Showing posts with label Java. Show all posts
Showing posts with label Java. Show all posts

Daily Tech Digest - July 18, 2022

Cyber Safety Review Board warns that Log4j event is an “endemic vulnerability”

According to the report, "The pace, pressure, and publicity compounded the defensive challenges." As a result, researchers found additional vulnerabilities in Log4j, contributing to confusion and "patching fatigue," and "responders found it difficult to find authoritative sources of information on how to address the issues. This frenetic period culminated in one of the most intensive cybersecurity community responses in history." ... The few organizations that responded effectively to the event "understood their use of Log4j and had technical resources and mature processes to manage assets, assess risk, and mobilize their organization and key partners to action. Most modern security frameworks call out these capabilities as best practices." ... A fog still hovers over the event because, "No authoritative source exists to understand exploitation trends across geographies, industries or ecosystems. Many organizations do not even collect information on specific Log4j exploitation, and reporting is still largely voluntary. Most importantly, however, the Log4j event is not over."


DTN’s CTO on combining IT systems after a merger

Enterprises often make strategic errors when combining IT systems following an acquisition, Ewe says. “The number one mistake I see is, ‘Since we acquired you, clearly we win,’” he says. “Just because A bought B, you don’t want to assume that A has better technology than B.” Another common mistake is to go solely by the numbers, picking one company’s IT system over the other’s because it has the highest revenue or profitability, he says: “The issue there is that you’re oversimplifying the process.” Given the investment in time and money necessary to merge two companies’ IT systems, “it’s worthwhile spending an extra few weeks up-front to make a more thorough analysis of which solution or which pieces of which solutions should come together,” Ewe says. Jumping straight in and making a wrong decision can cost more in the long term. Ewe consulted with product and sales management, and with customers, to identify the needs DTN’s single engine would have to satisfy, as well as the use cases it would serve, before evaluating the existing assets against those needs. 


Ransomware and backup: Overcoming the challenges

Recovering data after a ransomware attack is more complex and more risky than recovery from a system outage or natural disaster. The greatest risk is that backups contain undetected ransomware, which then replicate into the production system or recovered systems. This risk is reduced by using air-gapped copies and immutable copies and snapshots, and keeping more copies than would be required for conventional backup alone. This requires a more cautious approach to data recovery, and one that can be at odds with the commercial pressures for short RTOs and recent RPOs. Matters are made more difficult because there are no viable, fool-proof systems that can scan data for ransomware before it is backed up, says Barnaby Mote, managing director at backup specialist Databarracks. “Before ransomware was a thing, replicating data from production systems to DR as quickly as possible was a sound recovery strategy for conventional disasters,” he says. “Now, with ransomware, it has the opposite of the desired effect, rendering recovery systems unusable.”


Continuous Intelligence: Definition, Benefits, and Examples

While humans cannot inspect every possible characteristic and combination in the flood of incoming data, machines can. Complementing analytics that provide precise answers to questions users know to ask, a machine can continuously monitor data in the background to detect unknown correlations and trends that deviate from what would have been expected by the system based on previous observations. This way, companies can identify hidden, but potentially relevant signals in the data. Gartner predicts that by 2022, more than half of major new business systems will incorporate continuous intelligence capabilities. By integrating artificial intelligence (AI)-based continuous intelligence into their day-to-day operations, companies can:Boost efficiency by spending less time sifting through data from a variety of disparate sources; Focus on what really matters for their business; Speed time to action. By automatically inspecting critical business health indicators such as revenue, Web page views, active users, or transaction volume in real time, businesses can accelerate their time to insight and action and better respond to situations before business is impacted.


7 reasons Java is still great

As a longtime Java programmer, it was surprising—astonishing, actually—to watch the language successfully incorporate lambdas and closures. Adding functional constructs to an object-oriented programming language was a highly controversial and impressive feat. So was absorbing concepts introduced by technologies like Hibernate and Spring (JSR 317 and JSR 330, respectively) into the official platform. That such a widely used technology can still integrate new ideas is heartening. Java's responsiveness helps to ensure the language incorporates useful improvements. it also means that developers know they are working within a living system, one that is being nurtured and cultivated for success in a changing world. Project Loom—an ambitious effort to re-architect Java’s concurrency model—is one example of a project that underscores Java's commitment to evolving. Several other proposals currently working through the JCP demonstrate a similar willingness to go after significant goals to improve Java technology. The people working on Java are only half of the story. The people who work with it are the other half, and they are reflective of the diversity of Java's many uses.


