Showing posts with label offshoring. Show all posts
Showing posts with label offshoring. Show all posts

Daily Tech Digest - March 01, 2024

Why Large Language Models Won’t Replace Human Coders

Are any of these GenAI tools likely to become substitutes for real programmers? Unless the accuracy of coding answers supplied by models increases to within an acceptable margin of error (i.e 98-100%), then probably not. Let’s assume for argument’s sake, though, that GenAI does reach this margin of error. Does that mean the role of software engineering will shift so that you simply review and verify AI-generated code instead of writing it? Such a hypothesis could prove faulty if the four-eyes principle is anything to go by. It’s one of the most important mechanisms of internal risk control, mandating that any activity of material risk (like shipping software) be reviewed and double-checked by a second, independent, and competent individual. Unless AI is reclassified as an independent and competent lifeform, then it shouldn’t qualify as one pair of eyes in that equation anytime soon. If there’s a future where GenAI becomes capable of end-to-end development and building Human-Machine Interfaces, it’s not in the near future. LLMs can do an adequate job of interacting with text and elements of an image. There are even tools that can convert web designs into frontend code.


The future of farming

SmaXtec’s solution requires cows to swallow what the company calls a “bolus” - a small device that consists of sensors to measure a cow’s pH and temperature, an accelerometer, and a small processor. “It sits inside the cow and constantly measures very important body health parameters, including temperature, the amount of water intake, the drinking volume, the activity of the animal, and the contraction of the rumen in the dairy cow,” Scherer said. Rumination is a process of regurgitation and re-digestion. “You could almost envision this as a Fitbit for cows,” he said, adding that by constantly measuring those parameters at a high density - short timeframes with high robustness and high accuracy - SmaXtec can make assessments about potential diseases that are about to break out. ... Small Robot Company is known for its Tom robot. Tom - the robot - distantly recalls memories of Doctor Who’s dog K9. The device wheels itself up and down fields, capturing images and mapping out the land. The data is then taken from Tom’s SSD and uploaded to the cloud, where an AI identifies the different plants and weeds, and provides a customized fertilizer and herbicide plan for the crops.


The CISO: 2024’s Most Important C-Suite Officer

Short- and long-term solutions to navigating increased regulatory and plaintiff bar scrutiny start with the CISO. Cybersecurity defense strategies, implementation and monitoring fall under the purview of the CISO, who must closely coordinate with other members of the C-suite as well as boards of directors. Recent lawsuits highlight individual fiduciary liability for cybersecurity controls and accurate disclosures. Individual liability demands increased knowledge of, participation in and shared ownership of cybersecurity defense decisions. Gone are the days when liability risks could be eliminated by placing the blame on a single security officer. Boards and other C-suite executives now have personal risks over company cybersecurity defenses and preparedness. CISOs carry primary ownership for formulating and maintaining robust cybersecurity defenses and preparedness. This starts with implementing secure by design and other leading security frameworks. It extends to effective real-time threat monitoring and continual technology assessment of company capabilities to defend against advanced cyber threats or the “Defining Threat of Our Time.”


Generative AI and the big buzz about small language models

LLMs can create a wide array of content from text and images to audio and video, with multimodal systems emerging to handle more than one of the above tasks. They process massive amounts of information to execute natural language processing (NLP) tasks that approximate human speech in response to prompts. As such, they are ideal for pulling from vast amounts of data to generate a wide range of content, as well as conversational AI tasks. This requires a significant number of servers, storage and the all-too-scarce GPUs that power the models — at a cost some organizations are unwilling or unable to bear. It’s also tough to satisfy ESG requirements when LLMs hog compute resources for training, augmenting, fine-tuning and other tasks organizations require to hone their models. In contrast, SLMs consume fewer computing resources than their larger brethren and provide surprisingly good performance — in some cases on par with LLMs depending on certain benchmarks. They’re also more customizable, allowing organizations to execute specific tasks. For instance, SLMs may be trained on curated data sets and run through retrieval-augmented generation (RAG) that help refine search. For many organizations, SLMs may be ideal for running models on premises.


Captive centers are back. Is DIY offshoring right for you?

