Showing posts with label motivation. Show all posts
Showing posts with label motivation. Show all posts

Daily Tech Digest - September 28, 2021

How and why automation can improve network-device security

Automating the processes of device discovery and configuration validation allows you to enforce good network security by making sure that your devices and configurations not accidentally leaving any security holes open. Stated differently, the goal of automation is to guarantee that your network policies are consistently applied across the entire network. A router that’s forgotten and left unsecured could be the avenue that bad actors exploit. Once each device on the network is discovered, the automation system downloads its configurations and checks them against the configuration rules that implement your network policies. These policies range from simple things that are not security related, like device naming standards, to essential security policies like authentication controls and access control lists. The automation system helps deploy and maintain the configurations that reflect your policies. ... A network-change and configuration-management (NCCM) system can use your network inventory to automate the backup of network-device configurations to a central repository.


How Unnecessary Complexity Gave the Service Mesh a Bad Name

The difficulty comes from avoiding “retry storms” or a “retry DDoS,” which is when a system in a degraded state triggers retries, increasing load and further decreasing performance as retries increase. A naive implementation won’t take this scenario into account as it may require integrating with a cache or other communication system to know if a retry is worth performing. A service mesh can do this by providing a bound on the total number of retries allowed throughout the system. The mesh can also report on these retries as they occur, potentially alerting you of system degradation before your users even notice. ... The design pattern of sidecar proxies is another exciting and powerful feature, even if it is sometimes oversold and over-engineered to do things users and tech aren’t quite ready for. While the community waits to see which service mesh “wins,” a reflection of the over-hyped orchestration wars before it, we will inevitably see more purpose-built meshes in the future and, likely, more end-users building their own control planes and proxies to satisfy their use cases.


How To Deal With Data Imbalance In Classification Problems?

A classification model is a technique that tries to draw conclusions or predict outcomes based on input values given for training. The input, for example, can be a historical bank or any financial sector data. The model will predict the class labels/categories for the new data and say if the customer will be valuable or not, based on demographic data such as gender, income, age, etc. Target class imbalance is the classes or the categories in the target class that are not balanced. Rao, giving an example of a marketing campaign, said, let’s say we have a classification task on hand to predict if a customer will respond positively to a campaign or not. Here, the target column — responded has two classes — yes or no. So, those are the two categories. In this case, let’s say the majority of the people responded ‘no.’ Meaning, the marketing campaign where you end up reaching out to a lot of customers, only a handful of them want to subscribe, for example, this can be you offering a credit card, a new insurance policy, etc. The one who subscribed or is interested would request more details. 


Motivational debt — it will fix itself, right?

Motivational debt is a hidden cost to product delivery. It’s the rust that is accruing on aged PBIs, the sludge at the bottom of the Sprint Backlog and the creaking of the process when needing to do something new. Technical debt is to quality what motivational debt is to process. It’s important to remember that whilst motivational debt is shouldered by the entire Scrum Team, there is an individual element of accrual to it as well. Both short-term stresses which bounce back quickly (“I didn’t get any sleep last night”) to long-term tensions which don’t (“My parents are ill) all contribute to the motivational complexities of a Scrum Team. Moving to address these actively is an ethical quandary, as individuals have different coping mechanisms, meaning efforts to help may actually exacerbate the issue. Remember that whilst some team members may be feeling down, others may be up, therefore being conscious of the overall direction of pull is vital as a Scrum Master. Holistically, it is fair to say that motivational debt is felt both individually and collectively and it is everyone’s responsibility to create an environment where it can be minimised. But how can you do this?


Waste and inefficiency in outdated government IT systems

Those responsible for addressing the government’s current levels of wasted IT expenditure may find that businesses offer positive, proactive case studies that highlight the value of embracing digital transformation. A 2020 study from Deloitte, for instance, has found that digitally mature companies – those that have embraced various aspects of digital transformation – saw net revenue growth of 45% and net profit growths of 43% compared to industry averages. The same study has found that the benefits of digital maturation are not limited to profits, but to a range of outcomes including increased efficiency, better product and service quality, and higher levels of both customer satisfaction and employee engagement. A study from McKinsey is even more strident, noting that “by digitising information-intensive processes, costs can be cut by up to 90% and turnaround times improved by several orders of magnitude.” Part of the ‘Organising for Digital Delivery Report’ includes a commitment to “investing in developing the technical fluency of senior civil service leadership.” 


Robotic process automation and intelligent automation are accelerating, study finds

Process mining is used to obtain a wide lens over business processes and workflows within a company by examining event logs across systems, including how variable they are and where there are bottlenecks. The less variable the process, the greater its potential candidacy for RPA/IA, though other factors must be considered as well. Task mining is used to understand how a user is interacting with systems and where there are opportunities for automation. Both of the above help identify automation candidates throughout an organization. IDP is a use case of IA and is growing in popularity, as there are so many document-intensive processes across organizations that impact many employees. ... Data governance, visibility of shadow deployments (and having guardrails in place for them), and security are all important to set in place ahead of RPA/IA to ensure architectural readiness. Another challenge is ensuring that the infrastructure is able to handle the increased speed and volume of transactions related to automated processes, whether it’s their own or someone they do business with.


Importance of DevOps Automation in 2021

From a software development perspective, DevOps automation enhances the performance of the engineering teams with the help of top-notch DevOps tools. It encourages cross teams to work together by removing organizational silos. The reduced team inter-dependencies and manual processes for infrastructure management have enabled the software team to focus on frequent releases, receiving quick feedback, and improving user experience. From an organizational point of view, DevOps automation reduces the chances of human errors and saves the time used for error detection with the help of auto-healing features. Additionally, it minimizes the time required for deploying new features significantly and removes any inconsistencies caused due to human errors. Enterprises should first focus on the areas where they face the most challenges. The decision on what to automate depends on their organizational needs and technological feasibility. The DevOps automation teams should be able to analyze which areas of the DevOps lifecycle needs automation.


