December 24, 2014

PCLinuxOS and UEFI systems
First, when I boot the Live image, the screen comes up at the wrong resolution as noted above. Of course, this is not a fatal problem, you could just ignore it and go ahead with the installation, and deal with this on the installed system. But the screen is rather small and ugly, and it's not easy to read. The way to correct it is relatively simple, you just need to delete (or rename) the file /etc/X11/xorg.conf, and then restart the X server. It will then figure out the correct display size on its own, and the world will be a wonderful place again.


Google Wants to Turn Browser Signals of Web Encryption Upside Down
"We, the Chrome security team, propose that user agents (UAs) gradually change their UX to display non-secure origins as affirmatively non-secure," the engineers said in messages spread across several discussion forums, including Google's own Chromimum project. "The goal of this proposal is to more clearly display to users that HTTP provides no data security." Chrome's argument was that, without HTTPS and SSL/TLS encryption, traffic between a user's browser and a website is inherently unsafe. The visual display should explicitly call that out.


Ten Ways to Make Your Cloud More Efficient
Believe it or not, we are at a very critical junction point when it comes to cloud computing. Although growth has been steady, we’re about to hit a very big boom. According to the recent Cisco Global Cloud Index Report, “while the amount of global traffic crossing the Internet and IP WAN networks is projected to reach 1.6 zettabytes per year by 2018, the amount of annual global data center traffic in 2013 is already estimated to be 3.1 ZB, and by 2018 will triple to reach 8.6 ZB per year.” So in the midst of this rapid growth, how can you improve cloud efficiency to keep your environment up and running in a proactively healthy state?


A Robot Really Committed A Crime: Now What?
Two London-based artists coded a bot that randomly purchased items from a hidden or “darknet” market using Bitcoin. The bot purchased, among other things, fake Diesel jeans and ten pills of ecstasy. But it also purchased perfectly lawful items such as a stash can and baseball cap with a camera in it. You can see the items here. Are these artists liable for what the bot bought? Maybe. In the United States, at least, criminal law is predominantly statutory. We would have to look to the precise wording of the federal or local law and then apply it to the facts at hand. If, for instance, the law says a person may not knowingly purchase pirated merchandise or drugs, there is an argument that the artists did not violate the law.


The gift of time
The holiday season is often spent frenetically buying gifts, attending or hosting parties, and celebrating the end of one calendar year and the start of the next. This activity is in addition to your regular work and life activities. It can be exhausting! I think we all would be well-served by taking a close look at how we spend our time each day. Are we choosing the most effective ways to act, interact, and behave? If we slow down for a few minutes and analyze how we spend our time, we can refine our choices to serve ourselves and others better.


New per-user Windows license pricing cuts VDI costs
Microsoft has been tight-lipped about the per-user license pricing. The company declined to release list price details this week, only saying volume licensing pricing is available to customers through Microsoft partner resellers. Windows license pricing is often negotiable depending on the volume or agreements organizations have with Microsoft. But glimpses of the per-user pricing indicate some possible savings for Microsoft customers, said Paul DeGroot, analyst at Pica Communications in Camano Island, Wash., and author of Microsoft Licensing Concepts.


The CISO, the CIO, the CEO, or you: Who is really responsible for cybersecurity?
"IT security is a commodity where you can go and buy products and expertise from a provider," he says. "The same is true in regards to business security in many cases - the processes and governance are a commodity that you can purchase as a managed service." Shiraji says he would rather spend his limited IT budget on front-line operations, and then draw on specific expertise to help protect his data and guide his staff. The organisation recently received ISO 27001 accreditation and the communications support from the chief executive proved essential.


The hottest wireless technology is now sound!
Using sound for transferring data is nothing new. In the 1940s, when IBM tried to solve the problem of how to use regular telephone lines to connect two computers, it figured out a way to convert data into sound, send the sound over the phone and then convert it back into data. (Yes, I'm talking about the modem.) The benefit of using sound for data transmission was that equipment to handle the process was widely available. In the wireless era, sound is still a great option for data transmission and other uses, and for the same reason. Lately there's been a surge of innovations that harness sound waves to transmit data and do other creative things. Here's what's going on.


Seven steps to becoming a digital leader
All transformations – digital or otherwise – start with a vision from the top. The CEO and the board need to create a credible and compelling vision for the business in the digital age. And this vision has to be shared with the rest of the business to maximise the chances of it becoming a reality. In Don’t wait for a crisis to go digital I described how creating a vision for the digital age required a fresh perspective on the organisation – the outside-in view. ... in the course of conducting hundreds of interviews with organisations about their approach to digital, it became clear to him and co-authors George Westerman and Andrew McAfee that firms that struggle to become truly digital “fail to develop the leadership capabilities required to set and execute a digital vision.”


Making CIO-CMO Relationship A Success In 2015
Organizations succeed only when CMOs and CIOs share a single, customer-focused business technology agenda, says a Forrester report, and hails the CMO and CIO as the two roles that matter most for 2015. Forrester analyst and Chief Research Officer, Cliff Condon, explains in his blog that unlike before it makes little sense for CMOs to focus only on marketing and promotion. In the age of the customer, the CMO of 2015 must own the most important driver of business success — the customer experience — and represent the customer’s perspective in corporate strategy.



Quote for the day:

"Let him who would be moved to convince others, be first moved to convince himself." -- Thomas Carlyle