Encryption IS for the children; it's the gift of electronic privacy rights
But it’s for the children! Sorry, but I’m as tired of that rationalization being used as a reason to justify surveillance and censorship as using the terrorism threat as an excuse. Both were used by FBI Director James Comey in the form of warning about how restricting quick access by law enforcement to a smartphone could cost lives in some kidnapping and terrorism cases. “What concerns me about this,” Comey said, “is companies marketing something expressly to allow people to place themselves beyond the law.”
UK falling behind in cyber intrusion detection, study shows
Global information security budgets decreased 4% in the past year compared with 2013, and security spending as a percentage of IT budget has remained stalled at 4% or less for the past five years. Leadership is cited by 30% of respondents as the biggest obstacle to improving the overall effectiveness of the security function. More than a quarter of respondents do not think there is a senior executive who proactively communicates the importance of information security. UK respondents said the top three obstacles to improving security are: insufficient capital funding, a lack of leadership from the CEO or board and the lack of an effective information strategy.
The battle for the IT budget: Operation versus experimentation
"Justifying the ROI for maintaining old solutions or building expensive new ones has become very challenging," Dufour said. "The win rate for on-premise has decreased a lot — below 20 percent for some products — and most companies have a solid aversion against buying hardware, paying for implementations and waiting for tangible results." Outsourcing is another way that many companies are saving money on operating expenses. Traditional outsourcing is still a popular way to save costs on helpdesk, but using platform-as-a-service (PaaS) and infrastructure-as-a-service (IaaS) tools are, in a way, a form of outsourcing support as well.
The scary truth about data security with wearables
The amount of data being collected by just the wearable device on your wrist is simply astounding. Damien Mehers, a wearables developer who built the Evernote app for Pebble and the Samsung Galaxy Gear, said, "Especially with the fitness [devices], if you read the license agreements, if people really realized what they are signing up for, they might be horrified at what they're allowing the companies to do with the data. I think there needs to be more clarity and perspective from the user."
Building a disaster recovery plan starts with IT disowning DR
Once we have scored the risks, we define mitigation plans, which should map correctly to the risks. Disaster recovery can be expensive and it is easy to over-invest in recovery options that we will never actually trigger. And, because redundancy -- in systems, processes and capabilities -- is incredibly expensive, we should have redundancy or partial redundancy only on the high impact/high probability risks. For everything else, we think of how to quickly recover from a disaster, with "quickly" being highly situational.
Implementing repository Pattern With EF4 POCO support
Here all the method responsible to do query, return result in ObjectQuery Which have been used for a special reason and that is ObjectQuery.EnablePlanCachingProperty that indicates whether the query plan should be cached. Plan-caching caches information which is computed as part of putting together the query itself. By caching this, a subsequent execution of the same query (even if you change parameter values) will run much faster than the first one. This information is cached per app-domain so you will generally benefit from the query cache across multiple client requests to the same web app and the like.
IT pros told to pay attention to 'shadow IT'
The newest form of shadow IT, which Comstock also called "dark IT," is cloud services. These are platform, software and infrastructure services that can be obtained by using a personal credit card. Such services are popular because they allow employees to more quickly set up the services they need, without going through a probably already-overworked IT department. Comstock urged the audience to embrace this new form of shadow IT, because it provides a glimpse to IT staff of what their users require.
Microsoft partners with financial services industry to fight cyber crime
Under the new collaboration agreement, Microsoft will provide FS-ISAC members with visibility into malware infections on banking networks. This agreement is the latest example of Microsoft proactively partnering with customers, industry leaders and global law enforcement to counter cyber threats. Criminals have moved into cyber space to target banks, businesses and customers to steal millions of dollars without ever cracking a safe, said Richard Boscovich, assistant general counsel at Microsoft’s Digital Crimes Unit.
The channel needs the right blend of youth and experience
The lack of knowledge of business processes is the primary reason why many IT integration projects fail. Let’s face it, IT salesmen aren’t the greatest listeners in the world. They only ever stop talking in order to think about what they’re going to say next – meanwhile, your queries wash over them. At the risk of making a massive generalisation, it might be said that women are better listeners than men. Surely, listeners are what we need in this industry. Which is why another movement, Women Who Code, could be useful too.
CFOs – Vanguards or Villains?
The bold CFOs are unafraid to admit that their existing reported information may be both flawed and incomplete. The flawed aspect deals with continued use of non-causal cost allocation factors that lead to misleading simultaneous under and over-costed products and services (because cost allocations must have a zero-sum error to reconcile). The incomplete aspect deals with not tracing and assigning the channel and customer-related expenses reported below the gross profit margin line. These channel, selling, customer service and marketing-related “costs to serve” are arguably more important than product costs.
