December 16, 2014

Finding critical business data -- fast
"We used to call it ‘complex event processing,’" he adds. But that approach required proprietary software and expensive servers, which limited usage. In contrast, one of today’s technologies, Hadoop, "is linearly scalable, and you can throw lots of hardware at it and use memory very effectively," he says. Roll into that the lower cost of flash memory, adds Baer, and "now we can process data very fast, and do more sophisticated processing than when you were bound by I/O."

The 5 Elements of A Killer Mobile App
By 2015, more than 780 million people will be mobile users only. This means they won’t own a laptop or desk computer. These 780 million users will be your customers, partners, business stakeholders, suppliers, and other business associates. As organizations begin to align their mobile first strategy with this shift in users, it’s important to focus on what these mobile apps must do.

APIs should not be copyrightable
The story of SMB and Samba is a good example of how non-copyrightable APIs spurred competition. When Windows became a dominent desktop operating system, its SMB protocol dominated simple networks. If non-windows computers wanted to communicate effectively with the dominant windows platform, they needed to talk to SMB. Microsoft didn't provide any documentation to help competitors do this, since an inability to communicate with SMB was a barrier to their competitors. However, Andrew Tridgell was able to deduce the specification for SMB and build an implementation for Unix, called Samba. By using Samba non-windows computers could collaborate on a network, thus encouraging the competition from Mac and Linux based systems.

This Linux grinch could put a hole in your security stocking
The fundamental flaw resides in the Linux authorization system, which can inadvertently allow privilege escalation, granting a user "root," or full administrative access. With full root access, an attacker would be able to completely control a system, including the ability to install programs, read data and use the machine as a launching point for compromising other systems. To date, Alert Logic has not seen any exploits that harness this vulnerability, nor did the research team find any existing mention of this hole in the vulnerability database maintained by the Community Emergency Response Team (CERT), according to Stephen Coty, Alert Logic's director of threat research.

Frameworks and Leadership on Cyber-Risks
Just identifying and defining the risks is a daunting enough task. Stuart Levi, a partner with law firm Skadden, Arps, Slate, Meagher & Flom who focuses on cyber-security, warns that any company with even a single computer connected to the internet is vulnerable. “Every public company—regardless of their industry, what they do, what data and information they have —needs to be focused on this issue,” he says. ... Aaron Weller, a managing director in data protection and privacy with PwC, said at Compliance Week West that companies need to think beyond compliance to make their data and their systems secure. “Compliance is not security,” he said

How CIOs Can Prepare for Healthcare ‘Data Tsunami’
"Identify who owns the data and build consensus on data definitions," Dunbrack says in an email. "Understanding what the data means is key to making data governance and interoperability work, and is essential for analytics, big data initiatives and quality reporting initiatives, among other things." To be sure, ironing out data governance policies within a healthcare organization is anything but a black-and-white process. Complicating matters significantly are the diverse and growing sources of medical data, each raising distinctive ownership and compliance questions.

Defining a Major IT Transformation Now Happening in Telecoms
"One of the things I'm looking at as operators go through this journey is that this is a cycle that will take between 10 and 15 years," Kelly told eWEEK during a break at the conference. "Most operators have a high capital expenditure structure--they have a lot of high sum costs in the infrastructure--and they're not going to abandon that. What they are trying to do is take advantage of opportunities in the digital services economy to compete against the over-the-top providers, mostly because their core businesses are under attack."

2015 will be the year Linux takes over the enterprise
This rise of Linux in the world of big data will have serious trickle down over the rest of the business world. We already know how fond enterprise businesses are of Linux and big data. What we don't know is how this relationship will alter the course of Linux with regards to the rest of the business world. My prediction is that the success of Linux with big data will skyrocket the popularity of Linux throughout the business landscape. More contracts for SuSE and Red Hat will equate to more deployments of Linux servers that handle more tasks within the business world. This will especially apply to the cloud, where OpenStack should easily become an overwhelming leader.

The First Agile and Lean Open Source Method for Continuous Improvement
There are no silver bullets, we only move forward by learning, experimenting and sharing our discoveries with each other. That is the spirit of Open Kanban to keep those communications lines open, to help people innovate, and collaborate across the aisles of Lean and Agile, a method where innovation and people who think different are welcome. As wonderful as it is to have a few people who think different and collaborate from different sides of Agile and Lean today, this is not enough, especially when they get attacked simply becauase they are seen as the rebels, the non-conformants, the ones who dare to challenge the establishment in their respective camps of Agile or Lean.

QA & Testing Budgets Are Rising for Financial Services Firms
The survey found that as many as 52 percent of organizations are investing more in transformational projects rather than maintaining legacy systems (48 percent). This includes developing new mobile, cloud, and big-data applications and systems. With more development, comes more risk. One application failure can quickly turn into a business process disaster, consumer backlash, and reputational damage -- reiterating the importance of QA and testing today.

Quote for the day:

"My definition of agile is that you accept input from reality, and you respond to it." -- Kent Beck

No comments:

Post a Comment