December 31, 2013

Spreadsheet governance tools make corporate finance Excel use feasible
In fact, the event that led the company to share its story was the discovery of a "material deficiency" that allowed an incorrect number to appear in a quarterly earnings report, a clear no-no, given that the company is publicly traded and thus regulated by the Sarbanes-Oxley Act. "Even though we had people eyeballing that stuff, we still published a wrong number," the source said.


The firm behind Healthcare.gov had top-notch credentials -- and it didn't help
Though CGI Federal got something of a black eye from the rollout, the CMMI certification it had did not come under fire , and no one has made a case that it should. Project requirements were changed late in the development cycle, warnings weren't heeded, and time for testing was cut short. Those actions are all anathema to CMMI's careful and measured development processes. If a project that's based on CMMI runs into problems, process defenders will usually cite issues with management and decision-making.


2014: Time to Rethink Privacy
In 2014, IT executives are going to have to make some very difficult decisions about privacy. Quite often when we talk about difficult decisions, we mean that we know what the right thing to do is, but it's just hard to bring ourselves to do it. In this case, though, part of the difficulty will be knowing what the right thing to do is. For that reason, every industry -- nay, every company -- will come to very different decisions based on the concerns of their employees and customers.


Raspberry Pi and Raspian, hands on
What could be better at Christmas than a shiny new gadget? Perhaps a shiny new gadget that runs Linux? One that reminds me of Heathkit, and TRS-80, and days of experimenting and playing with computers for no reason other than curiosity, and joy, and learning? That's what I got, a Raspberry Pi! What I intend to write here is "Jamie's Excellent Raspberry Adventures": it will document my own experiences, discoveries, successes and failures with this little gadget.


eBook: Keep only the data you want.
In today’s information economy, organizations are facing unfathomable data growth rates. In fact, Aberdeen Group estimates that data is growing at a rate of 56% year over year. And now, the big data phenomenon means data is growing in every single operational and analytic application. In fact, data is growing to the point that many organizations are facing impaired performance of their mission-critical applications, along with increasing costs associated with storing all of that data.


MDM vs. MAM: Comparing enterprise mobile security management options
IT teams must be able to successfully address the mobile device management challenge to adequately protect organizations while still allowing enough flexibility to reap the rewards of mobility. The landscape of mobile management products is dynamic and large. A common query is, "Which product is right for my organization, mobile application management (MAM) or mobile device management (MDM)?" The answer can be both and perhaps neither, depending on the use case.


Big Data: Too Much of a Good Thing?
Big data contains a virtual treasure trove of information about customers, trends and countless other valuable insights which may have the potential to transform businesses. However, in the race to unlock this promise, many enterprises now find they have more data than they are capable of handling. Here’s how CIOs, data warehouse managers and others can build the business case for data volume management to help them more effectively manage this data deluge.


An Innovator's Resolutions
Nothing prepares us more for a a journey into a new year, ripe with new promise and new opportunity, more than setting out the goals for the year, creating agreements with ourselves as to how we'll conduct ourselves in this new year. We start by reducing or eliminating cynicism about our organizations, recognizing that as innovators we are the spark of creativity that will lead others to better ideas. We decide now that developing interesting ideas into new products and services isn't easy but is possible, given the right sponsors and demonstrating the right possibilities.


Technologies To Look Out For In 2014
Spotting the next innovation, that could benefit customers or challenge the success of existing products, is top-of-mind for every company. Keeping a finger on the pulse of every innovation that could bring such a disruption can be daunting. At Cisco, a self-nominated team of enthusiasts, unaffiliated with any particular function or business unit take up the challenge of identifying technology developments worldwide. Technologies identified by this team are assessed by a panel of Distinguished Engineers, Fellows, Directors and VPs and a few are selected as novel and most relevant to Cisco.


Can Robots Better Spot Terrorists at Airports?
Aviation and government authorities are starting to use machines in lieu of people to verify the identities of fliers by scanning their faces, irises or fingerprints. Dozens of airports in Europe, Australia and the U.S. already employ such technology so passengers can pass immigration checks without showing identification to, or talking with, a person. Now, several major airports in Europe have started using these automated ID checks at security checkpoints and boarding gates.



Quote for the day:

"Keep true, never be ashamed of doing right, decide on what you think is right and stick to it." -- George Eliot

December 30, 2013

Managing Cyber Security Threats from Inside
In addition to NetFlow, security information and event management (SIEM) provides additional information about anomalous server or network behavior. SIEM solutions gather logs from various devices and systems, aggregating them into a correlation server. An event correlation application then mines unusual patterns or patterns known to be related to malicious behavior. Questionable activity is reported to security via email, SMS, or a Web portal.


Breaking down an IPv6 address: What it all mean
Let’s take a long hard look at an IPv6 address. Amazon supply IPv6 addresses with their EC2 cloud computers. ... There’s a lot of meaning packed into that strange-looking identifier. A few companies have tackled IPv6 but to most it’s just plain confusing. Why is it so confusing? And how can you decipher what it means? Connect to your AWS EC2 instance, find your network interface and its IPv6 address, and let’s do some serious IPv6 breakdown.


Introducing Enhanced Mitigation Experience Toolkit (EMET) 4.1
Many customers across the world now include EMET as part of their defense-in-depth strategy and appreciate how EMET helps businesses prevent attackers from gaining access to computers systems. Today, we’re releasing a new version, EMET 4.1, with updates that simplify configuration and accelerate deployment. EMET anticipates the most common techniques adversaries might use and shields computer systems against those security threats.


Software License Audits: Myths, Facts, and Microsoft
In this report, you’ll learn how ITAM and SAM in the Cloud “reboot” Microsoft software license audit preparation. By “reboot,” we mean shuttering some processes, optimizing others, erasing the problem, and starting a fresh new approach to audits. You’ll get a step-by-step action plan to prepare for an audit now. and you’ll learn the specific areas in which ITAM and SAM on the Cloud slash time- to-compliance-position while increasing accuracy and reducing organizational angst. With the ease, speed, and agility provided by Cloud-based ITAM and SAM, Microsoft audits become just “sheep in wolves’ clothing.”


Top 5 IT security webinars in 2013
2013 was the year IT security grew up. Leaks and prominent hacks were the focus for major news outlets and adoption of mobile and new targeted attacks were on the minds of IT security teams. ... The best IT security teams have moved from chasing security to proactively developing risk-based approaches and integrating their security practice with the business priorities of their organizations and the tools and services in the market have begun to reflect that. Without further ado, here are the top 5 IT security webinars in 2013:


Know your storage needs before installing a solid-state drive
With SSDs, Martin said, different drives are suited to different workloads, so it is important to select the right drive for your organization's needs. "SSDs, random, sequential, depending on the make, some of them are better than others, some it's the other way," he said. "It's a different animal." And, he noted, hard disk drives do well with sequential reads. So, depending on the workload, traditional disk may suit your needs.


2013: The tech year in cartoons
From Tim Cook's 'pay cut' to Steve Ballmer's 'retirement,' here's a look at some of the year's biggest IT stories from the pen of Computerworld's editorial cartoonist, John Klossner.


