March 10, 2014

CIOs hold fire over datacentre decisions
The research identified four main forces impeding CIOs’ ability to plan effectively for future datacentre needs: uncertainty over where to locate data; the challenges of risk and compliance; ongoing business transformation; and the need to better manage energy consumption. The Four Forces of Data Centre Disruptionreport said: “In short, this combination of business issues serves to slow down datacentre strategy and responsiveness. This comes at a crucial time when data strategy needs to be as agile and dynamic as possible.”

Antifragile Systems: Designing for Agility vs. Stability
In recent years, IT has been focusing more on agility to keep up with the speed of business. Agile methodologies have been embraced in an effort to release software more frequently. Often, the shift to agile methodologies came at the expense of stabile systems. Many steps that ensured stability were skipped or not fully vetted causing various “cracks in the armor” of systems. The emergence of the DevOps movement is the intersection between agility and stability, where we aim to deliver software faster but with a high degree of automation, measurement, and quality.

5 Reasons Netflix Is Spearheading The HR Revolution
When Patty McCord, former chief talent officer at Netflix, drafted a simple PowerPoint presentation explaining some of the unconventional changes the company had made in its HR policy, she had no idea it would go viral. Since the presentation started circulating, it has been viewed over 5 million times and has been described by Sheryl Sandberg as one of the most important documents to emerge from Silicon Valley. ... In a Harvard Business Review article, McCord lays out five principles that drove her wide-scale transformation of Netflix’s HR strategy:

The Legacy IT Conundrum: Money Pit or Value-Add?
An analysis of IBM's new BlueMix project, which puts most of IBM's software in the cloud, reveals that 80 percent of IT spending goes to legacy systems. As organizations finally learn to stop worrying and love the cloud, IT departments will have to decide if they will continue to be a money pit or can find a way to add value to new cloud systems. ... However, it leaves undisturbed that 80% of IT budgets devoted to "legacy." Therein poses the danger to IT organizations.

Skype-based malware shows how 'peculiar' malicious code can be
This malicious software had accomplished what some had predicted about eight years ago could be done to exploit Skype when “researchers discovered the ability to use Skype as a remote-control procedure,” says Butterworth, executive director of commercial services at ManTech. The malware had been designed using a modified version of the old “SkypeKit” SDK which existed before Microsoft acquired Skype, and it appeared to include a backdoor functionality.

IT Champs Badly Needed in Business
The question therefore is how do you achieve this IT agility and how do you achieve it through IT governance? Governance, as defined by ISACA, comprises three parameters – benefit realisation, risk optimization, and resource optimization. Governance has to consider these three aspects and come out with very clear directions for the management to follow, achieve the objectives, and secure the results. Essentially, governance entails understanding what is required by business, prioritizing these needs and setting the right direction. To me, there is no other alternative but to use IT governance in a very judicious and convincing manner to achieve agility and the end objective of benefit realisation.

UK more than doubles funds to build internet of things
"I see the internet of things as a huge transformative development - a way of boosting productivity, of keeping us healthier, making transport more efficient, reducing energy needs, tackling climate change," said Cameron. He said the UK and Germany could find themselves at the forefront of a new industrial revolution by working in partnership. "We are on the brink of a new industrial revolution and I want us – the UK and Germany – to lead it,” said Cameron.

BYOD and security: Five tips to keep boundaries between work and home
The end result of BYOD is that employees are now using their personal mobile devices to manage their personal livesand their work lives. While it is easy to see the huge cost savings to corporations with a BYOD policy, this merging of work apps onto employees' personal mobile devices can have a negative impact on their work productivity and time off. In this article, I offer five quick tips to help managers assist employees to establish healthy boundaries between their work life and personal life so that both companies and employees can receive the full benefits of BYOD.

Don’t Panic: But Are We Ready for Bring Your Own Everything?
Looking at it in the cold sober light of day, BYOX sounds like one cheesy industry-speak too far, but let’s thing about it for a second. BYOX could mean BYOK i.e. Bring Your Own Keyboard and the keyboard in question (wireless or Bluetooth or whatever) could be transferring drivers, log files and all manner of other unnecessary (and perhaps harmful) data into the corporate network. Are keyboards dangerous? Well yes, in the BYOK Bring Your Own Keyboard world they are.

How to Be Agile in a Waterfall Company
Dror is a senior consultant at CodeValue. His first encounter with agile happened a few years ago while working for a software vendor specializing in unit testing tools, since then he has been evangelizing Agile wherever he went – at his work, speaking at conferences and today as a consultant. He shares from his experience implementing Agile practices in his team, outlining the do and don'ts that can make all the difference. He addresses teams working in a non-agile environment.

Quote for the day:

"There are no great people in this world, only great challenges which ordinary people rise to meet." -- William Frederick Halsey, Jr.

No comments:

Post a Comment