The biggest problem with ransomware is not encryption, but credentials

The obvious concern about being the victim of a ransomware attack is being locked out from data, applications, and systems – making organizations unable to do business. Then, there is the concern of what an attack is going to cost; the question of whether or not you need to pay the ransomware is being forced by cybercriminal gangs, as 77% of attacks also included the threat of leaking exfiltrated data. Next are the issues of lost revenue, an average of 23 days of downtime, remediation costs, and the impact on the businesses’ reputation. But those are post-attack concerns, and you should, first and foremost, be laser-focused on what effective measures you can you take to stop ransomware attacks. Organizations that are truly concerned about the massive growth in ransomware are working to understand the tactics, techniques and procedures used by threat actors to craft preventative, detective and responsive measures to either mitigate the risk or minimize the impact of an attack. Additionally, these organizations are scrutinizing the technologies, processes and frameworks they have in place, as well as asking the same of their third-party supply chain vendors.

If your organization is looking to hire data engineers in the next 12 months, be prepared to move quickly in your hiring process and think carefully before you waste time negotiating salaries. That’s some of the advice for hiring managers from the first edition of Salaries of Data Engineering Professionals from the quantitative executive recruiting firm Burtch Works. Known for its work with data scientists and analytics professionals, and its annual salary surveys that look at the employment trends for those professionals, this year, Burtch Works has expanded by offering this new survey for data engineers, conducted in individual interviews with 320 of these professionals based in the United States. The survey looks at salaries, demographics, and trends among data engineers. What is a data engineer? These are the professionals responsible for building and managing the data and IT infrastructure that sits between the data sources and the data analytics. They report into the IT department, the data science department, or both. According to the Burtch Works survey, these professionals command a high rate of pay.


Data And Analytics In Healthcare: Addressing the 21st-century Challenges

Scientists have claimed victory against future diseases after successfully decoding the human genome. The marriage of this knowledge to the health data generated by patients would enable clinicians to make better decisions about our care. The two benefits of using predictive analytics: better care and lower costs. The biggest lesson of the recent global health issues such as COVID-19, SARS, dengue and malaria outbreaks is that pharma and healthcare companies cannot afford merely to react to every emerging situation. They need to track several data streams of local, regional, and global trends, create a database, and then predict various scenarios. Data analytics helps companies develop their predictive models, enabling them to make quicker, intelligent decisions, build partnerships, and resolve bottlenecks before the crisis hits the shore. Such data-driven measures aim to save invaluable lives and allow care to be personalized for each individual. Predictive analytics can classify particular risk factors for diverse populations. This is very useful for patients suffering from multiple ailments with complex medical histories. 



Quote for the day:

"Every great leader has incredible odds to overcome." -- Wayde Goodall

August 14, 2014

Systems Disparity: The Implications of Data Proliferations on Business Decisions
A typical too-big-too-fail organization will have between 1,500 and 2,000 applications. These applications have proliferated for various reasons, ... they can run on a variety of hardware platforms and technologies (each with its own unique operating system). The applications in question are designed according to a variety of paradigms and methodologies and are developed using a vast range of tools. These tools, which are generally aligned to a technology platform, encompass, among other things, programming languages, database-management systems, and user-interface builders. And it is in the context of this variety and the resulting heterogeneous environment that the term disparate is coined.


How to Expedite Continuous Testing
The prescription for continuous testing is deceptively simple: Automated unit tests, version control and a continuous integration server. We wanted to first get past the buzzwords and talk about how to actually do it, by getting started with Ruby and GitHub. Today, we'll install Jenkins and CircleCI, hook them to our GitHub repository and get continuous automated build/inspect going, step by step. Along the way we'll talk about some common setup problems; you may want to read the whole article first, then try to follow the step-by-step instructions.


Partnership Enables Smaller Companies to Leverage Advanced BI Solutions
“Robust BI and analytics solutions are tools that organizations of all types and sizes must actively use to achieve success in today’s business environment,” said Gerald Cohen, president and CEO of Information Builders. “All companies, regardless of size, should have access to the BI tools they need to understand and make positive use of the information generated by their organizations. Information Builders is thrilled to be partnering with Arrow to extend the power of BI to a greater pool of potential users and ensure that more companies have the tools needed to make informed decisions, improve business processes, and boost revenue.”


Create real-time graphs with these five free web-based apps
Creating graphs is easy -- grab your favorite spreadsheet program, enter some data, and use the chart wizard. What's more difficult is creating those graphs to be published on the web based on dynamic data. Plenty of options are available to graph hard-entered data, but few are capable of dynamic generation. In this edition of Five Apps, we take a look at five free web-based tools for creating different types of graphs from dynamic data. Each of these apps offers a vast number of options and lots of customizability, more so than I could possibly demonstrate here. So take a look at each webpage and browse through the examples provided to see the power of each of these tools.


Cyberspace 2025: Overview
Our research forecasts that by 2025, two billion new Internet users will come online, for a total of 4.7 billion people online. Nearly 75 percent of these Internet users will hail from emerging economies. During the same period, social and demographic trends, such as the growing need for a highly-skilled workforce and increases in aging populations, will create new layers of challenge for policymakers already grappling with societal dependence on the Internet.


BYOD and the challenges of managing VDI and VDA
Apart from the difficulties resulting from integrating these new devices into a corporate IT infrastructure, there are a number of specific software asset management (SAM) related issues to consider which have important licensing implications. For example: Who owns the software on the device that is brought in? What applications are they using? Are there apps in use that are free for personal use but need to be paid-for when used in a corporate environment? How will the software on these devices be consumed?


