March 27, 2015

Ayasdi Raises $55M to Blend AI and Machine Learning
“Traditional analytics have hit the wall,” said Ayasdi Chief Marketing Officer Patrick Rogers. “It starts with an analyst asking questions, and then applying them against data that may or may not find insight. You must then go back and reformulate until you find something impactful. There are a lot of tools, but it’s still fundamentally a human-driven process. That model is not going to scale—the number of possible questions grows exponentially with data sets.” Rather than the hypothesis/test approach, Ayasdi takes a very machine-driven one to address complex data. At the heart of Ayasdi’s machine intelligence is topological math, which is building a more automated discovery process and eliminating manual processes.


The dark side of commercial open source
This brings us to one critical problem with commercial open-source companies: they can be bought. And sold. And when they are, the community can be shafted. Completely. Not that this must necessarily happen. Most companies that have acquired open-source companies have done so to benefit from and grow their associated communities. Not surprisingly, open-source leader Red Hat has acquired a range of companies, from JBoss to InkTank (Ceph), and has worked hard to grow their communities. But even proprietary software companies -- like VMware, which acquired SpringSource, and Oracle, which acquired MySQL -- have gone to great lengths to continue development of the open-source code they've acquired.


Agility Is Within Reach
The sweet spot lies somewhere in between. The appropriate level of agility won’t be the same for everyone, but for all companies in all industries, we’ve found that being agile depends on developing two key attributes: strategic responsiveness and organizational flexibility. These two qualities are mutually reinforcing but are developed in different ways, and it is easy for a company to possess one without the other. But until you explicitly develop proficiency in both, you won’t have the agility you need. It’s an absence that will become all the more glaring. In PwC’s latest CEO study, more than half of CEOs surveyed said they believe they will be competing in new sectors in the next three years, and 60 percent said they see more business opportunities now than they did three years ago.


Cloud Native Application Maturity Model
Cloud native applications are built to run optimally on cloud infrastructure. Cloud native application architectures are very different than traditional tiered applications which are designed for a data center. In this post I will discuss maturity model, from the Open Data Center Alliance (ODCA), for assessing the cloud nativeness of an application. ... The Cloud Application Maturity Model from the Open Data Center Alliance provides a way to assess the cloud nativeness of an application, understand best practices, and plan improvements. Although, I would have used slightly different level names and terms, the differences are minor. Keep in mind that this model only assess the maturity of an application. To be successful, you will also need to build a DevOps culture. Perhaps we need a DevOps maturity model as well?


An SDN vulnerability forced OpenDaylight to focus on security
Security will be an integral component of SDN, since a flaw could have devastating consequences. By compromising an SDN controller -- a critical component that tells switches how data packets should be forwarded -- an attacker would have control over the entire network, Jorm said. "It's a really high value target to go after," Jorm said. The Netdump flaw kicked OpenDaylight into action, and now there is a security team in place from a range of vendors who represent different projects within OpenDaylight, Jorm said. OpenDaylight's technical steering committee also recently approved a detailed security response process modeled on one used by the OpenStack Foundation, Jorm said.


7 exceptional Windows hybrids ready for Windows 10
Hybrids, or 2-in-1s, offer decent mobility as laptops and tablets, and are reasonable candidates to take advantage of the features in Windows 10. They are good options for those wanting very portable notebook computers that can operate as tablets when that best fits the situation. Some hybrids use a display that rotates under the keyboard to form the tablet, while others have a detachable screen that operates independently from the laptop dock. The eight hybrids in this collection come in various shapes and sizes. There are devices at the top of the price range, and others more budget-friendly. Most in the hunt for a good hybrid that should run Windows 10 well should find one that fits their needs.


Rethink How Your Business Consumes Technology
Using a consumption-based IT management approach, you collect all pertinent data across the hybrid IT environment -- both internal operations and external sources, including public cloud, private cloud, virtual resources, traditional resources, network and applications. This usage data is enriched with business intelligence, allowing views of usage by department, geography, technology, and application. When the data is married with unit costs, a financial control plane is created, allowing IT to understand the cost of all IT resources in aggregate. By having the most up-to-date view of usage by user and costs, your reports and analytics show both the historical perspective across a variety of views that enhances forecasting.


New cybersecurity models driven by tsunami of data, devices
"If something happens that looks odd, it's not an immediate stop, it's just more that the security officer or someone will have a conversation and say, ‘I see you are trying to access this application that you don't normally access, is there a reason? Can you tell me why? Or are we seeing abnormal patterns?'" he said. "I think that is what we need to get into, which is almost like the machine is helping to tip and cue what looks odd. There may be a valid reason, or it may be a hardware or software issue, but there's just so much going on in an organization that if we are reliant solely on human eyes paying attention to it, we will miss things. We need the machines that can actually say, ‘I'm not exactly sure what's going here, but someone needs to take a look at it.'"


Making Agile Deliver Good Software
The key thing is to do it, to have the information exchange. The reason this is often a meeting of some form is because people don't do it unless they're made to. People go to meetings when they're told to. Well, mostly. But if you cajole people to do the information share it can work in other ways. Note that it's not just writing the information share that's important. You also have to READ it. Just as when you have a meeting it's not just giving your status update that's important but listening to everyone else's. That's why the meeting (when you have one) needs to be short. Remember that a standup is not just the tech team. It's the product owner from the business. The test people. Any support people. Anyone involved in what you're doing. You've got to find a way to keep all those people involved in what you're doing, preferably everyday.


IT Security Lessons from the World’s Biggest Data Breaches
Hackers see small business as easy targets. Often with less IT security measures and lots of valuable data to be had – small businesses across the country are at risk for data breaches. Don’t believe me? According to a survey by the National Small Business Association, 44% of small businesses have been hacked, with associated costs averaging $8,700. According to a study by the Ponemon Institute, that number is even bigger with 55% of respondents reporting a data breach. With risks and vulnerabilities only increasing as hackers continue to target small business, it’s important to explore takeaways from some of the world’s biggest data breaches and apply them to your organization’s IT security.



Quote for the day:

"The very essence of leadership is that you have to have vision. You can't blow an uncertain trumpet." -- Theodore M. Hesburgh