Showing posts with label BYOx. Show all posts
Showing posts with label BYOx. Show all posts

February 01, 2016

Data Governance: A Roadblock for Analytic Ambitions

The shift to shared saving and risk-based reimbursement has revealed the cracks in data governance and information management infrastructures at many organizations that are having significant problems getting the data pieces in place to keep their heads above water. Michael Hunt, M.D., chief population health officer at St. Vincent’s Health Partners, a 275-physician medical group in Bridgeport, Conn., cites research that shows 70 percent of accountable care organizations don’t make money. “The data set for the Medicare Shared Savings Program requires reporting for 27 different quality measures, and many of those ACOs apparently couldn’t submit the appropriate quality data,” Hunt says. 


VMware NSX: 3 different use cases

Mike Feld, the interim CTO at Baystate Health, said that there's more demanded of IT in healthcare, but less money going into it because of shrinking budgets. Traditionally, all the data center pieces are independent and their infrastructure is older. "We needed to make a complete change," Feld said. "We couldn't just tweak a particular vendor, or replace vendor A with vendor B. We needed to completely redo the way we do IT, and hyperconvergence [was] essential." And, the key component to that hyperconverge strategy was NSX. Feld said they looked at products from Microsoft, Cisco, and OpenStack, but they didn't have the deep level integration at the abstraction level, which is why they chose NSX.


DDoS is most common cyber attack on financial institutions

Many organisations do not include DDoS mitigation as part of their security strategy because they do not see DDoS attacks as a real security threat, but failure to have systems and procedures in place to mitigate such attacks could expose any organisation to significant financial losses, particularly those that depend on interacting with customers online. Imperva Incapsula sais DDoS is a serious matter affecting e-commerce sites and corporate and online assets. ... “DDoS attacks can last several days, so it is vital to have a plan in place to deal with such a threat,” said Verizon’s Dine. This includes having a well-tested response plan that details what to do if initial DDoS defences fail, he said.


Big data success needs a data-driven culture

A decade from now, thanks to innovations in fields like robotics, cryptocurrency and genomics, companies will experience huge changes to how they operate. Editorial Director Sue Troy sat down with Alec Ross, Hillary Clinton’s former innovation adviser, to delve into what these developments will mean for technology leaders. In part one of the Q&A, read about Ross’ predictions on blockchain technology and how this technology underlying Bitcoin will affect impact legal processes in the next five years. In part two of the interview, Ross talks about how cognitive robots will affect the labor market and how U.S. companies compete globally. IoT may be about to change the way we think of food safety.


Why Laws for Robots are Doomed to Failure

Robotics and AI haven't come anywhere close to being able to build robots that would be able to comprehend or abide by these or any other sophisticated rules. A robot vacuum cleaner doesn't need this level of moral complexity. "People think about Asimov's laws, but they were set up to point out how a simple ethical system doesn't work. If you read the short stories, every single one is about a failure, and they are totally impractical," said Dr. Joanna Bryson of the University of Bath. Bryson emphasises that robots and AI need to be considered as the latest set tools - extremely sophisticated tools, but no more than that. She argues that AI should be seen as a tool that extends human intelligence in the same way that writing did by allowing humans to take memory out of their heads and put it into a book.


Bring Your Own Smartwatch: Mobility Management Vendors Prepare

IT can also use settings that limit notifications and messages displayed on the Apple Watch. An iPhone managed under the AirWatch platform can also be restricted as to whether or not its user can even pair it with an Apple Watch, according to Zakai. Good Technology has a different approach, designed specifically for Apple Watch. The company has released "Good Work" for the device, which enables IT to configure the level of detail shown in watch notifications. For instance, IT can determine whether a user will be able to see an email's sender and subject line only, or whether they'll be allowed to view a full message on the Apple Watch. Good has also announced support for secure Android Wear app development on the Good Dynamics Secure Mobility Platform.


