August 15, 2015

Refactoring for Software Design Smells

Design smells can have many roots, some are caused by limitations in the programming language (e.g. lack of generic programming support in early Java versions, or the missing lambdas prior to Java 8) others by inexperienced programmers (e.g. applying design patterns without understanding their drawbacks) or quick hacks that are made under time pressure. The book focuses on structural design smells in common object oriented languages like Java, C# and C++, so it's not about software architecture or implementation smells specific to a programming language.


The Promise and Peril of IoT

Healthcare providers are among the earliest to adopt the IoT. The wider deployment of electronic medical records (EMRs) and deployment of telemedicine technology that relies heavily on the type of remote data collection needed IoT to take it further and this convergence is expected to fuel the growth of IoT. With IoT, patients can submit their vitals from home without having to personally visit their physician and thus experiencing an enhanced and timely care, which could be life saving many times. This also helps in healthcare providers innovate further and come up with preventive care plans. Typical IoT devices that we see now are the fitness trackers, smart watches and other wearable devices like smart shoes.


Disrupting beliefs: A new approach to business-model innovation

Executives can begin by systematically examining each core element of their business model, which typically comprises customer relationships, key activities, strategic resources, and the economic model’s cost structures and revenue streams. Within each of these elements, various business-model innovations are possible. Having analyzed hundreds of core elements across a wide range of industries and geographies, we have found that a reframe seems to emerge for each one, regardless of industry or location. Moreover, these themes have one common denominator: the digitization of business, which upends customer interactions, business activities, the deployment of resources, and economic models.


Top 5 trends that are making life easier for data professionals

Data engineers design, build and manage the data infrastructure. They develop the architecture that helps analyze and process data in the way that's most appropriate for the organization, while making sure those systems are performing smoothly. As a result, they work closely with the developers. The application developer creates, tests and programs applications software for computers. At the end of the priority list comes the application designer. Applications fueled by data need to be usable by everyone; it’s said that the app should be so well designed a cat could use it. As business requirements move us into a truly insight-driven economy, data professionals must alter their work methods accordingly.


Interview: Government digital chief Mike Bracken – why I quit

“It is a matter of fact, not opinion, that despite spending over £6bn a year on technology, digital and associated operations, there isn't a government service [developed by a department] that could be considered as a platform, as in that it works for all parts of government. That is a matter of fact,” he says. “We can't just keep making or buying technology solutions in one department and then just chucking it over the departmental wall and saying, 'That will work for the rest of government', because it never does. Ever. New platforms for all of government have to be designed and architected thoughtfully, and probably not by the same people who are fixated, rightly, on in-year policy delivery and massive change to existing service provision.”


Want to be totally secure on the Internet? Good luck

So if I wanted to stay as safe as possible, I would never use Wi-Fi. Experts say most Wi-Fi isn't trustworthy, particularly if it's accessible to the public. When you walk around with your phone's Wi-Fi turned on, your device constantly "probes" for the nearest signal. You've turned your phone into a wandering baby bird, who walks around with a giant name tag asking every signal it finds, "Are you my mother?" Hackers are walking around trying to scoop up those signals. .... I also try to avoid email-based attacks. Called phishing emails, they're emails that seem legitimate but actually contain hacking code or a link to a fake website. So, don't click on links from unknown senders (and be aware that Internet ads might be malware in disguise). Click at your own peril.


Hybrid API Management Architectures Done Right

This pattern is as old as networking itself with a separation of the control plane and the data plane, but it is different to the way most vendors apart from ourselves have architected API management today. These other approaches have essentially fallen into two camps: 1) “route all API traffic through our cloud” or 2) “deploy numerous individual on-premises gateways with a cost per gateway”. Both of these cause single points of failure, deal poorly with scale and end up with oversized costs. When considering APIs for Microservices, IoT and many other modern challenges, it becomes even more obvious that separating how traffic is tracked and controlled from the point of delivery makes even more sense. Control and Data planes should be separate but talk to each other.


Incentivizing Performance in Cloud and Outsourcing Contracts: Key Points

To augment those performance warranties, a common approach is to use a “service level agreement” (SLA). The SLA is a familiar and essential feature in information technology-oriented agreements, such as outsourcing, cloud computing, software-as-a-service and the like. When properly structured and negotiated, SLAs can be an effective tool for more nuanced vendor management than a performance warranty alone could afford. This article will catalog some of the best practices for structuring a service level agreement, and discuss elements enterprise corporate counsel can put to use in the IT and service contracts that come across their desk.


Cloud Computing and the Digital Enterprise:Security Challenges and Opportunities

Digital transformation is leading organizations to adopt cloud, SDN, converged infrastructure and containers. This IT transformation has opened the door to new threats and cyber attacks. Security needs to be built into the fabric through a distributed system that enables visibility and control to ensure comprehensive protection of virtualized and cloud assets. Join this webinar to find out:
What are the top enterprise trends in data center transformation – regarding leveraging cloud, SDN, converged infrastructure and containers?; What are the current technology gaps in today’s security and visibility solutions?; Why are they needed?; and What is the business impact of these gaps?


Analytics Success Requires 3 Types of People

The human element of big data and analytics is probably the most critical factor in building a successful program, but it’s also the least understood. When people think of analytics, they often think of technology and data – and while the sophistication of technology is enabling the capability, the true value lies in the hands of the human beings interpreting and applying the analytics. In other words, analytics provides the greatest value when big data enables big judgment. However, that value will always be limited by how well team members are prepared to work in an analytics-driven business. So where does an organization start? Leaders must first recognize that analytics skill sets must be developed in all of their people, not just the data analysts.



Quote for the day:

"The safest way to get what you want is to deserve what you want." -- Charlie Munger

No comments:

Post a Comment