November 29, 2013

Agility, Big Data, and Analytics
Agile hinges on embracing and adapting to change by enabling rapid feedback cycles and evolutionary development. However, bringing agility into big data (and small data) analytics has been a challenge for many, very bright and talented, data scientists and engineers. In this article we’ll explore what makes analytics uniquely different than application development, and how to adapt agile principles and practices to the nuances of analytics.


Structuring a big data strategy
IT executives first need to formulate a clear business case and execution strategy. Without those elements in place, any effort put forth to gather, classify, analyze and ultimately act on data might be for naught.  This essential guide prepares business and IT executives for success by showing how their peers have made the business case for big data and rolled out a big data strategy in their organizations. Learn the tools, technologies and strategies used to turn big data into big business insights.


Flash Startup Pure Storage Fights EMC in Trade-secrets Battle
The fight has exposed competitive tensions surrounding all-flash arrays, which are expected to play a growing role in data centers as enterprises seek faster data access and more efficient storage platforms. Pure is a specialist in all-flash gear that started shipping in 2011, while the venerable EMC is aggressively pursuing the market through its acquired XtremIO division.


Call-Log App Aims to Reverse-Engineer NSA Surveillance
The NSA was revealed to routinely collect such logs from Verizon in some of the first documents leaked by erstwhile intelligence agency contractor Edward Snowden this year Other companies are believed to be under similar obligations. Those logs include what the NSA calls “metadata”—the time, duration, and source and origin numbers of every call. The agency says it searches its metadata collection only for specific phone numbers related to investigations, but opponents of the program claim that, with careful analysis, the database could be used to reveal personal details on a vast scale.


Is The UK Sleepwalking Towards Internet Censorship?
Schmidt was basing his prediction on improvements in encryption. Google, along with Facebook, Yahoo and, today, Microsoft have all announced major improvements in security following the recent revelations from former NSA contractor Edward Snowden about government spying. “We have strengthened our systems remarkably as a result of the most recent events,” Schmidt said. “It’s reasonable to expect that the industry as a whole will continue to strengthen these systems.”


Consumer cloud services: Friend or foe?
IT pros have valid concerns about data leaking from the cloud, but in the grand scheme of things, a data leak is only as earth-shattering as the information that leaks. If the information that gets out via a cloud hack or employee carelessness isn't mission-critical, then it stands to reason that it doesn't matter much that it's been made public. If you can get past the security concerns, allowing the use of consumer cloud services -- such as Dropbox and Google Drive -- means that IT doesn't have to manage an in-house service.


Building a RESTful Web Service with Spring Boot to Access Data in an Aerospike Cluster
Spring Boot is a powerful jump start into Spring. It allows you to build Spring based applications with little effort on your part.Aerospike is a distributed and replicated in-memory database optimized to use both DRAM and native flash/SSDs. Aerospike also has high reliability and is ACID compliant. Developers can quickly scale their database cluster from two nodes to twenty nodes without bringing down the database service.


IT group slams Chinese govt for not doing enough
Describing Beijing's efforts toward IT development as "insincere", Witman Hung Wai-Ma, chairman of Internet Professional Association (iProA), said the industry's prospects had become so dire that the group felt it necessary to speak out against the government, according to a report Friday on South China Morning Post. Hung is also co-founder of Next Horizon, which provides backoffice process outsourcing.


Google privacy changes break Dutch data protection law, says regulator
The report said it was "almost impossible" for a Dutch internet user not to interact with Google "be it via Search, YouTube or Maps, or passively through third-party websites" and that "Google does not properly inform users which personal data the company collects and combines, and for what purposes." It also said that proper user permission "cannot be obtained by [their] accepting general (privacy) terms of service."


Magnetic tape to the rescue
WHEN physicists switch on the Large Hadron Collider (LHC), between three and six gigabytes of data spew out of it every second. That is, admittedly, an extreme example. But the flow of data from smaller sources than CERN, the European particle-research organisation outside Geneva that runs the LHC, is also growing inexorably. At the moment it is doubling every two years. These data need to be stored. The need for mass storage is reviving a technology which, only a few years ago, seemed destined for the scrapheap: magnetic tape



Quote for the day:

"I've got a theory that if you give 100% all of the time, somehow things will work out in the end." - Larry Bird


No comments:

Post a Comment