February 22, 2014

Everything old is bad and antiquated and not everything new is shiny and good.
The world's leading companies have come to realize that only when their customers are successful, will they be successful. In pursuit of their market leadership not only they need to spend time to look inside their business to know how things are getting done but also look outward to get deep understanding of their customers. Process has indeed come a long way from it humble routes amidst the early industrial revolution and Adam Smiths ‘Wealth of Nations’.

5 ways to encourage Business Transformation in Enterprise Architecture
We try and consistently fail to change the attitudes of our peers - opposing mindsets are now a common feature when implementing business transformation. It has long been the mission of EA practitioners to get the right people motivated in adopting a fully functional EA strategy. We've delved into the perspectives of the Enterprise Architecture industry and uncovered precisely this fact: EA practitioners just don't get the support of the CIO or executive management. Getting the 'buy-in' from stakeholders has become the main hindrance when asserting implementation

Hacking the Data Science
A quick thought that comes to mind when thinking about the image that shows data science as three overlapping circles. One is Business, one is statistical modeler and one is technology. Where further common area shared between Technology, Business and statistician is written as data science. This is a great representation of where data science lies. But it sometimes confuses the viewer as well. From the look of it, one could guess that overlapping region comprises of the professionals who possess all the 3 talents and it’s about people.

6 Out of 10 Android Apps a Security Concern
Webroot found that Android poses a greater security risk than iOS. Webroot identified a 384 percent increase in total threats to Android devices over 2012, and found more than 40 percent of the Android apps analyzed were classified as either malicious, suspicious, or unwanted. By contrast, more than 90 percent of the million-plus iOS apps that Webroot assessed were tagged as "benign," with seven percent marked as "trustworthy," and only a meager one percent identified as "moderate" risks. The lower instance of suspicious or malicious apps is a function of the vetting process developers must go through before apps are made available in the Apple App Store.

Why Your Car Won’t Get Remote Software Updates Anytime Soon
Software is rapidly taking over not only the entertainment console in cars, but also basic functions such as steering, braking, and acceleration, as more cars come with features such as adaptive cruise control and automated parallel parking. This can make it easier to diagnose and fix problems, but it also increases the risk for software bugs or even malicious attacks that might cause serious injury. ... to potentially improving safety by delivering fixes faster, remote updates could save automakers money.

The Kanban Survivability Agenda
The survivability agenda’s values of understanding, agreement and respect demand commitment, both initially and ongoing. These leadership disciplines are key to the impactful adoption of the Kanban Method - they’re protective of the pursuit of organizational learning that takes place inside the boundaries of the change initiative and they’re catalytic at its outward interfaces. Ostensibly about fitness – fitness relative to the competitive environment and fitness for purpose – the survivability agenda is really cultural.

How to Design Test Cases Using State Transition Testing Technique?
State transition testing is a form of Dynamic Testing Techniquethat comes in use when the system explained as a finite number of states and the evolutions between the states is ruled by the rules of the system. Another use of this technique when features of a system are characterized as states that converts to other state, this transition is explained by the method of the software

3 misconceptions about BDD
BDD has been often misunderstood among developers, QAs and even BAs. We often hear of teams saying that their project is using BDD, but when we check it out, it turns out to be using only a BDD tool for test automation - and not the BDD concepts itself. So in the end, we hear people arguing about the tools, and not about the ideas that inspired the creation of those tools. The output of that is a bunch of complaints that we see in blogs all over the internet - people that start to reject the whole idea behind BDD, only because they have tried to use a tool without first changing their attitude towards software development.

Continuous Integration: Scaling to 74,000 Builds Per Day With Travis CI & RabbitMQ
Travis CI relies heavily on third-party infrastructure. This allows us to focus on shipping new features and platform improvements that make our users happy. Working with 3rd party infrastructure also has challenges. For example, we’ve been using a hosted RabbitMQ setup for more than two years now. RabbitMQ has some unique properties for handling overly ambitious message producers in the system. When one or more processes on one virtual host produce more messages than the system can handle, RabbitMQ can block or limit other producers and consumers. Much to our frustration, this affected us a few times.

Adopting a Professional Compass for Information Architecture
With an IA compass in place, expressing the value that information architecture delivers to a business becomes clearer. The IA compass that I’ll describe is absent of theoretical and technical rhetoric and focuses on a greater good. This greater good is one that is most likely to resonate with our business and marketing colleagues. While it is important that they acquire a general understand of information architecture, they are more interested in how information architecture fits into their business model and delivers value.

Quote for the day:

"Pay no attention to what the critics say; there has never been set up a statue in honor of a critic." -- Jean Sibelius

No comments:

Post a Comment