Showing posts with label NFC. Show all posts
Showing posts with label NFC. Show all posts

Daily Tech Digest - April 26, 2020

Can computers become conscious?


AI-hard problems are hypothesized to include general computer vision, natural language understanding, and dealing with unexpected circumstances while solving any real-world problem. As it stands, AI-hard problems cannot be solved with current computer technology alone. They still require human intervention, and probably always will. Following this trend, AI will not become self-aware. So, the doomsday conspiracy theorists are wrong. AI will not become the dominant form of intelligence on Earth, with computers and robots taking over the world. Still, there’s nothing wrong with taking a few precautionary measures to ensure that future superintelligent machines remain under human control. However, I don’t think a robot uprising is possible. Nonetheless, there are those who believe that machines have minds or soon will. This is why scientists have developed a number of experiments to test AI, to find out what the limits of artificial intelligence are.



Custom Response Caching Using NCache in ASP.NET Core

Response caching enables you to cache the server responses of a request so that the subsequent requests can be served from the cache. It is a type of caching in which you would typically specify cache-related headers in the HTTP responses to let the clients know to cache responses. You can take advantage of the cache control header to set browser caching policies in requests that originate from the clients as well as responses that come from the server. As an example, cache-control: max-age=90 implies that the server response is valid for a period of 90 seconds. Once this time period elapses, the web browser should request a new version of the data. The key benefits of response caching include reduced latency and network traffic, improved responsiveness, and hence improved performance. Proper usage of response caching can lower bandwidth requirements and improve the application’s performance. You can take advantage of response caching to cache items that are static and have minimal chance of being modified, such as CSS, JavaScript files, etc.


It's a great time to tackle core IT upgrades


There are hundreds of thousands of security patches out there, but Vulcan will tell you that a few of the important ones will eliminate many related security issues. A little work now goes a long way -- if you know what to do. With consumers and business buyers stuck at home, it is the e-commerce side of a business that is super important. During the important fourth-quarter holiday sales season, companies won't risk making any changes to their e-commerce systems. Now things are reversed, it is the main IT systems that can be upgraded and patched with less risk of downtime problems. But don't mess with the e-commerce systems. Vulcan's platform is designed to scale and to interface with all the standard IT tools. It makes heavy use of machine learning and also human intelligence -- IT experts that can analyze new security threats and solutions. And sometimes a patch isn't needed and a simple workaround will eliminate dozens of related issues, says Bar-Dayan. Vulcan's reports identify the top vulnerabilities and the detailed remediation steps necessary. It is a huge time-saver for cybersecurity teams.


Shadow Broker leaked NSA files point to unknown APT group


Juan Guerrero-Saade, a security researcher and adjunct professor at Johns Hopkins University’s School of Advanced International Studies, wasn’t convinced, arguing that misleading files make their way onto VirusTotal all the time. He realised that the file in question was a 15Mb memory dump of a McAfee installer. In short, it’s a red herring. Investigating godown.dllfurther, he found that the file was a drop from a larger multi-stage infection framework. The tools and techniques that the framework used indicated a unique cluster of activity. It pointed to an advanced persistent threat group that wasn’t publicly known until now. Although it’s difficult to directly attribute the attack to a specific actor, Guerrero-Saade noted that some of the resources in the files mention Farsi (Persian), which is native to countries including Iran. The name used in the root debug path, c:/khzer, apparently means ‘to survey or monitor’ according to friends of his that are acquainted with the language, and so he decided to call the attack group Nazar, after the heart-shaped amulet supposed to protect people against the evil eye in many countries across the middle east.


The true costs incurred by businesses for technology downtime

technology downtime
The research, conducted by Vanson Bourne, which surveyed 1,000 senior IT decision-makers and 2,000 end users at organizations with at least 1,500 employees across the U.S., the U.K., France, and Germany, shows that employees are losing an average of 28 minutes every time they have an IT-related problem. The report also shows that IT decision makers believe employees are experiencing approximately two IT issues per week, wasting nearly 50 hours a year. However, as only just over half of IT issues are being reported, the numbers are more likely to be nearly double that – close to 100 hours (two work weeks) a year. This has led to a vicious cycle of employees trying to fix IT problems on their own, leading to less engagement with the IT department, which doesn’t have visibility into how the technology is being consumed. There exists a major disconnect between IT departments and employees, with 84% of employees believing that their organizations should be doing more to improve the digital experience at work. However, a staggering 90% of IT leaders believe that workers are satisfied with technology in the workplace, highlighting the discrepancy between perception and reality of the digital employee experience.


Judges and lawyers learn Zoom rules in real time during coronavirus crisis


Ines Swaney, a certified Spanish interpreter, said her first experience with Zoom was a three-way conversation during a legal visit between an attorney in one city, the attorney's incarcerated client joining the conversation from jail in another city, and herself serving as an interpreter in a third city. One drawback with the Zoom platform is that it forces an interpreter to use consecutive interpreting instead of simultaneous interpreting, which is the preferred approach. Swaney said that online platforms also need to allow private conversations between an attorney and the judge, and among an attorney, client and interpreter who may need to speak privately for a brief period of time during a hearing. Tony Sirna, legal strategist and customer success manager at Verbit, said there are serious considerations the courts are working through, particularly ensuring due process with remote proceedings, technology interruptions, unauthorized recordings, exhibits, and the impact virtual appearances will have on defendants, for example.  Sirna said in addition to standardizing software and recording technology, courts need to agree on procedural best practices, such as how exhibits and stipulations will be handled remotely.


Text ‘bomb’ crashes iPhones, iPads, Macs and Apple Watches – what you need to know

Text 'bomb' crashes iPhones, iPads, Macs and Apple Watches - what you need to know
The problem appears to exists in how the latest shipping versions of Apple’s operating system handle a Unicode symbol representing specific characters written in Sindhi, an official language in part of Pakistan. The problem occurs most irritatingly when your device attempts to display a message notification. If you have configured your iPhone, for instance, to display a new message notification which includes a preview of the message, then iOS fails to properly render the characters and crashes with unpredictable results. You may find the only way to get around the problem is to completely reboot your device – but there is always the risk that you will receive a new boobytrapped notification. The problem can also manifest itself inside apps. For instance, some mischievous Twitter users have tweeted the offending characters causing other users to have their devices crash. Android users, meanwhile, are unaffected – and can watch the chaos with bemusement. Some of the earliest reports suggested that for the attack to work the Sindhi characters had to be used in conjunction with an Italian flag emoji.


