Showing posts with label Intel. Show all posts
Showing posts with label Intel. Show all posts

October 23, 2012

HP offers new low-cost SaaS service desk
HP officials say its SaaS product includes new approaches to service desk management, including social media collaboration tools that are integrated into the problem solving processes. It is promising to shorten, overall, time to resolution of a problem.


Google for Entrepreneurs: Bringing ideas together
The Google for Entrepreneurs site features a strong focus on helping businesses get off the ground in parts of the world which are still developing or are women/minority led. For instance, Women 2.0 focuses on female entrepreneurs, Eleven is oriented for Eastern Europe and the Arab Developer Network Initiative is geared towards Palestinians


Intel strives to develop tiny chips to run wearable computers
"Potentially, it could have graphics built in," he said. "Right now, it's early in the game so we're looking at what makes sense to put in there. You'd want to have some memory built in and maybe some graphics, because you'd want to have one chip ... maybe two chips, but size-wise you want to keep it small."


Online clues suggest a Skype surprise for Windows 8 and Surface
In all of this week's news about Microsoft's Surface with Windows RT, one app has gone practically unmentioned. Will a "modern UI" version of Skype play a starring role at next week's Windows 8 launch event?


Big data to create 1.9M IT jobs in U.S. by 2015, says Gartner
Big data, which refers to data collected and analyzed from every imaginable source, is becoming an engine of job creation as businesses discover ways to turn data into revenue, says Gartner. By 2015, it is expected to create 4.4 million IT jobs globally, of which 1.9 million will be in the U.S.


Facebook could become an enterprise ID system
Gartner analyst Earl Perkins noted that identities on the Web may be managed by Facebook. In retail, Facebook may be the ID gatekeeper. Perkins said that there's a socialization of identities and by the end of 2015, 30 percent of all new retail customer IDs will be based on social media.


Near Field Communication slips, slowly, into the mainstream
“Because Apple did not use NFC in the iPhone 5, phone makers such as Samsung, Nokia, Motorola and others are all doing a harder push for NFC,” he says. Indeed, a raft of new NFC phones are hitting the U.S. market, in phones that run on the Android and Microsoft operating systems.


How Enterprise Architecture helps SAP turn strategy into action
In 2009, SAP established the Enterprise Architecture (EA) function as part of the internal IT organization, bringing senior architects under a single leadership. At that time, IT investments were very tactical, and the IT organization was seen more as an order taker rather than a strategic value enabler.


How Strategic Planning relates to Enterprise Architecture
Strategic Planning means different things to different people. The one constant is its reference to Business Planning which usually occurs annually in most companies. One of the activities of this exercise is the consideration of the portfolio of projects for the following financial year, also referred to as Project Portfolio Management (PPM).



How to Rationalize Your Application Portfolio
A majority of enterprises have hundreds of applications deployed on their network, but most tend to actively use far fewer than that. This application bloat is a significant and growing problem that costs many organizations millions of dollars a year. Here's how to combat the application sprawl.


Brother’s All-in-One Printer Is a Small Idea
It claims to be the world’s smallest-depth all-in-one printer, copier and fax machine. The machine is 7.3 inches tall, 11.4 inches deep and 18.9 inches wide, weighing in at 20.5 pounds.



Quote for the day:

"As a leader, you're probably not doing a good job unless your employees can do a good impression of you when you're not around." -- Lencioni

October 06, 2012

Cybercriminals plot massive banking Trojan attack
In an advisory Thursday, RSA said it has information suggesting the gang plans to unleash a little-known Trojan program to infiltrate computers belonging to U.S. banking customers and to use the hijacked machines to initiate fraudulent wire transfers from their accounts.


Swedish websites down after Anonymous threats
A handful of Swedish websites remained down Friday evening there after hacking group Anonymous threatened earlier this week to attack the nation for a police raid on a hosting service that was once home to The Pirate Bay.


NetSuite Announces Two-Tier ERP For Oracle
NetSuite Two-Tier ERP for Oracle is designed to enable multinational enterprises to drive global expansion by deploying the NetSuite to run subsidiaries and divisions while preserving headquarters' investments in Oracle.


A New Degree of Analytic Learning
In an interview with Information Management, Wixom discussed the evolving program for the Congress, the growing responsibility shown by vendors and where U.S. universities stand in closing the skills gap for business data analysts and more niche positions like data scientist.


