Showing posts with label books. Show all posts
Showing posts with label books. Show all posts

Daily Tech Digest - April 06, 2020

How DevOps is integral to a cloud-native strategy

How DevOps is integral to a cloud-native strategy image
Containerisation allows applications to be made environment-agnostic and eliminates application conflicts between developers and operations teams, in turn allowing greater collaboration between developers and testers. Breaking down monolithic applications into constituent microservices also increases agility and creates a common toolset, terminology, and set of processes between development and operations teams, which makes it easier for these teams to work with one another. This enables the advanced automation of processes and contributes to an organisation’s move towards agile software development (defined by the continuous delivery of software created in rapid iterations). It’s important to stress that these technologies will only be successfully implemented if that cultural shift happens too, which is where embracing DevOps becomes key. Going cloud-native is a gradual process and a learning experience. Most organisations have established IT environments that use on-premise applications.


"An increase in state digital surveillance powers, such as obtaining access to mobile phone location data, threatens privacy, freedom of expression, and freedom of association, in ways that could violate rights and degrade trust in public authorities -- undermining the effectiveness of any public health response. Such measures also pose a risk of discrimination and may disproportionately harm already marginalized communities," the joint statement said. "These are extraordinary times, but human rights law still applies. Indeed, the human rights framework is designed to ensure that different rights can be carefully balanced to protect individuals and wider societies. "States cannot simply disregard rights such as privacy and freedom of expression in the name of tackling a public health crisis. On the contrary, protecting human rights also promotes public health. Now more than ever, governments must rigorously ensure that any restrictions to these rights is in line with long-established human rights safeguards." As part of the statement, the signatories set out eight proposed conditions for all governments to adhere to if increased digital surveillance is used to respond to the COVID-19 pandemic.


Fog and Edge Computing: Principles and Paradigms provides a comprehensive overview of the state-of-the-art applications and architectures driving this dynamic field of computing while highlighting potential research directions and emerging technologies. Exploring topics such as developing scalable architectures, moving from closed systems to open systems, and ethical issues arising from data sensing, this timely book addresses both the challenges and opportunities that Fog and Edge computing presents. ... The Cloud Adoption Playbook helps business and technology leaders in enterprise organisations sort through the options and make the best choices for accelerating cloud adoption and digital transformation. Written by a team of IBM technical executives with a wealth of real-world client experience, this book cuts through the hype, answers your questions, and helps you tailor your cloud adoption and digital transformation journey to the needs of your organisation. ... The updated edition of this practical book shows developers and ops personnel how Kubernetes and container technology can help you achieve new levels of velocity, agility, reliability, and efficiency.


Applications: Combining the old with the new


There are a few reasons why mainframes applications cannot be migrated to public cloud infrastructure easily. Cresswell says mainframe applications will not run on the underlying cloud hardware without significant refactoring and recompilation. “They are typically compiled into mainframe-specific machine code and the mainframe instruction-set architecture is substantially different from the x86 platforms that underpin almost all cloud services,” he says. “Legacy mainframe applications rely on infrastructure software to manage batch and online activity, data access and many other legacy mainframe features. Like the applications themselves, this infrastructure software is also tied to the physical mainframe hardware and will not run in a conventional x86 cloud environment.” Another barrier to migrating mainframe systems is that the mainframe software development pipeline cannot support many of the rapid deployment features that cloud-native applications rely on, says Cresswell, and it is virtually impossible to spin up testing environments on mainframes without extensive planning.


7 Key Principles to Govern Digital Initiatives


An important starting point is to take an inventory of digital initiatives. This may sound like a straightforward task, but it is often quite challenging. People are reluctant to share information for fear they may lose control over their initiatives. Thus, it is helpful to stress that the inventory phase is about the centralization of information about digital initiatives, not control over them. Fred Herren, senior vice president, digital and innovation at SGS, the world’s largest provider of inspection, testing, and certification services, understood that applying a top-down approach to rules rarely works in decentralized cultures. He noted, “I think it’s necessary to walk the talk rather than give instructions. I’ve managed to get a lot of information because I’m not telling employees to stop [their activities]. I walk around and ask people what’s new and I always react positively.” ... Establishing appropriate key performance indicators (KPIs) is a critical exercise, particularly for digital initiatives that are highly dependent on strategic priorities related to the company’s future vision, success, and implementation objectives. However, when we asked leaders how they measure the performance of digital initiatives, most of them answered in one of two ways: either “we don’t” or “it depends.”