Captive centers are no longer just means of value creation, providing cost savings and driving process standardization. They are driving organization-wide innovation, facilitating digital transformations, and contributing to revenue growth. Unlike earlier generations of what are increasingly being called “global capabilities centers,” which tended to be large operations set up by multinationals, more than half of last year’s new centers were launched by first-time adopters — and on the smaller side, with less than 250 full-time employees; in some cases, less than 50. The desire to build internal IT capabilities amid a tight talent market is at the heart of the trend. As companies have grown comfortable with offshore and nearshore delivery, the captive model offers the opportunity to tap larger populations of lower-cost talent without handing the reins to a third party. “Eroding customer satisfaction with outsourcing relationships — per some reports, at an all-time low — has caused some companies to opt to ‘do it themselves,’” says Dave Borowski, senior partner, operations excellence, at West Monroe. What’s more, establishing up a captive center no longer needs to be entirely DIY. 


Questioning cloud’s environmental impact

Contrary to popular belief, cloud computing is not inherently green. Cloud data centers require a lot of energy to power and maintain their infrastructure. That should be news to nobody. Cloud is becoming the largest user of data center space, perhaps only to be challenged by the growth of AI data centers, which are becoming a developer’s dream. But wait, don’t cloud providers use solar and wind? Although some use renewable energy, not all adopt energy-efficient practices. Many cloud services rely on coal-fired power. Ask cloud providers which data centers use renewable. Most will provide a non-answer, saying their power types are complex and ever-changing. I’m not going too far out on a limb in stating that most use nonrenewable power and will do so for the foreseeable future. The carbon emissions from cloud computing largely stem from the power consumed by the providers’ platforms and the inefficiencies embedded within applications running on these platforms. The cloud provider itself may do an excellent job in building a multitenant system that can provide good optimization for the servers they run, but they don’t have control over how well their customers leverage these resources.


Revolutionizing Real-Time Data Processing: The Dawn of Edge AI

For effective edge computing, efficient and computationally cost-effective technology is needed. One promising option is reservoir computing, a computational method designed for processing signals that are recorded over time. It can transform these signals into complex patterns using reservoirs that respond nonlinearly to them. In particular, physical reservoirs, which use the dynamics of physical systems, are both computationally cost-effective and efficient. However, their ability to process signals in real time is limited by the natural relaxation time of the physical system. This limits real-time processing and requires adjustments for best learning performance. ... Recently, Professor Kentaro Kinoshita, and Mr. Yutaro Yamazaki developed an optical device with features that support physical reservoir computing and allow real-time signal processing across a broad range of timescales within a single device. Speaking of their motivation for the study, Prof. Kinoshita explains: “The devices developed in this research will enable a single device to process time-series signals with various timescales generated in our living environment in real-time. In particular, we hope to realize an AI device to utilize in the edge domain.”


Agile software promises efficiency. It requires a cultural shift to get right

The end result of these fake agile practices is lip service and ceremonies at the expense of the original manifesto’s principles, Bacon said. ... To get agile right, Wickham recommended building on situations in your organization where agile is practiced relatively effectively. Most often, that involves teams building internal tools, such as administrative panels for customer support or CI/CD pipelines. Those use cases have more tolerance for “let’s put something up, ask for feedback, iterate, repeat,” he said. After all, internal customers expect to accept seeing something that’s initially imperfect. “This indicates to me that people comprehend agile and have at least a baseline understanding of how to use it, but a lack of willingness to use it as defined when it comes to external customers,” said Wickham. ... “Agile is an easy term to toss around as a ‘solution,’” Richmond said. “But effective agile does not have a cookie-cutter solution to improving execution.” Getting it right requires a focus on what has to happen to understand the company’s challenges, how those challenges manifest out of the business environment, in what way those challenges impact business outcomes, and then, finally, identifying how to apply agile concepts to the business.