Managers Can Motivate Employees with One Word
David Rock, founder of the NeuroLeadership Institute, has identified relatedness — feelings of trust, connection, and belonging—as one of the five primary categories of social pleasures and pains (along with status, certainty, autonomy, and fairness). Rock’s research shows that the performance and engagement of employees who experience relatedness threats or failures will almost certainly suffer. And in other research, the feeling of working together has indeed been shown to predict greater motivation, particularly intrinsic motivation, that magical elixir of interest, enjoyment, and engagement that brings with it the very best performance.


Reconceptualizing the Board and its Metrics
The focus on features has lead to a faulty evaluation metric for corporate governance. Indeed, counting features is the most common scale used when comparing boards. When The Globe and Mail, for example, publishes its rankings of Canadian boards, it scores companies by looking at the number of features of governance. If Company A can check off more boxes than Company B, then the conclusion is made that Company A has a better board than Company B. The verification of a board’s features, however, does very little when it comes to understanding and evaluating actual board behavior.


The automated threat mitigation tool helping to beat Big Data security blues
Hexadite aims to bring that automation to corporate IT environments — and Barak believes the system is robust enough to allow administrators to rely on that automation to protect their environments. Hexadite comes with a pre-defined library of alerts and behaviours that look at all actionable information from the network and endpoints to gain a holistic view of what’s really happening. The system's analysis is built on algorithms that took years to develop, Barak said, that takes into consideration the minutiae of detail in a system, evaluating files, network connections, internet traffic, processes, and anything else going on — looking for the anomalies that can mean that a system has been compromised.


Balancing Quality and Velocity in Agile
Agile software development teams have to assure that the products that they develop have sufficient quality. Management often also expect that they increase their velocity to be able to deliver more functionality faster to their customer. Several authors explored the relationship between quality and velocity and suggested ways to improve both quality and velocity. Bob Galen wrote about the importance of software quality in respect to becoming faster in the blog post read my lips – agile isn’t fast:



Quote for the day:

“You have enemies? Good. That means you've stood up for something, sometime in your life.” -- Winston Churchill

February 02, 2014

How ISO 31000 standardises risk management
Any organisation’s risk management should be capable of review and evaluation by any risk manager or auditor. ISO 31000 sets a framework for ‘components that provide the foundation and organisational arrangement for designing, implementing, monitoring, reviewing and continually improving risk management processes’. The framework of ISO 31000 follows the Plan, Do, Check, Act model, like other global management system standards.


Enterprise software marketing: Sell the value, not the box
The drive to perfect features before achieving a profound understanding of customer needs, pains, and business context comes from the mistaken assumption that technology, like idealized love, can overcome any obstacle. This mindset pushes many startups to believe their core mission is creating a great product. In a blog post and video, entrepreneur and Stanford professor, Steve Blank, challenges startups to rethink the fundamental nature of their challenge and goal. Instead of pushing for better product and technology alone


Holacracy 101: Could This Nontraditional Business Structure Work for You?
Holacracy is a self-governing, purpose-driven business structure that reassigns authority and responsibility based on the task at hand. The model recently made headlines for sparking the interest of Zappos CEO Tony Hsieh. His company reportedly will become a holacracy by the end of 2014. Here’s a brief explanation of how holacracy works and why it could benefit a small business.


2014 Enterprise Architecture: Increasing Business Architecture ROI
BAs need to focus on creating value to drive value realization as the outcome for our annual work plan for the organization. ... This model is comprehensive, fits with the BA role, and is well-accepted type of concept as it covers the value planning, value creation, and value realization process illustrated below. Simply put, BAs must align and drive the business strategy from the C-suite for realization of the expected business goals and mission outcomes.


4 things I learned from a career in tech startups
Umang Gupta is the former CEO of Keynote, which was recently acquired by Thoma Bravo LLC.Nothing in my childhood would have suggested that I’d grow up to be a Silicon Valley entrepreneur. In fact, the opposite was more likely. ... "With Keynote, I made sure from the beginning to recognize that my job, like any parent, was to give the company its roots and wings, and like any parent when the job was done, I would have to separate my own life from the company’s life. Today, Keynote is a solid, stable company that is a leader in its space, but still has a long way to go before it will have fulfilled its potential."


Building Applications With Hadoop
When building applications using Hadoop, it is common to have input data from various sources coming in various formats. In his presentation, “New Tools for Building Applications on Apache Hadoop”, Eli Collins, tech lead for Cloudera’s Platform Team overviews how to build better products with Hadoop and various tools that can help, such as Apache Avro, Apache Crunch, Cloudera ML and the Cloudera Development Kit.


What Dropbox for Business has to offer admins and users
Administrators with security concerns about Dropbox (and its well-publicized security breaches of the past) can sleep a little easier knowing that Dropbox has also taken some steps to secure data. It now encrypts all stored files using 256-bit Advanced Encryption Standard protection and uses the Secure Sockets Layer protocol to provide a secure tunnel for transferring data. Administrators can take advantage of third-party tools to provide additional encryption, and Dropbox continues to support a two-step verification process beyond just passwords.


How to Hire a Data Scientist
Given the relative newness of the role, many experienced data scientists and value architects come from an experience-based rather than trained background. Because their skills will be aligned to their experience, it is important to plan for targeted training and development. Someone who is a great culture fit, analytical capabilities, and value measurement knowledge but lacks certain programming skills may need to get skilled up in-house. Being prepared to accept someone that doesn’t have every skill needed (supported by an appropriate training program) is a pragmatic approach.


