April 01, 2014

Enterprises haven't been entirely asleep at the wheel. We've gradually adopted more agile methodologies, service-oriented architectures, shared services organizations, virtualization,DevOps and other updates to the IT craft. But rarely have enterprises put them together in a coordinated way that reflects how enormously the demands on IT and the product capabilities have changed. In contrast, go into shops that already operate at hyperscale -- say a cloud or high-performance computing shop -- and you'll see many of those techniques in use. They are agile, service-oriented, virtualized, and DevOps personified.


Microsoft to highlight its 'One Windows' progress at Build 2014
At the developer confab this week, officials are expected to disclose fully the feature sets of the Windows Phone 8.1 and Windows 8 Update 1 operating systems. They also, according to sources, will share a bit about the next major version of Windows -- Windows 9, codenamed "Threshold," aka Windows 9, which is supposedly due to arrive in the spring of 2015. Few expect Microsoft to unveil the full feature list or even the target arrival date for Windows 9 at Build 2014. Instead, Microsoft officials are likely to discuss at a high level the company's goal to create a new Windows 9 SKU that would run on Windows Phones, ARM-based Windows tablets/PCs, phablets and other kinds of devices.


CryptoDefense ransomware leaves decryption key accessible
"Due to the attacker's poor implementation of the cryptographic functionality they have quite literally left their hostages with a key to escape," Symantec wrote. The decryption key may have been left under the door mat, but it's doubtful an average user infected with CryptoDefense would have the technical skills to figure it out. CryptoDefense has been seen sent out in spam messages, masquerading as a PDF document. If a user installs it, the malware tries to communicate with four domains and uploads a profile of the infected machine, Symantec wrote.


Cloud Security Solutions for Hybrid Clouds
Recent cloud security advancements present an innovative approach to the key management issue using technologies such as split-key encryption. Going back to the banker metaphor, with split-key encryption, the encryption key is split in half, allowing the customer to maintain control of the encryption key while, at the same time, host its most sensitive data in the cloud. Such technologies are enabling secure migration to the cloud and support hybrid use cases such as RaaS.


Sustainability a CFO Can Love
The benefits of looking for momentum and finding a way to add to it are undeniable. If you push something in the direction it is already going, you will accomplish much more with each unit of energy. That is the guiding philosophy behind the process described below, which may not be unique to us. The sustainability activities of some of the companies we admire most seem to reflect similar thinking. These companies have found ways to apply their direction, strengths, and acumen to accelerate positive change.


6 Changes and Challenges in Transactional Banking Today!
Transaction banking as a global business has largely remained under-leveraged though it was one of the most resilient businesses during financial crisis despite plunging trade volumes. Despite shrinking margins, significant revenue growth of approximately 170 percent or a compounded annual growth rate of roughly 11 percent is expected from 2011 to 2021 (Source: BCG, Transaction Banking advantage, 2012). With right focus, proper positioning and alignment with customer preferences, we believe that transaction banking will continue to deliver value and be a front runner for being the shining and guiding star for banks.


How to build an enterprise private cloud that looks better than AWS
The enterprise's private cloud management and infosec stack lack the automation to stand anything up in that timeframe. The virtual machine might be there in five minutes, but then a week or more goes by for manual infosec and management provisioning. You were vendor-led like a lamb to the slaughterhouse, and your cloud build was butchered. You can neither build a viable private cloud with 15-year-old IT automation suites held together with bailing wire and gum, nor with big-vendor converged infrastructure stacks on prepackaged, partially automated frameworks. If you're still determined to build an internal cloud stack that rivals Amazon, here's what you need to do in five steps:


HP makes fresh software-defined networking push
”Our mission is OpenFlow-enabling that connection point. Then we can say that YouTube shouldn't have quality of service, that's just a best effort service, but the Lync application needs to have QoS, so we can differentiate per application. That's what really gives you the user quality.” To configure OpenFlow SDN on HP devices companies will need to run HP's Virtual Application Networks (VAN) SDN Controller software. VAN allows an administrator to set up rules for managing and orchestrating network traffic flowing over an OpenFlow-enabled network and is compliant with OpenFlow 1.0 and 1.3 protocols.


Cyber security is economic opportunity for the UK, says government
“CERT-UK is going to play an incredibly important role in ensuring that we have that firm, resilient, foundation underpinning our economy. It is crucial,” said Maude. He said the publication of the National Cyber Security Strategy two years ago marked a “ratcheting up” of the seriousness with which the government takes cyber security. “At a time when budgets across government have been cut, we put more money into cyber security - £860m to be precise,” he said.


Edison Invoked in Rare U.S. High Court Look at Software Patents
The case involves the basic question of eligibility for patent protection. Other parts of the Patent Act impose additional requirements, including novelty and usefulness. Alice’s patents are under fire even from companies that say that software generally should be eligible for legal protection. Microsoft, Adobe and Hewlett-Packard Co. filed a brief urging the court to rule against Alice, even while setting a low bar for patent eligibility in other cases. “The patents at issue here are directed to an unpatentable business method combined with an equally abstract directive to perform that method using a computer,” the three companies argued.



Quote for the day:

"If you have accomplished all that you have planned for yourself, you have not planned enough." -- Meddigo Message