September 10, 2015

Microsoft turns to Dell to push the Surface Pro into enterprise

"In some respects, it gives Microsoft a missing piece of what they needed to move more Surface Pro devices," countered Moorhead, sticking to the interpretation of a distribution deal. "There's a lot more to it than just having a really good product when you're dealing with a Fortune 500 company." Neither Microsoft nor Dell said whether the deal is an exclusive, but Moorhead believes it is, at least a time-constrained one, pointing out that Microsoft posted a video clip of Dell CEO Michael Dell promoting the partnership. "Innovation isn't just about great devices. It's about partnerships that bring together products, software and services to deliver extraordinary customer value," said Dell.


Cybercriminal Gang Extorts Businesses Via DDoS Attacks

"Your site is going under attack unless you pay 25 Bitcoin," one email stated. "Please note that it will not be easy to mitigate our attack, because our current UDP flood power is 400-500 Gbps, so don’t even bother." The email goes on to inform the target that a low-level DDoS attack was being launched against it to demonstrate the seriousness of the threat. The attackers promise never to threaten the victim again if the ransom is paid up: "We do bad things, but we keep our word." Subsequent emails warn the victim against ignoring the ransom demand. "And you are ignoring us. Probably because you don’t want to pay extortionists. And you believe that after sometime we will give up. But we never give up," the follow-up messages read.


6 Incredible Ways Big Data Is Used by the US Government

Big Data use in Government certainly presents big challenges – officials and politicians have a fine line to tread if they do not want to come across as attempting to implement a real-life version of Orwell’s Big Brother. It is certainly terrifying to think of the uses a modern-day Hitler or Stalin could find for the data and technology we have available today. After all, if the US Government can use it then so can any ruling administration – many of which are subject to even less regulation, and their citizens less free to scrutinize and hold them to account. However with the right balances in place – such as robust regulation and protection of “whistle blowers” – I believe it can be used for great positive social change - as demonstrated by the projects I’ve mentioned in this article.


How Big Data May Bring Some Sanity to the Holiday Shopping Rush

“The technology requirements are much greater than consumer travel,” Bob Mylod, former head of worldwide strategy and planning at Priceline, said in an interview last year. “In some ways, we’re talking about a different industry, but the transactional dynamic is the same.” Mylod is the managing partner of Annox Capital, which is an investor in Freightos. While the upstarts are leading the innovation race, industry giants aren't ignoring the trend. Deutsche Post has invested millions upgrading its freight-forwarding business, though a planned rollout of SAP software was shelved because of a negative impact on earnings. Flexport's chief executive officer, Ryan Petersen, says the company is using money from a recent $22 million funding round to boost head count.


Data Security: Hunkering Down at NYU Langone

Hospitals are merging, and depending on the size of the merger, they aren’t integrating technologies, more so creating interfaces only. It is hard to standardize across the board, and it is very difficult to implement. It takes a long time. I compare it to where I came from, NewYork-Presbyterian Hospital and University of Medicine and Dentistry of New Jersey. Every organization has pluses and minuses. IT is centralized at Langone, so that’s a plus. Other organizations are completely de-centralized or just starting to centralize their environments. This makes it easy for us to administrate the systems we have in place. Leadership is also relatively new. At some hospitals, people have been there for 30 or 40 years, and it’s hard to get that culture change. But at Langone, there is a security focus and it helps us get stuff done.


New Teams, New Tools — Why Compliance Must Collaborate

The trick is to find tools that meet these varying needs — and that work together in lockstep, creating a single integrated and user-driven framework. Compliance and legal must be able to utilize these tools without relying on IT, and they must be capable of retrieving and analyzing multiple sets of data previously stored in various locations under varying terms. Having a single, secure platform is preferable since it allows data to be gathered, consolidated and integrated across servers, systems and users — and also enables greater collaboration both within and across functions. The new solution is one that embraces new processes and best practices and breaks down the silos between Compliance, Legal and IT, thus fostering greater collaboration between the functions


Breaking Down Data Silos with Foreign Data Wrappers

The digital revolution is wreaking havoc on data management systems. The rapid growth of data has made it more difficult than ever for companies to store, manage and make sense of the information they collect. At the same time, as data becomes more varied, enterprises are not only harnessing massive amounts of structured data from a growing network of connected devices but also semi-structured and unstructured data as well. As a result, the need for solutions that can support multiple data types has turned the typical data center into a patchwork of data management technologies used to handle the volume, velocity and variety of big data. These include relational databases, standalone NoSQL solutions and specialized extensions to handle geographic data, to name a few.


A day in the life of a social CIO

Chou takes social seriously, but he doesn't feel the need to post, or check in, every hour. "People always believe that people who are extremely engaged in social are on it 24/7," he says. "If I have a five-minute or 10-minute gap. I will take a look at what's going on, I'll check my notifications, but I'm not constantly on my phone checking the social stream." ... During the past year, Chou started blogging, and he tries to regularly share ideas on LinkedIn's publishing platform. He enjoys the feedback he gets on industry-specific topics and leadership, and thinks it helps him grow personally. "Part of the reason [I blog on LinkedIn] is it forces me to really get deep into a topic and try to research it and learn as much as I can so I can really write about it," Chou says. "It's something to force myself to dig a few levels deeper on a topic of interest."


The Difference Between Business Intelligence and Real Data Science

BI requires concerned analysts to look at the data backwards, namely the historical data, and so their analysis is more retrospective. It demands the data to be absolutely accurate, since it is based on what actually occurred in the past. For example, the quarterly results of a company are generated from actual data reported for business done over the last three months. There is no scope for error as the reporting is descriptive, without being judgmental. With regard to data science, data scientists are required to make use of predictive and prescriptive analyses. They have to come up with reasonably accurate predictions about what must happen in the future, using probabilities and confidence levels.


SDN 101: An Introduction to Software Defined Networking

Part of the confusion that surrounds SDN is that many vendors don’t buy in totally to the ONF definition of SDN. For example, while some vendors are viewing OpenFlow as a foundational element of their SDN solutions, other vendors are taking a wait and see approach to OpenFlow. Another source of confusion is disagreement relative to what constitutes the infrastructure layer. To the ONF, the infrastructure layer is a broad range of physical and virtual switches and routers. As described below, one of the current approaches to implementing network virtualization relies on an architecture that looks similar to the one shown in Figure 1, but which only includes virtual switches and routers.



Quote for the day:

"Organizations are most vulnerable when they are at the peak of their success." -- R.T. Lenz