Intel unveils personal cloud platform for SMBs, consumers
Intel is diving into the personal cloud storage space with a new Atom-based platform targeted towards both consumers and small businesses.


Education, Training Key to Federal Big Data Adoption
Education and training are key to bringing the benefits of big data to the federal government, according to a group of industry leaders who recently met in Washington, D.C.


Apple, Microsoft may be forced to reveal internal documents
The parliamentary committee investigating IT pricing disparity in Australia may look to force Apple, Microsoft, Adobe, and the Australian Information Industry Association (AIIA) to reveal documents used in creating their submissions to the inquiry, as the three tech giants have continued to resist appearing before the committee.


IT Leadership and Career Development
IT spent has to be treated as an Investment which should fuel the growth or contribute to the bottom-line in the form of savings. This can be possible only when IT leaders are also financially literate.


4 outcomes of character-based leadership
There is a difference between attempting a triathlon and becoming a triathlete. There is a difference between teaching a lesson and being a teacher. And there is a huge difference between leading some group or activity and being a leader.


Leadership Truths That Every Leader Needs To Know
Great leaders all share common characteristics which make them successful. They operate based on truths which underpin all of their behaviors and actions. Here are 5 truths that every great leader knows



Quote for the day:

"Innovation has to be ingrained in an organization's DNA, not in a plaque on the wall that displays their corporate mission."--John Miziolek, CEO of Reset Branding

September 24, 2012

IT departments warned: Evolve or die
“It’s almost an adapt or die moment for a lot of the IT profession, if you don’t start being able to articulate and contextualise technology’s value add to service delivery then why are you there?” he told the Efficient ICT 2012 conference in London.


Dresner Study Reveals Current Realities in Cloud-Based Business Intelligence
Over the past five years, business intelligence has seen less adoption in the public cloud than other applications. But our recent 2012 Wisdom of Crowds Cloud Business Intelligence Market Study® of 859 respondents found current strong investment in cloud-based BI and growing interest in tapping into the cloud’s benefits.


FEATURE-'Intel Inside' ignites mobile branding war
Intel is leading the charge by extending its hugely successful "Intel Inside" marketing campaign beyond personal computers. Launched in 1991, "Intel Inside" stickers turned commodity electronic components into premium products, and eventually became ubiquitous on laptops.


How the Cloud is Changing Backup Vendor Strategy
So as this happens, the astute executive is going to want to have a backup of all their data, no matter where it is, to one or more locations, even if the various providers are doing their own backup.


Converged infrastructure will require some compromise
All-in-one IT environments offer benefits in terms of simplified management, but companies must map their own requirements and decide whether this model makes more sense than best-of-breed systems.


Portrait of a Micro-manager
Most people I’ve asked say they’ve worked for a micro-manager. Their frustration shows when they talk about the person who drained joy from their career and under-utilized their skills.


10 tips for speeding up Outlook
Of course, some of these suggestions might seem to have a bit more “‘duh” factor than others. But you never know what level of skills you’re dealing with, so we’ll cover all the bases. In the end, you should have a much faster Outlook experience.


Management Skills: Three Ways to Build Empathy
Empathy as a management skill could be seen as a little bit ‘pink and fluffy’. After all, isn’t empathy what therapists, psychotherapists and counsellors use? Isn’t it a step too far so say it’s one of the key management skills?


Data privacy issues present new data governance challenges
"As information security professionals, we should want to assume these [privacy] responsibilities; that's good for our profession," Northrop said. "And by good for our profession, what I really mean is, you can make more money, and money's good."


Why a Star Hire Isn't Your Ticket to Success
Magic Person Syndrome (let’s call it MPS) leads a company to believe that the absence of the right executive is at the root of some core business problem. And if they can just hire a new executive, the problem magically will be solved. Have you heard (or said) anything like this?



Quote for the day:

"Continuous effort not strength or intelligence is the key to unlocking our potential." - Winston Churchill

September 19, 2012

Intel sets Windows 8 tablet event with HP, Samsung, others
Intel is going to kick off the season of the Windows 8 tablet by hosting an event next week attended by virtually all of the major PC players. The September 27 event will highlight products using Intel's "Clover Trail" Z2760 (PDF) power-efficient system-on-a-chip (SoC) processor.


1010data builds a big data bartering platform
1010data has launched a new service called the Analytical Dataspace, which is essentially a marketplace for buying and selling data and accessing analytics applications. 1010data has been providing a cloud-based analytics service for years, but this is a chance to add value by adding data.


