Chief marketing technologist emerges to align marketing and IT
According to a Harvard Business Review article by Scott Brinker and Laura McLellan, "Marketing is rapidly becoming one of the most technology-dependent functions in business." To keep up, CMTs are enlisted as "part strategist, part creative director, part technology leader and part teacher." The CMT isn't an entirely new role in the C-suite, Brinker and McLellan point out. The function also goes by the name of global head of marketing technology or business information officer for global marketing, or any other term that basically boils down to "IT and marketing pro reporting to a senior marketing executive" (i.e. the chief marketing officer (CMO), VP of marketing operations or VP of digital marketing).
Questioning the Lambda Architecture
Why does code change? It might change because your application evolves and you want to compute new output fields that you didn’t previously need. Or it might change because you found a bug and need to fix it. Regardless, when it does, you need to regenerate your output. I have found that many people who attempt to build real-time data processing systems don’t put much thought into this problem and end-up with a system that simply cannot evolve quickly because it has no convenient way to handle reprocessing. The Lambda Architecture deserves a lot of credit for highlighting this problem.
Big Data Is Changing Every Industry, Even Yours!
The efficiency of every machine – and human – involved in the manufacturing process can be recorded so companies know what is working, and can make improvements where they are needed. And in agriculture, data analysis is helping the industry meet the challenge of increasing the world’s food production by 60%, as forecasters have said will be necessary by 2050 due to the growing population. John Deere fits sensors to its tractors and agricultural machinery and makes the readings available on its myjohndeere.com and Farmsight services. These help growers establish optimum conditions for their crops, and also lets John Deere forecast demand for spare parts.
Cyber security break-ins a 'daily hazard while firms skimp on protection'
"There are more cybercriminals on the internet than ever before and their tools are increasingly sophisticated, but the weakest link in the chain is still the bit between the chair and keyboard – we need to patch the human," warned David Emm, a security researcher from the internet security firm Kaspersky Lab. "Cybercrime is as old as the internet, and that means we've had time to study it. We are now familiar with it and can often deal with it." The security and safety of computers used on a daily basis is serious as a range of activities, from banking and tax returns, to shopping and private messages, relies on the internet.
Tech Breakthroughs May Mean 'Digital Everything' by 2025
"The digital world as we know it today will seem simple and rudimentary in 2025," the analysts wrote. "Thanks to the prevalence of improved semiconductors, graphene-carbon nanotube capacitors, cell-free networks of service antenna and 5G technology, wireless communications will dominate everything, everywhere... from the most remote farmlands to bustling cities -- we will all be digitally directed.
"Imagine the day when the entire continent of Africa is completely, digitally connected," they added. "That day will happen in 2025." The phrase "Beam me up, Scotty," which Star Trek made famous, also may get more usage in another 10 years.
Standards and APIs: How to Build Platforms and Tools to Best Manage Identity and Security
APIs are becoming exponentially more important in the identity world now. As Bradford alluded to, the landscape is changing. There are mobile devices as well as software-as-a-service (SaaS) providers out there who are popping up new services all the time. The common thread between all of them is the need to be able to manage identities. They need to be able to manage the security within their system. It makes total sense to have a common way to do this. APIs are key for all the different devices and ways that we connect to these service providers. Becoming standards based is extremely important, just to be able to keep up with the adoption of all these new service providers coming on board.
If you want developers to give a hoot about security, take a lesson from the squirrels
Developers look at systems, apps and other software tools and are impressed by the cool things they can do, and maybe by the economy with which it was all achieved. They marvel at features and innovation. In software parlance, they focus on their products' functional specifications (or user stories, for you agile folks). Security professionals look at those same things and immediately analyze them for what can go awry. We have a healthy presumption that things will go wrong more often than not. We are always trying to anticipate how we can respond to the things that go wrong and thinking about how we can keep them from going wrong in the first place.
Nascent SDN security controls pose sizable risk
"In a network environment that's designed to be highly available, those are the hardest attacks to defend against," Young said. "Enterprises are going to have to be monitoring for these kinds of attacks, both intentional and unintentional, because it's something that hasn't been talked about." Furthermore, Young detailed the security-related issues with SDN configuration and change control. He said SDN products come with their own management consoles that typically aren't interoperable with other networking and security management consoles, adding another layer of complexity to network security management processes.
Building Data-Driven Apps: 5 Best Practices
What's the best way to deliver data-driven apps? These are apps that give consumers what they want but that are also highly scalable and enterprise class. Based on my years in the industry, I think there are five central principles that really will help us get there. There's a healthy appetite to get these data-driven apps out the door, and there's a huge amount of interest, verging on hype, in big data; Forrester Research recently estimated the potential size of what it calls "smart" computing -- that is, the big- or smart- or small-data market -- at more than $48 billion. It's thought that 90 percent of the Fortune 500 have some sort of big data projects either starting or established.
Commercial Nanotube Transistors Are Coming Soon
A project at IBM is now aiming to have transistors built using carbon nanotubes ready to take over from silicon transistors soon after 2020. According to the semiconductor industry’s roadmap, transistors at that point must have features as small as five nanometers to keep up with the continuous miniaturization of computer chips. “That’s where silicon scaling runs out of steam, and there really is nothing elbestse,” says Wilfried Haensch, who leads the company’s nanotube project at the company’s T.J. Watson research center in Yorktown Heights, New York. Nanotubes are the only technology that looks capable of keeping the advance of computer power from slowing down, by offering a practical way to make both smaller and faster transistors, he says.
