Showing posts with label microsoft. Show all posts
Showing posts with label microsoft. Show all posts

Daily Tech Digest - March 08, 2020

Navigating the compliance minefield with robotic process automation

Navigating the compliance minefield with robotic process automation image
RPA can assist with compliance by helping create more robust and effective compliance programs. From a reduced volume of legal issues, better retention of employees and customers, and improved business operations, RPA can help in many ways. It enables organisations to take greater control over their own operations and deal with compliance issues more easily if they arise. It also offers higher levels of compliance as, once a process is established as an automated workflow with RPA, it is executed in the same way every time without errors, regardless of whether the process concerns data transfer and migration, invoice processing, or purchase order issuing. This means that RPA empowers companies to establish unparalleled levels of process accuracy, especially compared to the work that can be done by human employees. Consequently, businesses can better maintain higher levels of compliance across all business processes. 



For self-driving cars, winter is coming


For Richard Porter, director of technology and innovation at UK self-driving hub organization Zenzic, project CAVForth is evidence enough that the government will effectively meet its deadline for 2021. "We will have an automated bus service commercially carrying a large number of passengers," he told ZDNet. "It will be up and running by 2021, and it will be the main project through which we will be delivering on that deadline." "We interpreted the government's deadline as a commitment to prove by 2021 that the technology can actually start to deliver commercial services. Then, we can start delivering those services at a significant, visible scale." Is the smart car anticlimax simply due to misinterpretation of the government's commitments? Perhaps. But it is worth noting that the industrial strategy's vision does not include human safety operators monitoring the vehicle; and that none of CAVForth's buses will have such a degree of autonomy. Whether experts agree or not on the politics of the government's promise, there is one point that brings about consensus across the industry: even if connected car technology is looking like it will be ready to go by 2021, the UK – and other countries, for that matter – is still a long way from having all the necessary frameworks to make sure autonomous cars can be deployed safely


Microsoft Warns Of 'Devastating' Cybersecurity Threat To Windows Users

The Microsoft logo and company name shown on a banner in black and white
The critical message to digest from the Microsoft deep dive into this threat is that not all ransomware is the same. The automated, bot-driven worm-like ransomware that spits out across the interwebs like a cyber-blunderbuss is damaging enough, for sure. However, the Microsoft threat protection intelligence team is warning about the type of hands-on, human-operated, highly targeted threat that is more commonly associated with the credential-stealing and data exfiltration antics of nation-state actors. Indeed, there is a similarity beyond the targeting; some of these ransomware attack methodologies have evolved to exfiltrate as well as encrypt data. DoppelPaymer, which recently hit the headlines when I reported how Lockheed Martin, SpaceX and Tesla had all been caught in the crossfire of one cyber-attack on a business in their supply chains, is an excellent example of the breed. More of that in a moment, though. First, let's look at the attack tactics and techniques Microsoft is alerting users to.


SLIDE algorithm for training deep neural nets faster on CPUs than GPUs


SLIDE doesn’t need GPUs because it takes a fundamentally different approach to deep learning. The standard “back-propagation” training technique for deep neural networks requires matrix multiplication, an ideal workload for GPUs. With SLIDE, Shrivastava, Chen and Medini turned neural network training into a search problem that could instead be solved with hash tables. This radically reduces the computational overhead for SLIDE compared to back-propagation training. For example, a top-of-the-line GPU platform like the ones Amazon, Google and others offer for cloud-based deep learning services has eight Tesla V100s and costs about $100,000, Shrivastava said. ... Deep learning networks were inspired by biology, and their central feature, artificial neurons, are small pieces of computer code that can learn to perform a specific task. A deep learning network can contain millions or even billions of artificial neurons, and working together they can learn to make human-level, expert decisions simply by studying large amounts of data.


Why is agile so much more successful than waterfall?

diagram of planning a cloud
The reasons why waterfall methodology is not as successful as agile seem clear. But the underlying causes are not necessarily down to reckless approaches to managing the software development project. The waterfall approach does not arrogantly dismiss early and frequent integration testing. Everyone would love to be able to detect significant risks as early as possible. The issue is with the inability to integrate services and components that are not ready for testing (yet). As we progress on a project, we prefer to utilize the divide-and-conquer approach. Instead of doing the development and building sequentially (one thing at a time), we naturally prefer to save time by doing as many things as possible in parallel. So, we split the teams into smaller units that specialize in performing dedicated tasks. However, as those specialized teams are working, they are aware of or are discovering various dependencies. However, as Michael Nygard says in Architecture without an end state: "The problem with dependencies is that you can't depend on them." So the project starts slowing down as it gets bogged down by various dependencies that are not available for integration testing.


The state of container-based cloud development

The state of container-based cloud development
Enter containers, with new challenges and opportunities regarding state retention. In the world of containers, we are taught to be stateless. In container design, including courses I’ve taught, the idea is that a container emerges as an instance, does what it’s programmed to do, and goes away without maintaining state. If indeed it works on data from some external source, it’s handed the data by another process or service, returning the data to another process before being removed from memory. Still, no state maintained. The core issues are that containers, as invented years ago, just could not save state information. There was no notion of persistent storage, so maintaining state was impossible. We were taught early on that containers were for operations that did not require state retention. Some people still argue the need for stateless when building container-based applications, contending that it’s the cleanest approach, and that thinking stateful means thinking in outmoded ways. However, that may not be acceptable to most enterprises developers who are using containers. Traditional applications are not purpose-designed and built for containers.


Take advantage of these 5 benefits of server-side rendering


A key benefit of server-side processing is that it doesn't offload data processing to the client. Instead, the browser does what it's designed to do best, which is rendering static HTML to the client. The browser removes the variability of the user's device processing power from the equation, and server-side processing performance becomes more predictable. Single page applications and responsive web apps that rely heavily on client-side rendering significantly minimize the number of round trips that happen with the server because most of the stage management and page transitions happen on the client. Unfortunately, when a page relies heavily on client-side state management, the server is no longer informed as the end user moves from page to page, clicks on buttons or otherwise interacts with the site. This means key metrics such as time on page, exit page counts and bounce rate are either impossible to collect, or are calculated incorrectly.


