February 15, 2015

5 Ways Data Virtualization Can Enhance Your Investment in the Enterprise Data Warehouse
As a replacement platform, Hadoop (as well as other high performance NoSQL tools) can be used to simplify the acquisition and storage of diverse data sources, whether structured, semi-structured (web logs, sensor feeds), or unstructured (social media, image, video, audio). In addition, data distribution and parallel processing can speed execution of algorithmic applications and analyses, and provide elastic augmentation to existing storage resources. However, at the current level of system maturity Hadoop does not necessarily address our aforementioned challenges. While there is a promise of linear scalability, migrating reporting and analytics to a big data platform does not address data dependencies and synchronization requirements.

Simple TOSCA Orchestration for Docker
TOSCA orchestration is already fairly mature, with a proven track record and speed of development, and many organizations are betting on and contributing to its success. TOSCA is now beyond its second major revision, has been around for a couple of years now, and is gaining traction in both commercial and open source projects such as: Juju, Cloudify, IBM Cloud Orchestrator, OpenStack Heat. It’s also being adopted by leading Telco vendors such as Alcatel-Lucent, Huawei, and Cisco. The fact that TOSCA is backed by a standards body (OASIS) makes it a great platform for defining a standard container orchestration specification that is portable across various cloud environments and container providers.

Thinking About Gamifying Your Workplace? Think Again
Gamification is hot. And why not? Turning mundane tasks into games will better engage your employees... and make coming to work a lot more fun, right? Maybe not. According to research conducted by Bonusly, a web platform that helps companies reward and motivate employees by using peer-to-peer bonuses--workplace gamification can result in a number of problems ... But that doesn't mean gamification won't work in the right situations. Check out the infographic for ways to effectively use gamification strategies.

The great internet swindle: ever get the feeling you've been cheated?
Part of the problem here, argues Keen, is that the digital economy is, by its nature, winner-takes-all. “There’s no inevitable or conspiratorial logic here; no one really knew it would happen,” he says. “There are just certain structural qualities that mean the internet lends itself to monopolies. The internet is a perfect global platform for free-market capitalism – a pure, frictionless, borderless economy … It’s a libertarian’s wet dream. Digital Milton Friedman.” Nor are those monopolies confined to just one business.

Can the Internet be archived?
The average life of a Web page is about a hundred days. Strelkov’s “We just downed a plane” post lasted barely two hours. It might seem, and it often feels, as though stuff on the Web lasts forever, for better and frequently for worse: the embarrassing photograph, the regretted blog (more usually regrettable not in the way the slaughter of civilians is regrettable but in the way that bad hair is regrettable). No one believes any longer, if anyone ever did, that “if it’s on the Web it must be true,” but a lot of people do believe that if it’s on the Web it will stay on the Web.

9 Generic Big Data Use Cases to Apply in Your Organization
Big Data means something different for every organization and every industry. What Big Data can do for your organization depends on the type of company, the amount of data that you have, the industry that you are in and a whole lot of other variables. Whenever I advise organization on their Big Data strategy, this is the main problem; there are so many different possibilities and often it is a struggle to find the right use case to develop into a Proof of Concept. That’s why I have developed the Big Data Use Case framework, to help organizations understand the different possibilities of Big Data and what it can do for their business. The framework divides 9 generic Big Data use cases into three different pillars

Stop Data Misuse, Speed Data-Driven Innovation
So, a main idea of its technology is for organizations to create those policies independent of individual data elements, instead applying rules to a higher layer. “The power to represent those policies at a higher semantic level is important,” he says, because it leads to the ability to speedily update policy changes at an organizational level. “Being able to do that and not have to tie things down to data fields is a great opportunity for the whole privacy and governance world,” Towvim believes. The angle TrustLayers takes to get organizations quickly started and able to scale up with Big Data authorization activities begins with capturing its policies for modeling, including the option to use policies pre-built at a higher abstracted level for specific industry sectors.

Microsoft tightens leash on POODLE attacks against IE11
With Tuesday's update to IE11, the browser is now set to stymie by default what's called "SSL 3.0 fallback," a mechanism that forces the browser to switch to the buggy SSL 3.0 from more secure encryption protocols, such as TLS 1.2. In December, an IE11 update offered the kill-SSL-fallback only as an option. With another update now slated for April 14 -- that month's Patch Tuesday -- Microsoft will completely disable SSL 3.0, the final step in its defensive change. Rival browser makers moved much faster than Microsoft to dump SSL 3.0.

Information Governance v Search: The Battle Lines Are Redrawn
Where are the rights to both privacy and security in the challenge of too-much-information? I am a strong proponent of privacy, and so are many in the IG world. I am also a strong proponent of cybersecurity. I think it is possible to have both. In both the Search and IG camps their are people who agree with me on these points, and others who disagree. Many see it as one or the other, especially people in government. They take extreme views favoring either security or privacy. Many in both tech and government simply dismiss the importance of privacy, and say just get over it. Advocacy for individual privacy is a separate battle in both worlds, IG and Search. The same is true over cybersecurity. I favor a balanced approach, and so do many in the IG world.

The more IT changes, the more technology issues remain the same
What is worse, according to Beighton, is that some CTOs are failing to track technology trends effectively. He says: "A good CTO should be naturally inquisitive. But a lot of CTOs are not keeping up with the times and the knowledge." Often he says, the CTO is not leading the technology direction of their organisations. Speaking at a Rackspace roundtable in London on e-commerce search, he said that product search had not evolved. He argues that most e-commerce sites work on the basis of publishing the availability of product or stock and hope the user buys from them. Often, sites will have spent a lot of money on Google Ads to get people there. "There’s so much more opportunity for these sites to help people and give them inspiration," he says.

Quote for the day:

"Earn your leadership every day." -- Michael Jordan