Techies and users are in a vicious circle of mistrust
Our lack of trust arises from the many negative perceptions we have of business people. When I ask technical people how they feel about working with "the business," they use words like "ignorant," "unrealistic," "aggressive" and "unappreciative." They say business people don't know what they want and constantly change their minds. We can recall our own bad experiences that have led us to be skeptical of anything that business people say. We have seen project sponsors shirk responsibility and shift blame, and just like the business people, we have at times been treated poorly and felt bad about it. And we make generalizations about business people based on those experiences.
Sorry State of IT Education: Readers Propose Fixes
One thing readers almost universally acknowledged was that critical thinking skills don't come from core technology curricula, but from liberal arts and humanities courses that traditionally have been required in four-year college programs but aren't a part of most two-year programs and not even mentioned in trade schools. Several people wrote that even four-year technology programs now focus more on job training than education. But it's the educational aspects of a college four-year program that are key to taking skills ostensibly learned in the humanities coursework and applying them to the knowledge obtained in the technology coursework.
Securing Big Data for the Future: Why You Need a Data Rights Management Platform
It's our modern day struggle trying to figure out how to keep our data in our own hands. In truth, it is our generation's battle to fight, not unlike the diversity or democracy battles fought by our forefathers. To give up all control or to maintain some say in the matter -- these are our choices, and in as little time as a few years, the choice will be made for us if we don't do anything about it now. Because big data is only getting bigger, and big names want to make big money in the industry. Soon, you won’t hear about the NSA's improper collection and use of data. Soon, you won't know about Target's massive data breach.
Generating Data on What Customers Really Want
Disruptive innovation practitioners have just such a tool for reliably predicting customers’ behavior. It’s a methodology that uncovers what in disruptive innovation parlance is called a person’s “job to be done.” Briefly, the idea is this: Consumers don’t go to the store to buy products. They go to the store to buy something that will enable them to get some important job done in their lives. The classic example, attributed to HBS professor Ted Levitt, is that people don’t want to buy a quarter-inch drill; they want something that will make a quarter-inch hole. Making a quarter-inch hole is the job to be done. The product that does that job most reliably, easily, conveniently, and less expensively is the tool they will be most likely to purchase for that job.
7 Business Dashboards That Offer Striking Data Visualizations
When data gets complex, there's no better way to understand it than a business dashboard. You can cull data from your website analytics engine, an Oracle database, social media campaigns and more, all to see how they interrelate. Unfortunately, some dashboards are overly cluttered and actually make data more complicated to understand. The seven tools featured here use more color, graphs, clear delineations and white space to make data more understandable. The cost for using these dashboards varies depending on the number of sources you use, the amount of data you're analyzing and how many admin users you have involved.
How Anybody Can Measure Your Computer's Wi-Fi Fingerprint
Wireless fingerprinting has other applications too. Not only can this approach identify malicious computers attempting to access your network, it can spot fake wireless access points that are designed to collect MAC addresses to spoof other networks. However, this requires the gathering of ground truth data of the original access point in a secure environment in advance. Wireless fingerprinting is unlikely ever to be entirely foolproof but it does have the potential to be a useful addition to the armory of tools available for online security.
The ABCs of the Internet of Things
In a word: Sensors. Many IoT devices have sensors that can register changes in temperature, light, pressure, sound and motion. They are your eyes and ears to what's going on the world. Before we talk about what they do, let's describe them. These sensors are part of a device category called a microelectromechanical system (MEMS) and are manufactured in much the same way microprocessors are manufactured, through a lithography process. These sensors can be paired with an application-specific integrated circuit or an ASIC. This is a circuit with a limited degree of programming capability and is hardwired to do something specific. It can also be paired with microprocessor and will likely be attached to a wireless radio for communications.
eBook: Modern Web Essentials Using JavaScript and HTML5
Developing single page applications with JavaScript and HTML5 solves an enterprise pain point - how to reach users on various platforms without diminishing user experience. This book provides tools for a thorough understanding of three topics integral to effective enterprise-level, web SPA development: JavaScript language essentials, HTML5 specification features, and responsive design principles.
Stripping down enterprise IT to the naked cloud
Once you're in their tent, it's very hard to leave. However, a case can be made for a minimalist approach to cloud; one that takes advantage of public cloud services that don't have all of the bells and whistles -- just a few simple services, such as storage, compute or databases. In some cases, it has the ability to get down to the primitives of the platforms, without going through layers of application program interfaces (APIs) and management tools. In some circles, this is called a "naked cloud."
Symantec calls antivirus 'doomed' as security giants fight for survival
The antivirus giant said that end-point security technology isn't a "moneymaker" in any way, and highlighted that the company needs to adjust and adapt. Which isn't a surprise for Symantec, whose Norton antivirus products have barely made any new dents in the security market in years — despite it being bundled with almost every new Windows computer as premium bloatware. But what Dye was saying is that the malware market is dwindling and hackers are instead increasingly focusing on cyberattacks, like denial-of-service assaults, spearphishing, and network intrusion, rather than mass-emailing a crafted executable file randomly to millions — including to a burgeoining base of Mac users that are immune to such attacks.