Carey Smith, on Becoming the Team’s ‘Hyperlink’
"I’m sort of a peripatetic manager, and I sometimes describe myself as a “hyperlink.” I have an office, but most of the time I just walk around and try to determine if we’ve got any problems. It might be a minor thing, but I’ll take that and then try to track it back. Sometimes you step on people’s toes, but the point is that everything and everybody are connected in some fashion. And they’re connected, if nothing else, through me doing this sort of thing."


Meet Business Demands by Making BI Effective and Relevant
To realize the full value of BI, businesses need to acknowledge how a solution fits with key business processes. The goal is to equip business users with consistent and specific information throughout all levels of the organization so each group or business unit can best understand and apply the information. The full spectrum of users—from the executive team to line-of-business managers—can use solutions that are relevant to their day-to-day responsibilities.


What does it take to transform an organization before a crisis hits
What can leaders do before the depth and scope of their companies’ crises come into focus? How can they initiate major transformations proactively? As researchers and managers who have been involved in numerous corporate transformations in recent years, we have learned that applying standard formulae to corporate transformations is, at best, ineffective and, at worst, dangerous. What’s needed is a new approach that enables executives to transform organizations proactively without resorting to fear.



Quote for the day:

"You cannot tailor-make the situations in life but you can tailor-make the attitudes to fit those situations." -- Zig Ziglar

December 29, 2013

5 Top Social Media Trends For 2014
"It's no longer passed over as a fad or something that's going away any time soon," he said. "Social media is now part of our fabric of society, like mobile phones and computers -- it's a staple of our everyday life." In 2014, expect a shift in priorities: a bigger focus on social media monetization, user-generated content, a great acceptance of sharing information, and more. Here's a look at the big trends for next year.


The Three Power-People You Need on Your Team
The enemy of success is isolation. The higher you go the easier isolation becomes, but, it’s a devastating problem at all levels of leadership. Isolated leaders fear conspiracies and feel misunderstood. Worse yet, ivory-tower leaders resort to control through authority. Us/them thinking destroys influence. Defeat isolation and enhance success by developing a high-power inner circle.


Proposing Architecture and Process Governance for Risk Mitigation in Organizational Change
Transformation does present new and complex challenges entailing the need for a number of changes, mainly organizational and governance processes. It is therefore necessary to study and analyze the potential risks which may arise from such changes and transformations. This thesis proposes an integrated approach to managing the risks associated with both outsourcing and the transformation of the FTC into a civilian entity mainly in terms of change management, organizational and governance process, using Enterprise Architecture (EA) as leverage, supported by other disciplines and methodologies.


The Chief Data Officer: An executive whose time has come
It takes more than a steep investment, however, to squeeze business value out of data. Companies have to establish an entire system to use data to drive competitive advantage. I believe that the head of this system should be the Chief Data Officer (CDO), an executive whose time to shine has finally come. The sooner businesses can empower a CDO, the sooner they can turn data into a business weapon to achieve business success similar to the aforementioned companies.


Probability and Monte Carlo methods
A common use of the Monte Carlo method is to perform numerical integration on a function that may be difficult to integrate analytically. This may seem surprising at first, but the intuition is rather straight forward. The key is to think about the problem geometrically and connect this with probability. Let’s take a simple polynomial function, say to illustrate the idea.


The Big Lie of Strategic Planning
Strategic plans all tend to look pretty much the same. They usually have three major parts. The first is a vision or mission statement that sets out a relatively lofty and aspirational goal. The second is a list of initiatives—such as product launches, geographic expansions, and construction projects—that the organization will carry out in pursuit of the goal. This part of the strategic plan tends to be very organized but also very long. The length of the list is generally constrained only by affordability.


Monty Taylor and Jim Blair on CI and Test Automation at OpenStack
The OpenStack community has a team working on CI and test automation for the OpenStack developers submitting code. They run their own infrastructure - an OpenStack cloud by itself. Given the complexity of the project, with dozens of dependent projects and over 300 contributors submitting patches every month, standard CI systems simply wouldn't work. We talked with Monty Taylor and James Blair to investigate the build and test challenges they face, and how they managed to tackle them.


Data protection and privacy law for developers
Data protection in EU countries is based on what's known as a "directive" - in this case, its 95/46/ec. The directive is prescriptive in some areas, and in others leaves things up to the interpretation of the national government. This means that in general, data protection and privacy legislation across the different countries of the EU is more or less the same, with some local differences. It's difficult to get things perfectly right in all jurisdictions, but if you start with the core rules, you are most of the way there.


Big Data and the Role of Intuition
Major big data projects to create new products and services are often driven by intuition as well. Google’s self-driving car, for example, is described by its leaders as a big data project. Sebastian Thrun, a Google Fellow and Stanford professor, leads the project. He had an intuition that self-driving cars were possible well before all the necessary data, maps, and infrastructure were available. Motivated in part by the death of a friend in a traffic accident, he said in an interview that he formed a team to address the problem at Stanford without knowing what he was doing.


Establishing Enterprise Architecture Metrics: Seven Essential Steps
Today, the value of EA has become preeminent for most companies integrating their enterprisewide business applications. Many practitioners realize that in a rapidly changing and evolving business environment, an enterprise must measure, manage, and improve its flexibility in successfully deploying integration initiatives. EA can engage both the business and IT teams from the beginning, and EA metrics can present a consistent vehicle to measure most of the critical elements of business value.



Quote for the day:

"Goals are like stepping-stones to the stars. They should never be used to put a ceiling or a limit on achievement." -- Denis Waitley

December 28, 2013

Aaron Levie: The most refreshing voice in the enterprise
At a time when enterprise IT is laboring under constant pressure from reduced budgets, outsourcing pressure, and escalating security challenges, Levie stands out as one of the most refreshing voices in the technology industry. He still believes there's a lot of great work to be done in the enterprise and he's not just a talking a good game. At Box he's leading a team that is hyper-focused on solving enterprise problems.


Testing Basics May Have Averted Obamacare Health Site Fiasco
According to CBS, the security testing was never completed. Fox uncovered a testing bulletin from the day before launch which revealed the site could only handle 1,100 users “before response time gets too high.” The Washington Examiner revealed, via an anonymous source, that the full testing was delayed until just a few days before the launch and instead of the 4 to 6 months of testing that should have been conducted it was only tested for 4 to 6 days.


Welcome to the Lean Service Desk, Part 4: Root Cause Analysis
Lean encourages a structured, disciplined problem-solving approach that is more like informal scientific inquiry. For that reason, we are interested in identifying the root causes of the problem as a precondition to trying to identify solutions. By separating these activities in a very deliberate way, it’s possible to gain enough understanding of the problem to increase the chances of finding solutions that in fact address it.


