August 07, 2015

Everything you missed from the 2015 MIT Sloan CIO Symposium
CIOs are at an inflection point. Traditional methodologies and technologies that worked in the past may not work in today's high-speed, information age. CIOs need to adapt to both digital and platform business models and take the reins of their companies' digital transformation in order to succeed. But that's not all CIOs have to do to make it in today's digital business; they also must utilize new technologies like automated systems and the sensors and devices that make up the Internet of Things (IoT), they must collaborate with their C-suite colleagues and get further acquainted with the business side of operations. This CIO Essential Guide rounds up all of SearchCIO's coverage of the MIT Sloan CIO Symposium 2015.


How Microsoft Plans To Get iOS Apps Running On Windows 10
Objective-C does not necessarily understand Windows APIs. Apple is not going to go out of its way to make sure that it does either. That means that Windows APIs need to be able to understand Objective-C. Microsoft plans on performing this feat by “projecting” or binding Windows APIs into a new programming language. In previous versions of Windows, this was done for C++, JavaScript or .NET. Microsoft is taking the same approach and now tying it to Objective-C and other programming languages. The end result is that Objective-C should be able to read and execute Windows APIs.


Guardians of Governance – ICSA Roundtable
‘It’s important the company secretary is available for the non-executives to call between meetings to “take the temperature” of what’s happening in the company when they don’t want to trouble the chairman,’ observed Lawrence. ‘We have a board comprised of people from different countries and cultures, and non-UK directors can sometimes find it difficult to gauge the reactions of the board to specific issues as a result.’ Alison said that the makeup of a board with NEDs based in different countries, where the remuneration and audit committee chairman are based in the UK, require a regular communication flow to ensure all NEDs feel connected and able to fully contribute during board meetings.


FireLayers provides granular real-time mitigation for cloud- and web-based applications
FireLayers brings a full stack of security to cloud and web applications, as shown in the graphic. The baseline of security (shown in tan in the graphic) is application agnostic. FireLayers has the ability to analyze the conditions of the network, device, operating system and client to provide clarity of context of an attempt to login to and continue using any application. For example, FireLayers can analyze the IP address of the session, to see if it has a bad reputation, or if it suddenly changes during a session, which might indicate the session has been hijacked. Under the latter condition, the session could be dropped entirely, or the user could be prompted to re-enter his credentials.


10 Ways In Which Wearables Will Change Education
Angela McIntyre, research director at Gartner said: “Consumers will be able to integrate the data from most wearables into a single account where their data can be analysed using cognisant computing to provide useful insights to wearers. Funding initiatives from Qualcomm, Apple (HealthKit), Google (Google Fit), Samsung (S.A.M.I.), Microsoft, Nike and Intel, among others, will build on early innovation in wearable fitness and health monitoring and create the infrastructure for merging data relevant to health and fitness.” In addition to being able to track heart rates and count the number of steps of a user, wearables will revolutionise different aspects of everyday life, from sports to health, education to security.


Defining Your Data Quality Problems
The important thing to remember is that a Type I data validation or verification problem can be logically defined, and that means we can write software to find it and display it. Automated fixes are fast, inexpensive and can be completed with only occasional manual review. Think of Type I data quality problems as form field validation. Once valid, the problem disappears. We could estimate that Type I data presents 80 per cent of our data quality problems, yet consumes 20 per cent of our budget. Type II data needs the input of multiple parties so that it can be discovered, flagged up and eradicated. While every person in our CRM may have a date of purchase, that purchase date may be incorrect or not tally with an invoice or shipping manifest.


The Rise of Emotionally Intelligent Machines That Know How You Feel
Affective computing’s renaissance is no doubt being facilitated by the emergence of big data and its role in driving deeper machine learning, as we’ve seen in examples like Google’s Deep Dream software for artificial neural networks. Affective computing researchers are using the enormous, crowdsourced data sets of vocal, gestural, facial and physiological responses now available to them to push the technology further toward more natural interactions between humans and machines. Imagine if our computers could express empathy — it would change our relationships with machines. This push toward emotionally intelligent machines is also being helped along by improved sensors that are now becoming commonplace on handheld devices, and maturing distributed platforms


Want to Succeed With BI? Try Personal Accountability
Sometimes follow-through seems more like a quaint behavior that our parents and grandparents were concerned with rather than a basic responsibility. This behavioral shift has accelerated during the past few decades. It seems as though lack of discipline, failure to follow-through and reluctance to be held accountable for our actions now define the admired if not desired state. How did we manage to arrive at such dire straits? The American ideals of self-reliance, can-do attitude, initiative, innovation, and perseverance in the face of adversity have had their pristine images pitted and eroded over the past century. Learned helplessness is a self-fulfilling prophecy where an individual has certain expectations – positive or negative, true or false – about a person or a situation.


How to secure Windows 10: The paranoid's guide
You'll also want to look at each individual setting page to make sure that Microsoft and Windows have just as much access as you feel comfortable with. So, of course you want Windows' Calendar app to access your calendar data (obv) -- but share it with advertisers via App connector? I don't think so! Be sure to go through each setting even if you don't think they'll matter. By default, each and every privacy setting is set to give Microsoft and friends the maximum possible access. This is not a good thing. Moving on: Head to the Location settings and turn them off. While your PC probably doesn't have a GPS like your smartphone, you'd be amazed at how accurately your location can be pinned down using Wi-Fi access points and IP address.


SQL-on-Hadoop tools help users navigate enterprise Hadoop course
"Drill is not fully matured, but we think it will be," Fabacher said. The tool just became available in a 1.0.0 version in May, followed by a 1.1.0 release earlier this month that incorporated the window functions and auto partitioning sought by Cardlytics along with other new features. While the large ranks of SQL-skilled workers should give some comfort to organizations embarking on Hadoop journeys, the growing ranks of SQL-on-Hadoop options could be unsettling. Since the first days of Apache Hive, the field has become increasingly crowded. In a presentation at the 2015 Pacific Northwest BI Summit in Grants Pass, Ore., this month, Gartner analyst Merv Adrian listed 14 different tools -- and that's not a full count of what's available.



Quote for the day:

“Be a King. Dare to be Different, dare to manifest your greatness.” -- Jaachynma N.E. Agu

No comments:

Post a Comment