March 03, 2014

Make BYOD Work: 9 Key Considerations
The benefits of BYOD are clear: The practice promotes productivity and has the potential to save on hardware costs. But the options available to manage personal devices can be confusing. IT organizations must weigh software and hardware for mobile device management, device and identity partitioning, virtual machines, wireless access points, network access control, and custom mobile applications.

Knowledge Banking for a Hyperconnected Society
Technology enables us to build new content based on the knowledge generated from the available data. It also offers the customer an improved experience. The bank no longer needs to wait for the customer to request a given service; it can anticipate the customer’s decision-making process, offering what he or she needs at the right time and in the most convenient format. To achieve this banks must take their place at the forefront of Big Data analysis and make use of all the information they have amassed about their customers, as well as the wealth of available external data, particularly sourced from social media.

Threats in the Cloud – Part 2: Distributed Denial of Service Attacks
On a daily basis, Microsoft’s DDoS protective measures apply mitigations to prevent impact from DoS and DDoS attacks to ensure uptime and availability for services and customers. Common types of attacks include SYN floods, DNS amplification, malformed TCP and UDP packets, and application layer abuses specific to HTTP and DNS. One common attack technique used by a number of freely available DDoS toolkits involves using fragmented IP packets with a fixed payload.

How Open Data Portals Will Stimulate Innovation and Economic Growth
According to Neelie Kroes, VP of the European Commission, opening up public datasets could double the value of it to around € 70 billion. Subsequently, such data portals can be used to create applications that can help improve society, tackle economical problems and drive economic growth. There are ample benefits for both governments and businesses. According to the Capgemini report, Open Data Portals can drive revenue, cut costs and improve efficiency and generate employment for future generations. Governments for example can increase their tax revenues though increased economic activity or make money through selling high value added information for a price.

Managing Data Center Operating Expenses: “The Property Tax”
The reality is that the assessor may only have one or two such properties in their jurisdiction, he/she may have never seen one sale in that area, and they aren’t likely exposed to the larger “world” of the national data center market. So to that end, we’d like to address a few items that you should be sure to explore in considering whether your tax assessment valuation has been thoroughly and properly considered by the assessor:

Speaking Intelligently On Business Intelligence
The real value of intelligence, both inside and outside of government, comes from the ultimate understanding of human intention, and from a nuanced perception of the context in which decisions are made. For governments, that critical element tends to come from human intelligence – or “HUMINT,” in insider parlance. The same holds true for the investigative journalist, though you’d be hard-pressed to find one who would readily admit his source work and techniques are so closely aligned with the practices of the intelligence community.

In-Memory Databases: Do You Need The Speed?
First, databases that take advantage of in-memory processing really do deliver the fastest data-retrieval speeds available today, which is enticing to companies struggling with high-scale online transactions or timely forecasting and planning. Second, though disk-based storage is still the enterprise standard, the price of RAM has been declining steadily, so memory-intensive architectures will eventually replace slow, mechanical spinning disks.

Up-and-Coming IT Leaders Focus on Business Customers
"The distance between us and the customer is traditionally far too big. It's immense. You might have a guy doing coding or testing who will take his requirements or direction from a project manager who might work with a business analyst who works with a product person who works with a salesperson who talks to the customer. There are five or six steps between the person providing us with the real need and the person actually delivering that. My view is, you have to cut all those steps out and have as much direct contact with the customer as possible," Sewell says.

When Start-Ups Don’t Lock the Doors
Many of the companies, including Kickstarter and Tinder, have rushed to improve their overall security after they were breached. Snapchat, the ephemeral messaging service that repeatedly ignored warnings about a data breach that exposed millions of user names and phone numbers, eventually acknowledged the loophole and hired Peter Magnusson, a head of engineering at Google, to help improve the company’s security efforts. Even so, as Snapchat has gained more users, it has also lured spammers, who have taken to sending malicious ads and links using the service.

Don't let governance methods die after a cloud migration
"Cloudifying" your governance practices means finding out what your proposed provider and other viable competitors offer. It's critical to know whether you have governance practices that are "fragile," or might fall short of regulations in case you switch providers. There are companies that specialize in tracking global compliance requirements, which are a good resource for companies considering all areas in which they may be at risk.

Quote for the day:

"A brand is no longer what we tell the consumer it is - it is what consumers tell each other it is." -- Scott Cook

No comments:

Post a Comment