Quote for the day:
"Plans are only good intentions unless they immediately degenerate into hard work" -- Peter Drucker
Our lack of trust arises from the many negative perceptions we have of business people. When I ask technical people how they feel about working with "the business," they use words like "ignorant," "unrealistic," "aggressive" and "unappreciative." They say business people don't know what they want and constantly change their minds. We can recall our own bad experiences that have led us to be skeptical of anything that business people say. We have seen project sponsors shirk responsibility and shift blame, and just like the business people, we have at times been treated poorly and felt bad about it. And we make generalizations about business people based on those experiences.
One thing readers almost universally acknowledged was that critical thinking skills don't come from core technology curricula, but from liberal arts and humanities courses that traditionally have been required in four-year college programs but aren't a part of most two-year programs and not even mentioned in trade schools. Several people wrote that even four-year technology programs now focus more on job training than education. But it's the educational aspects of a college four-year program that are key to taking skills ostensibly learned in the humanities coursework and applying them to the knowledge obtained in the technology coursework.
It's our modern day struggle trying to figure out how to keep our data in our own hands. In truth, it is our generation's battle to fight, not unlike the diversity or democracy battles fought by our forefathers. To give up all control or to maintain some say in the matter -- these are our choices, and in as little time as a few years, the choice will be made for us if we don't do anything about it now. Because big data is only getting bigger, and big names want to make big money in the industry. Soon, you won’t hear about the NSA's improper collection and use of data. Soon, you won't know about Target's massive data breach.
Generating Data on What Customers Really Want
Disruptive innovation practitioners have just such a tool for reliably predicting customers’ behavior. It’s a methodology that uncovers what in disruptive innovation parlance is called a person’s “job to be done.” Briefly, the idea is this: Consumers don’t go to the store to buy products. They go to the store to buy something that will enable them to get some important job done in their lives. The classic example, attributed to HBS professor Ted Levitt, is that people don’t want to buy a quarter-inch drill; they want something that will make a quarter-inch hole. Making a quarter-inch hole is the job to be done. The product that does that job most reliably, easily, conveniently, and less expensively is the tool they will be most likely to purchase for that job.
7 Business Dashboards That Offer Striking Data Visualizations
When data gets complex, there's no better way to understand it than a business dashboard. You can cull data from your website analytics engine, an Oracle database, social media campaigns and more, all to see how they interrelate. Unfortunately, some dashboards are overly cluttered and actually make data more complicated to understand. The seven tools featured here use more color, graphs, clear delineations and white space to make data more understandable. The cost for using these dashboards varies depending on the number of sources you use, the amount of data you're analyzing and how many admin users you have involved.
How Anybody Can Measure Your Computer's Wi-Fi Fingerprint
Wireless fingerprinting has other applications too. Not only can this approach identify malicious computers attempting to access your network, it can spot fake wireless access points that are designed to collect MAC addresses to spoof other networks. However, this requires the gathering of ground truth data of the original access point in a secure environment in advance. Wireless fingerprinting is unlikely ever to be entirely foolproof but it does have the potential to be a useful addition to the armory of tools available for online security.
The ABCs of the Internet of Things
In a word: Sensors. Many IoT devices have sensors that can register changes in temperature, light, pressure, sound and motion. They are your eyes and ears to what's going on the world. Before we talk about what they do, let's describe them. These sensors are part of a device category called a microelectromechanical system (MEMS) and are manufactured in much the same way microprocessors are manufactured, through a lithography process. These sensors can be paired with an application-specific integrated circuit or an ASIC. This is a circuit with a limited degree of programming capability and is hardwired to do something specific. It can also be paired with microprocessor and will likely be attached to a wireless radio for communications.
eBook: Modern Web Essentials Using JavaScript and HTML5
Developing single page applications with JavaScript and HTML5 solves an enterprise pain point - how to reach users on various platforms without diminishing user experience. This book provides tools for a thorough understanding of three topics integral to effective enterprise-level, web SPA development: JavaScript language essentials, HTML5 specification features, and responsive design principles.
Stripping down enterprise IT to the naked cloud
Once you're in their tent, it's very hard to leave. However, a case can be made for a minimalist approach to cloud; one that takes advantage of public cloud services that don't have all of the bells and whistles -- just a few simple services, such as storage, compute or databases. In some cases, it has the ability to get down to the primitives of the platforms, without going through layers of application program interfaces (APIs) and management tools. In some circles, this is called a "naked cloud."
Symantec calls antivirus 'doomed' as security giants fight for survival
The antivirus giant said that end-point security technology isn't a "moneymaker" in any way, and highlighted that the company needs to adjust and adapt. Which isn't a surprise for Symantec, whose Norton antivirus products have barely made any new dents in the security market in years — despite it being bundled with almost every new Windows computer as premium bloatware. But what Dye was saying is that the malware market is dwindling and hackers are instead increasingly focusing on cyberattacks, like denial-of-service assaults, spearphishing, and network intrusion, rather than mass-emailing a crafted executable file randomly to millions — including to a burgeoining base of Mac users that are immune to such attacks.
Quote for the day:
"Plans are only good intentions unless they immediately degenerate into hard work" -- Peter Drucker
No comments:
Post a Comment