Showing posts with label html5. Show all posts
Showing posts with label html5. Show all posts

Daily Tech Digest - May 26, 2017

How quantum computing increases cybersecurity risks

We already see rapidly increasing numbers of data breaches as more connected devices make more attack surfaces available. As companies and governments work continually to protect against cybersecurity attacks through advances in technology, the advent of quantum computing could create a free for all for cybercriminals. But there is a solution in the form of quantum-safe cryptography. The key will be updating quantum-vulnerable solutions in time, and that means understanding now which systems will be affected by quantum risk and planning a migration to potential quantum-safe security solutions that includes appropriate testing and piloting. The transition can begin with hybrid solutions that allow for agile cryptography implementations designed to augment the classical cryptography we use today.


HTML5: Where The Core Web Technology Is Headed

So will there ever be an HTML6? Jaffe suggests that web payments might justify such a whole-number revision, to provide a consistent way of doing payments on the web. “If we were going to linearly call something HTML6, this might be it.” Although buying through the web is not new, the increased dominance of mobile web usage is causing people to abandon shopping carts because of the complexity—and may require a different approach baked into HTML itself. The W3C has a working group to explore this very issue. W3C also is working on Web Components, a framework to identify reusable website components, and Service Workers, to make it easier to run multiple functions inside a browser, featuring offline capabilities. Maybe they’ll justify a name change to HTML6.


The WannaCry scramble

WannaCry could have been much more devastating than it was — and it was very disruptive, affecting hospitals and other health services in disproportionate numbers — if not for a “kill switch” that the malware author included in the code. There are various schools of thought as to why this kill switch existed, but the consensus is that the author wanted a way to stop the malware from propagating. The method was to register an obscure web domain. As long as the domain didn’t resolve to anything, the malware would continue to propagate and infect vulnerable devices. But a security researcher discovered the kill switch and registered the domain, which stopped the malware. In the end, something like 200,000 devices (that we know of) were impacted.


Ignoring software updates? You’re making one of five basic security mistakes

Forget technology for a second, culture is arguably the biggest issue with security right now, and this has been the case for 20 years. CEOs think they won’t be targeted and citizens think much the same (i.e. it won’t happen to me). This complacency is misguided, as everyone is a target and a potential victim. Accordingly, this attitude can often result in poor security habits, with individuals and organizations treating, for example, password and Wi-Fi security not as seriously as they should. This is despite the fact that good cybersecurity can be achieved relatively easily, through good password hygiene, regular software updates, anti-virus and even password managers, VPNs and secure encrypted messaging apps.


The Business Of Apps, Security, And Consumer Expectations

There is a need to implement more automation around application security. This translates to embedding of security capabilities into the application code itself—referred to as Runtime Application Self-Protection (RASP). While a promising area of security technology, RASP solutions are emerging technologies as their effectiveness and impact on application performance are yet to be fully understood. On the other hand, the Web Application Firewall (WAF) remains a purpose-built application security tool. The more advanced WAFs leverage automation capabilities to improve security and streamline operations. WAFs are preferable because they offer automated policy generation, a feature that analyzes the protected application, generates granular protection rules and applies security policies.


New cyberattack rule looms over federal contractors

“We are finding that a lot of companies are not aware of this requirement and face losing their government contracts,” said Tamara Wamsley, a strategist with Fastlane. “This issue could impact the success of many local companies, could result in lost jobs. This is a big deal.” “It’s not just for R&D (research and development firms),” Gillen said. “It’s for janitors, it’s for accountants.” “Anyone who has information classified by the government that needs to be protected,” said Shawn Walker, co-founder and vice president of Miamisburg-based Secure Cyber Defense LLC. Today, the rule affects only Department of Defense contractors. But Gillen said it will “almost certainly” expand to impact every federal contractor and sub-contractors, Gillen said. The rule is essentially a list of 110 requirements with which contractors must comply.


Secure IoT networks, not the devices

To protect IoT deployments, Cisco recommends that customers isolate the devices on network segments. Traditional segmentation using VLANS can become complicated at an IoT-deployment scale though, Cisco says. Cisco’s TrustSec platform that includes network segmentation capabilities. “The logical move is to segment these devices to put them out of attackers’ reach,” Cisco says. “If devices are compromised, organizations can prevent them from being used as pivot points to move through the network, and to activate incident response processes to protect the business.” IoT Threat Defense can detect anomalies in network traffic, block certain traffic and identify infected hosts. Cisco is targeting initial use cases in the medical, power utilities and automated manufacturing industries.


King Chrome: Microsoft's Browsers Sidelined On Its Own OS

IE retains a sizable share -- Smith called it "a significant presence" -- largely because it's still required in most companies. "There are a lot of [enterprise] applications that only work in IE, because [those apps] use plug-ins," Smith said, ticking off examples like Adobe Flash, Java and Microsoft's own Silverlight. "Anything that requires an ActiveX control needs IE." Many businesses have adopted the two-prong strategy that Gartner and others began recommending years ago: Keep a "legacy" browser to handle older sites, services and web apps, but offer another for everything else. That approach lets employees access the old, but does not punish them with a creaky, sub-standard browser for general-purpose surfing. Under such a model, Internet Explorer has played, and continues to play, the legacy role.


