March 17, 2014

New Programming Language Jeeves Allows Building Of Privacy Controls Into Apps
Jeeves makes it easier for a programmer to enforce privacy policies by making the runtime responsible for producing the appropriate outputs. The programmer implements information flow policies separately from the other functionality, and the runtime system becomes responsible for enforcing the policies. To allow for policy-agnostic programming, Jeeves asks the programmer to provide multiple views of sensitive values: a high-confidentiality value corresponding to the secret view and a low-confidentiality value corresponding to the public view.

The business transformation big bang battle zone
What is even harder about overcoming the transformation process that we need to undertake here is finding the borders between these silo-separated business departments themselves. We could call them vestigial business boundaries if you wish. These sometimes quite intangible divisions have little worth and not very much meaning. But what is most important of all is that we recognise these partitions as separations that were put in place before digitisation, automation and internetworked web-based connectivity.

Australia endorses US withdrawal from internet control
Turnbull said in a blog post that he had been discussing the move with the US Department of Commerce, and said that there were clear conditions that the transition must be to a multi-stakeholder model that does not replace the US government with another government or multi-government organisation like the ITU or the UN. Turnbull said the Australian government supports this approach. "The internet is the most remarkable invention of our times and while it had its origins in research contracts with the US government its growth, its dynamism, its resilience have all been the result of collaborative efforts by the wide internet community not government regulation or fiat," he said.

Gates sees software replacing people; Greenspan calls for more H-1Bs
"We cannot manage our very complex, highly sophisticated capital structure with what's coming out of our high schools," said Greenspan, former chairman of the Federal Reserve. The impact of automation on the labor market, whether it's for drivers, waiters or nurses, is progressing, said Gates. "It's the low income jobs that are really being eliminated by globalization," said Gates in a separate interview at The Atlantic. "Now the quality of automation, software artificial intelligence, is improving fast enough that you can start to worry about middle class jobs. But mostly it has not been information work or middle class jobs," he said.

Do you have “half dead” processes haunting your company?
The lifeblood of processes are the actors of it – whether it’s somebody who processes payroll or the guy who writes the computer code for a robot in a car factory. It’s your people who have the potential to truly bring your processes to life. So are your processes zombies, executing brainless tasks, or are they living and making this a place better to live and work for all of us? Don’t worry; I won’t be going into any new age stuff or founding a new BPM religion. But here are a few thoughts on how to evaluate how alive your processes are. To see whether the processes are alive, we need to break them apart into their main components and see how they’re doing.

Design Patterns for Data Persistence: Unit-of-Work Pattern And Repository Pattern
Microsoft really likes the Unit-of-Work Pattern, so most every sample you see coming out of their shops will include this pattern. The general theory is you have a reference to a stateful link to your data store — a Data Context — that will queue up your queries and then execute all the steps at once within a transaction. They’ll either all succeed or they’ll all fail. For example you’re placing an order in an Order Entry system. You may insert or update the Customer record, insert an Order header, insert one or more Order detail lines, perhaps update the product’s available count.

Key Questions to Ask during Master Data Consolidation
Typical master data consolidation starts with combining the operational master records from all the data silos where they exist. The key aspect being, creation of master data indexes to support single view; knowing and asking right questions during this phase can save lot of time and rework. In an earlier post on this blog, I examined the ways in which we can identify the right sources of Master Data. Once these data sources are identified, next step is to select the right data elements from them, which confront to the definition of master data.

Object-orientation in C — Part 3
For non-trivial class hierarchies the method proposed in Part2 is probably not optimal. The main reason is that there is only one C struct which is used by base and subclasses. Consequently, the hierarchical tree is only implicitlycontained in the data structures and therefor, in this last part of the series, we introduce a more explicit technique that closely resembles “C++ in C”. Let us start with main() just to show where we’re heading for. The UML diagram of the code can be found in Part2 except that we have changed ‘id’ to ‘label’.

Making The Most of Cultural Differences in Transformation Projects
There is one thing, though, that many transformation efforts I’ve been associated with tend to overlook: cultural differences. It might be ok – just possibly – to ignore this subject if you are working for a single-country organisation such as a government or public sector body or a small business. But in the main, transformation programmes have an international dimension, sometimes to a significant degree. Getting culture right is critical. And people from other cultures and countries are just so…strange. This can be infuriating – see this recent piece on the HBR blog – but it can also be a great boost to your change initiative and its operational success – as explained in a recent Economist Intelligence Unit report.

How will Cisco-Sourcefire security combo affect Cisco product roadmap?
In this interview at the 2014 RSA Conference, Roesch discusses the challenges of bringing the two companies' perimeter firewall, next-generation firewall and IPS technologies together, as well as his hopes for a centralized management product. He also explains the ways in which Sourcefire's unique technology might be applied to Cisco's broad base of existing network security customers. Finally Roesch discusses Cisco's new OpenAppID open source Snort plugin for application control, and what's ahead for Snort and Cisco's open source security product portfolio.

Quote for the day:

"Those who know how to win are much more numerous than those who know how to make proper use of their victories" -- Polybius