Building a Strong Data Culture: A Strategic Imperative

Effective executive backing is crucial for prioritizing and financing data initiatives that help cultivate an organization’s data-centric culture. Initiatives such as data literacy programs equip employees with vital data skills that are fundamental to fostering such a culture. Nonetheless, these programs often fail to thrive without the robust support of leadership. Results from the same Alation research show that only 15 percent of companies with moderate or weak data leadership integrate data literacy across most departments or throughout the entire organization. This is in stark contrast to the 61 percent adoption rate in companies with strong data leadership. Moreover, strong data leadership involves more than just endorsement; it requires executives to actively engage and set an example in data culture initiatives. For instance, when an executive carves out time from her hectic schedule to partake in data literacy training, it conveys a much more powerful message to her team than if she were to simply instruct others to prioritize such training. This hands-on approach by leaders underscores the importance of data literacy and demonstrates their commitment to embedding a data-driven culture in the organization.


Cybercriminals harness AI for new era of malware development

Threat actors have already shown how AI can help them develop malware only with a limited knowledge of programming languages, brainstorm new TTPs, compose convincing text to be used in social engineering attacks, and also increase their operational productivity. Large language models such as ChatGPT remain in widespread use, and Group-IB analysts have observed continued interest on underground forums in ChatGPT jailbreaking and specialized generative pre-trained transformer (GPT) development, looking for ways to bypass ChatGPT’s security controls. Group-IB experts have also noticed how, since mid-2023, four ChatGPT-style tools have been developed for the purpose of assisting cybercriminal activity: WolfGPT, DarkBARD, FraudGPT, and WormGPT – all with different functionalities. FraudGPT and WormGPT are highly discussed tools on underground forums and Telegram channels, tailored for social engineering and phishing. Conversely, tools like WolfGPT, focusing on code or exploits, are less popular due to training complexities and usability issues. Yet, their advancement poses risks for sophisticated attacks.



Quote for the day:

"It takes courage and maturity to know the difference between a hoping and a wishing." -- Rashida Jourdain

August 19, 2016

AI in Cyber Security: Creating the best defence against modern cyber attacks

“Using artificial intelligence or machine learning can help with the information/data overload problem. Instead of presenting security analysts with terabytes of raw data we can present them with easy-to-understand views such as behavioural profiles or virtual "video recordings" of user sessions or a prioritised view of all unusual events. A machine can really efficiently dig through tons of raw data and produce real insight from it thereby freeing up security teams to focus on what's really important for them.” This fast, accurate processing of data also affords defenders another weapon against attackers – that of finding behavioural patterns. This cuts to the second major issue facing security professionals in that attackers are constantly evolving and keeping one step ahead of defenders.


The Rise of the Platform Economy

We are in the midst of a reorganization of our economy in which the platform owners are seemingly developing power that may be even more formidable than was that of the factory owners in the early industrial revolution. We prefer the term “platform economy,” or “digital platform economy,” a more neutral term that encompasses a growing number of digitally enabled activities in business, politics, and social interaction. If the industrial revolution was organized around the factory, today’s changes are organized around these digital platforms, loosely defined. Indeed, we are in the midst of a reorganization of our economy in which the platform owners are seemingly developing power that may be even more formidable than was that of the factory owners in the early industrial revolution.


GE CIO Jim Fowler talks collaboration and IT transformation

Fowler says some GE employees choose to use collaboration platforms that GE owns and has certified, such as Yammer in Microsoft's Office 365 suite. Others gravitate to apps like Slack. GE's employees have access to federated apps such as Yammer and Skype for Business, but they are also free to use other collaboration tools if they adhere to what Fowler calls "guardrails," including support for single sign-on, and audit and data-sharing controls. "If somebody finds that there's another tool that works better and we can license it in a legal way, and we can run it in a secure fashion, and they don't put certain types of data in it, I'm also not going to get in the way of it."


A big data, IoT project brings unique storage demands

The data footprint and storage I/O requirements of IoT and big data differ from those of the traditional data center application. First, IoT data is typically a continuous feed. Data sizes can vary from miniscule to enormous. The number of files to store can reach into the trillions. This makes it easy to quickly create large amounts of data, and, as a result, there is a constant demand for capacity growth. And that growth must scale quickly and in ways that aren't disruptive. Storage systems for an IoT project also need to scale cost-effectively so that an organization can store petabytes of data for a long time. That requires low administration costs and burdens. Most IT staff simply cannot manage a dozen storage systems from six different vendors.