The Ideas that Shaped Management in 2013
Compiling extremely long lists, struggling to shorten them, and over-thinking it all, when the point should just be to gather some really good reading for you for any free time you happen to find over the holiday. So this year, instead, we thought about the pieces that most surprised us or provoked us to think differently about an intractable problem or perennial question in management, we reviewed the whole year of data to remind ourselves what our readers found most compelling, and we looked for patterns in the subjects our authors raised most frequently and independently of our editorial urging


Do You Know What Life Will Be Like In 5 Years? IBM's Top Scientist Does
In the 5 in 5 report IBM’s top scientists report on what the world, supported by smart sensing and computing, will look like in five years. ... In five years, cities will be sentient. More buses will automatically run when there are more people to fill them. And doctors will use your DNA to tailor medical advice and smart computing to diagnose and plan treatment for big diseases like cancer not in months, but in minutes.


Merchant Warehouse Provides Visual Overview of the State of the Payments Industry
Focused on 4 main quadrants, the Merchant Warehouse State of the Payments Industry will examine and provide up-to-date information covering all aspects of the payment industry from consumer credit trends to important information on regulations and technology. While individual sections will be update regularly as new information and data become available, each quarter Merchant Warehouse will deliver a new report highlighting major updates and trends ensuring that our audience is fully aware of where the industry is and more importantly where it is headed.


Global Stock Exchanges Band Together on Cybersecurity Initiative
In addition to developing cybersecurity best practices, the Cyber Security Committee will focus on establishing a communication framework among participants based on mutual trust and, notably, facilitating information sharing, including threat intelligence, attack trends and useful policies, standards and technologies. Part of that will also be enhancing dialogue with policy makers, regulators and government organizations on cyber-threats and supporting improved defenses from both external and internal attacks.


Establishing Data Governance Policies: Four Issues to Get Them Right
A first-rate data governance policy improves an organization’s ability to demonstrate regulatory compliance, respond to legal inquiries, reduce risk and increase data quality and business process management for increased employee effectiveness and better decision-making. ... Faced with rapidly growing data volumes, varieties and obligations, it is imperative that organizations have data governance policies and technologies that support them in place. The following four steps can help any company manage their data assets


COBIT 5 and the Process Capability Model Improvements Provided for IT Governance Process 
Starting from a general overview of this framework, the structure of the Process Capability Model will be analysed in detail in this paper. Then, a comparison with the Maturity Model of the previous version of the COBIT framework will be discussed. At the end of this paper, it will be seen that the new Process Capability approach results in an improvement of the assessment process; and in particular, in the formality and the rigor of the assessment.


Retrospectives Applied as “PROspectives"
Don’t worry if the PROspective needs more time than planned. As long as the participants - the owners and beneficiaries of the PROspective - are willing to continue, it is fine. You, as the facilitator, are responsible for keeping the process on track to enable reflection, learning, and inventing actions for improvements. If you think the team has lost track of that and the meeting has become a waste of time then share that impression with the participants. If they want to go on anyway, it is their decision. You are the enabler, not the director.



Quote for the day:

"Men meet with failure because of their lack of persistence in creating new plans to take the place of those which fail." -- Napolean Hill

December 27, 2013

The Big Picture for Big Data
Several weeks ago, Information Management had the opportunity to sit down for a wide-ranging discussion with Dr. Rob Walker, vice president of decision management at Pegasystems, the Cambridge, MA-based provider of BPM and CRM solutions. Walker, who holds a PhD in computer science and began his career pioneering predictive analytics at Capgemini in the 1980s, shared his perspectives on the growth of big data and the challenges faced by companies as they struggle to derive real business value from the multitude of data management technologies that ‘big data’ represents.


How application performance metrics keep healthcare software healthy
The application performance metrics you measure for a healthcare application should be focused on improving the customer end-user experience and positively affecting the quality of patient care. Metrics that measure how software applications perform is critical to improving patient care, satisfying regulatory requirements and allowing medical professionals to do a critical job without undue interference.


Top 10 Methods to Improve ETL Performance Using SSIS
SQL Server Integration Services (SSIS) is the tool in the ETL family that is useful for developing and managing an enterprise data warehouse. A data warehouse by its own characterization works on a huge volume of data and performance is a big challenge when managing a huge volume of data for any Architect or DBA. The author in this article discusses on improving ETL performance or design a high performing ETL system with the help of SSIS.


Next step for connected devices? Connect the devices
The thinking is that the big opportunity will be for platforms, or hubs, like SmartThings, vying to tie together the so-called Internet of Things (a press friendly name for the connected device category), said IDC analyst Jonathan Gaw. With consumers actually starting to pay attention to connected products, the need will come for an easy way to manage all of them, despite their different manufacturers and ecosystems, Gaw said. To be clear, connected devices still have a long way to go before they become a mainstay, or even more than an occasional fixture, in American homes.


The first 3D printed organ -- a liver -- is expected in 2014
Advances in the 3D printing of human tissue have moved fast enough that San Diego-based bio-printing company Organovo now expects to unveil the world's first printed organ -- a human liver -- next year. Like other forms of 3D printing, bio-printing lays down layer after layer of material -- in this case, live cells -- to form a solid physical entity -- in this case, human tissue. The major stumbling block in creating tissue continues to be manufacturing the vascular system needed to provide it with life-sustaining oxygen and nutrients.


Penny Pritzker, on Hearing the Whole Story
"And when we get close to saying we want to hire someone, I will talk to them about what could get them fired. If you want to get fired, here’s what you need to do: first, lie, cheat or steal. But the other thing that will get you fired is if you have a problem and you keep it to yourself. Problems are going to happen, and it’s my job to help you with your problem. What I’ve learned is that the most troublesome people don’t tell you 100 percent of the story, and keep some facts to themselves."


2013: The Year Of Security Certification Bashing
The idea that a certification means that a person was capable of passing the test at one time is a sad statement, as it indicates stagnation in one of the least stagnant of professions. No one who worked with packet filtering firewalls has stayed in that era. The progress of the industry simply will not allow it. Most certifications require either upgrade tests or continuing professional education credits to keep the certification in good standing. This is the same method in use by other professions, such as attorneys, doctors, and accounts.


NCSU study says Android vulnerabilities are mostly from manufacturers
Researchers analyzed the customized apps that manufacturers build on top of the baseline version of Android shipped from Google. The apps provide unique features and a look and feel that's meant to make the smartphone stand out in the market. Eighty percent of the apps that come with devices are created by the manufacturers, not Google. "It is worrisome to notice that vendor customizations were, on the whole, responsible for the bulk of the security problems suffered by each device," the study said.


Data Profiling and Data Governance: How Good is This Data?
When dealing with large volumes of data coming in from a variety of sources, in different formats, and delivered by different methods a data profiling automation solution becomes a necessity to efficiently analyze data. Data profiling functionality can often be found as part of a larger data quality technology suite. Profiling tools can quickly process and analyze large data sets and automatically produce a baseline profile, thus replacing the need to run manual queries.


