September 20, 2015

PowerShell is pretty close to a full-blown programming language in expressive power and the breadth and depth of its lexicon and syntax. Task-oriented code items in PowerShell are called "cmdlets" and there is an amazing variety of pre-fabricated cmdlets available from Microsoft (and other parties) for all kinds of administrative tasks, for everything from Windows configuration and installation, to file and print management, policy management, virtual machine management, and lots, lots, lots more. PowerShell has been around long enough that it's now in its 5th major version, as the output of this PowerShell variable ($PSVersionTable.PSVersion) illustrates:

Android Pay On Android Wear – Everything You Need To Know

Faster, easier purchases without having to take your wallet out of your pocket, connect it to the payment terminal, type in your pin number, make the payment then take it out, put it back in your wallet and back in your pocket. Just tap and pay, 1 second transaction. Another major benefit comes from pre-implemented “loyalty programs”, right into Android Pay and this feature alone is going to revolutionise shopping. Finally, free, instant, person-to-person payments. ... Android Pay can be used with all NFC enabled Android devices, on any mobile carrier, with every “tap and pay ready” location across the US, to start with. At this point, Android Pay supports credit and debit cards from Visa, MasterCard, American Express and Discover, with worldwide banks enrolling day by day.

How to Balance the Five Analytic Dimensions

Most businesses do not understand how to nuance when it comes to predictive accuracy; however, it will be essential for a Data Scientist to help the organization move beyond the simple notion of accuracy. Obviously we all want to hit the proverbial target. At least directionally, as a Data Scientist, you will want to steer the conversation to something more useful, like an algorithm that produces “high accuracy/low precision” or “high accuracy/high precision”. It usually proves beneficial to the business audience to distinguish what is meant by accuracy and precision as they appear to be close in meaning. Help them see that “accuracy” refers to the closeness of a predicted value to the actual value.

Six Patterns of Big Data and Analytics Adoption

In this white paper, IDC describes lessons learned from interviews and surveys of organizations engaged in Big Data initiatives and the patterns of adoption they have followed to expand existing or initiate new Big Data projects to create value for their organizations. The document highlights the importance of the Big Data architecture to drive improvements and innovation in customer interactions, operational efficiency, and compliance and risk management, among a wide range of business goals and desired outcomes. This white paper utilizes previously published IDC research frameworks such as the IDC Big Data and Analytics Opportunity Matrix and the IDC Big Data and Analytics MaturityScape. Finally, this white paper highlights Oracle Corp.'s Big Data architecture, technology, and services, as well as Oracle customer examples utilizing these offerings.

The evolution of ransomware: From PC Cyborg to a service for sale

In recent years there have been new waves of malware designed to encrypt the user’s information, enabling cybercriminals to demand a ransom payment that will allow the user to decrypt the files, and these are detected by ESET security solutions as filecoders. In 2013, we learned about the importance of CryptoLocker due to the number of infections that occurred in various countries. Its main characteristics include encryption through 2048-bit RSA public key algorithms, the fact that it targets only certain types of file extensions, and the use of C&C communications through the anonymous Tor network. Almost simultaneously, CryptoWall made its appearance and succeeded in outdoing its predecessor in terms of the number of infections, partly due to the attack vectors employed

This Technology Is About To Make Us All Way More Productive

Machine learning lets a computer continually adapt itself to your inputs so it can keep improving its results. Another excellent example of this is found in Apple’s new iPhone operating system. Engineered with what Apple bills as more “proactive” intelligence, iOS 9 pushes apps that you often use in certain situations to your lock screen for easy access. So if you tend to listen to podcasts on your commute to work, it might suggest you open Stitcher every morning around the time you leave home. ... “We’re at the early stages of applying machine learning to productivity,” says Tim Porter, founder of Gluru, a startup building a smart personal assistant for people’s daily workflow.

Awesome Feature of AOP in Spring

AOP modularity means method does call crosscutting object instead crosscutting class methods are expressed in such a way that it calls itself wherever it is required. I am going to explain how it works. I am not going to deal with setting up environment or with detailed use of AOP. My main objective of this tip is to tell Spring developers who have not used it before about AOP. AOP seems complicated but it is quite easy to use and provides a very powerful feature. This tip shows how with the use of some simple keywords we can achieve AOP. I am not deep diving into setting up environment. Once a Spring developer can understand the simplicity of AOP, then setting up an environment would not be a tough task.

Four Must-Have Rules for Scaling Enterprise Agile

Agile methodologies long ago proved their efficiency with small co-located teams, hitting home with the flexibility and velocity that come naturally to such teams. But when it comes to moving past team level to organizational scale, Agile practices are up against enterprise development realities like distributed teams, multi-component projects and traditional resource management. As a matter of fact, to adopt Agile practices, specifically Scrum, no organization is too big, complex or distributed. Scrum practices scale perfectly well to fit complex enterprises of more than 100 people, provided due attention is paid to organize the transition process. Here are four rules to follow when implementing Agile at the multi-team enterprise level.

A Kick-SaaS Enterprise Encryption Strategy

When data is inside your four walls, so to speak, you put trust in your own employees, the infrastructure and security solutions that you select, and the policies that you create to secure it. But as information moves to the cloud, data physically resides in infrastructures owned and managed by another entity – and that trust goes into someone else’s hands, infrastructure and security policy decisions. That is, unless you and your SaaS provider take a new approach. Recent mega-breaches (think: Anthem, Sony) have proven that hackers are after one thing: data. By using encryption, SaaS providers can render sensitive data unusable to hackers. However, encryption alone is not enough. Access controls and key management can also prove to be weak points in a SaaS provider’s defenses.

The IoT, Data and the Principle of Great Expectations

Call it the “Principle of Great Expectations”” the greater the hype or estimated market size, the higher the likelihood of a rapid proliferation of products that are “tragically pathetic.” Products are often developed simply because certain technologies have become available, without a lot of thought given to why users need them or how to make them delightful to use. Take, for example, one of today’s most successful product categories: the tablet. The first product in this category, the GRiDPad, was introduced in September 1989. It was followed by other unsuccessful attempts to crack the tablet market, including the Apple Newton, in 1993, and the enterprise-oriented Microsoft Tablet PC, in 2002. It wasn’t until 2010, when Apple introduced the iPad, that the tablet became a successful mainstream product, appealing to both consumers and business users.

Quote for the day:

"If everyone has to think outside the box, maybe it is the box that needs fixing." -- Malcolm Gladwell

No comments:

Post a Comment