The secrets of successful cloud-first strategies
“Cloud-native is much more than just technology,” Rubina says. Companies need to
take a fundamental shift in mindset away from traditional waterfall development
toward more agile development principles such as the DevOps model, and
automation. “Cloud-native must be a strategic approach; it must be driven by top
management as it is a response to a wide range of business needs,” Rubina says.
“And these need to be well defined and rolled out by senior management. It is
about changes in the business model, about entering new markets, about the
ability to adapt quickly to create innovative products and services and
drastically reduce time to market.” ... “Determine if you’ll be using a
fixed-cost structure flexible for the cloud,” Hon says. “Are you leveraging
showback or chargeback to the business? And keep in mind seasonality. You want
to have an idea of how often you scale up and shrink down and what that looks
like. Building out cost models is key for how you can build a budget.” With a
traditional data center, companies buy and install hardware with workload peaks
in mind, Hon says.
Moving a Legacy Data Warehouse to the Cloud? SAP’s Answer
As currently designed, SAP BW Bridge is primarily intended as a data acquisition
and staging layer — which has been the mainstay for BW. Other capabilities, such
as planning, are outside the scope of BW Bridge; instead, SAP directs BW
customers to SAP Analytics Cloud (SAC) Planning, which for now is a separate
offering; later this year, SAP will add support SAC planning on top of DWC based
data models. The scenarios for SAP BW Bridge are, not surprisingly, centered
around bringing SAP legacy data sources into the modern cloud data warehousing
world. It could include those that want to replicate their existing BW
environment and operational reports but in a managed cloud environment. And of
course, it could involve migrating more modern BW/4HANA on-premises as well.
And, as noted above, with cross-space sharing, BW data could be shared with
other greenfield analytics, and mixed with data from other sources, developed in
DWC. SAP BW Bridge is an acknowledgment that, for classic or legacy systems to
make it into the cloud, cloud SaaS providers have to provide more flexibility to
accommodate the types of customizations that permeate legacy systems.
Database technology evolves to combine machine learning and data storage
The new model offers not just the potential for tapping the power of AI
algorithms, but also a more flexible search engine that isn’t locked into
searching for exact matches. While traditional databases require the names to be
spelled correctly or the exact confirmation code to locate a record, Weaviate
can find entries that are the most similar. What does it mean to be similar?
That’s still a wide open question for many users. Much of the art goes into
defining how to calculate just how close or far apart two pieces of data might
be. Finding the closest records in the database begins with finding a metric or
a way to specify just what it means to be nearby in some multidimensional space
defined by an AI. While SeMI Technologies is the main fundraiser, much of the
branding is focused on Weaviate, the open source database. Companies can
download the code or purchase Weaviate as a managed service. Many Weaviate users
rely on pre-built models for text in English and other well-known languages.
There’s one model built out of the entire collection of Wikipedia articles that
SeMI built, so people could experiment.
Using the Problem Reframing Method to Build Innovative Solutions
First, reframing is not analysis. It is not about finding the root cause
analysis and asking “Why is this problem existing?” Reframing starts before
that, when you ask “What problem are we trying to solve?” and “Is this the right
problem to solve?” Reframing is about looking at the big picture and thinking of
the problem from different angles. Second, reframing is not about finding the
real problem but finding a better problem to solve. The advantages of reframing
a problem are generating more options, opening the problem space (diverge) and
in the end, building better solutions by solving a better problem. Let’s look
into a simple example that Thomas Wedell-Wedellsborg explained in his book
“What’s your problem?” Imagine you are the owner of an office building, and your
tenants are complaining about the elevator. It’s too slow, and they have to wait
a lot. Several tenants are threatening to break their leases if you don’t fix
the problem. When asked, most people directly jump into thinking of solutions:
install a new lift, upgrade the motor, or perhaps improve the algorithm that
runs the lift.
Code Verify: An open source browser extension for verifying code authenticity on the web
Code Verify expands on the concept of subresource integrity, a security
feature that lets web browsers verify that the resources they fetch haven’t
been manipulated. Subresource integrity applies only to single files, but Code
Verify checks the resources on the entire webpage. To do this at scale, and to
enhance trust in the process, Code Verify partners with Cloudflare to act as a
trusted third party. We’ve given Cloudflare a cryptographic hash source of
truth for WhatsApp Web’s JavaScript code. When someone uses Code Verify, the
extension automatically compares the code that runs on WhatsApp Web against
the version of the code verified by WhatsApp and published on Cloudflare. If
there are any inconsistencies, Code Verify will notify the user. While
comparing hashes to detect files that have been tampered with is not new, Code
Verify does so automatically, with the help of Cloudflare’s third-party
verification, and at this scale for the first time. WhatsApp’s security
protections, the Code Verify extension, and Cloudflare all work together to
provide real-time code verification.