Building a Real-time, Personalized Recommendation System with Kiji
A typical Kiji application will include some number of KijiScoring servers, which are stateless Java processes that can be scaled out, and that are able to run a ScoringFunction using a single entity’s data as input. A Kiji application will funnel client requests through the KijiScoring server, which determines whether or not data is fresh. If necessary, it will run a ScoringFunction to refresh any recommendations before they are passed back to the client, and write the recomputed data back to HBase for later use.



Quote for the day:

"One of the most important tasks of a manager is to eliminate his people's excuses for failure." -- Robert Townsend

December 26, 2013

The top 10 cloud provider tips of 2013
Cloud service providers have had many different opportunities for growth this year, from developing cloud partner programs to building industry-specific cloud markets. Software-defined networking (SDN) was a hot topic for cloud providers this year with several of our most popular expert tips covering everything from overcoming barriers to SDN adoption to determining which model of SDN to deploy. Check out our full list of top cloud provider tips for 2013, including advice on FISMA compliance and an analysis of what "open" cloud services really mean.


Four Tech Predictions for 2014 (From PayPal’s CTO)
What happens when new products and services deliver capabilities that help innovators envision better ways of eliminating friction points that people have been living with for years? What happens is that you get the perfect conditions for the kind of rapid technology-driven transformation that has been gathering momentum in the payment industry for the past couple of years. It’s a transformation that promises to revolutionize commerce by rendering the transaction all but invisible while making the payments process itself a foundation for new experiences that connects consumers and merchants in powerful new ways.


Make a high-performance computing and high-availability datacentre
Datacentre professionals must note also that although the use of virtualisation provides a better level of inherent availability, it is not a universal panacea. Virtual images of applications, virtual storage pools and virtual network paths are still dependent on the physical resources assigned to them, and the datacentre design must take this into account. If the server running the virtual image fails, it will still be necessary to spin up a new image elsewhere on the physical server system and reassign connections.


Leading by Letting Go
The trouble was that the scripts, metrics, and rules were getting in the way. Heavily scripted representatives couldn’t form genuinely warm and empathic relationships. They sounded wooden and stilted. Real relationships are built on open, person-to-person communication, one caring human being to another. ... The results? Call-handling time edged up slightly at the very beginning, then dropped and kept falling. Likelihood-to-recommend scores doubled, indicating far more enthusiastic advocacy of American Express on the part of customers. Employee attrition was cut in half.


The reality of android soldiers and why laws for robots are doomed to failure
For Sharkey robot soldiers can't comply with the basic rules of war. They can't distinguish between a combatant or a civilian or between a wounded soldier and a legitimate target. "There are no AI robotic systems capable of doing that at all," he argues, pointing to one UK-built system that can tell the difference between a human and a car "but has problems with a dancing bear or a dog on its hind legs." A robot weapons system won't be able to judge proportionality either, he argues; that is, judge whether civilian losses are acceptable and in proportion to the military advantage gained by an attack.


SOA Best Practices in the Mobile Age
The new opportunity in APIs is BaaS, an extension to the service API model. The goal of BaaS is to convert common and useful elements of mobile application logic-storage, identity management, social network integration, photo enhancing into Representational State Transfer (REST) Web services that the application invokes as needed, making these services "back ends” to mobile apps. As a concept, BaaS is similar to Software as a Service (SaaS) and Platform as a Service (PaaS); it offers functionality as a Web service.


Martin: Issues to consider when using SSD
There may be a lot of benefits when you add solid-state storage to your environment: greater speed, lower costs of energy and greater efficiency. But the technology has a new set of issues you'll need to monitor. Dennis Martin, president of Demartek, discusses those variables in this Storage Decisions video. He noted that users of solid-state drives have to keep track of data writes to their drives, a practice that isn't necessary with hard disk.


Should everyone learn how to code?
Are good coders simply born and not made? Of course not. But it's true that the best are frequently self-taught and loved coding from the start. Without strong self-motivation, it's very, very difficult to slog your way through the painstaking labor and long hours required to become a decent programmer. To be an excellent one, you need a whole lot of experience, which is why I've heard hiring managers say they're more impressed by an applicant who wrote a mobile app at age 14 than one with a BSCS from a good school.


Venture capitalist proposes California 2.0, a plan for six new states
”Something’s not working in our state, and I’m convinced that it is with the existing system, the existing breadth of industry and varying interests. California is untenable and un-governable,” Draper told a sparsely attended news conference at the Silicon Valley school for entrepreneurship that he created and that bears his name. There were about 20 people in the room, although only six appeared to be reporters.


Visualizing Java Garbage Collection
Modern GC is highly efficient, far more so than manual allocation typical in earlier languages. People from other language backgrounds often focus on GC pauses without fully understanding the context that automatic memory management operates in. Mark & Sweep is the fundamental algorithm used for GC by Java (and other runtimes). In the Mark & Sweep algorithm you have references pointing from the frames of each stack's thread, which point into program heap.



Quote for the day:

"The final test of a leader is that he leaves behind him in other men, the conviction and the will to carry on."— -- Walter Lippmann

December 25, 2013

An Artificial Hand with Real Feelings
Now researchers at the Cleveland Veterans Affairs Medical Center and Case Western Reserve University have developed a new kind of interface that can convey a sense of touch from 20 spots on a prosthetic hand. It does this by directly stimulating nerve bundles—known as peripheral nerves—in the arms of patients; two people have so far been fitted with the interface. What’s more, the implants continue to work after 18 months, a noteworthy milestone given that electrical interfaces to nerve tissue can gradually degrade in performance.


Building a Feedback-Rich Culture
Even people who aren’t interested in or skilled at giving or receiving feedback will participate in the process (and improve) when they’re working in a feedback-rich environment. And the most ardent and capable feedback champions will give up if the organizational or team culture doesn’t support their efforts. So as leaders, how do we build a feedback-rich culture? What does it take to cultivate an ongoing commitment to interpersonal feedback? Here are four essential elements:


String externalization practices and considerations for UNIX shell scripts
In this article, we provide practical "How-Tos" and experiences on externalizing shell script messages in a product. Also, we provide suggestions on what to consider before and during translation enablement from a globalization perspective. The target audience is product developers who would like to enable their shell scripts for translation. After reading this article, readers can understand the considerations for externalizing shell script messages, realize the end-to-end process of string extraction and translation, and be aware of some known issues and their solutions.


The End of Data Scientists and Other Predictions
"We don't have a crystal ball at CMSWire — but we're curious about the future. So we’ve collected predictions from some our favorite analytics firms like Tableau, Splunk, Alteryx, Alpine Data Labs and SAP, as well as insights from the Music Industry Association and Ad Age. We’re sharing a few of them with you. For the record, these prophesies do not belong to us, nor do we"


45 Useful JavaScript Tips, Tricks and Best Practice
In this article, I’ll share a set of JavaScript tips, tricks and best practices that should be known by all JavaScript developers regardless of their browser/engine or the SSJS (Server Side JavaScript) interpreter. Note that the code snippets in this article have been tested in the latest Google Chrome version 30, which uses the V8 JavaScript Engine


Best Web Designing Frameworks for 2014
These are frameworks that can help you build fully functional web templates within minutes and with extremely minimal knowledge of CSS and JavaScript coding. There are great expectations for the year 2014. Responsive websites are already the Next Big Thing. Visitors from mobile and tablets have become an important factor for all websites. Every website has to look good and work well in every device. In this article, we will list some of the best CSS frameworks that will help web designers and developers to explore their potential to build responsive and beautiful web applications in 2014


XMLFoundation
If you are building an application that does not use XML and never will..... XMLFoundation is still a very valuable tool available to solve many very common development tasks. The data structure classes alone ( List, Hash, Stack, Tree, Array, QSort ) are very useful. They all have "Iterator" objects so that data structures can be read-referenced by multiple threads at the same time without blocking. The interface is standard to all data structures.


