January 21, 2014

University lecturer reports bad news about your information governance program
The sad truth is that most information governance initiatives either fail or fall short. But there are some steps that companies can take to help increase the chances of success, according to Richard J. Self, a senior lecturer in informatics and business and information governance at the University of Derby in the U.K. SearchDataManagement caught up with Self in between sessions at the IBM Information on Demand conference. Self explained that achieving success with an information governance program means first getting buy-in from senior executives.


TempleOS: an educational tool for programming experiments
It's simple to understand, manipulate, and work within. In essence, it's an educational tool for programming experiments. Drawing a line onscreen in TempleOS and on the Commodore 64 is about as equally complex for the end user. It's barebones by design -- you have direct access to the hardware, and you can do what you like with it, within the limitations of the hardware. This is a laudable goal, and one solution to the complexity of programming modern computers that programmers, hardware designers, and educators are seeking to solve.


Automated penetration testing in the Microsoft stack with OWASP ZAP
"The OWASP Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.  It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing as well as being a useful addition to an experienced pen testers toolbox."


Author Q&A: Patterns of Information Management
An “Information Centric Organization” drives its business on high quality and timely information that is aligned to its mission and goals. We have entered an era where information is now a key competitive resource, and those organizations focused on what they can do and learn with the information they have at hand are finding far greater success than those who do not have this focus. By making the management of information a strategic priority, and by developing systems and practices that nurture and exploit information to maximum effect, an “Information Centric Organization” can exploit analytics to spot new revenue opportunities, drive product innovation, identify patterns to reduce fraud, and mitigate risk.


The Big Data Edge for Hedge Funds
There are three major trends when it comes to big data. The first remains just information gathering. There’s a ton of information that is generated by everyone and basically everything is now tradable. There’s tradable news; there is information provided by Bloomberg, Reuters, and Dow Jones; and there are news feeds. There’s also the internet that is like a data mine of information -- there’s unlimited numbers of stuff. The number one trend is really to synthesize and gain an edge by having some custom understanding of how the news is incorporated into the market and be the first to synthesize the news from the global universe of news.


Enterprises facing shortage of cybersecurity experts: Cisco
According to the networking solutions major, overall vulnerability and threat levels reached their highest in 2013, ever since it began tracking in May 2000. Its 2014 Annual Security Report (ASR) reveals that 2013 was a "particularly bad year", with cumulative annual threat alert levels increasing by 14% since 2012. Organisations in India are also witnessing a huge growth in cyberattacks and intrusions and the country faces shortage of about 4 lakh trained cybersecurity professionals.


Appetite for disruption: Can Simple and the web reinvent banking?
The advent of Simple's ideology came from the idea that large banks have a revenue model that relies on customer confusion about hidden fees and money management. They decided to do away with fees and provide a solid customer service team to help make things as clear as possible for customers. Co-founder and CFO, Shamir Karkal, said the mission of Simple is, "to provide a banking experience to customers that helps them spend smarter and save more." So, how can Simple hope to compete in a land of giants?


Data Management Maturity Model points way to best practices
The DMM is being developed by the Enterprise Data Management Council, a group founded by financial services firms, to provide a way for organizations to assess where their data management programs stand on a five-level scale. The EDM council released an initial version of the model to its members in June 2012; updates have been made this year, and the group expects to release the DMM publicly in 2014 along with a self-assessment spreadsheet.


Pre-fabrication: A New Way of Architecting Data Centers
With business success relying heavily on an organization’s ability to connect with customers and provide services, data center downtime can not only be detrimental to an organization’s reputation, but can strain customer relationships and incur costs upwards of tens of thousands or millions of dollars. To avoid these problems, data center and facility managers should consider a recent innovation helping to mitigate these difficulties: pre-fabricated architecture. In contrast to traditional construction where components are installed separately onsite, pre-fabricated infrastructure is a pre-engineered, factory-integrated and pre-tested system of power, cooling and IT modules mounted on a skid or in an enclosure.


Risk and responsibility in a hyperconnected world: Implications for enterprises
There are multiple scenarios for how the cybersecurity environment could evolve over the next five to seven years. However, if attackers continue to get better more quickly than defenders, this could result in a world where a “cyberbacklash” decelerates digitization. In this scenario, a relatively small number of destructive attacks reduces trust in the economy, causing governments to impose new regulations and institutions to slow down the pace of technology innovation.



Quote for the day:

“You have to dig a well before you can draw water from it.” -- Richie Norton

No comments:

Post a Comment