Showing posts with label hadoop. Show all posts
Showing posts with label hadoop. Show all posts

Daily Tech Digest - April 14, 2021

How far have we come? The evolution of securing identities

With internal, enterprise-facing identity, these individuals work for your organization and are probably on the payroll. You can make them do things that you can’t ask customers to do. Universal 2nd Factor (U2F) is a great example. You can ship U2F to everyone in your organization because you’re paying them. Plus, you can train internal staff and bring them up to speed with how to use these technologies. We have a lot more control in the internal organization. Consumers are much harder. They are more likely to just jump ship if they don’t like something. Adoption rates of technologies, like multifactor authentication, are extremely low in consumer land because people don’t know what it is or the value proposition. We also see organizations reticent to push it. A few years ago, a client had a 1 percent adoption rate of two-factor authentication. I asked, “Why don’t you push it harder?” They said that every time they have more people using two-factor authentication, there are more people who get a new phone and don’t migrate their soft token or save the recovery codes. Then, they call them up and say, “I have my username or password but not my one-time password.


Informatica debuts its intelligent data management cloud

As data becomes more valuable, so does data management, Informatica argues. Its IDMC offers more than 200 intelligent cloud services, powered by Informatica's AI engine CLAIRE. It applies AI to metadata to give an organization an understanding of its "data estate," Ghai explained. The "data estate" tells you about the fragmentation of data -- its location and the various domains of data. "And through that insight," Ghai said, Informatica will "automate the ability to connect to data, to build data pipelines, process data, provision it for analytics... to apply advanced transformations to cleanse that data and trust it... to match, merge and build a single source of truth." From there, the platform aims to make data more accessible to business users with features like the "data marketplace." With the marketplace, users can "shop for data" much as one would shop for consumer goods on the Amazon marketplace, Ghai explained. The IDMC is micro-services based and API-driven, with elastic and serverless processing. It's built for hybrid and multi-cloud environments. The platform is already running at scale, processing more than 17 trillion transactions each month.


Microservices in the Cloud-Native Era

With developer tools and platforms like Docker, Kubernetes, AWS, GitHub, etc., software development has become very approachable and easy. You have a monolithic architecture and three million lines of code. Making changes to the code base whenever required and releasing new features was not an easy task before. It created a lot of dilemmas between the developer teams. Finding the mistake that was causing the code to break was a monumental task. That’s where microservices architecture shines. Many companies have recently moved from their humongous monolithic architecture to microservices architecture for a bright future. There are many advantages of shifting to microservices architecture. While a monolithic application puts all of its functionality into a single code base and scales by replicating on multiple servers, a microservices architecture breaks an application down into several smaller services. It then segments them by logical domains. Together, microservices communicate with one another over APIs to form what appears as a single application to end-users. The problem with a monolithic application, when something goes wrong, the operations team blames development, and development blames QA.


Modern Data Warehouse & Reverse ETL

“Reverse ETL” is the process of moving data from a modern data warehouse into third party systems to make the data operational. Traditionally data stored in a data warehouse is used for analytical workloads and business intelligence (i.e. identify long-term trends and influencing long-term strategy), but some companies are now recognizing that this data can be further utilized for operational analytics. Operational analytics helps with day-to-day decisions with the goal of improving the efficiency and effectiveness of an organization’s operations. In simpler terms, it’s putting a company’s data to work so everyone can make better and smarter decisions about the business. As examples, if your MDW ingested customer data which was then cleaned and mastered, that customer data can then by copied into multiple SaaS systems such as Salesforce to make sure there is a consistent view of the customer across all systems. Customer info can also be copied to a customer support system to provide better support to that customer by having more info about that person, or copied to a sales system to give the customer a better sales experience.


The Microsoft-Nuance Deal: A new push for voice technology?

Microsoft has had its hand in voice technology since debuting its virtual assistant Cortana in 2015 as part the initial Windows 10 release. Since then, Cortana has evolved to support Android and iOS devices, Xbox, the Edge browser, Windows Mixed Reality headsets, and third-party devices such as thermostats and smart speakers. According to Microsoft, Cortana is currently used by more than 150 million people. More recently, the company shifted Cortana to position it as more of an office assistant rather than for more general use. “Voice recognition is gaining momentum and will be used in every type of industry — from transcription to command-and-control types of applications — and acquiring a leading vendor in this area just makes sense,” Pleasant said. She stressed that as users become familiar with Cortana, Siri and Amazon's Alexa at home, they expect to see similar speech-enabled technologies at work. She also noted that Microsoft is one of the few companies with the resources to acquire a company like Nuance, allowing it to jump ahead of rivals who might have wanted to do the same thing.


Get your firm to say goodbye to password headaches

In a passwordless environment, no password storage or management is needed. Therefore, IT teams are no longer burdened by setting password policies, detecting leaks, resetting forgotten passwords and having to comply with password storage regulation. It’s fair to say that for many helpdesk teams, password reset requests will be the most commonly asked-for thing (from users). Past research has determined that for some larger organizations, up to $1 million per year can be spent on staffing and infrastructure to handle password resets alone. Resetting passwords is probably not a particularly complex issue for most IT departments to deal with, but it’s the sheer number of requests makes handling these requests an extremely time-consuming task. Just how much time does that take away from helpdesks on a daily, weekly or monthly basis? It’s one of those hidden costs that your firm will be incurring that can be streamlined by giving people passwordless connections into their environment. Passwords remain a weakness for those trying to secure customer and corporate data and passwords are the number one target of cyber criminals.


Modernising the insurance industry with a shared IT platform model

Pockets of the insurance industry are heading this way, by, for example, using vehicle trackers that reward good driving with lower premiums. But behind the scenes for many organisations is a mass of hugely complex products and equally unwieldy legacy systems that don’t provide them with the ability to work in a way that is agile and digital-first. Assess your systems as they stand today and you may find that several, or possibly hundreds, have been redundant for some time. Eliminating these systems, which are nothing more than drains on the business’ resources, will allow for a greater level of agility. By moving away from cumbersome legacy systems that are no longer fit for purpose, insurers can create a simplified system that unifies silos, making everyday work more efficient, and saves the business money. Money that they can reinvest into creating a customer-centric company that can rival its strongest competitors. Imagine a world where you could simplify your product range, providing cover for the highest number of people with the fewest number of insurance products.


5 Great Ways To Achieve Complete Automation With AI and ML

The self-healing technique in test automation solves major issues that involve test script maintenance where automation scripts break at every stage of change in object property, including name, ID, CSS, etc. This is where dynamic location strategy comes into the picture. Here, programs automatically detect these changes and fix them dynamically without human intervention. This changes the overall approach to test automation to a great extent as it allows teams to utilize the shift-left approach in agile testing methodology that makes the process more efficient with increased productivity and faster delivery. ... This self-healing technique saves a lot of time invested by developers in identifying the changes and updating them simultaneously in the UI. Mentioned below is the end-to-end process flow of the self-healing technique which is handled by artificial intelligence-based test platforms. As per this process flow, the moment an AI engine figures out that the project test may break because the object property has been changed, it extracts the entire DOM and studies the properties. It runs the test cases effortlessly without anyone getting to know that any such changes have been made using dynamic location strategy.


