August 22, 2015

5 Reasons Not To Buy An iPhone As Your Business Phone

The iPhone is popular, but it still only accounts for about 14% of worldwide smartphone market share as compared to Android’s 79%. In actual numbers, 1.1 billion Android-based phones are expected to ship in 2015 vs. 237 million iPhones. When I search Verizon Wireless’ website there are 9 iPhones available as compared to 29 Android options made by six different vendors from Google to HTC to Motorola to, of course, Samsung. Android is an operating system that can work on many different devices whereas iPhone’s operating system iOS only works on devices made by Apple. Even though I’ve decided to get another Samsung I like having the flexibility to choose other hardware devices that fits my and my company’s needs and I don’t get that with Apple.


Make the right choice between Hadoop clusters and a data warehouse

There's no doubt that Hadoop has a place in the enterprise, especially as big data applications take hold. But the venerable EDW has a well-established presence in data centers, and after years of refinement plays a significant role in meeting the reporting and analytics needs of most organizations. Does the emergence of Hadoop mean it's time to abandon the EDW? Some IT and data management professionals are aching to use Hadoop as a replacement for the data warehouse -- but are companies really prepared to abandon their decades-long investments in EDW infrastructure, software, staffing and development?


Initiation to Code

If you don’t take the time to check up on your mentees and listen to their concerns, travails, and triumphs, then you will have no metric for achievement. Employing agility as a mentor requires sensitivity, creativity, and solid communication skills. It also requires the foresight to see what your mentee should be aiming for, and the hindsight to see what your mentee has already accomplished. To establish a framework for gauging your mentee’s progress, consider the three phases every new team member goes through in some form. The first phase is total unfamiliarity and constant discovery; the second is a transitional period with a clear trajectory of progress; and the third is self-driven competence. In all three phases, remember that agility remains your most vital tool.


CISOs facing boards need better business, communication skills

According to a June study by Fidelis Security and the Ponemon Institute, 26 percent of board members admit to "minimal or no knowledge" about cybersecurity, and only 33 percent say that they are "knowledgeable" or "very knowledgeable." ... 70 percent of board members said that they understand the security risks to the organization, but only 43 percent of IT security professionals agreed that the board understood the security risks to the organization.. Only 18 percent of IT security professionals rated their companies' cybersecurity governance practices as very effective -- compared to 59 percent of board members. This is a difficult communications gap that needs to be addressed on both the board level and by CISOs themselves.


Why every website should switch to HTTPS

Two major problems exist for two different classes of websites. First, for larger websites that use many third-party services (ad networks, CDNs, etc.), all of those services need to support HTTPS before the main website can switch to HTTPS. Slowly, these services are starting to support HTTPS, which means it will be easier and easier for larger websites to switch to HTTPS. Second, for smaller/non-profit websites the process of getting and installing an HTTPS certificate is a pretty confusing process. New tools like SSLMate and Let's Encrypt are starting to make that process easier and more automated, so that making your small website HTTPS is a fast and easy process.


Strategy, Not Technology, Drives Digital Transformation

Executives who think they're in a technology arms race are focusing on the wrong area: The 2015 Digital Business Global Executive Study and Research Project byMIT Sloan Management Review and Deloitte identifies strategy, not technology, as the key driver of success in the digital arena. Conservative companies that avoid risk-taking are unlikely to thrive — and they'll also lose talent, as employees across all age groups want to work for businesses committed to digital progress. The report is available online and as a PDF, and the online version includes a Digital Business Interactive Tool with interactive charts to explore the data set.


Ashley Madison Breach Should Spark Security Conversation

Some security experts have noted that the breach could be a lot worse, at least in terms of compromising credit card information. According to Robert Graham's security blog: "Compared to other large breaches, it appears Ashley-Madison did a better job at cybersecurity. They tokenized credit card transactions and didn't store full credit card numbers. They hashed passwords correctly with bcrypt. They stored email addresses and passwords in separate tables, to make grabbing them (slightly) harder. Thus, this hasn't become a massive breach of passwords and credit card numbers that other large breaches have lead to. They deserve praise for this." However, the account names, street addresses, email addresses, and phone numbers used to register for the site were not encrypted.


A Phish Story

"When they target somebody, they have to set something up so maybe they'll send out an e-mail that says, 'Your PayPal has been compromised' or 'Your e-mail has been compromised.' ... "The hackers may not even say that the victims' e-mail has been compromised. They may just say, 'You've been locked out of your e-mail' or 'There's some maintenance that needs to be done on the e-mail server' or 'Click here for new information.'" Barney says never click on an unfamiliar link. Often, such links will lead to a site designed to look like a legitimate, trusted site but will have a slightly different Web address. Other times it may take the user to a blank screen. Either way, the hackers' goal is to gather information that will help them steal valuable data.


Five open source Big Data projects to watch

Take a look at the Apache Software Foundation's (ASF's) list of projects and you may feel overwhelmed. Between top-level and incubating projects, there are far too many to keep track of. Filtering down the list to Big Data projects may not help, because that "smaller" list is still quite long. And don't forget that there are several noteworthy open source projects that aren't even under the ASF umbrella to begin with. So, in the name of helpful triage, here are five projects to keep an eye on:


How to reduce IT complexity and increase agility

"Complexity is the result of a diversity of footprints, of tools, of workforce," says Christopher Rence, CIO of Digital River, a provider of e-commerce, payments and marketing services for merchants. Rence knows whereof he speaks: He's lived through three acquisitions in the last four years, and has seen the residue of the 20 acquisitions that the company has experienced since 1994. "One company we acquired had nothing but white-label hardware. It didn't have an asset value, but it was doing a lot of processing," Rence recalls. In preparation for conducting a strategic migration of the data through a gateway into a SaaS solution, "we had to do a full inventory of what those homegrown products were doing," says Rence. "It required understanding some of the undocumented knowledge.



Quote for the day:

“Whether driven by ambition or circumstance, every career gets disrupted.” -- Jay Samit