Avoiding too many user stories in software development
Too often project teams use only the user's perspective to rank the value of all product requirements. In this scenario, the team forgets to consider other product partners such as the business, compliance and technology perspective when prioritizing. The user may want to have the story realized in the next release, but it may not be the best option when weighting the value considerations of all the partners.
Microsoft Thinks DRM Can Solve the Privacy Problem
Mundie, who until late last year was in charge of Microsoft’s research wing as its chief research and strategy officer, thinks a system of DRM technology, accompanied by laws and regulations to enforce it, could provide the answer. “I think we’re going to have to have a usage-based way of controlling this now,” he said. “One way to do that is to put cryptographic wrappers around these things that control uses of this data.”
Leveraging HBase and Hive
In short, think of Hive as an append-only SQL database and HBase as a more typical read-write NoSQL data store. Hive is useful for SQL integration if you want to store long-term data to be processed and summarized and loaded back. Hive's major limitation is query speed. When dealing with billions of rows, there is no live querying of the data that would be fast enough for any interactive interface to the data.
HP leads war against Microsoft; will other PC makers follow?
When it comes to Microsoft what she's talking about, of course, is Microsoft's line of Surface tablets. And what's really got her really riled is that Microsoft isn't content to sell just to consumers. It's also using the same strategy that HP and other business-oriented OEMs pursue, of authorizing distributors and resellers to sell to businesses as well. That's HP's bread and butter, and in Whitman's view, Microsoft is trying to take it away, especially because the Surface Pro and Surface Pro 2 are being marketed not just as tablets, but as ultralight notebooks.
How Microsoft’s server offerings blur the boundary between on-premises and the cloud
Microsoft is using the release of its R2 wave of server and management tools to bring on-premises infrastructure and cloud closer together, while leaving you the option of running your network the way you always have. That’s a smart move — you can upgrade and gain the performance benefits of an updated kernel, as well as many new features across many of the server roles, and when you’re ready, you can start to take advantage of its private cloud features in your networks.
Chucky’s top BI Dashboard design and delivery worst practices (Part One)
Unfortunately, a careless approach to BI dashboards is far too common, and has the potential to derail and devalue your entire analytics project. To avoid becoming an unwitting victim of cavalier dashboard cowboys – and ensure that your BI dashboards deliver accurate, timely, relevant and actionable insights at-a-glance – avoid these design and delivery mistakes. ... Check out part two of this series as well.
New NIST cybersecurity standards could pose liability risks
The framework was developed with input from industry stakeholders. It is not designed to mandate specific security controls. Rather, it offers broad standards for identifying and protecting critical data, services and assets against cyber threats. It offers a set of best practices for detecting and responding to an attack, mitigating the fallout from cyber incidents and for managing risks overall.
Providers see revenue opportunity with cloud load balancer technology
As providers show more interest in buying cloud load balancers, there is an opportunity for ADC vendors like Array to partner with providers. "Providers are becoming customers/partners/resellers," Anderson said. "Providers can buy our ADCs for their environment, or if their customers want to purchase dedicated load balancing or physical appliances as a part of a private cloud offering, they are buying our ADC technology through the provider."
Recruiting Is a People Business
“Technology without people can be pretty worthless,” Hoyt said later. There are a lot of tools we can use, but “if you’ve implemented a solution without adoption, you’ve failed.” Recruiting leaders shouldn’t just pick up the next big thing, they need to work with the people involved to find what really works. When you’re going global, one of the first things you learn is to talk less and listen more because “all of the great ideas don’t come from North America,” said Kent Kirch, Deloitte’s global director of talent acquisition and mobility .
So much data, so little security -- what happens if your city gets hacked?
To date, users have agreed to give away certain discrete pieces of information -- such as a name or email addresses -- in exchange for something -- a product or a service, for instance. That situation is no longer viable, Craig Mundie, senior advisor to Microsoft CEO Steve Ballmer, told attendees at the Emtech conference held at the Massachusetts Institute of Technology (MIT) here today.