What Is Agile Enterprise Architecture? Just Enough, Just in Time

Agile is based on the concept of “just in time.” You can see this in many of the agile practices, especially in DevOps. User stories are created when they are needed and not before, and releases happen when there is appropriate value in releasing, not before and not after. Additionally, each iteration has a commitment that is met on time by the EA team. EA is missing the answer to the question of “what exactly is getting delivered?” This is where we introduce the phrase “just enough, just in time” because stakeholders don’t just simply want it in time, they also want just enough of it — regardless of what it is. This is especially important when communicating with non-EA professionals. In the past, enterprise architects have focused on delivering all of the EA assets to stakeholders and demonstrating the technical wizardry required to build the actual architecture. ... Create a marketing-style campaign to focus on EA initiatives, gathering and describing only what is required to satisfy the goal of the campaign.


Safe shopping: Your best options for NFC and contactless payments


Near-Field Communications, or NFC, is a technology built-in to many modern families of mobile devices, such as the iPhone, the Samsung Galaxy, Google Pixel, and many other Android smartphones. NFC, introduced in 2002, allows contactless data transfer between mobile devices and can to emulate a credit card for payments at POS terminals in retail stores. NFC lets the user pass their smartphone device over a payment terminal at a retailer in order to complete the purchase, provided that a supported "e-Wallet" platform is used. Keep in mind, however, that NFC still requires you get relatively close to the payment terminal and the person running it, and may even require you physically interact with a keypad or virtual keypad/screen to initiate a transaction -- so wear gloves or have the employee initiate the transaction on your behalf, and if you have to touch the terminal, do not touch your face, and wash your hands immediately afterward. Be sure you maintain safe distances when using it, or shop where there is a plexiglass barrier between you and the retail employee.


Go as a Scripting Language

Go's growing adoption as a programming language that can be used to create high-performance networked and concurrent systems has been fueling developer interest in its use as a scripting language. While Go is not currently ready "out of the box" to be used as a replacement for Bash or Python, this can be done with a little effort. As Codelang's Elton Minetto explained, Go has quite some appeal to be used as a scripting language, including its power and simplicity, support for goroutines, and more. Google software engineer Eyal Posener adds more reasons to adopt Go as a scripting language, such as the availability of a rich set of libraries and the language terseness, which makes maintenance easier. ... Being able to use the same language for day-to-day tasks and less frequent scripting task would greatly improve efficiency. Go is also a strongly typed language, notes Cloudflare engineer Ignat Korchagin, which can help to make Go scripts more reliable and less prone to runtime failure due to such trivial errors as typos.



Quote for the day:


"A leader is one who sees more than others see and who sees farther than others see and who sees before others see." -- Leroy Eimes


July 01, 2016

Think different: Cognitive computing systems will bring data-led change

Over the years, as business models have changed and the number of data sources multiplied, organizations tweaked their old programs to fit, patching the logic and creating what Hurwitz called "monster systems." Cognitive computing systems, which use hardware or software to approximate human cognitive functions, will change all that, Hurwitz said. The business applications of the future will be based on fast-moving, ever-changing data from an ever-growing number of sources. Gone will be step-by-step instructions based on the past. Cognitive computing learns from patterns and anomalies, makes guesses about what could happen -- and it doesn't assume there is one correct answer. As more data is ingested and analyzed, the system changes, too.


Cloud Adopters Balancing Cost Savings, Security

Among the reasons for outsourcing security operations is the difficulty of recruiting cloud security experts along with a shortage of technical resources needed to run an in-house security operations center, the company argues. A hefty 79 percent of respondents responsible for cloud security said they welcome outside help in running cloud security operations. Their biggest challenges included managing security content, identifying and blunting "multi-vector" attacks and the high cost of cloud security, the survey found. The Forrester survey also found that IT administrators are turning to outside help for capabilities like threat intelligence analysis (83 percent) as they seek to develop real-time threat detection capabilities. Also cited were assistance for securing public clouds (80 percent), overall security operations (77 percent), network security along with data privacy and regulatory compliance (both 76 percent).


The Inventor of the Merkle Tree Wants DAOs to Rule the World

Because DAOs are designed to operate without a leader, the software on which they are based relies on a series of smart contracts that form their method of governance. Though Buterin’s article, entitled "An Introduction to Futarchy", touches on several alternative forms of governance that might one day power a DAO, at its core is the concept of Futarchy, invented in 2000 by Robin Hanson, a George Mason University researcher and chief scientist of Consensus Point, a markets research firm. Buterin reasoned that Futarchy’s form of governance could eventually lead to a new kind of leadership where governance was controlled by increasingly accurate probabilities derived from what are called prediction markets, designed to determine the likelihood that an event will occur and be free from reliance on any single leader.


Despite Mobile App Demand, Enterprise Spending Lags, Research Indicates

In this week's report, Gartner said the percentage of enterprise application development budgets devoted to mobile has actually decreased from last year, although 42 percent of organizations said they'll increase spending on mobile development by an average of 31 percent this year. Overall, mobile accounts for only about 10 percent of total organizational development budgets, Gartner said. These confounding, non-intuitive statistics echo the findings from many earlier studies. Earlier this year, for example, Red Hat Inc. published survey results gauging the state of mobile maturity in 2015. "Over the last two years, almost half of the organizations surveyed (52 percent) had developed fewer than 10 custom mobile apps, with 45 percent creating more than 10," the Red Hat survey said.


Time-Travel Queries: SELECT witty_subtitle FROM THE FUTURE

The CockroachDB implementation of this feature requires that the timestamp be a literal string in a valid time format. We do not support generic expressions or even placeholder values here (sadly1). However, we are able to support schema changes between the present and the “as of” time. For example, if a column is deleted in the present but exists at some time in the past, a time-travel query requesting data from before the column was deleted will successfully return it. This data is kept in the MVCC layer and garbage collected (GC) at some configurable rate (default is 24 hours and configurable by table). Time travel is supported at any time within the GC threshold.


Microsoft to add Enterprise Advantage to MPSA licensing in early 2017

Microsoft is characterizing the addition of Enterprise Advantage for MPSA as "the next step in the development of modern licensing," in the words of Mark Nowlan, Director of Marketing for Microsoft's Worldwide Licensing Programs. MPSA is Microsoft's licensing/purchasing agreement that is meant to enable users to consolidate various licensing contracts into "a single, nonexpiring agreement for all organizations." MPSA was designed to replace software-centric licensing and purchasing agreements with something simpler that would appeal to customers using a mix of Microsoft software and services. With MPSA, Microsoft's goal is to streamline its multiple licensing/purchase agreements down to a single agreement and two options to buy (transactional/buy as you need or organizational-wide),


Prepping for the Big Cloud Conversation

The chief talking point in favor of the cloud should center on competitive advantage. Present the cloud as a strategic decision, and show how it can align with the organization’s goals. Makes the case why this constitutes a new and better way to deliver business services. Focus on process improvements in terms of increased speed and flexibility. And, yes, point out the reduced operating costs--but set expectations and make it clear that the returns on a new cloud infrastructure won’t be realized overnight. In fact, it may take several years before the average company reaches the breaking point and then starts to realize major savings. For the CFO--and perhaps the CIO--that may sound like a bridge too far. So give management a full picture and identify the real costs of migration;


Cybersecurity: Stop the attacker's offense, don’t do defense

Having full visibility into your IT environment and being able to spot compromised machines is critical for stopping the attacker’s offense. To know their environment better than the attackers, organizations must constantly perform reconnaissance in their environment and collect information and analyze it in real time. With this knowledge, an enterprise can control the situation instead of allowing the hacker to dictate what happens.  You want to be able to see all the elements at work in the hacking campaign and cut the attacker’s access to your network at once. Remediating security threats one by one won’t do anything to protect a company. If anything, this method tips hackers off that they’ve been discovered and provides them with time to rework their plan and figure out how to evade your defenses.


