January 11, 2014

Watch out for these 10 common pitfalls of experienced Java developers & architects
There is a ton of information on how to get a wide perspective on a large enterprise project: scaling your architecture, message busses, database interconnections, UML diagrams and other high-level stuff is well documented. But what about those of us who are just experienced, professional Java developers? This area is lacking coverage, and programming advice for the senior developer, team leader or the junior architect is hard to find.


Intel Has Its Eyes Fixed on Networking
You know Intel’s long history of supplying the main chips that run personal computers and servers. And you probably know that it supplies some chips for mobile phones and tablets, though not quite as many. But did you know that Intel is also getting into the business of supplying chips for networking gear? The way the chip giant sees it, there’s a $16 billion business of supplying processors for gear that moves data, whether it’s in a corporate data center or on a telco carrier’s network — or anywhere in between. And it reckons that it already has about a five percent share of that business.


How to Cultivate Senior Management Skills
Edward T. Reilly, chief executive officer of American Management Association International, assembled a book for new and experienced leaders titled AMA Business Boot Camp. Let me share with you some of the helpful advice to be found in the book. Here are some “Action Items” assembled to help managers cultivate senior management skills, like:


No Brain Drain in Bulgaria as IT Experts Stay Put
Kiril Karaatanasov is typical of the experienced developers and their success. He owns a house and a flat, and is about to buy his third property, something unthinkable among his foreign contacts. “A friend of mine in Silicon Valley can hardly afford to pay the rent for a house smaller than my flat,” Karaatanasov says. “Silicon Valley is better than most of the older EU countries and most of my German friends and French friends move there for money.”


The 7 best habits of effective security pros
The role of the security professional has evolved beyond that of mere technical savvy, and now includes consultant, educator, investigator, and defender of the data. To understand the traits and habits that matter the most, we reached out to a number of security professionals by phone, email, and social media, who are successful in their respective areas in the field. If there's one thing that screamed out from the interviews it was this: security knowledge alone is only the beginning of the skills and habits one needs to succeed.


Big Data Strategy: s+b’s Strategy of the Year
Big data strategy is the latest example of how a particular something-strategy can suddenly win rapt attention on the runways of corporate fashion. Businesses are drowning in an explosion of data unleashed by the convergence of low-cost, high-volume computing; ubiquitous wireless telecommunication; and the Internet’s continued penetration into more and more aspects of our daily lives.


IBM’s Watson to Help Rich DBS Clients With ‘Jeopardy’ Smarts
The Singapore-based bank plans to begin using the tool, which can answer questions in conversational language and learn from responses, to aid financial planners in guiding its wealth-management unit’s affluent customers, IBM said today. Watson will analyze large volumes of financial data to help DBS, Southeast Asia’s largest lender, offer more customized service. The agreement gives IBM a proving ground as it tries to show clients the value of its Watson technology.


Just Say No to Tech Purchases That Won’t Yield ROI
Paying for that new computer, software, mobile device, or peripheral is only the first expense you’ll incur with most technologies. Smartphones have voice and data plans. Laser printers tend to eat up expensive ink and toner. And pretty much everything you buy for your employees needs tech support. That support could be as simple as having your resident geek run a virus scan or as complicated as bringing in a technician to troubleshoot your network.


The Sustainability Agenda in Kanban
Kanban is the humane, start with what you do now approach to change. That humane side is captured in a system of nine values. These explain the motivations of the method and they provide a helpful starting point for exploring how it actually works. Each value identifies a goal of one or more of Kanban’s principles or practices and suggests some of the benefits to be derived from following them. Conversely, they suggest that the pursuit of those goals and benefits may be well served by the adoption of their respective method elements.


Beyond Piracy: Software Publishers Battle Greater Threats to Their Intellectual Property
In today’s market, it’s essential for software publishers to solidify their competitive advantage by securing their innovative and unique products against reverse-engineering, which can lead to duplication by competitors looking to fast-track their development efforts and time to market with a competitive alternative. With competitive espionage becoming more and more common, valuable software IP containing code, algorithms, application data files and trade secrets is at risk of prying eyes, reverse engineering, theft, and copycatting by competitors.



Quote for the day:

"Be careful the environment you choose for it will shape you;be careful the friends you choose for you will become like them" -- W. Clement