February 23, 2015

Forget the tech bubble. It’s the biotech bubble you should worry about
The biotech craze isn’t, of course, built entirely on hot air. There was a jump in drug approvals last year, there are some potentially revolutionary drugs in development, and the US Food and Drug Administration (FDA) opened up a few ways of getting promising drugs approved faster. Biotech saw its first true blockbuster for some time in Gilead’s Hepatitis C drug Sovaldi, which was approved in late 2013, and quickly set sales records. Companies that have products on the market and are growing their revenues may warrant their high valuations. But others do not.

Burley Kawasaki on best tips for attaining speed in enterprise mobile apps delivery
If you look at the stats or the data, most industry analysts predict that up to 60 percent or 70 percent or more of mobile development is outsourced today, to either an interactive agency, a systems integrator, or someone else, because of lack of skills.  So it has been outsourced to some third party, and who knows what technologies they are using to build the app. It's outside the typical controls or governance of IT. So it's not only shadow; it's dark matter. You don't even know it exists; it’s completely hidden.  Yet, at some point, inevitably, those apps that you may have outsourced for your first version, it’s not just a first version release.

Apple, Linux, not Windows, most vulnerable operating systems in 2014
The top spot for vulnerabilities in operating systems no longer goes to Microsoft Windows; in fact, Windows isn't even listed in the top three. Instead, the most vulnerable OS was Apple Mac OS X, followed by Apple iOS and Linux kernel. As you can see in the list below, Mac OS X had 147 vulnerabilities, with 64 being rated as high-severity bugs. There were 127 in iOS, 32 of those rated as high. Linux kernel had a rough year, with 119 security vulnerabilities and 24 being rated as high-severity. The flip-side is that none of the security holes in Windows versions were rated as low severity.

The key to a successful security project
Being first held a couple meanings for us. When working with people - be first to understand what they needed and offer them help getting there. This is how we found out what to report on our scorecard line. We simply treated everyone we interacted with like our most valued customer. No matter where in the org chart, or when in the project cycle, we treated relationships like the success of our project depended on it, because it did. Second, when faced with a new idea - could we be the first to do something in our organization, could we lead it somewhere, improve something?

How to Systematically Incorporate Social and Cultural Factors into EA Practice
Ceri Williams drills deep into a key area of difference and explores what it means in practice for the Enterprise Architect. He considers how SSM is inclusive of all areas of the situation/action space (i.e. scientific, technological, mechanical, material, psychological, social and cultural), while an engineering approach excludes psychological, social and cultural influences. This paper describes how an Enterprise Architect can appropriate elements of SSM and related social and cultural disciplines, and blend them in as a defined part of a holistic approach to Enterprise Architecture.

Are You Ready for Web 40.0?
Personal and “desktop” computers will completely disappear. All single-purpose stationary machines – like fax machines and copiers – will completely disappear. Intelligent, networked tablets, watches, smart phones and wearables will integrate and become increasingly unnoticeable as they disappear into Web 40.0, the most important utility of the 21st century. Today’s discussions about “the Internet of Things” (IOT) and the “Internet of Everything” (IOE) represent the official launch of human/ digital/personal/professional integration.

Collaboration Techniques for Large Distributed Agile Projects
In past few years, it has become quite common for software development teams to be distributed across time-zones and comprise of multiple vendors with 50-100+ people. Agile practices encourage in-person interactions to foster collaboration, whereas, distributed and large teams force communication into the opposite direction. Therefore, it is important to achieve agility albeit with different, or modified mechanics, that work well for distributed and large team.I have shared examples for my project to explain Agile practices that work well in Large multi-vendor distributed teams.

How HTTP/2 will speed up your web browsing
The first way HTTP/2 speeds up traffic is by transferring all data as a binary format instead of HTTP 1.1's four text message styles. Besides making it simpler for web servers and browsers, this new format is more compact, because the more compact a web page is, the less time it takes to be transmitted. HTTP/2 uses multiplexing. This makes for a more responsive website by avoiding HTTP 1.1's "head-of-line blocking" problem. With earlier versions of HTTP, only one data request can be handled at a time, even though every time you visit a website, you start from four to eight TCP/IP connections. With HTTP/2, each website only gets one TCP/IP connection, but you can have multiple data requests being dealt with simultaneously.

NSA planted surveillance software on hard drives, report says
Surveillance software implanted on hard drives is especially dangerous as it becomes active each time the PC boots up and thus can infect the computer over and over again without the user's knowledge. Though this type of spyware could have surfaced on a "majority of the world's computers," Kaspersky cited thousands or possibly tens of thousands of infections across 30 different countries. Infected parties and industries include government and diplomatic institutions, as well as those involved in telecommunications, aerospace, energy, nuclear research, oil and gas, military and nanotechnology. Also, included are Islamic activists and scholars, mass media, the transportation sector, financial institutions and companies developing encryption technologies. And who's responsible for this sophisticated spyware?

Google and Apple Fight for the Car Dashboard
Here at Google’s headquarters, Android Auto is about to make its debut in Americans’ cars after two years in development. Plug in a smartphone with a USB cord and the system powers up on a car’s screen. The phone’s screen, meanwhile, goes dark, not to be touched while driving. Apple’s CarPlay works similarly, with bubbly icons for phone calls, music, maps, messaging and other apps appearing on the center screen. (Apple declined to comment for this article.) While the idea of constantly connected drivers zipping along roads raises concerns about distracted driving, both companies say their systems are designed with the opposite goal: to make cellphone-toting drivers safer.

Quote for the day:

“If you want to rebel, rebel from inside the system.That's much more powerful than rebelling outside the system.” -- Marie Lu

No comments:

Post a Comment