Showing posts with label CYOD. Show all posts
Showing posts with label CYOD. Show all posts

January 08, 2014

Machine learning, embedded analytics and big data march ahead in 2014
Will we look back on 2014 as the year that marked a new era in business? According to faculty at the International Institute for Analytics (IIA), advances in big data, along with machine learning and embedded analytics, will drive new products, reinvent old business processes, and quite possibly mean a lot more work for lawyers. The Portland, Ore.-based advisory and research analytics organization released nine official predictions for the new year...


New French surveillance law: From fear to controversy
Even though France's actions haven't been talked about anywhere near as much as the NSA scandal has, the French government says it has begun working on new ways to legitimize these widespread powers of surveillance. A new law just passed by the French Senate defines the conditions under which intelligence agencies may survey citizen’s data - including telephone conversations, email correspondence, web browsing activity, and personal location data.


Preparing for PCI-DSS Version 3.0
Among the new requirements of version 3.0 are steps to mitigate payment card risks posed by third parties, such as cloud providers and payment processors. The new version also stresses that businesses and organizations that accept and/or process cards are responsible for ensuring the third parties they rely on for outsourced solutions and services use appropriate security measures, says Leach, the council's chief technology officer. "Many of the breaches have involved the integrity of the third parties," Leach says. "Organizations need to help those types of entities understand their PCI responsibilities."


Seagate Crams 500 GB of Storage into Prototype Tablet
Of course there's plenty of reasons we don't already have hard drives in tablets. The compromise that immediately leaps to mind when you add a spinning hard drive is, of course, battery life. Seagate's solution in this prototype was to hybridize the storage with the addition of 8GB of flash memory. The vast majority of the time, the tablet is just running on flash, and the magnetic drive is powered off. If you want to play a movie, though, the drive will spin up, swap the movie onto the flash memory through a fast 6 gb/s SATA interface, and then spin down again.


Lenovo expects to benefit from CYOD trend
"For the average small business, it's not a productivity loss or big concern to them if they have to reimage one of their 10 PCs every now and then, but for a company which has a 100,000 of them, they absolutely want commonality of the image and we have the internal labs to do that," explained Beck. He added Lenovo's portfolio expansion in recent years into tablets and convertibles has made its proposition even more compelling. At CES, the company further ramped up its product range to include Android desktops.


Information technology budgets are stable or growing
Data suggests 2014 will provide another year of stability and even growth for IT departments, with 32% of respondents indicating they're fully staffed and another 39% indicating they're looking to make new hires. The relative stability and uptick of budgets and headcounts, however, doesn't mean IT leaders have left their penny-pinching ways behind. All the CIOs and IT leaders interviewed for this article, including those whose budgets and staffs increased in 2013, stressed that they continue to look for ways to cut costs without sacrificing service or innovation.


The Keys to Leadership: Your Brain and My Grandmother
If you’re stressed or facing a critical decision, get out of your office! ... Even concentrating on a photograph of nature can help. There’s wisdom in taking time for a regular stroll at lunch. In Your Brain and Business, Pillay cites studies showing that physical movement can have a profound effect on how you think: Getting into a box-like structure and then stepping out of it actually improves your ability to get creative and think “outside the box,” so don’t expect your next big idea to come during the hours you spend in a conference room.


Personalization Is Back: How to Drive Influence by Crunching Numbers
What marketers usually call a response model doesn't simply predict who will buy, per se. Rather, more specifically, it predicts, "Will the customer buy if contacted?" It is predicting the result of one treatment (contact) without any consideration for or prediction about any alternative treatment, such as not contacting or contacting with a different marketing creative. ... Therefore, a response model suffers from a sometimes-crippling, common limitation: The predicted outcome itself doesn't matter so much as whether the marketing treatment should be credited for influencing that outcome.


CIOs Must Balance Cloud Security and Customer Service
"Customer expectations are higher now," said Shawn Kingsberry, CIO of the Recovery, Accountability and Transparency Board. "Everyone's so mobile, and at home they do so many things and have access to so much information, the expectations in the office are even higher when you look at the services that have to be delivered." ... "It's that balance that you have to get," Kingsberry said. "You want to deliver the service, but there are tradeoffs."


Standards in Predictive Analytics: PMML
PMML has particular value for organizations as they move away from a batch scoring mindset to a more real-time scoring approach. When scoring was done in batch it was generally done using the same technology as was used to build the model. With real-time scoring it has become essential to be able to move models from their development environment to a more real-time, interactive scoring environment and PMML has emerged as the primary way to do this.