Emerging from AI utopia

Embedded Image
Facial recognition is a good example of an AI-driven technology that is starting to have a dramatic human impact. When facial recognition is used to unlock a smartphone, the risk of harm is low, but the stakes are much higher when it is used for policing. In well over a dozen countries, law enforcement agencies have started using facial recognition to identify “suspects” by matching photos scraped from the social media accounts of 3 billion people around the world. Recently, the London Metropolitan Police used the technology to identify 104 suspects, 102 of whom turned out to be “false positives.” In a policing context, the human rights risk is highest because a person can be unlawfully arrested, detained, and ultimately subjected to wrongful prosecution. Moreover, facial recognition errors are not evenly distributed across the community. In Western countries, where there are more readily available data, the technology is far more accurate at identifying white men than any other group, in part because it tends to be trained on datasets of photos that are disproportionately made up of white men. Such uses of AI can cause old problems—like unlawful discrimination—to appear in new forms. Right now, some countries are using AI and mobile phone data to track people in self-quarantine because of the coronavirus disease 2019 pandemic. The privacy and other impacts of such measures might be justified by the scale of the current crisis, but even in an emergency, human rights must still be protected. Moreover, we will need to ensure that extreme measures do not become the new normal when the period of crisis passes.


Is Blockchain Necessary? An Unbiased Perspective

Is Blockchain Necessary? An Unbiased Perspective
Bankers hate blockchain. It’s obvious why they would; the greatest advantage of blockchain is that it cuts down on costs, only requiring infrastructure costs. No transaction fees, no maintenance charges, nothing. Effectively, blockchain makes banking obsolete, and honestly, I feel it should. The banking industry has remained unchanged over millennia. It is an integral part of society whose mismanaged monetary transactions have incited myriad wars. Unfortunately, the banking industry is in a pathetic state. Bankers have too much power, control and streams of revenue. It needs to topple. It’s a legacy system, and the pain points of this system haven’t changed since the days of Venetian merchants. There is so much abuse of power involved, and the fact that it is legal paints a grim picture. For example, the man who invented the credit card never wanted interest rates to go over 8%. Today, banks on average charge from 12% to 18% not including transaction, processing and various other fees. Blockchain can destroy and recreate this system. However, this brings us to the greatest chink in blockchain’s armor: This transformative process is expensive and decentralized.


Remote Working: What It Means For RPA


RPA still has considerable risks with remote working. If anything, companies will need to engage in even more planning with their systems. “Enterprise grade security needs to be baked into any RPA platform from the start, which helps provide greater resilience and business continuity,” said Jason Kingdon, who is the Executive Chairman at Blue Prism. There will also need to be more attention paid to managing bot development and deployment. Otherwise there could be much more sprawl across an organization, lessening the benefits of the technology. This is why its important to have a Center-of-Excellence or COE (you can learn more about this from one of my recent Forbes.com posts). “You need to have a group of champions who control the system, and monitor what bots are being built and who is building them,” said Tabakman. “It’s best to provide regular training around bot design and consider an approval process, where your champions review bots before they’re deployed. You’ll want to ensure that a bot being created doesn’t create more problems than it solves, such as bots that go into infinite loops, resulting in more work for IT teams.


Overcoming flat data to unlock business insight and productivity

Overcoming flat data to unlock business insight and productivity image
Artificial intelligence is eliminating entire swathes of manual intervention in the processing of documents, and, more importantly, adding context to them. It’s not enough to simply scan a document and store it along with a reference number: the technology must be able to add meaning to it and to create links with other related data, structured or unstructured. This type of technology falls into a category that we call Context Driven Productivity. At its core is the ability to extract information from flat data and transform it into semantic data, whereby links are created to other data sources, both internal and external, building relationships, connections and additional meaning. Semantic data allows humans or AI robots to gain contextual information automatically, rather than having to rely on a limited number of hard-wired connections. In practical terms, the possibilities are enormous. Not only will administrative workers be freed from the tedious task of manually processing incoming documents, but the resulting context-driven data will be infinitely more useful to any organisation.


How cloud computing is changing the laboratory ecosystem


Cloud computing allows labs to partake in immense computing processes without the cost and complexity of running onsite server rooms. Switching from an onsite solution to the cloud alleviates the costs of IT infrastructure, reducing the cost of entry into the industry, while also leveling the playing field for smaller laboratories. Moreover, cloud computing can allow data to be extracted from laboratory devices to be put in the cloud. Device integration between lab equipment and cloud services allows real-life data from experiments to be collated in a cloud system. One of the most popular products in the market is Cubuslab, a plug-and-play solution that serves as a laboratory execution system and collects instrument data in real time as well as managing devices remotely. This new collection of high amounts of data requires a centralised system that integrates the scientists protocols and experimental annotations. The electronic lab notebook, is starting to become a common tool in research by allowing users to organise all their different data inputs and retrieve this data at any point. This also allows for large R&D projects to effectively control data over their scalability potential.



