January 07, 2015

Risk Management through people
The Future of Risk Management is not just looking through the windshield; scanning the horizon might just be the most important thing to do, you cannot control or stop what is coming, you have to prepare to respond to it. So many organisations spend large amounts of money to focus and report only on what is happening inside the organization, where they actually have control. Your biggest risks are outside of the organization, where you have no control.  Key elements for the future of your risk strategy should include internal networking; you have to talk to the informal groups and their informal leaders just as much as you do talk to the executives and managers, maybe even more.

The CISO Challenge: Articulating Data Worth and Security Economics
If you are an online retailer and your web server goes down because of a major denial of service attack, what does that cost the business? How much revenue is lost every minute that site is offline? Enough to put you out of business? See the figure below that illustrates how to approach this conversation. If the impact of a breach and the risk of losing business is high and the investment in implementing a solution is relatively low, the investment decision is an obvious one (represented by the yellow area in the upper left corner). ... Another dimension Dave described is communicating the economics of a solution that could prevent an attack based on the probability that the attack would occur (see next figure below).

New Years Resolutions
Well, every post on this blog is designed to help with one of the many challenges of enterprise modeling – and so I thought it might be interesting to look at how I could model my New Year’s resolutions in ArchiMate. ... For one thing, a diagram is a lot more of a visual thing to print out and post on my wall – much more so than a simple list. ... Well, resolutions are all about setting goals to achieve desired results, so something from the motivation viewpoint seems right. Realizing my goals…let’s go with the goal realization viewpoint. The goal realization viewpoint permits Goals and Requirements, Principles and Constraints.

I want in! Sentiment analysis gives mobile app users a voice
At its most basic, sentiment analysis is about collecting and analyzing a set of textual data in an effort to extract or characterize the attitudes, opinions and emotions contained within, according to a set of predefined criteria. It does this through a combination of natural language processing techniques and textual data analysis, with a dose of computational linguistics tossed in. Sentiment analysis has been around for a few years now and has been used in a number of applications, often by consumer-focused companies. Today it is being taken to a deeper level as a driver of big data initiatives, as enterprises start to gather and assess customer sentiment on a large scale across multiple input channels.

Data Quality Predictions for 2015
The champagne has been drunk, the mince pies are eaten and we’re packing away the Christmas baubles for another year. After a well-earned rest, thousands of businesses are returning to face the challenges that the New Year will bring to their business, and that means refocusing efforts on quality, usable data. But the world of IT rarely stands still, and 2015 will bring immense change that will intensify our use of data and change our dependence on it.

Heatwave, Cooling Failure Bring iiNet Data Center Down in Perth
An unusually warm day coupled with what iiNet said was multiple air conditioner failure meant that some servers needed to be shut down. It was the hottest January day on record for the area since 1991, and the heatwave is expected to continue into the week.iiNet is the second-largest DSL Internet provider in Australia. Email and corporate websites went down; thousands of customers ended up offline. ... “We have had multiple air conditioners fail on site causing temperatures to rise rapidly,” company representative Christopher Taylor said in a forum post. “We have additional cooling in now. We will begin powering services back up once the room has cooled adequately. If we are premature the room won’t recover and risk the A/C failing again.”

In IoT standards battle, there is no neutral zone for this CTO
IoT capability has tremendous importance to Electrolux, Brockmann said. Take ovens, for instance. The appliance maker will be putting cameras inside ovens so a cook can check on how the roast chicken is progressing. In a true IoT world, the image of a browning roast ought to be viewable on any device, including TVs. But it won't happen if electronics vendors don't agree on protocols. By connecting products, the appliance maker can establish a lifelong relationship with the consumers, send recipes, deliver preventive maintenance, and offer information about new products, Brockmann said.

Evolution of containerization extends its cloud reach
"People are rethinking how they can deploy cloud applications as these distributed containers with loosely coupled data layers. … Docker folks are responding to that by making these things more lightweight and ultimately better-performing," Linthicum said. What does the future of containerization look like? As multi-cloud deployments increase, containers that are able to live-migrate from cloud to cloud -- as well as well-designed applications localized in containers and decoupling databases -- middleware and security creates this orchestration of containers, according to Linthicum.

Why You Need to Move Your Data Center to a Software-Defined Paradigm
In the new software defined paradigm you can find completely new approach to operating — no RAID related calculation, no SAN setup, no Zones creation, no special cabling or special switch hardware, architectural unlimited space and performance scaling. Standard 10 Gbps Ethernet network is enough. Disks, nodes, and rooms, are all suitable replication locations, which guarantee multiple replication levels and the deepest granularity of the replicated object. For this new storage model, you can easily add new disks to nodes or add rack of nodes to a system without any downtime during the maintenance. Rebalancing, migration, new replication and so on can be just programmed because this storage already a program.

Nvidia Demos a Car Computer Trained with “Deep Learning”
The computer uses Nvidia’s new graphics microprocessor, the Tegra X1. It is capable of processing information from up to 12 cameras simultaneously, and it comes with software designed to assist with safety or autonomous driving systems. Most impressive, it includes a system trained to recognize different objects using a powerful technique known as deep learning (see “10 Breakthrough Technologies 2013: Deep Learning”). The computer is also designed to generate realistic 3-D maps and other graphics for dashboard displays. “It’s pretty cool to bring this level of powerful computation into cars,” said John Leonard, a professor of mechanical engineering at MIT, who works on autonomous-car technology.

Quote for the day:

"The most important quality in a leader is that of being acknowledged as such." -- Andre Maurois