January 19, 2013

ETL to ELT Conversion Testing in Data Warehouse Engagements
The concept of ELT data warehouse technology came into existence because of the high business demand for error-free, high-quality input data in data warehouse systems. Here the approach is bottom-up. The data is initially extracted to a staging area, where the business rule and integrity checks are performed. With ELT, the load and transformation processes are decoupled from each other.

Get a free IT or corporate compliance plan template for assessing risk
SearchCompliance.com has scoured the Web for free IT and corporate compliance plan templates and downloads for organizations looking to shore up their compliance strategies.While not all specifically aimed at the IT organization, they provide sound guidelines for building a targeted corporate compliance plan, as well as ensuring regulatory compliance at all levels of the enterprise.

Microsoft's December Azure outage: What went wrong?
Some of the nodes didn't have node protection turned on. The monitoring system for detecting this kind of problem had a defect, resulting in no alarms or escalation. On top of this, a transition to a new primary node triggered a reaction that led to an incorrect formatting of other nodes. Normally, according to the post, Azure should have survived the simultaneous failure of two nodes of data within a stamp, as the system keeps three copies of data spread across three separate fault domains.

The problem with a Lean Startup: the Minimum Viable Product.
When most people hear the concept of Lean Startup, they think bootstrap startup, ya know lean on funding. While this isn’t always true it’s suprisingly still prevelant thinking. Perhaps Eric Ries should have done an MVP of the movement’s name and received some user feedback on it before writing the book.

Are e-visits as good as office appointments?
"All over the country, more and more of these e-visits are taking place," said Dr. James Rohrer, a family medicine doctor at the Mayo Clinic in Rochester, Minnesota, who has studied online care. Insurance companies believe e-visits will save money, he said. For patients, the biggest benefit is convenience - including that they don't have to schedule the appointment beforehand.

Create sacred space as a way of honoring yourself and others
Consider slowing down enough to honor yourself and those who follow you. Begin this new year with a way to revere and respect others. Observe those times that are calling you to be fully present in order to deepen relationships within the sacred space you’ve created. Take a deep breath (it’s amazing what a little extra oxygen can do), and consider how you can devote some time for yourself or others in ways that make the space you occupy (alone or together with others) sacred.

Cybersecurity to be part of India's college, university curriculum
Cybersecurity is set to be introduced as a subject in universities and technical colleges in keeping with the recommendations of a task force on National Security System. University Grants Commission (UGC) has written to all the vice chancellors in this respect, asking them to introduce the subject both at under-graduate and post-graduate levels, sources said.

Apache Isis: Java Framework for Domain-Driven Design
Apache Isis works using convention-over-configuration where developers write POJO domain objects following a set of conventions and annotations. These are then interpreted by the Isis framework, which then takes care of presentation, security and persistence. Apache Isis can generate a representation of the domain model, at runtime, as a web application or as a RESTful API following the Restful Objects specification.

Security vendors failing to tackle mobile malware, say CISOs
Malware is still the biggest threat to mobile security, but most mobile device management (MDM) strategies tend to focus on securing the physical device in case of loss of theft, rather than protecting from cyber threats, according to Peter Gibbons, head of Information Security at Network Rail.

Korea’s Malware Infection Rate Increases Six-fold in Six Months
Data from the Microsoft Security Intelligence Report volume 13 indicates that Korea’s malware infection rate (Computers Cleaned per Mille or CCM) increased 6.3 times during the first half of 2012. During this period the number of systems cleaned per 1,000 systems scanned by the Microsoft Malicious Software Removal Tool (MSRT) in Korea increased from 11.1 in the fourth quarter of 2011 (4Q11) to 70.4 in the second quarter (2Q12) of 2012.

Quote for the day:

"People are persuaded by reason, but moved by emotion; the leader must both persuade them and move them." -- Richard M. Nixon

No comments:

Post a Comment