Apache Software Foundation retires slew of Hadoop-related projects

ASF's Vice President for Marketing & Publicity, Sally Khudairi, who responded by email, said "Apache Project activity ebbs and flows throughout its lifetime, depending on community participation." Khudairi added: "We've...had an uptick in reviewing and assessing the activity of several Apache Projects, from within the Project Management Committees (PMCs) to the Board, who vote on retiring the Project to the Attic." Khudairi also said that Hervé Boutemy, ASF's Vice President of the Apache Attic "has been super-efficient lately with 'spring cleaning' some of the loose ends with the dozen-plus Projects that have been preparing to retire over the past several months." Despite ASF's assertion that this big data clearance sale is simply a spike of otherwise routine project retirements, it's clear that things in big data land have changed. Hadoop has given way to Spark in open source analytics technology dominance, the senseless duplication of projects between Hortonworks and the old Cloudera has been halted, and the Darwinian natural selection process among those projects completed.


DNS Vulnerabilities Expose Millions of Internet-Connected Devices to Attack

In a new technical report, Forescout and JSOF describe the set of nine vulnerabilities they discovered as giving attackers a way to knock devices offline or to download malware on them in order to steal data and disrupt production systems in operational technology environments. Among the most affected are organizations in the healthcare and government sectors because of the widespread use of devices running the vulnerable DNS implementations in both environments, Forescout and JSOF say. According to the two companies, patches are available for the vulnerabilities in FreeBSD, Nucleus NET, and NetX. Device vendors using the vulnerable stacks should provide updates to customers. But because it may not always be possible to apply patches easily, organizations should consider mitigation measures, such as discovering and inventorying vulnerable systems, segmenting them, monitoring network traffic, and configuring systems to rely on internal DNS servers, they say. The two companies also released tools that other organizations can use to find and fix DNS implementation errors in their own products. 




Quote for the day:

"Coaching isn't an addition to a leader's job, it's an integral part of it." -- George S. Odiorne

November 07, 2013

Is tiered storage obsolete? Yes and no!
While the economic angle for SDS is interesting, when I listen to enterprise customers and service providers talk about software defined storage, what I mostly hear is a desire to eliminate storage-specific management from application workflows. At a recent industry event, I heard from application and virtual infrastructure admins who want to provision, manage and protect appsusing terms they understand, without requiring intervention by storage professionals.


Putting the ‘Service’ Back Into IT Service Management
When it comes to ITSM, it is extremely important that you understand who your customers and suppliers are. It is equally important that you understand that in your daily job, you can be both a supplier and customer. Every interaction between a customer and a supplier is a “Moment of Truth”. In that moment, you have the opportunity to alter your customer’s entire perception of you, your company and the service you provide. So it’s important that expectations are properly set, service is delivered in a consistent manner, and that you demonstrate empathy for the client.


Different paths to cloud and SaaS enablement yield similar major benefits
The next VMworld innovator panel discussion focuses on how two companies are using aggressive cloud-computing strategies to deliver applications better to their end users. We'll hear how healthcare patient-experience improvement provider Press Ganey and project and portfolio management provider Planview are both exploiting cloud efficiencies and agility. Their paths to the efficiency of cloud have been different, but the outcomes speak volumes for how cloud transforms businesses.


How to analyze hedge fund risk with sparse data
To get around the lack of data or the short data sets, we can use factor models, exposure data or some other type of proxy mechanism. We can also support our decision making by building factor benchmarks or style factors for regression analysis using data that’s available on a daily basis – such as stock and market index data. This helps us understand equity, credit, currency and volatility exposures, as well as some style exposures such as momentum or value versus growth.


SanDisk’s wireless flash drive: A simple storage boost for your iOS or Android phone
SanDisk also makes a Wireless Flash Drive app you can download to use the drive with your phone or tablet. Once you’ve downloaded the app, simply press the lone button on the drive that looks like a Wi-Fi signal to turn it on, then connect to it as you would with any other Wi-Fi connection (it will show automatically show up in your available networks once you turn it on – the drive uses 801.11 b/g/n).


Insight-Driven Innovation
Indeed, innovation will always require risks, some that can’t be quantified, and some that will demand imagination and insight on a very human level. Data will help shape and guide risk-taking, giving direction and clarity to innovative thinking. It provides a basis for the confidence that business leaders need in order to assess viable options, select the ones with the highest probability of success, and put them into action – quickly.


OLTP Clearly in Hadoop's Future, Cutting Says
Cutting didn't don a wig or fancy robe when he made his predictions about the future of Hadoop during a speech at the Strata + Hadoop World conference last week. He didn't wave a magic wand or use a crystal ball. Instead, the plain-speaking technophile made his points by tapping into his own vast repository of knowledge on the topic. Oh, and PowerPoints. "I don't have a time machine. I can't see the future any better than you can," Cutting said. "I'm a guy who, in the past, looked at the present, looked at facts, and decided what to do next. I'm not attempting to look too far down the road."


Google security team drops F-bombs on NSA for internal Google cloud data surveillance
Even Eric Schmidt, former CEO of Google, said if it’s true that the NSA is spying on Google data centers then it’s “outrageous” and “perhaps illegal.” Schmidt told the Wall Street Journal, “The steps that the organization was willing to do without good judgment to pursue its mission and potentially violate people's privacy, it's not OK.” Then he added, “There clearly are cases where evil people exist, but you don't have to violate the privacy of every single citizen of America to find them.”


New server processors and the lower-power, more-memory IT roadmap
Processor designs now highlight efficiency over raw speed; an efficiently designed server processor handles workloads faster and with less power than a monolithic, do-everything processor -- a work-per-watt measurement rather than pure speed. Server processors will diversify in their purpose and functionality, with more emphasis on system-on-a-chip (SoC) designs. By tailoring processors for specific jobs, rather than putting every function into every model, chip makers achieve better performance even at slower clock speeds and lower power draw.


Gartner: Global companies should stick to only two data centres on each continent
Gartner analyst Rakesh Kumar said many firms had too many data centres as a result of business expansion, either organically or through acquisitions over many years. Kumar said, "Having too many data centres results in excessive capital and operational costs, an overly complex architecture and, in many cases, a lack of business-IT agility."



Quote for the day:

“The strength of the team is each individual member. The strength of each member is the team.” -- Phil Jackson

May 24, 2013

An Information Architecture Vision: Moving from Data Rich to Information Smart
This free White Paper based upon global best practices in business and government assesses the “big data” problem, proposes business and architecture visions, and develops an Enterprise Information Planning and Architecture Model. The vision and model will assist companies to systematically develop their information holdings and related services to achieve business value.


Analyzing updated man-in-the-browser attack techniques
The updated man-in-the-browser (MitB) attacks, referred to as universal man in the browser (uMitB) by Trusteer, allow an attacker to capture any data entered into a Web browser. The new functionality operates much like a general keystroke logger and provides similar data for keystrokes entered into a Web browser.