An Integrated Implementation of ISO 31000
ISO 31000 has left open the problem of implementations. That is, ISO 31000 is in large normative in nature. For instances, ISO 31000 describes a generic process to manage risks, but it does not describe how to establish the organizational devices so that the process can be executed; it describes a risk management framework, but it does not explain the dynamics between the risk management process and the framework; it lists several principles reflected in effective risk management, but it does not describe how to realize the principles in implementations


How to use Workshops to Boost Creativity, Team Commitment and Motivation
To be creative, participants have to feel comfortable both with themselves and with the group. They need to know that their ideas will be accepted in the group, and that everyone's opinions count equally. They need to feel welcome in the group and comfortable with the facilitator. Experienced workshop facilitators make a conscious effort to help the participants feel safe, and set the tone that maximizes motivation and creativity in the group.



Quote for the day:

"Regardless of the changes in technology, the market for well-crafted messages will always have an audience." -- Steve Burnett

July 29, 2013

New virtual networking technologies make convergence real
The fact that there are three distinct SDN models shouldn't discourage advocates of virtualization-based convergence. All three models offer improved Network as a Service capabilities, even though they differ in whether they focus on segmenting connectivity for the isolation of tenants and applications, or managing network traffic.


New Zealand updates cloud code of practice as ACS looks on
The code has two key tenets. The first is not calling the offering "cloud computing" unless it actually is. Cloud computing is defined in the code as: "On-demand scalable resources, such as networks, servers, and applications, which are provided as a service, are accessible by the end user and can be rapidly provisioned and released with minimal effort or service provider interaction."


Feds Move To Open Source Databases Pressures Oracle
"The traditional, burdensome licensing practices of the big proprietary guys have really started to put new kinds of pressure on government agencies," he said. "Most of the licensing firms have come up with very inventive ways to make sure the price per year goes up and not down, and that's in direct conflict with the way government agencies are trying to operate now."


Quick Tips: Breaking Bad Employee Habits
Being motivated is key to high productivity, and 47% of employers value it as the most critical trait. If you have an unmotivated worker, his or her bad habits of showing up late to meetings, not being actively involved in brainstorming sessions, or not coming up with new, innovative ways to help the company may be resolved by teaming them up with one of your top performers.


How Android’s new App Ops controls could encourage privacy by design
It looks like the latest version of Android has an interesting little feature tucked away: granular controls for app permissions. The Android 4.3 feature, called “App Ops”, has just been flagged up by Android Police on Friday, and it looks like it could be a game-changer when it comes to privacy. ... For many developers, however, it could prove an utter nightmare. In the quest for privacy or longer battery life, many users may turn off bits of functionality then later wonder why those elements of the app don’t work.


Global worker communities emerge as Amcor thinks outside the box
“It’s a very decentralised business model that’s focused very much on business groups, which are all based in different countries and on different products,” corporate communications manager Zed Ivankovic said at an IBM social-business event in Melbourne. “From a technical point of view, we’ve found challenges around really simple things that you take for granted when you’re working in a one-site environment – things like sharing files, collaborating on files, and that sort of thing.”


How to improve network performance via advanced NIC options
Most NICs support jumbo frames, which means handling packets, or frames, of up to 9,000 bytes. Jumbo frames contain more data in each packet, so fewer packets are needed to convey data across the network. Throughput improves with less overhead -- packet headers and other packet content -- and CPU overhead shrinks.


How Rackspace hires admins: Textbook questions vs. break-fix challenges
But Walsh said if a candidate doesn't get a strong score on the online test, that doesn't necessarily exclude them from a job. An interview may reveal that a candidate who didn't do well on the test, is "a really solid systems administrator at a pretty high level," said Walsh. ... "We need people who can easily talk through situations with customers, as well as log-in and actually do the work," said Walsh.


Five Forces of Collaboration in a 24/7 Globalized World
Hardly a day passes without reference to today’s “globalized world” or its “borderless markets” as the justification for a particular business strategy. This type of connectedness plays a big part in building and extending a collaborative ecosystem that spans teams, departments and geographies. But to fully immerse a business in a connected, collaborative environment, it’s important to first understand what exactly connectedness is.


What to look for in a software engineering culture
Using the Mondrian tool at Google, we had a very clear code review process, where a changelist could not actually be submitted until the reviewer gave the "approval." Using Github's more lightweight code reviews at Coursera, we've had to come up with our own conventions on top of it, where the reviewer will say "Merge when ready" when they're happy or the reviewee will say "Please take another look" if they want a second review.



Quote for the day:

"Satisfaction lies in the effort, not in the attainment. Full effort is full victory. " -- Mohandas Gandhi

June 12, 2013

Israel accelerates cybersecurity know-how as early as 10th grade
“What Israel has done is focus much more heavily on technical skills and leave the political work to the politicians,” says Alan Paller of the SANS Institute, who examined Israeli cybersecurity strategy as part of the US Department of Homeland Security’s Task Force on CyberSkills last summer. “Their skill level [per capita] … outdoes everyone, even China,” he adds, despite China’s “massive program” for developing skilled cyber experts.


Podcast recap: HP Experts analyze and explain the HAVEn big data news from HP Discover
There has been a lot said about big data in the last year and HP has made a big announcement around a broader vision for businesses to help them gain actionable intelligence from literally a universe of potential sources and data types. To learn how, BriefingsDirect assembled Chief Evangelist at HP Software, Paul Muller; Chris Selland, Vice President of Marketing at HP Vertica, and Tom Norton, Vice President for Big Data Technology Services at HP.


3 Motivational Mind Tricks Desgned to Power Progress
Understanding how we react to progress is crucial to capitalizing on its power to motivate and engage us with our work. Ignoring it costs day after day of losing steam, running to and fro with carrots and sticks, and losing interest from what feels like an endless run in a hamster wheel. These three mind tricks of progress serve employees and managers alike to break free from hamsterdom and actually get somewhere.