Disruptive Defenses Are The Key To Preventing Data Breaches

Photo:
Is this the new normal? Can there be any expectation of security and privacy when even the most stringent of data privacy regulations appear to have little effect? Companies, government agencies and consumers must change their behavior if they expect to stem this tide. They must adopt disruptive defenses to make it extremely hard for attackers to compromise data. What is a disruptive defense? It is an uncommon defense, based on existing industry standards, that raises application security to higher levels than what is currently used by most applications. There are six disruptive defenses that, when deployed, create significant barriers to attackers. ... Cryptography represents the last bastion of defense when protecting sensitive data. As such, cryptographic keys are the only objects standing between an attacker and a major headache for your company. While convenient, keys protected in files are protected by passwords and are subject to the same attacks that compromise user passwords. By using cryptographic hardware -- present in all modern systems -- applications create major barriers to attacks.


Build Great Native CLI Apps in Java with Graalvm and Picocli


Picocli is a modern library and framework for building command line applications on the JVM. It supports Java, Groovy, Kotlin and Scala. It is less than 3 years old but has become quite popular with over 500,000 downloads per month. The Groovy language uses picocli to implement its CliBuilder DSL. Picocli aims to be "the easiest way to create rich command line applications that can run on and off the JVM". It offers colored output, TAB autocompletion, subcommands, and some unique features compared to other JVM CLI libraries such as negatable options, repeating composite argument groups, repeating subcommands and sophisticated handling of quoted arguments. Its source code is in a single file so it can optionally be included as source to avoid adding a dependency. Picocli prides itself on its extensive and meticulous documentation. Picocli uses reflection, so it is vulnerable to GraalVM’s Java native image limitations, but it offers an annotation processor that generates the configuration files that address this limitation at compile time. ... We can make our application more user-friendly by using colors on supported platforms. This doesn’t just look good, it also reduces the cognitive load on the user: the contrast makes the important information like commands, options, and parameters stand out from the surrounding text. The usage help message generated by a picocli-based application uses colors by default.


AT&T, Palo Alto Networks and Broadcom develop virtual firewall framework

The framework is an expansion to the Distributed Disaggregated Chassis (DDC) white box architecture that AT&T submitted to the Open Compute Project last September. The expansion delivers a dynamically programmable fabric with embedded security at the edge of the network, AT&T said. Specifically, the framework embeds AI and machine learning in the network fabric to prevent attacks. "Security has always been at the forefront of AT&T's network initiatives," said Michael Satterlee, VP of network infrastructure and services for AT&T. "Traditionally, we have had to rely on centralized security platforms or co-located appliances which are either not directly in the path of the network or are not cost effective to meet the scaling requirements of a carrier. This new design embeds security on the fabric of our network edge that allows control, visibility and advanced threat protection." AT&T said the framework -- which uses an open hardware and software design to support flexible deployment models -- also represents its white box approach to network design and deployment.



Quote for the day:


"Superlative leaders are fully equipped to deliver in destiny; they locate eternally assigned destines." -- Anyaele Sam Chiyson


December 23, 2012

SANS Netwars Tests Cybersecurity Pros Against Peers
The competition is both educational and fun, said Jorge Orchilles, manager of the infrastructure vulnerability assessment team at Citi Global Security Operations. Orchilles participated in the competition last week and finished in third place in a NetWars competition in 2011.


The CloudTimes Year in Review – And 2013 Cloud Predictions
The question now should focus on what will happen to the data that we store on public clouds by 2013. There are a lot of moves that are supposed to protect our data but we all know that technology is moving faster than legislation. Let’s take a look the possibilities on how public clouds, such as social media, will use our data.


The Leadership Brand: How to Discover Your Personal Brand Persona
To help you discover your brand persona, Todd Nielsen lists twelve of the most common archetypes into which leaders fit and included examples from the 2011 TIME 100 list of leaders. These types vary based on personality, style of leadership and a number of other things.


Does disaster risk management pay?
A new study, published last week in the journal Risk Analysis, provides a new methodology based on Cost-Benefit analysis to assess the economic efficiency of disaster risk reduction efforts in disaster hot spots in developing and emerging economies. Faced with fiscal austerity, many national and international policymakers have increasingly become interested in the economic case for disaster risk management.


BYOD, Enterprise Mobility and Beyond – What to expect in 2013
Interestingly enough for Trend Micro – the company that has made the “Journey to the Cloud” its corporate mantra – Raimund’s top two predictions are not related to the cloud but rather to the inevitable impact of consumer mobile platforms on corporate IT – a topic particularly relevant to the Consumerization blog and to the Enterprise Mobility professionals among us


2013 Will Be Dominated By Mobile, Cloud Developments: IDC
"The IT industry as a whole is moving toward the mobile/social/cloud/Big Data world of the 3rd Platform much more quickly than many realise: from 2013 through 2020, these technologies will drive around 90 percent of all the growth in the IT market," said Frank Gens, Senior Vice President and Chief Analyst at IDC. "Companies that are not putting 80 percent or more of their competitive energy into this new market will be trapped in the legacy portion of the market, growing even slower than global GDP."


European Privacy Watchdogs Examine Microsoft's Services Policies
Microsoft confirmed on Tuesday that it had received a letter from the Article 29 Working Party that it would proceed with a probe. On October 26, the computer giant was notified of a preliminary investigation. The Article 29 Working Party (A29 WP) is made up of the data regulators from all European Union member states as well as the European Data Protection Supervisor (EDPS).


After first-round success, Microsoft accelerator lines up its new start-ups
“Over 300 companies, consisting of 1,000 entrepreneurs, applied to enter the Microsoft Accelerator for Windows Azure, but we could only accept 13,” said Weisfeld. Based on the results of the first group, which began its four-month participation in the first accelerator group last March, the chosen few have a busy — and enriching — future to look forward to, with the new program running from December through March.


Engine Yard Continues Trend of Local Fabric for Public Clouds
Last month, platform-as-a-service (PaaS) provider Engine Yard released a “cloud in a box” that developers can use to test their applications locally before publishing to the public cloud. Multiple cloud providers have now embraced this deployment model as a way to accelerate development while making it easier to try a particular cloud before committing to it.


9 Triumphant Open Source Projects of 2012
The platform namely open source has undergone a profound revolution in recent years as this unique software project has staged itself to be so ample and apt mainly because of its support to challenge the characteristics of similar software from other private vendors like Microsoft. And now with the year 2013 around the corner, let’s take a look at some of the most successful open source projects of the year 2012.



