Apple's anti-Android Holy War gets real
Apple played it cool, massively increasing its R&D investments and scouting for new executive talent to help push things forward. (In the last 12-months Apple has managed to poach at least three CEOs; numerous CTO's and an army of experts in wearable, medical and sensor technologies.) The rejuvenated company is about to respond to the negativity with new products we can only speculate about and iPhone 6, which anyone in the know in the mobile biz already calls the only phone to be of "any importance" this year.
Three Things Missing from Most Enterprise Cloud Strategies
The core problem is that some things are missing in enterprise cloud computing strategies, and these things are often not addressed or understood until it’s too late. My lot in life lately has been getting on airplanes and explaining this to many organizations that find their cloud strategies dead in the water, typically because they overlooked some fundamentals. So, save yourself the plane fare. Here are three of the most overlooked items that go missing from most enterprise cloud computing strategies. As I explain them, count how many are missing within your own organization.
Nike fires majority of FuelBand team, will stop making wearable hardware
"As a fast-paced, global business we continually align resources with business priorities," Nike spokesman Brian Strong said in an email. "As our Digital Sport priorities evolve, we expect to make changes within the team, and there will be a small number of layoffs. We do not comment on individual employment matters." The company informed members of the 70-person hardware team -- part of its larger, technology-focused Digital Sport division comprised of about 200 people -- of the job cuts Thursday. About 30 employees reside at Nike's Hong Kong offices, with the remainder of the team at Nike's Beaverton, Ore., headquarters.
The Big Data Approach to Telematics Insurance
The potential in Big Data can take the current UBI models to an altogether different level. A convergence of multiple data dimensions can now be cohesively collected, analyzed, and modeled to offer truly dynamic, accurate and predictive risk management frameworks for insurers that maximize the benefit for the consumers. Through Big Data, insurers can include in addition to a consumer's driving patterns as seen through accelerator data, turn data, braking data, etc. and demographic & credit history; data dimensions such as current weather conditions, road traffic patterns and conditions, condition of the automobile, etc.
Discover effective data protection
We’d like to thank you for registering by offering you a free chapter of the book, “Cloud and Virtual Data Storage Networking” (CRC Taylor & Francis) by noted IT industry veteran and Server StorageIO founder Greg Schulz. In this chapter, you’ll learn opportunities for protecting data in cloud, virtual, and data storage networks -- specifically on maintaining availability and accessibility of both active and inactive data. Download the chapter now.
5 considerations when choosing between a SaaS or on-premises
Adoption of software as a service (SaaS) is accelerating and many organizations are realizing the transformative benefits. A recent IBM study highlighted how leading organizations (Pacesetters) are leveraging SaaS deployments to unlock benefits such as reduced total cost of ownership (TCO), increased enterprise collaboration and enhanced market agility. Enterprise software vendors are realizing that deployment choice is a key consideration for prospects and often are offering both cloud and on-premises versions of their software suites. When faced with the choice of cloud-based or on-premises software deployments, many purchasing organizations continue to struggle with this decision.
The rise of big data brings tremendous possibilities and frightening perils
What is scary is that we will lose our privacy, opening the door to new types of crime and fraud. Governments and employers will gain more control over us, and have corporations reap greater profits from the information that we innocently handed over to them. More data and more computing will mean more money and power. Look at the advantage that bankers on Wall Street have already gained with high-frequency trading and how they are skimming billions of dollars from our financial system. We surely need stronger laws and technology protections. And we need to be aware of the perils. We must also realize that with our misdeeds, there will be nowhere to hide—not even in our past.
The U.S. Government Wants 6,000 New 'Cyberwarriors' by 2016
The Pentagon plans to triple its cybersecurity staff by 2016, U.S. Secretary of Defense Chuck Hagel announced recently. A few days later, FBI Supervisory Special Agent Charles Gilgen said at a conference on cybercrime that his agency’s cyber division plans to hire 1,000 agents and 1,000 analysts in the coming year. Just those two agencies are looking for 6,000 people with cybersecurity skills in the next two years. That’s a very tall order. A look at one way the government has tried to build and recruit such talent—offering university scholarships—shows why.
Can Facebook Innovate? A Conversation With Mark Zuckerberg
Well, so there are a bunch of things here. One thing is that Facebook Messenger is actually a really successful thing. More than 10 billion messages a day that flow through Facebook’s messaging products. But I think we basically saw that the messaging space is bigger than we’d initially realized, and that the use cases that WhatsApp and Messenger have are more different than we had thought originally. Messenger is more about chatting with friends and WhatsApp is like an SMS replacement. Those things sound similar, but when you go into the nuances of how people use it, they are both very big in different markets.
Twenty Years of Patterns’ Impact
Design patterns have helped narrow this gap by documenting a wellworking solution to a problem that occurs repeatedly in a given context. Instead of presenting a copyandpasteready code snippet, patterns discuss forces impacting the solution design. Examples of such forces are performance and security in Web applications: encryption and decryption algorithms improve security but introduce processing overhead. Ward Cunningham once described the best patterns as your older brother teaching you how to do something right.