Chainlink for Enterprises: The Gateway to All Blockchains
Chainlink is secure, open-source blockchain middleware (referred to as an
“oracle”) that provides smart contracts with any type of data or computation
that they cannot inherently obtain on their native blockchain due to
technical, financial, governance, or legal constraints. Unlike blockchains,
which maintain internal consistency around transaction validation, Chainlink
aims to generate and deliver oracle reports to blockchains that accurately
reflect the state of external events and computation. Chainlink oracles are
able to generate oracle reports because the Chainlink oracle node software can
read data from and write data to blockchains and APIs and perform off-chain
computation. Chainlink generates trust-minimization for oracle reports through
mechanisms similar to those used by blockchains, such as decentralized
validation, cryptographic signatures, and financial/reputational incentives
outlined in service level agreements (SLAs).
A decade of IoT: 10 years forward and 10 years back
As with many markets, the winners are often those that have specialisms, such
as CSL’s critical connectivity or Peoplesafe’s personal safety solutions, or
those that have scale, such as Wireless Logic. Businesses can achieve success
in different ways but ultimately they need to provide a solution that the
market needs, along with executing their vision efficiently on the back of
strong market tailwinds. However, with the half-life of business models
shortening, especially in fast-growth technology, great management teams must
continue to evolve to ensure they maintain their competitive advantage. This
evolution could mean adding new services, more security, or providing an
improved service wrapper for the customer. Moreover, another key
differentiator might be the route to market. For example, at ECI’s former
investment, Arkessa, it understood there was a significant opportunity to
introduce IoT connectivity at the point of manufacture rather than in the
aftermarket. There has already been some consolidation of the market as
companies aim to dominate certain verticals within the IoT market or
scale-up.
Low-Code Tools Optimize Engineering Time for Internal Applications
A large part of application development in today’s world involves a lot of
application management. Low-code tools are getting widespread adoption
because, in a world where front-end applications are becoming more complex,
they make things like hosting, deployment, authentication, and workflow
functions much simpler. As compared to custom code, where you have to spin up
a server and set up CI/CD pipelines to deploy to your cluster, low-code takes
care of this with the click of a button, saving developers time because they
don’t have to spend time configuring and maintaining a custom deployment.
Similarly, authentication and authorization is a complex process to get right
because there are different access controls to be thought of, invite flows
need to be addressed, and onboarding and offboarding for team members need to
be taken care of. Low-code products do the heavy lifting and have these
features built in, allowing developers to define authentication and
authorization in a much simpler manner.
IT leadership: 5 ways you could be wasting your team's talent
Today’s IT specialists no longer need a four-year degree in computer science
or engineering to be able to do their job. Between the many boot camps and
online training resources, it’s entirely possible for new developers to train
themselves and gain the skills necessary to provide value to an IT
organization. Limiting your talent search to those with outdated credentials
could cause you to miss out on golden opportunities to build out your team.
Instead, focus on skills using unbiased assessments that can determine
proficiency without knowing a candidate’s educational background or past
experience. Maximizing the potential of your IT employees provides a dual
benefit: not only does it help your enterprise to avoid the crunch of a talent
shortage, but it also ensures that your employees will be more satisfied with
their jobs and career advancement. Tech employees highly value logic and
efficiency, and by demonstrating that your organization makes the most out of
its teams and technologies, you’ll gain another key selling point as you
compete for new talent in a highly contested job market.
Cloud security is too important to leave to cloud providers
The need to take control of security and not turn ultimate responsibility over
to cloud providers is taking hold among many enterprises, an industry survey
suggests. The Cloud Security Alliance, which released its survey of 241
industry experts, identified an "Egregious 11" cloud security issues. The
survey's authors point out that many of this year's most pressing issues put
the onus of security on end user companies, versus relying on service
providers. "We noticed a drop in ranking of traditional cloud security issues
under the responsibility of cloud service providers. Concerns such as denial
of service, shared technology vulnerabilities, and CSP data loss and system
vulnerabilities -- which all featured in the previous 'Treacherous 12' -- were
now rated so low they have been excluded in this report. These omissions
suggest that traditional security issues under the responsibility of the CSP
seem to be less of a concern. Instead, we're seeing more of a need to address
security issues that are situated higher up the technology stack that are the
result of senior management decisions."
Quote for the day:
"A lot of people have gone farther
than they thought they could because someone else thought they could." --
Zig Zigler
No comments:
Post a Comment