12 Disruptive Technologies That Are Changing The World
McKinsey's Global Institute discusses this in its latest report, Disruptive Technologies: Advances that will transform life, business, and the global economy. It came up with a list of 12 technologies that could have a potential economic impact between $14 trillion and $33 trillion a year in 2025. The authors write that "some of this economic potential will end up as consumer surplus


Ten IT-enabled business trends for the decade ahead
Big data and advanced analytics have swiftly moved from the frontier of our trends to a set of capabilities that need to be deeply embedded across functions and operations, enabling managers to have a better basis for understanding markets and making business decisions. Meanwhile, social technologies are becoming a powerful social matrix—a key piece of organizational infrastructure ...


Conducting the Agile Interview
Finding the right people to work in an agile shop takes just as much energy and enthusiasm as it does to actually work there. Our Agile Architect shares some of his thoughts and techniques for a more-than-the-normal interview. ... For developers, the shared problem will take the form of a pair programming exercise. Most interviewees have never done formal pair programming


U.S. urged to let companies 'hack-back' at IP cyber thieves
U.S. companies should be allowed to take aggressive countermeasures against hackers seeking to steal their intellectual property, contends the private Commission on the Theft of American Intellectual Property. ... "Effective security concepts against targeted attacks must be based on the reality that a perfect defense against intrusion is impossible," the IP commission said.


Western Digital releases its first 1.5TB mobile drive
The HGST three-platter Travelstar 5K1500 offers 50% more capacity than currently shipping 1TB 2.5-in. 9.5mm HDDs and 200% more capacity than single-disk 500GB 7mm or 5mm 2.5-in. HDDs, the company said in a press release. The drives also displayed better performance than HGST's current 5400rpm, two-platter drives, according to tests the company performed with PCMark Vantage and PCMark 7.


Data warehouse performance killers -- and how to avoid them
In the 10-minute podcast, McKnight further discussed the performance issues that can affect data warehouse systems and how to sidestep or mitigate them. Listeners will: Learn about some of the major factors that can slow down a data warehouse environment; Hear McKnight's take on whether the growing focus on big data ratchets up the potential for performance problems in data warehouses.


Moving from Partial Views to AJAX Calls
The biggest issue is that they're a mix of data and presentation -- HTML presentation, to be exact. Now, HTML is quite ubiquitous and is available on a wide range of platforms and devices, but let's be honest -- not all consumers of HTML treat it the same way (I'm looking at you, Internet Explorer!). The tools are available to help me generate custom HTML based on the currently connected client, but I like my presentation to be lightweight.


Expanded Hadoop use cases will drive need for new enterprise features
Hadoop performance can be creaky at times. The technology can be hard to program and is by no means crash-proof. Like any relatively new software, it doesn't come with a lot of tools for managing its operations. To top off a quick list of Hadoop limitations: It isn't an out-of-the-box fit for analytics applications, which are becoming perhaps the major use case for Hadoop data.



Quote for the day:

"When handled correctly, genuine innovations are the lifeblood of any company's continued health and success." -- Michael Graber and Jocelyn Atkinso

April 25, 2013

Oracle: Renewed Security Focus Will Delay Java 8
In a blog posted Thursday, Mark Reinhold, chief architect of the Java Platform Group, wrote that maintaining Java security "always takes priority over developing new features," which is why some features planned for Java 8 slipped past Milestone 6 (M6) at the end of January, the original feature-complete target.


Six open source security myths debunked - and eight real challenges to consider
Detractors of open source software often point to its broad developer base and open source code as a potential security risk. But that's not a fair assessment, according to Dr Ian Levy, technical director with the CESG ... Open source is no worse or better than proprietary software when it comes to security, according to Levy, who busted myths about open source security — and detailed its genuine security challenges — at the Open Source, Open Standards conference in London last week.


Cisco's new director-class storage switch boosts throughput 6X
The MDS 9710 replaces the Cisco 9500 series as Cisco's top director-class storage switch. The 9500 series offered up to 256Gbps of total throughput, ... The MDS 9710 offers a total of 24 terabits per second of switching capacity for Fibre Channel connectivity and offers Cisco's highest fault-tolerant capabilities with fully redundant (N+1) fans, switching fabrics, and power-supplies or grid redundancy.


Look out, Oracle: SkySQL and MariaDB join forces
On April 23, SkySQL announced that it had signed a merger agreement with Monty Program Ab, MariaDB's parent company. The aim of this new company, which will go under the name SkySQL, is to develop MariaDB into a truly interoperable "NewSQL" open-source database in collaboration with its customers, partners, and the community. The community side will continue as the MariaDB Foundation.


How does advanced malware use the network against you?
"Attackers can change the domain every day, and that's how malware works, and they're able to hide their communication and evade detection by an intrusion prevention system (IPS) or security gateway," Newman said. But by closely watching the communications of all of the devices within a network, Damballa, FireEye, RSA and other vendors are profiling this type of behavior, using a technique often referred to as advanced threat protection.


The CIO 'can't be an order-taker'
The global economy seems to be recovering, albeit slowly, and it therefore follows that the tremendous pressure—financial, technological, existential—on companies' IT organizations will ease. Right? Wrong. Well, maybe. It all depends. Three senior executives—Freddie Mac CIO Robert Lux, Evercore Partners managing director of equity research Kirk Materne, and Blackstone CTO Bill Murphy—gathered here at theBloomberg Enterprise Technology Summit to tease out the real role of the CIO in the modern business, debate best practices for the IT organization and offer solutions for future success.


Hadoop Usage Poised to Explode
The TDWI survey, based on a sample of 263 respondents, suggests that Hadoop adoption could ramp up very quickly: for example, more than one-quarter (28 percent) of respondents expect to be managing production deployments of HDFS in the next 12 months. Others expect their Hadoop deployments to come online more gradually: 24 months (13 percent), 36 months (10 percent), or more than three years (12 percent).


Gauging BYOD acceptance
A whopping 35% of the shops surveyed say consumerization of IT will have a dramatic positive impact on user satisfaction over the next 12-18 months. Another 47% say it will have a moderately positive impact, which, taken together, means more than 80% of the IT folks surveyed see BYOD as a big win. User productivity also scores high, with 76% saying consumerization will have a moderate or dramatic positive impact, while 70% expect the same benefit for business agility, and 69% say consumerization will dramatically or moderately improve process efficiency/collaboration.


Perception is Reality: 8 Steps for Changing How Others See You
The “perception is reality” adage is most often applied to the way each of us sees our own environment. If we see the glass as half full, we will operate from that reality and the glass will always be at least half full. But what if we turn that adage inside out? What if the reality we’re experiencing is due in part to how others perceive us?


Are developers really skilled up for the cloud?
“Developers - when they build an in-house-only solution, in my experience - don’t think a lot about security and the security of that data or that application. That has been the major difference between things we put on-premise only and the things we’re going to put in the cloud,” Hackland said. “The developers are going to have to take into account the integrity and the security of that data. There are probably lots of other [skills issues] but that’s the thing that immediately jumps to mind for me. It’s a different skillset - or a different thinking at least - for the developers as we make that transition,” he said.