Quote for the day:

"Never be afraid to try, remember, amateurs built the ark. Professionals built the Titanic." -- Anonymous

November 09, 2012

Microsoft slates first Windows 8, RT patches since launch
The Windows 8 and Windows RT security updates will be the first shipped since those operating systems' launch on Oct. 26. While Microsoft had previously issued patches for the new OSes, all but a September "out-of-band" fix for IE tackled problems in its unfinished previews, not the final code


HP urges consumer customers not to downgrade new PCs to Windows 7
"If users choose to downgrade their HP consumer desktop or notebook system, HP will continue to support the hardware but if there is an issue where HP diagnostics are required or it is determined that the loaded software or upgrade operating system is causing the issue, HP may suggest returning the system to the original Windows 8 OS."


How to save a failing project and when to walk away from one?
It is vital for PMOs to recognize the signs of a failing project and take corrective action before it is too late. In order to engineer a successful turnaround, PMOs and PMs need to watch for certain leading indicators of project failure.


10 Leadership Practices to Stop Today
The old days of command-and-control leadership are fading in favor of what might be better termed a trust-and-track method, in which people are not just told what to do, but why they are doing it. More formally, we're moving from what was called "transactional" leadership to "transformative" leadership. And there's no turning back.


Business Process Excellence Starts by Avoiding “BPM”
“There is a crying need for all of us to improve process. But if we use those three little letters – BPM – suddenly you watch audiences disappear before your eyes,” McGregor says.


GE’s Colab Brings Good Things to the Company
An internal social network at GE is mimicking all the good things that people get outside in their social lives with Facebook, says GE’s Ron Utterbeck: quick responses, connections with people they know — and coordination with people they didn’t even know were out there.


In software market, CRM, virtualization, and collaboration show strongest growth
The global software market grew 4.7 percent in the first half of this year to $167 billion, with CRM (customer relationship management), virtualization and collaboration coming in as the fastest-growing segments, according to figures released Wednesday by analyst firm IDC.

Microsoft adding in-memory technology to SQL Server
The next version of SQL Server will feature the ability to host database tables or even entire databases within a server's working memory. "Any application that is throttled by the I/O of a hard disk would benefit by [having its data] moved into memory," said Doug Leland, Microsoft general manager.


Gartner Identifies Four Futures for IT and CIOs
"We are witnessing the emergence of a new generation of CIOs, one that aims not so much to 'run' IT as to ensure that the business achieves strategic value from the use of technology," said John Mahoney, vice president and distinguished analyst at Gartner. "Although this isn't an entirely new development, the extent of the change is growing and a tipping point will be reached in the next five years."


Google allows bigger, faster Cloud SQL databases
The company has updated its Cloud SQL service, increasing the maximum size of databases tenfold and the maximum size of instances fourfold. Users can also now choose whether they want their database stored in a US or EU datacentre.


Quote for the day:

"Success is simple. Do what's right, the right way, at the right time." -- Arnold Glasow

November 04, 2012

Choosing Who NOT to Help
Leaders can’t help those going in the “wrong” direction. By wrong, I don’t mean morally wrong. I mean wrong for the organization. Get out of boats going in the “wrong” direction or you’ll dilute your leadership and the effectiveness of your organization.


Security Researcher Shares Blow-by-Blow Account of Advanced Persistent Threat
Hackers are brazenly infiltrating corporate networks to steal valuable data for purposes of sharing it with other companies or nation-states -- and they're getting away with it, say security researchers sharing war stories at the Hacker Halted conference in Miami this week.


How to make Windows 8 look like Windows 7
When Windows 8 first loads, you'll notice how it defaults to the new Start screen. If you'd rather go straight to the traditional desktop we all know and love, download a free tool called Skip Metro Suite. Once installed, launch the program and verify 'Skip Start Screen' is ticked.


Wyndham Exchange & Rentals has forecasting fever after profits roll in
on the business side they’re identifying risks, for example when revenue targets are exceeding demand forecasts, and sharing that information into the business units and finance teams. The technical forecasting team is a well-oiled machine, building revenue management forecasts to be more highly automated and run much more frequently.


ZeroMQ via C#: Introduction
The main part of ZeroMQ is the socket. It's not the traditional socket, but it's a socket that provides a layer of abstraction on top of the traditional socket API, which frees us from the complexity and the repeated tasks that we do in our applications.


5 trends that are changing how we do big data
In just a few years, big data has turned from a buzzword and concept best left for large web companies into a force that drives much of our digital lives. Here are five technological trends that will change how data is processed and consumed going forward.


Top 5 wireless routers: Home networking evolved
It was clear from CES that 2012 is going to be a year of major changes in home networking, considering the availability of the new 802.11ac Wi-Fi standard. While it's rather complicated to figure out all the differences between Wi-Fi standards, it's quite easy to equip yourself with the best as long as you follow this regularly updated list of the Top 5 networking products currently available.


Internet Governance Forum in Azerbaijan To Discuss Global Policy
Unlike many U.N. forums, IGF is attended not just by government officials but also by corporations, non-profit groups (aka “NGOs” or “non-governmental organizations) and scholars interested in how to handle, security, stability, growth and content management on the global Internet.


Nokia Lumia 920 camera vs. HTC Windows Phone 8X vs. iPhone 5
Pore through these photos to be your own judge. In most cases, you can click to enlarge them. Unless stated, all photos have been cropped or resized, but are otherwise untouched, and I took all photos using automatic settings and modes


Creating Success Through Serendipity
In short, serendipity involves an element of luck that is out of our control but you also have to have the wisdom to spot the opportunity and act. Without the latter, the opportunity would be lost.



Quotes for the day:

"There’s always an opportunity to make a difference." – Michael Dell
"Winning is important to me, but what brings me real joy is the experience of being fully engaged in whatever I'm doing" -- Phil Jackson

November 02, 2012

Windows 8 uptake remains listless after public launch
The poor-thus-far showing of Windows 8 doesn't preclude it from eventually thriving, of course. Microsoft is reportedly ready to spend between $1 billion and $1.5 billion on advertising the new operating system, its Windows RT spin-off, and the also-new Windows Phone 8.


Intel researchers work on new way to display, share images
Vara demonstrated the project, dubbed Display without Borders, with a laptop, a Microsoft Connect sensor and a projector. Intel didn't give a timeframe for when the technology might go to market..


TDWI Checklist Report // Using Location Information for Geospatial Analytics
In this TDWI Checklist Report, we review the alignment of geospatial information with the business intelligence environment and provide suggestions for capturing location information and differentiating between deliverable addresses and geolocations.


arrayDB, a New and Easy PHP ORM
arrayDB ORM library has only 5 classes. You mostly use a singleton of one, while others are used internally, that's all. Caching and keeping cache synchronized with the database is all automated, you don't need to keep track of these.