Supply Chain Security Must Mimic Enterprise Security

Supply chain security isn’t a one-way street, either, Cheng reminds us. “Be sure that your vendor takes security vulnerabilities seriously. This means that they can demonstrate a rigorous security program that ensures people, engineering, and processes deliver confidentiality, integrity, and availability of your information.” If vendors don’t hold supply chain security best practices to an acceptable standard, supply chain decision makers have the option to walk away and find a vendor who will. Consumers and customers who are affected by supply chain decisions don’t have that luxury. “In general, every time IoT security is compromised, so too is the security of consumers,” says Lucas. “These types of security concerns range from data ownership and privacy to hackers gaining control of our electrical grid. All these risks compromise the integrity of the supply chain and ultimately the quality of products, which can have a huge impact on consumer health and safety.”


Hands-on: NFC-enabled ATMs make it easy to withdraw cash with a smartphone

Using an ATM with Android Pay is almost identical to using the machine with your bank card. But rather than digging through an overstuffed wallet for a piece of plastic, you simply connect your phone to the machine over NFC. After that, it’s the same familiar process: Enter your PIN, grab your cash, and go. NFC payments also add an extra measure of security. First off, the process is quicker—you won’t have to dawdle as you wait for the machine to spit out you card. Second, the card is protected by Android Pay and Apple Pay’s existing security measures, meaning you’ll have to scan your fingerprint or use a pin number or pattern unlock before you can use it. This, in conjunction with your PIN number, makes taking out cash a two-factor authentication process that’s more secure than using plastic.




Quote for the day:


"Be who you are and say what you feel, because those who mind don't matter, and those who matter don't mind." -- Bernard M. Baruch


October 31, 2014

In contrast with the China-based threat actors that FireEye tracks, APT28 does not appear to conduct widespread intellectual property theft for economic gain. Instead, APT28 focuses on collecting intelligence that would be most useful to a government. Specifically, FireEye found that since at least 2007, APT28 has been targeting privileged information related to governments, militaries and security organizations that would likely benefit the Russian government.


Experts: Major cyberattack will hit in next 11 years
Almost two-third of technology experts expect a "major" cyber attack somewhere in the world that will cause significant loss of life or property losses in the tens of billions of dollars by 2025. A survey released Wednesday by the Pew Research Center found that many of analysts expect disruption of online systems like banking, energy and health care to become a pillar of warfare and terrorism. The survey asked over 1,600 technology experts whether a major attack that would cause "widespread harm to a nation's security and capacity to defend itself" would be launched within the next 11 years.


Top CIOs Start the Journey to the 'Digital Enterprise'
The digital enterprise is more than just a CIO catchphrase. In a recent Altimeter Group survey, 88 percent of 59 digital strategy executives interviewed said their organizations are undergoing formal digital transformation efforts this year. Even CIOs who think the phrase "digital enterprise" is mushy, like Mojgan Lefebvre, CIO of Liberty Mutual Global Specialty, say that consumers wielding smartphones have shifted the balance of power. "The one thing that comes in and absolutely disrupts industries is giving the end-user customer, consumers, the ability to do anything and everything they want on their mobile device," Lefebvre says.


Enterprise Cloud Service Broker—A New Identity for IT, CIOs
A cloud service brokerage, as defined by Gartner Group, is “an IT role and business model in which a company or other entity adds value to one or more (public or private) cloud services on behalf of one or more consumers of that service.” Gartner recently challenged CIOs to explore how they should position themselves as CSBs within the enterprise by “establishing a purchasing process that accommodates cloud adoption, and encourages business units to come to the IT organization for advice and support.” Why not just bring in an outside organization to manage cloud vendors? Indeed, many new companies have sprung up recently to help IT departments procure their cloud services.


The science behind the ebb and flow of Ubuntu Unity's popularity
This has surprised a lot of people, but I would argue that it shouldn't. Why? Unity has been around for a while now, and it's had plenty of time to evolve and get things right. The initial release was 2010, and the Unity we have now is not the Unity we had then. Users have had plenty of time to acclimate. The HUD, the Dash, Scopes -- they all work in a harmony that most desktops can't replicate. Even with the current state of popular that Unity is enjoying, I remember the reaction of the Linux community when the desktop first arrived -- it seemed as if Ubuntu was on a collision course with disaster.


Healthcare IT: User Empathy Comes First
Too often we see information systems organizations driving and delivering products and services without first understanding what to deliver. One great companion tool for enabling the customer empathy mindset is an empathy map. ... Underlying an empathetic mindset is a deep curiosity to find out the answers to these and many more questions. It is also supported by a desire to delight users with your product or service. As mentioned in my previous blog, defining a product's or service's success in terms of a "Love Metric" is key to moving an organization toward becoming one that is known for its customer empathy mindset.


Setting Traps, and Other Internet Security Tips
The cold truth is that the JPMorgan breach and the rest are not symptomatic of anything new—online businesses have been under constant cyberattack for well over a decade. What’s different today is that there is a lot more at stake because so much of what we do every day is online. Here is what I recommend: use two-factor authentication—essentially verifying via SMS on your mobile phone that you are the owner of a particular account online, every time you sign on. Google, Facebook, Twitter, and just about every major bank provides this option. Also, since everyone gets hacked online eventually, make sure the damage is limited.


Small Businesses Investing in Mobile Technology
"Small business should pay attention to some of the same places they have been getting their cloud and mobility information," Seth Robinson, senior director for technology analysis at CompTIA, told eWEEK. "These two areas provide the foundation for IoT and will help give some insight as to how SMBs will begin using the technology." obinson said just as small businesses have learned about the benefits of cloud and mobility in their space--which are often different than enterprise benefits--they will learn about the benefits of IoT as the trend takes shape.


Following the launch of Apple Pay, Juniper Research thinks NFC will finally be a success
Juniper had been pessimistic about the market after the dismal showing of the NFC-based Google Wallet, launched in 2011, and Apple's failure to include NFC in the iPhone 5. Apple had also said that BLE (Bluetooth Low Energy) and Wi-Fi had "more desirable characteristics for maintaining the link over time than NFC", and it could have adopted BLE instead. With the arrival of Apple Pay, based on industry-standard EMV contactless protocols running over NFC, Juniper has changed its view. In the context of the US market's development, Apple Pay has arrived at a better time than Google Wallet.


