April 12, 2015

Balance exploitation & exploration within your organization with TOGAF
Every organization is confronted with ambidexterity. Ambidexterity is about achieving a healthy balance between the management of operations, the daily work, exploitation vs. the management of innovation, discovering, incubating and accelerating new products and services, exploration. Ambidexterity within organizations means "exploiting the present and exploring the future". Consider financial services providers, for example consumer banks. As illustrated in the figure below the daily operations of a consumer bank involves activities such as – and certainly not limited to – the management of:

A community distribution of OpenStack
It's worth pointing out that RDO is a community effort, so when it comes to support, the project's mailing lists, IRC channels and ask.openstack.org site are your best options. If you need professional support for your production environment, a commercial distribution like Red Hat Enterprise Linux OpenStack Platform (RHEL-OSP) would be the way to go. ... The rest of the work performed in RDO is done within the community boundaries. We follow most of the OpenStack and Fedora development conventions and practices, so sometimes the line between one and the other is blurred. Needless to say, everything done in RDO is open and committed to public repositories as it's being developed.

Data Viz Pioneer Nicholas Felton: "There Is A Real Shadow Over Data"
Ryan and I went out to California for some meetings about Daytum and about starting this pursuit of getting funding so we could work on it full-time. We went and talked to Mark and found out they were working on Timeline. We were especially interested in Open Graph, which was basically the ability to plug anything into Facebook. This included data sources that we were pretty interested in, like music, being able to visualize what you were listening to, or things that you’re watching from Netflix. At that point, the question for us was, "Do we want to work on Daytum and try and bring it to a grand scale, or have even a tiny influence on what 600 or 700 million people are using?" That was a hard conversation.

The Battle For Your Wrist Has Begun: Android Wear Versus Apple Watch
On the bright side, improvements to security could be coming in short order for Android Wear devices. Liviu Arsene, Senior Security Analyst at Bitdefender, explains, “These security risks could easily be fixed with stronger or better methods for ensuring the safety of the entire communication.” His suggestions include the use of Near Field Communication (NFC) to safely transmit a PIN code during pairing, but he warns that using NFC “would likely increase the cost and complexity of the devices.” An alternative method would be to “supersede the entire Bluetooth encryption between Android device and smartwatch and use a secondary layer of encryption at the application level.”

Containers Explained: 9 Essentials You Need To Know
At the most basic level, containers let you pack more computing workloads onto a single server, and let you rev up capacity for new computing jobs in a split second. In theory, that means you can buy less hardware, build or rent less data center space, and hire fewer people to manage that gear. Containers are different from virtual machines - which you probably already run using VMware or Microsoft Hyper-V virtualization software, or open source options KVM or Zen. Specifically, Linux containers give each application running on a server its own, isolated environment to run, but those containers all share the host server's operating system. Since a container doesn't have to load up an operating system, you can create containers in a split-second, rather than minutes for a virtual machine.

Strategic Torque: Enterprise Architecture & Portfolio Management
Practical application of integration based on theoretical foundations shows that the implementation of portfolio management is facilitated by enterprise architecture practices and in doing so contributes to the realisation of strategic planning and the overall improvement of cross-competency IT effectiveness. This discussion will show that there is a history of risk aversion, opportunity cost and siloed ‘think’ in the IT departments of tertiary educational institutions. ... This optimisation of organisation and organisational change combines service based value add client interaction, through streamlining process (through silo integration), and the reduction of opportunity cost and waste. This is in part an impact of risk appetite / tolerance. The ability to influence outside ones silo is perceived as riskier as control seems to be lacking.

Lean Documentation
People use documentation to find answers to the questions they have. The quality of the documentation can be measured by the time it takes to find the answers. We used Google Earth as a model. Have you ever tried to find your house on Google Earth (drilling down, not searching on address)? How long did it take? Maybe 30 to 60 seconds? Finding your house on the surface of the Earth is like finding 1 answer among 1,5 trillion (1,5 * 1012) answers. If you are looking for an answer it shouldn’t take more than 60 seconds, even if your system is complex and huge. How does this apply to documentation? We followed a hierarchy analogous to moving through the levels in Google Earth: moon level, satellite level, airplane level, helicopter level and so on.

Deep Gooses MySQL Performance with New Database Math
Instead of continually writing data to disk, CASSI uses machine learning algorithms to better predict the optimal moment to write data to disk, based on the particular configuration and capability of a computer, says Chad Jones, the chief strategy officer for Deep IS. “As things come in we’ll say, ‘What’s the best way to handle this by splitting up the in-memory and disk structures,'” Jones says. “We’re able to put an adaptive layer in between. It allows us to say ‘I’m not going to write this down right now because the data hasn’t quiesced. I keep seeing a lot of changes in this one column of data, so let’s defer writing until we know it’s ready to be written and then write it, so we eliminate a lot of extra work in the database.'”

You can’t have Big Data until you have Good Data
Rather than rushing in and trying to learn big data analytics by searching through irrelevant data collected by separate IT systems, companies should prepare the ground, start organising their data – show it some respect. Capturing data from lots of different places whether that be from emails, forms on the website and even manually, can cause mistakes, so that when it comes to analysing data companies are not always analysing the correct information – it might be old data or based on false inputs. Companies must stop measuring the wrong data; stop deceiving themselves about the accuracy of their data, and go back to basics. There are many data capture solutions available on the market. For example, in the finance department, accounts processing today should include scanning paper based invoices as standard and adding them to your PDF invoices from email.

What Are the Legal Concerns in a HIPAA Risk Assessment?
“There are handfuls of different reasons to have security folks look at your systems and audit you and give you various reports, and that’s fine,” Rostolsky said. “Ultimately, you need to have something that’s specifically looking at the security requirements and speaks and uses HIPAA language in the assessment.” Essentially, healthcare organizations should not rely on a false sense of security. It’s important that when their data systems and safeguards are being reviewed, that facilities try and keep in mind what the OCR would be looking for so no areas are missed. Having current physical safeguards, administrative safeguards, and technical safeguards is not only required by the Security Rule, but they work together to protect health information, according to Spencer.

Quote for the day:

"The old mantra of ‘be everywhere’ will quickly be replaced with ‘be where it matters to our business" -- Mike Stelzner

No comments:

Post a Comment