February 13, 2013

40 GbE technology: Hurry up and wait
Believe it or not, the 40 Gigabit Ethernet era is already upon us. The standard has long since been ratified, and products are shipping. But for the time being, 40 Gigabit Ethernet is having trouble moving out of first gear. A few reasons for the delay include existing wiring infrastructure, where these faster Ethernet switches are placed on networks, slower adoption of 10 GbE (which has been mostly on servers) and the preponderance of copper gigabit network connections.

Why Software Still Stinks
This webcast, delivered by a software quality professional and a respected industry analyst who researches security products, will discuss what organizations must do to roll out an effective application security program, which includes the right mix of training, tools, best practices and assessment that yield the highest mitigation on investment.

Big security for big data
Catching a hacker and being able to stop them as the attack is taking place is more useful to a company than being able to use forensics to piece together an attack that already took place. However, in order to have that as part of your arsenal, we have to resolve four problems: How do you insert data faster into your data store?; How do you store all this data?; How do you quickly process events?; How do you return results faster?

Apigee Big Data Insights: Are You in Control of Your App Economy?
According to Apigee, organizations no longer own or control all the data they need to make accurate business decisions. Just as consumers are learning that they don’t necessarily control the types of information that are collected about them, the amount of data generated by the mobile apps and plugins deployed by companies isn’t always easy to access or analyze.

IT training gets an extreme makeover
There are a number of variables helping to push staid PowerPoint presentations into history's dustbin. "Innovative IT training programs got their start because of cost-cutting measures," says Kendra Lee. As IT managers contend with shrinking budgets and skeleton staffs, many can no longer afford to enroll their workers in monthlong, off-site workshops. At the same time, new delivery mechanisms, such as cloud technology, are enabling companies to offer online courses anytime, anywhere, and at a fraction of the cost of on-premises programs.

How to Implement Lean BI
So, what is Lean BI? Lean BI is about focusing on customer value and generating additional value by accomplishing more with existing resources by eliminating waste. Lean BI is a set of principles and practices that have been influenced by three main concepts: Lean manufacturing; Systems theory; and Agile project management.

Building Android Apps with MVVM and Data Binding
As the name implies, MvvmCross is an open source, cross-platform MVVM framework for Windows Phone, Mono for Android, MonoTouch, the Windows Runtime and more. Part of bringing MVVM to platforms where it wasn't previously available means that it also enables you to take advantage of rich data binding support in your views. This feature is quite powerful, and can save you a lot of time and code.

Lawmakers to reintroduce controversial info-sharing bill
Representatives Mike Rogers, a Michigan Republican, and C.A. "Dutch" Ruppersberger, a Maryland Democrat, are scheduled to reintroduce the Cyber Intelligence Sharing and Protection Act (CISPA) on Wednesday, they said in a press release. The new version of CISPA will be identical to the one that passed the U.S. House of Representatives despite objections from several privacy groups.

Don't open that PDF: There's an Adobe Reader zero-day on the loose
"Upon successful exploitation, [the exploit] will drop two DLLs [dynamic link libraries]. The first DLL shows a fake error message and opens a decoy PDF document, which is usually common in targeted attacks. The second DLL in turn drops the callback component, which talks to a remote domain," FireEye said. FireEye says it has submitted the sample to Adobe's security team and, without a new patch available from the company, is warning users not to open any unknown PDF files until it receives confirmation.

COBOL will outlive us all
Yes, most of the smaller COBOL programs written in the 1970s, 1980s, and even 1990s have been replaced with newer systems and newer technologies. However, the big mission critical systems written long ago in COBOL and modified and enhanced for the past thirty to forty years are still driving very large, very prestigious companies around the country and around the world. These companies include banks, insurance companies, manufacturing companies, retail chains, health care organizations, and every other type of company you can imagine.

Can New Software Testing Frameworks Bring Us to Provably Correct Software?
We can get CPUs that are consistent and reliable, and we can get compilers that work on top of them that are provably correct. Pascal creator Nicholas Wirth described how to write a correct compiler in his book, Compiler Construction, back in 1996. It should be a simple step from there to create "functionally correct" programs that can, for any input, produce the correct output. The only problem is that no one seems to be able to actually do it.

Quote for the day:

"Any sufficiently advanced bureaucracy is indistinguishable from molasses." -- Anonymous

No comments:

Post a Comment