NSA’s use of software flaws to hack foreign targets posed risks to cybersecurity

The hacker tools’ release “demonstrates the key risk of the U.S. government stockpiling computer vulnerabilities for its own use: Someone else might get a hold of them and use them against us,” said Kevin Bankston, director of New America’s Open Technology Institute. “This is exactly why it should be U.S. government policy to disclose to software vendors the vulnerabilities it buys or discovers as soon as possible, so we can all better protect our own cybersecurity.” The weekend’s release prompted immediate speculation about who might be behind it. A group calling itself Shadow Brokers claimed responsibility. Some experts and former employees suspect, although without hard evidence, that Russia is involved.


Can we defeat DDoS using analytics?

Static defences do not work if a yet-unknown attack is used. Instead our systems need to adapt to new types of attack. Also keep in mind that there still is a proportion of bona fide service requests to use the service. This makes it harder to inspect the traffic and to work out a classification scheme for traffic filtering. Since not all incoming requests can be assumed to be part of the attack it is more complex to derive appropriate filtering rules. If the filters chosen are too specific they do not block the attack, and if they are made too general they may block legitimate traffic. However, as defenders of good, we seek to solve these problems through the application of analytical techniques to detect DDoS attacks. A widely diverse range of statistical methods and machine learning techniques could be used to detect abnormal changes in the resource usage that are indicative of a DDoS attack.


Why Natural Language Processing Will Change Everything

Computer “assistants” like Siri and Cortana are the most visible use of NLP today, but there are many other applications of NLP in use. As mentioned above, Google has poured a great deal of resources into NLP as it relates to search, allowing us to type or speak a natural question and receive a relevant answer. Google also is using NLP to create predictive text responses to emails in its Inbox email client, allowing users to choose from one of three responses and respond to an email with a single click. You may have used NLP for yourself if you have ever used the “translate” link inside Facebook to translate a foreign language into your own (with varying results) or used Google translate on Google or Bing search results. A reliable machine translation has been a goal of NLP since the 1950s, and results are improving all the time.


6 myths about big data

"The biggest myth is you have to have clean data to do analysis," said Arijit Sengupta, CEO of BeyondCore. "Nobody has clean data. This whole crazy idea that I have to clean it to analyze doesn't work. What you do is, you do a 'good enough' analysis. You take your data, despite all the dirtiness, and you analyze it. This shows where you have data quality problems. I can show you some patterns that are perfectly fine despite the data quality problems. Now, you can do focused data quality work to just improve the data to get a slightly better insight." Megan Beauchemin, director of business intelligence and analytics for InOutsource, agreed. "Often times, organizations will put these efforts on the back burner, because their data is not clean. This is not necessary. Deploying an analytic application will illuminate, visually, areas of weakness in data," she said.


How Startups Get Software Built

To what extent programmers on your team in particular impact success or failure is hard to quantify, but clearly, software and those who make it play a critical role in grabbing the market before the competition. Coding for a startup is different from coding for an established company. The startup culture is unique and extends to every angle of the business, from finance to sales to operations to software development. Your offering must be simple and inexpensive. You must be laser focused on your customer and change your offering quickly and constantly based upon customer experience. No silos, no sacred cows. Not just any code will do, and not just any coder will do. The coder, whether one of the founders or not, must be married first to the customer, not to the code. In particular, the software mindset must:


Why Vietnam is an attractive IT offshoring destination

It is typical in the Vietnamese culture for folks to want to stay in their country, be involved in IT on a local basis, and provide for their families. This is a significant difference and an important advantage for the Vietnamese outsourcing environment. Then there is the level of technical talent. Malaysia has technical competency, but does not seem to possess the same scalability as Vietnam. I often hear of organizations struggling to build out teams fast enough in Malaysia because of the quantity of staff needed to do an assignment. I believe that technical competency in Vietnam is superior to the Philippines. However, in the Philippines the English is better. This is why the Philippines are so proficient in call centers.



Quote for the day:


"Treat people as if they were what they ought to be, and you help them become what they are capable of being." -- Johann Wolfgang von Goethe


April 06, 2016

How secure is your boardroom data?

