July 09, 2013

End-user experience monitoring is key to SaaS provider success
"You don't want your customers to be your alerting mechanism," Essex says. "We had one mobile app vendor tell us that they found out their users were unhappy by reading user reviews. They said it was like buying a new car, having a wreck and not knowing about it for two weeks. The key is not to deploy blind, or you're asking for trouble."

EU increases penalties for cybercriminals and hackers
Lawmakers from the 28 nations in the EU decided Thursday, in a 541-91 vote, to assign harsher penalties for various cybercrimes, according to Reuters. Included in the increased prison sentences are at least two years for illegally accessing information systems and at least five years for cyberattacks against infrastructure, such as power plants, water systems, and transportation networks.

Worldwide IT Spending to Hit $3.7 Trillion in 2013: Gartner
Enterprise software spending is on pace to grow 6.4 percent in 2013. Growth expectations for customer relationship management (CRM) have been raised to reflect expanded coverage into e-commerce, social and mobile. Expectations for digital content creation and operating systems have been reduced as software as a service (SaaS) and changing device demands impact traditional models and markets.

5 Tips for Giving Really Amazing Presentations
Some people live for making presentations; others consider it their worse nightmare. It could be five people in a boardroom or 500 in the audience, but if you are the presenter the spotlight is on you. You'll either be the hero or the goat. No need to panic. Here are five ways to help make your presentation astounding and enjoy the opportunity to bask in the limelight.

Be more brilliant: Innovator shares his secrets
Innovation isn’t coming up with something new, he explains. That’s invention. It’s not changing how things look. That’s styling. Innovation is strategic problem-solving with an eye toward improvement and commercial viability, using creative tools like brainstorming, filtering, discerning, analyzing, synthesizing. And a big one: being open-minded.

Using SDN security strategies for network attack prevention
By programming flexible switches and other network devices to act as packet interception and redirection platforms, security teams can potentially detect and mitigate a variety of attacks that are commonly seen today. Many industry sources are referring to SDN-driven security analysis as software-defined monitoring (SDM). In SDM, SDN switches can act as packet brokers and controllers can aid in monitoring and analysis.

A Test Strategy for Enterprise Integration Points
Integration is a topic that can’t be ignored for enterprise applications, not only because integration with external systems could be error prone, but also because they are hard to test. This article introduces a commonly applicable testing strategy for integration points, which improves the coverage, speed, reliability and reproducibility of testing, and thus could be used as a reference for implementing and testing integration-heavy applications.

BYOD vs. COPE: Why corporate device ownership could make a comeback
The COPE model aims to ease some security concerns by making it easier for IT to monitor and protect devices, because they're corporate-owned while still offering many of the benefits of BYOD. With COPE, employees can still select the devices, services and apps they want to use, but IT gets to limit what those choices are, how they're implemented and the cost thresholds associated with them.

Snowden warns Tempora surveillance 'snarfs' everything, even worse than NSA's PRISM
“The NSA wants to be at the point where at least all of the metadata is permanently stored,” Snowden stated. “In most cases, content isn't as valuable as metadata because you can either re-fetch content based on the metadata or, if not, simply task all future communications of interest for permanent collection since the metadata tells you what out of their data stream you actually want.”

IT Spends One-third on Innovation
The clear road map for future CIOs is to be the change and bring about change within their organisations. The new arena of technology includesdata deluge, big data, agility, security, cloud etc., which are providing the necessary impetus to the IT leaders in making a transformation and driving innovation.

Quote for the day:

"Courage is what it takes to stand up and speak; courage is also what it takes to sit down and listen." -- Winston Churchill

No comments:

Post a Comment