Blurred lines: Online file-sharing services vs. ECM software
With greater control over corporate data in the hands of users, the traditional enterprise content management (ECM) software market has been disrupted. Traditionally, ECM software has been costly and more complex, requiring user training and users logging into a corporate virtual private network (VPN) to access company files. While files are secure, ECM software hasn't been user-friendly or designed for mobility.


28 Design Principles for an Enterprise Architecture SharePoint Community
Naturally this proved to be a very powerful and compelling technique and allowed many of the design decisions to be taken simply and collectively by exploring the sensibility and applicability of each principle. Not all principles will apply in all scenarios, but those below will provide a useful starting point / thinking frame should you be presented with a similar problem. They should (of course) also be supplemented with SharePoint design best practices.


The Role of Governance in Project Management
From an organisational project management perspective, the word Governance could be interpreted as managing, controlling and administrating the organisation’s initiatives for changing and developing the business. Examples of initiatives may be to develop new or modified products and services, develop new markets, or change the organisation and its support in the form of IT systems. This also applies to contractors or engineering firms who take on projects and assignments on behalf of clients.



Quote for the day:

"Things which matter most must never be at the mercy of things which matter least." -- Johann Wolfgang von Goethe

December 24, 2013

Don’t jump the SQL ship just yet
Times are changing. RDBMS are continually evolving and embracing new features, standardising them in ANSI SQL, obsoleting JPA 2.x. In these times of change, JPA standardisation seems limiting to those who innovate in the data storage market. EclipseLink’s recent flirt with supporting MongoDB through JPA extensions shows that the standards people are not quite sure where we’re heading. But one thing seems certain. We won’t get rid of SQL so quickly. So why not start embracing it again?


Target hackers try new ways to use stolen card data
Fraud experts say the location information will likely allow buyers of the stolen data to use spoofed versions of cards issued to people in their immediate vicinity, Krebs wrote. "This lets crooks who want to use the cards for in-store fraud avoid any knee-jerk fraud defenses in which a financial institution might block transactions that occur outside the legitimate cardholder's immediate geographic region," he said.


For cloud providers, fraud detection is integral part of business plan
"All of the advantages of the cloud for enterprises are the advantages for the bad guys," said Jeff Spivey, international vice president of ISACA, a founding member of the Cloud Security Alliance (CSA) and president of Security Risk Management Inc., a Charlotte, N.C., information security consultancy. "It's that anonymity and scale that's attractive to the fraudsters." Without proper cloud-based fraud detection and prevention practices in place, cloud providers can become unwitting hosts for cybercriminals.


Establishing a Process to Evaluate Ideas
Innovation is one of the keys to business success. If you don’t innovate, your business will suffer. If it isn’t made obsolete by competition, it will likely end up as a commodity business with little to distinguish it from competitors. And yet, not every new idea that a business comes up with is going to be a good one. As companies mature, many establish a process to evaluate ideas. It might be about coming up with new products or it might be finding new ways to create customer engagement.


JSFeat - JavaScript Image Processing Library
Modern JavaScript is fast, fast enough to do real time image processing. JSFeat is a JavaScript library that implements some advanced image processing and the demos prove it does it in real time. JSFeat is an open source library (MIT License) that you can download and use in almost any browser. ... What is even more impressive is that JSFeat doesn't just implement the simple image processing you find in other libraries - it also does some cutting-edge object tracking and detection.


Getting Value out of Agile Retrospectives - A Toolbox of Retrospective Exercises
This pocket book contains many exercises that you can use to do retrospectives, supported with the “what” and “why” of retrospectives, the business value and benefits that they can bring you, and advice for introducing and improving retrospectives.  Agile retrospectives are a great way to continuously improve your way of working. Getting actions out of a retrospective that are doable, and getting them done helps teams to learn and improve.


When Agile BI is Not Agile
The spirit of Agile isn’t meant to enforce rules enterprise-wide. BI projects in particular are very different than operational applications. General operational applications (and I’m sure I’m even generalizing those) seem to benefit a little more from a cookie-cutter, standardized approach. You can imagine a mobile application where you want to add a feature that allows users to tap an icon that display a customer’s shipping address. It’s relatively straightforward to know what the user wants, update the tables and code to provide that feature, and then demonstrate the existing app to a user.


Requirements, Estimation and Planning: Steps to work with Agile software development projects
This article is about requirements, estimation, and planning in agile software development projects. Agile estimation is often seen as being invaluable, yet others dismiss it as waste. The reasons for this disagreement can be traced to disparities in the Scrum and Lean-Kanban ways of working. Everybody in software development has the same goal: rapid, reliable, low risk delivery of high-quality, valuable functionality to users. So what will help them to achieve their goal? Just coding?


Vectorization, SIMD Architecture: What You Need to Know
One of the approaches to parallel programming is vectorization, which is a way of performing batch operations all with a single assembly language instruction. In the first article of a new series, Jeff Cogswell walks you through the basics of vectorization with the Intel processors. ... To fully understand vectorization, you have to know a bit about processor architecture and assembly language.


Security researcher cancels talk at RSA conference in protest
The researcher said he didn't expect EMC or the conference to suffer as a result of the alleged deals with the NSA. Nor did he expect other conference speakers to cancel. Most of the speakers at the conference are American so why would they care about surveillance that's not targeted at them but at non-Americans, Hypponen wrote. Surveillance operations by U.S. intelligence agencies are targeted at foreigners, he added. "However I'm a foreigner. And I'm withdrawing my support from your event," the Finnish researcher wrote.



Quote for the day:

"The best thing workers can bring to their jobs is a lifelong thirst for learning." -- Jack Welch

December 23, 2013

IPv6 will allow them to track you down. Not!
It is true that IPv6 will change addressing on the Internet. Many of us hope it restores the ability to identify an actual network endpoint -- a feature that we lost a number of years ago in IPv4. But some appear to be imagining a future where each machine has its very own address, and that these addresses will be easily traced whenever a person visits a website, plays a game online, or even opens an email.  In fact, IPv6 actually has features that are designed to foil these sorts of plans.


Five trends that will affect your cloud strategy
Over the next three years, we expect this trend to accelerate, with an expanded set of providers and offerings. Deploying cloud services will involve substantial integration work, and many CSBs will deliver integration services and employ business process management suites (BPMSs) to address this complexity. Steady investments by IT distributors and communication service providers (CSPs) for cloud aggregation brokerage offerings will help small or midsize businesses acquire, leverage and maximise investments involving multiple cloud services.