Search Here: Ransomware Groups Refine High-Pressure Tactics

Ransomware groups continue to refine the tactics they use to better pressure victims into paying. And they're succeeding. "In recent months, we have seen an increase in the number of ransomware attacks and ransom amounts being paid," the heads of Britain's lead cybersecurity agency and privacy watchdog warned last week in an open letter to the legal industry. The impetus for the alert from Britain's National Cyber Security Center - the public-facing arm of intelligence agency GCHQ - and the Information Commissioner's Office: They're urging solicitors to never advise clients to pay a ransom. Doing so will not lessen any penalties the ICO might levy, helps perpetuate the ransomware business model and could violate U.S. sanctions, they say. But the increase in ransoms being paid speaks to the success of ransomware groups' continuing innovation. Psychological pressure remains a specialty. After infecting systems, many types of ransomware reboot infected PCs to a lock screen that lists the ransom demand, a cryptocurrency wallet address for routing funds and a countdown timer. 


Functional programming is finally going mainstream

For some, using an object-oriented language like Java, JavaScript, or C# for functional programming can feel like swimming upstream. “A language can steer you towards certain solutions or styles of solutions,” says Gabriella Gonzalez, an engineering manager at Arista Networks. “In Haskell, the path of least resistance is functional programming. You can do functional programming in Java, but it’s not the path of least resistance.” A bigger issue for those mixing paradigms is that you can’t expect the same guarantees you might receive from pure functions if your code includes other programming styles. “If you’re writing code that can have side effects, it’s not functional anymore,” Williams says. “You might be able to rely on parts of that code base. I’ve made various functions that are very modular, so that nothing touches them.” Working with strictly functional programming languages makes it harder to accidentally introduce side effects into your code. “The key thing about writing functional programming in something like C# is that you have to be careful because you can take shortcuts and then you’ve got the exact sort of mess you would have if you weren’t using functional programming at all,” Louth says.


Safeguarding the open source model amidst big tech involvement

Two of the main techniques to safeguard open source and its community are through smart licensing tactics and constant innovation. The first technique is to simply switch the project licence from an open source licence to a more restrictive licence. There are two specific licences that can be used to protect against clouds and corporations: AGPL-3 and SSPL — specifically developed by the likes of MongoDB, Elastic and Grafana to protect themselves from AWS. For instance, while many projects shifted away from GPL-style licences towards more permissive forms of licensing, under GPL, contributors are required to make their code available to the open source community; the so-called “copyleft”. This traditional licensing style helps to create a more open, transparent ecosystem. Another way in which open source can safeguard its future is through smart innovations. Constantly innovating in order to satisfy users should be the way forward for the evolution of open source projects and solutions. This would enable companies to maintain their competitive edge and keep up with technological trends. 


5 ways fear can derail your digital transformation strategy

When we confront new work technologies such as a hybrid workplace, virtual meeting rooms, or new software, we tend to resist or avoid them simply because they’re new and we’re not used to them. This creates division. A company looking to offer a hybrid workplace might encounter resistance from employees, managers, and even customers who refuse to recognize this arrangement. What appears to be a simple reluctance to change is actually a deep-seated fear of changing a comfortable status quo. What you can do about this: Offer facts to neutralize fear. People often use their own frame of reference if they are not given something tangible to hold on to. If the change involves new technology, demonstrate the technology. Let them see how it works. If the change is organizational, such as a hybrid workspace, present the facts about how it will work, what will change, and what will stay the same. Listen to and respond to their questions and objections. Humans are dominated by emotion, and logic is always playing catch-up. 


