March 28, 2013

BYOD is not for everybody, and especially not for executives
As computing devices get more personal and pervasive, people are going to be more confident and competent in their personal use of technology whether they’re on a desktop computer or a mobile device. But if you’re a CEO, director, manager, or your employment status makes you eligible for litigation, then bringing your own device to work can be detrimental to your personal and professional life.

A Serious Question for Serious Practitioners
The question Daryl Conner about to ask is aimed at seasoned practitioners who are at least proficient (preferably highly skilled) in practicing their craft and who relate to this work as an aspect of their life’s mission. Anyone reading this blog is invited to consider the question but that’s who it’s aimed at. Here is the question: Is there something beyond the obvious you are hoping to achieve through your work?

Update: Spamhaus hit by biggest-ever DDoS attacks
Matthew Prince, CEO of CloudFlare, a San Francisco-based firm that has been helping Spamhaus over the past few days, today said that the attacks have been going on since March 19 and have generated up to 300Gbps of DDoS traffic. That's about three times bigger than the biggest DDoS attacks seen so far and several magnitudes greater than the 4Gbps to 10Gbps of traffic generated by typical DDoS attacks.

5 Leadership Lessons: Avoiding the "Mediocre Me" Mindset
Mediocre Me by Brigadier General John Michel is a challenge to think differently about your role in the world. “Instead of the term leader being synonymous with someone who strives to use their influence to build value into their surroundings,” writes Michel, “it is more likely we associate it with someone doing whatever it takes just to keep the routine going.” Here are five more thoughts from Brigadier General John Michel:

iPhones most 'vulnerable' among smartphones
According to SourceFire's "25 Years of Vulnerabilities" study released in early March, which analyzed vulnerabilities from the Common Vulnerabilities and Exposures (CVE) data and National Vulnerability Database (NVD), the majority of mobile phone vulnerabilities have been found in Apple's iPhone. The database provides 25 years of information on vulnerabilities to assess, spanning from 1988.

On Kickstarter: The $99 Android-Powered MiiPC May Be Your Child's Next Computer
It launches this summer with Jellybean 4.2, a 1.2GHz Dual Core processor, 1GB of memory, and 4GB of internal flash storage. The box also packs in 2 USB ports, a speaker and microphone jack, Wifi, Ethernet, Bluetooth, and HDMI out. The developers have made tweaks to both the UI and base Android OS, optimizing it for large-screen displays of up to 1920×1080 resolution and baking in support for unlimited user accounts.

Coursera - Machine Learning
This course provides a broad introduction to machine learning, datamining, and statistical pattern recognition. Topics include: (i) Supervised learning (parametric/non-parametric algorithms, support vector machines, kernels, neural networks). (ii) Unsupervised learning (clustering, dimensionality reduction, recommender systems, deep learning). (iii) Best practices in machine learning (bias/variance theory; innovation process in machine learning and AI).

Global IT Spend Will Rise 4.1% To $3.8T In 2013, With Mobile And Enterprise Leading The Way
Gartner has just released its annual projections on worldwide IT spend over the next two years — arguably the analyst house’s most wide-ranging report covering sales in hardware, software, enterprise and telecoms. The overall trends continue to point up: globally we will see $3.8 trillion spent across all categories, a rise of 4.1% on 2012. That’s a sign of some recovery on a year ago: growth in 2012 was only 2.1%. Mobile and enterprise services are fuelling a lot of the good news, and Gartner further notes that the same trends will largely continue into 2014.

Windows Blue: Why IE 11 is taking a leaf from BlackBerry's book
The version of IE 11 in the leaked build of Windows Blue doesn't do quite that, which is a good thing: browsers trying to interpret prefixes marked for other browsers is not the way to get well-built web pages that take advantage of standards. What is seems to do (remember, this is an unofficial leaked build), is to use a brand new user agent string: IE instead of MSIE. Developers can still target IE specifically, but IE 11 won't be hampered by being sent to versions of pages designed for old builds of IE with bugs long since fixed.

Digital skills a key to the C-Suite: The rise of the Chief Digital Officer
Enter the chief digital officer (CDO). While the CIO labours to keep leading companies abreast of cumbersome, enterprise-wide technology upgrades and efficiencies – virtual servers, enterprise resource planning (ERP) and IT infrastructure of all kinds – and working behind the scenes, the CDO's remit is customer-focused (front end) technologies, investigating the social web, online marketing, data analytics and the impact of the digital revolution on the essence of a company's business strategy.

Quote for the day:

"Give me six hours to chop down a tree and I will spend the first four sharpening the axe." -- Abraham Lincoln

No comments:

Post a Comment