October 22, 2012

Forget Bring Your Own Device - Try COPE (Corporate Owned, Personally Enabled)
Plenty of IT departments see BYOD as a demon to be exorcised from the cubicle farms - or an opportunity to dump the responsibility for hardware upkeep on their internal customers. Rather than struggle with BYOD, some companies are turning the whole concept of BYOD on its head in favor of Corporate Owned, Personally Enabled (COPE) policies.


Enterprise sends Windows 8 to the grave before launch
Reuters reports that for a number of corporations, Windows 8 does not suit the enterprise market enough to warrant widespread adoption and movement away from Windows 7. Doug Johnson, head of risk management policy at the American Bankers Association, told the publication:


Microsoft hoping to lure VMware users with new migration tool
Microsoft's free Virtual Machine Converter (MVMC) tool is now available for download. The tool is used to convert virtual machines that today run on VMware products into a format compatible with Microsoft's own virtualisation environment, Hyper-V, the company said last week.


Few Takers for India's Auction of Mobile Spectrum
The Supreme Court ordered 122 licenses canceled in February, and the spectrum thus freed to be auctioned again, after it ruled that the allocation of licenses in 2008 had been manipulated by business interests. ... The lukewarm response to the auction can be put down to investors' concerns after the country's flip-flops on investment policy in a number of areas,


The Enterprise Architecture design has to begin with the whole rather than the parts
IT has currently have quite a few architecture diagrams. In fact, everybody seems to have a model in his drawer. But this is also the problem since these models don't add up to give the big picture. And they don't, since they were not produced to that purpose, but in isolation, with different tools, conventions, naming, scope and purpose in mind. 


Slow Down to Speed up EA Results
As an EA, what is most important? Some will say one versus the other but I believe EA’s real value is to focus on the Speed to Value. We will always have edge cases where we do the Speed to Market. But using the 80/20 rule the real value for EA’s is through Speed to Value.


It’s time for robust data handling
In the age of big data, bring your own device (BYOD) and, yes, multiparty collaboration, there’s an increasingly massive amount of data that you can’t lock down behind the firewall. And if it’s going to be released into the ether anyway, then the safe approach is to turn to solutions that are completely focused on solving the challenges that current trends present.


SOLID design principles improve object-oriented development
SOLID is a set of five guiding principles that help developers design objects that are easy to maintain and use. Like many similar sets of principles in OO, SOLID is a guide not the goal. Let’s take a look at each of the five principles.


Big Data: Moving from strategy to tactics
Big Data, which comes into the enterprise unstructured and unorganized, first needs to be “prepped” so that it can be processed by a business analytics program. Here’s what you need to do.


Trend Micro's Q3 threat report: Mobile malware surged from 30K to 175K
Specifically, Trend Micro said that malware targeting Android increased nearly sixfold in Q3 2012 to approximately 175,000 malicious and "potentially dangerous" high-risk Android apps between July and September.



Quotes for the day:

"Never assume the obvious is true." -- William Safire

"One of the tests of leadership is the ability to recognize a problem before it becomes an emergency." -- Arnold Glasow

No comments:

Post a Comment