People Don’t Need Cloud, but Flexibility + Control over Data
The other aspect is converged cloud. “Every customer will follow a different path to the cloud,” and HP focuses on how to help them take the journey to the cloud, Neri explains. ... One of the customers’s biggest concerns is “all about change management.” IT, the business owners, they all need to be part of the conversation. “They really get very uncomfortable when they feel they are losing control. It is our role to show them they keep control.”


Why your CMO may spend more money on the cloud than your CIO
"As technology budgets move to the CMO and marketing becomes more data-driven, Salesforce could become the system of record for all customer interactions. Since interactions touch current and future revenue, CRM has the potential to become more central to a business than current transaction systems of record."


IBM’s cognitive computing team takes on a new frontier: meal planning
Working with chefs at the Institute of Culinary Education in New York City, the IBM team is building a cognitive computing system that, given plenty of data about what foods most people already like, will be able to come up with inventive, delicious flavor combinations—far beyond the familiar pairings of tomato and basil, chocolate and strawberry, chicken and rosemary.


Skepticism Moves Big Data Toward Causation
An interesting practical implication of the correlation-causation dilemma, noted by industry luminary Cathy O’Neil, is the risk that putting machine learning techniques in the hands of analytics initiates may be dangerous, since the newbies might be too credulous with the findings, drawing inference from spurious correlations that can lead business astray. I bet many new easy-out big data vendors hope that thought doesn’t gain traction!


Secret NSA hackers from TAO Office have been pwning China for nearly 15 years
Apparently “Beijing was furiousabout the sudden elevation of cybersecurity and Chinese espionage on the meeting's agenda.” That’s when the director of China's National Computer Network Emergency Response Technical Team claimed to have "mountains of data" about the US hacking China. The Chinese version of CERT also disclosedthat between January 1 and May 31, "4,062 US-based control servers hijacked 2.91 million mainframes in China.


Leading Through a Crisis
When everything is broken, what do you do first? How do you show your concern when 1,000 things need attention? If you go to work on five of them, those who feel the most pain about the other 995 will think you don’t care. Furthermore, if you try to work on too many things, you will squander your finite resources while making little progress—thus undermining trust. So what can you do?


How to Evolve your Master Data Management Practices
With maturing data management and additional data sources, your master data management practices need to follow suit. That means finding a new level of support systems for MDM to keep up with evolving business outcomes and expectations. Michele Goetz, analyst with Forrester Research, has been carving out a new framework to bring MDM from the traditional “golden record” to a more rounded “golden profile.” Here are six emerging considerations.



Quote for the day:

"Learn to pause.... or nothing worthwhile will catch up to you." -- Doug King

June 03, 2013

Parsing through the software-defined storage hype
Essentially, SDS is emerging as an ecosystem of products that decouples software from underlying storage networking hardware, placing it in a centralized controller or hypervisor. This centralized software will provide visibility of all physical and virtual resources, enabling programmability and automated provisioning based upon consumption or need.


ERM: 5 Steps to Success
Everyone agrees the role of ERM is for risk management to be involved in the "key business decisions," however, some misinterpret this as interviewing only the senior executives in "big picture" assessments. In reality, aligning day-to-day activities of all managers to the strategic objectives set senior leadership, and then aggregating and analyzing this information is the winning approach. So how is this accomplished?  Here are the 5 steps to quickly and practically embed risk management enterprise-wide.


Your company's cloud strategy must come from the top
Define, refine, understand, and publicize your cloud strategy, then implement your plans in small phases. IT should drive any technological shift from the top down. Moreover, in doing so, IT should make sure it understands user and development requirements as related to the company strategy.


Microsoft Survey Picks Up Early Signs Of New Trend - Bring Your Own Service
Bring Your Own Device (BYOD) to work it seems is old hat already. Early signs of a new trend have now been spotted – that of, what can be loosely called, Bring Your Own Service (BYOS). A recent survey by research firm Ipsos on behalf of Microsoft Corp. found that nearly half of the employees surveyed were of the opinion that social tools at work helped increase their productivity.


Tripartite Approach to Enterprise Architecture
Architectural work in an enterprise be designed and built around organizational accountability levels and be divided into three distinct yet interlinked architectures: Technical Architecture, Socio-Technical Architecture, and Ecosystemic Architecture. Each of these architectures would be self-contained and self-regulated with its paradigmatic function, methods, and tools.


Active/Active WAN-based Replication in GemFire vs Oracle and MySQL
The replication service in GemFire is transparent to applications and does not affect normal use of the distributed big data grid. Setup is easy too as there is nothing to change in your configuration other than enabling the WAN service and providing the WAN endpoint(s) to use for replication. GemFire automatically sets up a parallel asynchronous replication system across your machines that reaches out to the remote site and efficiently batches changes asynchronously across the WAN.


Virtualization security 101: A user's primer
Server virtualization allows you to float multiple 'virtual machines' on top of a physical server, using a hypervisor to manage them. The obvious benefits are better hardware utilization, faster scalability and the ability to move VMs around to get optimal processing power. However, this same structure creates some very real security concerns.


Big Data and the Cambrian Explosion of Information Sources
Welcome to the Age of Data! From every direction, along any number of trajectories, data now streams at us in unprecedented fashion. Customers, prospects, partners, competitors; Web sites, mobile phones, medical devices, manufacturing machines – the number and nature of data sources seems to be growing exponentially. What’s a data manager to do? Fasten your seat belt and prepare for a wild ride!


IE10 steals user share from IE9, jumps 53%
In relative terms, IE10 was the third-most-used browser of the five that Microsoft now supports, passing the 12-year-old IE6 for the first time. IE10's climb has been brisk: As late as January, it had a mere 2.3% user share of all of IE. The increase was prompted by the automatic update from IE9 to IE10 on Windows 7 PCs, which began shortly after IE10's release on the popular platform in late February.