The Four P's of Pragmatically Scaling Your Engineering Organization

Your people aren’t just the heart and soul of the company, they’re the building blocks for its future. When you're growing rapidly it can be tempting to add developers to your team as quickly as possible, but it's important to first consider your company goals while remaining practical about how you’re scaling. This is the key foundation for building the right organization. ... Scaling your processes comes down to practical prioritization. It is crucial to clearly establish processes that balance both short- and long-term wins for the company, beginning with the systems that need to be fixed immediately. Start by instituting a planning process looking at things from both an annual perspective and quarterly, or even monthly– and try not to get bogged down deliberating over a planning methodology in the first stage. ... Scaling the platform is often the biggest challenge organizations face in the hyper-growth phase. But it’s important to remember that building toward a north star doesn’t mean that you’re building the north star. Now is the time to focus on intentional, iterative improvement of the platform rather than implementing sweeping changes to your product.



Quote for the day:

"It is one thing to rouse the passion of a people, and quite another to lead them." -- Ron Suskind

March 09, 2015

The Modern JavaScript Developer’s Toolbox
JavaScript has evolved significantly since its birth amidst the early days of the Internet. Today it is a prominent and important feature of interactive web applications. The developer has also evolved significantly since 1995. Today’s modern JavaScript developer employs rich and robust frameworks, tools, and IDEs to work efficiently and productively. Building your first modern JavaScript application is easier than you may think! Just choose an IDE (I recommend Atom for beginners), and then install npm and grunt. If you get stuck along the way, Stack Overflow is an excellent resource. With just a little time spent learning the basics, you’ll be well on your way to releasing your first modern JavaScript app.


CIA plans major reorganization and a focus on digital espionage
The CIA will also create a directorate focused exclusively on exploiting advances in computer technology and communications. The Directorate of Digital Innovation will rank alongside the agency’s operations and analysis branches, and it will be responsible for missions ranging from ­cyber-espionage to the security of the CIA’s internal e-mail. ... A central aim, he said, is to eliminate “seams” in coverage that lead to confusion over which part of the agency is responsible for tracking a specific issue or threat. After the reorganization, Brennan said, the CIA should be in position to “cover the entire universe, regionally and functionally, and so something that’s going on in the world falls into one of those buckets.”


Technology across borders: CIOs' tips for international success
"In the US, there's a culture that it's normal to work as hard as you possibly can, including not necessarily taking holidays. In Europe, people really value their downtime and they want to take advantage of the opportunity to shut off from work for a period of time. "It's a strange situation and there's probably a healthy mix somewhere between the two positions. While many Europeans can't understand why US citizens don't take time to re-charge, many Americans can't comprehend how Europeans could possibly go on holiday from work for two weeks at a time." It is a balance that King has struggled to adjust to, since moving to the UK from North America two years ago. "I've had to actively learn how to take a two-week vacation," he says. "But I'm really keen to embrace the European approach and change my perspective."


Wireless Technology Defeats Paralysis
The task is very complex because the electrical patterns that neurons draw by doing something as simple as taking a drink vary each day. “We do not know exactly what causes the change. Something like being hungry may change the pattern. What we do is let the machine learn to interpret the different patterns as the same order,” explains Donoghue. The scientist explains that the process resembles how a TV screen activates its pixels: “If you looked closely at a TV, you would see the flash of one of the small squares that form the image. If you look at it closely, it is meaningless, but seeing the whole picture, it makes sense.


Emerging cyberthreats exploit battle between compliance and security
"Compliance regulations move slowly and can't keep up with the evolution of threats," said Desjardins. "Also, compliance initiatives tend to be focused on confidentiality and integrity, and overlook availability." Dave McCulley, systems engineer for Austin, Texas-based security analytics firm Click Security Inc., said that in addition to a focus on regulatory compliance, a big contributing factor to security lagging behind threats is the mentality of some organizations to implement security that is merely "good enough." "You're all in a race with each other, because attackers will go after the easier targets," said McCulley. "Good enough security is never good enough, because you always need to be better than someone else."