Quote for the day:
"No act of kindness, no matter how small, is ever wasted." -- Aesop
Too often project teams use only the user's perspective to rank the value of all product requirements. In this scenario, the team forgets to consider other product partners such as the business, compliance and technology perspective when prioritizing. The user may want to have the story realized in the next release, but it may not be the best option when weighting the value considerations of all the partners.
Mundie, who until late last year was in charge of Microsoft’s research wing as its chief research and strategy officer, thinks a system of DRM technology, accompanied by laws and regulations to enforce it, could provide the answer. “I think we’re going to have to have a usage-based way of controlling this now,” he said. “One way to do that is to put cryptographic wrappers around these things that control uses of this data.”
Leveraging HBase and Hive
In short, think of Hive as an append-only SQL database and HBase as a more typical read-write NoSQL data store. Hive is useful for SQL integration if you want to store long-term data to be processed and summarized and loaded back. Hive's major limitation is query speed. When dealing with billions of rows, there is no live querying of the data that would be fast enough for any interactive interface to the data.
HP leads war against Microsoft; will other PC makers follow?
When it comes to Microsoft what she's talking about, of course, is Microsoft's line of Surface tablets. And what's really got her really riled is that Microsoft isn't content to sell just to consumers. It's also using the same strategy that HP and other business-oriented OEMs pursue, of authorizing distributors and resellers to sell to businesses as well. That's HP's bread and butter, and in Whitman's view, Microsoft is trying to take it away, especially because the Surface Pro and Surface Pro 2 are being marketed not just as tablets, but as ultralight notebooks.
How Microsoft’s server offerings blur the boundary between on-premises and the cloud
Microsoft is using the release of its R2 wave of server and management tools to bring on-premises infrastructure and cloud closer together, while leaving you the option of running your network the way you always have. That’s a smart move — you can upgrade and gain the performance benefits of an updated kernel, as well as many new features across many of the server roles, and when you’re ready, you can start to take advantage of its private cloud features in your networks.
Chucky’s top BI Dashboard design and delivery worst practices (Part One)
Unfortunately, a careless approach to BI dashboards is far too common, and has the potential to derail and devalue your entire analytics project. To avoid becoming an unwitting victim of cavalier dashboard cowboys – and ensure that your BI dashboards deliver accurate, timely, relevant and actionable insights at-a-glance – avoid these design and delivery mistakes. ... Check out part two of this series as well.
New NIST cybersecurity standards could pose liability risks
The framework was developed with input from industry stakeholders. It is not designed to mandate specific security controls. Rather, it offers broad standards for identifying and protecting critical data, services and assets against cyber threats. It offers a set of best practices for detecting and responding to an attack, mitigating the fallout from cyber incidents and for managing risks overall.
Providers see revenue opportunity with cloud load balancer technology
As providers show more interest in buying cloud load balancers, there is an opportunity for ADC vendors like Array to partner with providers. "Providers are becoming customers/partners/resellers," Anderson said. "Providers can buy our ADCs for their environment, or if their customers want to purchase dedicated load balancing or physical appliances as a part of a private cloud offering, they are buying our ADC technology through the provider."
Recruiting Is a People Business
“Technology without people can be pretty worthless,” Hoyt said later. There are a lot of tools we can use, but “if you’ve implemented a solution without adoption, you’ve failed.” Recruiting leaders shouldn’t just pick up the next big thing, they need to work with the people involved to find what really works. When you’re going global, one of the first things you learn is to talk less and listen more because “all of the great ideas don’t come from North America,” said Kent Kirch, Deloitte’s global director of talent acquisition and mobility .
So much data, so little security -- what happens if your city gets hacked?
To date, users have agreed to give away certain discrete pieces of information -- such as a name or email addresses -- in exchange for something -- a product or a service, for instance. That situation is no longer viable, Craig Mundie, senior advisor to Microsoft CEO Steve Ballmer, told attendees at the Emtech conference held at the Massachusetts Institute of Technology (MIT) here today.
Quote for the day:
"No act of kindness, no matter how small, is ever wasted." -- Aesop
No comments:
Post a Comment