5 Rockin’ Motivation Techniques That Won’t Cost a Dime
Managers often struggle to get their team into high gear without using financial incentives. They don’t realize that the best motivation is self-motivation—and you don’t need a dime to get your staff going. There are two parts when it comes to team motivation: preventing dissatisfaction and engendering satisfaction. Use them both.



Quote for the day:

"Why are you going to choose failure when success is an option?" -- Jillian Michaels

March 09, 2013

Enterprise Risk Management: A Holistic Approach
A well defined risk management program cannot achieve high maturity scores without integrating risk management systems across divided organisational units. Organizations must thoroughly understand the true value at risk and ensure their compliance mandates are not geographically siloed. ... Check out this live webinar from GRC Forum.


What to do when the CEO says 'Get it Done!'
“What do you do if the CEO tells you to get it done and f*** the governance? Well you probably go away and just do it, no?” I should have been faster on my feet to say then and there that there are four good reasons why that was not necessarily the best response. These reasons are: Compliance, Efficiency, Risk, Effectiveness


Who ratted out Microsoft on browser ballot absence?
According to Almunia, neither the Commission nor Microsoft -- which had been left to police itself -- was aware that the browser choice screen was AWOL until a third party reported the oversight. The Commission has repeatedly declined to name the complainant. The choice screen, also called the "browser ballot," was not shown to approximately 15.3 million users running Windows 7 Service Pack 1 (SP1) for more than a year, from May 2011 until July 2012, when the complaint was filed.


Feds Asked to Back Cybersecurity with Legal Protections
“Cybersecurity is largely a voluntary effort, and the task of the government is encouraging companies to participate,” said Gus Coldebella, a former top lawyer at the Department of Homeland Security and a partner in Washington at Goodwin Procter LLP. “If you don’t have liability protection, that task is infinitely harder.”


Don't Establish Data Management Standards
Standards can help control cost. Standards can help reduce complexity. But, in an age when a data management architecture needs to flex and meet the business need for agility, standards are a barrier. The emphasis on standards is what keeps IT in a mode of constant foundation building, playing the role of deli counter, and focused on cost management.


VMware preps vCloud-based public cloud service
The service, which is to be built on VMware's vCloud products, including vCloud Director, according to multiple industry sources, is still a ways away from general availability. In the meantime, VMware loyalists who use public cloud can find service providers with vCloud, so switching to a VMware public cloud wouldn't be necessary.


Patch Tuesday: Microsoft to fix four critical flaws, all versions of IE at risk again
Three of the four 'critical' flaws affect Windows, Internet Explorer, Office, Windows Server and SharePoint, which could all lead to remote code execution—such as allowing hackers access to install malware without user prompts or permission. The flaws rated 'important' could lead to an elevation of user privileges or the disclosure of user data or personal information.


IT Talent Shortage Or Purple Squirrel Hunt?
But a talent shortage may just be another way of describing an unwillingness to pay market rates for talent. As Peter Cappelli, professor of management and director of the Center for Human Resources at the Wharton School, put it in The Wall Street Journal back in October, 2011, "Some of the complaints about skill shortages boil down to the fact that employers can't get candidates to accept jobs at the wages offered. That's an affordability problem, not a skill shortage."


Drive: The surprising truth about what motivates us
This lively RSA Animate, adapted from Dan Pink's talk at the RSA, illustrates the hidden truths behind what really motivates us at home and in the workplace.


Stop Reinventing Disruption
Disruption is a story of rational responses to a changing environment. It's the sensible retreat from your low margin business towards your more demanding, more profitable customers. At least, it's a sensible retreat until you recognize that you've given away your business and there is nowhere left to run.



Quote for the day:

"Leadership cannot just go along to get along. Leadership must meet the moral challenge of the day." -- Jesse Jackson

March 03, 2013

IT security managers too focused on compliance, experts say
Experts say that meeting such standards is important, but they should be used as baseline controls in a broader IT security strategy. "The audit industry has become a monster," said Anup Ghosh, founder of security firm Invincea. "Keeping those guys at bay" has become a full-time job in many IT security organizations, he said. "A lot of compliance regimens have been all about checking boxes and following processes."


'Copyright Alert System' rolls out to catch illegal downloaders
While the CAS seems like something that would raise the hackles of privacy and civil liberty groups, the plan isn't to arrest, sue, or fine people downloading illegal movies, games, or music. Instead, the group managing the program -- the Center for Copyright Information -- says its objective is to "educate" such downloaders that they are infringing on protected intellectual copyrights.


1183RA Week of Activity Underscores Challenge of Valuing Data
The consensus of Saugatuck’s discussions this week with provider and user enterprise executives is that the majority of provider activity consists of positioning themselves for future, expected opportunities; and the majority of user enterprise activity consists of interest, searches for knowledge, trials and PoCs. The most interest expressed is in the concept of data analytics, especially Big Data, rather than in the details of how it will work or benefit the enterprise customer.


Are you on the right cloud computing career path?
There is an explosion in both the use of cloud computing and the demand for people to assist in the mass migration to cloud. Indeed, there are about 50 to 70 jobs chasing truly qualified candidates at this point in time, according to technical recruiters. And there are two categories of cloud computing careers that seem to be emerging in the space: positions seeking IT pros with specific cloud skills and positions looking for IT admins with cloud architecture know-how.


Secret Weapon: How to Strengthen the Most Valuable Job Skill
An extensive analysis led at Virginia Commonwealth University, “The Relation Between Emotional Intelligence and Job Performance: A Meta-Analysis,” showed that individuals with high EI made better workers. For managers or senior executives, high EI usually corresponds with a good job performance. For employees, it often leads to better decision-making abilities, job satisfaction and completion of goals. Managers who lack a good EI usually find great difficulty in social interactions and the nurturing of professional relationships.


