October 03, 2014

Security Think Tank: Minor failings can trigger major data breaches
When small incidents go unchallenged – or even unnoticed – they become the accepted culture. So, the first time a door to a file room is propped open for the sake of convenience, the security policy is bypassed. If this goes unchallenged, it will happen again because “Fred” does not see the importance of putting his PIN code into the door entry system for the file room. This mindset cascades, with more and more people believing it to be acceptable behaviour. Before you know it, propping the door open is the norm within the business, offering an opportunity for files to be removed by unauthorised staff, altered and copied – and a more major security breach could occur.


10 Tips to Ensure Your IT Career Longevity
Many organizations are getting better at providing embedded employee performance and career management processes, according to Karen Blackie, CIO of Enterprise Systems & Data for GE Capital. However, she warns that you are your own best advocate and should always strive to "own" your career. Don't wait for your organization to do it for you because that day may never come. This means stepping back and thinking about where you want to be in X amount of time and then outlining the different skills and experience needed to get there.


Blowing the Lid off BYOD Containers for Security and Productivity
With the MaaS360 Secure Productivity Suite, you can prevent data leakage by controlling emails and attachments. This facet of the larger Enterprise Mobility Management suite also conducts online and offline compliance checks before email can be accessed. You can set it to restrict forwarding, moving data to other applications via cut and paste restrictions, and screen captures. This last point is a very important consideration as public apps embed deeper into the enterprise and homegrown programs are updated to serve the app world.


Artificial intelligence in your shopping basket: Machine learning for online retailers
BloomReach is able to aggregate data from many sources, with user data kept in silos for privacy reasons - an approach which also means keeping the computational, data-processing and machine leaning infrastructure separate from the serving infrastructure. The result is a micro services model that can deliver millions of pages from the cloud, while still learning from user interactions and new content. De Datta points out that without new information search boxes degrade over time, and the more inputs you have, the smarter the system gets.


CIOs must argue for smarter, more strategic technology investments
"We certainly see shifts in the IT budget, because growth was previously very strong in areas like storage and physical servers, but clearly that growth is reducing, as there are shifts to virtualisation and higher uptake of cloud models," she said. At the same time, these new forms of technologies and the service delivery models of the cloud are changing the way that IT is consuming technology, most evident in the shift of IT spending from a capital expense (capex) to an operating expense (opex) model.


Government Toils To Create Big Data Infrastructure
"This is not necessarily a new problem," said Steve Wallach, former technical executive at the National Geospatial-Intelligence Agency (NGA). As long as 30 years ago computers were producing more data than could be practically used, and the ability to produce it has outpaced our ability to manage it since then, he noted. "We are moving into a new area," said Wallach. The other major challenge is making the data available to other researchers who can add value to it. "I spend a lot of the taxpayers' money producing this data with the big machines,"


Does Hadoop Mean the End of the Data Model?
The natural result of separating the data content from the data structure is that the MapReduce program becomes the place where the two are linked. Depending on the data processing needs, this may or may not be a complete data structure definition. In addition, each developer will define this mapping in slightly differing ways, which results in a partial view that makes unified definition hard to assemble. The late-binding of data content to the data structure essentially places the developer as the middleman between the data and the data consumer since most data consumers are not MapReduce trained.


Cyber risk and the UK’s Cyber Essentials Scheme
The scheme builds on elements of ISO 27001, laying out a procedure for establishing resistance to cyber risk; the key aspect of the new initiative is that this resistance can be externally certified. External certification is important: it is designed to enable those dealing with an organisation – customers, suppliers and perhaps insurers – to know whether it meets a measurable minimum standard of cyber hygiene. This in turn should create a competitive advantage for those who demonstrate compliance over rivals who do not. Once the scheme is up and running, applicants will be able to get certification showing the level of compliance they have attained.


A Rails Enthusiast’s take on MEAN.js
To dive into MEAN, what better way for a Rails fan to get up to speed than by following the path of the famous demo, and creating my own blog application with MEAN.js. A more up-to-date version of the Rails blog exercise, without the “Uoooops,” is the Rails getting started guide. Our journey here will mirror this guide and summarize my comparison with Rails. To follow along with my code, check out the project on GitHub. ... To start a new app in MEAN, like Rails, we use a generator. MEAN.js uses Yeoman for automation, and is configured with a generator for a starter application. In this case, I created an application called Blog.


How iPaaS integration gains platform status
IPaaS service offerings are built around an Agile development methodology where time to market speed is crucial. An iPaaS service platform typically provides prebuilt connectors and development and configuration tools that are user-accessible, drag-and-drop type tools. Using the provided tools, organizations can implement integration projects involving SaaS or on-premises endpoints, data sources, applications, services, APIs and processes. Users are able to develop, deploy, execute, manage and monitor integrated interfaces linking multiple endpoints.



Quote for the day:

"Talent hits a target no one else can hit; Genius hits a target no one else can see." -- Arthur Schopenhauer