October 25, 2015

6 Keys To Big Data Victory

If you look at big data as something that happens inside your organization’s current boundaries, that uses technology to process data and discover signals, and then to deliver those signals in established ways, you will get some value. Bigger wins come from using big data and a data lake to support a much wider and deeper effort. This expansion can only happen when users (whether analysts or product engineers), software engineers, data management professionals, DevOps, and business experts all work together. A data lake is perfectly suited to enable such a cross-functional team to thrive. Instead of seeing part of the picture, you can see all of it, going years back, in great detail, illuminated by powerful analytics.


Featured Interview: Jim Machi on Dialogic’s Vision for NFV

NFV is more than just separating the network function software from the proprietary hardware; it also involves additional management and orchestration functionality that controls how application capacity is scaled out and up, how applications are chained together to support an end-to-end service and the interaction with the underlying virtual compute, storage and networking infrastructure. The scope of NFV includes all these moving parts come, but service providers don’t have to wait to really start to take full advantage of the benefits of a cloud infrastructure. And not every one of our customers have the resources like the larger tier one service providers to be on the forefront of this technology turn, or is even ready for deploying a comprehensive orchestration capability


Google Is Working On A New Type Of Algorithm Called “Thought Vectors”

Part of the initial motivation for developing “thought vectors” was to improve translation software, such as Google Translate, which currently uses dictionaries to translate individual words and searches through previously translated documents to find typical translations for phrases. Although these methods often provide the rough meaning, they are also prone to delivering nonsense and dubious grammar. Thought vectors, Hinton explained, work at a higher level by extracting something closer to actual meaning. The technique works by ascribing each word a set of numbers (or vector) that define its position in a theoretical “meaning space” or cloud.


Watch Out, China: Google 'Ignites' Hong Kong, Taiwan Start-Ups

For decades, Hongkongers worried that their rote-education system was stifling entrepreneurship. Moreover, outsized profits from real estate speculation attracted those who thrived on risk. ... Finally, Hong Kong has become a start-up hotspot. And companies like Google are joining the effort. The iconic American brand has put its financial muscle behind developing marketing talent, teaming up with 40 partners across Hong Kong to launch “Google Ignite.” And that’s not all. Along with the Center for Entrepreneurship of the Chinese University of Hong Kong, Google is behind the EYE Program, which is promoting the ten best start-ups in the city. Chan’s and Lau’s Sam the Local has been selected as one of them.


SDN will play key role in mobile network security

The bottom line? First, SDN is the key direction for networking today, and, while the benefits of SDN extend far beyond security alone, security needs may very well provide the key justification for its implementation. Policy-based SDN is an ideal vehicle for implementing -- and updating as new threats are identified -- security across the entire network, right to the mobile edge. Virtualization enables the transparent and universal implementation of key security functionality. Ultimately, there is no easier or more effective strategy for mobile security -- and security overall. A cautionary note: The programmability that is essential to SDN requires its own security; the viability of SDN itself is called into question if, for example,an SDN controller is hacked.


The Cloud Architect: A Necessary Evil?

The title “Architect” is a problematic one, as there are Data Architects, Infrastructure Architects, Application Architects, Technical Architects, Enterprise Architects (EA), and many, many more. However, as the drive to Modern (i.e., Cloud) Architectures continues, we are now seeing references to “Cloud Architects”. This title seems to be a necessary evil, as the move to cloud-based architectures is inevitable. ... Taken together, this expansion has increased the pressure for Architects to now focus more on Enterprise-wide thinking, as both the size, scale, and breadth of componentry has exploded to include many services that are no longer under the direct control of the Architect.


Hiring good tech people: Where to start?

“The problems we’re trying to solve are pretty difficult,” he said. “Making the wrong hiring choice can really be a disaster.” He added that with a staff as small as his, “the next person hired is a major contributor.” ... A key to finding good talent is making sure your job description is precise, so that you don’t waste your time or prospects’ time, said one participant. “Your job description better reflect on what they’ll actually work on,” he said. Though one attendee noted a company that has no job descriptions, something that he said he liked, although others in the crowd were shaking their heads and rolling their eyes. “I do like that because I can’t focus on anything for too long…that’s why I like going to this Unconference,” he said, drawing a laugh.


Defense Intelligence Analysis In The Age Of Big Data – Analysis

The big data phenomenon presents defense intelligence with a range of opportunities, from off-the-shelf tools to complex business-process reforms. Some tools can be absorbed wholesale by the IC; for example, social networking tools such as Wikis and Chat are already being used to facilitate better collaboration between analysts. Beyond simple software acquisitions, however, disruptive information technologies have birthed a number of trends in how data are collected, moved, stored, and organized. Four of the most salient prevailing concepts, which are already transforming the economy and society, could reshape all-source intelligence.


Global government spending on Internet of Everything skyrockets

Global spending at all levels of government for IoT will reach US$1.2 trillion in 2017, according to a recent IDC Government Insights forecast. “Government overall is one of the fastest-growing sectors with respect to IoT,” said Ruthbea Clarke, IDC's smart cities research director. “I think there’s starting to be less confusion around understanding what it is.” Traditionally, governments worldwide have been slow to adopt IoE due to a variety of reasons. In developing countries, governments are usually dealing with typically not enough infrastructure, notes Clarke. They are busy building new cities and trying to scale to demand quickly and safely. In more developed countries, such as the United States, that are quite urbanized already, the infrastructure is in place but is often old and in need of modernization.


Serilog - An Excellent Logging Framework Integrated With .NET Applications

Logging is an approach to record information about a program's execution for debugging and tracing purposes. Logging usually involves writing text messages to log files or sending data to monitoring applications. ... If you start your application and logging is enabled, logging information is sent to the configured logging destination like a log file, console or database. Serilog is an excellent logging framework and has been active for years. Unlike other logging libraries for .NET, Serilog is built with structured log data in mind. This framework is built around the idea that log messages should be more than a collection of strings. Log messages are preserved as structured data(JSON) that can be written in document form to a variety of output providers.



Quote for the day:

"Science can amuse and fascinate us all, but it is engineering that changes the world." -- Isaac Asimov

No comments:

Post a Comment