Quote for the day:

"Some people change their ways when they see the light; others when they feel the heat" -- Caroline Schoeder

March 23, 2013

Gartner Recommendations for BlackBerry 10
As BlackBerry’s BlackBerry 10 device becomes available in the U.S. this week, Gartner Inc. analysts say enterprises must determine user demand, address BYOD support, forecast the health of the BlackBerry business and decide whether to upgrade the BlackBerry Enterprise Service.


Why the Best CEOs Listen More
Listening is an essential, yet often overlooked aspect of business communication. Entrepreneurs and senior executives are naturally filled with ideas, and it’s our nature to want to share those ideas with others. But great leaders over time learn to talk less and listen more. There are many benefits of listening. Here are four benefits that executives gain by listening


How Digital Behavior Differs Among Millennials, Gen Xers and Boomers
Millennials have the highest social networking penetration of any generation, and the highest Facebook and Twitter use rates to match. Though Twitter started out with a somewhat older audience, millennials now make up more than half of all US users, and will hover around that point for the next several years. They also account for about four in 10 digital video viewers.


Podcast: Hadoop vendors progress toward enterprise-ready solutions
In this SearchStorage.com podcast, associate site editor Ian Crowley speaks with Evaluator Group senior partner John Webster about the progress Hadoop vendors are making toward offering viable enterprise products for managing and processing "big data." Listen to the podcast or read the transcription below to find out more about the state of Hadoop architecture
.

Dell Attracting More Buyout Interest
Blackstone’s interest in Dell, the world’s third-largest PC maker, is considered more serious than that of HP or Lenovo, said one of the people familiar with the situation. As of last night, no one had submitted a proposal or letter to the board for consideration, said another person with knowledge of the situation. The board would have to receive something by March 22 and then determine whether the interest would reasonably lead to a higher offer, this person said.


VMware introduces new Unity Touch clients for mobile Windows
In a post on the VMware End-User Computing blog, Pat Lee, director of product management for end-user computing, introduced Unity Touch clients for VMware Horizon View 2.0. The Unity Touch clients will let users of iOS and Android devices browse and search files, open Windows applications and files. It requires VMware Horizon View 5.2 desktop, she wrote.


Big Data Analytics As A Service, With An Ontology For Cross-Platform Analysis At Its Core
“There is a lot of opportunity for partners to develop and extend the ontology into niche areas that set up for the analysis and types of transactions where we don’t have expertise,” Manish Singh says. Rapid deployment of new ontologies by partners is possible, he says, because they can layer on top of what’s already there vs. building from scratch each time. “Our concept of rapidly deployed ontologies is the ability to have an ecosystem of partners,” he says.


Bretford Releases Enterprise Guide for iOS Deployments
A vendor of iOS charging/synching products has released an interactive e-book that offers businesses an approach to configuring and managing iPads, iPhones and iPods. "iOS Deployment: A Guide to Managing iPad, iPhone and iPod touch in Your Organization" is available a free download from Apple's iBookstore. The digital guide was created with iBooks Author, and designed so that it accept updates as the iOS product line changes in the future, according to the vendor, Bretford Manufacturing.


Innovation: Five Keys to Educating the Next Generation of Leaders
What do educators need to provide for the next generation of positive, innovative leaders? If core competencies are assumed (engineers need to engineer, accountants need to account, writers need to write and so on) what will be the key elements of an education that might help students become life-long learners, successful in multiple, varied career paths? Here are five critical elements that every student should be looking for in an educational journey . . . and educators should be looking to deliver.


DHS shifting to cloud, agile development to boost homeland security
At a hearing before the House Committee on Homeland Security on Tuesday, a DHS IT official gave lawmakers an overview of agile development methodologies, one of the tools that the department is using to fix its IT project management. Agile came up after U.S. Rep Ron Barber (D-Ariz.), a former staffer in Rep. Gabrielle Gifford's office who won that seat after Giffords resigned, asked what DHS was doing to ensure that its IT systems met user needs.



Quotes for the day:

"If you are afraid of failure you don't deserve to be successful!" -- Charles Barkley
"The consumer is the most important part of the production line." — W. Edwards Deming

March 20, 2013

Use a tiered storage model to achieve capacity utilization efficiency
Storage expert Jon Toigo discusses the challenges associated with implementing a tiered storage model, and how it can help manage storage capacity demand and lead to a more efficient data center. Storage tiering  is not a new idea. It refers to configuring data storage infrastructure as a set of "tiers," where each tier comprises a collection of media (memory, disk or tape) having distinctive performance, capacity and cost characteristics.


Microsoft extends Azure Hadoop, mobile app development functionality
To simplify the roll out of big data applications, Microsoft is offering a public preview of the new HDInsight service for Windows Azure, according to Scott Guthrie, corporate vice president in Microsoft's Server and Tools Business. HDInsight lets users deploy, manage and use Hadoop clusters running on Windows Azure, he said in a blog post.


Tips for making use of the Google Web Toolkit
The goal of GWT is to enable productive development of high-performance web applications without the developer having to be an expert in browser quirks, XMLHttpRequest, and JavaScript. The overview and description will cover the built-in tools found within the kit, and will highlight the Plugin for Eclipse, Speed Tracker, GWT Designer, and GWT SDK.


Templating in Javascript
The most common way of defining a template is to use a script tag. By giving it a type of “text/template” (some engines use different types, but it shouldn’t make too much of a difference), you tell the browser that it shouldn’t consider the contents of the script tag as javascript, so it won’t try to run it and go boom. In fact, it will quietly ignore the element, allowing you to define your template inside


BIDS Templates Come to Visual Studio 2012 in SSDT Update
SQL Server Data Tools (SSDT) encompasses a bunch of integrated services and enhancements to improve database development entirely from within the Visual Studio IDE, such as incorporating functionality found in BIDS and SQL Server Management Studio (SSMS), among a host of other features. Prior to this, the BI templates were available only in Visual Studio 2010, SSDT 2010 or SQL Server 2012.


Microsoft Excel tips from Mr. Excel
Bill Jelen, publisher of MrExcel.com, explains one of his favorite Microsoft Excel tips for finance in this video from CFO Rising East 2013. He also discusses the benefits of PowerPivot and explains how to obtain it in different versions of Excel.


The CIO and CMO: An Integrated Approach
Technology now underpins and shapes the entire customer experience, from the delivery of marketing campaigns to the aggregation of analytics and insights. The amount of raw consumer data now available is a major challenge for today’s CMOs; making sense of it, while trying to justify their marketing spend to guarantee ROI, is even harder – especially without a strong bond to the CIO.


With shared infrastructures, security must move with the data
“Really it comes back to security,” Karmel said, “which has to be baked in, not bolted on, at all the different layers of compute, network, storage, and the hypervisor.” IT administrators have to put a set of software-defined security controls around the information that has to be protected. ... The security rules move across physical and virtual infrastructures, giving administrators a single place for enforcement of security controls across DOE and national laboratory environments.


