March 07, 2015

Sorry consumers, companies have little incentive to invest in better cybersecurity
Improving information security should fundamentally involve securing information, yet all the current proposals involve greater information sharing with intelligence agencies. Why are the same agencies that have been shown to be active in undermining the information security of private firms such as Indonesia’s Telkomsel or the Dutch Gemalto – and all of their customers (anyone with a cell phone – so all of us) – as a consequence of these actions, being tasked with better securing our information? If we don’t identify and address these contradictions, we run the risk of creating something much worse than the current information security problem.


FREAK flaw: ​How to protect yourself now
Apple and Google have announced that they will release fixes next week. That's the good news. The bad news is that while Google will release its fix for the Android Browser, you'll still need to wait on your telecomm or device OEM to issue the patch to your smartphone or tablet. That leaves a lot of programs still open to attack for now. So let's get started fixing them. First, if you're using Windows Server 2003 or XP, you're in trouble. XP's no longer being supported without a special contract and Windows Server 2003 support life ends in July. Microsoft may issue a patch for this problem, but I wouldn't count on it. It's well past time to move to a newer version of Windows so get on with it already!


The IoT Path Gets Mapped from Sensor to Decision
If you think that the IoT is a marvelous concept for all things digital, the authors might depress you a bit with their summary of what it has taken to make some progress with an earlier concept, RFID:"A consortium of companies and universities succeeded in developing a suite of standards for RFID devices and data, and the adoption has accelerated as costs have dropped. However, it took 15 years to develop, implement, and scale this one suite of standards, which was called the Electronic Product Code (EPC). Even today the most common use of RFID in retail—apparel and electronics tagging—has less than 10 percent penetration."


Big Data Initiatives in Developing Nations
The world of technology and business demonstrates how big data helps revolutionize the science and art of segmentation, targeting, and positioning to market goods and services. In addition, the decreasing costs of big data storage, open source software such as Apache Hadoop, advanced software such as NoSQL databases, and on-demand access to resources through cloud computing are bringing complex technology to nearly everyone. Factor in the slowly increasing pool of multidisciplinary trained data scientists, and business does seem to be moving enthusiastically toward big data technology. Big data can translate into highly successful outcomes for many organizations, and build in enhanced forecasting and targeting for tremendously efficient production and supply.


What You Need to Know About….Big Data
If you want to know what industries will be taking the value—particularly with Big Data—it’s mostly large companies that have the resources and are generating a lot of data to begin with. Those companies are probably going to be the ones that get the most value out of Big Data. Some start-ups are finding value with Big Data. In particular, those that have a narrow niche, because they found a spot where they can tap into that stream and do something with it. That’s been enabled by fantastic reduction in costs for Cloud processing, which is amazing, and I’m totally enthusiastic about it. But if you’re talking about analytics, I don’t think there’s an industry out there that wouldn’t benefit from better understanding of the data that they currently have.


The Open Group San Diego Panel Explores Synergy Among Major Frameworks in EA
It’s a framework that describes and relates the business, application, and technology layers of an enterprise, and it has extensions for modelling motivation, which includes business strategy, external factors affecting the organization, requirements for putting them altogether and for showing them from different stakeholder perspectives. You can show conflicting stakeholder perspectives, and even politics. I’ve used it to model organizational politics that were preventing a project from going forward. It has a rich set of techniques in its viewpoint mechanism for visualizing and analyzing what’s going on in your enterprise. Those viewpoints are tailored to different stakeholders.


How to Build a Company and a Content Strategy Based on Values
TAGFEE actually was a pseudo semi-formal process for us. I had read Jim Collins’ Good to Great and Built to Last, and both of those books identified companies that have strong core values—that stick to those core values and are values-driven—as being the companies that are outstanding and last a long time and do really amazing things. We went through one of the exercises I think he had on his website, this form you can download and answer questions about things that matter to us and things that don’t matter to us. We gave that to, strangely enough, my wife, Geraldine. And she basically took the results of those exercises, compiled them, and wrote out TAGFEE. She came up with the acronym.


Showing value early and often boosts software testing success at Pomeroy
It was a paradigm shift to take one system and bring us together as one company using one product. There was a lot of struggle through that, and they struggled through testing this, because they had no testing background. I was brought in to bring it to steady state. After we went live, we got to steady state. Now it was like, “Let’s not reinvent the wheel. Let’s do this right. Let’s begin scripting.” Testing is terrible. It’s tedious. No one has the time to do it. No one has the patience to do it. So they either don’t do it or they throw buckshot at it. They do ad-hoc testing, or they just let errors come in and out, and they fix them on the back end, which is client facing.


Big Data Ethics: Rearranging the Puzzlers
Data is important to say the least and for me putting together the elusive jigsaw holds a lot of importance, more so, owing to the technical background I hail from. Big Data solves a lot of contradictory issues for me, almost seamlessly but the lingering security strides might still dampen the spirits, a tad bit. With the stature of my work, security and confidentiality do matter and will Big Data survive these acid tests, happens to be the all important query. If transparency is compromised upon, we need to revisit the data ownership as well besides limiting the interferences on the way. My entrepreneurial framework reeked stagnation before I resorted to the Big Data chunks.


The Future of Information: Revealed
Whenever one pulls out their crystal ball to see what the future may hold for information (in society, business, and our personal lives) it is relatively easy to reference the “usual suspects.” These include more mobile device applications, the “Internet of Things (IoT)” via machine-to-machine sensors, and an electronic wallet (like a highway toll EZPass). But it's time to get ready for so much more. My belief is that a good way to view what the future holds is to examine it from the position of the individual. People will increasingly want personalization. They will want what they choose to want -- and not necessarily what someone thinks they want. That is, they will want to customize their relationship with information to their personal preferences.



Quote for the day:

"Even the most honest human in authority often does not have the power to undo the damages that bad people do" -- Auliq Ice

No comments:

Post a Comment