Microsoft Adds IoT, Big Data Orchestration Services to Azure
"Every day, IoT is fueling vast amounts of data from millions of endpoints streaming at high velocity in the cloud," says Joseph Sirosh, corporate vice president of Machine Learning at Microsoft. "Examples of streaming analytics can be found across many businesses, such as stock trading, fraud detection, identity protection services, sensors, web clickstream analytics and alerts from CRM applications. In this new and fast-moving world of cloud and devices, businesses can no longer wait months or weeks for insights generated from data."



Quote for the day:

“You can't connect with something you're not passionate about.” -- Gemma Arterton

January 27, 2014

NSA surveillance revelations could lead to data collection policy
What one hopes it won't do is impede innovation. Sure, the data collection we see every day in things like targeted coupons and targeted advertisements can have a rather high creepiness quotient. But there's much good that big data collection can do. Examples abound -- from analyzing Tweets to understand smoking habits to collecting meter data to optimize the grid to improving automation. That's as long as the analytics end of the equations are sound.


The ROI of Data Governance
Many organizations have found success by “thinking globally and acting locally.” Sometimes referred to as guerilla governance, this may not be the fast path, but is likely the pragmatic path to enterprise data governance. This is not a shortcut – there’s no substitute for the broad-based communication, collaboration, coordination, executive sponsorship and investment required to obtain sustainable governance. It’s merely a way to align with the principles and practices of data governance and obtain some small, quick wins cheaply to build the evidence and confidence required to support greater investment.


Would NFC smartphones have helped at Target?
The answer is complicated and political, primarily because there are questions over who is liable for a data breach -- the retailers or the financial institutions and their associated card processing companies such as Visa and MasterCard. It is also expensive to install point-of-sale (POS) terminals in millions of retail locations and at ATMs that can read chips on the newer contactless cards, as well an NFC signal from a smartphone. It also doesn't help that Apple hasn't included NFC chips in its popular iPhones. "Apple's refusal to integrate NFC functionality is a blatant roadblock, there's no other way to put it,"


Hands-on with Knoppix Linux 7.2.0: A well-established and very stable Linux distribution
Over the years, Knoppix has evolved and expanded. In about 2005 a Live DVD version was added, with loads of additional applications, utilities and packages included. Rather than drop the Live CD version, however, both formats have been maintained since then, with the CD version as a "small/fast/easy" alternative, and the DVD version as an "everything including the kitchen sink" alternative. My first use of Knoppix came at SANS training classes, where they were using the Live CD version as a convenient way for course participants to gain access to Linux tools.


Wipro's CEO maps out a future for IT Services firms
The world continues to change rapidly for Indian IT Services firms. Here’s a recent interview with Wipro CEO T.K. Kurien with all the usual stuff about firms in transition, the trauma of effecting change and other such things. However, embedded in there are three observations that give us a glimpse into a brave new world for software services firms.


How Xerox Evolved From Copier Company To Creative Powerhouse
There’s one other thing that’s crucial to getting the best, most innovative work out of Xerox employees. “Having fun is one of the principles I always talk with new hires about,” says Vandebroek. “Unless you have fun, you can’t truly bring your intellect, your skills, and your deep knowledge to push the boundaries of the unknown, to invent and create.” She goes on: “Being innovative to me is being both creative and entrepreneurial. And you can’t be creative and entrepreneurial unless you truly bring your heart to work, and have fun at work. Having fun is really essential. You need to have fun every day.”


As security woes bedevil IT, guess who’ll shoulder more of the load?
So what’s the solution? One increasingly prevalent view is that end-users be enlisted to the cause, first by educating them about safe practices, about corporate security policies and regulations (and the penalties for breaking them) and finally by enforcing those policies. Let’s face it, if you are a knowledge worker, you need to collaborate with others, sometimes contractors, partners outside the firewall — and should have a good idea of who is to be trusted with documents and work product.


Myths and Misconceptions about Transaction Isolation Levels
In every discussed Isolation Level so far, you are also always able to get so-called Phantom Records – records that can appear and disappear in your result set. If you want to get rid of these phantom records, you have to use the Isolation Level Serializable, which is the most restrictive one. In Serializable SQL Server uses a so-called Key Range Locking to eliminate phantom records: you are locking complete ranges of data, so that no other concurrent transactions can insert other records to prevent phantom records.


Fiberlink president talks IBM MobileFirst plans, EMM consolidation
Candidly, what we were not good at was global marketing and global sales. We did not have the scale and we did not spend the money. We could, but we chose not to go that route to just try to buy market share. Over the course of the last couple of years, we continued to get close to IBM in terms of packaging some of their stuff for the laptop side, but also uniquely developing the whole mobile side of the house. It was becoming more and more obvious to us that the market in mobile management still has not found vendor loyalty…


Interview with Ole Jepsen on Leadership in Agile
Good leaders create an environment where self-organizing teams can thrive and create great products and services to delight their customers: that is what Ole Jepsen explained in this interview. At the XP Days Benelux conference he talked about truly leading people and the subtle but important differences between taking and giving control. InfoQ interviewed Ole on leadership in agile, self organizing teams and focusing on people



Quote for the day:

"You can't improve and still be the same" -- John C. Maxwell

January 17, 2014

Cooling Strategies for Ultra-High Density Racks
The simple answer to this problem would be to provision a data center so that it is capable of providing 20kW of redundant power and cooling to every enclosure. Unfortunately, this is simply not technically feasible or economically practical in almost any case. Making the wrong choices when specifying a data center for high density operation can needlessly increase the lifetime cost of the physical infrastructure by many times. The purpose of this paper is to outline practical and effective strategies for deployment of high density enclosures and blade servers.


Google unveils 'smart contact lens' to measure glucose levels
It uses a "tiny" wireless chip and a "miniaturised" glucose sensor embedded between two layers of lens material. The firm said it is also working on integrating tiny LED lights that could light up to indicate that glucose levels have crossed certain thresholds. But it added that "a lot more work" needed to be done to get the technology ready for everyday use. "It's still early days for this technology, but we've completed multiple clinical research studies which are helping to refine our prototype," the firm said in a blogpost.


How Natural Language Processing Makes Our Lives Easier and Improves Your Business
Talking to computers still requires programming languages but the ultimate goal of NLP is “to do away with computer programming languages altogether. Instead of specialized languages such as Java or Ruby or C, there would only be “human.”” The better a computer is capable of understanding natural language, the more applications there will be, but already NLP offers a lot of possibilities to help grow your business, save money and stay ahead of your peers.