Google is developing a virtual reality version of Android, report says
The OS would be freely distributed, the report said, mirroring the strategy that made Android the most popular OS for smartphones. The report didn't provide any launch plans, and Google didn't immediately respond to a request for comment. With rivals investing heavily in VR, it would make sense for Google to build its own OS. Facebook has referred to VR as the next big platform after mobile, and it bought headset maker Oculus VR last year for US$2 billion. They see VR as the future because it provides an immersive experience for gaming, entertainment, communications, and perhaps other applications not thought of yet. It's still a way from mass adoption, though, and some people report getting nausea from VR systems, or just don't want a big display strapped to their head


Cloud Security Auditing: Challenges and Emerging Approaches
Although both conventional IT security auditing and cloud security auditing share many concerns, a cloud security audit must address unique problems typically not handled in traditional IT security audits. According to our interviews, the most immediate and obvious challenge lies in auditors acquiring sufficient knowledge of cloud computing. Effective cloud security auditors must be familiar with cloud computing terminology and have a working knowledge of a cloud system’s constitution and delivery method. This knowledge ensures auditors pay attention to security factors that might be more important in cloud security auditing processes, including transparency; encryption; colocation; and scale, scope, and complexity


IT Disaster or Data Breach?: 7 Must-Do Steps
Current and pending legislation worldwide demands that companies notify regulators of service outages and data breaches in a timely manner. As the old saying goes, “better safe than sorry.” For example, The Monetary Authority of Singapore (MAS) guidelines require that financial institutions notify them “as soon as possible” and that procedures for these notifications be in place ahead of time. Like MAS, most current legislation contains ambiguous language around timing, and lacks direct penalties or fines. Still, with so many regulations being considered, it’s advisable to stay ahead of the curve in building rapid communication capabilities. Many regulating authorities require notification not only for institutions located in their areas, but also for all entities that control accounts or do business with their citizens and businesses.


Supporting serious software investment
Software is just as worthy of investment, yet has been viewed differently to hardware, with many companies also finding it difficult to fund through a financial package as often many finance providers will also view software as separate and different. There is no reason why this should be so, and there are opportunities to spread the cost of software investment through external financing, yet too often companies will try to cut corners in order to keep software costs down. These approaches are mistaken when alternatives allow software investment decisions to be made for business rather than spurious financial reasons. So what are the potentially harmful software investment avoidance practices that might be dealt with through proper financing?


STOP! Installing Java on a Mac? Don't just click OK.
For years, Oracle has tormented Windows users by bundling adware...using deceptive methods to convince customers to install [it]. ... Oracle has begun bundling the Ask adware...for the Mac...as well, changing homepages. … As with its Windows counterpart, the Java installer selects the option to install the Ask app by default. [It] returns low-quality results...heavily loaded with ads, most of which are not clearly distinguished from organic [results].  … [This] comes on the heels of Lenovo's disastrous scandal with the Superfish adware. ... IAC, the parent corporation that owns Ask.com...pays a commission to Oracle.



Quote for the day:

"I believe it is important for people to create a healthy mental environment in which to accomplish daily tasks." -- Darren L. Johnson

November 20, 2012

Methanol can power mobile networks when electricity is out, says Nokia Siemens
The need for base stations to be able to run without electricity was once again highlighted after super storm Sandy hit the U.S. east coast. Methanol-powered fuel cells could provide an alternative to today's batteries and diesel-powered backup generators, Nokia Siemens Networks and Ballard said Monday.


Managing Your Windows 8 Enterprise Apps with Windows Intune
In this Microsoft Channel 9 content, Jerry Nixon welcomes Sr. Program Manager Mark Williams from the Windows Intune team as they discuss how developers can deploy and manage their Windows 8 Enterprise Apps with Windows Intune.


Wearable computers: The next generation
Computing devices you can wear are still in their infancy, but a host of clever new designs are in the works. Get a peek at the brave new world of wearable computers, from sensor-laden surgical gloves to workout clothes that monitor your moves.


The 3 Pieces of Startup Advice That Actually Matter
All sorts of people start offering their words of wisdom — experienced executives, college students, and even people who’ve never actually done anything with that good business idea they won’t tell you about, because you’ll steal it. While people generally do mean well, their advice often misses the mark.


The Middle East Could Be a Cradle of Innovation
As Dartmouth Professors Vijay Govindarajan and Chris Trimble argue in their new book on innovation in emerging markets, Reverse Innovation: "It is easy to understand why a poor man would want a rich man's product. But why would a rich man ever want a poor man's product? The answer is that under certain circumstances, it offers new, unexpected or long-overlooked value."