The difference between a weakness and a fatal flaw
Having this significant weakness most often counters or negates the positive impact of profound strengths. In every case we have examined, fatal flaws appear to pull down the effectiveness of a leader. These cases are not rare or unusual. Statistically, we find that 28% of the population of leaders has one or more competencies at the 10th percentile or lower.


An enterprise-wide vision for social business: SAP's new take
Earlier today software giant SAP unveiled their latest vision for enterprise social software, along with an integrated set of functional offerings that focus on delivering targeted business value. Is it enough?


The Digital Capabilities Your Company Needs
In-depth interviews with 157 executives in 50 large companies found that the most fundamental technology requirement for digital transformation is not particular skills or particular technologies. It is a core set of four digital capabilities. These four capabilities revolve around technology but typically not all of them reside in the IT department.


Leadership Perspectives: What Is Your Intention?
There are so many avenues we could take in this conversation, and The Lead Change Group has done that in their new book, The Character Based Leader: Instigating a Leadership Revolution….One Person at a Time, written by 21 authors who believe deeply in this concept of character based leadership.


The software creation literacy crisis
Amid the great wall of noise the digital world is today stands a stark reality: fewer and fewer people have the ability to read and write the basic code building blocks of the internet and mobile world. Ismael Ghalimi of STOIC provocatively writes


Eventually, 90% of tech budgets will be outside IT departments
So CIOs will be relegated to the backoffice, back-room server stuff, while the CDO gets all the fun, get-the-attention-of-management stuff, such as cloud, social, mobile and Big Data?  Gartner says there is a highly visible role for CIOs as well: "CEOs want their CIOs to make their impact felt where the enterprise meets the outside world.



Quote for the day:

"A competent leader can get efficient service from poor troops, while an incapable leader can demoralize the best of troops." -- John Pershing

October 30, 2012

Learning How to Swim: Making the Case for a Big Data Strategy
Most people have heard a lot of big data buzz, and a great percentage of these people are persuaded that its potential will be realized eventually. However, enterprises that could actually reap benefits from big data right now may be thinking there’s no rush to take advantage of it.


Malware hijacks your email, sends death threats
Analysis of the malware has found that a sabotaged computer can be controlled through a remote location -- a common component of such infections. Through this control, the creator is able to make threats on behalf of the infected user's PC.


Windows Store has enough apps to prevent Windows RT flop, say analysts
"This gives them a shot at success," said Patrick Moorhead, principal analyst with Moor Insights & Strategy, in an interview. "It's a positive first showing, but they must have consistent singles, doubles, triples and home runs."


Enterprise Content Management: Become a Value Creator
Whether you’re talking about inducing better customer service or internal streamlining, Enterprise Content Management (ECM) has shot onto the radar in recent months as our virtual worlds continue to impact – and hopefully relieve – our previously cluttered (and retrospectively rudimentary) offline processes.


How to Hold Productive Meetings That People Don’t Actually Hate
Meetings are an essential aspect of getting things done, collaborating and delegating, but for many they are the bane of business life. People actually leave companies because of the life draining nature of their meeting culture.


Where is cloud computing heading in 2013?
There will be more innovation in application testing and development in 2013, with new cloud applications coming out to market. “We can expect to see new types of applications delivered out of the cloud, more options for where data is hosted (and the type of infrastructure it’s hosted on) and more services offering ‘enterprise-grade’ application hosting.”


A Character-Based Leader Leaves a Powerful Legacy
If you are a character-based leader, you are making a difference, even if the evidence is sparse on a daily basis. The seeds of your leadership legacy are being planted every day, through the small, seemingly inconsequential choices you make. Those seeds may take months, or even years, to bear fruit. But they are there, ever-growing, taking root and preparing to bloom.


IT Security Survey Shows Struggle to Control Cloud Computing, Social Media and Mobile Risks
Many CIOs and chief information security officers are struggling to adapt security practices to a changing environment that includes cloud computing, social media and tablets, according to a survey of 1,850 such IT pros.


Cut Features; Add Value
The key to systematically being able to cut product scope, while still delivering a great product, is to link the value the user needs to receive to the actual features in the product. To understand that value, consider what problems the product is solving and what objectives the user has for the product. This will help you derive the most valuable features.


8 Hacks to Make Google Calendar More Useful
If you use Google Calendar, you probably add events, reminders and vacation days to it, just like the calendar that used to hang on your wall (or the day planner you carried with you before the emergence of smartphones). But, what if it wasn't just a calendar, and "events" weren't just places you had to be or items on your schedule? It turns out, Google Calendar can be useful for just about any task that is relevant to either days or times.



Quotes for the day:

"Obstacles are those frightful things you see when you take your eyes off your goal." -- Henry Ford

"It's not what you are that holds you back, it's what you think you are not." -- Denis Waitley

October 28, 2012

Thick Skin Thinking: How To Use Negative Feedback To Your Advantage At Work
“If you are of the belief that you never make mistakes, you probably have a narcissistic personality disorder, and it’s going to be really hard to give you feedback. Somebody who has enough self-awareness to recognize they might need feedback, that’s the person that’s going to say ‘Even when I’m on my best game, there’s always something I could’ve done to be better.’”


Configuring Database Mail in SQL Server
This is an enterprise solution for sending mails from the SQL Server database engine to SMTP servers. SQL Server database applications can communicate with users through an email system. It provides features like scalability, security, and reliability.


The Silent Killer of Big Companies
Most leaders today recognize how dangerous it can be to take a lax approach to people management. But how many leaders appreciate the risks that come with taking a lax approach to communication management — with failing to manage the way that ideas and information flows within their organization?


7 reasons why Windows RT works
But fear not: Just because Redmond doesn't want you calling it Windows 8 Lite doesn't mean it doesn't have redeemable qualities. Windows RT and the devices that run it offer some excellent, interesting innovations. Here are our top six:


BizTalk ESB Exception Handling – Consuming WCF Services – Part I
Another interesting fact I bumped into when calling a WCF service from an itinerary is that, when the WCF adapter raises an exception, the receive pipeline of the send port does not execute. The first time I saw this was when trying to authenticate a service request when the target service refused my credentials.