The IT industry must come clean on software licensing
Software publishers want to sell organisations an enterprise agreement, according to James Moy, assistant vice-president for IT asset management at Bank of Tokyo-Mitsubishi. “They love to sell their software, but if you ever ask any of the software suppliers how they keep compliant on their own software, they will have no response,” he says. Moy says most software is coded with executable file and revisions. “How does a user or company actually keep count? Take into account upgrades, patch versioning, enterprise agreements and select agreements and your head is spinning,” he adds.


Quanex halts its SAP rollout, citing a strategy shift
"This is a business planning issue," said Michael Krigsman, CEO of consulting firm Asuret and an expert on why IT projects go awry. "It has nothing to do with the technology. Any time a company changes its strategy mid-stream there are going to be mopping-up costs, which is what this is, and if they don't need the capabilities of an elaborate ERP system then they are wise not to continue with it."


CEO Says CIOs Need to Be a Source of Energy and Innovation
"Suren Gupta, our EVP of technology and operations, sits 20 feet down the hall from me, and we interact continuously. He's on our strategy and reinvention committee, which approves strategy for all our businesses. I walk down the hall to get his thoughts--not just on technology matters but also on business matters--because he's one of the architects of our business innovation. CIOs who aspire to Suren's level of impact need to learn about the business, own the transformation and teach the organization how technology can improve customer satisfaction."


eGuide: Application Integration in the Cloud and On-Premises
Application integration has always been an afterthought for buyers enthralled with the latest new app, and the pain of integration is continually forgotten. This E-Guide provides expert tips and best practices on deciding between on-premises vs. SaaS and dealing with the application integration woes that follow.


PyParallel: A Fast Parallel Version of Python
Python’s asynchronous support is somewhat problematic. It is designed around the Unix/Linux idea of synchronous, non-blocking I/O. This is where a thread continuously polls for incoming data and then dispatches it accordingly. While Linux is tuned for this pattern, on a Windows machine this is disastrous for performance. It is really expensive to copy the data from the polling thread to the thread that will actually process the work. So what PyParallel delivers instead is true asynchronous I/O using the native I/O Completion Ports (IOCP).


Information technology and corporate governance
Control objectives in IT (COBIT) is an IT governance framework and supporting toolset that allows managers to bridge the gap between control requirements, technical issues and business risks. One may visit the ISACA website for a detailed discussion and guidance on IT governance and COBIT. At the end of the day, IT governance has to create value for the business over and above associated costs. ... This requires companies to have people who understand both business and IT.


What I've Learned from 3 Years in the Gamification Industry
"According to Google Trends, the first news article citing the term gamification appeared in August 2010. Badgeville officially launched in October 2010 (at TechCrunch Disrupt.) As a marketer helping grow a new industry, beyond making sure people knew about our product and the value it adds to their businesses, our team had to carefully help explain what gamification was and wasn't."


Seven Tips for Stress-Free Project Leadership
An essential component of the art of stress management is the ability to realize that anxiety, for all its negatives, is not the problem; the problem is how we often choose to deal with it. “When you have just enough anxiety though, you have the productive energy you need to turn your thinking and feeling into positive action,” says Robert Rosen, author of Just Enough Anxiety: The Hidden Driver of Business Success.



Quote for the day:

"Disruption is about risk-taking. But then you become a Fortune 500 co., which is about risk mitigation" -- @SteveCase

December 22, 2013

Advanced Persistent Threats Now Hitting Mobile Devices
"Just when many IT security practitioners were hoping to get their endpoint security risks under control, the exploding growth of mobility platforms and public cloud resources has turned these dreams into a security nightmare," the survey report asserts. The respondents perceive "mobile devices such as smartphones" to be the greatest potential IT security risk in the IT environment, more than PC desktops and laptops.


When You Criticize Someone, You Make It Harder for that Person to Change
Barbara Frederickson, a psychologist at the University of North Carolina, finds that positive feelings enlarge the aperture of our attention to embrace a wider range of possibility and to motivate us to work toward a better future. She finds that people who do well in their private and work lives alike generally have a higher ratio of positive states to negative ones during their day. Being in the positive mood range activates brain circuits that remind us of how good we will feel when we reach a goal, according to research by Richard Davidson at the University of Wisconsin.


Brave New (Dell) World
Dell has started a $300 million fund to explore new technologies and fund companies doing that work. A more cynical person might think that Michael Dell is using the new-found freedom to offer an incentive to other startups to avoid the same kinds of issues he had – answering to single-minded masters only focused on dividends and stock price. By offering to invest in a hot new startup, Michael Dell will hopefully spur innovation in areas like storage.


Oculus Primed: Meet the Geniuses Who Finally Mastered Virtual Reality
As processor power has progressed, various head-mounted displays and VR sets have claimed to have solved the latency problem at various thresholds: 100 milliseconds! 40 milliseconds! Those thresholds might do away with the most frustrating delays, but they can’t guarantee comfort. “It’s easier to get sick from latency than it is to perceive it,” Luckey says. “People in the VR industry have been disagreeing on what humans can perceive—and that number always seems to match up to what their system is just barely able to do.”


Thinking in Silicon
A new breed of computer chips that operate more like the brain may be about to narrow the gulf between artificial and natural computation—between circuits that crunch through logical operations at blistering speed and a mechanism honed by evolution to process and act on sensory input from the real world. Advances in neuroscience and chip technology have made it practical to build devices that, on a small scale at least, process data the way a mammalian brain does.


Target Sees Massive Customer Data Hack
Barbara Endicott-Popovsky, director of the Center for Information Assurance and Cybersecurity at the University of Washington told TIME Magazine that hacking “is a business. The general public would be shocked and amazed by the size of the problem.” She added, “People who run companies are not aware that they’ve actually become software companies. We’re headed toward the internet of things, where we have embedded software in every product. What we’ve done is open up a whole host of vulnerabilities.”


2013 Top 10 SDN Stories
In 2013, Cisco and VMware launching SDN and networking virtualization strategies stole much of the spotlight, organizations like the Open Networking Foundation and OpenDaylight made real progress on OpenFlow development and a common controller. This year marked real progress for open networking and SDN standards development, here are top 10 SDN stories of 2013.


Expert Describes SQL Server 2012 Licensing Pitfalls and Strategies
DeGroot offered some strategies to reduce SQL Server 2012 licensing costs. One of the strategies relies on using the true-up process with SQL Server 2008 R2 licenses to gain additional core entitlements. A true-up is licensing lingo for contract renewals under Microsoft's Enterprise Agreements. DeGroot noted that true-ups will cost the least during the third year of an agreement. The idea behind a true-up is that organizations can add software during the year and pay for the additional licensing later at the annual true-up assessment time.