3G and 4G USB modems are a security threat, researcher says
Most 3G/4G modems used in Russia, Europe, and probably elsewhere in the world, are made by Chinese hardware manufacturers Huawei and ZTE, and are branded with the mobile operators’ logos and trademarks, Tarakanov said. Because of this, even if the research was done primarily on Huawei modems from Russian operators, the results should be relevant in other parts of the world as well, he said.



Quote for the day:

"Concentration comes out of a combination of confidence and hunger."-- Arnold Palmer

March 17, 2013

Disruptive Technologies – a closer look
Big Bang Disruptions throw many enterprises out of business. Enterprises need to have a strategy to face these disruptive innovations. In this presentation we will go over some such disruptive innovations happened in the past to understand what it is and how some companies have faced these disruptions successfully. We sill also have a look at some of the potential disruptive technologies that are in the making.


AMD's New Laptop Chips Inspired By Mobile Devices, Gaming Consoles
The chips are aimed at laptops and other devices in which screens can be detached for use as tablets. The chips will compete with Intel's Core existing processors based on the Ivy Bridge microarchitecture and its future chips based on the Haswell microarchitecture, which will be introduced for laptops and tablets this year.


Rising Above the Tide of Emerging Technologies
“How to not only stay afloat, but ahead of emerging technology trends” As an IT professional how do you keep your head above water when the rising tide of technology keeps rolling towards you, wave after wave. In this session we will take a look at some of the key emerging technology trends and drivers that are impacting the “business” of IT and help you find a safe harbor to not only help you stay on top of, but ahead of these fast moving technology waves.


Design Pattern Automation
Software development projects are becoming bigger and more complex every day. The more complex a project the more likely the cost of developing and maintaining the software will far outweigh the hardware cost. There's a super-linear relationship between the size of software and the cost of developing and maintaining it. After all, large and complex software requires good engineers to develop and maintain it and good engineers are hard to come by and expensive to keep around.


How Ford is Putting Hadoop Pedal to the Metal
“For us, it all boils down to functionality; big data is a problem that we need to get over to get to the analytics, but we need flexibility and ease of use so we can just get right to extracting the data and applying our analytics on the backend.” At the core of this statement is what will really differentiate vendor offerings for Ford’s Hadoop engine;


Why Is Apple’s Stock Falling?
The market scene purely reflects the sentiments from Apple's shareholders. Investors are dumping their stock as financial pundits and growth investors are predicting that Apple's growth seems far too limited, given the current scenario. While several investors are still keen on seeing Apple enter and revolutionize another product category. So when some investors dump their stock (and these are the big ones), someone else must take it and these are - more of price conscious buyers - who won't put a great price tag on the stock.


Project Management and Portfolio Management: The Balance of Your Business
What’s more important to your business, project management or project portfolio management? The simple answer is that they both matter, of course. But don’t brush the question aside – the precise balance between project management and project portfolio management (PPM) in your business can make all the difference to your bottom line.


CSOs must adopt new risk management trends
Security managers are working with senior executives in all divisions across their organizations to move away from compliance-focused thinking towards a risk-based approach to information security. The shift requires senior management and C-level executives to think about risk strategically versus simply crossing off regulatory check boxes.


Interview and Book Excerpt: Mastering the Requirements Process
Suzanne and James Robertson authored the 3rd edition of their book Mastering the Requirements Process. This edition includes material focused on the challenges of requirements in modern project environments, including agile and outsourcing relationships. They present a number of Fundamental Truths which underlie their approach.


Walmart Makes Big Data Part of Its DNA
Walmart started using big data even before the term big data became known in the industry and in 2012 they moved from an experiential 10-node Hadoop cluster to a 250-node Hadoop cluster. At the same time they developed new tools to migrate their existing data on Oracle, Netezza and Greenplum hardware to their own systems. The objective was to consolidate 10 different websites into one website and store all incoming data in the new Hadoop cluster.



Quote for the day:

"The state of your life is nothing more than a reflection of your state of mind." -- Wayne Dyer

March 01, 2013

A Practical Glossary and Discussion of Relevant Terms, Concepts, Models, and Measures
An important aspect of ERM is the strong linkage between measures of risk and measures of overall organizational performance. Thus, this glossary begins with a description of some key corporate performance measures, after which successive elements of the ERM process (risk assessment, measurement, modeling, management applications, monitoring, and oversight) are described.


OLTP Performance of Exadata vs SSDs vs Violin Memory Flash Array
Ashminder Ubhi writes about his experience of running some performance tests against Exadata, SSDs and Violin Memory. The approach was to test the storage performance of the three configurations so he used the great SLOB OLTP type benchmarking tool developed by Kevin Closson. SLOB is very easy to setup and each test run is always consistent unlike some of the other available tools.


Being more agile with Acceptance Test-Driven Development (ATDD)
ATDD seems to offset the increase in development efforts since it allows the whole team to collaboratively discusses acceptance criteria, with examples, and then distills them into a set of concrete acceptance tests before development begins. This ensures that everyone has the same shared understanding of what is actually being built. It may also facilitate a better shared understanding and definition of what it means to be Done.


Five smartphone and tablet trends from Mobile World Congress
This year's MWC may have been lacking in high-end smartphone launches, but the "W" stands for "world" and lower-cost models shown this week are needed to open up the mobile-phone market to more people globally. Here are some of the trends that indicate where the smartphone market is headed.


What's wrong with the Gartner Hype Cycle for Cloud Computing, 2012?
There is a big difference between the description of phases of the cycle on the curve, such as "Trough of Disillusionment," and the report's table of contents, which labels sections by describing the transition between phases. The curve shows Infrastructure as a Service (IaaS) on the upslope of the trough, yet Gartner places it in a section titled "Sliding in to the Trough." This creates two very different perceptions.


An introduction to Firefox OS for mobile developers: Q&A with Andreas Gal, Mozilla
With the first device manufacturers expected to launch Firefox OS devices at Mobile World Congress this month and with major network operators inline to release them to consumers in early 2013, Mozilla’s new operating system (OS) is starting to make waves. Firefox OS is open-source, Linux-based and Web-friendly. mobiForge gets the low-down from Mozilla’s vice president of mobile


Applying big data approaches to information security a challenge
Unlike conventional security approaches that are focused largely on blocking attacks, the new approaches emphasize breach detection and response almost as much as breach prevention. The goal is to help companies block the threats they can while helping them detect and respond to the ones they miss. Instead of deploying point products and perimeter defenses, companies need to adopt a security model that is based on actual threats and threat intelligence, Coviello said.


New Hadoop distributions proliferate
Just in time for the O'Reilly Strata conference, three companies in the tech world have announced new distributions of Apache Hadoop, the open-source, MapReduce-based, distributed data analysis and processing engine. Hortonworks Data Platform (HDP) 1.1 for Windows,EMC/Greenplum Pivotal HD, and the Intel Distribution for Apache Hadoop have all premiered this week on the big data stage.


