January 12, 2013

3 transformational technology trends that we seem to be missing in 2013
Contrary to what most analysts are predicting, Udayan Banerjee, CTO, NIIT Technologies says that we are unlikely to hear success stories about Big Data in 2013 and that cloud will go down the “trough of disillusionment.” Banerjee details three transformational technology trends to watch out for in 2013

Characteristics of High Maturity SOA Implementation
Benchmarking is a good approach to identify the current state of SOA implementation as compared to an industry recognized maturity model. This also helps to define a target state and then work towards achieving it. Amongst many SOA maturity models the Open Group's OSIMM v2 is quite popular and defines seven levels

Revolution Analytics Uses Open Source R To Compete With SAS, SPSS
Revolution Analytics provides an enterprise distribution of R. The company is looking to battle both SAS ans SPSS on price, performance on distributed and massively parallel computing, and adoption in the cloud, according to Davis Smith, Revolution’s vice president of marketing and community.

Top 20 exciting features of SQL Server 2012 – Part 1
In this article Shivprasad Koirala discusses 20 features of SQL Server 2012 which he personally like (we can agree to disagree on my list) and from these 20 features, 7 are revolution and 13 are evolution. This article is divided in to 4 parts, in every part we will discuss 5 features. So let’s start with the first 5 top features.

Homeland Security warns to disable Java amid zero-day flaw
"We are currently unaware of a practical solution to this problem," said the DHS' Computer Emergency Readiness Team (CERT) in a post on its Web site on Thursday evening. "This vulnerability is being attacked in the wild, and is reported to be incorporated into exploit kits. Exploit code for this vulnerability is also publicly available."

Firefox adds built-in HTML5-based PDF viewer to improve security
The browser maker described the built-in PDF viewer as more secure and safer than proprietary PDF viewing plug-ins, like those installed by Adobe Reader or Foxit Reader. However, several security experts noted that it probably won't be free of vulnerabilities.

Best practices to navigate the Dodd-Frank/SEC whistleblower program
Whistleblowers, and the broader topic of how companies respond to internal reports of regulatory violations, have always been topics of concern, said R. Todd Cronan, partner at Boston-based law firm Goodwin Procter LLP. Additionally, the SEC whistleblower program has elicited even more upper-management attention.

Async Unit Tests, Part 1: The Wrong Way
If you don't write unit tests - or if you or your manager think writing tests just delays software development - then I refer you to the best computer book ever written, Code Complete. In that book, Steve McConnell presents some very interesting hard facts about testing. I hope we can all agree that unit testing is a fundamental skill in Modern Programming. And this brings me to a sad chapter in async/await support: the "obvious" way to do unit tests is wrong.

SAS and IBM at forefront of growing Big Data predictive analytics market: Forrester
The Forrester Wave: Big Data Predictive Analytics Solutions Q1 2013 report evaluated 10 vendors providing predictive analytics solutions, pointing to SAS and IBM as having the strongest market presence and strategy. According to Forrester, end user customers are increasingly looking to predictive analytics in order to boost profitability and predict business outcomes by analysing correlations and trends in data sets.

SecurEnvoy, PasswordBank Take Tokenless Authentication to Cloud
SecurEnvoy, a provider of tokenless authentication products, has partnered with PasswordBank to take tokenless, two-factor authentication to the cloud and provide it as a service to PasswordBank's customers, complementing PasswordBank's identity management solutions.

Quote for the day:

"Some defeats are only installments to victory" -- Jacob A. Riis

No comments:

Post a Comment