Pets now welcome in many workplaces
It’s a growing office trend, as both employer and employees acknowledge the advantages and enjoy the benefits of allowing pets in the workplace. And now there’s research to support what people like 26-year-old Ann Marie DeLa Rosa have known for years. “Reduces stress,” said DeLa Rosa, 26, who works at software design company Inverse-Square under Baird and appreciates the pet-friendly policy. “When I’m stressed, I usually call Zoe (a chocolate Labrador retriever) over and rub her ear. That’s my therapy.”


Entity Framework 6 Alpha 3 with Code First Stored Procedures and Connection Resiliency
Microsoft has announced the availability of Entity Framework 6 Alpha 3 with support for code first mapping to insert, update, delete stored procedures with the help of fluent API, connection resiliency, pull request from iceclow, UnaiZorrilla and new DbContext API scenarios that enables you to manage your own transactions.


Refactoring Legacy Applications: A Case Study
Legacy code is stinky. Every decent developer would like to refactor it, and in order to refactor it, one ideally should have a suite of unit test cases to prevent regressions. However, writing unit tests for legacy code is not easy; the legacy code is usually a big mess. To write effective unit tests against the legacy code, you probably need to refactor it first; and to refactor it, you need unit tests to ensure you are not breaking anything. So it is a chicken and egg situation. This article describes a methodology to safely refactor legacy code by sharing a real case I once worked on.


Here’s a Quick Way to Fire Up Your Motivation
Surely all the benefit of a backup plan accrues when the main plan goes wrong and there's something to fall back on? While coming up with a 'plan b' might be necessary, I always thought of it more as a chore. (Ho-hum now I've made my main plan, instead of getting started, I've got to spend more time thinking about an alternative plan). But when you start to think about it, backup plans don't just make sense as, well, backup plans, but also as a means of driving you forward at the precarious early stages of a project.


Evernote note-sharing service says hackers stole some user data
Evernote spokeswoman Ronda Scott said via email on Saturday that the attack "follows a similar pattern" to other cyber attacks on Internet-based companies in recent weeks, but she did not elaborate. "In our security investigation, we have found no evidence that any of the content you store in Evernote was accessed, changed or lost," the company said on its website. "We also have no evidence that any payment information for Evernote Premium or Evernote Business customers was accessed."



Quote for the day:

"Pay no attention to what the critics say; there has never been set up a statue in honor of a critic." -- Jean Sibelius

December 26, 2012

Strategy Implementation (Balanced Scorecard)
The improvement of the effectiveness of companies’ strategic management process will be maintained by eliminating the disconnection between the formulation of strategy and its effective implementation throughout the organization. The key issues identified for the disconnection are discussed in this article


As BYOD catches on, IT sector gets ready for 1m malicious apps
Reports published by Trend Micro and McAfee maintained that as the number of people bringing their own devices to work turns from a trickle to flood, security challenges from using multiple devices would also multiply. These challenges multiply in the face of a breakdown of a hitherto homogenous computing culture dominated by Windows and Blackberrys.


How IT Pros Can Improve Their Interpersonal Skills
Remember that the "suits" and "techies" are going to mix about as well as oil and water. That's OK. They don't have to best friends and get together every weekend for a barbecue or Star Trek marathon. But those differing cultures can't be used as an excuse to avoid working together. Consider having IT employees shadow department managers at work to become more comfortable interacting with them.


Apache Camel: Enterprise Integration Patterns
Camel supports most of the Enterprise Integration Patterns from the excellent book by Gregor Hohpe and Bobby Woolf. If you are new to Camel you might want to try the Getting Started in the User Guide before attempting to implement these patterns. The EIP icons library is available as a Visio stencil file adapted to render the icons with the Camel color : sand.



Digital Citizens Group Focuses on Internet Safety
The new Digital Citizens campaign, launched Thursday, will also strive to shed light on the online sale of counterfeit goods, including prescription drugs, and on pirated Web content, said Tom Galvin, executive director of the new group. Digital Citizens will investigate online scams by showing how people can get fooled -- for example, one of the first projects will be to purchase counterfeit drugs from online pharmacies, he said.


The Employee-Motivation Checklist
Through many years of research, trial and error, and working with companies of all sizes in numerous industries, Dave has identified 16 critical ways to motivate your employees, which are listed in this article. Learn these techniques and adapt as many as possible in your business.


10 predictions how cloud computing will transform traditional IT in 2013
Kevin and Cary predict IT will undergo 10 transformational, cloud-related impacts in 2013 -- effects so massive that they will be the most fundamental changes to the way businesses and governments have approached technology in the past 25 years:


India aims for world's big data
In its report "Big data: The next big thing", Indian IT services industry group Nasscom expects the country's big data industry to grow from US$200 million in 2012 to US$1 billion in 2015. The biggest challenge--and opportunity--is to satisfy the demand for data scientists. Avendus Capital, for one, estimates the United States will suffer a shortage of up to 200,000 data scientists by 2018, a gap that will most likely be filled by outsourcing.


Nine Forms of Analytics Data That Matter the Most
Big Data takes a lot of forms and shapes, and flows in from all over the place – from the Internet, from devices, from machines, and even from cars. In all the data being generated are valuable nuggets of information. The challenge is being able to find the right data needed, and being able to employ that data to solve a business challenge. What types of data are worthwhile for organizations to capture?


IBM unveils IBM Connections, a new social analytics software
IBM has unveiled new software and services that bring the power of big data analytics into the hands of today's social savvy workforce anytime, anywhere. Now, organizations can apply analytics to their social business initiatives, allowing them to gain actionable insight on information generated on networks and put it to work in real-time.



