January 03, 2015

Mainframe Futures: Reading the Tea Leaves
The question about the role of the mainframe then devolves to the underlying motivations of mainframe users - will they stay or will they migrate to nominally lower-cost platforms? I think the answer is kind of a blended analysis against a rapidly changing technology and workload background. While many workload have indeed migrated, primarily to RISC Unix and to a lesser extent to x86 Linux, much of the mainframe workload is still anchored to the mainframe by two underlying issues - software and overall scaleability and reliability.


How will the future of IoT impact data centers?
What complicates the whole issue is that data usage is often near-real-time. For example, when you shop, your location in the store can be detected. The time for personalized advertising is just one or two seconds. Most IoT data is "digested" on entry to the data center (e.g., face recognition turned into store location). The raw data is kept for a while, depending on what it is, so it will be streamed off to a disk farm. The output of digestion is a new, more valuable data stream. This, along with other streams, is sent to powerful analytics engines using big data techniques to generate inferences.


India lifts block on Vimeo; Pastebin, Internet Archive, others still banned
(...) Many of these wbsites [SIC] does not require any authentication for pasting any material on them. Other upload articles, Videos or photos or to download the contents which helps to hide the identities. These websites were being used frequently for pasting, communicating such content by just changing page name even blocking the earlier one. (...) Contact has also been made with some of the websites. These websites have undertaken not to allow pasting of such propaganda information on their website and also work with the Govt. to remove such material as per the compliance with the laws of land.


Problem Solving for Software Engineers
It may seem obvious that in order to be able to solve a problem we have to first understand it. Nothing is farther from reality in the IT business. It is not uncommon in my profession to see entire applications and architectures flowed and crippled by initial misunderstandings of a problem or requirement. While spending time to deeply understand what we have to build may not sound like the most ‘agile’ thing to do, the price to pay for a faulty start could be quite high. We usually start learning about the problem when analyzing software requirements that explain how things should work from the user’s perspective.


FBI seeks 'ethical' hackers to be 'cyber special agents'
"The FBI seeks highly talented, technically trained individuals who are motivated by the FBI's mission to protect our nation and the American people from the rapidly evolving cyber threat," Robert Anderson Jr., executive assistant director for the bureau's criminal, cyber, response and services branch, said in a statement Monday In its job post, which is open until Jan. 20, the agency said it has "many vacancies" for cyber special agents. Such agents, the FBI said, should have the skills to "conduct multi-faceted investigations of high-tech crimes, including cyber-based terrorism, computer intrusions, online exploitation and major cyber fraud schemes."


Get a good start with mob programming
”The basic concept of mob programming is simple: the entire team works as a team together on one task at the time. That is: one team – one (active) keyboard – one screen (projector of course). It’s just like doing full-team pair programming.” Read more about mob programming in his blog post or watch thisYouTube video of a real mob programming day compressed into a couple minutes.


How Big Data Will Transform Our Economy And Our Lives In 2015
But thinking ahead about wide-ranging technology and market trends is a useful exercise for those of us engaged in the business of partnering with entrepreneurs and executives that are building the next great company. Moreover, let’s face it: gazing into the crystal ball is a time-honored, end-of-year parlor game. And it’s fun. ... The global scale of the Internet, the ubiquity of mobile devices, the ever-declining costs of cloud computing and storage, and an increasingly networked physical word create an explosion of data unlike anything we’ve seen before.


Social Media Marketing Reaches Inflection Point
New analysis from the firm’s Analyzing Customers' Social Voices research found that the most important trend in social media analytics is cross-channel integration. Organizations are starting to integrate social media analytics with speech, text and Web analytics to cover all customer touch points. Disruptive technologies such as social media provide an opportunity to reshape organizations, change business models and transform industries, according to Deloitte’s 5th Annual Tech Trends Report. Over the years the focus of social business has shifted from measuring volume to monitoring sentiment, Deloitte said.


The future of storage: 2015 and beyond
The major problem facing any radically different storage technology is the extremely competitive market for existing techniques. This is, in one sense, like a commodity market -- vast and operating at very low margins. This makes it hard for any new idea to scale up quickly enough to claw back research, development and manufacturing costs in a reasonable timeframe. Yet the existing storage market is also quite unlike a commodity market in that it demands and gets continuous technological development through competition in two dimensions -- between drive manufacturers, and between solid-state and rotating media.


Message Structure Library
Generally, a message has a checksum field which is located in last byte(s) of message. It is an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data. Blocks of data entering these systems get a short check value attached, based on the remainder of a polynomial division of their contents; on retrieval the calculation is repeated, and corrective action can be taken against presumed data corruption if the check values do not match. And here's the class diagram of the message structure library:



Quote for the day:


"Leaders are more powerful role models when they learn than when they teach" -- Rosabeth Moss Kantor