To seize new opportunities, executives need to constantly review their articles of faith—or convictions of how the world works. The challenge, however is that too many of today’s leaders “like what they like” and “know what they know”. New and valuable information is often declared anathema or quickly discarded, especially when it contradicts an already stated direction or opinion. Moreover, our information systems aren’t helping very much. That vaunted “single source” of truth whether enterprise data warehouse in the early 2000s or enterprise data lake today, still looks far from reality, especially as today’s data lakes are mostly used as data dumping grounds from which various LOB data marts import spurious and questionable data sets.
Within Intel’s own IT organization, one thing that helps address the complexity of securing the infrastructure and stay on top of the latest in security tech is partnering with security vendors instead of simply paying them for their products and services, Conran said. Intel has such a partnership with CyberArk Software, a security company whose market debut last September was one of the year’s hottest tech IPOs. Instead of worrying about securing the perimeter, CyberArk specializes in dealing with threats that are already inside the enterprise network. The company is an expert in privileged account security, Udi Mokady, its president and CEO, said. Hackers gaining access to privileged accounts is one of the leading threats today.
Ambitious, determined, focused entrepreneurs don't choose a career in civil service at a local government office. Similarly anyone looking for two-hour lunch breaks and an easy workload shouldn't choose to work in a fast growing Fortune 500 company that sprouts more innovation every 12 months than many companies create in a lifetime. Amazonians who did their research well prior to accepting a job offer should not be surprised. When I read the New York Times article I winced at some of the personal examples, but quietly nodded along with some of the points of intense focus and relentlessness.
Forty-six percent of DevOps leaders report data issues as the biggest challenge to enabling their organizations to use DevOps in testing environments. A majority indicate that developers and quality assurance personnel have access to production data, yet this access is not audited (72%). More than two-thirds of all respondents (71%) report that masked data is refreshed from production only once a week or less. Still, a majority, 62%, say full production data is necessary for development and quality assurance. What's unclear is how much of this data may be sensitive or personally identifiable information. The more copies that get sent out to other parts of the organization -- or even outside -- the greater the risk of it being compromised.
Microsoft this week announced its third preview of Windows Server 2016 which features Windows Server Containers, built on Docker's open source container technology. This Docker operating system virtualization technology is designed to make it easier to deploy applications without conflict. Like Mesos, Docker's container solutions were originally designed for Linux servers. The new Mesosphere partnership announced today to bring Mesos to Windows Server is just another open source project overseen by the Apache Mesos organization. The code will be "freely available" and it will integrate with Mesosphere's DCOS, according to Microsoft's announcement. The latest version of the code is already available at the Apache Mesos GitHub repository.
Implementing a new solution does not always require high expense. There are many free and open-source security solutions that should be considered as well. Often, open-source solutions can operate on less expensive or older hardware while providing capability and security equivalent to many commercial options. Open source is not always going to provide the best solution, it might not even provide your organization with a viable option. However, it is important to at least consider open-source solutions when a solution survey is performed. Skipping open source for an odd reason, such as there is no dedicated technical support, because there is no-one to sue, or because of the belief that anything good has to be paid for, is just silly and short-sighted.
Software isn’t capable of creative decisions, but Allen says the relatively formulaic structure of extreme sports videos is within its grasp. Shred’s software sets out to make movies that begin with slow moving, establishing shots, for example showing the beach or ski slope at the start of a trip; transition to highlights of the adrenaline pumping action; and then wind down with more shots of scenery and people at the end. “That formula still works even though you’re not doing the most extreme backflips,” says Allen. The software selects footage to use by looking at time stamps and the pattern of acceleration in the frame. It can also shorten and remix any song provided by the user, using algorithms that can identify and edit the different musical parts of a track.
"The killing of the IT tile was a rebranding of who we are as an organization and how we're delivering," Colangelo said. Like other platform companies -- Colangelo pointed to Twitter and Netflix as examples -- technology is the backbone of this new business model, not just an enabler of business as usual. "The CTO role at Twitter and other organizations is more public facing and technology is core to product delivery," he said. "That's the recognition at HMH -- that technology is fueling and unlocking so much in the company." Colangelo retains his CIO responsibilities and continues to run HMH's enterprise services and back-office functionality; he's still shifting on-premises applications to the cloud and building an IT as a service model for the business. But his position no longer begins and ends in the back office.
One major reason for sharing information about its network now is that Google is opening up its infrastructure and offering Google Cloud platform services to others, Google Fellow Amin Vahdat told CIO Journal. “Having a great distributed computing infrastructure requires a world-class network to connect servers together,” he said. Google said it would like developers at other companies to understand they can run jobs such as Big Data analytics on its infrastructure with reliable speed and performance. The company has not shared this level of detail previously because it considers networking a key differentiator, he said. ... “We have some big challenges around availability, configuration and management of the infrastructure and overall predictability,” said Dr. Vahdat
The impact to enterprises depends on the kind of information that might be exposed through their managed app configurations. Appthority scanned millions of apps and found that the majority of those with vulnerable configuration data were MDM clients, corporate apps that grant access to work email and business documents and secure browsers used on internal networks. "We also found apps used in the healthcare industry, giving doctors access to patient data and records," whose compromise could result in possible violations of the Health Insurance Portability and Accountability Act (HIPAA), the researchers said.
Quote for the day: "Just because something is easy to measure doesn't mean it's important." -- Seth Godin