March 16, 2014

What the C-Suite Needs to Prepare for in the Era of BYO Technology
The convergence of this next era of computing – we call it Open Platform 3.0™ – is creating a Balkanization of the traditional IT department. IT is no longer the control center for technology resources. As we’ve been witnessing over the past few years and as industry pundits have been prognosticating, IT is changing to become more of a service-based command central than a control center from which IT decisions are made. These changes are happening within enterprises everywhere.


Why shouldn't I test private methods?
If you’re trying to test private methods, you’re doing something wrong. You can’t get to TDD nirvana from here, you’re gonna have to go back. It all started with an innocuous little class with an innocuous little method. It did one little job, had a nice little unit test to verify it did its thing correctly. All was right with the world. Then, I had to add an extra little piece of logic. I wrote a test for it, changed the class until the test passed. Happy place. Then I started refactoring. I realised my little method, with its handful of test cases was getting quite complicated, so I used the extract method refactoring and boom! I have a private method.


10 Programming Languages You Should Learn in 2014
Coding skills are in high demand, with programming jobs paying significantly more than the average position. Even beyond the tech world, an understanding of at least one programming language makes an impressive addition to any resumé. The in-vogue languages vary by employment sector. Financial and enterprise systems need to perform complicated functions and remain highly organized, requiring languages like Java and C#. Media- and design-related webpages and software will require dynamic, versatile and functional languages with minimal code, such as Ruby, PHP, JavaScript and Objective-C.


IT Governance - Implementation Obstacles
A recent empirical study by Lee uncovered factors such as ‘lack of IT principles and policies’, ‘lack of clear IT Governance processes’, ‘lack of communication’, and ‘inadequate stakeholder involvement’, as inhibitors of IT Governance implementation success. A good understanding on the barriers or obstacles that hinder the success of IT Governance implementation is important as once understood, their effect is understood and pre-emptive actions can be taken to address them. Implementing IT Governance is a long and continuous journey, where obstacles and challenges are aplenty.


The Impact of Information Governance Trends on E-Discovery Practices in 2014
While information governance (IG) may be a gigantic, broad category, GCs and CIOs were hit with a startling realization: For their organizations to significantly reduce e-discovery costs they must proactively manage electronic information at an enterprise level. This starts with information governance. In this interview, David speaks about his recent emphasis on information governance and its effects on the field of e-discovery.


NIST Guide Aims to Ease Access Control
The flexibility of the ABAC model allows the greatest breadth of subjects to access the greatest breadth of objects without specifying individual relationships between each subject and each object, according to the NIST guidance. "Access decisions can change between requests by simply changing attribute values, without the need to change the subject/object relationships defining underlying rule sets," says NIST Computer Scientist Vincent Hu, who co-wrote the guidance. "This provides a more dynamic access control management capability and limits long-term maintenance requirements of object protections."


Seven benefits of cloud from an enterprise architect point of view
Additional breakthroughs in horizontal and vertical markets as well as the birth of new ecosystems and development platforms provide the construct behind a continuum of opportunity for businesses to benefit from cloud providers’ enhancements to technology offerings. To truly appreciate and take advantage of the impact and benefits of cloud computing, I believe that you must also understand that cloud is primarily an extension of IT and your business. Even though this may be a tall order, I will take this opportunity to introduce you to the benefits of cloud from an enterprise architect perspective and show how it relates to your business.


The PaaS shakeup and what it means for OpenStack
The new OpenStack Havana release sends strong signals to the industry that Platform-as-a-Service (PaaS) vendors may suddenly have “irrelevant” stamped on their backs. No matter how elaborate or venerable your existing business may be, proving your value inside the rapidly expanding OpenStack ecosystem is no easy task. This time it is the established PaaS vendors like Cloud Foundry and OpenShift who are feeling the heat. A fun guessing game is naming the established players who are next in the stack to get crushed.


Climbing the ladder from EITA to EA
While the entire team should work on this, only a few will succeed. Good news: That’s all you need. However, it’s important that everyone makes the attempt to climb the ladder. As a manager, I have no magic “test” to determine, for certain, which member of the team will make the transition and which won’t. I once thought I did, but reality proved me wrong. So everyone makes the attempt. Those who remain EITA’s can continue in that role for the EA team, or they can transfer to a different group where their technical skills are valuable and needed. So, how is this done? How does an individual EITA climb the ladder?


Collaboration in the Cloud: The Continuity Advantage
Cloud-based collaboration services come with redundancy built into all levels of service delivery from network connectivity and power to all the hardware within the cloud facility and the application itself. Providers rely on redundant facilities so if one facility suffers a site-wide outage, delivery can be handed off to another facility to minimize downtime. The most stable cloud-based collaboration solutions employ multiple layers of physical and logical security to protect data integrity. Ultimately, the aim is to ensure that not only do users have consistent and reliable access to the tools they need to do business but the information they exchange is secure.



Quote for the day:

"Whenever you find yourself on the side of the majority, it's time to pause and reflect." -- Mark Twain

No comments:

Post a Comment