Quote for the day:

"A man without a goal is like a ship without a rudder." -- Thomas Carlyle

December 12, 2012

The scariest software project horror stories of 2012
Though plenty of enterprise software projects go just fine, unfortunately, some still end up in ruins, leaving customers out huge sums of money, churning up lawsuits, damaging careers and destroying relationships. On the bright side, when examined these failures can reflect some important lessons for both vendors and customers to take to heart. Here's a look at some of 2012's scariest software project disasters.


Intel Open Sources Tool for Rapid Big Data App Development
Currently in beta, GraphBuilder is designed "to help data scientists in industry and academia to rapidly develop new applications that draw insights from big data," said Connie Brown in an announcement on the Intel Web site. "Developed by Intel Labs, GraphBuilder is the first scalable open source library to take large data sets and construct them into 'Graphs,' web-like structures that outline relationships among data."


Agile Expressionism 101
It would be fun to talk about the kinds of expressions you hear in an agile environment. Mark polled the folks in his company, Asynchrony Solutions, and here's what they came up with. As is the case with most things agile, many of these are not new or unique to it. So here they are in no particular order and with no chance that this is an exhaustive list.


2013 GRC Trends
Performance gains, reduced costs, improved compliance, and other benefits have shown that GRC programs, and the technologies that support them, can move a company forward and sometimes even save the day. The question is what will be the course in 2013?


Emerging Enterprise Architecture Drives 10 Trends for 2013
This Research Alert is the first of a two-part series identifying the most impactful, emergent trends we see as clear and undeniable evidence of this transformation. Each is accompanied by a Saugatuck Strategic Planning Position (SPP) that lays out specific expectations regarding its relevant impact and timing.


New Guidance to Mitigate Determined Adversaries’ Favorite Attack: Pass-the-Hash
In a large number of the targeted attacks we have seen, attackers have attempted to use a “Pass-the-Hash” (PtH) technique to get access to credentials. Today, Microsoft is publishing a comprehensive whitepaper that contains mitigations and guidance called “Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques.”


Will cloud computing kill the storage area network?
Everything you need is provided by the modular converged infrastructure, which is now a simple building block for the data center. Traditional storage only vendors have seen the light and are now joining forces with the major network vendors to create the modular building blocks (what I call PODs) which include the storage as a part of the building block.


Data Scientist Shortage: Split Role In Half
One possible solution to this staffing shortage is to split big data duties in two: data management specialist and data scientist. In a phone interview with InformationWeek, Datalink technology strategist and consulting principal Steve Bulmer said this division of labor would help IT organizations prepare for the coming "tidal wave" of data. "Advanced analytic capabilities are going to be in high demand and hard to find," said Bulmer.


By 2020, there will be 5,200 GB of data for every person on Earth
During the next eight years, the amount of digital data produced will exceed 40 zettabytes, which is the equivalent of 5,200 GB of data for every man, woman and child on Earth, according to an updated Digital Universe study released today. To put it in perspective, 40 zettabytes is 40 trillion gigabytes -- estimated to be 57 times the amount of all the grains of sand on all the beaches on earth.


The critical difference between leadership and motivation
Great leaders serve to bring out the inner wisdom and free will of those they serve. Instead of inducing people to view life situations a certain way (or their way), great leaders demonstrate that there are an infinite number of ways to view any life situation.



Quote for the day:

"Chains of habit are too light to be felt until they are too heavy to be broken." -- Warren Buffett

July 06, 2012


Federal appeals court raps U.S. bank over shoddy online security
In a significant twist, a three-judge federal appeals court panel found on Tuesday that Ocean Bank's online security measures were not "commercially reasonable," reversing a lower court ruling from May 2011.

BYOD: 10 reasons it won't work for your business
Letting your staff use their own smartphones, laptops and tablets can make them happier, more productive, cut business costs and even help attract new talent – but there are a potential disadvantages too.

Global summit on Enterprise & IT Architecture in Bangalore, 25-26 July
This premier conference will provide an opportunity to the CIOs, CTOs, Managers, architects etc. to share knowledge of Transformation and Planning, IT Landscape Rationalization, Architecture Governance, Best Green Architecture, Acquisition and Mergers, Business Process Management, etc.

Microsoft to patch under-attack XML bug next week
Microsoft today confirmed that it will patch a vulnerability in Windows next week that has been exploited by an increasing number of attacks.

The Open Source Balance at Banks
While many banks still ponder the benefits of using open source technology for their coding needs, nascent BankSimple has gone full steam ahead

Microsoft Readies Hadoop for Big Business
Yes, Hadoop will run natively on Windows and integrate with PDW. But Microsoft will also make available an ODBC driver for Hive, the data warehousing front-end for Hadoop developed by FaceBook.

Know more about fixing the DNS Changer malware
You’re looking for information on how to clean up or fix malicious software (“malware”) associated with DNS Changer. It’s possible that either your computer or your home router has been modified to use resources once controlled by criminals to redirect your traffic.

How to Inspire and Motivate High Performance Employees
HPO employees want to be inspired by their managers to continuously perform better and achieve extraordinary results. They want to be kept on their toes and be challenged. They continuously want to develop themselves, to achieve the best they can, and because of this, contribute to the success of the organization.

EU Court: Resale of Used Software Licenses is Legal, Even Online
The exclusive right of distribution of a copy of a computer program covered by such a licence is exhausted on its first sale, said the European Court of Justice (ECJ). This applies to downloaded software as well as that bought on CD or DVD.


Quote for the day:

"Experience is a hard teacher because she gives the test first, the lesson afterwards."
--Vernon Sanders Law