February 16, 2014

NIST Framework Released to Widespread Praise, But What Happens Next?
The framework was widely praised at a high-profile release event in Washington, preceded by a statement from President Obama. The framework "is a great example of how the private sector and government can, and should, work together to meet this shared challenge," Obama said, adding that much more work needs to be done on cybersecurity, particularly the need for Congress to pass legislation that provides greater legal protection to spur greater cybersecurity information sharing.


The Case Against Wearables, Or Why We Won't All Look Like The Borg This Year
The problem: The hype is years ahead of the market. Big and unresolved questions remain about pricing (too high), battery life (too short), utility (too limited), looks (too ugly) and privacy (too scary). “We’re a ways away from the Borgification of the consumer,” says Bill Briggs, chief technology officer of Deloitte Consulting, which is predicting that 10 million wearable devices will be sold this year in a market valued at about $3 billion. (Compare that with 1 billion smartphones sold in 2013.) “We’re going to need to see new categories emerge and existing categories evolve.”


World’s Deadliest DDoS Attack Against A Company Which Was Fighting It
The new attack used the NTP reflection technique, involving the sending requests with spoofed source IP addresses to NTP servers with the intention of forcing those servers to return large responses to the spoofed addresses instead of those of the real senders. ... CloudFlare wrote in the blogpost that this had two effects: the actual source of the attack is hidden and is very hard to trace, and, if many Internet servers are used, an attack can consist of an overwhelming number of packets hitting a victim from all over the world.


New Data Center Design Drives Efficiency Gains for Dupont Fabros
“We recognize that in this industry, things change and evolve,” said Scott Davis, Senior Vice President of Operations for DuPont Fabros Technology (DFT). “We sat down with the design group and looked at the trends (n data center design). We took all those trends and came up with goals. The end result is (a data center that’s ) cheaper to build, requires lower maintenance, and has an industry leading PUE. We never save at the cost of reliability or resiliency.” The company expects annualized Power Usage Efficiency (PUE) UE to be below 1.14 at 75 percent capacity, and below 1.13 at 100 percent utilization.


Innovation is Inspiration: Lead in your Surroundings
Think “Smaller.” Not every innovation will produce a world of change today. A happy life, a well-done project, or a successful business is just the sum of their parts. Break down any problem into workable smaller parts. Take some simple action to quantify or identify just one part of a problem or activity, no matter how small or seemingly unimportant, and innovate a small change to that portion. You will see–it will move the process forward.


DataKind: Data Science for the Common Good
DataKind’s goal is to connect expert data scientists with social change organizations who are seeking to better manage, visualize and understand their data. Porway was most recently the data scientist in the New York Times R&D lab and remains an active member of the data science community. Scott Laningham, IBM Digital Journalist, spoke with him at the IBM Information on Demand 2013 conference in Las Vegas.


Modern Enterprise Performance Analysis Antipatterns
The specific examples that led to the distillates below are drawn from the Java ecosystem, but similar remarks apply to many other types of enterprise system. Each basic cause corresponds to some common cognitive bias. For example, Boredom andResume Padding both stem from a desire to escape the existing tech that a developer uses in his or her day job, and their aspirational desire for a better tomorrow. The antipatterns are presented below, in a style and format that should be reminiscent of the Gang of Four, as well, of course, as the antipattern format pioneered by Brown et al.


Secure Networks: How To Develop An Information Security Policy
While security methods provide protection for access and infrastructure, these methods should be the result of a carefully defined security policy. An effective security policy integrates well-known protection methods into a network in a way that meets both security standards and the goals of the entity being secured. An information security policy builds the foundation for a secure network, but it must be seen as valuable to an entity.


Australian standard published for IT governance
“The standard has been prepared to set out how significant IT projects can benefit through the use of appropriate governance frameworks and principles,” said Bronwyn Evans, Chief Executive Officer, Standards Australia, in a statement (PDF). “As the world we live in continues to change rapidly, organisations need to consider how they can deliver effectively today, while investing in technology for the future.” Evans said guiding successful projects, driving change within organisations, and achieving desired business outcomes, requires clear engagement between governing bodies and their senior executive.


Ramp Up Your IT Governance Model for IoT
Effective IT governance help converting the enterprise goals to IT goals and selection of appropriate enablers like policies, frameworks, organization structure, services, infrastructure etc. It will also help in selecting the rights processes that help in achieving the IT goals thereby helping achieving the enterprise goals and meeting governance objectives of meeting stakeholders needs and expectations.



Quote for the day:

"The best strategy for building a competitive organization is to help individuals become more of who they are." -- Marcus Buckingham

No comments:

Post a Comment