


What to expect of Internet of Things in 2014
“Right now, if you think about it, the Internet of Things in your household will probably require you to go and re-purchase many devices that you have today, and I’m not sure how many of us can take that hit in one calendar year,” Robert Stroud, a member of ISACA’s Strategic Advisory council and vice president of innovation and strategy at CA Technologies, says. “I actually think it might apply more in commercial ventures first.”


Durandal: Quick Start
With RequireJS as its base and a thin layer of conventions, Durandal can provide amazing productivity while helping you to maintain SOLID coding practices. Pair that with out-of-the-box support for rich UI composition, modal dialogs, eventing/messaging, widgets, transitions, routing and more....and there's no doubt you'll be able to build whatever apps you can imagine. While Durandal has only been publicly available for about a year now, the community has grown at a breakneck pace.


3 Key Risk Management Trends for 2014
In a recent interaction with a leading banking and financial services organization, MetricStream (my employer) discussed how risk and compliance scores were being used to drive vendor negotiations when renewals arose. At another institution, risk and governance metrics directly impact the performance-linked financial incentives taken home by the management circle. This shift toward leveraging risk metrics as it pertains to performance metrics and business critical processes has elevated risk intelligence from a nice piece to a "must have."


Enterprise Architecture: Getting Organized For The New Year
“The architecture describes primarily the current system/enterprise,” Grigoriu writes. “It may also describe the target system/enterprise in order to visualise its end state. The architecture is employed in the process of enterprise transformation to ensure that projects are aligned in an enterprise-wide portfolio covering all enterprise entities, the business and technology issues and their dependencies.” What a concept – knowing how changing a system will affect other parts of the system before it happens. In this regard, EA is the antithesis of spaghetti – whether it’s spaghetti code, spaghetti cabling, or something else.



Quote for the day:

"The only way to discover the limits of the possible is to venture a little past them … into the impossible." -- Arthur C. Clarke