Asian users go DIY with BYOD
Companies in Asia are not rendering enough IT support to help employees use personal devices for work as part of the bring-your-own-device (BYOD) movement. This is pushing workers to find their own ways to access corporate networks or data via their gadgets, and inadvertently risks creating security holes for potential company data loss or theft.


Microsoft Strikes Back At Amazon With Windows Azure Community Portal
Microsoft unveiled the Windows Azure Community portal, which provides dozens of popular open source applications and language runtimes contributed by partners. Even more recently, Microsoft took this a step further and made the images from the portal available directly in the Azure console, so they can be easily deployed onto Azure infrastructure. By making it easier to deploy third-party apps on its cloud, Microsoft is helping to grow its own ecosystem while increasing the utilization of its infrastructure.



Quote for the day:

"The meeting of preparation with opportunity generates the offspring we call luck." -- Anthony Robbins

February 27, 2013

What's the Real Truth About IT Process Automation?
One thing to keep in mind is you get what you pay for. Although ancient advice, it still makes sense, especially in today's confusing world of enterprise software applications and IT process automation. As you approach your "crawl, walk, run" to ITPA, consider selecting a platform that scales. Plan for success so when you start "running," your gear can carry you the distance.


Application-specific passwords weaken Google's two-factor authentication, researchers say
The problem is, "ASPs are -- in terms of enforcement -- not actually application-specific at all!" the Duo Security researchers said Monday in a blog post. "If you create an ASP for use in (for example) an XMPP chat client, that same ASP can also be used to read your email over IMAP, or grab your calendar events with CalDAV."


Knowledge | Part 4: Influencing Right Action with the Right Insight
This video examines the drivers and emerging best practices of having the right knowledge for: Voice of the Customer Feedback: Knowing how to move satisfied customers to long-term loyal and committed partners;  Internal Team Feedback: Measuring the impact of your customer facing resources; Relationship Data Points: Measuring the alignment between your organization and the Customer; Strategic Account Plans: Developing an ongoing internal/external account review strategy; and Joint and Balanced Scorecards: Closing the loop with metrics on collaborative customer/supplier performance


Are Cyber Attacks on the Rise?
It's clear that the sophistication and determination of cyber attackers continues to rise dramatically. A months-long investigation by The Times last week alleges the origin of a spate of attacks coming from the Chinese military, a charge its government vehemently denies despite a deep trove of evidence pointing its way including a 76-page report from the cyber security consultancy Mandiant, based on extensive research.


How To Embrace Change In Today’s Organizations
When it comes to successfully leading today’s organizations, one skill that’s been growing in importance and need is the ability to manage change. While many of us have read about various organizations to understand how they’ve dealt with change, Tanveer Naseer shares an experiment done with crows to highlight some key lessons we can glean from this research on how to embrace change.


The role of software-defined networks in cloud computing
SDN is increasingly accepted as the path to "cloud networking," meaning the transformation of networks and services to support the use of cloud computing on a massive scale. Navigating the various missions and technology models of SDNs is critical to properly position cloud services and realize advantages of cloud computing.


Samsung Knox – An IT Perspective
Samsung KNOX is a tremendous step forward and is something both Jamie and her IT counterpart should be excited about. For Jamie it means IT does not fuss with her personal stuff, but she gets access to the information she needs from the hot new smartphone or tablet she actually wants to carry. For IT KNOX means a more secure version of Android with secure boot, government-grade encryption of data at rest and in transit, and the ability to completely isolate business content from personal content in a secure container.


Intel Releases Hadoop Software Primed for its Own Chips
The Intel Distribution for Apache Hadoop includes core pieces of the data analysis platform that Intel is releasing as open-source software, as well as deployment and tuning tools that Intel developed itself and which are not open source. Organizations will be more willing to expand their investments in Hadoop if they know there's a consistent distribution backed by a big, stable vendor like Intel, said Boyd Davis


The Culture of Comaking with Jeff Patton
Jeff Patton helps teams build better products by helping them understand their users in a more thoughtful manner. By using the principles of comaking, teams begin to take more responsibility for their projects and their outcomes, thereby creating a more streamlined process of meeting their users' needs and having fun while doing it.


U.K., India Sign Cybersecurity Pact
What's particularly interesting is that the agreement-- framed as designed to improve "the protection of personal data and sensitive commercial and government information" -- may herald much greater use of offshoring and outsourcing of U.K. state information and communications technology (ICT) work to India. "Other countries securing their data is effectively helping us secure our data," Cameron said during his visit to India. "The threat in terms of cybersecurity comes from all sorts of different places and organizations -- a lot of it is criminal.



Quote for the day:

"Luck is a dividend of sweat. The more you sweat, the luckier you get." -- Ray Kroc

February 16, 2013

Data Laboratory: Is It For You?
What would the purpose of a data laboratory be? I think that the following ideas are strong candidates: Identify what value can be extracted from existing enterprise data; Identify value that may be present for the enterprise in new data sources that can be acquired externally or internally; Synthesize new "data compounds" through the "chemistry" of data integration and assess them for business value; Distill new information products from the raw data resources; and Figure out how to work around existing data deficiencies.


Hadoop to Be Pervasive By 2015
While IT organizations conduct trials over the next few years, especially with Hadoop-enabled database management system (DBMS) products and appliances, application providers will go one step further and embed purpose-built, Hadoop-based analysis functions within packaged applications. The trend is most noticeable so far with cloud-based packaged application offerings, and this will continue.


Ericsson and Gemalto Work to Simplify M2m with Embedded SIMs
The use of embedded SIMs has several advantages, according to Blockstrand. So-called late binding allows the SIM card to be activated later in the production process of a car, for example, he said. The embedded SIM card can be remotely activated when it arrives in the country where it will be sold, instead of someone locally having to put a card in every car.


How Cisco’s Learning Network Became a Social Hub for the IT Industry
Five years ago, Learning@Cisco, the educational services division of Cisco Systems, built a social network platform it called the Cisco Learning Network to help teach and train people who wanted to learn how to become certified by Cisco. But since then it has grown to become a portal for the entire IT industry with over 2 million users who share information on everything from Cisco certification to job searches. It has allowed Cisco to differentiate its brand, create loyal customers, mine for marketing insights and influence the market.


A ‘Golden Era’ of Insight: Big Data’s Bright Future
Eric Horvitz, distinguished scientist at Microsoft and co-director of Microsoft Research’s Redmond lab sees a future where machines, fueled by large amounts of data, can become “empowering, lifelong digital companions” who know what you want or need (be it pizza or medicine), where you want to go (be it Hawaii or the most traffic-free route to the ball game) and generally work with a passion on your behalf.


Joy at Work: It's Your Right
Achieving joy at work is not only possible; it's a necessity. I've come to appreciate that happiness on the job is a leading indicator of an individual's ability to sustain high levels of passion, performance, and productivity over the long run. If we can uncover our true gifts and find work that makes regular use of them, we've fulfilled our responsibility to use them wisely and we've optimized our chances for claiming our right to enjoy the process.