Quote for the day:

"I don't believe in taking foolish chances. But nothing can be accomplished without taking any chances at all." -- Charles Lindbergh

December 03, 2013

Get started with the Data Format Description Language
In this age of big data, the bulk of the data begging to be analyzed is not XML, but rather it is other structured and semi-structured formats, both text and binary. Until now, no open standard has been developed that is capable of describing a wide variety of such data formats. Learn about the Open Grid Forum (OGF) proposed recommendation for a powerful language that describes many different data formats, the Data Format Description Language (DFDL).


(How To Do) XML Schema Validation
Judging by the popularity of this question on StackOverflow, it seems that a lot of people struggle to check the validity of an XML file against an XML Schema. It’s a shame that what should be a trivial task has wasted hours of developer’s lives. In this article the author try to offer a few alternatives for various platforms and hopefully make things a bit simpler. There are actually a few different options at your disposal. We’ll start by looking at what is probably the fastest and easiest option to get started with validation:


What Inexperienced Leaders Get Wrong
But as any experienced manager should know, IT is a classic illustration of the difference between bold strokes and long marches, one of my favorite managerial frameworks. Bold strokes are decisions that can be made at the top, implemented pretty quickly by command — acquisitions, divestitures, real estate purchases, layoffs. Long marches take time and the involvement of many people who must produce new elements and coordinate their actions before the change can be successful.


If CIOs became Tech company CEOs
There have been rare instances where a CIO transitioned and started selling products or services. These individuals were CIOs representing their past industries or a specific solution set; I remember one instance where the only thing such a CIO wanted to talk about is how her company had implemented a specific technology and she had lead the team towards creating the success story. She was not very successful in her pitch but told her story wherever she went.


Data Mining Reveals the Secret to Getting Good Answers
And they say their work reveals an interesting insight: if you want good answers, ask a decent question. That may sound like a truism, but these guys point out that there has been no evidence to support this insight, until now. “To the best of our knowledge, we are the first to quantitatively validate the correlation between the question quality and its associated answer quality,” say Yuan and co.


Can complex-systems be ‘architected’?
To some people – perhaps especially in the IT-related trades – ‘complexity’ is just a more extreme version of ‘complicated’: a quantitative difference, “complicated that we haven’t as yet quite pinned down the rules and algorithms for”. To me, though, I’d agree with those who argue that there’s a qualitative difference between ‘complicated’ and ‘complex’: for example, the kind of complexities that we see in wicked-problems, where even the act of looking at a context can itself change the context.


Meet WISP, the wireless future of Internet service
A WISP is distinct from other wireless services we currently use. Most cell-phone service providers offer wireless Internet service—with 4G LTE being the fastest current technology—but that doesn’t make them WISPs. Cell-phone service providers don’t expect you to use their service 24/7, and most place very low caps on the amount of data you can transfer over their networks each month. Being able to access the Internet while you’re out and about is a distinct advantage, but LTE data rates are relatively slow, and coverage can be spotty—especially away from large metropolitan areas.


CYOD: An Alternative To BYOD?
‘Choose Your Own Device’ (CYOD) offers many of the benefits of BYOD without some of the drawbacks. ... Even with the reduced set of options provided by a CYOD approach, the challenges are formidable and help may be required to deal with the increased complexity. “We offer an ‘anytime, anywhere, any platform’ service that provides access to enterprise resources from any device,” said Garewal.


Report shows weaknesses in DHS cybersecurity
Sen. Tom Coburn (R-Okla.), the top Republican on the Senate Homeland Security and Governmental Affairs Committee, blasted the department for the findings Monday. “This report shows major gaps in DHS’s own cybersecurity, including some of the most basic protections that would be obvious to a 13-year-old with a laptop,” Coburn said in a statement. “We spend billions of taxpayer dollars on federal information technology every year. It is inexcusable to put the safety and security of our nation and its citizens at risk in this manner.”


Amid security concerns, cloud insurance makes headway in the enterprise
"Cyber insurance policies were designed for premises-based systems," said Doug Weeden, director of program administration at Cyber Risk Partners LLC's CloudInsure. Consequently, some cyber liability policies exclude losses incurred by a third party, such as a cloud provider, but others include clauses that protect the client regardless of where the data is stored. So, businesses need to closely examine their policies to see if cloud coverage is included.



Quote for the day:

"Works of art make rules; rules do not make works of art." -- Claude Debussy