The Year Ahead According to Rackspace
There’s a tacit agreement that many traditional security solutions just aren’t cutting it in our ever changing world of technology innovation. The NSA revelations and general scaremongering does not drive the market away from outsourcing, or from US companies, it drives them into wanting to do more on security, demanding more for their providers. 2014 will see continued investment in new security technologies especially around encryption. This will undoubtedly result in better security in the cloud and address some of those lingering doubts around the security of cloud-based platforms and systems.


Predictive Analytics Can Boost Enterprise Performance
"Using historical measures to gauge business and process performance is a thing of the past," said Samantha Searle, research analyst at Gartner. "To prevail in challenging market conditions, businesses need predictive metrics — also known as "leading indicators" — rather than just historical metrics (aka "lagging indicators")." Predictive risk metrics are particularly important for mitigating and even preventing the impact of disruptive events on profitability.


What makes innovation go wrong
Stephen Di Biase says innovation is "in our DNA. We evolved to get here." Di Biase, a longtime R&D executive, is now president of Premier Insights LLC, which provides consulting services about innovation to science-and-technology-based companies. He is on the advisory board of Clean Energy Trust, and he convenes a Chicago-area network of chief technology officers from companies that range from family-held firms to Fortune 500 companies. He spoke with Blue Sky Innovation about leadership, innovation in larger companies and thoughts for managers to consider when looking for new solutions.


IT mobility trend continues in 2014
It's pretty easy to conceptualize any software component as a resource, an element that does something for us. The problem with that very general approach is that it can lead to over-specifying. If you want to expose the functions of a programmable light switch, it's tempting to have verbs like On and Off and maybe status verbs like ReadState. These are nice, but they force an API into being not only functionally specific, but also limited in terms of what technologies can be used to implement it.


Web steps closer to baking-in support for NFC payments and data swapping
When implemented the spec would allow web pages and apps to read and write to NFC tags; to send and receive messages between NFC-enabled devices and provide a way to initiate a wireless connection via wifi or Bluetooth. The API would enable a range of capabilities for web sites and apps such as tapping two devices together to initiate a two player game; tapping devices to share data such as coupons or contacts; and tapping a device to read a message from an NFC tag.


Better software testing and improved quality starts with the culture
A testing expert who really knows his stuff adds enormous value to the project for the customer—and for the whole team by making their job easier rather than harder. Sadly, too many companies still view testing as more of a necessary evil than an opportunity. That's an attitude that Jim Holmes, Director of Engineering for Test Studio at Telerik, is doing everything he can to change.


Spy agencies around the world use radio signals to tap data from targeted systems
The technology, which has to be physically installed in most cases, has been available since at least 2008. It "relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers," according to the Times report. Data captured by the devices are sent to small briefcase-sized relay stations often set up miles away from the target system. The software has apparently allowed the NSA to do an end-run around whatever cybersecurity controls are installed on the compromised systems.



Quote for the day:

"Success is determined by those whom prove the impossible, possible." -- James W. Pence

January 21, 2013

Practical SOA for the Solution Architect
Most IT practitioners often lose sight of the core principles of Service-Oriented Architecture (SOA). This article and its extended white paper are a retelling of the SOA philosophy in an easily understandable and practically applicable form, independent of the actual tools used to implement it. It is specially targeted to the Solution Architect, because at the end of the day, SOA is nothing but a way to put components together to build flexible, durable and reusable business solutions, and the solution architect is the person responsible for this outcome.


Why Functional Programming in Java is Dangerous
Elliotte Rusty Harold writes: The problem is that my colleagues and I are not writing code in Haskell, Scheme, Lisp, Clojure, Scala, or even Ruby or Python. We are writing code in Java, and in Java functional programming is dangerously inefficient. Every few months I find myself debugging a production problem that ultimately traces back to a misuse of functional ideas and algorithms in a language and more importantly a virtual machine that just wasn’t built for this style of programming.


Don't SCIM over your Data Model
SCIM used to stand for "Simple Cloud Identity Management" but now stands for "System for Cross-domain Identity Management", which is more generic. This article looks at some aspects of the SCIM protocol as currently published. The three major areas where SCIM’s underlying data model is somewhat inadequate: Tight coupling of identifiers; Inelegant handling of multi-valued attributes; and Clumsy PATCH command syntax


'Rogue Clouds' Giving IT Staffs Nightmares
"Rogue clouds" occur if sales and marketing people, for example, order up Salesforce.com without bothering to consult IT or set up Dropbox with outside vendors to share sensitive information. It's happening to three-quarters of those using cloud, according to the survey, and it occurs more in large enterprises (83%) than in small to midsize ones (70%).


7 CES Announcements IT Pros Need to Know About
The Consumer Electronics Show is not only about consumer gadgets, as enterprise vendors such as Dell and Intel tend to announce major new technology advancements as well. CES 2013 was no different. Here are the top business tech announcements from Las Vegas.


Security is no place for traditionalists
Traditional security professionals adhere to a certain philosophy which can be detrimental to their cause. Traditionalists believe that IT risk is a technical problem, handled by technical people, buried in IT and every problem is solved with a new technology. Also, they view themselves as heroes hired to protect the company at all cost.


A Periodic Table of Visualization Methods
An interesting periodic table of visualization methods for management by Lengler R., Eppler M. (2007).


Google looks to ditch passwords for good with NFC-based replacement
Google is currently running a pilot that uses a YubiKey cryptographic card developed by Yubico — a start-up operated out of Sweden and the US, which has produced a two-factor authentication fob that can emit encrypted one-time passwords to NFC-enabled smartphones.


CIOs say cloud computing is really, truly a priority this time
At least CIOs finally get it: Either figure out a way to leverage cloud technology, or get into real estate. Although this technology is still emerging, the value of at least putting together a plan and a few projects has been there for years. The business cases have always existed. Despite those obvious needs, many CIOs have been secretly pushing back on cloud computing.


Microsoft Cloud OS Vision Unfolds With New Products, Services
"with Windows Server and Windows Azure at its core, the Cloud OS provides a consistent platform across customer data centers, service-provider data centers and the Microsoft public cloud," Park said in a statement. "Powerful management and automation capabilities are key elements of the Cloud OS, taking the heavy lifting out of administration and freeing IT organizations to be more innovative as they embrace hybrid cloud computing and the consumerization of IT."



Quote for the day:

"The men who try to do something and fail are infinitely better than those who try to do nothing and succeed." -- Lloyd Jones

December 31, 2012

Brief Introduction to Aspect Oriented Programming
Aspect Oriented Programming, or AOP, refers to this type of functional requirements as cross-cutting concerns and is designed specifically to address this issue: if such requirements are met by coding the cross-cutting concern into objects throughout the system, we can easily end up with a messy, hard-to-maintain implementation split across many objects.