IBM Beats Oracle, Microsoft With Big Data Leap
IBM introduced its InfoSphere BigInsights software in May. The software package includes a distribution of Apache Hadoop, the Pig programming language for MapReduce programming, connectors to IBM's DB2 database, and IBM BigSheets, a browser-based, spreadsheet-metaphor interface for exploring data within Hadoop.


Australian govt guides agencies on cloud adoption
... The guide states that agencies should also prepare exit strategies in case they then decide to move away from the selected cloud vendor. Agencies must consider what data needs to be archived, how it will be transferred or destroyed if required, and what liabilities exist.


The dog and the frisbee and data quality management
Andrew Haldane, the Bank of England Director of Financial Stability has questioned whether the Emporer (in the form of ever increasing, ever more complex regulations such as BASEL III and Dodd Frank) is naked.


AMD Tunes SeaMicro Servers for Big Data
Last week AMD’s Data Center Server Solutions Group unveiled the SM15000 server, which extends SeaMicro’s networking fabric beyond the chassis to connect directly to massive disk arrays, enabling a single 10 rack unit system to support more than 5 petabytes of storage.


Oracle launches solution for Indian analytics market
The company has introduced Oracle Exalytics In-Memory Machine, the industry's first high-speed engineered system featuring in-memory business intelligence (BI) software and hardware to deliver extreme performance for analytical and performance management applications.


Story from a company that built "the best software testing tool"
The best software testing tool is always the human brain. It can operate in "non thinking" mode too and unfortunately seems to be the popular mode among most testers since they are paid for it.


Undercover cops secretly use smartphones, face recognition to spy on crowds
An undercover cop can often be spotted in a crowd due to wearing an earpiece or talking into a microphone hidden under his or her sleeve. But by using smartphones and tablets loaded with specialized apps, these same undercover officers mingled with demonstrators, took photos and transmitted “real-time video of protesters as they moved about the streets.”


UniFlash for Android Flashes, Manages, and Installs ROMs From Your Desktop
UniFlash is a Windows utility that lets you download, flash, back up, restore, and install new ROMs on your Android device, all from the comfort of your desktop.




Quote for the day:

In motivating people, you've got to engage their minds and their hearts. ---Rupert Murdoch

July 08, 2012


So what's the difference between a Custom Control and User Control?
Someone asked why should one use a Custom Control instead of a User Control? Hence, let's extend the series and discuss about that. I apologize for the delay of this post. I should have explained this at the start of the series, but actually my goal was to explain to you how to create and use a Custom Control in Silverlight. ...


Australia builds 100 petabyte storage cloud
These are the first of eight to ten nodes intended to underpin the national storage network, which by 2014 will offer Australian researchers access to around 100 petabytes of data collections.

Intel/McAfee: What's the Future of Security?
A lot of the advanced persistent threats [APTs] test the ability to detect them. When you sit above the operating system, the visibility is limited. But in Intel's chipset, you can detect malware and APTs in a different way. The first product we'll be coming out with is rootkit detection, at the end of the calendar year.

Nine Things Cloud ISVs Should Do Next
Different ISVs are in different business situations with respect to fully exploiting the cloud benefits. Based on observations so far, here are nine things ISVs can look at doing next.

Overhauling a UI Without Upsetting Current Users
The risks associated with not updating a UI outweigh those associated with an update. But a successful redesign absolutely requires the right product management and UX techniques to evolve the product carefully and avoid a user revolt.


The 5 traits of radically successful people
Success can come in different fields, but the principles behind it are one. From Sugar Ray Leonard chasing the school bus to Peter Guber’s corkboard, these stories show the unique personality traits that tipped the scales in favor of the world’s most successful people.


Twitter is a Corporate API
A lot has been written in the last week about Twitter's API and developer concerns that it would soon be closed to apps that are platform-specific clients. The discussion was started by a post by a Twitter manager, Michael Sippey, who was also one of the earliest bloggers.


Docomo, Omron Healthcare launch connected health venture in Japan
The venture also promises an unspecified “wide range of services to meet the needs of all lifestyles and the various stages of life by cooperating with various content providers, including companies in health-related fields,” according to a press release.



Quote for the day:
Delegation requires the willingness to pay for short term failures in order to gain long term competency. ~Dave Ramsey