November 15, 2012

BI Strategy: BI Competency Centers Take Center Stage… Again!
As data grows in size and complexity, organizations are struggling to meet the ever increasing demand for analytics and BI Competency Centers (BICCs) are in the spotlight – once more. Ironically, despite the projected 80% annual growth in data and the projection of 50% of enterprise employees use of analytics by 2014 (and 75% by 2020), most organizations today only have a 10% BI adoption rate.

Keyloggers: The Most Dangerous Security Risk in Your Enterprise
Keyloggers are on the rise and they are no match for even the most security-conscious organizations. Just look at some of the names done in by a tiny chunk of code in the last 12 months: RSA, Lockheed Martin, Epsilon, Oakridge Nuclear Weapons Lab, Sony, Iranian Nuclear Program and Linked-In to name just a few. Keyloggers have been around for a long time, but today they may be the most dangerous threat an enterprise faces.

How IT fails PM
In his previous blog, Michael Hatfield blathered on about how project management techniques often fail to perform as advertised in the information technology world, and for what reasons. Now, he wants to examine how information technology fails project management in general, and for what reasons.

NASA scrambles to encrypt laptops after major breach
Keegan told employees that the stolen laptop contained sensitive "Personally Identifiable Information" (PII) about a large number of NASA employees, contractors and others. "Although the laptop was password protected, it did not have whole disk encryption software, which means the information on the laptop could be accessible to unauthorized individuals," Keegan warned.

Ballmer decided Windows chief Sinofsky was too divisive
A Microsoft executive familiar with the thinking of senior management said there was no single event that led to Sinofsky's exit. Instead, relations between Ballmer and Sinofsky frayed as development on Windows 8 progressed.

Windows Virtual PC VHDs for testing websites with Older IE versions
In order to help web designers and web developers test their websites in older versions of Internet Explorer, we've provided the following VHD with Windows set up with the specified version of Internet Explorer. The images are patched with the latest security updates and are otherwise clean installs of the operating system with very few modifications.

Texas Cloud Computing Lessons Learned
Late last week the Texas Department of Information Resources (DIR) released an important whitepaper that reviewed it's multi-year Pilot Texas Cloud Offering (PTCO). This project was designed to allow a small group of agencies to choose a virtual private cloud-based infrastructure as a service from a marketplace of service providers made available by a cloud broker

First All-Carbon Solar Cells
Using a grab bag of novel nanomaterials, researchers at Stanford University have built the first all-carbon solar cells. Their carbon photovoltaics don’t produce much electricity, but as the technology is perfected, all-carbon cells could be inexpensive, printable, flexible, and tough enough to withstand extreme environments and weather.

Employees Engage in Rogue Cloud Use Regardless of Security Policies
"I don't think IT realizes how much the way we live life as individuals has completely permeated the enterprise," says Margaret Dawson, vice president of product management at Symform. "This is happening whether you want it to or not."

Think like a data journalist
While prepping for my Strata keynote with Simon Rogers, editor at the Guardian Datablog, Kathryn Hurley had the amazing and unique opportunity to sit with his team for a week and experience first hand how they do their work. Kathryn Hurley shares with you what she learned and show you how you can apply some of their data analysis techniques to your own work.

Quote for the day:

"Do not try to live forever. You will not succeed." -- George Bernard Shaw

No comments:

Post a Comment