5 Tips for Agile Enterprise Architecture Innovation
More and more, IT is focused on reliability while the business side is pushing for tech innovation and new tech adoption. Enterprise architects and tech execs are right to be cautious about latching on to the next-big-thing, but there’s also little good done by ignoring this unprecedented wave of business interest and “shadow” adoption. Forrester Research analyst Brian Hopkins recently highlighted a handful of areas enterprise architects can stay grounded in their needs while reaching for innovation and agility. Here are five tips for fostering innovation and agility in EA development as adopted from Hopkins and Forrester’s “Emerging Technology playbook.”


Architecture and Agility: Married, Divorced, or Just Good Friends?
Does agile development need architecture? Does architecture need agile development? Is it possible to even answer these questions without a polarizing debate typified more by caricature and entrenched cultural views than by clear definitions and open reasoning—a debate more closely resembling two monologues streaming past each other than a dialogue? Perhaps rephrasing the question in more general terms offers a better place to start: instead of focusing specifically on agile approaches, we should consider development processes more broadly.




Quote for the day:

"Thus to be independent of public opinion is the first formal condition of achieving anything great." -- G. W. F. Hegel


December 21, 2013

Password Cracking Revisited: Rainbow Tables
Rainbow tables are chains of hashes and reductions. A reduction matches a hash to plain text. These tables start with a plain text value. The value is repeatedly hashed, reduced (which is not the same thing as an inverse hash), and then rehashed. However, the table itself only stores two values -- the starting plain text and the ending hash. As such, a chain consisting of millions of values can be stored as two values -- essentially the start and end points.


Innovation: Are You a Gardener or an Architect?
The architects do blueprints before they drive the first nail, they design the entire house, where the pipes are running, and how many rooms there are going to be, how high the roof will be. But the gardeners just dig a hole and plant the seed and see what comes up. I think all writers are partly architects and partly gardeners, but they tend to one side or another, and I am definitely more of a gardener. ... the same idea applies to innovation. There are people that work hard at building a good structure to support innovation.


The only effective way to ensure quality is with continuous verification
The hygienic approach proposed in this article is to apply verification techniques continuously as the work product is developed. Figure 1 shows the development of requirements models. In Figure 1, you can see the places where verification is performed. Notice that the inner loop (fromDefine the Use Case System Context down to Verify and Validate the Functional Requirements and back) is a nanocycle and is run every 20-60 minutes. So you take some small set of requirements, realize them in the model, execute and verify them, and repeat.


Time is Money: Milliseconds Matter
Did you know just a one second increase in Amazon's page load time could potientially cost the retail giant $1.6 billion in annual sales? There's no question consumer online shopping expectations are at an all-time high. But did you know the time they spend on your site is at an all-time low? This means finding ways to improve your website usability has never been more important. ... For other interesting stats see the infographic


Major computer security firm RSA took $10 mln from NSA to weaken encryption
The National Security Agency arranged a clandestine US$10 million contract with computer security power RSA that allowed the spy agency to embed encryption software it could use to infiltrate the company’s widely used products, Reuters reported. Revelations provided by former NSA contractor Edward Snowden and first reported in September showed that the NSA created and perpetuated a corruptible formula that was ultimately a “back door” into encryption products.


Intel Readies 18-Core Xeon “Broadwell-EP” Microprocessors for Launch in 2015
The Xeon chips due in the next couple of years will not only get new micro-architectures along with innovative capabilities, but will also demonstrate unprecedented core-count. Based on slides from Intel’s roadmap published by VR-Zone web-site, Intel is currently working on Xeon E5-2600 v3 “Haswell-EP” with up to 14 cores due in late 2014 as well as Xeon E5-2600 v4 “Broadwell-EP” with up to 18 cores chips due in the second half of 2015.


Target data theft fuels new worries on cybersecurity
The data breach underscored the evolving sophistication of cybercriminals and the persistent vulnerability of retailers and consumers despite dozens of past incidents at major retailers. “How do you get 40 million credit cards and no one knows about it?” said Ken Stasiak, chief executive of SecureState, which investigates cybercrimes. “That's a hell of a lot of credit cards. There should have been someone inside the company who spotted this much sooner.” The Target attack appeared to be well thought out and executed with great precision.


BYOD Became the 'New Normal' in 2013
"A big shift in attitude for BYOD in 2013," says Aberdeen Group's Andrew Borg. To understand what happened with BYOD this year, we need a starting point: An Aberdeen Group survey in January found that three out of four respondents had a BYOD program in place. Yet two-thirds of those with a BYOD program had an "anything goes" philosophy, not enforcing compliance or security policies. BYOD was also a way for business users to revolt against IT, which traditionally threw up roadblocks to new technology, especially consumer tech.


Top Technology Trends for 2014
IEEE Computer Society journals, magazines, and conferences are continually at the forefront of current technology trends. That's just one of the reasons that IEEE Computer Society is the community for technology leaders. As a technology professional, keeping on top of trends is crucial. Below are a list of technology topics that Computer Society magazines, journals, and conferences will be focusing on next year:


End of an era? What's holding back the new digital enterprise
"We tend to overestimate the effect of a technology in the short run and underestimate the effect in the long run" to quote Amara's Law, but I would argue long term cultural digestion and absorption to find value models are the reason why a technology takes off rather than Canadian philosopher of communication theory Marshall McLuhan's idea that 'the medium is the message' which is is much beloved by those keen to sell you software seat licenses before the end of their quarter.



Quote for the day:

"For here we are not afraid to follow the truth wherever it may lead…" -- Thomas Jefferson

December 20, 2013

CloudSigma makes IaaS security easier with network policies
The new network policy system from CloudSigma, a Zurich-based IaaS provider, will allow customers and providers to configure and control both inbound and outbound traffic through the CloudSigma IaaS Web interface or directly over the provider's application programming interface. The policies can range from a single rule that blocks all external public IP traffic to complex configurations allowing connections to certain ports from a specific range of IP addresses.


Want To Really Be Agile? Swarm!
In order to all be working on the same feature without running into dependency problems, we have to all work on the same story, known colloquially as swarming. That means that the team has to discuss the story, divide it into tasks and have each pair work on a task. Close collaboration is incredibly important since we want to make sure we are all working toward the same goal. We know from reality that not everyone on the team will be able to work on the same story. So how do we share our code changes quickly?


4 ways network virtualization improves security
Add network virtualization to that dynamic environment, and the operational model for networking changes completely. Profound changes of this sort tend to make security professionals nervous, but in reality, network virtualization includes several built-in network security advantages. These include isolation and multitenancy; segmentation; distribution firewalling; and service insertion and chaining. Network virtualization platforms can combine these features with other security functions to streamline security operations in a software-defined data center.


