February 20, 2014

Debunking four myths about Android, Google, and open-source
The Guardian published a story, which they have since taken down, spreading FUD about Google, Android, Linux, open source, and licensing. The paper later published another article trying to get the Android facts right, but, well, they still don't. ... When all the MADA provisions are taken together, Edelman argues, they tie Google's apps into a near seamless whole.


How SDN and NFV simplify network service chain provisioning
SDN or NFV service chaining also makes the process of network upgrade simpler. Communications service providers, for example, have networks that are geographically distributed, so upgrading equipment requires travel. In addition, a single error can bring down the entire network and cause outages on interconnecting providers' networks. But with SDN and NFV, providers can create new chains that increase the efficiency and the capacity of their networks without radically changing hardware.


Gartner Says Master Data Management Is Critical to CRM Optimization
"Over the last several years, CRM software sales have outstripped overall IT spending," said Bill O'Kane, research director at Gartner. "CRM leaders must understand the benefits of the MDM discipline to CRM and make it part of their CRM strategy. MDM is critical to enabling CRM leaders to create the 360-degree view of the customer required for an optimized customer experience."  Mr. O'Kane said that organizations are moving to a more integrated CRM approach that focuses on the customer experience through improved customer engagement, across marketing, sales, customer service, e-commerce and all other customer-facing channels.


The Women Behind The Data
The buzz being made by Big Data has clearly made way for women wanting to get started in a data-driven field. Opportunities in Big Data are attracting women specializing in IT, data science, data management, software development and anything else data related. This could be because Big Data is a fairly new industry which has currently been met with great success. All the hype surrounding Big Data has made careers within this sector more appealing, especially for women looking to exercise their mathematical and analytical skills.


Pulling the Reins on Data Breach Costs
"That leaves you with two options," says David Mortman, chief security architect and distinguished engineer, Dell. "You can work to reduce your chances of a breach. Second, because breaches do happen, you can protect yourself from additional litigation due to a breach, says Mortman. And this is where state law comes into play: they ultimately determine what constitutes due care, and typically when an organization is breached and is following due care they are not as exposed to successful lawsuits.


Fashion house Paul Smith steers a hybrid path to IT excellence
"Agility and continuous innovation are also key measures and I would like to be in a position to be proactive," he says. The role of IT has changed over the past decade, says Bingham, and has become a way of delivering business strategy.  "IT used to be a necessary evil. While everyone needed IT, it was a tactical service for Paul Smith’s business. Now I think there is a seismic shift and IT is regarded as a strategic service to grow the business," he says. "IT is now a crucial element of the business and a strategic supporter and enabler."


Cisco fixes flaws in several products
The vulnerability addressed in Cisco Unified Computing System (UCS) Director stems from a default account with root privileges that gets created during installation. "An attacker could exploit this vulnerability by accessing the server command-line interface (CLI) remotely using the default account credentials," which would provide the attacker with full administrative rights to the system, Cisco said in an advisory. The vulnerability was addressed in Cisco UCS Director Release Hotfix 4.0.0.3.


Cloud storage appliances: Backup and recovery made simple
OK, now that we're left with just the adults in the joint, let me put this in very simple terms that I am sure any stressed out, overworked CIO or CTO can understand: Your storage is very expensive. Like many organizations, you are probably always on the verge of having to buy another frame, another chassis, and trays of drives because you've got VM and filer sprawl. And the guy or gal who has the authority to sign the purchase orders to get you those new frames, chassis, network infrastructure, et cetera, likes to say no a lot.


10 mistakes to avoid in your disaster recovery planning process
Don't make your disaster recovery planning process even harder than it is by trying to do too much or cutting corners. Careful planning is your best bet for a successful recovery. At the start of the new year, many IT folks (and perhaps a few business managers) resolve to take steps to prevent avoidable interruption events and to cope with interruptions that simply can't be avoided. In short, they decide to get serious about data protection and disaster recovery planning for business IT operations.


SQL Server Security Checklist
There are many security related settings in the Microsoft SQL Server and you should also consider setting up processes to ensure that the security is maintained in the future. The security related tasks can be divided into four main categories: physical security, operating system level security, SQL Server configuration and user management. You should protect your server physically, have a secure OS and then you can start thinking about your SQL Server.



Quote for the day:

"The most important thing in communication is hearing what isn't said." -- Peter Drucker