How to Build a Better IoT Framework

A starting point is to understand that business and IT leaders must work in new, more collaborative ways to identify where value exists. IT must support the endeavor with an agile, flexible IT infrastructure that, among other things, taps clouds, mobility, APIs, artificial intelligence (AI), real-time connectivity and advanced analytics. Accenture's McNeil says that it's important to identify potential use cases before diving into an initiative. These often revolve around financial impact and cost drivers, but they may also touch on business opportunities and remapping processes, workflows and customer interactions to unlock untapped and previously hidden value. New and different thinking is paramount. "Oftentimes, it's really about experimenting with sensors and data inputs to see what makes sense for the business," McNeil explains.


Are Unit Tests Part of Your Team’s Performance Reviews?

Unit testing achieves several important business objectives: quality improvement, ability to test legacy code, developers stay up-to-date with the latest and greatest methodologies, and yes, good unit testing even increases developer motivation. Writing good unit tests that won't break on every single code change is not difficult and can be achieved easily by following a few simple practices: A unit test should not be dependent on environmental settings, other tests, order of execution or specific order of running. Running the same unit test 1000 times should return the same result. Using global state such as static variables, external data (i.e. registry, database) or environment settings may cause "leaks" between tests. The order of the test run should not affect the test result, and so make sure to properly initialize and clean each global state between test runs or avoid using it completely.



Quote for the day:


"Success. It's got enemies. You can be successful and have enemies or you can be unsuccessful and have friends." -- Dominic, American Gangster


October 11, 2014

User Interface Testing for Mobile Applications
It is the duty of a QA to ensure that the application has a easy to use user interface. The QA should have a proper knowledge about the flow of the devices in which the application is to be tested, as the application might have impact on the mobile device’s native application like phone,email,camera,contacts,calender etc. Below are some of the important points that is to be considered in a user interface testing alongwith the some of the basic steps that a QA generally follows to test the various aspects.


“We are in the third era of computing – the cloud and mobile era – but security considerations on cloud are still not widely understood. It is important to address the public cloud security concerns to facilitate its adoption,” Russinovich told delegates at the annual IP Expo 2014 in London.  “This is important because there is no cloud without trust.” Drawing from Cloud Security Alliance’s top nine cloud computing threats, Russinovich listed ten security concerns – listed below – that are typical to public cloud services and explained the measures taken by public cloud service providers, such as Microsoft Azure and AWS, to address those security risks.


Microsoft’sQuantum Mechanics
Progress toward that computational nirvana has been slow because no one has been able to make a reliable enough version of the basic building block of a quantum computer: a quantum bit, or qubit, which uses quantum effects to encode data. Academic and government researchers and corporate labs at IBM and Hewlett-Packard have all built them. Small numbers have been wired together, and the resulting devices are improving. But no one can control the physics well enough for these qubits to serve as the basis of a practical general-purpose computer.


Hybrid Cloud: Hype or Reality
The transition might be gradual, but this approach does not prevent an exciting vision for the organization. Hybrid provides endless option and helps drive innovation, while removing barriers that slow IT down. The promise of cloud is real, but the promise of a one-size-fits-all cloud strategy, however, is not. ... Among all three basic types of cloud – public, private and hybrid – the hybrid cloud is the most flexible and it can be customized to address business service level agreement, compliance and regulatory requirements, while tapping the public cloud for business agility, expansion of new services and shifting expenditure from CAPEX to OPEX. It is no wonder that hybrid cloud continues to draw the interest of executives across all industries.


Zephyr’s CEO Discusses A Simpler Solution To Test Automation Integration
Given the vast array of automation tools and test management solutions in the market that are not geared up for this kind and level of change, you just might have to. It might mean going back to the drawing board to find a new and more appropriate automation tool; and then trying to integrate it back to the test management solution, which might need upgrading or changing itself. Maybe you can’t even integrate this new tool. You are suddenly surrounded by silos of tools and tests and execution results that you are desperately piecing together inefficiently ... In a word, you are in “scramble-state”.


InstantClick dramatically speeds up your website
Latency is inevitable with today’s internet architecture so InstantClick cheats by preloading links you are likely to click on. Before visitors click on a link, they hover over that link. Between these two events, 200 ms to 300 ms usually pass by. InstantClick makes use of that time to preload the page, so that the page is already there when you click. On mobile devices, preloading starts on “touchstart”, letting 300 ms (Android) to 450 ms (iOS) for preloading the page. If you want your website to not be flooded by requests, you can set a delay before preloading starts when users hover a link.


Descriptive, Predictive, and Prescriptive Analytics Explained
The promise of doing it right and becoming a data driven organization is great. Huge ROI’s can be enjoyed as evidenced by companies that have optimized their supply chain, lowered operating costs, increased revenues, or improved their customer service and product mix. Looking at all the analytic options can be a daunting task. However, luckily these analytic options can be categorized at a high level into three distinct types. No one type of analytic is better than another, and in fact, they co-exist with, and complement each other.