New cybersecurity boom arrives in Silicon Valley
The result is a digital arms race against wily hackers that has Silicon Valley battling to provide the weapons to the good guys. Venture capital firms are pumping funding into security startups, which are getting gobbled up by big companies that see cybersecurity as a source of new revenue. In a region where tech trends go in cycles, cybersecurity is a particularly mouthwatering investment prospect because no matter how much security equipment or software gets sold, the problem never gets completely solved


From the Brink of Disruption to the Year’s Top Corporate Comebacks
In 1991, LL Cool J rocked MTV Unplugged, rapping to the audience, “Don’t call it a comeback.” He didn’t wish to dwell on the flops of the past or to jinx the future. Today, three companies – Best Buy (BBY), Delta Airlines (DAL), and General Motors (GM) – could say the same thing. Only a few years ago, each was dismissed and left for dead. But each has since come back and now stand as the turnaround story of 2013.


VDI is the Primary Enabler of BYOD, Say ITDMs
Handa says, “While the initial phase of implementation looks similar, the extent of investments and the IT infrastructure deployment at the back-end differ from one to the other.” He argues that BYOD has its own set of operational challenges that may not exist when one is deploying thin client/uniform end-computing devices. In the case of Essar, Jayantha Prabhu, CTO, Essar Services India says, “In our case, desktop virtualisation has become one of the primary enablers of BYOD due to its core ability to stream data to mobile devices in an encrypted and containerised manner.”


Big Data, Little Happiness
Can data make companies intelligent? Sure. Can it data make companies more profitable, more efficient, more customer-centric and more strategic? Possibly. Of particular concern is the rate of growth of data capture. More data is collected in one day now than existed in the world just a few years ago. Unfortunately, this speaks only to our ability to capture data, rather than to its inherent utility. This dramatic surge in data is essentially caused as the number of connections that can be made is increasing geometrically between content, users, apps and activities.


JavaScript spin-off asm.js brings web even closer to native performance
asm.js is a subset of JavaScript that is optimised to maximise performance. asm.js is JavaScript and so will run in any browser but to get the best performance a browser's JavaScript engine needs to have been written to take advantage of the optimisations asm.js makes possible. Currently the only browser to support asm.js optimisations is Firefox, since Firefox 22, although Google has expressed interest in adding support to Chrome.


Being Nice to New Hires Is Good for Business
Overall, a consistent pattern emerged. Higher levels of support from both co-workers and supervisors led to new employees’ having more positive attitudes, trying harder to integrate with the group, and being more committed to their job. On the flip side, higher levels of negative behavior by co-workers and bosses led to new hires’ feeling excluded from the workflow and made them more likely to skip work or show up late.


The Rise of the Developer: Why Programmers Are Kings
Collison sees the roots of the developer-is-king trend in the growth of such developer communities. "Over the past few years the online developer community has been getting increasingly verbal, thanks to companies like GitHub, which amounts to a modern day version of a Home Brew Computer Club (where Apple founders Steve Jobs and Steve Wozniac met)," he said. "One of the advantages for all the companies here is that they nurture an ever growing audience...The developer communities are very close knit. If the product is good enough, the word gets out."



Quote for the day:

"First-rate people hire first-rate people; second-rate people hire third-rate people." -- Leo Rosten

December 19, 2013

New DDoS malware targets Linux and Windows systems
"From the analysis we were able to determine that there are four types of attack possible, each of them a DDoS attack on the defined target," the researchers said. "One of the possibilities is the DNS Amplification attack, in which a request, containing 256 random or previously defined queries, is sent to a DNS server. There are also other, unimplemented functions, which probably are meant to utilize the HTTP protocol in order to perform a DDoS attack."


4 Ideas to Build a Culture of Critical Thinking
The reality is that training middle managers on critical thinking skills is much like teaching an adult to ride a bicycle. It takes patience, training and practice to be able to master the art of critical thinking which, in turn, leads to good decision making. The starting point of building a culture of critical thinking is to incorporate critical thinking in organizational training programs.


How CIOs And CMOs Can Be Better Partners
A hot topic over the past year in business and technology circles has been the relationship between the CMO and CIO. And for good reason. We're in the middle of one of the most transformative evolutions of digital technology adoption of our time. But while CMOs and CIOs know they need to find ways to work together more closely in what Forrester is calling the "Age of the Customer," many executives see it as an alliance of necessity more than a exciting relationship. Why? In a word: territory. For years, the two worlds were silos, separated by corporate boundaries.


Putting capabilities to use
A capability is simply the ability to do something: it literally has no function until it’s placed together with a function-interface – the external interface to a service – and with the various other elements that make up and identify and drive the actual service. The ‘service-content‘ frame, from modelling with Enterprise Canvas, summarises where capabilities sit in context of all those other elements in a service:


Implementing Oracle RAC on Extended Distance Clusters
A special implementation of Oracle RAC lets you add an extended distance cluster, also called a stretched cluster, metro cluster, campus cluster, or geo cluster. With an extended distance cluster, components are deployed across two or more data center locations, allowing them to continue to function if one location fails. In normal operation, all nodes at all locations will be active. The distance for an extended Oracle RAC is determined by the type failure against which the Oracle RAC should be protected.


How an Involved CIO Can Help Your Organization Embrace Innovation and Avoid Disruption
The precise role of the CIO will depend to some degree on the technology-driven pressures facing any given company. For some, incessant advances in technology are a blessing. Their companies or perhaps industries are embracing change and innovation and reaping the rewards. Here, the role of the CIO is to help stay at the forefront of technology or at the very least, not lose any ground to competitors.


Top 8 Ways Banks Will Spend Their 2014 IT Budgets
Generalities and industry numbers fail to take into account the specific conditions at individual banks. For instance, at Capital Bank in Raleigh, N.C., the IT budget for 2014 is flat in comparison to this year. Chief Operating Officer Zahid Afzal, says the bank will increase its investment on mobile, cybersecurity, regulatory compliance, and more convenient products and services for customers. IT purchases will include sales and service tools, cybersecurity and fraud management software, mobile and payments products and services, storage solutions, and big data and business intelligence related tools,


The 9 hardest things programmers have to do
A recent discussion thread on Quora got developers to share what they felt were the hardest tasks that the job requires. Using the input and scores from that thread, and another, older one on Ubuntu Forums, ITworld has compiled a list of the 9 hardest tasks for programmers. As you’ll see, it turns out that actually writing code isn’t one of the harder parts of programming. If you develop software for a living, see how of many of these tasks are on your list.


Change the organization or change the organization
It used to be that old-school, industrial-age organizations could accommodate stepped change. For purposes of this article we will consider the mechanical approach to forcing change through (described in Post 1) to be Change Management 1.0. However, with the rate of innovation and competition accelerating, pressure is on organizations to change far more rapidly. Consider organizations such as Kodak, Nokia, or, more recently, Research in Motion, who seem to be failing to keep up. Consider the external environmental pressures such as:


Dell committed to computing solutions
Dell Venture is dedicated to the success of tech entrepreneurs and is aligned with Dell's own strategy and growth objectives. The model is an investment relevant to Dell's strategic objective sand priorities, investing $5 million-$15 million, averaging $3 million-$5 million. Dell Ventures' model is to co-invest with venture capitalists and other strategic actors, servicng as a board adviser and making the full breadth of Dell resources available to the portfolio company.



Quote for the day:

"Good people are good because they've come to wisdom through failure" -- William Saroyan