Quote for the day:
"We think of our brains as thinking machines, but they're not. They're survival machines." -- Kris Kimmel
But it’s for the children! Sorry, but I’m as tired of that rationalization being used as a reason to justify surveillance and censorship as using the terrorism threat as an excuse. Both were used by FBI Director James Comey in the form of warning about how restricting quick access by law enforcement to a smartphone could cost lives in some kidnapping and terrorism cases. “What concerns me about this,” Comey said, “is companies marketing something expressly to allow people to place themselves beyond the law.”
UK falling behind in cyber intrusion detection, study shows
Global information security budgets decreased 4% in the past year compared with 2013, and security spending as a percentage of IT budget has remained stalled at 4% or less for the past five years. Leadership is cited by 30% of respondents as the biggest obstacle to improving the overall effectiveness of the security function. More than a quarter of respondents do not think there is a senior executive who proactively communicates the importance of information security. UK respondents said the top three obstacles to improving security are: insufficient capital funding, a lack of leadership from the CEO or board and the lack of an effective information strategy.
The battle for the IT budget: Operation versus experimentation
"Justifying the ROI for maintaining old solutions or building expensive new ones has become very challenging," Dufour said. "The win rate for on-premise has decreased a lot — below 20 percent for some products — and most companies have a solid aversion against buying hardware, paying for implementations and waiting for tangible results." Outsourcing is another way that many companies are saving money on operating expenses. Traditional outsourcing is still a popular way to save costs on helpdesk, but using platform-as-a-service (PaaS) and infrastructure-as-a-service (IaaS) tools are, in a way, a form of outsourcing support as well.
The scary truth about data security with wearables
The amount of data being collected by just the wearable device on your wrist is simply astounding. Damien Mehers, a wearables developer who built the Evernote app for Pebble and the Samsung Galaxy Gear, said, "Especially with the fitness [devices], if you read the license agreements, if people really realized what they are signing up for, they might be horrified at what they're allowing the companies to do with the data. I think there needs to be more clarity and perspective from the user."
Building a disaster recovery plan starts with IT disowning DR
Once we have scored the risks, we define mitigation plans, which should map correctly to the risks. Disaster recovery can be expensive and it is easy to over-invest in recovery options that we will never actually trigger. And, because redundancy -- in systems, processes and capabilities -- is incredibly expensive, we should have redundancy or partial redundancy only on the high impact/high probability risks. For everything else, we think of how to quickly recover from a disaster, with "quickly" being highly situational.
Implementing repository Pattern With EF4 POCO support
Here all the method responsible to do query, return result in ObjectQuery Which have been used for a special reason and that is ObjectQuery.EnablePlanCachingProperty that indicates whether the query plan should be cached. Plan-caching caches information which is computed as part of putting together the query itself. By caching this, a subsequent execution of the same query (even if you change parameter values) will run much faster than the first one. This information is cached per app-domain so you will generally benefit from the query cache across multiple client requests to the same web app and the like.
IT pros told to pay attention to 'shadow IT'
The newest form of shadow IT, which Comstock also called "dark IT," is cloud services. These are platform, software and infrastructure services that can be obtained by using a personal credit card. Such services are popular because they allow employees to more quickly set up the services they need, without going through a probably already-overworked IT department. Comstock urged the audience to embrace this new form of shadow IT, because it provides a glimpse to IT staff of what their users require.
Microsoft partners with financial services industry to fight cyber crime
Under the new collaboration agreement, Microsoft will provide FS-ISAC members with visibility into malware infections on banking networks. This agreement is the latest example of Microsoft proactively partnering with customers, industry leaders and global law enforcement to counter cyber threats. Criminals have moved into cyber space to target banks, businesses and customers to steal millions of dollars without ever cracking a safe, said Richard Boscovich, assistant general counsel at Microsoft’s Digital Crimes Unit.
The channel needs the right blend of youth and experience
The lack of knowledge of business processes is the primary reason why many IT integration projects fail. Let’s face it, IT salesmen aren’t the greatest listeners in the world. They only ever stop talking in order to think about what they’re going to say next – meanwhile, your queries wash over them. At the risk of making a massive generalisation, it might be said that women are better listeners than men. Surely, listeners are what we need in this industry. Which is why another movement, Women Who Code, could be useful too.
CFOs – Vanguards or Villains?
The bold CFOs are unafraid to admit that their existing reported information may be both flawed and incomplete. The flawed aspect deals with continued use of non-causal cost allocation factors that lead to misleading simultaneous under and over-costed products and services (because cost allocations must have a zero-sum error to reconcile). The incomplete aspect deals with not tracing and assigning the channel and customer-related expenses reported below the gross profit margin line. These channel, selling, customer service and marketing-related “costs to serve” are arguably more important than product costs.
Quote for the day:
"We think of our brains as thinking machines, but they're not. They're survival machines." -- Kris Kimmel
No comments:
Post a Comment