Get started with the Data Format Description Language
In this age of big data, the bulk of the data begging to be analyzed is not XML, but rather it is other structured and semi-structured formats, both text and binary. Until now, no open standard has been developed that is capable of describing a wide variety of such data formats. Learn about the Open Grid Forum (OGF) proposed recommendation for a powerful language that describes many different data formats, the Data Format Description Language (DFDL).
(How To Do) XML Schema Validation
Judging by the popularity of this question on StackOverflow, it seems that a lot of people struggle to check the validity of an XML file against an XML Schema. It’s a shame that what should be a trivial task has wasted hours of developer’s lives. In this article the author try to offer a few alternatives for various platforms and hopefully make things a bit simpler. There are actually a few different options at your disposal. We’ll start by looking at what is probably the fastest and easiest option to get started with validation:
What Inexperienced Leaders Get Wrong
But as any experienced manager should know, IT is a classic illustration of the difference between bold strokes and long marches, one of my favorite managerial frameworks. Bold strokes are decisions that can be made at the top, implemented pretty quickly by command — acquisitions, divestitures, real estate purchases, layoffs. Long marches take time and the involvement of many people who must produce new elements and coordinate their actions before the change can be successful.
If CIOs became Tech company CEOs
There have been rare instances where a CIO transitioned and started selling products or services. These individuals were CIOs representing their past industries or a specific solution set; I remember one instance where the only thing such a CIO wanted to talk about is how her company had implemented a specific technology and she had lead the team towards creating the success story. She was not very successful in her pitch but told her story wherever she went.
Data Mining Reveals the Secret to Getting Good Answers
And they say their work reveals an interesting insight: if you want good answers, ask a decent question. That may sound like a truism, but these guys point out that there has been no evidence to support this insight, until now. “To the best of our knowledge, we are the first to quantitatively validate the correlation between the question quality and its associated answer quality,” say Yuan and co.
Can complex-systems be ‘architected’?
To some people – perhaps especially in the IT-related trades – ‘complexity’ is just a more extreme version of ‘complicated’: a quantitative difference, “complicated that we haven’t as yet quite pinned down the rules and algorithms for”. To me, though, I’d agree with those who argue that there’s a qualitative difference between ‘complicated’ and ‘complex’: for example, the kind of complexities that we see in wicked-problems, where even the act of looking at a context can itself change the context.
Meet WISP, the wireless future of Internet service
A WISP is distinct from other wireless services we currently use. Most cell-phone service providers offer wireless Internet service—with 4G LTE being the fastest current technology—but that doesn’t make them WISPs. Cell-phone service providers don’t expect you to use their service 24/7, and most place very low caps on the amount of data you can transfer over their networks each month. Being able to access the Internet while you’re out and about is a distinct advantage, but LTE data rates are relatively slow, and coverage can be spotty—especially away from large metropolitan areas.
CYOD: An Alternative To BYOD?
‘Choose Your Own Device’ (CYOD) offers many of the benefits of BYOD without some of the drawbacks. ... Even with the reduced set of options provided by a CYOD approach, the challenges are formidable and help may be required to deal with the increased complexity. “We offer an ‘anytime, anywhere, any platform’ service that provides access to enterprise resources from any device,” said Garewal.
Report shows weaknesses in DHS cybersecurity
Sen. Tom Coburn (R-Okla.), the top Republican on the Senate Homeland Security and Governmental Affairs Committee, blasted the department for the findings Monday. “This report shows major gaps in DHS’s own cybersecurity, including some of the most basic protections that would be obvious to a 13-year-old with a laptop,” Coburn said in a statement. “We spend billions of taxpayer dollars on federal information technology every year. It is inexcusable to put the safety and security of our nation and its citizens at risk in this manner.”
Amid security concerns, cloud insurance makes headway in the enterprise
"Cyber insurance policies were designed for premises-based systems," said Doug Weeden, director of program administration at Cyber Risk Partners LLC's CloudInsure. Consequently, some cyber liability policies exclude losses incurred by a third party, such as a cloud provider, but others include clauses that protect the client regardless of where the data is stored. So, businesses need to closely examine their policies to see if cloud coverage is included.