Quote for the day:


"The art of communication is the language of leadership." -- James Humes


September 07, 2015

4 new cybercrime trends threaten your business

Hackers aren't sending attachments to everyone, though. The difference in this reincarnation of a tried-and-true tactic is that cybercriminals are targeting businesses, and sometimes masking as requests or files coming from within the company. They’re even sending them at a time when you'd expect to receive such a missive. "We see the highest point of entry on Tuesday at 10 a.m. local time, when everyone is really busy," Epstein says.  Clay Calvert, director of cybersecurity for MetroStar Systems, says that hackers are often searching for the names of comptrollers or CFOs from company websites – typically available on "about us" pages – and then sending them emails pretending to be from a higher up in the company. They're the targets because they control the money.


Apple and Cisco partner to bolster iOS in the enterprise

"The corporate market is one in which the Apple brand still has a strong pull with employees. It also allows them to sustain a prime premium that has become a little harder to sustain in the consumer market" because of competition from more inexpensive Android devices, he said, adding that strong employee demand for the iPad, in particular, is a market Apple wants to preserve. Cisco, which in turn benefits from its association with a popular name brand, can help do that. "It is a good partnership for both companies and helps Apple gain more credibility in the enterprise," agreed Gartner's Baker.


Who Will Own the Robots?

Those who are inventing the technologies can play an important role in easing the effects. “Our way of thinking as engineers has always been about automation,” says Hod Lipson, the AI researcher. “We wanted to get machines to do as much work as possible. We always wanted to increase productivity; to solve engineering problems in the factory and other job-related challenges is to make things more productive. It never occurred to us that isn’t a good thing.” Now, suggests Lipson, engineers need to rethink their objectives. “The solution is not to hold back on innovation, but we have a new problem to innovate around: how do you keep people engaged when AI can do most things better than most people? I don’t know what the solution is, but it’s a new kind of grand challenge for engineers.”


Is IT service continuity only for the rich?

Start on your IT continuity plan by creating an asset database of the enterprise's applications. For most organizations, continuity doesn't mean mirroring all the same applications with the same user experience as the primary infrastructure. Instead, the business needs to be able to continue with core processes until the main data center is back on line. A mission critical application running on a physical server must continue operating despite an outage, but it may not need to be replicated as a physical system. Running the app as a virtual machine allows IT to spin up the image rapidly when needed and provide a good-enough user experience as a stop-gap measure. A workload that is not deemed mission critical, for example a payroll or purchasing program, may be disregarded during outages.


Connectedness for the mainframe in the application economy: blessing or curse?

While this is simply one vector into a system, it’s possible to create a product (or put it into an existing product such as CA Auditor for z/OS) that can scan for these vulnerabilities on a system, plug them and report on the number of times these attempts were blocked. Last but not least, such news about technical exploits helps, but there is a huge cultural and communication barrier for mainframe security professionals in getting the broader organization and the rest of the security community to understand the risk. There is still a culture of denial or, “Wait my mainframe has never been compromised.” This is why we believe the mainframe reframed discussion is a timely and thoughtful conversation we need to have as a community.


The Internet of Things comes to the NFL

"Every NFL stadium is connected to a command center here in San Jose," Stelfox says. "That command center has to operate as sort of a central command of all the data. When the data is collected in the stadium, it's sent in the stadium to the broadcaster in the stadium — it never leaves the stadium from a broadcaster perspective — but it's also distributed out to the NFL cloud." All that happens in under a couple of seconds. "The command center is our point of clarity," she says. "We can see every tag on every player from San Jose when the game is live. If there's something that goes wrong, we know about it very quickly and we have dual recovery. All of that is controlled from a single point of coverage in San Jose."


10 ways IT can use self service

Like user ID issuance and renewals, data retention is another area where policies are manually executed. Decisions on how long to keep accounting, HR, manufacturing, sales, and other data are made in separate meetings between IT and these areas' managers—and the meetings can be long and tedious. A self-service approach to data retention could eliminate these one-on-one meetings. IT would send out an annual update screen to each area end-user manager that lists the area's data resources and current data retention policies and ask managers to either sign off on existing policy to continue it or to make changes. This self-service update could then be sent to the IT data administrator. The transaction log from data retention reviews could be stored for auditors to review when they check on data governance.


Enterprise data architecture strategy and the big data lake

The data lake takes a fundamentally different approach to data storage than the conventional data acquisition and ingestion method. The traditional method seeks to make the data conform to a predefined data model to create a uniform data asset that is shared by all data consumers. By normalizing the data into a single defined format, this approach, called schema-on-write, can limit the ways the data can be analyzed downstream. The approach that is typically applied for data stored in a data lake is called schema-on-read, meaning there are no predefined constraints for how the data is stored, but that it is the consumer's responsibility to apply the rules for rendering the accessed data in a way that is suited to each user's needs.