So cyber security is not just a concern for the CIO and their team – it’s something that everyone at board level needs to be aware of. In its 2015 whitepaper, ‘10 Steps: A Board Level Responsibility’, the UK government warned that security was now a board level responsibility, and offered help for senior executives on how to keep sensitive data safe. This has to include both an increased level of awareness around cyber security – knowing the company’s cyber security policies, ensuring they are functioning and are being enforced as intended, and having an awareness of the type of risks that the company may face.This requires a link from IT to the board to make sure these knowledge gaps are filled, and that board members are kept up to date with latest threats. Perhaps there is a role for a sub-committee that focuses only on the analysis of cyber threats and reports back to the board.


Build Your Own Offshore Development Team - or Not?

There is an historical “garbage in, garbage out” approach to leveraging overseas dev/test talent and cost savings. We throw something to essentially a coding factory on another continent and wonder why it doesn’t come back looking like it was tailor-made. Or we think we’ve secured the services of a hotshot overseas coder and wonder why he leaves us for Microsoft and a work visa six months later. I’ve been on both sides of the outsourced development puzzle—client side and vendor side. Some may be in the unique position to create their own offshore center due to business connections, existing infrastructure, unique cultural background, or a combination of all three. But this is not typical or practical for most of us and here’s why:


How to do data-driven marketing right

Enterprises today accumulate a lot of data, which they typically use internally for CRM, sales forecasting, and marketing strategies, among other things. But some savvy companies, particularly those in the technology industry, share this data with the media and the world at large. The benefits of data-driven content marketing can be considerable. Here's how some companies leverage their own data for marketing, brand awareness, and thought leadership, along with tips and best practices for success.


How to Prepare for a DDoS Attack

Visibility is critical when preparing for issues in your network. SNMP graphing platforms will tell you an extraordinary amount of information on volumetric attacks. You’ll be able to see and (depending on the platform) sometimes even alert on anomalous bandwidth events. You’ll be able to track at which port it entered your network, if it’s saturating any links, and even where the attack is headed. It’s surprising how many companies I’ve worked with over the years that do not deploy this because it’s such an easy and basic thing to implement. Primarily, you need devices that can speak SNMP, such as managed switches, routers, etc., and then you need a platform to query them.


Study: Interest in location intelligence technology nascent but rising

Interest in location intelligence is dependent on the industry. “If you’re doing things like sales operational planning, you have to use location intelligence to do that. Otherwise, you’re not going to understand how to allocate resources appropriately,” he said. Indeed, when broken down by industry, the survey reveals that retail has the highest interest in location intelligence with 65% of those representing the industry indicating that location intelligence is either critically important or very important to their company. Only 40% of survey takers from health care and 35% of survey takers from education said the same. Yet Dresner predicts location intelligence will rise in importance across all industries eventually. One driver is Internet of Things (IoT), he said, pointing to the growing network of Wi-Fi enabled physical objects such as Fitbits and connected vehicles.


Next-Generation Databases Shift IT Priorities

IT professionals do not want their next-generation database solution to require a "media-heavy server architecture," Thakur pointed out. "They want native formats on secure storage." They want a scalable system that can handle ever-increasing data loads, Thakur added. They want resiliency. "Given this highly distributed world, a node could go up or down fairly quickly. Customers want backup infrastructure that is highly available," Thakur said, which is preferable to doing the backup all over again should a node ever quit. But there is a trade-off. IT professionals can either have eventual data consistency on the next-generation platform, or strong consistency, which is the hallmark of the relational database, Thakur explained. "If you want scalability, you have to give up something," he said. IT professionals will give up strong consistency to gain the benefits of scalability that big data has to offer, he added.


Technology, IoT monetization to usher in 'programmable economy'

Over the next few years, Furlonger predicted, there will be a transition to an economic model that will better support organizations' move to digital business. IoT will play a key role in this transition. "The Things will start to act as proxies for us. You see that with things like virtual personal assistants, virtual customer assistants, different algorithms for robots … making decisions on our behalf in the transactional supply chain. That's just the beginning," he said. Furlonger said robotic services -- including those attached to IoT -- will become increasingly autonomous. "There's no reason -- because everything is connected to the Internet -- why they can't access your bank account, why they can't pay tax, why they can't transfer money. It's just another Internet-based connection, and then they become part and parcel of this new economic environment," he said.


