August 18, 2012

Implementing COBIT 5—An IT practitioner’s view eight months later
Vector took a chance last year and decided from the get-go to adopt COBIT 5 whilst it was still in exposure draft. ... So what have been the biggest challenges for us so far? Three come to mind...

Deep Data and the Semantics of Local
Surely local search can do better. Businesses want to provide rich information about their products and services, and consumers want and need that information in order to turn local search from a frustrating experience into a useful and productive one.

Doing business in India difficult: Dell
A combination of power blackouts, uncertain tax rules and contracts that are not honoured make India a difficult place to do business, a senior Dell Inc executive said on Friday in unusually blunt comments by a foreign investor.

Rackspace Launches OpenStack-based Private Cloud Software
Rackspace, a hosting and cloud computing provider, yesterday announced the release of Rackspace Private Cloud Software, powered by OpenStack - making it simple and easy for companies to install, test and run a multi-node OpenStack based private cloud environment.

Heroic Leaders and Passive Followers
As leaders, if we take too much control and do not encourage others to take responsibility, we set ourselves and others up for failure. Roger Martin calls it the responsibility virus and it always begins with the germ of fear. 

Microsoft’s Free Security Tools - Attack Surface Analyzer
Attack Surface Analyzer can help software developers and Independent Software Vendors (ISVs) understand the changes in Windows systems’ attack surface resulting from the installation of the applications they develop.

The Big Data Definitions Merriam-Webster Forgot
The lexicographers had clearly missed several opportunities to capture the big data zeitgeist. As a certified word nerd, it is my sworn duty to aid them. Herewith is an abridged list of new words and their official definitions, supplemented by my additional definitions in italics.

Malware wars heat up: Shamoon steals, wipes and leaves PCs unbootable
There is speculation that it spreads via an executable hidden in an email attachment that if opened on a Windows computer, "It can be difficult getting anything working again," warned Symantec researcher Liam O Murchu. “If your computer gets hit and you can't reboot, you have a real problem,” Techworld reported.

Researcher finds serious SMS spoofing flaw on iOS
A security research who goes by the handle "pod2g" has found a serious security vulnerability in the way iOS devices handle SMS messages, warning that this could be exploited by online criminals. The flaw, which the researcher describes as "severe," exists since the beginning of the implementation of SMS in the iPhone, and is still there in iOS 6 beta 4.

Quotes for the day:

"You got to be careful if you don't know where you are going, because you might not get there." ~Yogi Berra

"You have to think anyway, so why not think big?" ~Donald Trump

1 comment:

  1. I'm happy I found this blog! From time to time students want to cognitive the keys of productive literary essays composing. Your first-class knowledge about this good post can become a proper basis for such people. Thanks.
    bar sets with stools