Quote for the day:
"Works of art make rules; rules do not make works of art." -- Claude Debussy
In this age of big data, the bulk of the data begging to be analyzed is not XML, but rather it is other structured and semi-structured formats, both text and binary. Until now, no open standard has been developed that is capable of describing a wide variety of such data formats. Learn about the Open Grid Forum (OGF) proposed recommendation for a powerful language that describes many different data formats, the Data Format Description Language (DFDL).
(How To Do) XML Schema Validation
Judging by the popularity of this question on StackOverflow, it seems that a lot of people struggle to check the validity of an XML file against an XML Schema. It’s a shame that what should be a trivial task has wasted hours of developer’s lives. In this article the author try to offer a few alternatives for various platforms and hopefully make things a bit simpler. There are actually a few different options at your disposal. We’ll start by looking at what is probably the fastest and easiest option to get started with validation:
What Inexperienced Leaders Get Wrong
But as any experienced manager should know, IT is a classic illustration of the difference between bold strokes and long marches, one of my favorite managerial frameworks. Bold strokes are decisions that can be made at the top, implemented pretty quickly by command — acquisitions, divestitures, real estate purchases, layoffs. Long marches take time and the involvement of many people who must produce new elements and coordinate their actions before the change can be successful.
If CIOs became Tech company CEOs
There have been rare instances where a CIO transitioned and started selling products or services. These individuals were CIOs representing their past industries or a specific solution set; I remember one instance where the only thing such a CIO wanted to talk about is how her company had implemented a specific technology and she had lead the team towards creating the success story. She was not very successful in her pitch but told her story wherever she went.
Data Mining Reveals the Secret to Getting Good Answers
And they say their work reveals an interesting insight: if you want good answers, ask a decent question. That may sound like a truism, but these guys point out that there has been no evidence to support this insight, until now. “To the best of our knowledge, we are the first to quantitatively validate the correlation between the question quality and its associated answer quality,” say Yuan and co.
Can complex-systems be ‘architected’?
To some people – perhaps especially in the IT-related trades – ‘complexity’ is just a more extreme version of ‘complicated’: a quantitative difference, “complicated that we haven’t as yet quite pinned down the rules and algorithms for”. To me, though, I’d agree with those who argue that there’s a qualitative difference between ‘complicated’ and ‘complex’: for example, the kind of complexities that we see in wicked-problems, where even the act of looking at a context can itself change the context.
Meet WISP, the wireless future of Internet service
A WISP is distinct from other wireless services we currently use. Most cell-phone service providers offer wireless Internet service—with 4G LTE being the fastest current technology—but that doesn’t make them WISPs. Cell-phone service providers don’t expect you to use their service 24/7, and most place very low caps on the amount of data you can transfer over their networks each month. Being able to access the Internet while you’re out and about is a distinct advantage, but LTE data rates are relatively slow, and coverage can be spotty—especially away from large metropolitan areas.
CYOD: An Alternative To BYOD?
‘Choose Your Own Device’ (CYOD) offers many of the benefits of BYOD without some of the drawbacks. ... Even with the reduced set of options provided by a CYOD approach, the challenges are formidable and help may be required to deal with the increased complexity. “We offer an ‘anytime, anywhere, any platform’ service that provides access to enterprise resources from any device,” said Garewal.
Report shows weaknesses in DHS cybersecurity
Sen. Tom Coburn (R-Okla.), the top Republican on the Senate Homeland Security and Governmental Affairs Committee, blasted the department for the findings Monday. “This report shows major gaps in DHS’s own cybersecurity, including some of the most basic protections that would be obvious to a 13-year-old with a laptop,” Coburn said in a statement. “We spend billions of taxpayer dollars on federal information technology every year. It is inexcusable to put the safety and security of our nation and its citizens at risk in this manner.”
Amid security concerns, cloud insurance makes headway in the enterprise
"Cyber insurance policies were designed for premises-based systems," said Doug Weeden, director of program administration at Cyber Risk Partners LLC's CloudInsure. Consequently, some cyber liability policies exclude losses incurred by a third party, such as a cloud provider, but others include clauses that protect the client regardless of where the data is stored. So, businesses need to closely examine their policies to see if cloud coverage is included.
Quote for the day:
"Works of art make rules; rules do not make works of art." -- Claude Debussy
No comments:
Post a Comment