The 'IoT' Is Changing the Way We Look at the Global Product Value Chain

The traditional product value chain has been shaken up with the unstoppable spread of globalization and the universal commodification of goods and services. Globalization has forced companies to adjust and respond. In fact, Internet of Things (IoT) products are playing a pivotal role in the alteration of B2C relationships, delivery channels and product pricing, and their continued proliferation is shaping the very nature of how we look at the product value chain. The "Internet of things" refers to objects that can communicate among one other through a network. IoT is becoming prolific and commonplace in everyday objects. And, with experts predicting that the IoT network will consist of some 50 billion devices by 2020, those devices will only become more and more ubiquitous. The IoT revolution is truly just beginning, and it will most certainly will be televised!


Test Management Revisited

While test management is largely irrelevant in this world, there is still a desperate need for test leadership. Why is this? The main reason is that as organisations struggle to become more innovative to respond quickly to market changes, engineering has responded by turning to continuous deployment and cross-functional teams to help meet demand. How testing fits into this picture is proving to be an Achilles heel for many organisations, which struggle to solve the challenge of how to making testing relevant and faster, yet uphold the quality they need to develop trust with their customer base. The truth is, agile or not, most organisations adopt a testing approach constructed not long after the computer came into being—despite the enormous technological advances made in the last 70 years.


Why Banks Should Go Easy On The Blockchain

The banks are certainly getting schooled on the technology, with most of the world’s top FIs participating in some type of blockchain development scheme, if not investing on their own internal programs to explore the tool. FinTech innovators were the first to forge a path that could bring blockchain into the real world, but it wasn’t until financial institutions began investing and taking interest in the sector that it began to be taken seriously. It may not seem fair, but Lawlor said it was necessary. “Any time we’re dealing with people’s money, there’s a need for the legitimacy of a financial institution that’s been around for potentially hundreds of years,” he noted. “They also have the regulatory and compliance structures already in place.”



Quote for the day:


"Don't expect to build up the weak by pulling down the strong." -- Calvin Coolidge


March 26, 2014

Internet of Things (IOT): Seven enterprise risks to consider
Despite the opportunities of IoT, there are many risks that must be contended with. Any device that can connect to Internet has an embedded operating system deployed in its firmware. Because embedded operating systems are often not designed with security as a primary consideration, there are vulnerabilities present in virtually all of them -- just look at the amount of malware that is targeting Android-based devices today. Similar threats will likely proliferate among IoT devices as they catch on.


Use Daily Conversations to Promote Development
Rather than keeping professional development talk locked to the calendar, I’m a big fan of frequent “on the fly” conversations that directly support an individual’s developmental needs and goals. Frequent conversations keep the topic front and center and allow you to focus on providing active coaching that transcends a task orientation. And importantly, the regular development discourse helps build trust between you and your co-workers. After all, there’s no higher form of respect you can pay to someone in the workplace than helping them work towards achieving their career aspirations.


Google's new cloud strategy: Apply Moore's Law to prices
Touting that cloud pricing schemes should mimic hardware and "follow Moore's Law," Google is slashing prices for pay-as-you-go services, with Google's big data analytics BigQuery engine seeing its on-demand rates chopped down by as much as 85 percent. "Pricing is still way too complex," Hölzle lamented, adding that current cloud costs might seem cheap when compared to on-premise alternatives, but there's still a lot of room for reduction. Cloud Storage follows suit with up to 68 percent in price reductions, trailed by the Compute Engine fees lowered by up to 32 percent across all regions, classes, and sizes.


Scrabble-playing robot aimed at refining human interaction
‘We believe that for autonomous robots to be accepted, they will have to conform to the social conventions of people, rather than the other way around,’ Simmons said in a statement. The researchers are investigating whether changes in mood or emotions affect the desire to interact with robots and how personalisation, such as the robot remembering a person’s play from previous games, might affect the willingness to interact over time. Victor’s torso is topped with a mobile head on which a video screen displays its animated face, designed by Anne Mundell, associate professor of scene design.