Is It Time to Move Your Databases to the Cloud?
For organizations ready to embrace the cloud, options range from self-service DBaaS products to managed database services that offer more in the way of hands-on support. Lines blur between services, though. ... The act of purchasing cloud services is sometimes associated with customers that possess limited technical infrastructure. Akamai demonstrates that's not always the case. "Clearly, there's no lack of server resources," Scobie notes. That said, Akamai's network lacked a persistent data service that would fit the kinds of distributed configurations that company had in mind for its API management application.


Towards a Resolution-Independent Web with SVG
The main advantage of SVG - rightfully advertised all over the web - is its scalable nature. When preparing an icon, a designer can stop worrying about “how it will look” in different dimensions or on mobile devices with different pixel densities, and focus solely on making the asset look great. With SVGs there is no need to export two different raster assets for retina and non-retina displays. As a matter of fact, there’s no need to worry at all about the pixel density of any device, especially given the (sometimes absurd) non-standardised nature of it, but focus rather on the artwork itself. Once an icon is ready, the designer exports a single SVG file - directly from Illustrator - which can be resized at whim by the developer with no loss of quality.


HTML5: A multi-threading approach with Web Workers
The word Web Worker specifies a JavaScript running in the background, without affecting the performance of the page, independently of other user-interface scripts that may also have been executed from the same HTML page. Let’s go into little depth to understand what it exactly means :). Javasc ... Javascript will hang the browser, where the code written by us requires a high CPU utilization. When executing scripts in a Web page, the page becomes unresponsive until the script is finished and shows “unresponsive script” alert message.



Quote for the day

"It is not only what we do, but also what we do not do, for which we are accountable" -- Jean Baptiste Moliere

August 07, 2014

Oracle hasn't killed Java -- but there's still time
By the time Oracle bought Sun, its troubles had leaked into Java 7, which took approximately 100 years (give or take) to be released -- and with far fewer features. Oracle started making promises about releases and tried to create a release schedule (good idea), However, it failed to fix Sun's semi-abortive attempts to open-source Java, which might have made it more responsive to the industry, or to create any new Java products that anyone wanted to buy. In fact, Oracle trimmed Sun's portfolio of immature products that no one was purchasing. It was probably a good move, but some of Oracle's offerings in those areas are rickety at best. Then Oracle continued Sun's late attempt to tick off its allies and sued Google with a position ripe with collateral damage for our entire industry. Needless to say it was sort of predictable.


What Does the Future of Work Look Like?
In the future of work, apps and operating systems will light up scenarios such that, whatever device you use, it's the functional equivalent to being on the corporate network. We saw some of this with the DirectAccess feature that Microsoft enabled in Windows 7 and Windows Server 2008 R2, but this now extends in Windows 8 and beyond. No more user-initiated tunneling. No more clunky laptops trying to boot up. A user will take a computer, unsleep it within a few seconds, and use it like he or she is on the corporate campus. The takeaway for IT? Make the boundary between your network and your users as transparent as you possibly can.


5 Breakthrough DARPA Technologies Beyond GPS
"More worrisome is that adversaries can jam signals. GPS continues to be vital, but its limitations in some environments could make it an Achilles' heel if warfighters rely on it as their sole source of PNT information," DARPA says on its program website. In fact, illegal devices that jam GPS signals are becoming increasingly available. Some simple gadgets that plug into 12-volt car receptacle connectors and cost as little as $30 can render GPS systems inoperable for miles, according to GPS systems provider NovAtel. In its search for new technologies that offer an alternative to GPS, DARPA is particularly interested in systems that provide long-duration precision and accuracy in positioning and timing for global synchronization, secure communications, and cooperative effects.


I give the new Raspberry Pi B+ an A-
My two favorite B+ features are four USB ports (compared to two on the B board) and the micro SD card slot (compared to the full-sized SD card slot on the B board). Micro SD is the perfect platform for a board this small. That, and the micro SD card doesn't stick out too far from the board's boundaries. ... everything on the B+ board is more organized and better placed, although the camera serial interface (CSI) and display serial interface (DSI) didn't move very much. But the DSI is now situated very close to the edge of the board making it more convenient for cabling.


The big data architecture dilemma for CIOs
As CIOs architect for big data, they're likely to bump up against a common and longstanding IT dilemma: To build or buy? Today, big data infrastructure bottlenecks can be specific and ill-suited for the one-size-fits-all solutions that have dominated the market for years. The better fit may come from technology alternatives such as in-memory or NoSQL databases, cloud, open source or, as is the case for Facebook and Tesla, a custom build. But first, CIOs will have to parse through the ambiguity of the term "big data" itself, juxtaposing what has become a catch-all marketing phrase with the technical pain points the business faces. And in the end, they're likely to make surgical rather than sweeping technology investments.


Massive Russian hack has researchers scratching their heads
Some security researchers on Wednesday said it's still unclear just how serious the discovery is, and they faulted the company that uncovered the database, Hold Security, for not providing more details about what it discovered. "The only way we can know if this is a big deal is if we know what the information is and where it came from," said Chester Wisniewski, a senior security advisor at Sophos. "But I can't answer that because the people who disclosed this decided they want to make money off of this. There's no way for others to verify."