Microservices in the Real World

The key point is that an SCS should be responsible for its own UI as well as its own data store. The system’s boundaries exhibit a vertical split along what in Domain Driven Design (DDD) is called “bounded contexts”. The integration of each SCS into the overall application happens in most cases within the browser via links and transclusion. These systems don’t share a common UI code nor common business logic. Each system may be maintained by a separate team using their very own preferred technologies. When done right, end users will fluently move between systems, crossing application borders simply by clicking links or hitting buttons – ideally without even noticing that they left one system and entered another.


Microsoft Tests Underwater Data Center

"Project Natick reflects Microsoft’s ongoing quest for cloud datacenter solutions that offer rapid provisioning, lower costs, high responsiveness, and are more environmentally sustainable," the company said. Using undersea data centers helps because they can serve the about 50 percent of people who live within 200 kilometers from the ocean. Microsoft said in an FAQ that deployment in deepwater offers "ready access to cooling, renewable power sources, and a controlled environment." Moreover, a data center can be deployed from start to finish in 90 days. ... The company is also considering a "deployment cycle" of 5 years each, which is the anticipated lifespan of the computers in it. "After each 5-year deployment cycle, the datacenter would be retrieved, reloaded with new computers, and redeployed," according to the Microsoft FAQ.


Microsoft and mobile: The headache that won't go away

If that rate of decline keeps up, Microsoft's phone business will pretty soon be nothing more than a rounding error when it comes to revenue. Plenty of people are now writing their obituaries for Lumia. And it's certainly hard to see where Microsoft can go from here. One option is to keep Lumia (perhaps rebranded as Surface) going for the same reasons that Google has got Nexus - as a way of showing consumers and manufacturers the potential of the software. The trouble for Microsoft is that consumers aren't interested and neither are manufacturers any more. That doesn't mean the Microsoft can't build hardware: Surface continues to grow and Hood said that following the launch of the Surface Book and Surface Pro 4 the tablet-PC device is likely to see continued momentum and growth as Surface Book becomes available in more countries.


Why 10 million developers are lining up for the Internet of Things

Sure, there are plenty of developers working on wearables and smart home applications. But the developers getting paid in IoT are working on the dull-but-necessary industrial applications, as last year's Developer Economics report unearthed. Any company that hopes to attract the hobbyists that dominate consumer-facing IoT applications needs to make it as easy as possible to get productive, which is why Google and Apple have been voted most likely to succeed. Regardless, as VisionMobile's latest report highlights: "Developer interest shouldn't be taken for granted, and hype alone cannot sustain developer involvement. For example, the amount of IoT developers targeting wearables dropped from 28% to 21% in 6 months' time."



Quote for the day:


"If you get bored with social media it's because you are trying to get more value than you create." -- @FastCompany


January 05, 2015

Are PC Hard Drives Destined to Die at the Hand of the Cloud? Maybe, Analysts Say
Enterprises don’t like content stored on local devices because of the risk that it could leak outside company walls, and the costs associated with redundant storage placed right next to the worker. Connectivity problems, such as limited Wi-Fi at hotels and other locations, is fading away. And every time a company has bet on local services, such as Apple’s determination to sell MP3s rather than stream music, that company has lost. “The most disruptive technology in the market right now is Chromebooks,” Enderle said. The bottom line? There’s no easy answer to the question of whether local hard drives or SSDs are doomed.


10 things you should do to manage BYOA
BYOD and BYOA are both part of the greater movement of the consumerization of IT. People are used to consumer tools "just working," and that is part of the appeal of the BYOA movement. Many of the apps people bring into the workplace are designed to operate simply, much like their consumer counterparts. This can create problems for IT leaders, especially, as it changes expectations for other corporate software as well. You can manage the expectations by engaging employees and helping them understand the differences in the applications they are bringing in and the software your company relies on to run its core business processes.