Case study: How Ebury took a cloud-first approach to delivering financial services

“We’re very aggressive in terms of adding value as fast as possible to our customers, and we would experience friction with them if we weren’t able to quickly make the decisions we need to or we would fail fast in terms of trying things out if we were slowed down by having to provision additional servers and on-premise hardware,” he says. It is this kind of attitude to business agility that has shaped the firm’s cloud-first approach to IT, which has markedly accelerated since Young joined the firm a year ago. “When I joined, we had most of our kit running in Rackspace, but there was no cloud approach at all regarding the desktop or other applications that don’t necessarily sit in the datacentre,” he says.


Q&A on the Book Agile Impressions

There are so many ways of people working well together that it's easier to tell when they're not working well together. The most common symptom I see is what you asked about previously: does each party make themselves readily available to work on the other's issues? If not, they're not even working together, so they're clearly not working well together. Do they know each other's names? They don't need to be best buddies, but they must treat each other with respect. When they're meeting together, do most questions get answered? The answers don't have to be what the questioner wanted to hear, but are their questions responded to, not ignored? Those are the signs I see most often that two parties are not working well together.



Quote for the day:

"Leadership cannot just go along to get along. Leadership must meet the moral challenge of the day." -- Jesse Jackson

June 24, 2015

Oracle's biggest database foe: Could it be Postgres?
Gartner, for example, forecasts that more than 70% of new in-house applications will be developed on an open-source database by 2018, and that 50% of existing commercial RDBMS instances will have been converted to open-source databases or will be in process. In other words, open-source databases are almost certainly cutting off Oracle's oxygen when it comes to new applications, but it may also be cutting into its hegemony within existing workloads. If true, that's new. Though from a biased source, an EnterpriseDB survey of Postgres users certainly suggests that Postgres users are running the venerable open-source database for increasingly mission-critical workloads, including those that used to pay the Oracle tax:


Infographic: Must Read Books in Analytics / Data Science
There are 2 attributes all the members in our team at Analytics Vidhya share: We all are voracious readers; and We all love to share our knowledge with people in simplified manner, so that everyone gets access to this knowledge. These two attributes lead us to naturally gravitate towards sharing some of the best reads we come across. You can think of this infographic as an ideal list of books to have in bookshelf of every data scientist / analyst. These books cover a wide range of topics and perspective (not only technical knowledge), which should help you become a well rounded data scientist.


Snowflake Launches Virtual Data Warehouses On AWS
Snowflake isn't a data warehouse of big data dimensions or routine enterprise data dimensions. Rather, it's a virtual data warehouse that will be sized to match the job sent to it. When the analytical tasks are finished, the warehouse shuts itself off to save overhead. "In other cloud data warehouses, you would have to unload the data to turn it off and then reload it [to use it again]," he said. Snowflake avoids that data movement task. Although Snowflake runs on AWS at its US West facility in Oregon, customers may use Snowflake without an AWS account. They also don't need to understand the ins and outs of Amazon virtual machine selection.


Report Template for Threat Intelligence and Incident Response
When handling a large-scale intrusion, incident responders often struggle with obtaining and organizing the intelligence related to the actions taken by the intruder and the targeted organization. Examining all aspects of the event and communicating with internal and external constituents is quite a challenge in such strenuous circumstances. The following template for a Threat Intelligence and Incident Response Report aims to ease this burden. It provides a framework for capturing the key details and documenting them in a comprehensive, well-structured manner. This template leverages several models in the cyber threat intelligence (CTI) domain, such as the Intrusion Kill Chain, Campaign Correlation, the Courses of Action Matrix and the Diamond Model.


Startup’s Lightbulbs Also Stream Music
The speaker bulb, which twists into a standard-size light socket, contains white and yellow LEDs, the brightness or dimness of which coördinates wirelessly with other Twist bulbs that contain just LEDs. Astro, which plans to ship the gadgets early next year, says a starter pack with two LED bulbs, a speaker bulb, and a handheld dimmer switch will cost $399, reduced to $249 for two months to encourage people to sign up. While companies like Philips Hue focus on automating and customizing the lights themselves, Twist is among a handful of companies thinking of the lightbulb as a conduit for wireless audio, too. The company says it plans to add additional functions in the future as well.


Why It's Worth Divorcing Information Security From IT
Too often, when Security reports to IT, we find the IT mentality interferes with security processes and priorities. These days, there is little to no common ground between keeping IT systems up and running for authorized users and monitoring them for signs of compromise by smart, stealthy criminals. Identifying and securing an already compromised system requires the capability to differentiate malicious activity from normal behavior, and hackers are very good at making their activity look normal. The only way to find them is through a combination of new technologies and human judgment. Being a subdivision of the IT department makes security blind to important business processes and to decision making at the corporate and department level.