A Long Look at JVM Languages
Why have so many languages, including Ruby, Groovy, and Python, been ported to Java? Mainly because it's much easier to target one platform (Java code, in this case) and rely on the multiplatform JVM to host it than it is to write interpreters for each operating system.


NAB touts voice as superior biometrics over fingerprints
The National Australia Bank (NAB) has focused its biometrics attention on voice recognition instead of fingerprinting for customer identification, because it's much more secure and reliable. NAB has been dabbling with voice recognition since 2009, running a trial in which customers using telephone banking could opt to use their voice as an identifier in lieu of a PIN. Today, there are around 140,000 customers using voice recognition for phone banking.


COBOL – Demystified
Analysts, programmers and reporters alike say that COBOL is old fashioned and no longer appropriate – often stating that the language lacks structure, compatibility and brevity. This view, however, is not supported by the reality of modern COBOL, but is based on a negative outlook of the mainframe era that existed over twenty years ago.


Redesign your business for customers
Having a clear vision and roadmap for aligning and redesigning your customer touch points and overall experience to meet both the business and customers’ needs is critical to achieving customer centred transformation. It should paint a clear picture of where you are now, where you want to get to and how you’ll know you’re on track in redesigning and delivering your customer experience.


Five ways to reward consulting referrals
Do you compensate people who bring you business by way of a referral? I feel like it would be a nice thing to do. But seeing how almost all of my business comes by way of referral, I am not always sure what is appropriate. Sometimes an email introduction turns into a $20,000 project. What is an appropriate way to compensate the person who made the introduction?



Quote for the day:

"Leaders become great, not because of their power, but because of their ability to empower others." -- John Maxwell

October 31, 2012

A Detailed Look at The New File API in Java 7
This project provides a mechanism for managing file systems on remote computers. It supports operations such as navigation over the file system, and inspecting, renaming, copying or deleting files. Using the new I/O file allows us to extend the capabilities of the project to manipulate ZIP archives content and also watch for modifications.


3 health IT must-haves for natural disaster preparedness
As many healthcare centers employ a higher than average concentration of IT equipment, there are certain ways they can leverage them to cope with disasters- and things they must do to safeguard their technology as well. Mike Detjen of Arcadia Solutions speaks about some of the must-haves for HIT in disaster scenarios – ways it can be useful and things to be concerned about


ARM introduces 64-bit processors for phones, tablets and servers
The new ARM processors deliver 64-bit support, which enables a new range of hardware capabilities including more memory. The new processors also boast virtualization support, error correction, security capabilities and better floating point performance, Forsyth said.


Microsoft touts 4M Windows 8 upgrades
"In just the last three days, we have sold 4 million Windows 8 upgrades," Ballmer said during his early minutes on stage at Microsoft's BUILD Conference Tuesday. "The level of embrace from enthusiasts is very, very high.", Microsoft CEO Steve Ballmer said and later called the uptake "stunning."


Moving to the Cloud: Adoption, Impact, and What's Next
Clouds -- private, public, and hybrids -- have captured IT's attention. Saving data center costs is always attractive, but the technology isn't without risks. What do you need to know before you move to the cloud, and how with the technology impact your own data center? Where is the cloud headed?


MDM: It’s Not about One Version of the Truth
IT missed the point that the business wants data to support a system of engagement. The value of MDM is to be able to model and render a domain to fit a system of engagement. Until you understand and align to that, your MDM effort will not support the business and you won’t get the funding.


Google changes way emails are composed in Gmail
The new mechanism - currently available as a preview to some Gmail users - makes it easier to check previously sent or received messages while composing a new email. It also adds various other features, with more promised soon.


Indian IT companies shut offices temporarily due to Hurricane Sandy; Remain Unaffected
 Several top companies such as Infosys, Cognizant, TCS, Mahindra Satyam, and HCL are closely monitoring the whole situation and working with local authorities to ensure the safety of their employees. Almost all the Indian IT companies, having operations in the Hurricane prone regions have a strong business contingency plan.