CIOs Talk About How Social Networking Builds Enterprise Collaboration
Over the last five years or so, more organizations have used social networking sites such as Facebook and Twitter to communicate with customers. Now many organizations are taking a cue from those sites to deploy more socially minded communication and collaboration tools. Does taking a more social, collaborative approach work?


Why the New Oracle ADF Essentials is Important to JSF Developers
These news should be very interesting to developers who are currently using JSF to build their applications, as Oracle ADF Essentials is offering some unique capabilities and extensions around JSF. Here are some of the things JSF developers should know about ADF Essentials:


Data quality process needs all hands on deck
“More and more businesses need to invest resources for quality, useful information,” said Lyn Robison, another Gartner analyst. “A business that can’t produce useful information is like an airplane that can’t fly. How useful is that? Not very.”


Enterprise architecture methodology
It is hard to know which one is best EA methodology. Each kind has advantages and disadvantages, so choosing what kind of them is depending on each organization. There are twelve criteria that are most often used for comparing and evaluating enterprise-architectural methodologies.


IT, business executives don't see eye to eye on innovation: survey
"IT respondents are more likely to position themselves as driving innovation, being an expert on innovation and having the required skills to foster innovation," the report states. "Yet, business executives more quickly identified IT’s shortcomings in regard to its ability to support and drive innovation. In fact, business executives are less likely to highly rate IT’s knowledge of the business, skill sets, communication skills and more."



Quotes for the day:

"One person with passion is better than forty people merely interested." —-- E. M. Forster
 
"One measure of leadership is the caliber of people who choose to follow you." -- Dennis A. Peer

October 26, 2012

Windows 8: Four big takeaways for business and IT
Yes, this is even bigger than the launch of Windows 95. Why? Because Microsoft is completely rewriting the idea of what it means to use a computer. The old file and folder metaphor is gone. The visual image of a desktop workspace is history (except for legacy apps).


Facebook Releases New Android SDK
Facebook announced Facebook SDK 3.0 Beta for Android in a blog posting this week. Facebook's Michael Marucheck calls it the biggest update ever for Android developers. The major change is in the area of native UI controls.


IBM Voices Support for PaaS at Cloud Forum
IBM spent much of the one-day event, attended by 100 customers and 200 other stakeholders including business partners, talking up PaaS. The company's PaaS offering, called SmartCloud Application Services (SCAS), is available in pre-release form for customers of IBM's existing infrastructure as a service (IaaS) offering, SmartCloud Enterprise (SCE) and it will be generally available later this quarter.


Introducing TDD With The Microsoft Fakes Framework
The big issue with TDD for most developers is, I think, the database. If your tests are driven by your data, and your data keeps changing, how do you to ensure that you get the "right" answer in your automated tests? However, that's just one example of a larger problem: If the code you're testing is dependent on something else, and that something else keep changing, how do you ensure that your test results stay constant?


Delivering Large-Scale IT Projects On Time, On Budget, and On Value
Half of all large IT projects—defined as those with initial price tags exceeding $15 million—massively blow their budgets. On average, large IT projects run 45 percent over budget and 7 percent over time, while delivering 56 percent less value than predicted. Software projects run the highest risk of cost and schedule overruns


There’s No Data Security ‘Get Out of Jail Free’ Card
Maintaining data security is no longer a when-you-get-to-it project. It’s a critical step that needs to be undertaken now, particularly as the government is formulating a final rule that toughens privacy. That was the take-home message from a session on data privacy at the Medical Group Management Association annual convention, in San Antonio.


A CEO takes on the war for talent
NetSuite's chief people officer, Marty Réaume, says he started using a talent-assessment tool called TriMetrix after executives noticed that many new hires were quitting after less than a year, Jessi Hempel writes. Also, the company's CEO, Zach Nelson, began reviewing every potential hire, a strategy that he says motivates recruiters to find better candidates.


5 Hybrid Cloud Use Cases
Along with its private and public siblings, hybrid cloud computing has garnered quite a bit of business interest and proclamations by analysts of rampant growth over the next few years. Technical and security concerns aside, how does this option for cloud deployment fit in the enterprise IT toolkit? And where would it work for business users? Here are five examples where a hybrid cloud model may hold a particular competitive or operational advantage.


Microsoft Releases Hadoop On Windows
HDInsight Server for Windows includes core Hadoop (meaning the Hadoop Distributed File System and MapReduce), plus Pig for MapReduce programming, Hive data query infrastructure, Hortonworks' recently introduced HCatalog table management service for access to Hadoop data, Scoop for data movement, and the Ambari monitoring and management console.


Interview: Steve Howard, COO of Sustainability, IKEA
At yesterday’s BSR conference in New York, I had the privilege of sitting down with Steve Howard, IKEA’s COO of Sustainability to talk about IKEA’s take on sustainability and their new sustainability strategy, known as “People and Planet Positive”.


Will the cloud be the end of the IT department?
Cloud apps are, in a sense, even more problematic. With whom does responsibility for the environment reside? What happens if a user accidentally deletes important data or a user account gets broken into? Proper management of passwords, backup policies, access control strategies, and other issues is even more important.



Quotes for the day:

"Never tell me the sky's the limit when there are footprints on the moon." -- Anonymous

"Most discussions of decision making assume that only senior executives make decisions. This is a dangerous mistake." -- Peter Drucker

October 22, 2012

Forget Bring Your Own Device - Try COPE (Corporate Owned, Personally Enabled)
Plenty of IT departments see BYOD as a demon to be exorcised from the cubicle farms - or an opportunity to dump the responsibility for hardware upkeep on their internal customers. Rather than struggle with BYOD, some companies are turning the whole concept of BYOD on its head in favor of Corporate Owned, Personally Enabled (COPE) policies.


Enterprise sends Windows 8 to the grave before launch
Reuters reports that for a number of corporations, Windows 8 does not suit the enterprise market enough to warrant widespread adoption and movement away from Windows 7. Doug Johnson, head of risk management policy at the American Bankers Association, told the publication:


Microsoft hoping to lure VMware users with new migration tool
Microsoft's free Virtual Machine Converter (MVMC) tool is now available for download. The tool is used to convert virtual machines that today run on VMware products into a format compatible with Microsoft's own virtualisation environment, Hyper-V, the company said last week.