Aligning Private Cloud and Storage: 4 Considerations
Firstly, the private cloud offers a greater degree of control than the public cloud, especially with data. When you build a private cloud, you’re able to keep your data at your fingertips, establish performance levels that your organization demands to best serve end-users and customers and set security policies that align with your customer responsibilities or industry regulations. Secondly, private cloud gives you more control of applications. Most public clouds require apps to fit their cloud mould, but a lot of businesses have unique, custom-made applications and recoding these applications to fit the public cloud is not a good solution.


Finance Hit by 300 Times More Attacks Than Other Industries
As can be expected, cyber-criminals are working hard to ensure their attacks are as successful as possible, firing a large volume of low level threats at their targets in order to distract IT security professionals while the main targeted attack is launched, Websense said. Obfuscation, malicious redirection and black hat SEO have become popular of late, although patterns apparently shift on a month-by-month basis – again to improve success rates. Targeted typosquatting is also making a comeback in the sector, usually in combination with social engineering as part of spear phishing attacks designed to compromise a host or trick a user into instigating a payment or transfer of money, the report claimed.


Mobile app testing for fun and profit
"If you're doing testing for a mobile website you can more or less use the same tools as you would when just testing out a normal website with your browser," Prusak said. "Ultimately, it should still work with your browser, and there are plug-ins and extensions which work with today's browsers which you can modify HTTP headers or even the resolution and make the backend still think you're connecting on a mobile device." "I'm aware of a plethora of different solutions and all of them require either jail-breaking the device or installing software on your computer and then pointing your phone or device to your computer and using that as a proxy," Prusak said. He sees these solutions as rife with issues, inefficient, and too complex.


Why You Should Definitely Migrate Existing Apps to the Cloud
100% security is an illusion. If you have to make a decision based on the available choices, cloud services are in no way less secure than any of the existing systems in place. Cloud service providers are known for their innovations. It is apparent that at any point in time they would implement better physical and logical security practices than a standalone on-premise data center operation. Many cloud providers are now ISO, PCI DSS, EU Model Clauses and other global security agencies certified. Moreover not all the applications require a bank grade security. Do they? In case you’ve highly sensitive data or your app is subjected to specific security & privacy regulations (such as HIPAA and HITECH) you can opt for Hybrid Cloud Service



Quote for the day:

"The time is always right to do what is right." -- Martin Luther King Jr.

December 17, 2014

Developers Hold the Keys to Unlocking the Cloud
Since programmers coming out of college have been using cloud computing, they have a natural transition to coding in the cloud when they are hired by an enterprise or start their own company. Advanced software tools available to any developer provide an interface that is consistent and easy to use. Since everyone is working on the same platform, it is easy to get help by speaking to a developer in the next cubicle or with a text message to an associate.  By using advanced software tools on cloud platforms, developers can get access to the latest security technology. They can focus on writing code to do what they want to do and then they can figuratively bolt on the security features at the end.


The Theory of Data Trust Relativity
The first take-away is that data governance is having an affect on data use by establishing data quality reports to guide data trust. However, there is a noticeable divide for big data analytics and the data scientist who rely on tribal input and not evidence. If we take data quality's impact on the results and risk of using dirty data for decision making off the table for a minute (stay with me now!) how does this affect data trust? Our survey brought in a small number of executive level business professionals. The number is too low to be quantitative, but it does give directional insight.


Top five books for IT professionals in 2014
Information security, IT governance and IT service management are the dominating topics for our audience in 2014. Brought to the market by our publishing imprint, IT Governance Publishing, the following five books were the best sellers in 2014 across all of the regions we currently serve. We are happy to share this success with you, our blog followers. If you are looking for a useful (and pleasant) read during the festive period, why not take advantage of the following?


Sony’s smart glass uses regular glasses, aims for sports and work
The unit clips round the back of the user’s head, attaching to each of the glasses’ temples. Sony is working on a software development kit (SDK) so people can make hands-free information apps for the thing – the Japanese firm reckons it will be ideal for sports and factory work, and could even be paired with a high-quality action camera to make it easier to check the angle of view. Although the pictures of the device that Sony released on Wednesday suggest otherwise, the module doesn’t have its own camera. Indeed, a Sony spokesman told me that the images are of a prototype and do not represent the finished product.


Cloud Adoption Driven by Reliability, Business Continuity
Patterson noted cloud adoption is moving from the early adopters and development oriented organizations to the more traditional, legacy workloads. "We look forward to more applications being written for the cloud, but the economics and overall convenience of cloud will bring in more and more line of business applications as well," he said. "Our survey shows that security is still one of the biggest concerns when looking at cloud or colocation, but the last few years have proved that cloud is just as secure as a private data center, and in many cases, more so." The study found security continues to be a key priority when enterprise organizations look at migrating IT workloads to either an IaaS model (61 percent) or when considering colocation services (58 percent).