Good High-Level Enterprise Architecture Video
This animation shows the role of Enterprise Architecture starting from the perspective of a business user. That user has understandable wishes and requests, and the IT decisions made for him all make sense. But the result of all business users doing this independently is a 'hair ball architecture'. The role of Enterprise Architecture to prevent this from happening is illustrated.

DDoS Attacks Against Banks Raise Question: Is This Cyberwar?
Within the past month, crushing blasts of 65Gbps traffic, mainly from thousands of compromised Web servers, has targeted Bank of America, Wells Fargo, US Bank, JP Morgan Chase, Sun Trust, PNC Financial Services, Regions Financial and Capital One. The attacks have effectively cut bank customers off from online services for extended periods.



Quote for the day:

"If you decide to go for it, do it with spirit: Sometimes success is due less to ability than to zeal. " -- Charles Buxton

September 14, 2012

Brian Marick on 4 Challenges and 5 Guiding Values of Agile Software Development
Brian Marick talks about several challenges for teams transitioning to Agile and 5 guiding values that successful Agile teams share. The major challenges covered are: courage, working software, naivete, and slicewise design. Successful teams share these guiding values: reactive, ease, solidarity, decency, and joy.       


Testing Mobile Apps
In this InfoQ.com presentation Julian Harty covers various challenges and practices for testing applications for mobile devices.      


This Indian Founded Startup is Built to Scare Dell, NetApp and EMC
The company’s mission is to pack a lot more of data for enterprises in tinier spaces without losing any performance. The company gained its popularity as it saves tons of money over traditional systems offered by Dell, NetApp and EMC.


iPhone 5: Why no NFC?
Apple's critics included a U.K.-based communications marketing company called Proxama. "NFC is going to progress at a pace without Apple," said Miles Quitmann, managing director of Proxama, in a statement. "This could be Apple's loss."


Helium-filled WD drives promise huge boost in capacity
Western Digital is preparing to launch a line of hard drives filled with helium gas that is said to drastically reduce internal friction and thus lower power consumption by 23% while increasing capacity by 40%.


Java-Based Apache Wicket Gets an Update
Version 6.0 of the lightweight, Java-based framework comes with a revamped AJAX JavaScript library, out-of-the box JQuery integration, and OSGi-compatible packaging, among other improvements.


SaaS: 5 Trouble Spots
As the market evolves quickly, and ahead of vendor Salesforce.com’s Dreamforce conference, we point out a few of the obstacles rising to the top with software as a service implementations. Here are five lingering challenges with enterprise software as a service implementations.


Are You Making Management Too Complex?
In this world of increasing complexity, the best opportunities are for those firms, products and services that are minimally complex (simple). The same goes for those of us leading others and managing our organizations.


Finding the business value in big data is a big problem
Business leaders often "don't know what they don't know," said one frustrated IT manager, and therefore they are incapable of explaining to IT shops what to do with all this data that's being accumulated.


Managing Blind: Interview with Peter Benson
Peter has a vast amount of experience in Data Quality and Data Governance and has helped the industry move on considerably with his leadership of the ISO 8000 Data Quality standard. Here is an Interview with him.



Quote for the day:

"We must all suffer one of two things: the pain of discipline or the pain of regret or disappointment." -- Jim Rohn

August 27, 2012

Three IT Best Practices for Better BI Integration
What usually happens is integration is done on a project-by-project basis, but all you have to do is look at business intelligence and analytics projects for proof organizations could benefit from a more thoughtful approach to integration.


How CIOs at Microsoft and Cisco Realigned IT For A New Era
Larger corporations with multiple operating companies, business units, or brands must confront a debate about the merits of centralized vs. federated organizational structures. The rationale for the former is often the desire to set common standards, create efficiencies, and leverage economies of scale by purchasing software and vendor services globally rather than locally, where possible. The rationale for the latter is often to have IT closest to where the business is done, to increase flexibility, and to efficiently deliver capabilities based on the unique needs of each individual entity.


Gartner: Cloud disillusions, NFC and big data to deliver on hype
‘Big data’ and mobile payments using NFC chips in smartphones are among the breaking technology set to deliver on their hype, while cloud computing is on “a path to disillusionment”, according to a study from Gartner.