Few Takers for India's Auction of Mobile Spectrum
The Supreme Court ordered 122 licenses canceled in February, and the spectrum thus freed to be auctioned again, after it ruled that the allocation of licenses in 2008 had been manipulated by business interests. ... The lukewarm response to the auction can be put down to investors' concerns after the country's flip-flops on investment policy in a number of areas,


The Enterprise Architecture design has to begin with the whole rather than the parts
IT has currently have quite a few architecture diagrams. In fact, everybody seems to have a model in his drawer. But this is also the problem since these models don't add up to give the big picture. And they don't, since they were not produced to that purpose, but in isolation, with different tools, conventions, naming, scope and purpose in mind. 


Slow Down to Speed up EA Results
As an EA, what is most important? Some will say one versus the other but I believe EA’s real value is to focus on the Speed to Value. We will always have edge cases where we do the Speed to Market. But using the 80/20 rule the real value for EA’s is through Speed to Value.


It’s time for robust data handling
In the age of big data, bring your own device (BYOD) and, yes, multiparty collaboration, there’s an increasingly massive amount of data that you can’t lock down behind the firewall. And if it’s going to be released into the ether anyway, then the safe approach is to turn to solutions that are completely focused on solving the challenges that current trends present.


SOLID design principles improve object-oriented development
SOLID is a set of five guiding principles that help developers design objects that are easy to maintain and use. Like many similar sets of principles in OO, SOLID is a guide not the goal. Let’s take a look at each of the five principles.


Big Data: Moving from strategy to tactics
Big Data, which comes into the enterprise unstructured and unorganized, first needs to be “prepped” so that it can be processed by a business analytics program. Here’s what you need to do.


Trend Micro's Q3 threat report: Mobile malware surged from 30K to 175K
Specifically, Trend Micro said that malware targeting Android increased nearly sixfold in Q3 2012 to approximately 175,000 malicious and "potentially dangerous" high-risk Android apps between July and September.



Quotes for the day:

"Never assume the obvious is true." -- William Safire

"One of the tests of leadership is the ability to recognize a problem before it becomes an emergency." -- Arnold Glasow

October 20, 2012

Up to Date on Open Source Analytics
The good news for hackers like me is that there are so many freely-available, open source analytics products to choose from. The bad news is that it takes a focused effort to stay up to date on the latest largesse.


Patterns in Enterprise Software
In recent years there's been a small but useful growth in describing patterns for the development of enterprise systems. On this page Martin Fowler keep a list of the most notable catalogs on these patterns and some thoughts on the broad interrelationships between them.


Introducing Pastry - distrubuted hash table
Pastry, an implementation of the Pastry distributed hash table written entirely in Go is now open sourced. Second-bit only comfortable calling it an “alpha release” right now, so you may not want to run any mission-critical software on it just yet, but it’s ready to be kicked around a bit.


India, A New Facebook Testing Ground
The company sees the giant nation, whose Internet user base is expanding rapidly, as a market central to its future prospects. Since putting its first employee in India in 2010, Facebook has grown from eight million Indian users to 65 million as of this month, making it one of the company's top global markets.


Sneak Peek into Skybox Imaging’s Cloudera-powered Satellite System
Skybox is developing a low cost imaging satellite system and web-accessible big data processing platform that will capture video or images of any location on Earth within a couple of days. The low cost nature of the satellite opens the possibility of deploying tens of satellites which, when integrated together, have the potential to image any spot on Earth within an hour.


Transforming retail with the power of cloud
For Goodwin, moving to cloud was not, in itself, the goal; rather, he was drawn to the model by how well it would serve all of Hallmark’s stakeholders — through greater flexibility, scalability, cost-effectiveness and the ease with which new capabilities could be added.


Microsoft introduces iOS support to its mobile cloud services
Azure Mobile Services Platform will allow developers to store planned data in the cloud, incorporate it with user confirmation, and deliver updates to clients through push notifications Microsoft has added new features and enhanced support to its Azure Mobile Services Platform for Apple's iPhone and iPad.


What Determines Who You Are as a Leader?
It’s not possible to be a visionary leader if you do not have the ability to connect to the vision that lies within you, cultivate it, and share it with others. You cannot be a magnanimous leader if your heart does not hold generosity.


New Web Optimization Pre-Release Package on NuGet
WebGrease 1.3.0 was published to NuGet just a few days ago – 1.3.0 addresses several bugs found in the JavaScript and CSS minification process, so regardless of whether you choose to update Web optimization, make sure to update your WebGrease package.


MDM Hub Architecture Styles: Registry – Part 2
The Registry hub architecture stores the global, unique identifiers for each unique record, customer identifiers and various relevant metadata including transformation logic, constraints, list of values etc. In this architecture the MDM data hub does not store any physical data, but instead stores links to the records and data attributes in the source systems.



Quotes for the day:
 
"The distance between insanity and genius is measured only by success." -- Bruce Feirstein
 
"People are persuaded by reason, but moved by emotion; the leader must both persuade them and move them." -- Richard M. Nixon

October 11, 2012

Ballmer: Microsoft's a 'devices and services' company now
"It truly is a new era at Microsoft," he says in his annual letter to shareholders, and that means the company is focused on selling hardware augmented by cloud services. "This is a significant shift, both in what we do and how we see ourselves as a devices and services company," Ballmer says in his letter.


SIM: CIOs Feeling Cost Pressure
SIM’s just released survey, which annually reaches out to more than 3,500 CIOs and IT executives at member organizations, had historically placed business and IT alignment at the top of CIO concerns. This year finds that CIOs are facing the same cost-saving pressures as other parts of the organization, says Jerry Luftman, SIM VP, lead researcher for the report and executive director, Global Institute for IT Management.


VMware Tightens Management Infrastructures
VMware is on course to assemble an impervious management infrastructure that will complement its software-defined datacenter plans and solidify its leadership position as a purveyor of private and hybrid clouds. Building on its recently announced VMware vCloud Suite, the company is now focusing on customer service provisioning, cloud operation management and cloud business management.


Box Thinks Outside the Box on Cloud Security, Compliance
On the compliance side, it has released a new reporting API that will enable third-party business intelligence partners, such as GoodData, to create dashboards that will let administrators detect unusual activity such as an individual downloading an excessive number of files.


Effective Application Security Risk Management: From Policy to Standards
This webcast will focus on the individuals who are tasked with writing and/or managing security policies. The goal of this webcast is to explain the value and process of writing application security policies with a particular focus on how to create policies that are useful and actionable for your software development teams.


Microsoft Office coming to Android and Apple devices in early 2013
A Microsoft executive let slip in the Czech Republic that the long-rumored Microsoft Office for Android smartphones and tablets and Apple iPad and iPhones will be arriving in early 2013. Microsoft now denies that their executive was speaking accurately.


