April 25, 2015

Progressive CIO: 'We're Way Ahead' on Big Data
It's also true that as we have expanded into big data, and Snapshot helped us with that, obviously; we have so many billions of records that are accumulated there, and given our focus on segmentation we've always looked pretty far back in history. So we've had large data stored. But as we see the data horizon out there, we're keeping an eye on the ability to -- I suppose ‘mash-up’ is the word people would use -- our traditional data with our big data, just like everybody else. But as the technology has emerged over the last four or five years, we certainly didn't wait for the integration between traditional and big data to emerge before we jumped into the big data to make sure that we could understand.


Cloud security reaches silicon
The principle behind the scheme is that, whenever a chip needs to fetch data from a particular memory address, it should query a bunch of other addresses, too, so that an adversary can’t determine which one it’s really interested in. Naturally, this requires shipping much more data between the chip and memory than would otherwise be necessary. To minimize the amount of extra data needed, the researchers store memory addresses in a data structure known as a “tree.” A family tree is a familiar example of a tree, in which each “node” (a person’s name) is attached to only one node above it (the node representing the person’s parents) but may connect to several nodes below it (the person’s children).


How to balance data privacy and healthcare improvements
On the security front, the researchers recommend encrypting health data both in transition and at rest, noting that companies in the health space have become popular targets for cyber criminals. "Health data has become incredibly valuable," De Mooy says, citing recent high-profile breaches at insurance providers as a "telltale sign" that hackers are gunning for the healthcare sector. On the public-sector side, she notes that the government is in a unique position, acting at once as a payer and a provider, as well as the largest single steward of citizens' health data. In that light, both federal agencies and their contractors have a heavy burden when it comes to privacy and security.


Security Experts Hack Teleoperated Surgical Robot
The robot consists of two surgical arms that are manipulated by a surgeon using a state-of-the-art control console which includes video and haptic feedback. The robot itself runs on a single PC running software based on open standards, such as Linux and the Robot Operating System. It communicates with the control console using a standard communications protocol for remote surgery known as the Interoperable Telesurgery Protocol. This communication takes place over public networks that are potentially accessible to anyone. And because the robot is designed to work in extreme conditions, this communications link can be a low-quality connection to the internet, perhaps even over wireless.


Expert’s Thought on Project Management- Interview with Kannan Subbiah
The Architects had the biggest challenge, as they had to have a holistic view of the product and just not the current user stories being discussed. While they don’t need a detailed specification, what they needed was a blueprint of the business processes that is being automated, so that they can visualize how the smaller user stories are going to fit into the overall product architecture and what are the other dependent processes.What they also needed to consider was the unstated requirements that might come in any time. Documentation is another thing that made the difference. For developers, it was easy as they just needed to focus on the much smaller user stories every time when they take up a task, whereas the business and process analysts found it challenging to get a complete view.


Everyone has a part in the digital forensics process
Organizations need to discuss the role of digital forensics, even to those in non-technical roles. Without holistic consideration, there will not be data to utilize in a cybersecurity investigation. Digital forensics is used in conjunction with other business areas to investigate issues such as insider threats. In 2014, insider threats composed up to 35 percent of information security incidents. Digital forensics and compliance becomes increasingly difficult if IT policies are not practiced as suggested under ISO 27001:2013 or NIST 800-53. As mentioned in the white paper: In 2013, US President Barack Obama issued Executive Order (EO) 13636 to improve critical infrastructure cybersecurity.


5 Ways to Get Over Your Perfectionism
Recent research has shown that, in extreme cases, perfectionism can be a factor in everything from workaholism to an increased risk of suicide. "There’s nothing wrong with setting high standards," says Martin M. Antony, a professor of psychology at Ryerson University in Toronto, and co-author of When Perfect Isn’t Good Enough. "If you're setting standards that can't be met, and your whole self-worth is based on whether or not you meet those standards, then it causes problems for you." Problem perfectionism can cause issues like depression, anxiety, eating disorders, and other issues, Antony says. If you find that your perfectionism is having a negative impact on your life, it’s time to start working on it, he says.


How Cloud Has Changed the Data Center Architect
Cloud computing has made a big impact on the resiliency of the modern data center by helping extend complex resources over vast distances. The data center architect must understand what happens during a disaster event. New kinds of DCIM tools create visibility spanning multiple data center points and allow you to see how resources are being utilized. New methodologies around global server load balancing allow users to be dynamically redirected to the data center with available resources. Bottom line: There is a lot more automation, orchestration, and intelligence built into the modern data center to help support the cloud. Today, data center architects must be aware of those kinds of tools and how they help extend their data center infrastructure.


Q&A with Sandro Mancuso about The Software Craftsman
A small and quick feedback loop is what enables agility. However, if you only have an improvement in the process but still keep the same old developers working in the same old way when it comes to software development practices, being surprised that things are not better seems very naive to me. More and more we are seeing companies and managers complaining about Agile and saying that this Agile thing doesn’t work. Yes, that’s also one of the symptoms of the Agile Hangover.  On a more positive note, Agile processes are helping companies to visualise their problems faster and putting them in a better position to fix their issues, which includes improving their technical capabilities.


IT survival in a digital world
To be clear, traditional IT and the CIO are not going away anytime soon. Businesses and the government run on datacenters and applications that require traditional infrastructure and skills. The deep reservoir of existing systems is not going away anytime soon, which should give some solace to folks with traditional IT skills. However, the writing on the CIO wall is clear: embrace digital technologies, skills, competencies, and business models or your value and influence will decline. Research from PricewaterhouseCoopers on CEO perspectives about digital business reinforces the increasing pressure that IT and the CIO will experience going forward.



Quote for the day:

"Don't blow off another's candle for it won't make yours shine brighter." -- Jaachynma N.E. Agu