D-Link shows off radical 802.11ac routers and Wi-Fi adapters at CES
The flagship DIR-895L/R is based on Broadcom’s BCM47094 chipset and can operate two independent networks on the 5GHz frequency band (with theoretical TCP throughput to 802.11ac clients of 2165Mbps on each), and a third network on the 2.4GHz band with theoretical TCP throughput of 1000Mbps. It will be outfitted with eight high-power antennas, and it supports MU-MIMO (multiple users-multiple input/multiple output) technology so that it can stream high-definition video and audio to multiple clients. The DIR-890L, equipped with six antennas, can also operate two independent 5GHz networks,


Hands-on with Makulu Linux Xfce 7.0: The most beautiful Linux distro I have ever seen
As has been the case in previous Makulu releases, this version includes the WPS Office Suite (aka Kingsoft Office). I don't want to get into a long discussion of the pros and cons of this choice, I will simply say that if you aren't happy with WPS, or you absolutely must have LibreOffice for whatever reason, all you have to do is go to the Software Center (or Synaptic, they are both installed) and install LibreOffice. I just did that, it took less than five minutes to download and install, LibreOffice was automatically added to the Office group in the Whisker menus, and of course is listed in synapse searches.


An example of preparatory refactoring
There are various ways in which refactoring can fit into our programming workflow. One useful notion is that of Preparatory Refactoring. This is where I'm adding a new feature, and I see that the existing code is not structured in such a way that makes adding the feature easy. So first I refactor the code into the structure that makes it easy to add the feature, or as Kent Beck pithily put it "make the change easy, then make the easy change". In a recent Ruby Rogues podcast, Jessica Kerr gave a lovely metaphor for preparatory refactoring.


Held for ransom by the digital ‘mob’
Consumer ransomware is, “a business model that’s going to scale, especially as we get control over more traditional cybercrime business models,” Dai Zovi said. “They’re (cyber criminals) basically entrepreneurs, and they’re going to shift when a new market gives them better returns than an existing market, or their existing market goes away.” Another reason is that, as has been clear for some time, just because a device is “smart,” does not mean it is secure. And embedded devices in the Internet of Things (IoT) are notoriously insecure.


Why doctors are excited about mobile blood pressure monitoring
There are a few reasons. For one, there is quite simply more data being gathered when a cuff worn around one’s arm checks blood pressure at regular intervals throughout a day. But this kind of mobile monitoring also helps catch two types of people who are easily misdiagnosed – those with “white coat” syndrome, who get nervous in doctor’s offices and experience artificially high blood pressure at precisely the time of monitoring (a condition that may affect as many as 30 percent of people thought to be hypertensive), and those who react oppositely, with lower readings either because they take their meds before going to the doctor’s or because they experience more stress in their home environment.


CIOs Need to Snap Out of Complacency
CIOs are spending more time overseeing the nitty-gritty of digital transformation work, such as implementing new systems and re­designing business processes, according to our survey. In some cases, that means a diminished role in big-picture strategic activities such as identifying new commercial opportunities. Specifically, 27 percent of our CIO respondents can be classified as business strategists this year, down from 34 percent last year. And 36 percent of CIOs admit they are fighting turf battles against others in the C-suite--a kind of tumult that can arise in times of big change.


White House plans to leave IT in better shape than it found it
Obama complained about the state of government IT almost as soon as he took office, when he was deprived of the use of his BlackBerry. In 2011, he called government IT operations across all agencies "horrible," and that was two years before the Healthcare.gov debacle. One issue faced by government IT is perception. When compared to the private sector, government IT is seen as a step or two behind in technology adoption. It's a fair assessment, Johnson said, "and I think we should be OK with that." The White House operates in a fishbowl, and any IT issues it faces may have a broader impact. Johnson prefers to have the private sector be the early adopter, with users figuring out new technologies, learning from their mistakes and then partnering with government.


Sony hack could be game changer
Despite passing a flurry of small-bore bills in late 2014, Congress has not moved major cybersecurity legislation in years. And the issues raised by the Sony incident — cyber relations with China, United Nations guidelines for how countries handle cyber issues — are not necessarily areas where Congress wields a heavy hand. “I’m not sure there’s such a direct output for Congress on the international side of things,” said Kristen Eichensehr, an international security professor at the University of California, Los Angeles, School of Law and former State Department attorney.



Quote for the day:

"Character is like a tree and reputation like a shadow. The shadow is what we think of it; the tree is the real thing." -- Abraham Lincoln