KPMG: Data Security Still Top Cloud Concern
"While the challenge posed by cloud related data loss and privacy threats are less pronounced in the minds of global industry leaders, they are still taking the issue seriously," said Rick Wright, principal and global cloud enable leader at KPMG, in a prepared statement. "The clear trend in the data that we have collected shows that, even in the face of significant media attention paid to recent data breaches, global leaders are still willing to embrace the transformative potential of the cloud." Security may be a concern, but there are other factors that are driving adoption of cloud computing technologies.


Cloud computing helps make sense of cloud forests
The researchers want to unravel the impact of micro-climate variation in the cloud forest ecosystem. Essentially, they want to understand how the forest works—how carbon dioxide, water, nitrogen, and other nutrients cycle through plants, animals, and microorganisms in this complex ecosystem. To do so, they've placed some 700 sensors in 15 forest plots, locating the devices at levels throughout the forest, from beneath the soil to the top of the canopy. The integration of such a vast number of sensor data streams poses difficult challenges. Before the researchers can analyze the data, they have to determine the reliability of the devices, so that they can eliminate data from malfunctioning ones.


Workflows of Refactoring
Martin Fowler keynotes on the need for refactoring and different ways to approach it. You can view here part 2 of this presentation. Martin Fowler is an author, speaker, consultant and general loud-mouth on software development. He's the Chief Scientist at ThoughtWorks - an international application development company, and has written several books on software development and also writes articles regularly.


Finding Maturity in Your Metadata Strategy
The elusive concept here is the connection between all of these new and often repetitive ways of revisiting our information. Organizations continue to struggle with the need to map, the need to interpret and, ultimately, the need to identify. We’ve reached the world of “Metadata 2015.” Because our data will always exist in more than one place it is separated in some way, yet it is similar or absolutely the same in another. Most of us may think we are seeing things differently when we look at these fragmented pieces – whether in the cloud, in stored and downloaded segments, or on our devices. Often this is the case, but sometimes it really is not.


Tools for Project Management and Collaboration
Tools are great! We experiment, test, recommend, and implement tools frequently for clients. But, as you know, implementation and adoption can be two very different things. And even (or perhaps especially) with IT professionals, adoption can be a challenge. Why? IT pros are smart and often feel that the way they do things is the "best" way. They have their tools, and they tend to like them. They are busy and don't want to be bothered adopting a new system or tool. However, at some point, you are the boss. I like to provide leeway in the method, but I do need some standards. To that end, my team and I had several conversations where their input was requested and accepted.



Quote for the day

"The quality of a man's life is in direct proportion to his commitment to excellence, regardless of chosen field of endeavor." -- V. Lombardi

November 19, 2014

The Resurrection of Product Risk Analysis
The risk management described here aims at identifying risks connected with the development and implementation of an information system. The risk is the probability that development and implementation will cause measurable economic damage to the company, and perhaps also will cause other, less measurable damage. Damage could be that the results of a project are less favourable than expected or that the organisation will suffer direct or indirect loss. Risks extend beyond IT and concern the business, too.


The Web Isn't Dying, But Control Is
Apple's control of content in iOS apps is too much. If Apple wishes to continue to censor apps based on content, it should license third-party iOS stores or at least adopt Google Play's less fussy content policy. There's no reason native apps should be treated any differently from books or films when it comes to lawful content. There's no reason Apple should be able to reject an app with lawful content. With web apps, this isn't an issue; no permission is required to publish a web app. The issue isn't so much that the web is dying; it's that too many people prefer autocratic convenience over the web's messy democracy.


When will this madness stop?
Designing, building and launching digital products and services usually involves multiple areas of the organisation working together to create something new and innovative. Being a digital business means being a joined-up business. Digital does not stop at functional boundaries; it flows through the organisation to create integrated offerings and a seamless customer experience. A business with silos, whether organisational, data, systems or any other type, will struggle to survive in the digital age. Just because marketing is spending an increasing amount on technology does not mean there is a need for a marketing technology strategy.


IT needs to stop pretending it's not responsible for cloud security
So whole IT departments will use public cloud for their own work, but refuse to update perimeter security or network monitoring enough to let them see web apps, let alone encrypt that traffic and possible secure them? Who is supposed to do that, if not IT? Seventy-nine percent of IT people polled by Forrester in May of 2014 said end users should be primarily responsible for securing data in the cloud. That doesn't mean IT thinks users are responsible; no one in IT thinks users are responsible.


Cybercrime and spam are far bigger security threats than you think
"There are very few types of cybercrime that exist in a vacuum. Most forms of cybercrime are in some way connected to others. For example, nobody runs a botnet or robs bank accounts without taking steps to hide their true internet address. Usually to do that they are using hacked computers to route their traffic through, they are probably using hacked servers to store the stolen data, and then they are using money laundering networks to cash out transactions."


