February 17, 2014

App delivery techniques: Virtualization and Web-based apps
Browsers are also delivering more native-like capabilities within their interfaces. In the iOS version of Safari, for example, you can make interface elements disappear as you scroll through the page content. But Web-based apps still pose many hurdles for IT. For instance, whenever application-state data -- the data stored in memory during a session -- must be updated, a screen refresh is required. If the user's connection is less than optimal, this refresh can affect performance.


Collect Your SQL Server Auditing and Troubleshooting Information Automatically
The idea is that since we do not know how often the default trace files are changing for each server, and since the files have a maximum size of 20Mb each (but they may be much smaller), it is actually more efficient to import them and merge them than to write custom logic to check which file was imported and which has not. (The performance overhead of importing 20Mb trace files and using the MERGE script is minimal. I performed a test by populating 1 million rows in each table by using Redgate’s Data Generator and even in such case the import was fast.)


Update: Third of Internet Explorer users at risk from attacks
The extension of the vulnerability to IE9 followed confirmation earlier yesterday that active attacks are compromising the newer IE10 and hijacking PCs running the browser. "Microsoft is aware of limited, targeted attacks against Internet Explorer 10. Our initial investigation has revealed that Internet Explorer 9 and Internet Explorer 10 are affected," a Microsoft spokesperson said via email today. With both IE9 and IE10 vulnerable, it means that about a third of all those using Internet Explorer are at risk.


Report: EU to push to reduce US role in Internet governance
The European policy paper seems to reject a U.N. takeover of Internet governance functions, by rejecting calls for a new international legal regime. The paper calls for a multistakeholder process that ICANN trumpets as its current model. An ICANN spokesman didn't have an immediate comment on the proposal. "The Internet should remain a single, open, free, unfragmented network of networks, subject to the same laws and norms that apply in other areas of our day-to-day lives," the E.U. document said, according to the Journal.


An Introduction to UX Design
UX is considered a discipline these days, which incorporates many aspects and will always include good UI design. The problem that many have wrapping their heads around UX is that there is a lot of conflicting information online and even many designers will give you a different definition than their peer might. It’s a little ‘fractured’ as a discipline because of this and simply because at its heart, UX incorporates a lot of ideas, research and theory, as well as practical application in the real world.


Linux Deepin is a fringe Linux distribution that could steal your heart
With a new desktop (DDE – Deepin Desktop Environment), Linux Deepin takes nods from nearly every desktop environment available and rolls it into one, elegant solution. Part Windows 7, part Ubuntu Unity, part KDE, part GNOME 3 (which DDE gets its base), this desktop brings to mind exactly what Microsoft should have done for Windows 8. You take a deeply embedded desktop metaphor and give it a modern twist, a flush app store, and make it scream on nearly any hardware. That’s what Linux Deepin did.


Is it Really Possible to Achieve a Single Version of Truth?
The road to SVOT is paved with very good intentions. SVOT has provided the major justification over the past 20 years for building enterprise data warehouses, and billions of dollars have been spent on relational databases, ETL tools and BI technologies. Millions of resource hours have been expended in construction and maintenance of these platforms, yet no organization is able to achieve SVOT on a sustained basis. Why? Because new data sources, either sanctioned or rogue, are continually being introduced, and existing data is subject to decay of quality over time.


Understanding atomic and composite patterns for big data solutions
Atomic patterns help identify the how the data is consumed, processed, stored, and accessed for recurring problems in a big data context. They can also help identify the required components. Accessing, storing, and processing a variety of data from different data sources requires different approaches. Each pattern addresses specific requirements — visualization, historical data analysis, social media data, and unstructured data storage, for example. Atomic patterns can work together to form a composite pattern. There is no layering or sequence to these atomic patterns.


Exploring the complexity of modern cyber attacks
Justifying ROI for information security can be a challenge. Information security is, in fact, a business problem, not an IT problem. The information security team should develop an information security strategy aligned with the company’s business imperatives and the various IT programs designed to support those business imperatives. A well-executed information security program should also deploy a security architecture that enables business focused outcomes (i.e. enabling the company to research and develop new products, to expand in existing markets or enter new ones, or to attract new customers) in secure ways.


Taking the first step towards better enterprise information management
Banks are under increasing pressure to meet regulatory demands and manage their business challenges. This could potentially create another wave of siloed data projects, if not carefully ‘governed’. While addressing tactical urgencies are important, there must be a strategic focus on having a coherent strategy for banks to leverage ‘data’ for growing, saving costs and staying compliant. The intent of this article is to convey the importance of having a good framework and the right guidelines to help banks make the right choices to be effective and efficient.



Quote for the day:

"I am reminded how hollow the label of leadership sometimes is and how heroic followership can be." -- Warren Bennis

No comments:

Post a Comment