January 17, 2013

Integrate information governance policy for corporate strategy success
In short, you need to leverage risk management to build effective policies that ensure data quality. Ask and answer the question, "What could go wrong?" Once you've identified potential snags, explore the probability and impact of such risks, and validate your assumptions to suppress false alarms. Then, look to develop policies to mitigate estimable risks; to support these policies, you need a technical architecture that maintains and promotes accessibility, version control and integration.


RIM gets Visa approval for mobile payments via NFC
The system, called Secure Element Manager (SEM), provides software and server infrastructure in the cloud that is managed full-time globally by RIM, said Geoffrey MacGillivray, senior product manager for NFC services at RIM, in an interview. SEM works with the secure element installed in SIM (Subscriber Identity Module) cards or the embedded secure element installed in NFC-ready mobile devices.


Malware Fights the Power
A recent report by the United States Computer Emergency Readiness Team (ICS-CERT), a division of the U.S. Department of Homeland Security, announced that both "common and sophisticated malware" had infected the controls of a power generation facility.


Microsoft OEM Windows 8 Device Showcase
Microsoft's U.S. OEM chief Peter Han leads the five-minute walkthrough in a showroom on the Microsoft corporate campus. He runs through some of the best features of some convertibles, tablets and all-in-ones. Models include the Sony VAIO Duo 11, Dell XPS 13, Lenovo IdeaPad Yoga 13, Toshiba Satellite U945, ASUS VivoBook, ASUS VivoTab RT and HP TouchSmart.


Optimizing “Zero Dark Thirty”
“Anytime you’re trying to simulate dust or water or fire, it hits not only the performance layer but the capacity layer, and both quite hard. It means you’re accumulating terabytes within days because you’re simulating millions or billions of particles every minute,” says Gino Del Rosario, head of technology at Vancouver-based Image Engine.


Forrester survey tries to pinpoint hardest-working CISOs across the world
Do chief information security officers (CISOs) in North America work harder than their security counterparts in Europe? That's the conclusion Forrester Research has reached, saying North American security teams seem to have more responsibilities in terms of what they need to oversee and manage than their peers in the European Union, the research firms stated in its report, "Understand Security and Risk Budgeting for 2013."


Using Microsoft POS for .NET in 2011
This is just a reminder, as this was true back in 2006 too. You’d typically expect to be able to install the peripheral’s driver and then utilize it within your .NET application. However, you also need to install intermediary Common Control Objects. I always end up downloading the CCOs from here.


Stop doing what the vendors tell you, CIOs told
In business, setting priorities is essential: whether you’re a retailer focused on selling at the lowest possible price or a boutique that prizes customer service above all else. The problem with CIOs is they don’t appear to share the singular focus of their organisation. In general corporate IT strategies are largely interchangeable and loaded with generic statements about cost and service levels.


Eich tells how to prevent JavaScript memory leaks
Although JavaScript has automatic memory management, it can have issues with memory "leakage," which can harm program performance. The issue is widely known, but it still is a common failure in JavaScript apps. To help developers, InfoWorld Editor at Large Paul Krill asked JavaScript founder Brendan Eich how to deal with and prevent these memory leaks.


How to Use Big Data to Make Faster and Better Business Decisions
By using new Big Data technologies, organizations can answer questions in seconds rather than days and in days rather than months, Barth says. This acceleration, in turn, allows businesses to answer questions that have resisted analysis, develop test and learn processes that quickly adapt to the market and automate complex workflows.



Quote for the day:
"Try, try, try, and keep on trying is the rule that must be followed to become an expert in anything." --W.Clement Stone

No comments:

Post a Comment