Google Retail Stores Could Be a Smart Move, Analysts Say
Google is in the process of building its own retail stores and hopes to have the first stores open in time for the holidays in major U.S. metropolitan areas, according to a report Friday in 9to5Google, which cited an unnamed, "extremely reliable" source. "Google feels right now that many potential customers need to get hands-on experience with its products before they are willing to purchase," the website reported.


Actionable analytics top CIO priority
"Solutions architects should work with business analysts, subject matter experts and business managers to develop an understanding of the kinds of business decisions that will be made and let computers make decisions that are structured and repeatable to conserve people's time and attention for the thinking and actions that computers cannot do," concludes the Gartner report.


Is direct current power the silver bullet for data center efficiency?
Direct current or alternating current can be used at high voltages for power transmission, but AC has been the main choice to date. Trying to eliminate the transformation losses for the transmission stage is unlikely to be workable. It's pretty much the same at the distribution level; changing the existing infrastructure from AC to DC is not going to be easy, and there would still be a need to use high-voltage DC, so transformation is still required.


Why Application Performance Management Matters Now
One of the lesser-known APM systems, OpNet, in Bethesda, Md., has a product line that corresponds to several of these steps, including AppResponse Xpert for monitoring the end user experience, network and application; AppTransaction Xpert for "deep transaction performance analysis and prediction," according to its descriptor on the OpNet (now part of Riverbed) website; and AppMapper Xpert for mapping an application's parts and dependencies.



Quote for the day:

"Success usually comes to those who are too busy to be looking for it." -- Henry David Thoreau

December 11, 2012

Future Cloud is safe, agile and efficient
In five years, companies will operate in a converged IT world of cloud, virtualisation and mobile computing where clouds are safe. IT organizations will have better visibility, control and compliance across their private and public clouds. To get there, Symantec extends its security, data storage and information management expertise to help companies transition to safe clouds of the future.


With Zenprise, Citrix Tightens End-User Computing Strategy
Considering Citrix has been standardizing on Xen in most of its product names, the marketing department should be thrilled with this acquisition. There's more to that acquisition than just a cool marketing twist, of course. Citrix has become, in my opinion, the very first company to have an end-to-end end-user computing solution for the enterprise.


Tech World Discovers New Species: The Cloud Architect
Inextricably tied to the internet hype machine, cloud computing is a difficult concept to pin down. The term has come to mean almost anything. But there are cases where it represents a very real change not only in how computing power is accessed, but in how data center infrastructure is built.


What Hadoop Is. What Hadoop Isn’t.
Database vendors see it as a database and challenge it on those grounds. Data integration vendors see it as an ETL tool and challenge it on those grounds. Analytics vendors see it as a replacement for their engines and challenge it through that view. In doing so, each vendor community overestimates Hadoop’s potential for displacement of their product, while simultaneously underestimating the impact that it will have on the environment and architecture they operate in.


Transforming Three Vs of Big Data into Three Ws of Business Analytics
The three Ws are the What, which refers to the data and information itself; the So What, which refers to the analysis of the data or the process of deriving implications and meaning from the data; and the Now What, which refers to the decisions made from the data and the resulting actions.


Special Report: Amazon's billion-dollar tax shield
Amazon is channeling huge amounts of money through a small Luxembourg-based unit, largely to avoid paying hundreds of millions of dollars in U.S. and European taxes, a Reuters report suggests. There's no commercial reason for the creative-but-legal accounting, which is attracting scrutiny from U.S. officials. "The IRS shouldn't be happy about this. It sounds like they're not," says tax expert Michael McIntyre.


By 2020, the use of Big Data will improve the understanding of ourselves and the world; Nowcasting, real-time data analytics and pattern recognition will surely get better; Big Data has the potential for significant negative impact that may be impossible to avoid -- Check out the nice infographic for more.


PerfView Tutorial 3 - Resolving Symbols(Channel 9 Video)
The PerfView tool is a free Windows performance tool developed by the Microsoft .NET Runtime Performance team for investigating both managed can unmanaged performance problems. If you are having a performance problem, especially if it is a .NET application, it is hard to overestimate the value of this tool.


The first 100 days of a new CIO: Nine steps to success
“In the first 100 days, you have to make your mark. In that period, you also need to formulate a compelling vision, because if you want to lead, as opposed to executing the visions of others, you do need to come out quickly with a story that everybody can align around.”


Keynote: The New Governance
In this keynote presentation K. Scott Morrison, CTO and Chief Architect at Layer 7 Technologies anticipates the future of SOA governance in the enterprise starting from the observation that there are major technological changes in the enterprise today.



Quote for the day:

"Don't let your ego get too close to your position, so that if your position gets shot down, your ego doesn't go with it." -- Colin Powell

December 10, 2012

Defining CRM: Thoughts from three experts
Even between the story’s sources, there was no hard and fast definition. However, I thought it was also interesting to think about how different people define CRM, often depending on their role in a company or as a thought leader in the customer relationship management field.


Why C++ Is Not “Back”
It seems that many of the seasoned developers have forgotten why we stopped using C++ and moved on to Java, C# and other modern languages. Many younger or newer developers don’t really know the history and are getting confused by the current C++ message and resurgence.


Unit Testing Hadoop MapReduce Jobs With MRUnit, Mockito, & PowerMock
A map/reduce pair can be tested using MRUnit’s MapReduceDriver. A combiner can be tested using MapReduceDriver as well. A PipelineMapReduceDriver allows you to test a workflow of map/reduce jobs. Currently, partitioners do not have a test driver under MRUnit. MRUnit allows you to do TDD and write light-weight unit tests which accommodate Hadoop’s specific architecture and constructs.


Listening to Complainers Is Bad for Your Brain
Blake says. "Typically, people who are complaining don't want a solution; they just want you to join in the indignity of the whole thing. You can almost hear brains clink when six people get together and start saying, 'Isn't it terrible?' This will damage your brain even if you're just passively listening.


Java Send Mail Example
This sample illustrates how to send smtp emails using a simple Servlet-based Java webapp easily in Cloud Foundry using email providers like SendGrid and MailGun that both have free levels of service that allow you to send up to 200 emails per day and paid plans to do more. ... Note that on Cloud Foundry smtp outbound on port 25 is blocked. But other ports are open, such as the unsecured port 587 or secured port 465.


Struggling to Manage Knowledge Workers
Peter Drucker was understating the difficulty of the challenge. Into the 21st century, organizations are still trying to get a handle on the best methods of managing knowledge work. In fact, just trying to define the term “knowledge worker” can be difficult. Drucker defined such a worker as “someone who knows more about his or her job than anyone else in the organization” (Hammer, Leonard and Davenport, 2004).


U.S. Congress Passes Another Resolution Opposing U.N. Internet Takeover
The resolution was adopted by the House on Wednesday with a 397 - 0 vote, according to the House's website. The bill, passed by the U.S. Senate in September, emphasizes the importance of the Internet to the global economy, saying that "it is essential that the Internet remain stable, secure, and free from government control."