DBS, Microsoft partner to boost customer service
DBS Bank has deployed five Microsoft PixelSense table-top multitouch systems in one of its branches here, which it believes will bring better customer interaction and efficiency. ... DBS also chose the system for its object recognition capabilities, he said. The PixelSense technology allows the screen to detect up to 256 unique "symbols", which would then retrieve relevant information associated with each symbol.


Data Warehouse Construction: The Real Life
While the significant similarity can be exploited to increase the constructional productivity, the huge amount of programs converts the data warehouse construction to a real challenge. It is because in addition to the troublesome programming (scripting, coding, "modeling," etc.), all of these programs have to be designed, specified, tested, documented and maintained as well. Such a huge amount of work cannot be accomplished by a single person within a short period.


BMW’s cold call: It shifts computing to Iceland
German car and motorcycle stalwart BMW is transferring crash simulations and other high performance computing to Iceland, where the country’s 100 percent renewable electricity and year round “free” chilling will slash carbon emissions and costs.


Indian IT to create new industry around Big Data
Analytics is becoming important globally thanks to the explosion of data. Corporates have their internal data, but increasingly, they now have to deal with related external data, coming from social media, blogs, image and video sites, sensors and more.



Quote for the day:

"There are no secrets to success. It is the result of preparation, hard work and learning from failure." -- Colin L. Powell

August 04, 2012

The Analytics Carnival
Ever notice how the personalities and dispositions of carnival performers often resemble coworkers in an organization? They come in all shapes and sizes. An organization’s pursuit of adopting business analytics and analytics-based enterprise performance management methodologies also involves personalities of all types.

RIM CEO Reveals A Switch to Android Was Seriously Considered
Heins openly admitted that RIM will not be able to keep up with Apple and Samsung with out outside help. ... Heins also admitted that the company was seriously considering switching to the Android platform. While they took it into consideration, they ultimately decided against it.

How NASA tests an against-all-odds Mars rover landing
The space agency has dubbed Curiosity's imminent landing "seven minutes of terror." And that's even after months of excruciating, exacting preparation.

How to make sense of the big data universe
The best, simple definition of big data comes down to volume, velocity and variety. The volume aspect of big data is actually the one that is the least important. Big data is not about petabytes of data—it can be down to relatively small volumes that need to be dealt with in a manner that requires a big-data approach.

Structured Life, Structured Work, Structured Leadership
“Every company has two organizational structures: The formal one is written on the charts; the other is the everyday relationship of the men and women in the organization.”

Understanding and Implementing Bridge Pattern in C#
When we think about bridge pattern the first thing that come to our mind is "it is some kind of bridge between two different implementations". But this is not true. The above mentioned This is the task of Adapter pattern which is discussed here. But to talk about bridge, this pattern is designed specifically to let the abstraction and the implementation vary independently.

Look Before You Leap into Predictive Analytics
CFOs are keenly aware that while the popularity of the term “predictive analytics” is relatively new, the concept is really nothing revolutionary. Predictive analytics is often described as data mining or advanced analytics that, as a concept, has existed for a long time. The only difference now is the abundance of technologies, tools and applications in the marketplace to analyze the large amount of data available.

Enterprise Architecture in 3 minutes
Enterprise Architecture design for anyone, in a brief animated story.

Is 'Metro' now a banned word at Microsoft?
Why is Microsoft allegedly telling those inside and outside the company to stop playing up 'Metro' going forward when talking about the new wave of Microsoft products?

ID theft may cost IRS $21B over next five years
Identity thieves continue to profit from U.S. government coffers by filing bogus tax returns, according to a new audit

A Personality Test for Entrepreneurs
Once you know your dominant trait, you’ll learn how your profile may impact your business during its critical milestones from nurturing the first seeds of growth, to scaling it, to shifting strategy, to selling it. At these turning points, you’ll know which traits you should “dial up” or “dial down” and what kind of people you may need beside you.


Quote for the day:
"The growth and development of people is the highest calling of leadership." ~Harvey S. Firestone

August 01, 2012

Kenneth van Wyk: Digital duct tape for SSL
Secure Sockets Layer (SSL) just can't catch a break these days. Everywhere we turn, it seems, SSL is being implicated in security problems. We've seen attacks against root certificate authorities (CA). We've seen weaknesses in how SSL certificates are validated. And now, those weaknesses have been used to attack Apple's in-app purchase mechanism.

Architect your enterprise to transform to Cloud Computing
Michael first lays the foundation characterizing enterprise architecture as exercises that gather dust on the shelves rather than being applied effectively across multiple environments – traditional or cloud-based. He attributes the "siloed" applications as being one of the contributing factors for this syndrome.

Microsoft reboots Hotmail to build consumer destination, says analyst
Microsoft's rebranding of Hotmail as Outlook.com is a move by the company to hold its first-place position in free email while pushing the domain as more of a consumer destination, an analyst said today.

Proteus gains de novo FDA clearance for ingestible biomedical sensor
The IEM sensor, which can be embedded into a pill, is activated by stomach fluid, then transmits a signal through the body to the skin patch, indicating that a patient has ingested medication. The patch also measures patient vitals and body position, and wirelessly sends all of the data to a Proteus smartphone app.

A Database of All Medical Knowledge: Why Not?
Physicians won't become obsolete any time soon, but the comprehensive integration of everything we know about well-being could revolutionize medical care.

Is IT Losing the Battle to Keep Security Devices Safe?
When asked to quantify that cost, “a staggering 12 percent of companies waste ‘months’” every year because of lost security tokens, and 10 percent said such tasks cost them “weeks every year in management time chasing and replacing physical tokens.” Some enterprises are luckier: 13 percent estimate the loss in days, and 16 percent said the cost was just a few hours.

iPhone 5 release date: September 12, reports claim
Apple plans a September 12 special event during which it is expected to at last reveal its new iPhone, also known as the iPhone 5 according to a series of reputable reports with the product set to ship 9 days later.

The rise of the chief culture officer
More companies are looking to have someone around to keep an eye on their culture, but doing it well takes more than just adding an additional office in the C-Suite.

The 5 Traits of High-Potential Employees
Who will be ready to run your company when you can't be everywhere anymore? Here's how to pick your next generation of leaders.

10 Ways Startups Can Track Trends: And Why It’s So Important
Spotting trends early makes it possible tocome up with smart startup ideas - or modify your startup plans to jump on a new trend just as it takes off. Just as most important, you can avoid the risk of starting a business based on a trend that’s just about to fizzle out. Fortunately, tracking trends isn’t as hard as it used to be.