Quote for the day:
"Winning is important to me, but what brings me real joy is the experience of being fully engaged in whatever I'm doing" -- Phil Jackson
According to a Harvard Business Review article by Scott Brinker and Laura McLellan, "Marketing is rapidly becoming one of the most technology-dependent functions in business." To keep up, CMTs are enlisted as "part strategist, part creative director, part technology leader and part teacher." The CMT isn't an entirely new role in the C-suite, Brinker and McLellan point out. The function also goes by the name of global head of marketing technology or business information officer for global marketing, or any other term that basically boils down to "IT and marketing pro reporting to a senior marketing executive" (i.e. the chief marketing officer (CMO), VP of marketing operations or VP of digital marketing).
Why does code change? It might change because your application evolves and you want to compute new output fields that you didn’t previously need. Or it might change because you found a bug and need to fix it. Regardless, when it does, you need to regenerate your output. I have found that many people who attempt to build real-time data processing systems don’t put much thought into this problem and end-up with a system that simply cannot evolve quickly because it has no convenient way to handle reprocessing. The Lambda Architecture deserves a lot of credit for highlighting this problem.
Big Data Is Changing Every Industry, Even Yours!
The efficiency of every machine – and human – involved in the manufacturing process can be recorded so companies know what is working, and can make improvements where they are needed. And in agriculture, data analysis is helping the industry meet the challenge of increasing the world’s food production by 60%, as forecasters have said will be necessary by 2050 due to the growing population. John Deere fits sensors to its tractors and agricultural machinery and makes the readings available on its myjohndeere.com and Farmsight services. These help growers establish optimum conditions for their crops, and also lets John Deere forecast demand for spare parts.
Cyber security break-ins a 'daily hazard while firms skimp on protection'
"There are more cybercriminals on the internet than ever before and their tools are increasingly sophisticated, but the weakest link in the chain is still the bit between the chair and keyboard – we need to patch the human," warned David Emm, a security researcher from the internet security firm Kaspersky Lab. "Cybercrime is as old as the internet, and that means we've had time to study it. We are now familiar with it and can often deal with it." The security and safety of computers used on a daily basis is serious as a range of activities, from banking and tax returns, to shopping and private messages, relies on the internet.
Tech Breakthroughs May Mean 'Digital Everything' by 2025
"The digital world as we know it today will seem simple and rudimentary in 2025," the analysts wrote. "Thanks to the prevalence of improved semiconductors, graphene-carbon nanotube capacitors, cell-free networks of service antenna and 5G technology, wireless communications will dominate everything, everywhere... from the most remote farmlands to bustling cities -- we will all be digitally directed.
"Imagine the day when the entire continent of Africa is completely, digitally connected," they added. "That day will happen in 2025." The phrase "Beam me up, Scotty," which Star Trek made famous, also may get more usage in another 10 years.
Standards and APIs: How to Build Platforms and Tools to Best Manage Identity and Security
APIs are becoming exponentially more important in the identity world now. As Bradford alluded to, the landscape is changing. There are mobile devices as well as software-as-a-service (SaaS) providers out there who are popping up new services all the time. The common thread between all of them is the need to be able to manage identities. They need to be able to manage the security within their system. It makes total sense to have a common way to do this. APIs are key for all the different devices and ways that we connect to these service providers. Becoming standards based is extremely important, just to be able to keep up with the adoption of all these new service providers coming on board.
If you want developers to give a hoot about security, take a lesson from the squirrels
Developers look at systems, apps and other software tools and are impressed by the cool things they can do, and maybe by the economy with which it was all achieved. They marvel at features and innovation. In software parlance, they focus on their products' functional specifications (or user stories, for you agile folks). Security professionals look at those same things and immediately analyze them for what can go awry. We have a healthy presumption that things will go wrong more often than not. We are always trying to anticipate how we can respond to the things that go wrong and thinking about how we can keep them from going wrong in the first place.
Nascent SDN security controls pose sizable risk
"In a network environment that's designed to be highly available, those are the hardest attacks to defend against," Young said. "Enterprises are going to have to be monitoring for these kinds of attacks, both intentional and unintentional, because it's something that hasn't been talked about." Furthermore, Young detailed the security-related issues with SDN configuration and change control. He said SDN products come with their own management consoles that typically aren't interoperable with other networking and security management consoles, adding another layer of complexity to network security management processes.
Building Data-Driven Apps: 5 Best Practices
What's the best way to deliver data-driven apps? These are apps that give consumers what they want but that are also highly scalable and enterprise class. Based on my years in the industry, I think there are five central principles that really will help us get there. There's a healthy appetite to get these data-driven apps out the door, and there's a huge amount of interest, verging on hype, in big data; Forrester Research recently estimated the potential size of what it calls "smart" computing -- that is, the big- or smart- or small-data market -- at more than $48 billion. It's thought that 90 percent of the Fortune 500 have some sort of big data projects either starting or established.
Commercial Nanotube Transistors Are Coming Soon
A project at IBM is now aiming to have transistors built using carbon nanotubes ready to take over from silicon transistors soon after 2020. According to the semiconductor industry’s roadmap, transistors at that point must have features as small as five nanometers to keep up with the continuous miniaturization of computer chips. “That’s where silicon scaling runs out of steam, and there really is nothing elbestse,” says Wilfried Haensch, who leads the company’s nanotube project at the company’s T.J. Watson research center in Yorktown Heights, New York. Nanotubes are the only technology that looks capable of keeping the advance of computer power from slowing down, by offering a practical way to make both smaller and faster transistors, he says.
Quote for the day:
"Winning is important to me, but what brings me real joy is the experience of being fully engaged in whatever I'm doing" -- Phil Jackson
No comments:
Post a Comment