Open-source PaaS Cloud Foundry Foundation opens its doors
Indeed Cloud Foundry is already being used in a variety of commercial deployments including Pivotal Cloud Foundry, IBM Bluemix, HP Helion, and Canopy Cloud Fabric among others. As a community project, its founders believe that its acceptance and advancement will start speeding up even more. What programmers will find most interesting is that The Cloud Foundry Foundation is implementing a new approach to open-source development called Dojo. With Dojo, developers will be trained on Cloud Foundry and given a "fast track" for commit rights. In most open-source projects, earning commit rights usually takes at least a year in a major project.
6 Pieces of Software Development Advice You Should Ignore
Building quality software is tough. And at times, misguided insights make it much tougher. When creating quality code and building great software, it is important to carefully plan your project and communicate well during each step of development. Though good advice is not scarce, bad advice runs rampant amongst those lacking expertise. With this in mind, I reached out to some fellow developers and innovators in the tech space to hear about their software development experience and asked them to share the worst advice they've ever received. Below are some of my favorite insights from those conversations, and my own "worst" advice
Healthcare Security In 2015: 9 Hotspots
Attackers also are becoming more sophisticated, experts warn. Cybercriminals are seeking more information than ever about their victims to sell, Websense researchers cautioned. "These fuller, richer, personal identity dossiers of individual users, consisting of multiple credit cards, regional and geographic data, personal information and behavior, will be increasingly traded in the same manner that stolen credit cards are today." Because this information often resides within health systems' databases or networks, hospitals are natural targets and require extraordinary defenses. With so much cyberdanger to battle, it seems obvious the healthcare industry will face additional crises in 2015. None of the underlying security issues are new, but all are crucial to address.
The 6 Things Everyone Needs to Know About the Big Data Economy
Big data is moving on. We’re moving past the stage where it’s something only trailblazers and early adopters are on board with, towards a time when if you aren’t analyzing data to help you make better business decisions, you’re in danger of being left behind. A survey this year found that 73% of businesses questioned either already had data analytics strategies in place, or are planning to implement them in the next two years. It is becoming apparent that just about any organization of any shape or size can find a data strategy to suit them. So here are 6 key facts about the big data economy you can’t afford not to know;
Korean E-commerce Leader Coupang Raises $300M Led By BlackRock
“Our view is that this is still the very early stages of e-commerce. We all know what is going on with Amazon and Alibaba, but the mass of commerce is still occurring offline. We have an opportunity because of [South Korea’s] density and mobile infrastructure to do things that e-commerce companies will do in other countries eventually,” says Kim, who founded Coupang in 2011. "We are addressing two fundamental friction points: with offline commerce, you can get a lot of information by holding a product in your hand, which we can’t provide digitally, but we are getting closer and closer to providing almost as rich an experience as an offline store. ...” he adds.
FIDO Alliance releases 1.0 specifications for passwordless authentication
Andras Cser, vice president and principal analyst at Cambridge, Mass.-based Forrester Research Inc., believes the specifications will help drive significant interest in FIDO, especially in light of the number of high-profile corporate data breaches tied to stolen credentials. "I think FIDO 1.0 is the first step in the direction of creating a uniform and application-independent authentication and strong authentication ecosystem," Cser said. "It provides a great abstraction layer to hide all the complexities of two factor authentication. For those data breaches where authentication was the weakest link, FIDO will definitely play a role in prevention."
Where your tech focus should be in 2015
2014 is almost over, and what a year it has been for tech. But time waits for no one and soon it will be 2015, and if you want to hit the ground running then you'll need to know where your focus should be. Here are the 10 areas that the IEEE Computer Society believe are going to be big in 2015. Some will bring profits through savings and opening up new markets, while others will bring challenges that need to be faced.
Digital governments meet in London to commit to best practices
“Ensuring that our people and businesses have world-class digital skills so they can compete in the economy of the future is a key part of our long-term economic plan to back business, create jobs and secure a brighter future for Britain,” Digital economy minister Ed Vaizey said. “We have already put coding into the school curriculum, and our roll-out of superfast broadband, backed by over £1bn government investment in our digital infrastructure, has now passed more than 1.5 million homes and businesses and is reaching 40,000 more each week.”
Intel's IoT vision encompasses more than chips
"It really is an end to end play," said Doug Fisher, vice president and general manager of the Intel Software and Services Group. A key part of Intel's strategy for IoT is its gateway reference designs, which can collect data from sensors and other IoT devices at the edge of a network and process and translate that data. The gateways can even turn machines that have never been networked into connected devices, translating older proprietary protocols into usable streams of data on IP (Internet Protocol) networks.
Using C# and Wix# to Build Windows Installer Packages
The objective of Wix# is not to replace XML syntax with a different syntax. The alternative syntax would only address one of many practical limitations of the MSI+WiX combination. With Wix# I wanted to bring the deployment development back to the main stream programming. I wanted to move it closer to the developers. I wanted the very same developers who creates software to be able to create very quickly and comfortably deployment solutions as well. DSL would mean that developers need to learn yet another syntax and also to suffer from absence of the code assistance tools (e.g. Intellisense).
