May 09, 2013

Keeping up with Moore's Law is getting harder
"Are we closer to an end than we were five years ago? Of course. But are we to the point where we can realistically predict that end, we don't think so. We are confident that we are going to continue to provide the basic building blocks that allow improvements in electronic devices," Holt said.

Does a cloud have to be public, or can it be private?
Is "private cloud" an oxymoron? Or just plain moron? The top brass at Amazon Web Services have been very clear since the launch of the e-tailers public cloud in 2006 that they do not believe in private clouds running in corporate data centers, and that to be a cloud, by definition, means being a shared public utility and not investing in servers, storage, switches, and infrastructure software.

Flash vs. Hybrid vs. HDD Decision Points
Today’s storage landscape is more competitive than it’s ever been. CIOs in the market for new storage have a plethora of options from which to choose, from making a decision to buy from a traditional storage vendor vs. a scrappy startup, to deciding between flash versus HHD, to everything in between. Such a range of options and opportunities often breeds concern over making the right choice for an organization’s storage needs.

Can't Use DHCP? Try VMM 2012 IP Pools
IP Pools are best described by what they aren't: They aren't DHCP. They might look like DHCP and they might behave like DHCP, but VMM IP Pools are an altogether different animal. These nifty little VMM constructs enable a DHCP-like experience for Windows Server VMs. They introduce all the best parts of DHCP to server address provisioning, but without being DHCP itself. What results is the same zero-effort IP addressing experience that desktop administrators have enjoyed for years.

BaaS: The One Cloud Acronym Every Mobile App Developer Should Know
Have you heard of BaaS (Backend-as-a-Service)? No, BaaS is not some cloud based escort service, instead it describes a new type of cloud service which allows mobile app developers to offload many common ‘backend’ operations like online storage, push notifications and social network integration that they would have otherwise had to build themselves.

Highly critical vulnerability fixed in Nginx Web server software
Identified as CVE-2013-2028, the vulnerability is a stack-based buffer overflow and was first introduced in the Nginx 1.3.9 development version back in November 2012. The flaw is also present in the 1.4.0 stable version released last month. The bug, which has been rated as highly critical by vulnerability management firm Secunia, was fixed in the new Nginx 1.4.1 stable version and Nginx 1.5.0 development version.

Government Lab Reveals Secure Quantum Internet
Com Dev said it's using cheaper, off-the-shelf parts in the satellite construction because of the overall uncertainty that is a new technology. Who knows if the atmosphere can even support quantum distribution? And, if our atmosphere can support such a distribution, a practical network is still years away. The firm is shooting for a public demonstration of the technology in 2016.

Bridging IT-business divide a two-way street; BI projects can help
Determining a return on investment (ROI) for IT initiatives is often difficult. The metrics for measuring success are at best unclear—or worse, they change for each project. Furthermore, the ROI may span multiple departments or large functions, making it all but impossible to calculate in any meaningful way. What’s the ROI of your network, data warehouse or operational applications?

How to set the Big Data Strategy
The need is to understand why traditional business intelligence/data warehousing cannot solve a given problem, as big data is not necessarily the only answer. Develop a minimal set of big data governance directives upfront. Big data governance is a chicken-and-egg problem--you can't govern or secure what you haven't explored. However, exploring vast datasets without governance and security introduces risk, and firms must address this.

Different Approaches for Product Backlog Grooming
The purpose of backlog grooming is to keep the product backlog up to date and clean. Scrum doesn’t prescribe how you should do backlog grooming, and different approaches are used by product owners and teams to do this. Jeff Patton describes an experience that he had with a team that was doing backlog grooming, in the blog post backlog grooming bugs me.

Quote for the day:

"You can't let praise or criticism get to you. It's a weakness to get caught up in either one." -- John Wooden

No comments:

Post a Comment