Run virtual machines on Windows 8.1 with Client Hyper‑V: A quick how-to
Many Windows users aren't aware of it, but a powerful virtualization tool is built into every copy of Microsoft Windows 8.x Pro and Windows 8.x Enterprise, Client Hyper-V. This is the very same Type-1 hypervisor that runs virtualized enterprise workloads and comes with Microsoft Windows Server 2012 R2. The virtual machines you create on your desktop with Client Hyper-V are fully compatible with those server systems as well. If you're a software developer and need to do testing, or simply want additional operating system(s) running on your computer, such as Linux, Hyper-V can be a great feature to have enabled on your PC.


Big Data and Biometrics: Why Your Face Matters More than Ever
The face recognition software that makes those Facebook tagging suggestions possible is part of a larger discipline called biometrics that includes fingerprints, retinal scans, and gait recognition, and the field is advancing fast. Combining those capabilities with big data analytics tools allows us to understand who you are simply by looking at you—whether you’re in a photo on Facebook, a video clip, or merely walking around in the world. So, is this good or bad? The answer is probably both.


HTML5: Doomed to fail or just getting started?
Developers want easy-to-use, powerful tools, but HTML5 yields them a somewhat fragmented platform that lags native tool-chains from Apple and Google. Developers need distribution, so they launch in the Apple App Store and/or Google Play Store (never mind that they quickly get lost in the clutter of millions of other apps....). They need monetization, and the major platforms provide an understandable -- if difficult -- route to money. HTML5 offers an open alternative to these platforms, but as VisionMobile points out, "The open nature of HTML5 doesn't intrinsically help anybody do their job better." It may keep developers free, but it doesn't pay the rent.


Internet of Things: A Big Use Case for Big Data
There are three types of data that we have in our study: transactional data, something that comes out of a point of sale system; there’s human-generated data that might be Twitter, a blog or a picture; and then there’s machine-generated data, which is log files, sensors, etc. The reason that machine-generated data swapped places with human-generated data is that from a sensor perspective it’s easy for me to look at the log files that come out of my environmental control system and say “If I raise the temperature in the buildings in the summertime from 71 to 72, I can affect a dollar change and a lowering of my costs.”



Quote for the day:

“To the person who does not know where he wants to go there is no favorable wind.” -- Seneca

May 27, 2014

It’s a Bird, it’s a Plane….it’s India's first pizza-delivering drone!
In perhaps the most audacious and value-for-money stunt that the city of Mumbai has yet seen, a once unknown hole-in-the-wall Pizzeria at Kemp's Corner in tony South Mumbai used a drone to delivery a Pizza to a location nearby (Worli), giving further credence to the notion that India can be both way ahead of its time and way behind it. While this is apparently not the first pizza in the world delivered by a drone—A Dominos franchise snagged that badge of honor by dong so in the UK last year—it certainly was the most attention grabbing.


Microsoft to the FBI: Drop dead
The FBI backed off, and agreed to call back the letter. Yesterday, documents related to the case were unsealed by a federal court in Seattle. You can read them here. What's noteworthy about the case, the papers show, is that involves a corporate customer using cloud-based Office 365 and cloud data. That's Microsoft's future, and likely one of the reasons it fought back against the FBI. In its petition against the FBI request, Microsoft wrote: "As more users migrate from locally installed software and locally stored data to cloud-based computing platforms, Microsoft increasingly is entrusted to store its customers' data safely and securely."


Strategic principles for competing in the digital age
Digital capabilities increasingly will determine which companies create or lose value. Those shifts take place in the context of industry evolution, which isn’t monolithic but can follow a well-worn path: new trends emerge and disruptive entrants appear, their products and services embraced by early adopters (exhibit). Advanced incumbents then begin to adjust to these changes, accelerating the rate of customer adoption until the industry’s level of digitization—among companies but, perhaps more critically, among consumers as well—reaches a tipping point. Eventually, what was once radical is normal, and unprepared incumbents run the risk of becoming the next Blockbuster.


IT Professionals Overworked, Losing Pride in Their Jobs
"While the majority of IT professionals are proud they chose a career in IT, the survey results point to the potential of a trend towards dissatisfaction or disengagement that organizations need to monitor," Jason Hayman, market research manager for TEKsystems, said in a statement. "The shift so far is slight, but if it continues and organizations do not prepare for and adjust their talent management and workforce strategies accordingly, they could face even greater turnover, possibly causing even more stress and increased workloads for those employees that stick around."


Technology Companies Are Pressing Congress to Bolster Privacy Protections
“Almost every American thinks that it is frightening that we have a law that suggests that the government has the right to read your email after only 180 days,” Mr. Lee said. “It’s an easy issue in which to achieve bipartisan compromise and consensus.” The bill would require a search warrant for access to electronic communications, with exceptions for some emergency situations. It would also require the government to notify individuals within 10 days that their information was being investigated. However, it does not address rules for location data, like GPS information from an individual’s cellphone.