A lesson in innovation from Apple's first interface trial
Apple last week won the first round of its patent fight against Samsung (and in the shadows, Google), and now the market questions whether there will be sufficient innovation in non-Apple mobile devices. Perhaps Apple's own history of innovation and legal fights over interface show that there are many ways to represent files and commands, and to do all the stuff we do.


Tapping into Consumer Sentiment on Social Networks
The basic technology employed for sentiment analysis, sometimes called opinion mining, is natural language processing, computational linguistics and text analytics. The idea is to both identify and extract subjective information from a variety of sources, including web pages, online news, internet discussion groups, online reviews, web blogs, and social media.


Java zero day allegedly spotted in the wild
Mushtaq was able to successfully test the exploit on a test machine running Firefox and the latest version of Java. He warned that it would be only a matter of time before a proof of concept was released for anyone to exploit the vulnerability, but it appears to have happened already.


OpenXava 4.5 Supports JPA Inheritance Mapping and Automated Business Logic
The latest version of OpenXava, a Java framework for rapid development of enterprise applications, supports all strategies of JPA inheritance mapping and the Automated Business Logic (ABL) library. OpenXava version 4.5 was released last month.


Do You Need a Chief Data Officer?
More organizations are selecting Chief Data Officers to help wrangle internal and external data. But is a CDO good for everyone?


12 IT Certifications That Deliver Career Advancement
In today's competitive IT job market having the right certification can help push your resume to the top of the stack or push you ahead of your colleagues when the opportunity for a promotion arises.


14 Things You Should Do at the Start of Every Work Day
“Having a good start to the day where you have greater control is critical in achieving better results, and ultimately greater career success,” says Lynn Taylor, a national workplace expert



Quote for the day:

"Success is one thing you can't pay for. You buy it on the installment plan and make payments every day." –-- ZigZiglar

July 25, 2012


Is Big Data big hype?
Management guru Peter Drucker saw increasingly available IT as a threat to corporate decision making, not due to cost or some perceived evil, but because IT made it so easy for management to focus on the past rather than attempting to determine and react to future trends.

NSW Govt SAP roll-out to be cloud test case: Ovum
Ovum Asia Pacific research director for IT, Steve Hodgkinson, said that government departments around the country (Australia) would be watching the deal to see if cloud services will be a better way of providing shared services.

Silicon Valley Says Step Away From the Device
“If you put a frog in cold water and slowly turn up the heat, it’ll boil to death — it’s a nice analogy,” said Mr. Crabb, who oversees learning and development at Facebook. People “need to notice the effect that time online has on your performance and relationships.”

EC opens cybersecurity consultation
The EC is seeking the views of governments, businesses and citizens about their experiences and possible EU responses to cyber incidents that disrupt essential networks and information systems.

Compliance In The Cloud Era
The bad news is that we can't get too comfortable. The dynamics of compliance are changing as we grant third parties more access to sensitive and critical data, and the damage if there is a major security breach at one of your key external partners.

Top 50 Innovation Tweeters of 2012
We knew we follow a lot of great innovation people on twitter (including a lot of the great Innovation Excellence authors) and were curious to see whom should be followed to learn most on innovation. Read on to see the list.

The Future of Customer Relationships: Where is all this heading?
Dr. Michael Wu, Chief Scientist, of Lithium Technologies, has been doggedly trying to uncover the meaning of influence, its impact on relationships, and ultimately corporate profit structures. Target the influencers, and you can move the crowd. There are seemingly vast opportunities in understanding and leveraging influencers within networked communities.

Java Vulnerabilities Increasingly Targeted By Attackers, Researchers Say
One clear trend is that Web exploit toolkit developers are increasingly focusing on Java exploits, Jones said. They are also integrating exploits for new Java vulnerabilities at a much faster pace than before.


5 Features in Android Jelly Bean To Drool Over
Google has released a worthy successor to Android 4.0, which brings improvements in fluidity and responsiveness, a cool predictive keyboard, better notifications, offline maps and Apple Siri's nemesis --Google Now

5 Things That Keep App Developers Up At Night
Compounding the stress: The ever-present possibility that a bug will be detected by a journalist, potential investor, or a celebrity with a large Twitter following.



Quote for the day:

"Playing it safe is the most popular way to fail" --Elliott Smith