April 09, 2013

Update on TOSCA
TOSCA is an emerging industry standard which will improve portability of complex application workloads between clouds, to increase customer choice among cloud providers and to enable cloud-bursting. TOSCA is being developed in OASIS; the 1.0 version has passed the vote to be a committee specification; the specification is stable enough to develop to; and interoperability between 2 independent implementations has been demonstrated. ... Join this webinar for an update on TOSCA.


Fusion-io releases 1.6TB flash card, HP preps workstations for them
The new ioFX card has a top speed of 1.4GBps for reads, and 1.1GBps for writes. The previous version of the card had the same write speed, but a 700MBps read speed. "There are so many more [flash] chips configured in parallel, we naturally get a much higher write performance," said Vincent Brisebois, Fusion-io's director of visual computing. "But, usually write performance is not the focus of workstations."


Software lifecycle: Pay early attention to cloud performance
The best way to prevent performance problems is to take cloud issues into account early in the software lifecycle. That is notoriously difficult to accomplish, said Stephen Pierzchala, a technology strategist for Detroit-based Compuware Corp., which sells application performance management software. "Getting developers to factor in performance before they [write a line of code] is challenging," he said. "It's the biggest fight."


Meet the challenges involved in migrating to the cloud
Swidler discusses cloud design and patterns for application migration to the cloud. One question he answers is about why, in a very general sense, does it make sense to move into the cloud. He begins this discussion with an examination of the developers' motivation to create software. ... The developer's job isn't finished when the application is deployed, he says, and continues until the customer has consumed the value of the developer's ideas.


Multiple convolution neural networks approach for online handwriting recognition
As the most of recent approaches, the system proceeds by segmenting handwriting words into smaller pieces (usually characters) which are recognized separately. The recognition results are then the composition of the individually recognized parts. They are sent to the input of a word recognition module in turn to choose the best one by applying some dictionary search algorithms. The proposed classifier overcomes obstacles and difficulties of traditional ones to big character classes.


Technology Revolution and Risk
Technology change is part of the fabric of our society and with any technological revolution or change comes risks that need to be managed. The recent articles on Google Glass have highlighted the risks surrounding privacy, which is a key legal & compliance risk, and strategic risk in regards to competitor response to their innovation. The Apple iPhone 5 articles highlight risks around the operational risks of customers and products and strategic risk.


Bringing Big Data into Focus
The meaning of "big data" remains hard to pin down, and perhaps this will always be so because it describes what lies beyond the known limits of an organization's information technology implementations. Why are the limits there? It could be due to inadequacies in technology, skill sets, funding, data architecture, all of the above, or even none of the above.


Centralized vs. decentralized SDN architecture: Which works for you?
An area of concern for the centralized model in the network device element is the way OpenFlow forwarding is actually supported. Most modern switches and routers use custom silicon to manage the data-forwarding process, but not all implementations of OpenFlow take full advantage of this "fast-path" technology. As a result, OpenFlow forwarding performance is slower than native protocol support would be.


3 Ways to Overcome IT Outsourcing People Problems
IT outsourcing providers do a little better in the talent development department. It is their core business after all. Yet just under half of service providers said they had formal training programs in place to develop industry expertise and skills in analytics and relationship management, according to the survey. And just 60 percent of providers said they invest in core capabilities such as transition management and continuous improvement.


US Air Force designates cyber tools as weapons
Speaking to a cyber conference held in conjunction with the National Space Syposium in Colorado Springs on Monday,according to Reuters, the official said "this means that the game-changing capability that cyber is is going to get more attention and the recognition that it deserves. It's very, very hard to compete for resources [...] You have to be able to make that case."



Quote for the day:

"To win…you've got to stay in the game…" -- Claude M. Bristol

No comments:

Post a Comment