December 31, 2013

Spreadsheet governance tools make corporate finance Excel use feasible
In fact, the event that led the company to share its story was the discovery of a "material deficiency" that allowed an incorrect number to appear in a quarterly earnings report, a clear no-no, given that the company is publicly traded and thus regulated by the Sarbanes-Oxley Act. "Even though we had people eyeballing that stuff, we still published a wrong number," the source said.


The firm behind Healthcare.gov had top-notch credentials -- and it didn't help
Though CGI Federal got something of a black eye from the rollout, the CMMI certification it had did not come under fire , and no one has made a case that it should. Project requirements were changed late in the development cycle, warnings weren't heeded, and time for testing was cut short. Those actions are all anathema to CMMI's careful and measured development processes. If a project that's based on CMMI runs into problems, process defenders will usually cite issues with management and decision-making.


2014: Time to Rethink Privacy
In 2014, IT executives are going to have to make some very difficult decisions about privacy. Quite often when we talk about difficult decisions, we mean that we know what the right thing to do is, but it's just hard to bring ourselves to do it. In this case, though, part of the difficulty will be knowing what the right thing to do is. For that reason, every industry -- nay, every company -- will come to very different decisions based on the concerns of their employees and customers.


Raspberry Pi and Raspian, hands on
What could be better at Christmas than a shiny new gadget? Perhaps a shiny new gadget that runs Linux? One that reminds me of Heathkit, and TRS-80, and days of experimenting and playing with computers for no reason other than curiosity, and joy, and learning? That's what I got, a Raspberry Pi! What I intend to write here is "Jamie's Excellent Raspberry Adventures": it will document my own experiences, discoveries, successes and failures with this little gadget.


eBook: Keep only the data you want.
In today’s information economy, organizations are facing unfathomable data growth rates. In fact, Aberdeen Group estimates that data is growing at a rate of 56% year over year. And now, the big data phenomenon means data is growing in every single operational and analytic application. In fact, data is growing to the point that many organizations are facing impaired performance of their mission-critical applications, along with increasing costs associated with storing all of that data.


MDM vs. MAM: Comparing enterprise mobile security management options
IT teams must be able to successfully address the mobile device management challenge to adequately protect organizations while still allowing enough flexibility to reap the rewards of mobility. The landscape of mobile management products is dynamic and large. A common query is, "Which product is right for my organization, mobile application management (MAM) or mobile device management (MDM)?" The answer can be both and perhaps neither, depending on the use case.


Big Data: Too Much of a Good Thing?
Big data contains a virtual treasure trove of information about customers, trends and countless other valuable insights which may have the potential to transform businesses. However, in the race to unlock this promise, many enterprises now find they have more data than they are capable of handling. Here’s how CIOs, data warehouse managers and others can build the business case for data volume management to help them more effectively manage this data deluge.


An Innovator's Resolutions
Nothing prepares us more for a a journey into a new year, ripe with new promise and new opportunity, more than setting out the goals for the year, creating agreements with ourselves as to how we'll conduct ourselves in this new year. We start by reducing or eliminating cynicism about our organizations, recognizing that as innovators we are the spark of creativity that will lead others to better ideas. We decide now that developing interesting ideas into new products and services isn't easy but is possible, given the right sponsors and demonstrating the right possibilities.


Technologies To Look Out For In 2014
Spotting the next innovation, that could benefit customers or challenge the success of existing products, is top-of-mind for every company. Keeping a finger on the pulse of every innovation that could bring such a disruption can be daunting. At Cisco, a self-nominated team of enthusiasts, unaffiliated with any particular function or business unit take up the challenge of identifying technology developments worldwide. Technologies identified by this team are assessed by a panel of Distinguished Engineers, Fellows, Directors and VPs and a few are selected as novel and most relevant to Cisco.


Can Robots Better Spot Terrorists at Airports?
Aviation and government authorities are starting to use machines in lieu of people to verify the identities of fliers by scanning their faces, irises or fingerprints. Dozens of airports in Europe, Australia and the U.S. already employ such technology so passengers can pass immigration checks without showing identification to, or talking with, a person. Now, several major airports in Europe have started using these automated ID checks at security checkpoints and boarding gates.



Quote for the day:

"Keep true, never be ashamed of doing right, decide on what you think is right and stick to it." -- George Eliot

No comments:

Post a Comment