Getting started with a mobility assessment
To craft a strong mobility policy, start by defining your business goals and the devices and users that fall within its scope. For example, is your objective to enable business access under BYOD? Is it to enable secure visitor access to the Internet or guest services? Or do you want to ensure that every employee's mobile device complies with an industry regulation? Clarify your policy's scope by specifying which mobile devices are included, such as smartphones and tablets that carry or access business data. You may also exclude certain endpoints, such as IT-owned or personal-use-only devices.


Next generation hotspots: The future of Wi-Fi?
The key to NGH is something called Passpoint. Passpoint is an industry certification that your device has 802.1x and 802.11u functionality. IEEE 802.1x is a way to securely authenticate to a network. It is used in many businesses as a way for workers to connect to corporate networks, making the network trust a certain device. 802.11u is what creates the seamless part of the network identification and authentication process. “With 802.11u, a Passpoint-enabled smartphone and a Passpoint-enabled access point (AP) can have a very involved conversation, without the user connecting,” said Gunning. “The smartphone sends out packets to see what’s around, which is a process called beaconing.”


Beginner's Guide to HTML5 & CSS3 - HTML5 API Grab Bag
Wow, the future of web landscape looks excitingly promising. However, reaching this stage is not without its challenges. For one thing, the supports of the current browsers must be improved and streamlined. For another, the awareness and education on HTML5 APIs among the web communities must be stepped up. Some would have argued about "the chicken or the egg" causality dilemma. I would argue that both can proceed in parallel. Over the years, HTML5 specification has added a bag full of APIs that cover a wide spectra of functionality and features that power the future web browsers and mobile devices.


Mint 17: The best Linux desktop to date
Unlike most of its Linux brothers and sisters, Mint also includes many proprietary programs. So, for example, you can play Adobe Flash videos and DVDs from your Mint PC without jumping through any hoops. Mint doesn't include proprietary drivers such as the ATI or NVIDIA drivers; it does make it easy to install drivers. Another nice feature, which Mint does shares with most modern Linux distributions, is that you don't have to commit yourself to it. You can try it out by running it from a live USB thumb-drive or DVD drive before actually installing it. In my case — since I know Mint like the back of my hand — I went ahead and installed it not just on test systems but on my production desktop and laptop. Yes, I'm a brave Linux user!


You could one day be driving on a solar-powered smart streets
The Sagle, Idaho-based Solar Roadways company is now running a crowdsourcing campaign on Indiegogo.com to raise more money to ramp up production of their hexagonal-shaped Solar Road Panel technology. The hexagon panels are made up of four layers. There's a half-inch thick glass surface, followed by a layer of LED lights, an electronic support structure (circuit board) and a base layer made of recyclable materials. The hexagon-shaped Solar Road Panels connect to make a grid. "We can produce three times more power than we use as a nation. That will eliminate the need for coal-fired power plants," Scott Brusaw said.



Quote for the day:

"People will follow you when you build the character to follow through.” -- Orrin Woodward

March 05, 2014

Pre-installed malware found on new Android phones
After taking a close look at the suspicious application, Jevans said they found it wasn't the real Netflix app. "We're like, yeah, this isn't the real Netflix," Jevans said "You've got one that has been tampered with and is sending passwords and credit card information to Russia." Security experts have long warned that downloading applications from third-party marketplaces for the Android platform is risky since the applications have often not undergone a security review. Google patrols Android apps in its Play store, but malicious ones occasionally sneak in. Apple's App Store is less affected due to the company's strict reviews.


Creating cool animations and transitions in HTML5 app for Intel Android devices
One of the most exciting features of HTML5 is the <canvas> element that can be used to draw vector graphics and engender astonishing effects, interactive games, and animations. The HTML5 Canvas is picture-perfect for creating great visual material that augments UIs, diagrams, photo albums, charts, graphs, animations, and embedded drawing applications. HTML5 Canvas works with JavaScript libraries and CSS3 allowing you to create interactive web-predicated games and animations.


A .NET Developer Primer for Single-Page Applications
... a lot of .NET developers (especially in the enterprise) are dealing with an extreme amount of anxiety about JavaScript best practices, architecture, unit testing, maintainability and the recent explosion of different kinds of JavaScript libraries. Part of the trend of moving to the client side is the increasing use of single-page applications (SPAs). To say that SPA development is the future is an extreme understatement. SPAs are how some of the best applications on the Web offer fluid UX and responsiveness, while minimizing payloads (traffic) and round-trips to the server.


Treating healthcare data as an asset
One of the most challenging things any chief information officer (CIO) or chief medical information officer (CMIO) faces is getting support from across constituencies to transform the culture in IT and lines of business, not only to be more data-driven, but to recognize the value of combining data across silos to get greater insights. So, what is the catalyst to help get things started? ... when the executive leadership in an organization isn’t getting the reports and insights they need to make strategic decisions that make or break the business


Microsoft Tries to Relieve Security Fears with Office 365 Makeover
This kind of authentication was introduced to the Azure Cloud platform last September. Its introduction to Office 365 is the extension of a feature that has been available to administrators since the middle of last year, but clearly the level of risk for cloud services now is so great that Microsoft is offering it to everyone. This addition of multi-factor authentication is part of Microsoft ongoing effort to enhance security for Office 365, Andrew says, but it is not the only new step that is being introduced. The Office 365 team is already working on improving Multi-Factor Authentication for Office 365 from Office 2013 client applications.


