October 09, 2015

Time to get mapping - how a blind government can develop sight

Indeed, it’s possible today to build an entire organisation using chains of these standardised, cheap, modular capabilities. And - as was the case with the arrival of other forms of shared infrastructure such as electricity, railways, canals, roads, or radio bandwidth - the ability to consume standard stuff using shared plumbing always changes the economic balance in favour of operating models that standardise and consume, instead of building their own special versions. This can be illustrated by considering that most people would find it time-consuming, expensive and uncomfortable to knit their own underwear. Government should view building its own stuff in the same way - why would it want to do that, without a good reason?

Big Data’s Relationship with Business Intelligence and Data Warehousing

A BIDW is a data analysis system that collects the transactional information and typically provides summaries on selected key fields of the transactions being watched. These summaries can be used to better understand the overall health and trends in the transactions being monitored. The BIDW data is a copy of production and is not in real time, so long-running queries can be initiated without concerns about impacting the live customer actions. Data may be loaded daily or weekly, depending on the data source. The data is kept at several levels to serve the different customers of the BIDW; summary data and dashboards are the most common outputs of a BIDW, but if needed, you can drill into the transactions.

Visio Series: Simple Network Diagrams

There are many free and paid for tools for scanning a network available, and most of them can output the results to a text or XML file. Devices communicate on a network because they are software assigned a unique identifier (Internet Protocol address) to each connection. The connected port is usually on a hardware component that is hardware assigned (Media Access Protocol address). A laptop, for example, could be connected via an Ethernet cable, Wi-Fi or Bluetooth to a network. Each method will have a different IP address and MAC address, but they are all on the same device. The data available in each scanning tool output varies tremendously, but they will all have an IP address and MAC address. Here are three free tools showing examples of their interfaces.

Microsoft and model clauses – where the cloud stands after Safe Harbor

The government argues that as Microsoft is a US company, it is covered by US legislation and regulation that reaches across borders into operations based in other countries. Microsoft says that the data is covered by European data privacy and protection laws – and specifically the Irish interpretation and enforcement of those. The ramifications of the US government’s interpretation being upheld would of course set a precedent that US law enforcement agencies can demand access to data stored on servers or within US-headquartered companies anywhere around the globe. Following the loss of Safe Harbor, and in light of the post-NSA scandal paranoia around the world, the impact of such a precedent could have major ramifications for US cloud computing firms trying to do business around the globe.

New FortiGate Connector for Cisco ACI Delivers App-Centric Security Automation

There are several other customer stories featuring ACI-Fortinet solution, but I’d run out of time and space to list them all. For your easy reference visit http://www.fortinet.com/videos/index.html for more customer videos. Let’s look in detail at the key capabilities of Fortinet-Cisco ACI solution and the benefits it brings to Data Center customers. Fortinet’s FortiGate firewall solution integrated into Cisco Application Policy Infrastructure Controller (APIC) delivers application-centric security automation in modern data centers. The solution provides automated and predefined policy-based security provisioning for next-generation firewall services. It enables location independent security services insertion anywhere in the network fabric through a single-pane-of-glass management.

Six CIO tips for business innovation with data

First, the business runs a number of information-led initiatives to boost customer engagement. “We are, essentially, a retailer and we want to have long-term, valuable relationships with our clients,” he says. The second way First Utility uses data is for optimisation. “Information helps us to understand what processes work, which processes are causing us problems and how we can use our experience around those processes to make the business better,” says Wilkins. The third way the firm uses information is strategically, says Wilkins. “Now we’ve built a platform, we want to know our technology is working and where the business can use systems and services to develop and grow,” he adds. “It’s all about making the most of data to find new opportunities and to market to new sets of customers.”

Why have most merchants missed the EMV deadline?

Mark Horwedel, CEO of the Merchant Advisory Group, agrees. He said the large majority of the burden – especially the financial burden – of this transition falls on the merchants. “This is the most complicated and most costly point-of-sale (POS) project that’s ever been foisted on merchants. They’re making us pay for 75% of the conversion,” he said, adding that in Europe, networks lowered their interchange fees or offered to share some of the cost of installing new equipment. Besides that, he said, U.S. merchants pay transaction fees that are seven to eight times those paid in Europe. “Credit cards are a bank product,” he said, “and on their face they are unsafe, but the industry has made a one-sided effort to shift the expenses (of making it more secure) to the merchants.”

5 Signs Security's Finally Being Taken Seriously

Developed by the Georgia Tech Information Security Center (GTISC) and sponsored by Forbes, the Financial Services Roundtable (FSR), and Palo Alto Networks, the Governance of Cybersecurity: 2015 Report examines cybersecurity risk governance practices and attitudes of executives at these top companies from four surveys over the course of seven years. Unlike a lot of security studies out there lately, this one shows a lot of promise. In spite of breach statistics today—or perhaps because of them—this study shows that enterprises are finally taking security seriously. "This report shows that, for the first time, directors and officers understand they have a fiduciary duty to protect the digital assets of their companies and are paying more than cursory attention to cyber risks; it is a welcome change that will help protect shareholders and customers,” says Jody Westby

5 Disruptive Technology Advancements Which Will Change Business as Usual

Historically, there have been a variety of disruptive technologies that have changed the business world. The personal computer essentially displaced the typewriter, forever changing the way we communicate and work. Email also changed communication, largely displacing traditional letter-writing and causing problems with the greeting card industry. Additionally, smartphones have displaced numerous technologies with all of their available apps, including calculators, GPS devices, and MP3 players. Technology is continuing to advance, and more innovative solutions are hitting the market. If current businesses don’t adapt, they could be at risk of becoming the next technology to be phased out. By identifying some of the disruptive technologies that are on the horizon, businesses can create a plan to adapt for the future.

Surface Book, Surface 4 Pro, XPS 12 or iPad Pro?

It's actually a great problem to have. And it's one that I suspect others will grapple with in the coming months as the 2-in-1 computing category becomes viable for a wider audience. My own decision may actually be more difficult though, for a few reasons that don't apply to others. First, my computing needs are actually relatively meager and I try to keep up with all of the major platforms. So I actually rotate through using a Chromebook Pixel, MacBook 12 and HP laptop running Windows 10. As a full time writer, my most used app is really a browser. I can write directly into a content management system through the web. Other daily activities include email, social networking, music and video consumption, light gameplay, general web browsing and online reading.

Quote for the day:

"If you have no critics you'll likely have no success." -- M.Forbes

No comments:

Post a Comment