Keys To Collaborating Over A Business Network
The real potential for transformation comes from the ability of a business network to enable trading partner collaboration not just for invoice processing, but also for management of related documents such as catalogs, contracts, purchase orders, order confirmations, change orders, service entry sheets, freight line items, advance ship notices, payment status, and payment remittance. This means that, from one platform, in the cloud, you can streamline essential collaborative business processes from procurement through payment. At the same time, you can improve compliance by driving more orders off catalogs and simplifying the matching of invoices to purchase orders, contracts, and service entry sheets.


7 Important Tech Regulatory Issues In 2015
The Internet is now a central engine of society and must allow for continued innovation and development, Robert Atkinson, president of the Information Technology and Innovation Foundation (ITIF), told InformationWeek. "To this end, net neutrality rules should be tailored to allow for a case-by-case approach to prioritization, and network management that allows for some subtlety and nuance in regulation. This is to be preferred to an over-broad, proscriptive rule grounded in Title II regulation for the telephone era that would likely limit the Internet's potential to become the multi-purpose platform it promises to be," he said.


Overcoming Hurdles to Integrating Analytics with Operational Processes
Acceptable speed-of-response rates differ between operational and analytical use cases. Often operational processes require some real-time processing. Think of going to the grocery store or ordering a product or service, you expect this particular process to take place in real time. When you use an online or mobile application, your tolerance for slow response actually goes down. With the ability to change providers/applications quickly, it is important to match the expected speed of response with the performance of the application. This means that if you integrate analytics directly into operational processes, the speed of analytical response needs to match the real-time nature of most operational processes.


A Preview of C# 6
Mads Torgersen, C# program manager at Microsoft, published a short video presentationdescribing what is coming in the next major C# version, C# 6. Among C# 6 new features, Mads highlighted getter-only properties, the lambda-arrow operator, string interpolation, and more. First off, says Mads, C# 6 will not change C# design philosophy and will mostly provide many small features that will help clean up code.


Time for Data-Driven Intuition
The book The House Advantage: Playing the Odds to Win Big In Business (Jeffrey Ma) should be required reading for anyone working in the data management and business intelligence fields where we often oversimplify the business decision-making process by saying it’s either data-driven or intuition-driven—and strongly emphasizing that using data is always better than using intuition. Although Ma is definitely an advocate for data-driven decision making, toward the end of his book he also acknowledges that there are times when somewhat of a middle ground between data and intuition is called for.



Quote for the day:

"Consider spending more time setting the conditions for things to go right than dealing with things that go wrong." -- @ShawnUpChurch

December 24, 2013

Don’t jump the SQL ship just yet
Times are changing. RDBMS are continually evolving and embracing new features, standardising them in ANSI SQL, obsoleting JPA 2.x. In these times of change, JPA standardisation seems limiting to those who innovate in the data storage market. EclipseLink’s recent flirt with supporting MongoDB through JPA extensions shows that the standards people are not quite sure where we’re heading. But one thing seems certain. We won’t get rid of SQL so quickly. So why not start embracing it again?


Target hackers try new ways to use stolen card data
Fraud experts say the location information will likely allow buyers of the stolen data to use spoofed versions of cards issued to people in their immediate vicinity, Krebs wrote. "This lets crooks who want to use the cards for in-store fraud avoid any knee-jerk fraud defenses in which a financial institution might block transactions that occur outside the legitimate cardholder's immediate geographic region," he said.


For cloud providers, fraud detection is integral part of business plan
"All of the advantages of the cloud for enterprises are the advantages for the bad guys," said Jeff Spivey, international vice president of ISACA, a founding member of the Cloud Security Alliance (CSA) and president of Security Risk Management Inc., a Charlotte, N.C., information security consultancy. "It's that anonymity and scale that's attractive to the fraudsters." Without proper cloud-based fraud detection and prevention practices in place, cloud providers can become unwitting hosts for cybercriminals.


Establishing a Process to Evaluate Ideas
Innovation is one of the keys to business success. If you don’t innovate, your business will suffer. If it isn’t made obsolete by competition, it will likely end up as a commodity business with little to distinguish it from competitors. And yet, not every new idea that a business comes up with is going to be a good one. As companies mature, many establish a process to evaluate ideas. It might be about coming up with new products or it might be finding new ways to create customer engagement.


JSFeat - JavaScript Image Processing Library
Modern JavaScript is fast, fast enough to do real time image processing. JSFeat is a JavaScript library that implements some advanced image processing and the demos prove it does it in real time. JSFeat is an open source library (MIT License) that you can download and use in almost any browser. ... What is even more impressive is that JSFeat doesn't just implement the simple image processing you find in other libraries - it also does some cutting-edge object tracking and detection.