The next wave of cars may use Ethernet
Currently, however, there are as many as nine proprietary auto networking specifications, including LIN, CAN/CAN-FD, MOST and FlexRay. FlexRay, for example, has a 10Mbps transmission rate. Ethernet could increase that 10 fold or more. The effort to create a single vehicle Ethernet standard is being lead by Open Alliance and the IEEE 802.3 working group. The groups are working to establish 100Mbps and 1Gbps Ethernet as de facto standards.


18 Things Highly Creative People Do Differently
Research has suggested that creativity involves the coming together of a multitude of traits, behaviors and social influences in a single person. "It's actually hard for creative people to know themselves because the creative self is more complex than the non-creative self," Scott Barry Kaufman, a psychologist at New York University who has spent years researching creativity, told The Huffington Post. "The things that stand out the most are the paradoxes of the creative self ... Imaginative people have messier minds."


How this one innocous tweet could hack a bank account
Based on just his name and his employer, would that be enough to steal his identity and take over his life? The bet was laid and the plan we formulated was simple enough: To gather enough intelligence about Alex to convince his call center operator at his bank that I was him. Like something out of a Mission Impossible film, I would have to bypass the automated phone system, steer through the security questions, and — armed with a fictional and empathy-driven sob story — socially engineer my way into his bank account.


Managing and Developing the Extraordinary
Let’s face it, some people are graced with an extra gear that the rest of us don’t have. Whether it’s remarkable creativity or ingenuity, or incredible technical skills, it’s exciting to manage and support extraordinary individuals. It’s also very challenging. Good managers and leaders tailor their approach for individuals, however, when presented with someone who is light-years beyond their peers in certain areas, many managers stumble and struggle when it comes to daily management and on-going support and development. Here are some suggestions for strengthening your support of these unique individuals.


Internet Of Things: What About Data Storage?
The impact on storage at first seems fairly obvious: There is more data to store. The less obvious part is that machine-generated data comes in two distinct types, creating two entirely different challenges. First, there is large-file data, such as images and videos captured from smartphones and other devices. This data type is typically accessed sequentially. The second data type is very small, for example, log-file data captured from sensors. These sensors, while small in size, can create billions of files that must be accessed randomly.



Quote for the day:

"In the business world, everyone is paid in two coins:cash and experience. Take the experience first; the cash will come later." -- Harold Geneen

April 26, 2013

Why You Need an In-Memory Action Plan
You need to change the way you look at IT infrastructure, applications, and the infrastructure that’s running those applications. Truly, with some of these new technologies like in-memory technology, there are no barriers, things that you can’t do. Words like “no, we can’t do it” start to go away. I’m not going to tell you it’s going to be cheap, I’m not going to tell you there’s not going to be bumps in the road as you’re doing it, but things that you really thought were not possible are possible now. Period.


Inside Windows Phone – code samples
What Windows Phone code samples are available to you, and how do you get them? We publish a large number of code samples that cover a solid range of Windows Phone developer scenarios. In this video, we touch on some of the code samples we’ve created to help you design and develop great Windows Phone apps, and where to find them.


Data Breaches: When the Lawyers Get Involved
Data breaches have become big business for many law firms. ... But it's not just a cash-grab by the lawyers — an interesting example was described where companies are starting to loop their attorneys in at the first hint of a data breach. This way, the attorney-client privileges kick in immediately, they can pre-empt a potential influx of lawsuits by just taking a few simple steps


Senate committee limits government electronic surveillance
"Americans are very concerned about unwarranted intrusions into our private lives in cyberspace," said Senator Patrick Leahy, a Vermont Democrat and main sponsor of the bill. "There's no question that if [police] want to go into your house and go through your files and drawers, they're going to need a search warrant. If you've got the same files in the cloud, you ought to have the same sense of privacy."


How Apple's iWatch Will Push Big Data Analytics
These intelligent wrist watches will permit monitoring of an individual's heart rate, calorie intake, activity levels, quality of sleep and more. Now imagine collecting that data on a much bigger scale. Potentially, governments, medical agencies, etc. will be able to use such collective data to gain a better insight into a nation's physical output, eating habits, risk indicators, and worrying trends. The buzz word surrounding this type of data analysis is 'big data' and I predict that it will have a huge impact in the business world.


Storage Where You Need It, When You Need It
As most CIOs understand, the business value of the IT department is only loosely correlated to the infrastructure they manage. The real value is the information contained in the datacenter. And that data is not worth much if the data is not safe and accessible. Therefore the datacenter needs to be architected in a way that stored information is highly available and applications consuming it have efficient and reliable access. How do you do that?