Would You Want To Use Your NFC-Enabled Phone As Car Keys?
Hyundai's Connectivity Concept, which won't actually go into production until around 2015, aims to harness the power of your NFC phone to make it way cooler than your keys ever were. Not only could the phone unlock your car and start it, but it could also save a sort of user profile, flipping to the right radio station or streaming music while adjusting the seat and mirrors for you as soon as you slam it into the dashboard dock.


Building a Business-Aware Cloud Solution
There are three key areas that enable business awareness. The business process area includes the business functions, related-activities, and the individual tasks that must be performed in order to generate the desired business results. The business role(s) area includes the concatenation (grouping) of business activities into responsibilities that can be competently accomplished. Finally, business awareness also requires an understanding how an industry operates and how it is influenced by local, national and global economics.


How to Handle a Manipulative Employee
Most employees really do want to do a good job, but sometimes you run into a few who would rather not bother. Here are five phrases that serve as "warning signs" that an employee is trying to manipulate you, along with advice on how to turn the tables.


Sure, Big Data Is Great. But So Is Intuition.
Claudia Perlich, chief scientist at Media6Degrees, an online ad-targeting start-up in New York, puts the problem this way: “You can fool yourself with data like you can’t with anything else. I fear a Big Data bubble.” The bubble that concerns Ms. Perlich is not so much a surge of investment, with new companies forming and then failing in large numbers.


5 Reasons 2012 Was a Great Year for Linux
The end of the year is always a good time to take stock of where things stand in any niche or field, and Linux is no exception. There's no doubt that there have been challenges for the free and open source operating system over the course of 2012--the Secure Boot challenge A comes immediately to mind--but so, too, have there been numerous successes.


The Most Misunderstood Aspect Of Great Leadership
A leader simply operates at their best when they understand their ability to influence is much more fruitful than their ability to control. Here’s the thing – the purpose of leadership is not to shine the spotlight on yourself, but to unlock the potential of others so they can in turn shine the spotlight on countless more. Control is about power – not leadership. Surrender allows a leader to get out of their own way and focus on adding value to those whom they serve.


Why Wasn’t 2012 The Year Of The G-Cloud?
Despite the tidal wave of interest in the Cloud, CloudStore, the government’s new initiative for procuring cloud services, also known as the G-Cloud, has been slow to catch on since its launch in February 2012. Considering its anticipated benefits, including ease of sourcing and procurement which offer a projected savings of up to £180 million by 2015, the government is hoping this is simply a matter of being slow off the starting block. This article looks at who is actually using G-Cloud, who isn’t and why not.


Is cloud threat for SMB channel partners?
According to Miglani, cloud computing cuts two ways for small SMB channel partners. It allows them to offer new kinds of services and solutions to their SMB customers without having to incur high initial capital expenditures. But automated service delivery via the cloud will also reduce the need for internal IT staff. As a result, SMB channel partners could lose more than 200,000 IT jobs over the next decade, said AMI Partners’ recent Cloud Computing Research studies.


Simon: Open-Source Speech Recognition
After years of hard work, the Simon team is proud to announce the new major release: Simon 0.4.0. This new version of the open source speech recognition system Simon features a whole new recognition layer, context-awareness for improved accuracy and performance, a dialog system able to hold whole conversations with the user and more.



Quote for the day:

"The ability to summon positive emotions during periods of intense stress lies at the heart of effective leadership." — -- Jim Loehr

December 24, 2012

Cloud-Powered GPS Chip Slashes Smartphone Power Consumption
A Microsoft Research project suggests that there’s a way for location chips inside smartphones to use far less power. Reducing the power consumption of GPS chips could not only extend the battery life of smartphones and tablets, it could also make it practical to add GPS functionality to more devices, including low-power remote sensors.


Excel: Data Model specification and limits
A data model is embedded data inside a workbook that powers data visualizations such as PivotTable, PivotChart, and Power View reports. This article documents the maximum and configurable limits for Excel workbooks that contain data models.


5 myths that hold back brainpower
Deepak Chopra and Rudolph E. Tanzi, explain that new discoveries and new thinking are helping people create a new “relationship” with their brains that help unveil new perceptions and new opportunities. In their latest book, Super Brain: Unleashing the Explosive Power of Your Mind to Maximize Health, Happiness, and Spiritual Well-Being, they explain that people need to acknowledge their roles as “leaders,” “inventors,” ‘teachers,” and “users” to their brains.


The Innovator's Straitjacket
A person in a straitjacket also loses the ability to do many other things, particularly creative tasks that require typing, drawing, manipulating objects, and so on. Even the sanest of companies can unintentionally put themselves in a straitjacket that makes it hard for them to create high-potential new growth opportunities. Here's how leaders unintentionally limit their innovation efforts.


Despite Apple, NFC is catching on -- just not for payments quite yet
Near Field Communication (NFC) is steadily making headway in the U.S. for sharing data and music among smartphones, but the technology faces years of slow growth as a replacement for physical wallets.


India's Lava aims for 100 mobile app patents
In an Economic Times report Sunday, SN Rai, the company's co-founder and director, said: "We have realized just by selling handsets it is not possible to maintain growth momentum. Innovation in product is key to survival. Our wishlist is to make a century of patents in the next 2 to 3 years."


4 Fantastic, Free Things Google Drive Will Now Do For You
Now, however, would be a good time to pay Drive some mind. Google has done impressive work making it easier to keep your files organized, share any file with anyone, and keep everything in your work life one search away. Very specifically, these are the things Drive can do for you at no cost, and requiring just enough effort to remember Drive can do that.


Splunktalk: Getting the Message from MOM
In many respects you can think of MOM as the glue that stitches heterogeneous enterprise computing environments together. Now why am I so interested in this ? Well, MOM and the messages transported represent a massive source of machine data that Splunk can index and resolve into operational visibility on many different levels..core operations , business analytics, transaction tracing etc..


Taking Healthcare IT Seriously Demands Culture Changes
Healthcare is moving cautiously into cloud computing, virtualization, BYOD and other IT innovations. And there's good reason for the caution. Until an organization's IT leaders take meaningful steps to change what's typically seen as a lackadaisical privacy and security culture, the risk of patient-information loss remains high and costly.


Boost up your serialization/deserialization similar to JSON
MessagePack is effectively JSON, but with efficient binary encoding. Like JSON, there is no type checking or schemas, which depending on your application can be either be a pro or a con. But, if you are already streaming JSON via an API or using it for storage, then MessagePack can be a drop-in replacement.


How Object Storage and Information Dispersal Address Big Data Challenges
Object-based storage offers an alternative approach that is ideally suited for storing massive amounts of unstructured data. Object-based storage systems are not organized hierarchically. Instead, an object is identified and located by its unique identifier. This enables the number of objects to grow substantially beyond the limitation of traditional file systems while still maintaining the integrity and consistency of the data



Quote for the day:

"The secret of business is to know something that nobody else knows" -- Aristotle Onassis

December 13, 2012

Future of Data Management
According to a recent Enterprise Management Associates end user research survey on Big Data, the future of data management platforms is with multi-structured data sets and flexible data schemas spread across multiple platforms.