IT shops will become consultants instead of tech managers, says EMC's CIO
"IT almost plays a passive role rather than an active role in this," Mirchandani said. "The moment you expose the cost of services, the business will ask what's the most cost efficient. IT becomes a broker of services, not necessarily the author of all services. This phase allows business to build the widgets they want off that factory floor [the cloud service]."


A User’s Story: DubDubDeploy
When Donte Ormsby came to InfoQ, it was just a friendly letter to say that he found a great tool for simplifying website deployment using ASP.NET and thought the readers might find it useful. After talking a bit, InfoQ decided the best way to introduce DubDubDeploy to the readers would be for him to just tell his story.


Risk Management: A Process or a Way of Life?
The folks at Active Risk talk a lot about establishing an "Active Risk Culture" at your organization - really making risk management a way of life, rather than a set of sterile processes. As a concept that sounds interesting, but how does it really work? Loren Padelford, Executive Vice President & General Manager at Active Risk offers some clarification in his responses below.



Quotes for the day:

"Time is our most valuable asset, yet we tend to waste it, kill it, and spend it rather than invest it." -- Jim Rohn

"We don't have as many managers as we should, but we would rather have too few than too many." -- Larry Page

December 05, 2012

Amazon Seeks to Disrupt Datacenter Economics 
"The economics of what we're doing are extremely disruptive for old guard technology companies," said Andy Jassy, senior VP of Amazon Web Services, in yesterday's opening keynote address. "These are companies that have lived on 60 to 80 percent gross margins for many, many years, and in fact they set expectations that that's what they are doing. This is what they communicate externally."


SMS Vulnerability in Twitter, Facebook and Venmo
Twitter users with SMS enabled are vulnerable to an attack that allows anyone to post to their account. The attacker only needs knowledge of the mobile number associated with a target’s Twitter account. Messages can then be sent to Twitter with the source number spoofed.


Mobile is eating the world
The world today is focusing on the software that increasingly powers everything thanks to ubiquitous broadband and mobile connectivity, and the barriers to creating applications that leverage the connection to the billions strong digital population of the planet have never been lower.


9 Ways to Sell Your IT Outsourcing Plan to the CFO
"The challenge is that the CIO team often doesn't speak the same language as the CFO team," says Daniel Masur, a partner in the Washington, D.C. office of law firm Mayer Brown. "They don't speak in the same terms. They don't use the same concepts. And, as a result, they just talk past each other."


EMC and VMware spin out big data/cloud division
VMware and EMC today confirmed rumors that have been circulating for weeks that it would spin out its big data and platform as a service (PaaS) cloud products into a new division within the company named Pivotal Initiative, which will be led by former VMware chief Paul Maritz (pictured).


Dev Disasters -- Why They Happen, How to Overcome Them
Whatever the reason, mistakes are something everyone makes. What separates the everyday developer from the truly outstanding one is not the mistake -- it's what's learned from the mistake, and whether those lessons are applied to future projects.


Talend Adds Support for NoSQL Databases and Hadoop Profiling
Talend 5.2 adds the capability to profile Hadoop big data, or gauge the quality and condition of various forms of data stored across an enterprise in an effort to reduce costly data duplication, incompleteness and inconsistency.


Choosing the Right Key Performance Indicators for Data Centers
A September survey of 5,000 data center professionals my company conducted highlighted the metrics that these professionals deal with daily. ... The responses to these straightforward questions indicated a lack of clarity into vital data center performance metrics. What are these issues and their associated metrics for optimal performance?


More IT Pros Going Independent by Choice
There are nearly 17 million independent workers in the U.S., according to a recent MBO Partners study. This number is expected to grow to a whopping 50 percent of the U.S. workforce by 2020, according to the study. The likely culprit has been the poor economy but OnForce's findings challenge that notion.


IETF vs. ITU: Internet Standards Face-Off
A battle is brewing between two standards bodies - the Internet Engineering Task Force (IETF) and the International Telecommunication Union (ITU) - over which group will be the primary source of the underlying communications protocols that allow the Internet to operate in the future.


How to Create an Innovation Ecosystem
If your organization relies heavily on individual innovation, consider creating your own innovation reef, where creative problem-solving experts develop a network of individuals skilled in bringing new ideas to market. There are three essential elements to creating this in your company:



Quote for the day:

"Never leave that till tomorrow which you can do today." -- Benjamin Franklin

December 04, 2012

Hype, “Big Data”, and Towards a More Pragmatic Analytics
Sadly, many such (Big Data) initiatives are doomed to failure. Many companies will task IT with coming up with a big data initiative, but won’t really involve the business at all. Many of these cases will result in IT going out and buying a product, installing it on desktops (or perhaps even tablets), and subsequently declaring victory.


Interview and Book Review: NoSQL Distilled
NoSQL Distilled, authored by Pramod Sadalage and Martin Fowler, covers NoSQL databases as well as the concept of Polyglot Persistence that is becoming popular with the emergence of various NoSQL data stores. They cover the data models supported by NoSQL data stores like Aggregate Data Models including Key Value, Document, and Column-Family Stores. They also discuss the Relationships concept and Graph Databases that support the relationships between data entities.


Clueless officials hamper cybersecurity law-making
Governments need to determine the purpose of any proposed cybersecurity law and what problems it is supposed to address before approving the legislation. Those that fail to do so will experience backlash from their citizens, which is something countries such as the Philippines and India are going through.


Web to Windows 8: Security
Web developers transitioning from the browser to Windows Store apps bring certain habits with them. While Web developers can tap in to their existing knowledge of JavaScript, some capabilities are new and require a shift in thinking. Security is one such fundamental difference.


Attackers can abuse Yahoo developer feature to steal user emails, other data
Attackers can read emails, contacts and other private data from the accounts of Yahoo users who visit a malicious page by abusing a feature present on Yahoo's Developer Network website, says an independent security researcher.


Your Front-Line Employees are Your Brand!
Companies spend a great deal of time and money building advertising campaigns, social media strategies, and other promotional vehicles to build brand equity. For many firms, though, their front-line employees represent the most significant way that customers experience the brand. Those employees become crucial ambassadors for the brand.


Don’t Chase Everything That Shines
This interview with Sandra L. Kurtzig, chairwoman and C.E.O.of Kenandy, a software management firm based in Redwood City, Calif., was conducted and condensed by Adam Bryant.


Why The Time is Right for MapReduce Design Patterns
At this point users have had time to determine what works well and what does not. I could have come up with a bunch of patterns that nobody has ever used before, but there would be no point to it. With a more mature community of experts that has repeatedly identified and solved problems, the most common solutions have developed into design patterns.


Inside Facebook’s North Carolina Data Center
Facebook has built two enormous data centers here to power its growing Internet infrastructure. The two-story structures each span more than 300,000 square feet. In an area dotted with modest restaurants and stores, the server farms resemble aircraft carriers dropped onto the landscape.


4 Reasons Why You Should Not Use Free Email Hosted Outside India
There could be grave risks involved in taking for granted the use of free email services, especially those hosted outside India. Here PCQuest give four reasons why you should choose a paid email provider



Quote for the day:

"Some people change their ways when they see the light; others when they feel the heat" -- Caroline Schoeder