The fight for HTML5: 'Keep DRM out' lobby steps up standards battle
... the specification would encourage the proliferation of closed-source DRM plug-ins that would be required to view media and that each DRM plug-in could impose arbitrary restrictions on the type of hardware and software that could play media. The BBC raised the possibility of a content decryption module working with EME blocking the ability of an OS to forward an online video stream to a third party device in its submission supporting encrypted media extensions earlier this year.


Five Ways to Use ARA to Ease Agile Development Challenges
The challenges created by agile can limit the development method's value, making agile-specific support strategies key in many organizations. Fostering agile development in the enterprise can be much easier when application deployment processes are simplified. Application release automation can make this simplification possible. There are a few key ways that ARA enables better operations, these include:


Lessen Core Banking Risks, use IT controls
It is a pre-requisite for IT managers to possess good banking domain knowledge and be conversant with the features available on the CBS. He should have knowledge of IT audits with Risk assessment techniques to determine whether the information systems are properly protected and controlled and provide value to the organisation. Likewise, an IT manager should also have an understanding of the organisation and its environment, and of factors which can affect the entity, both external and internal.


No more fake names: German court sides with Facebook over pseudonym lawsuit
"The court allowed that the applicability of the strict German data protection law is undermined by clever internal organisation in an IT company... For both users and German companies which have to comply with the German data protection standards, it is difficult to understand why an offer for the German market may ignore these standards," Thilo Weichert, the head of the ULD, said in a statement.



Quote for the day:

"My responsibility is leadership, and the minute I get negative, that is going to have an influence on my team." -- Don Shula

November 14, 2012

Five solid FTP clients that also happen to be free
There are plenty of tools available that range in the simple, single-minded FTP application to the feature-rich, more complicated tool. With that in mind, here are the five FTP clients that should fit nearly any situation and do so without costing you or your department a penny.


Performance Tips for Asynchronous Development in C#
In a recent online C# Corner column, "Exceptional Async Handling with Visual Studio Async CTP 3", Patrick Steele showed how the Visual Studio Async CTP (version 3), which extends Visual Studio 2010 SP1, handles aggregating exceptions that happen in background, asynchronous methods. In this column, the author covers the mechanics of the Async framework and offer some tips on maximizing its performance.


Nokia debuts Here, cross-platform location service
The move is being backed with the acquisition by Nokia of Earthmine, a California-based provider of street-level 3D imaging data, and will see Nokia going head-to-head with Google, Apple and dedicated mapping companies like TomTom.


Jaspersoft BI suite gets a new visualization engine
With the commercial release of version 5 of its self-named reporting and analysis suite, Jaspersoft has revamped the software's visualization engine, doing away with an Adobe Flash-based visualization engine in favor of one using HTML5 Web standards.


Can Machines Really Think?
Some have argued that artificial intelligence is impossible (Dreyfus), immoral (Weizenbaum) and perhaps even incoherent (Searle). And yet, despite the cynicism of those before him, Alan Mathison Turing, the dubbed father of computer science, posed his famous challenge in the mid-1900s: is it possible to create a machine so intelligent that we cannot discern any difference between human and machine intelligence?


Google Fiber is live in Kansas City, real-world speeds at 700 Mbps
After months of fanfare and anticipation, gigabit home Internet service Google Fiber finally went live on Tuesday in Kansas City. The search giant is offering 1 Gbps speeds for just $70 per month—significantly faster and cheaper than what any traditional American ISPs are offering.


How CMOs Can Work with CIOs to Gain Customer Insight
One of the key challenges CMOs face is figuring out how to partner with other internal functions. But given that today's CMO is often the main connection between the consumer and the company, a strong relationship with the CIO can allow her to leverage technology to better understand those customers.


Skype disables password reset page to deal with email-based security 'vulnerability'
Skype has taken down its password reset page as it deals with a password reset exploit that can give suspicious types access to your account with only your email address.


Project Portfolio Management – A Strategic Activity
Organizations that excel at portfolio management, typically complete projects on time and under budget while increasing ROI, according to Aberdeen Research. In fact, an effective portfolio management program can enable companies to achieve up to 25% more revenue from new products when compared with less successful competitors, according to Aberdeen.


Google India fined $13.8M for false accounting
Search giant's Indian arm accused of misleading tax authorities by underdeclaring revenue from AdWords and evading taxes through international transactions, but Google India denies the claim.


HTML5's weakness is Qt's opportunity, says Digia
Tommi Laitinen, product chief at Finnish software firm Digia, told ZDNet UK on Tuesday that businesses still want cross-platform development capabilities for creating user interfaces, and claimed that Qt would be well-placed to deliver. Laitinen was speaking shortly after the unveiling of Qt 5.0 and Digia's roadmap for the toolkit, which should see Android and iOS support added around the autumn of 2013.



Quote for the day:

"If people knew how hard I worked to get my mastery, it wouldn't seem so wonderful at all." -- Michelangelo

August 21, 2012

Implementation options for Android ads in code or layouts
You can choose to set up the ad request in the layout files (XML), or you can implement the ads entirely in code. Each has advantages and disadvantages, so it might be appropriate to use one or the other in different situations.