Implementing IT Balanced Scorecard
The Balanced Scorecard as it has evolved over a period of time is being looked at not just as a performance measurement tool, but as a strategic planning and management system. This is because, the Balanced Scorecards can be cascaded down smaller business units including IT and aggregated upwards to the higher-level.


Working as a Software Developer
Henrik Warne gives his views on the main differences between professional software development and programming for a university course as part of his talk for the engineering students. Henrik talks about challenges with large-scale software development, several development practices used to cope with these challenges, ways to become a better programmer, and some fun facts from work.


Google has 'no plans' to build apps for Windows 8, Windows Phone 8
Speaking to V3, Google Apps product management director Clay Bavor said the firm has, "no plans to build out Windows 8 apps." Google already has a search application for the Windows 8 platform -- which it released just before the Windows 8 launch in October -- but will retain its focus on the iOS and Android platforms


Oracle Rolls Out New Database Security Package
The offering, Oracle Audit Vault and Database Firewall, provides both network traffic sniffing for security threats and audit data analysis. It also adds the ability to audit OSes, directories and other sources, beyond Oracle's database and third-party database systems, according to the company.


The Importance of Character and Presence
Two aspects of our work contribute to our success as change professionals: What We Do—the concepts, frameworks, processes, and techniques used when engaged with clients; Who We Are—our true nature…the substance of what we have to offer as human beings


Deep Dive: What's New in Hyper-V, Part 1
Windows Server 2012 brings so many changes to so many areas that it'll take months before we see how it all plays out in the marketplace. One thing is clear, however, with the new Hyper-V: Microsoft is taking on the competition head on. No longer content with being "good enough", they have leapfrogged VMware in several areas.


U.S. sees tech's 'center of gravity' shifting to Asia
By 2030, Asia "will have surpassed the North America and Europe combined in terms of global power, based upon GDP, population size, military spending and technological investment, the U.S. Office of the Director of National Intelligence report said. "China alone will probably have the largest economy, surpassing that of the United States a few years before 2030," the report said.


London buses to accept contactless NFC payment
The BBC reports that the Big Smoke’s 8,500 buses will be accepting payments through near field communication (NFC) technology, so passengers can swipe a debit or credit card to pay, as well as use a charge card through a mobile NFC reader.


Dell commits to open-source software for its future clouds
The company said its upcoming public and private cloud products will be built around OpenStack, a package of software for running clouds that has received broad backing from the technology industry from companies such as HP, Cisco, IBM, Red Hat and Intel.



Quote for the day:

"You must be single minded. Drive for the one thing on which you have decided." -- General George S. Patton

October 23, 2012

HP offers new low-cost SaaS service desk
HP officials say its SaaS product includes new approaches to service desk management, including social media collaboration tools that are integrated into the problem solving processes. It is promising to shorten, overall, time to resolution of a problem.


Google for Entrepreneurs: Bringing ideas together
The Google for Entrepreneurs site features a strong focus on helping businesses get off the ground in parts of the world which are still developing or are women/minority led. For instance, Women 2.0 focuses on female entrepreneurs, Eleven is oriented for Eastern Europe and the Arab Developer Network Initiative is geared towards Palestinians


Intel strives to develop tiny chips to run wearable computers
"Potentially, it could have graphics built in," he said. "Right now, it's early in the game so we're looking at what makes sense to put in there. You'd want to have some memory built in and maybe some graphics, because you'd want to have one chip ... maybe two chips, but size-wise you want to keep it small."


Online clues suggest a Skype surprise for Windows 8 and Surface
In all of this week's news about Microsoft's Surface with Windows RT, one app has gone practically unmentioned. Will a "modern UI" version of Skype play a starring role at next week's Windows 8 launch event?


Big data to create 1.9M IT jobs in U.S. by 2015, says Gartner
Big data, which refers to data collected and analyzed from every imaginable source, is becoming an engine of job creation as businesses discover ways to turn data into revenue, says Gartner. By 2015, it is expected to create 4.4 million IT jobs globally, of which 1.9 million will be in the U.S.


Facebook could become an enterprise ID system
Gartner analyst Earl Perkins noted that identities on the Web may be managed by Facebook. In retail, Facebook may be the ID gatekeeper. Perkins said that there's a socialization of identities and by the end of 2015, 30 percent of all new retail customer IDs will be based on social media.


Near Field Communication slips, slowly, into the mainstream
“Because Apple did not use NFC in the iPhone 5, phone makers such as Samsung, Nokia, Motorola and others are all doing a harder push for NFC,” he says. Indeed, a raft of new NFC phones are hitting the U.S. market, in phones that run on the Android and Microsoft operating systems.


How Enterprise Architecture helps SAP turn strategy into action
In 2009, SAP established the Enterprise Architecture (EA) function as part of the internal IT organization, bringing senior architects under a single leadership. At that time, IT investments were very tactical, and the IT organization was seen more as an order taker rather than a strategic value enabler.


How Strategic Planning relates to Enterprise Architecture
Strategic Planning means different things to different people. The one constant is its reference to Business Planning which usually occurs annually in most companies. One of the activities of this exercise is the consideration of the portfolio of projects for the following financial year, also referred to as Project Portfolio Management (PPM).



How to Rationalize Your Application Portfolio
A majority of enterprises have hundreds of applications deployed on their network, but most tend to actively use far fewer than that. This application bloat is a significant and growing problem that costs many organizations millions of dollars a year. Here's how to combat the application sprawl.


Brother’s All-in-One Printer Is a Small Idea
It claims to be the world’s smallest-depth all-in-one printer, copier and fax machine. The machine is 7.3 inches tall, 11.4 inches deep and 18.9 inches wide, weighing in at 20.5 pounds.



Quote for the day:

"As a leader, you're probably not doing a good job unless your employees can do a good impression of you when you're not around." -- Lencioni

September 26, 2012

Huawei sees smartphones leading growth in consumer devices
Huawei expects to ramp up its Android-focused product range with Microsoft Windows 8 phones and tablet PCs, and possibly also so-called phablets - phone/tablets. It is also considering developing its own smartphone operating system to distance itself from Android


How Good Technology Is Opening New Doors with NFC-Enabled Samsung Smartphones
So the company jumped all over the opportunity to become one of the first large enterprises to pilot the use of Near Field Communications (NFC) enabled smartphones for physical access to buildings and offices.


