January 30, 2014

The real measure of Agile success
Another factor spreading Agile practices beyond software development is the movement of millennial generation employees into the work place, said Diana Larsen, a partner at Agile consultancy FutureWorks, in Portland, OR. "They are a lot more comfortable working collaboratively." As a result, many Agile practices come naturally to them. "They want to check in on a daily basis and get feedback early," she said.


Mass e-surveillance project set for launch
The Centre’s highly advanced telecom and Internet surveillance project — the Central Monitoring System (CMS) — is in its final stage of deployment. Yet, there has been no word on the legal and procedural framework under which the country’s security agencies can track phone calls, voice over Internet protocol (VoIP) and e-mails in real time. In seven of the 11 states covered in the first phase, the Centre for Development of Telematics (C-DoT) — a government agency — has already installed the equipment for this massive snooping programme


IBM's suggestions for mid-market cloud security
Since cloud computing is based upon today's complex IT infrastructure it would be very wise to make sure company business and IT decision makers are speaking with one voice and thinking with one mindbefore contracts are signed and the company begins using a cloud computing solution. Decision makers who don't understand this technology should not be making purchasing and implementation decisions without the help of those who do.


IT services firm ITC Infotech on data analytics in retail
One of the biggest challenges that retailers will face in 2014 is the fear of losing their customers, as well as winning new ones, in a very competitive business environment. To address these challenges more and more companies will make aggressive investments in technology to gather intelligence about the buying trends and experiences of their customers. The most exciting area of growth is expected to be the use of data analytics as companies try to understand real time consumer buying patterns and behaviours.


Cyber security quest strong in UK, says Isaca
“It has provided an opportunity for information security professionals to engage with their organisations about the implications of data leaks and how to do proper risk assessments,” he said. It has also raised fresh questions about what the role of chief information security officers (CISOs) should entail, where they should sit in an organisation, and how they should be relevant to an organisation. “One of the interesting things that some UK organisations are already doing is ensuring that the CISO role is not just a senior role, but moving forward from being reactive to being proactive,” said Stroud.


Sync Your Files without Trusting the Cloud
Klinker says Bittorrent Sync shows how popular applications of the Internet can be designed in a way that gives people control of their own data, despite prevailing trends. “Pick any app on the Web today, it could be Twitter, e-mail, search, and it has been developed in a very centralized way—those businesses are built around centralizing information on their servers,” he says. “I’m trying to put more power in the hands of the end user and less in the hands of these companies and other centralizing authorities.”


Data Governance: A Critical Starting Point in Addressing the Challenges of UDI Compliance
Data governance provides a structured approach to managing changes to core, shared business data. Without a governance program in place, the organization runs the risk that the changes initiated during the course of UDI compliance will negatively impact the quality, accuracy, usability or availability of the data used by the rest of the organization. Conversely, a solid governance program can facilitate the data, process and application changes needed to comply with unique device identification. It can also accelerate an existing UDI initiative.


Flash your way to better VMware performance
By consolidating server-side flash into a single shared flash cluster, PernixData FVP leverages many small flash investments into a large I/O improvement. Installation is quick and easy, and it doesn't even require a reboot of the hosts. PernixData FVP comes in SMB and Standard versions. The SMB version is $9,999 for up to four hosts and 100 VMs. The standard edition is $7,500 per host with no restrictions on the number of hosts or virtual machines.


Storage Innovations Bring Unparalleled Capacity Opportunities
Most recently, hard drive manufacturers have turned to helium to help continue to improve storage economics. Until recently, hard drives all had regular, everyday air inside the enclosure. Today, some hard drives are actually filled with helium, which is much lighter than air. As a result, as the disk spins and the heads are dragged through the enclosure, there is much less drag, which can mean better performance.


Software process: Guiding principles in a perfect world
Wilson offered his thoughts on the role of testers in a DevOps-oriented organization. But what emerged from our discussion was a broader, big-picture view of how the software development process should work—or could work if organizations were willing to rethink it and make needed changes. Here are my guiding principles for improving the software development process in 2014, based on ideas shared by Compuware's Wilson.



Quote for the day:

"What gets measured gets done. If you don't measure morale, you wind up taking it for granted." -- Jack Stack