May 10, 2014

SPL Tumbling Windows Explained
SPL supports the concept of windows, the ability to perform some processing on a window of data. A stream is an infinite sequence of data (as tuples), so to perform certain operations, a subset of the data must be used. For example, calculating the maximum value of or sorting an infinite stream would have to wait an infinite amount of time to see all the data. SPL provides the ability to process subsets of streams though windows. Operators perform processing against the set of tuples in its window, such as sorting all the tuples in the window and then emitting the tuples in the sort order. SPL has powerful definitions for defining a window’s characteristics.

Oracle v Google could drive a new era of open-source APIs
The “open API” movement has thus far been rather amorphous in terms of structure and definition. But generally, open APIs are perceived to use open protocols and formats including REST, JSON, and (less popular these days) XML. In other words, it’s open in terms of the standards used, and not necessarily open in terms of anyone’s ability to register for it. This ruling creates an opportunity for API providers to put their APIs under open-source licenses, be it permissive or copyleft. This can apply, particularly with permissive licenses, even if the non-API components of the source code are proprietary.

As Mobile Roars Ahead, It’s Time To Finally Admit The Web Is Dying
The Web has tried to compete with the “mobile web” concept, but like so many responses to technology disruption, this one seems too little, too late. Building an engaging application with HTML5 on mobile is unbelievably challenging, even with a host of libraries downloaded from GitHub to simplify the process. Mozilla’s expansion into the space through FirefoxOS and Open Web Apps is a decent start, but with Americans already spending more time on their smartphones than on the Web through a PC, such efforts are becoming moot. Even if you get a mobile web application running, its performance will pale in comparison to natively run, compiled code.

Mozilla: We have a fix for Net neutrality
Mozilla is proposing the FCC create a new definition for these relationships by calling them "remote delivery services." As such, Mozilla says this should be regulated like a Title II communication service under the Communications Act. "Our petition asks the FCC to adopt a modern understanding of the Internet in a way to reach Title II directly and quickly," said Chris Riley, senior policy engineer at Mozilla. "This will also ensure that the FCC can adopt meaningful Net neutrality rules with no blocking and no paid prioritization that will stand up in court." Mozilla's proposal is a new twist on an old idea. Other Net neutrality supporters have also called on the FCC to "reclassify" broadband traffic under Title II of the Communications Act.

The Future Of Digital Marketing
The biggest myth about content marketing is that content marketing is just a buzzword. Or the latest “shiny object” people are chasing in marketing. Content marketing is the hottest thing in marketing because it is the biggest gap between what brands produce and what our customers are looking for. Content marketing is a business imperative and a cultural shift that businesses need to take in order to stay in touch with their audience. Content marketing is a mindset that puts the customer first because they are ignoring promotions and adverts and self-serving content. So if a brand wants to stay relevant to its customers, then it needs to embrace content marketing.

Tails 1.0: A bootable Linux distro that protects your privacy
Tails runs like any other live Linux OS -- with an added safety feature: It erases your session from your computer's memory at shutdown so there are no leftover traces. It runs on most Windows, Linux and Mac computers, with some exceptions (see below). Sometimes a 1.0 software release is a major milestone. In this case, though, there are no dramatic changes from previous releases; Tails development has been steady -- it has been releasing new (and stable) versions every 12 weeks.

Innovation might be alive and well, but who really benefits anymore?
Some of the most renowned innovators in business and technology gathered for a debate in tech mecca San Francisco on Friday morning to debate whether or not entrepreneurs have “lost the will to innovate.” The general consensus was that innovation is still very much alive and well, but who benefits is questionable. "Entrepreneurs haven’t lost the will to innovate at all,” remarked Virgin Group founder Sir Richard Branson, "I’ve never known a more exciting time for innovation.” But Branson was the first to point far beyond the mental bubble of Silicon Valley, positing that there is "help needed in many countries to help entrepreneurs get on their feet.”

5 Resolutions for IT Security Pros
"Understand where that private information is being used," says Stroud, a member of ISACA's strategic advisory council. "I'm not telling you not to [use] it. I'm telling you to be aware. And in being aware, you can make good decisions about whether you're going to allow [the information] to be available or not." Among the other areas of focus in 2014: What ISACA calls the "slimming down of big data," heightened competition for cybersecurity and data analytics experts, and how to manage the dramatic growth in connected devices - "the Internet of more things." "You need to be aware of the fact the 'Internet of things' is coming," Stroud says.

Teaching employees to be IT security stewards
Corporate security should start with employees. Training employees is a key to protecting company infrastructure and data. The best way to train them is via a combination of historical lessons, real-world examples and even ongoing internal incidents of security breaches discovered through the monitoring of daily activities (also known as "user activity monitoring" and "insider threat detection"). In the same way the swing coach uses video recording to analyze frame-by-frame, those in charge of IT security or incident response would use recordings of employee online behavior to further educate the staff. In a group training setting, this behavior could be discussed anonymously so as not to embarrass anyone.

Improving Your Asynchronous Code Using Tasks, Async and Await
Prior to the .NET 4 release, two paradigms existed for implementing asynchronous operations in applications. The Event-based Asynchronous Model (EAM) which employs a combination of methods and event handlers to model the asynchronous operation, and the Asynchronous Programming Model (APM), characterized by Begin and End methods demarking the start and finish of an asynchronous operation and an object structure (IAsyncResult) that represents the state of the operation. Of the two patterns, the APM model was recommended for most scenarios and the framework has widespread support built in for using this model.

Quote for the day:

"Concentration comes out of a combination of confidence and hunger."-- Arnold Palmer