When Did Yoda Start Writing CEO Speeches?
Many business leaders speak using sentences that put key information at the end, Andrew McAfee of the MIT Sloan School of Management writes. "Instead of saying 'Our costs are rising' they'll say 'Things are not great right now, from a cost perspective,'" he explains. This isn't wrong grammatically, but it is unpleasant to listen to, he writes.


Law enforcement to identify & store millions of voices via Russian biometric software
The FBI believes voice biometrics will be a “reliable and consistent means of identification for use in remote recognition.” Deploying voice recognition requires no “special equipment” other than a good quality microphone which most of us have thanks to our mobile phones.


Hitachi claims glass data storage will last millions of years
Company researchers displayed the storage unit, consisting of a sliver of glass 2cm square and 2mm thick, which can hold 40MB of data per square inch, about the same as a standard CD. The data is written in binary format by lasering dots on the glass in four layers, but the researchers say adding more layers to increase storage density isn't a problem.


Reducers - A Library and Model for Collection Processing
Rich Hickey discuses Reducers, a library for dealing with collections that are faster than Clojure’s standard lazy ones and providing support for parallelism


The Story Behind Cloudera and Big Data
A talk with Doug Cutting, the founder of Apache Hadoop and creator of numerous successful open source projects, including Lucene and Nutch about his role with Cloudera and learned more about Big Data,training options for IT professionals interested in Big Data, and how Cloudera compares to Red Hat.


The Age of Big Data and the Death of Theory
Is the World Wide Web and modern technology… replacing the human mind? Knowledge today is not a set of theories, but instead just Data, and the machine is a better place to store data than the human mind.

Autonomous vehicles legalized in California
California has just joined Nevada and Florida among the states that now allow autonomous vehicles to drive on the states’ roads


Stand Out in Your Interview
You've just landed a job interview for a position you really want. Congratulations. Now, you know you only get one chance to impress, but how exactly do you do that? Given all of the conflicting advice out there and the changing rules of getting a job, it's no wonder that job seekers are confused about how to best prepare for and perform in an interview.



Quote for the day:

"Anger is never without Reason, but seldom with a good One." - Benjamin Franklin 

August 27, 2012

Three IT Best Practices for Better BI Integration
What usually happens is integration is done on a project-by-project basis, but all you have to do is look at business intelligence and analytics projects for proof organizations could benefit from a more thoughtful approach to integration.


How CIOs at Microsoft and Cisco Realigned IT For A New Era
Larger corporations with multiple operating companies, business units, or brands must confront a debate about the merits of centralized vs. federated organizational structures. The rationale for the former is often the desire to set common standards, create efficiencies, and leverage economies of scale by purchasing software and vendor services globally rather than locally, where possible. The rationale for the latter is often to have IT closest to where the business is done, to increase flexibility, and to efficiently deliver capabilities based on the unique needs of each individual entity.


Gartner: Cloud disillusions, NFC and big data to deliver on hype
‘Big data’ and mobile payments using NFC chips in smartphones are among the breaking technology set to deliver on their hype, while cloud computing is on “a path to disillusionment”, according to a study from Gartner.


A lesson in innovation from Apple's first interface trial
Apple last week won the first round of its patent fight against Samsung (and in the shadows, Google), and now the market questions whether there will be sufficient innovation in non-Apple mobile devices. Perhaps Apple's own history of innovation and legal fights over interface show that there are many ways to represent files and commands, and to do all the stuff we do.


Tapping into Consumer Sentiment on Social Networks
The basic technology employed for sentiment analysis, sometimes called opinion mining, is natural language processing, computational linguistics and text analytics. The idea is to both identify and extract subjective information from a variety of sources, including web pages, online news, internet discussion groups, online reviews, web blogs, and social media.


Java zero day allegedly spotted in the wild
Mushtaq was able to successfully test the exploit on a test machine running Firefox and the latest version of Java. He warned that it would be only a matter of time before a proof of concept was released for anyone to exploit the vulnerability, but it appears to have happened already.


OpenXava 4.5 Supports JPA Inheritance Mapping and Automated Business Logic
The latest version of OpenXava, a Java framework for rapid development of enterprise applications, supports all strategies of JPA inheritance mapping and the Automated Business Logic (ABL) library. OpenXava version 4.5 was released last month.


Do You Need a Chief Data Officer?
More organizations are selecting Chief Data Officers to help wrangle internal and external data. But is a CDO good for everyone?


12 IT Certifications That Deliver Career Advancement
In today's competitive IT job market having the right certification can help push your resume to the top of the stack or push you ahead of your colleagues when the opportunity for a promotion arises.


14 Things You Should Do at the Start of Every Work Day
“Having a good start to the day where you have greater control is critical in achieving better results, and ultimately greater career success,” says Lynn Taylor, a national workplace expert



Quote for the day:

"Success is one thing you can't pay for. You buy it on the installment plan and make payments every day." –-- ZigZiglar

July 15, 2012

Scalability Best Practices: Lessons from eBay
There are many facets to scalability - transactional, operational, development effort. In this article, I will outline several of the key best practices we have learned over time to scale the transactional throughput of a web-based system.


Traction mistakes
Most startups don't fail at building a product. They fail at acquiring customers. The biggest mistakes I see over and over again when startups try to get traction are as follows (in order of importance).


The next big UI challenge is making big data human
IBM’s Jeopardy-playing supercomputer Watson is now getting a gig in the retail banking sector as part of an IBM partnership with Citi. This is in addition to its position as a diagnostic assistant for doctors

XenServer Performance and Scalabilitiy Tuning
When more than 65 machines were loaded on a single XenApp host, it has been noticed that the dom0 was at capacity and the PVS driver showed poor throughput of 4MB/s or less. Once 65 VMs were loaded, the user experience dropped dramatically. This scenario is explained in an article on the Citrix Blogs.

Punk Marketing – An interview with Richard Laermer
Punk to this day still makes people feel alive and “punk marketing” is the same way. When something that happens makes people say “holy crap” they know that it’s something different and new and they can’t get enough of it.


Create interactive PDF documents with Scribus
Learn how to use the Scribus open source page layout application to create PDF documents, and then how to add interactive elements to those PDFs.


Fourteen year old creates a way to generate electricity from raindrops
The device takes energy from rain or snow and turns it into electricity that is stored on a capacitor. Wang entered the project in the Google Science Fairand now he is one of the finalists in the competition.


All there is to know about NFC
The Commonwealth Bank introduced its NFC app Kaching six months ago; the NSW Government recently released an NFC tourism initiative down at The Rocks; and RIM is integrating it into its newer smartphones.

Here's how to better leverage TOGAF to deliver DoDAF capabilities and benefits
... In fact, we have seen some of our clients position EA as the Enterprise Decision Support capability – that is, providing an architecture-grounded, fact-based approach to making business and IT decisions...



Quote for the day:

"If you're interested, you'll do what's convenient. If you're committed, you'll do whatever it takes." -- John Assaraf