December 12, 2013

AT&T's predictions for the enterprise in 2014
M2M technology is a label that describes the connection of devices and machines through a networks to a control center which allows the exchange of information -- and then for actions to be performed without human intervention. M2M systems -- based on the idea of the "Internet of Things" -- can include sensor relays, RFID and Wi-Fi connections. Machines developed with M2M are ideally able to interpret data transferred through a network and make decisions automatically in real time.

Technology in restaurants: Fast-casual sector represents growing market
Much has changed, however, as the restaurant sector pursues new directions in IT. Technology in restaurants now includes sophisticated POS devices, mobile applications, thin clients and cloud computing. For VARs, it's a little more involved than selling a glorified cash register. As a consequence, channel partners must offer more than basic POS automation. Resellers are responding with a wider range of technology systems, as well as consulting and professional services.

Inter-thread communications in Java at the speed of light
The Akka framework is great for inter-process communications when actors cross process boundaries between different JVM instances on the same machine or on machines distributed across a network. However it may be excessive to use Akka typed actors for smaller projects, where you need only inter-thread communication but you still want to stick with the typed actor approach.

Banks shouldn't rely on mobile SMS passcodes, security firm says
"Do not rely on SMS-based authentication," the report said. "It has been thoroughly compromised." Nearly all mobile malware is written for the open-source Android OS, which allows users to install any application, the report said. iOS mobile malware is rare since Apple forbids downloading applications that haven't been vetted by the company.

Big data demands nonstop experimentation
In business, the applications of statistical models are practical, but the need to vet the underlying causative factors remains. If you're unsure whether the historical correlations you've built into your statistical models will continue in the future, you treat that low confidence as a risk factor. For example, if you have low confidence in your predictive models of demand and response rates in a given customer segment, you're probably not going to wager millions of dollars on a new product launch that targets that segment.

2014 Trend Predictions for the Mobile Web
There will be renewed demand for all kinds of connected devices, with nomophobia becoming even more prevalent. We can expect to see greater demand for highly customized experiences that prioritize exact user context. As one of the biggest challenges facing brands in 2014, this one movement itself will fundamentally shake-up how organizations need to interact with their customers. Brands no longer belong just to a company.

Top 10 smartphones of 2013: There's One that's best
Thus, I must rank the HTC One my top smartphone of the year and until about a month ago it was the best smartphone I have ever used. The hardware is fantastic, HTC has done a great job updating the OS to the latest and greatest while also updating its Sense UI, you can pick it up in various colors, and it can be found for a good deal (as low as $50 with contract) with rumors of a successor launching in early 2014.

Confirmed: Cloud infrastructure pricing is absurd
As O’Grady points out in a list of caveats, this is very big picture because his analysis doesn’t include special offers, reserved instances or special packages. For a deeper examination of pricing, companies can pull out the 451 Research report, but it’s not for the weak of heart. It’s an incredibly detailed analysis of the different kinds of pricing models and which are used by each of the 53 vendors that analysts examined. However, it doesn’t actually reveal which vendors offer the best prices for any given service. Instead it classifies the different pricing methods and shows which vendors use which ones.

Amazon WorkSpaces: A threat to DaaS providers in the VDI market?
Desktop as a Service (DaaS) is a new opportunity for Amazon, but it's also a new challenge because the provider is not used to virtual desktop infrastructure (VDI) workloads, said Mark Margevicius, research vice president of virtualization for Stamford, Conn.-based Gartner Research Inc. While WorkSpaces will appeal to companies that want to experiment with VDI without making a significant investment or to those that want to spin up a quick desktop for a contractor, DaaS providers still have value-added management services that will help them keep their competitive edge.

DevOps @ large investment bank
The solution is to somehow redefine the software delivery process in order to enable it to support these two requirements – fast and stable – simultaneously. But how exactly should we redefine it? Let us have a look at this question from the point of view of the three layers that make up the software delivery process: the process itself, the tooling to support it and the culture

Quote for the day:
“You can't connect with something you're not passionate about.” – Gemma Arterton

No comments:

Post a Comment