December 14, 2014

Google and Avaya to bring Chromebooks and WebRTC to call centers
Avaya hopes the offering will attract new clients and prompt customers of its call center software to upgrade their systems, especially those looking to move away from traditional Windows desktop PCs loaded with local software or to replace thin, virtualized clients, and thus simplify their infrastructure. Meanwhile, Google expects the partnership to help spur demand for Chromebook devices. Although Google doesn’t make Chromebooks, the company generates revenue licensing and IT administration software for the devices. The Avaya-Google bundle includes the Avaya Agent for Chrome software, and the Google Chrome management console.


5 Ways to Pull Useful Analytics Out of Big Data
It is generally made up of both structured and unstructured data. Structured data is data that’s already in a format designed for analysis, like data in a spreadsheet or database, while unstructured data is freeform, and includes things like infographics, presentations, blog posts, and social media posts. Astounding quantities of data are generated every day. In just one minute, there are 2 million Google searches, 685,000 Facebook updates, and 48 hours of video uploaded to YouTube. How can organizations draw useful analytics from this massive, heterogeneous pool of data? Here are 5 ways.


Debunking Disruptive Innovation – Why Disruptive Innovation is Not a Strategy
Most people familiar with the research on innovation also know about “paradigms.” Paradigms are mental models that contain unquestioned assumptions about how things work. The world is flat. The sun revolves around the earth. People get AIDS because God is punishing them for being gay. These assumptions are accepted as truths, until they’re turned upside down and replaced with an alternative paradigm. Paradigms have, and will always exist. Just like “quality” and “reengineering” were the business world’s lenses in the 1980’s and 1990’s, disruptive innovation is one of today’s biggest paradigms.


Iranian Hackers wiped out machines at Sands Corp Casino
“Typing from a Sony (SNE)VAIO computer, they compiled a small piece of code, only about 150 lines long, in the Visual Basic programming language. The program proved potent. Not only does it wipe the data stored on computers and servers, but it also automatically reboots them, a clever trick that exposes data that’s untouchable while a machine is still running. Even worse, the script writes over the erased hard drives with a random pattern of ones and zeros, making data so difficult to recover that it is more cost-effective to buy new machines and toss the hacked ones in the trash.” continues the post.


69 new external resources and articles about data science, big data
Starred articles were potential candidates for our picture of the week published in our weekly digest. Enjoy our new selection of articles and resources (R, data science, Python, machine learning etc.) Comments are from Vincent Granville.


NSA revelations forced Google to lock down data
After reporters showed Google engineers a diagram of the intelligence agency’s methods to tap links between Google data centers, the engineers responded with a “fusillade of words that we could not print in our family newspaper,” Washington Post reporter Craig Timberg said. Google responded to the revelations by former NSA contractor Edward Snowden by spending a lot of money to lock down its systems, including 2,048-bit encryption on its traffic, Schmidt said. “We massively encrypted our internal systems,” he said. “It’s generally viewed that this level of encryption is unbreakable in our lifetime by any sets of human beings in any way. We’ll see if that’s really true.”


Open Data Grey Areas
“The trustworthiness of open data,” Boswarva explained, “depends on the particulars of the individual dataset and publisher. Some open data is robust, and some is rubbish. That doesn’t mean there’s anything wrong with open data as a concept. The same broad statement can be made about data that is available only on commercial terms. But there is a risk attached to open data that does not usually attach to commercial data.” Data quality, third-party rights, and personal data were three grey areas Boswarva discussed. Although his post focused on a specific open dataset published by an agency of the government of the United Kingdom (UK), his points are generally applicable to all open data.


eBook: Android Security (and Not) Internals
Android is a software stack for a wide range of mobile devices and a corresponding open-source project led by Google. Android consists of four layers: Linux Kernel, Native Userspace, Application Framework and Applications. Sometimes Native Userspace and Application Framework layers are combined into the one called Android Middleware. Figure 1.1 represents the layers of the Android software stack. Roughly saying, in this figure the green blocks correspond to the components developed in C/C++, while the blue cohere with the ones implemented in Java. Google distributes the most part of the Android code under Apache version 2.0 licence.


The ERP monolith begins to unravel, sort of
Again, blame it on the cloud. The days of huge, complex on-premises IT infrastructures interwoven through the business are numbered. Many essential services and application functions can be accessed as needed and in piecemeal style via cloud, versus making huge up-front investments in software, equipment, and consulting assistance. "Raised with a new set of social, mobile, sensory, and wearable technology, [IT managers] will demand SAP's experience and functionality to reflect the new order." That order, of course, would be using HR, finance, and operational services from the cloud.


Companies need to trust gov't on cybersecurity, DOJ says
In addition to more trust, more engagement from private companies is needed, added Joe Demarest, assistant director of the Cyber Division at the FBI. But calls by DOJ officials for legislation to require mobile phone operating systems to include back doors in newly announced encryption tools may be a major stumbling block to additional cooperation. In recent months, FBI Director James Comey[cq] called on Congress to rewrite the 20-year-old Communications Assistance for Law Enforcement Act to allow for law enforcement agencies to access encrypted data on smartphones.



Quote for the day:

"The first step to leadership is servanthood." -- John C. Maxwell