February 14, 2016

5 things we learned from Cisco’s acquisition of Jasper Technologies

From the strategic standpoint, Jasper offers a great solution for Cisco and its customers to manage, scale, and monetize their IoT services. Jasper reportedly has over 3,500 customers and 25 IoT service providers that have been using its platform across 100 countries. While Jasper can be classified as an IoT platform, it doesn’t directly compete with the IoT services provided by cloud providers such as AWS, Microsoft, or IBM. Instead, Jasper focuses on managing and automating the lifecycle of IoT services and solutions. From this perspective, Jasper not only provides Cisco with an extremely relevant customer base, but also with a highly developed IoT platform that can be extended with Cisco’s native IoT services such as security, advanced analytics, enterprise Wi-Fi, etc.


Internet of Things (IoT) Predictions

“IoT remains mired in smart light bulbs, net-connected cameras and wireless speakers,” opined Andrew Tarantola at Engadget, “the same sorts of bland, iterative use cases we’ve been seeing since the term was first coined.” Pam Baker atFierceBigData complained that “IoT data products were again in overdrive, many in outright overkill, and the same problems with data deluge still existed,” and Todd Hixon offered this on Forbes: “The fundamental problem is, there is still no killer app for IOT: something a large group of customers really care about and just have to have.” So what’s the state-of-the-IoT and where is it going? Here’s a summary of data and predictions from Forrester, Machina Research, the World Economic Forum (WEF), Gartner, and IDC


Are Employees Entitled to Any Sort of Privacy in the Age of Mobility?

With BYOD and the blurred lines of mobile technology for personal and professional use, how much privacy can a company reasonably offer its employees? One would assume a standard right to discretion; however, the way we share, monitor, and store information means we likely have little real privacy any more. ... Binding contracts are an everyday occurrence in our interconnected world. Staying informed of these obligations is your best defense when it comes to protecting the company’s interest while providing employees some level of personal privacy. Sadly, data agreements are becoming common that they’re easily ignored. Employees may not take the time to read through every policy they come across—but it is important that they do so when it comes to BYOD.


Why Bitcoin Governance is a Competition (And That's a Good Thing)

Bitcoin may have some of the strongest network effects possible because incompatible versions of the software won't recognize each others' blocks, transactions, or mined coins. A miner on the "minority" side of a hard fork will mine bitcoins that are incompatible with the majority side, so those coins will be less useful and naturally worth less. And as more move to the majority side, "minority" coins will rapidly approach zero value, making switching a rational imperative, to be executed quickly. These dynamics make for a "winner-take-all" bitcoin software market, and they make it very unlikely that bitcoin will "split". If a split were to happen, it would be because the cryptocurrency market was big and diverse enough for two coins, fairly seamless exchange among the two coins existed, or both of those things.


The challenges of online payment in Nigeria

There are a number of issues that must be dealt with by the Nigerian e-payment companies which include that fact fraud must be tackled and online security improved. This should go with massive enlightenment campaign that is necessary to build confidence and this is where partnership with the media is key.  ... Finally, I believe players in the financial tech ecosystem have to find a way to improve the process of reconciliation. The way things are at the moment, the banks are currently feeding fat in this whole arrangement to the detriment of start-ups. As a start-up, when a client pays you using any debit card in Nigeria; you don’t get it instantly. You must wait for x number of days before the reconciliation is done.


These 3 things are trying to kill Linux containers

The “fauxpen” threat isn’t new — we’ve seen it first with Unix and most recently with cloud computing solutions, particularly platform as a service (PaaS) and OpenStack-based offerings that are ostensibly open but layer proprietary technologies on top of open-source foundations. Linux containers, however, are early in their adoption cycle for enterprise IT; if proprietary hooks are landed into the technology now, it’s almost a sure thing that IT’s mood will sour on what should be an innovation, not a continuation of proprietary legacy systems. From closed stacks to exorbitant licenses to greatly-scaled back innovation, adding “fauxpen” code to the foundational technologies built on the blood, sweat and tears of the community can quickly dampen enthusiasm and breakthroughs around the open base.


The truth about Storage Data efficiency ratios.

We’ve all heard the marketing claims from some storage vendors about how efficient their storage products are. Data efficiency ratios of 40:1 , 60:1 even 100:1 continue to be thrown around as if they are amazing, somehow unique or achieved as a result of proprietary hardware. ... Funnily enough, one vendor even offloads what VAAI/VCAI can do (with almost no overhead I might add) to proprietary hardware. Either way, while VAAI/VCAI clones are fantastic and can add lots of value, claiming high data efficiency ratios as a result is again mis-leading especially if done so in the context of being a unique capability. ... When comparing between vendors, if done in a fair manner, the differences are unlikely to be significant enough to sway a purchasing decision as most modern storage platforms have more than adequate data reduction capabilities.


Why Agile Testing Needs Deprogramming

One of the problems for myself, I was previously a hard-core waterfall disciplinarian. As I worked on avionics, I originally thought “No way will this Agile thing ever work”. Because when I was testing avionics someone would pretty much come along with a forklift truck, drop these massive phone book size requirement documents through and say “That’s what you are going to test guys”. So you’d go through and you’d almost become like a legal eagle on these requirements going, “oh requirement x23 this requirement countermands that requirement” and you would build your testing on mapping all this preplanned complexity. When people said to me that you put together a story which is a small thing, it’s not even a requirement, it’s a slice of a requirement shocked me. How do you go around testing something that isn’t defined, my brain would say? But how? And that to me was the huge challenge.


The Hybrid Cloud and Information Management: A Practical Option for Food Manufacturers

In a hybrid cloud environment, organizations can connect private or public cloud-based solutions with on-premises systems in order to best meet operational needs and compliance requirements. A hybrid cloud can be architected and deployed in any number of ways, and this flexibility is one of many reasons it is so appealing to food manufacturers, particularly for enterprise information management (EIM) initiatives. For example, if there is a need to maintain specific content on-premises for operational or compliances reasons but the organization wants to leverage the cloud for sharing non-confidential information with suppliers, then the hybrid cloud becomes a viable option.


The Holy Grail of EA – Agile Planning

Or if the COO asks how the new mobile devices that were deployed to field personnel is impacting the customer score, you should be able to show where the mobile devices sit in the technology platforms (T-view), which application systems (S-view) are using those platforms, the operational capabilities (O-view) that are enabled by those system, and finally how all these elements are related to products sold to specific customer segments through specific channels in order to meet specific strategies and goals (B-view). The ability to do this is not a pipe dream. The BOST Toolkit is a standard offering from Informatica’s Business Transformation Services (BTS) team.



Quote for the day:


"The only real mistake is the one from which we learn nothing." -- John Powell