India backtracks on domestic networking tech rule
The revised draft, which was completed on Aug. 3, was then updated to say India will "progressively develop indigenous capacity to manufacture electronic telecom equipment and software [to be] inducted into the network

HTC Signals Focus on Business Market with Investment in Enterprise App Provider
HTC announced the investment on Monday in a Taiwan Stock Exchange filing, stating that the company was buying a 17.1 percent stake in the Silicon Valley-based Magnet Systems. "The investment will bring social, mobile, and cloud capabilities to HTC's portfolio of service offerings to its mobile enterprise customers," HTC said in its filing.

20 Must See CSS3 and jQuery Tutorials
Although, HTML5 will not be fully implanted until 2014 , many web designers/developers, companies and web enthusiasts are using HTML5 and CSS3 in their products and apps. In this post we are sharing 20 recent web design tutorials that explore the true potential of HTML5, CSS3 and with a mix of good old jQuery.

NetApp adds Flash server caching, forges Fusion-io partnership
According to Paul Feresten, senior product marketing manager of NetApp's intelligent caching products, the company's strategy is to bring end-to-end caching including server-level Flash. Moving to the server, NetApp argues that it can provide better performance and granularity to requirements and serve databases.

Compuverde pitches object storage at cloud, big data
The company's Linux-based gateway works as a network attached storage (NAS) head to expose CIFS, NFS, Cloud Data Management Interface (CDMI) and open source OpenStackinterfaces to the object storage software. The gateway can also host virtual machines (VMs) and cache data on solid-state drives and NVRAM.

Preparing your teams for software defined networking
SDN provides the means to automate networks to better support different workloads, but I&O professionals also need to understand how SDN can support turning networks into a virtual network infrastructure.


Two news items from the tech startup ecosystem broke through the clutter of politics, cricket, Bollywood, and more politics news in India earlier this month. The first was good. The second was just grim.

Communicating Cybersecurity Risk to Business Leaders
Communicating  cybersecurity risk effectively to business leaders depends on your ability to answer the question  "How much risk do we have?" with a credible financial metric familiar to risk management decision makers. Here is a webinar on the topic.

Automaticly localizing applications with Google Translate
Google does offer a web service that provides that ability to programmaticly translate strings, however this does require a purchase of a license where this application allows for the use of the web site for free.

Oracle pays $2 million SEC fine to settle India corruption case
The Securities and Exchange Commission charged Oracle under the Foreign Corrupt Practices act for failing to keep its India subsidiary from creating a slush fund used to pay phony vendors.


Quote for the day:

"The excitement of learning separates youth from old age. As long as you're learning you're not old." - Rosalyn S. Yalow

August 08, 2012

Agile development costly, confusing: Report
A report by Voke Inc. found that companies do not understand costs of rework and cannot identify clear benefits of agile. But an agile consultant says the study shows a "fundamental misunderstanding" of what agile is

Do procurement processes allow Agile software delivery?
Longer projects run, higher likelihood of project failure. One of the moves in recent times to reduce complexity in software development is to adopt Agile delivery approaches. The desire to build confidence and leave tangible benefits even if projects are cancelled has provided further impetus to adoption of Agile practices. 

Plextor M5 Pro solid-state drive
CNET Review says: Fast and compatible with all systems, the Plextor M5 Pro would be a great solid-state drive for anyone who can afford it

How to Be a More Reliable Professional
Unreliability was recently identified as the number one career-limiting habit and it’s no surprise. After all, if the people you work for (and with) can’t depend on you, what purpose do you serve?Truth be told, unreliable people are actually dangerous to the success of the entire team.

Forrester: Bump the HTML5 effort; this isn't 2011 anymore
We're not living in 2011 anymore. This is 2012, where HTML5 can spread its wings and stretch out, thinks Forrester

New Healthcare Ecosystem Requires New Collaboration Approaches
In reading a recent article published by PharmaExec on Innovative Contracting, it was encouraging to see continued discussion within Life Sciences arena that strives to address the needs of their customers, the payers and providers.

Google spreadsheets gains lockdown feature
Google has added a new feature to its spreadsheet product that enables users to lock down particular sections. According to Google, the feature, called Protected Ranges, is intended to stop cells being modified accidentally when several users are working on the same spreadsheet.

Two Leadership Models
In leadership, there are two distinct organizational models. Since few things are quite so black-and-white, we might consider them to be two ends of a continuium, with a virtually limitless number of stops between the two

Google’s self-driving car: A long road, but now 300,000 miles shorter
Google’s self-driving car may have sounded like the stuff of fantasy and The Jetsons not so long ago, but the company is famed for getting its teeth into a number of frankly odd and fun projects. The new car is no exception — and it seems Google’s engineers aren’t doing too bad a job either.

On learning enterprise-architecture
How someone can become a consummate generalist without getting insane as there is lot out there to learn because EA is the architecture of the enterprise? How do someone bring focus(Focus to not to focus on particular thing)? How do I create a specialist in me who is generalist?



Quote for the day:

"Whenever you find yourself on the side of the majority, it is time to pause and reflect." ~Mark Twain