January 27, 2015

Healthcare’s High-Tech Transformation Includes Bionics, Big Data, and 3D Printing
One of the definitive gamechangers in personal technology was the introduction of the smartphone, which has transformed how, where, and when we interact with technology. And because smartphones are basically tiny computers with an internet connection, putting them to work for our personal health through apps, add-on devices, and cloud storage is now easier than ever before. Whether it’s monitoring your heart rate, counting the number of steps you took today, mapping your walking/biking/running route, or using an app to find the nearest doctor or clinic, more and more people are using the mobility and accessibility of their everyday gadget to improve their health.

Cisco Unveils Analytics Strategy Leveraging Network Intelligence
More specifically, The Cisco Connected Analytics for the Internet of Everything portfolio includes components for network, location, collaboration, contact centers, and video. It is designed to help organizations apply analytics and extract useful insights from data that was mostly created within the organization’s four walls, and almost always resided in a centralized data store. The IoT space is filled with an industry-wide arms race to release the latest and greatest Internet-connected device. Recently, Intel has unveiled a new platform to make it easier for companies to create internet-connected smart products using its chips.

Hybrid Cloud: You Don’t Have to Go All In
The cloud is still something that small to medium size business owners are grappling to fully understand. It’s hard to define exactly how the cloud can help your business when there are so many different variations of cloud solutions available. Understanding exactly what the cloud looks like for any business isn’t easy, because, quite honestly, the cloud looks completely different for every business. As executives try to dissect the different services available and choose options that work for their needs, it’s important to understand – you don’t have to go all in.

Gamification for Business – Recruitment, Management and Promotion
In the gaming context, workers will know that their accomplishments will be justly recognized through various tangible game props and this awareness proves to be a great incentive for action. The clarity of the process helps a lot as well – set goals are clear to everyone and tracking the progress is easier than ever. This is especially relevant to the generation of Millenials that have been brought up playing interactive games and are eager to extrapolate the logic of games onto other areas of life. The regained focus on the aims defined in the game also considerably motivates employees to reach them faster. Since the primary goal of gamification is to recognize one's competence, talented workers will be even more determined to complete the project.

With Multi-Vector Attacks, Quality Threat Intelligence Matters
Multi-vector attacks take advantage of these common vulnerabilities: combining elements like social engineering and ‘spear phishing’ e-mail messages with malicious attachments that contains code that exploits known or unknown (zero-day) vulnerabilities on the target system. While these attacks might rely on commodity malware, they are often tailored to bypass most antivirus engines. As an example, Cisco recently analyzed a multi-vector attack that we’ve labeled the “String of Paerls” (sp) attack that serves as a useful example for the kinds of techniques typical of multi-vector cyber attacks.

SmartDataCenter APIs – turning up the Heat
Following a service oriented architecture, SDC divides the responsibilities for various resources in compact, easy-to-understand API-components. Most of the APIs have a somewhat speaking name. In the table below you find an overview of the core APIs, what they cover and the equivalent project in OpenStack. ... The DataCenter object manages the discovery of the required APIs using the service API (sapi), handles the HTTP requests and provides list_*, get_* and create_*functions. Returned machines (both SmartMachines and KVM) provide functions to control their lifecycle:

Speak Like a Data Center Geek: Networks
It’s literally true that we can’t get enough of networks at Equinix. We were founded as a neutral place where network service providers could come together and exchange data traffic, and today we host more than 1,000 networks, with room for more. That all makes networks a solid choice to headline the 10th installment of our “How to Speak Like a Data Center Geek” series, which aims to bring clarity to the sometimes opaque terms we data center types toss around.

Extending the Reach of Mobile and Cloud in the Enterprise
Another enhancement is closer integration with MDM/MAM (Mobile Device Manager/Mobile Application Manager) like MobileIron. In an earlier post I talked about the work that has already been done with HCPA to add mobility management features on top of our enterprise cloud content management platform HCP. HCPA already brings elements of mobile device (MDM) and mobile information management (MIM) and alluded to the fact that HCPA does not really control which apps can use data but does allow users to better manage which users or 3rd parties can access files and participate in shared folders.

6 DNS services protect against malware and other unwanted content
There are actually two main types of DNS servers: recursive and authoritative. The ones that are used by most individuals and small companies (and that are covered here) are called recursive DNS and are the default services provided by most Internet Service Providers (ISPs). All the companies listed here offer recursive DNS services. Some of them, however, also sell authoritative DNS services, which allow website owners or hosts to define the Web server IP addresses that their domain names point to and to manage other DNS settings. Since DNS servers are the middlemen between your browser and website content, there are many third-party DNS services that offer additional functionality for both users and network administrators.

The Agile Value Delivery Process, Where ‘Done’ Means Real Value Delivered; Not Code
Current agile practices are far too narrowly focused on delivering code to users and customers. There is no systems-wide view of other stakeholders, of databases, and anything else except the code. Agile, today, has no clear management of thequalities of the system, such as security, usability and maintainability: there is a narrow ‘bug’ focus, as the only ‘quality’. ... So, your technical and organizational architecture must permit low-cost changes of new and better, unforeseen architecture. This means new suppliers, partners, and technical components. You will, face it, have to deal with this problem in the long term, hint: ‘technical debt’, so you might as well make sure you can change things easily in the short term.

Quote for the day:

“Live as if you were to die tomorrow. Learn as if you were to live forever.” -- Mahatma Gandhi