Getting Value out of Agile Retrospectives - A Toolbox of Retrospective Exercises
This pocket book contains many exercises that you can use to do retrospectives, supported with the “what” and “why” of retrospectives, the business value and benefits that they can bring you, and advice for introducing and improving retrospectives.  Agile retrospectives are a great way to continuously improve your way of working. Getting actions out of a retrospective that are doable, and getting them done helps teams to learn and improve.


When Agile BI is Not Agile
The spirit of Agile isn’t meant to enforce rules enterprise-wide. BI projects in particular are very different than operational applications. General operational applications (and I’m sure I’m even generalizing those) seem to benefit a little more from a cookie-cutter, standardized approach. You can imagine a mobile application where you want to add a feature that allows users to tap an icon that display a customer’s shipping address. It’s relatively straightforward to know what the user wants, update the tables and code to provide that feature, and then demonstrate the existing app to a user.


Requirements, Estimation and Planning: Steps to work with Agile software development projects
This article is about requirements, estimation, and planning in agile software development projects. Agile estimation is often seen as being invaluable, yet others dismiss it as waste. The reasons for this disagreement can be traced to disparities in the Scrum and Lean-Kanban ways of working. Everybody in software development has the same goal: rapid, reliable, low risk delivery of high-quality, valuable functionality to users. So what will help them to achieve their goal? Just coding?


Vectorization, SIMD Architecture: What You Need to Know
One of the approaches to parallel programming is vectorization, which is a way of performing batch operations all with a single assembly language instruction. In the first article of a new series, Jeff Cogswell walks you through the basics of vectorization with the Intel processors. ... To fully understand vectorization, you have to know a bit about processor architecture and assembly language.


Security researcher cancels talk at RSA conference in protest
The researcher said he didn't expect EMC or the conference to suffer as a result of the alleged deals with the NSA. Nor did he expect other conference speakers to cancel. Most of the speakers at the conference are American so why would they care about surveillance that's not targeted at them but at non-Americans, Hypponen wrote. Surveillance operations by U.S. intelligence agencies are targeted at foreigners, he added. "However I'm a foreigner. And I'm withdrawing my support from your event," the Finnish researcher wrote.



Quote for the day:

"The best thing workers can bring to their jobs is a lifelong thirst for learning." -- Jack Welch

August 03, 2012

Forecast for systems administrators: CloudyThe traditional sysadmin role is changing, thanks to cloud computing and virtualization. Here's how to ensure you have a job in 5 years.

“Big Data” Presents Big Opportunities for Firms and CFOs
Big Data has increased the demand for information management specialists, while dramatically increasing the potential for visionary professional growth and positioning. CPAs are perfectly suited to take a leadership role in deciphering and using Big Data to achieve strategic business goals.

Why Tax Directors’ Heads Should Be in the Cloud
So what’s the harm? “If the tax department isn’t involved early, an organization can end up creating substantial risk and missing out on tax-planning opportunities,” says Fortier. A change to a company’s cloud arrangement could make it ineligible for tax benefits, in particular, or it could very easily swing the return on investment of the whole project negative, he notes.

Huawei checking claims of flaws in its routers
Huawei Technologies said on Thursday it was verifying claims that its routers contained critical vulnerabilities, after security researchers disclosed alleged problems last weekend.

The robotic datacentre: Is this the future of the cloud?
Looking further ahead, Frankovsky imagines "a truly automated warehouse environment" where machines automatically service and swap out hardware. However Frankovsky said that this type of datacentre lies beyond 2020.

Sony Developing a Microsoft Surface-Inspired Tablet
The new device will also include a Tegra 3 Processor from NVIDIA, support Android 4.0 or a more recent iteration, come with a wide arrange of storage options (16GB, 32GB, or 64GB), contain 3G connectivity and offer 10 hours of Wi-Fi battery life.

100 Books Every Entrepreneur Should Read
Reading these quintessential business books is going to be my MBA. So, not only should you read these books – you should take notes and execute as much of what you learn as you can.

Power Up Your Leadership Effectiveness With Skilled Decision Making
One thing is for sure – a leader’s decision-making impacts credibility. So, take a moment now to think about your decision-making. Why take a moment? Decision-making is so natural, so automatic many of us aren’t aware of our decision-making style let alone how skilled we may or may not be.

Revisiting Information’s ROI
One common measure of success in IT has been based on dollars spent and time to return on investment. That approach can bring some level of visibility to our spending effectiveness, especially on the cost reduction side in headcount and overhead. But that kind of return isn’t really based on the value of information.


Quote for the day:

"A leader is someone who can do everything him(her)self, but let's other people help him(her)." 
-- Don Rittner