Quote for the day:
"Never confuse a single defeat with a final defeat." -- F. Scott Fitzgerald
Apple played it cool, massively increasing its R&D investments and scouting for new executive talent to help push things forward. (In the last 12-months Apple has managed to poach at least three CEOs; numerous CTO's and an army of experts in wearable, medical and sensor technologies.) The rejuvenated company is about to respond to the negativity with new products we can only speculate about and iPhone 6, which anyone in the know in the mobile biz already calls the only phone to be of "any importance" this year.
Three Things Missing from Most Enterprise Cloud Strategies
The core problem is that some things are missing in enterprise cloud computing strategies, and these things are often not addressed or understood until it’s too late. My lot in life lately has been getting on airplanes and explaining this to many organizations that find their cloud strategies dead in the water, typically because they overlooked some fundamentals. So, save yourself the plane fare. Here are three of the most overlooked items that go missing from most enterprise cloud computing strategies. As I explain them, count how many are missing within your own organization.
Nike fires majority of FuelBand team, will stop making wearable hardware
"As a fast-paced, global business we continually align resources with business priorities," Nike spokesman Brian Strong said in an email. "As our Digital Sport priorities evolve, we expect to make changes within the team, and there will be a small number of layoffs. We do not comment on individual employment matters." The company informed members of the 70-person hardware team -- part of its larger, technology-focused Digital Sport division comprised of about 200 people -- of the job cuts Thursday. About 30 employees reside at Nike's Hong Kong offices, with the remainder of the team at Nike's Beaverton, Ore., headquarters.
The Big Data Approach to Telematics Insurance
The potential in Big Data can take the current UBI models to an altogether different level. A convergence of multiple data dimensions can now be cohesively collected, analyzed, and modeled to offer truly dynamic, accurate and predictive risk management frameworks for insurers that maximize the benefit for the consumers. Through Big Data, insurers can include in addition to a consumer's driving patterns as seen through accelerator data, turn data, braking data, etc. and demographic & credit history; data dimensions such as current weather conditions, road traffic patterns and conditions, condition of the automobile, etc.
Discover effective data protection
We’d like to thank you for registering by offering you a free chapter of the book, “Cloud and Virtual Data Storage Networking” (CRC Taylor & Francis) by noted IT industry veteran and Server StorageIO founder Greg Schulz. In this chapter, you’ll learn opportunities for protecting data in cloud, virtual, and data storage networks -- specifically on maintaining availability and accessibility of both active and inactive data. Download the chapter now.
5 considerations when choosing between a SaaS or on-premises
Adoption of software as a service (SaaS) is accelerating and many organizations are realizing the transformative benefits. A recent IBM study highlighted how leading organizations (Pacesetters) are leveraging SaaS deployments to unlock benefits such as reduced total cost of ownership (TCO), increased enterprise collaboration and enhanced market agility. Enterprise software vendors are realizing that deployment choice is a key consideration for prospects and often are offering both cloud and on-premises versions of their software suites. When faced with the choice of cloud-based or on-premises software deployments, many purchasing organizations continue to struggle with this decision.
The rise of big data brings tremendous possibilities and frightening perils
What is scary is that we will lose our privacy, opening the door to new types of crime and fraud. Governments and employers will gain more control over us, and have corporations reap greater profits from the information that we innocently handed over to them. More data and more computing will mean more money and power. Look at the advantage that bankers on Wall Street have already gained with high-frequency trading and how they are skimming billions of dollars from our financial system. We surely need stronger laws and technology protections. And we need to be aware of the perils. We must also realize that with our misdeeds, there will be nowhere to hide—not even in our past.
The U.S. Government Wants 6,000 New 'Cyberwarriors' by 2016
The Pentagon plans to triple its cybersecurity staff by 2016, U.S. Secretary of Defense Chuck Hagel announced recently. A few days later, FBI Supervisory Special Agent Charles Gilgen said at a conference on cybercrime that his agency’s cyber division plans to hire 1,000 agents and 1,000 analysts in the coming year. Just those two agencies are looking for 6,000 people with cybersecurity skills in the next two years. That’s a very tall order. A look at one way the government has tried to build and recruit such talent—offering university scholarships—shows why.
Can Facebook Innovate? A Conversation With Mark Zuckerberg
Well, so there are a bunch of things here. One thing is that Facebook Messenger is actually a really successful thing. More than 10 billion messages a day that flow through Facebook’s messaging products. But I think we basically saw that the messaging space is bigger than we’d initially realized, and that the use cases that WhatsApp and Messenger have are more different than we had thought originally. Messenger is more about chatting with friends and WhatsApp is like an SMS replacement. Those things sound similar, but when you go into the nuances of how people use it, they are both very big in different markets.
Twenty Years of Patterns’ Impact
Design patterns have helped narrow this gap by documenting a wellworking solution to a problem that occurs repeatedly in a given context. Instead of presenting a copyandpasteready code snippet, patterns discuss forces impacting the solution design. Examples of such forces are performance and security in Web applications: encryption and decryption algorithms improve security but introduce processing overhead. Ward Cunningham once described the best patterns as your older brother teaching you how to do something right.
Quote for the day:
"Never confuse a single defeat with a final defeat." -- F. Scott Fitzgerald
No comments:
Post a Comment