Quote for the day:
“Great works are performed not by strength, but by perseverance.” -- Samuel Johnson
Indeed Cloud Foundry is already being used in a variety of commercial deployments including Pivotal Cloud Foundry, IBM Bluemix, HP Helion, and Canopy Cloud Fabric among others. As a community project, its founders believe that its acceptance and advancement will start speeding up even more. What programmers will find most interesting is that The Cloud Foundry Foundation is implementing a new approach to open-source development called Dojo. With Dojo, developers will be trained on Cloud Foundry and given a "fast track" for commit rights. In most open-source projects, earning commit rights usually takes at least a year in a major project.
6 Pieces of Software Development Advice You Should Ignore
Building quality software is tough. And at times, misguided insights make it much tougher. When creating quality code and building great software, it is important to carefully plan your project and communicate well during each step of development. Though good advice is not scarce, bad advice runs rampant amongst those lacking expertise. With this in mind, I reached out to some fellow developers and innovators in the tech space to hear about their software development experience and asked them to share the worst advice they've ever received. Below are some of my favorite insights from those conversations, and my own "worst" advice
Healthcare Security In 2015: 9 Hotspots
Attackers also are becoming more sophisticated, experts warn. Cybercriminals are seeking more information than ever about their victims to sell, Websense researchers cautioned. "These fuller, richer, personal identity dossiers of individual users, consisting of multiple credit cards, regional and geographic data, personal information and behavior, will be increasingly traded in the same manner that stolen credit cards are today." Because this information often resides within health systems' databases or networks, hospitals are natural targets and require extraordinary defenses. With so much cyberdanger to battle, it seems obvious the healthcare industry will face additional crises in 2015. None of the underlying security issues are new, but all are crucial to address.
The 6 Things Everyone Needs to Know About the Big Data Economy
Big data is moving on. We’re moving past the stage where it’s something only trailblazers and early adopters are on board with, towards a time when if you aren’t analyzing data to help you make better business decisions, you’re in danger of being left behind. A survey this year found that 73% of businesses questioned either already had data analytics strategies in place, or are planning to implement them in the next two years. It is becoming apparent that just about any organization of any shape or size can find a data strategy to suit them. So here are 6 key facts about the big data economy you can’t afford not to know;
Korean E-commerce Leader Coupang Raises $300M Led By BlackRock
“Our view is that this is still the very early stages of e-commerce. We all know what is going on with Amazon and Alibaba, but the mass of commerce is still occurring offline. We have an opportunity because of [South Korea’s] density and mobile infrastructure to do things that e-commerce companies will do in other countries eventually,” says Kim, who founded Coupang in 2011. "We are addressing two fundamental friction points: with offline commerce, you can get a lot of information by holding a product in your hand, which we can’t provide digitally, but we are getting closer and closer to providing almost as rich an experience as an offline store. ...” he adds.
FIDO Alliance releases 1.0 specifications for passwordless authentication
Andras Cser, vice president and principal analyst at Cambridge, Mass.-based Forrester Research Inc., believes the specifications will help drive significant interest in FIDO, especially in light of the number of high-profile corporate data breaches tied to stolen credentials. "I think FIDO 1.0 is the first step in the direction of creating a uniform and application-independent authentication and strong authentication ecosystem," Cser said. "It provides a great abstraction layer to hide all the complexities of two factor authentication. For those data breaches where authentication was the weakest link, FIDO will definitely play a role in prevention."
Where your tech focus should be in 2015
2014 is almost over, and what a year it has been for tech. But time waits for no one and soon it will be 2015, and if you want to hit the ground running then you'll need to know where your focus should be. Here are the 10 areas that the IEEE Computer Society believe are going to be big in 2015. Some will bring profits through savings and opening up new markets, while others will bring challenges that need to be faced.
Digital governments meet in London to commit to best practices
“Ensuring that our people and businesses have world-class digital skills so they can compete in the economy of the future is a key part of our long-term economic plan to back business, create jobs and secure a brighter future for Britain,” Digital economy minister Ed Vaizey said. “We have already put coding into the school curriculum, and our roll-out of superfast broadband, backed by over £1bn government investment in our digital infrastructure, has now passed more than 1.5 million homes and businesses and is reaching 40,000 more each week.”
Intel's IoT vision encompasses more than chips
"It really is an end to end play," said Doug Fisher, vice president and general manager of the Intel Software and Services Group. A key part of Intel's strategy for IoT is its gateway reference designs, which can collect data from sensors and other IoT devices at the edge of a network and process and translate that data. The gateways can even turn machines that have never been networked into connected devices, translating older proprietary protocols into usable streams of data on IP (Internet Protocol) networks.
Using C# and Wix# to Build Windows Installer Packages
The objective of Wix# is not to replace XML syntax with a different syntax. The alternative syntax would only address one of many practical limitations of the MSI+WiX combination. With Wix# I wanted to bring the deployment development back to the main stream programming. I wanted to move it closer to the developers. I wanted the very same developers who creates software to be able to create very quickly and comfortably deployment solutions as well. DSL would mean that developers need to learn yet another syntax and also to suffer from absence of the code assistance tools (e.g. Intellisense).
Quote for the day:
“Great works are performed not by strength, but by perseverance.” -- Samuel Johnson
No comments:
Post a Comment