February 10, 2014

This smartphone will self-destruct in 5 seconds
DARPA said on its website that it's looking for devices, such as sensors, radios and phones, that work as well as off-the-shelf commercial options but can be remotely triggered to break apart. IBM has been tasked with developing materials, components and manufacturing capabilities. The company, according to DARPA, is working on a "strained glass substrate" that will shatter. A trigger, such as a fuse, will be used in at least one, if not multiple, areas on the device.


Shouldn't there be a better way to curate global threat intelligence?
Curating threat intelligence has become one of the hottest topics in security. Gathering information regarding the threat landscape isn't a new concept, but determining what actually constitutes threat intelligence is still fuzzy, and its current buzzword status in the industry isn't helping. Indeed, vendor marketing teams use the term liberally when promoting their products, replacing the "next-gen" hype with this new version of security secret sauce.


Black Day at I/O Gulch
Not long ago, a crack team of SQL Server experts was flamed for a crime against database normalization they didn't commit. These men promptly escaped from the taunts of academic relational theorists. Today, they survive as Website editors and software evangelists. If you have a problem, if no one else can help, and if you can find them, maybe you can hire the DBA-Team.


The Principles of Effective Risk Management
Enterprise Risk Management is one of the core domain of Governance. In some business sectors, the success depends on an intelligent and effective risk management principles, framework and practices. The advancement in technology, like big data and analytics also plays a key role in making the risk management effective and adding value to the business. Other factors that necessitate a well architected ERM in an organization include, regulatory & compliance needs, security and privacy expectations, disasters and business continuity needs, etc.


To Succeed with Big Data, Begin with the Decision in Mind
BWTDIM means identifying the decisions that matter to your organization, the decisions that make the difference between hitting your targets and missing them, the decisions that “move the dial.” These decisions may be strategic or tactical decisions but are also often operational, day-to-day decisions that must be made at the front lines of your organization like the call center, the branch or the warehouse. BWTDIM means understanding how you must make these decisions, and how you might make those decisions to more effectively hit those objectives.


Why Open Government Data Makes Sense for India
Open Data Platform set up by NIC can be accessed at data.gov.in. This platform enables all government departments to contribute their datasets in open format. Thus, datasets are contributed are processed through a predefined workflow system for approval for publishing on the data portal. Citizens can access open data platform to browse, and search for the data that is relevant to their needs and can also download the datasets. Not only citizens, civil society, academia, research organizations, journalists and many others who need data for variety of purposes are the potential users of this platform.


Automakers push envelope on wearables, augmented reality despite regulatory concern
Another key area of focus for automakers going forward is creating unique augmented reality applications for use both inside and outside the car. “With wearables, that is another way of adding even more relevant user interface,” said Dominique Bonte, London-based vice president and practice director at ABI Research. “This is a way for the auto industry to bring advanced interfaces into the vehicle and bring more entertainment services into a vehicle in a non distractive way.


New network architectures and traditional components: Why both are key
To clients with questions about where to invest in their core networks, Chandler said he ultimately advises them to sit tight. "I believe we are looking at two things right now," he said. "The initial push was development of southbound APIs, so there was a lot of talk about OpenFlow and vendor-specific APIs. Now I think the second shift is over the programmatic access to the network, and now we don't care so much how we talk on the southbound API from the controller. There is much more interest in the controller and the applications the controller can run."


Maintaining PCI Compliance is a Big Challenge for Most Companies
The problem has to do with a tendency by many companies to treat PCI compliance as an annual end goal rather than treating it as part of a continuous risk management effort. "Too many companies still look at PCI as pure compliance and don't use it to mitigate risk," Simonetti said. "Often, compliance is managed as a project -- particularly as the build phase of a project." Once compliance is achieved, many companies simply stop paying attention, he said. "It is really a failure to use compliance standards and tools and a day to day basis," Simonetti said.


The Secrets of Database Change Deployment Automation
Dealing with database deployments is tricky; unlike other software components and code or compiled code, a database is not a collection of files. It is not something you can just copy from your development to testing and to production because the database is a container of our most valued asset – the business data, which must be preserved. It holds all application content, customer transactions, etc. In order to promote database changes, a transition code needs to be developed - scripts to handle database schema structure, database code, and content used by the application.



Quote for the day:

"Time is our most valuable asset, yet we tend to waste it, kill it, and spend it rather than invest it." -- Jim Rohn