April 28, 2015

How Data Center Virtualization Shrinks Physical Distance
There’s no doubt that optimization technologies are going to continue to evolve. One of the key technologies making the data center virtualization push is of course software-defined networking. We can do so much more with a physical switch now than we ever could before. We even have network virtualization and the ability to quickly create thousands of vNICs from physical devices. The ability to dynamically create LANs, vLANs, and other types of connectivity points has become easier with more advanced networking appliances. This goes far beyond just optimizing the links between data center environments.

Applying COBIT in a Government Organization
The comprehensive nature of COBIT 5, which combines several areas, including IT risk, information security and governance, is one of its major benefits. In addition, the enablers concept presents a unique view of how and where to pose some questions when adopting and enhancing the framework. To facilitate the transition, the audit function presented to the management staff a simplified model, listing the COBIT 5 processes and asking for the perceived degree of relevance and corporate knowledge of each process. These answers were compared with the maturity observed through audit and internal control actions, making it possible to devise a matrix of priorities for the processes to be analyzed in subsequent audits, which strengthened the support for management decisions through the adoption of the framework

Smartphone Secrets May Be Better Than a Password
The team used an algorithm to find suitably infrequent events to use as the basis for questions. On average, users succeeded in answering three questions about themselves correctly 95 percent of the time, and they were able to answer questions about other people less than 6 percent of the time. Now, Roy Choudhury says, the researchers are speaking with companies like Yahoo and Intel to figure out if what they’re doing could be useful for enterprise users and, if so, what needs to be done to make the system work well. One issue would be figuring out what kinds of activity data users would be comfortable sharing. Another is how such a system would work if you haven’t used your phone recently or can’t remember who texted you last night at 8:05.

IoT And The Looming Mobile Tidal Wave
"In fact, I consider terming it an 'Internet' as a bit of misnomer, because it largely consists of wireless-connected, non-phone mobile devices interacting in a client-server, or hub-and-spoke model. The Internet analogy does not, and should not, apply for most real-world applications coming online today." According to Brisbourne, "The level of interconnectivity among devices that's needed for these applications is actually pretty low, as they tend to use dedicated point-to-point communication, and point-to-point service delivery. For example, an irrigation system that responds to physical weather conditions and decides, singularly, when to switch on a sprinkler system. The IoT requires a much simpler mobile architecture as the environment is quite closed, generally capable of flowing a particular type of data in one direction. It is not an extension of the Web into the life of devices."

Clorox CIO discusses the real challenge of big data
When you start from the business use case, Singh adds, infrastructure questions become much easier to answer. "One of the best examples is looking at your volume shipment data and connecting it to certain initiatives you have in the business, like sales," he says. For instance, you may want to measure the effect of a promotion effort. But maybe there was a snowstorm in the region during the period you're evaluating. If the promotion didn't meet expectations, was that due to some quality of the promotion, or was the weather to blame? You need to bring in weather data for that, but you don't need to know what the global weather was in that period, even if you have access to the data.

CIA CIO Doug Wolfe on Commercial Cloud Services (C2S) Lessons Learned and Road Ahead
C2S enables more reliable and functional delivery of services to end-users. One of the biggest benefits to date has been in delivering reliable and functional services to end users and doing it faster because developers have common and known and easy to work with environments. In most cases end users will not know C2S is delivering this capability. They just see more and better functionality. One category of functionality, for example, is in geospatial applications. Working with both our own and NGA’s technical teams we are leveraging C2S to deliver enhanced geospatial analysis tools and end users do not need to be troubled to know where the compute power for those come from.

EU data protection regulation will drive privacy by design, says KuppingerCole
Kinast believes that privacy by design will have a positive impact on business continuity. Although the regulation tends to be seen in a negative light because businesses foresee they will have to put more effort into designing their software and services, he said that after a while, companies will realise that this approach will lead to better business continuity. “Privacy by design will help companies realise that they need more identity and access management as well as an appropriate security strategy,” said Kinast. Many organisations do not have proper access controls, he said, to ensure that employees can access only the software, systems and data that they need to do their jobs.

Report: Internet of Things to Spur Data Center Demand Explosion
“Equal, or even greater, investments in the IoT platform services residing in the data center will be instrumental in delivering the IoT promise of anytime, anywhere, anyhow connectivity and context,” Rick Villars, vice president of data center and cloud divisions at IDC, said in a statement. “Given the number of devices connected and the amount of data generated, businesses must focus on their IoT service platform requirements at the level of the data center itself, not just the individual servers or storage devices.” The analysts believe IoT will be the single largest driver of IT expansion in larger data centers. Because agility and scale are crucial to IoT applications, that expansion will take place primarily in service-provider data centers rather than on-premise corporate IT facilities.

Captive IT centre boosts competitiveness at Danske Bank in Denmark
“Many companies have started to favour captive centres again because they were cutting too deep into their own knowledge base. They actually outsourced too much of their business knowledge and core knowledge. Now they like to have the essential understanding and competencies internally,” said Henrik Ringgaard, managing consultant at PA Consulting. “They want to make sure they have the right knowledge base and that all business units really have the needed business understanding of their company.” While Ringgaard agreed that captive centres are gaining popularity among very large companies, he said offshoring in the whole is a growing trend and is maturing particularly in the Nordics.

Kong goes open source: Mashape dubs it the first microservices management layer
"What we're open-sourcing is the back end and the core technology of Mashape. It's a management layer, a centralised dispatcher for microservices and APIs - and it's built on top of nginx, so we're using nginx internally to proxy HTTP APIs," Mashape CEO and co-founder Augusto Marietti said. "On top of that we've built other layers - the infrastructure to manage, monitor, log, secure, authenticate, do transformations - on top of all the APIs." In microservices architectures, applications are built as a suite of small, semi-autonomous processes that communicate with each other through APIs and perform specific tasks. Designed to be easy to use and scalable, microservices are increasingly figuring in web, mobile and internet-of-things apps.

Quote for the day:

“Those who dare to fail miserably can achieve greatly.” -- Robert F. Kennedy

No comments:

Post a Comment