How Big is Big Data?
The hype around big data has grown exponentially in recent times. Although much has been said about big data, it is still a misunderstood topic, with confused definitions. EMC published a hand-drawn animation attempting to explain in a simple way which is Big Data. Worth watching, the result was interesting.

Open WebOS will only run on 'future hardware platforms'
The team behind the open-sourced successor to HP's failed mobile platform has said it will only run on hardware that supports at least the 3.3 release of the Linux kernel


Quote for the day:
"Innovation is often about trying and failing. If failure leads to blame, you'll create an innovation short-circuit." -- Frank Wander, founder and CEO of the IT Excellence Institute

July 28, 2012

GPS accuracy to improve in EU with new augmentation service
EGNOS, a system providing data that makes GPS readings even more accurate, can now be used through the internet as well as via satellite


Black Hat hacker gains access to 4 million hotel rooms with Arduino microcontroller
Bad news: With less than $50 of off-the-shelf hardware and a little bit of programming, it’s possible for a hacker to gain instant, untraceable access to millions of key card-protected hotel rooms.

Hate Small Talk? These 5 Questions Will Help You Work Any Room
Do you love going to events, but find yourself stranded during happy hour, tongue-tied and tucked in a corner? Initiating and maintaining conversations while networking is a necessary skill, and one you can easily improve with these simple tips.

Format a ESX & ESXi VMFS file system manually
Recently I came across a query in the VMware communities, the query was “How to reformat a VMFS file system or Datastore manuallly” The preferred method of reformat the VMFS file system is from a console or SSH session as you can simply recreate the file system without having to make any changes to the disk partition.

No Silver Business Intelligence Bullets, But Still a Bright Upside
Likewise, the BI market finds itself awash in really cool reporting tools (seriously!) whose ads imply quick results with little effort. The reality is that success on the scale envisioned by many customers requires the planning, coordination, and integration associated with an IT project.

Leadership: It is not about you! Get over it.
What a leader needs to remember is that they are not the most important person in the organisation. A great leader is more concerned with the vision and cause of the organisation

Is Apple taking a financial interest in Twitter?
The New York Times reports that the two companies have talked in recent months, but they are not in talks at this time. Apple could potentially invest several hundred million dollars into Twitter, which has already gathered close to $1 billion in funding

Microsoft Paid $1.2B for Yammer, But You Can Have It for Free
According to Sacks, Yammer will stick with this “freemium” model as it moves under Microsoft’s wing, and it will use the strategy to encourage adoption not only of its own products, but existing Microsoft tools as well. Microsoft declined to comment for this story, but clearly, the company is working to change the way its core business operates in order to keep up with the latest wave of tech outfits.

Predictive analytics might not have predicted the Aurora shooter
Certainly any law enforcement officer who knew of the pattern of activity for this individual would have flagged it as suspicious and investigated. But data mining, also called machine learning, doesn't work the same way.

Ask The Entrepreneurs: 15 Ways to Incorporate Fitness Into Your Company Culture
Ask The Entrepreneurs is a regular series where members of those involved in the Young Entrepreneur Council are asked a single question that aims to help Lifehack readers level up their own lives, whether in a area of management, communication, business or life in general. Here’s the is what the entrepreneurs say for the question related to the topic


Quote for the day:

Success is not built on success. It's built on failure. It's built on frustration. Sometimes its built on catastrophe  -Sumner Redstone

July 27, 2012

Will Enterprise Architecture Ever “Cross the Chasm?”
While the field has grown, the proliferation of voices, methods, frameworks, and generally inconsistent advice in the field of EA has also grown. The number of “EA Frameworks” has grown to include a wide array of overlapping bodies of work.

OAuth 2.0 and the Road to Hell
... Our standards making process is broken beyond repair. This outcome is the direct result of the nature of the IETF, and the particular personalities overseeing this work. To be clear, these are not bad or incompetent individuals. On the contrary – they are all very capable, bright, and otherwise pleasant. But most of them show up to serve their corporate overlords, and it’s practically impossible for the rest of us to compete. ...

Payment terminal flaws shown at Black Hat
Criminals can also leverage these vulnerabilities to trick store clerks into thinking that a transaction was authorized by the bank when in fact it wasn't, allowing them to buy things without actually paying.

Avoid These 6 Recipes for Business Disaster
Why would anyone want to know the formula for failure? Because you may be blind to the fact you are already following it, at least in part. And if you know the ingredients to avoid, you'll save your business before it's too late.

4 Reasons Why IT Matters More Than Ever
The argument that IT no longer matters has resurfaced. In this age of consumerization, BYOD and the cloud, IT departments are, in fact, vital to any business, able to create value and sort the wheat from the chaff as stakeholders eye new investments or money-saving ideas.

Lithium-Air Batteries Get a Recharge
Lithium-air batteries work, at least in theory, by exposing a lithium anode to an electrolyte that grabs its positively charged lithium ions and drives them toward the cathode, made of a different, porous material that allows oxygen from the air to form the crucial lithium peroxide.

LaCie 2Big NAS offers 6TB of network storage
If you think that LaCies latest network attached storage product, the 2Big NAS, looks like something youve seen before, youre right. But beneath the familiar appearance (the basic design of the 2Big has been around since 2007), there are a number of differences under the hood.

How To Be A Horrible Leader – 50 Bad Leadership Traits
Of course this is done in the hope that one can avoid the ill effects on an organization from any of bad leadership behaviors. We cannot all be perfect, but all it takes is a few of these in the right combination to kill moral and create a horribly run organization.

Losing Can Be Useful, If You Learn To Get Good At It
Successful entrepreneurs are crazy risk-takers, right? Not so much. The best know precisely how much they can lose--and what they can gain from the process.

Microsoft announces finalists for startup accelerator programme in India
Microsoft has unveiled the names of the 11 tech startups that will be incubated at the Microsoft Accelerator for Windows Azure in Bangalore. The program was announced in May this year and received more than 200 applications from startups.

Enterprise & IT Architecture Global Excellence Awards 2012
Check out the nominees to the various categories of Enterprise & IT Architecture Globa Excellence awards 2012 for the year 2012 instituted by iCMG and hope to have the winners published out there soon.


Quote for the day:

"Nothing is a waste of time if you use the experience wisely." -- Auguste Rodin