In rare move, banks sue Target's security auditor
The lawsuit is one of the rare occasions where a PCI security auditor has been sued over a data breach involving a client. Companies like Trustwave are called qualified security assessors (QSAs) in PCI parlance. They are responsible for conducting security assessments of retailers and others covered by the PCI standard. In Trustwave's case, the company also provides a range of security services to help companies achieve PCI compliance status.


Coming Soon: Android Apps for Wearable Devices
Android’s dominant position in mobile software could give it an edge over Apple in smart watches. Cecilia Abadie, a developer at 33Labs, a mobile development company in Los Angeles, says she is building a personal fitness training app and personal assistant app for the Moto 360. “Android Wear has better chances of winning the next big battle of wearables against Apple, in the same way Android itself won the battle in number of [smartphone] units sold,” she says.


Go Directly To Fail
Despite ITs extensive experience in “implementations”, a quick review of projects shows that we seem to keep making the same mistakes over and over. Each failure (potentially) undermines our customer’s confidence in our ability to deliver on-time and on-budget. The good news is that this is entirely avoidable. Selecting and implementing an ITSM tool successfully isn’t hard, but it does take some work. The good news is that this work has benefits that can impact your implementation and beyond!


Gartner Says Asia Pacific Offshore Services Providers are Still Growing
“Although the use of Asian countries for offshore or nearshore services has not yet peaked, we are seeing some distinct changes in demand and supply patterns in the region,” Mr. Longwood said. “Ongoing cost pressures in Europe are driving some multinational corporations to consider moving their offshore services from mid-cost countries like Malaysia to lower-cost locations in Asia, Eastern Europe and Latin America. Some Western countries are becoming more protectionist, which is also having a negative impact on demand for offshore services from Asia Pacific.”


Advanced threat detection products yet to earn trust of enterprises
"We've had the capability for a long time across many different technologies to do automated blocking," Holland said. "We're never going to reduce the number of attacks that occur or speed the time to containment and remediation unless we have automation in the picture. So we need to move more in that direction, but most companies struggle with that." Andrew J., a security professional, ... said his organization has utilized FireEye's NX Series product, which provides detection and prevention capabilities for Web-based threats since 2011, but like Target has not enabled the product's automated response capabilities.


How Data-Sharing Can Keep Fraud from Spreading
"As stewards of the industry, our job is to share as much information as we can through our partners," says Aaron Glover, senior analyst at SunTrust Banks in Atlanta. SunTrust, for example, has built a relationship with the Internal Revenue Service in Atlanta in which the bank sometimes calls to verify Treasury checks. The bank recently asked the IRS about one $300,000 check, which turned out to be linked to an IRS investigation, so SunTrust put the check on hold. But despite such one-off successes, there's a strong need for protocols for information sharing about money laundering, corporate security and fraud, Glover says.



Quote for the day:

“I must admit, that I have learned more from my negative experiences than I have ever learned from my positive one.” -- John Paul

January 15, 2013

Application Modernization and the Cloud Connection
Modernizing without a plan delivered via a strong migration methodology can be expensive, time-consuming, laborious and challenging on many fronts -- a combination that may not give organizations the return on investment they're seeking. This often leads organizations to delay their modernization efforts -- adding even more risk and cost to the eventual 'doomsday event' which finally forces modernization.


DDN grabs first slab of 100PB storage cloud
Data Direct Networks (DDN) will provide storage for a node of Australia's Research Data Storage Infrastructure (RDSI), a $AUD50m project aimed at creating a pool of storage the nation's researchers can use to house large quantities of data, the better to feed it into the nation's supercomputers and subject it other forms of analysis.


An Easy Guide For Developing and Publishing Apps in Intel AppUp Store for New Ultrabook Devices
So what is the opportunity there in AppUp? This might just be the first question you may ask if you have never worked with Apps or if you happen to be an existing App developer for Apple or Android market. Let me tell you, AppUp is still in it's early stage and can be considered as a start up. Having said that, there are many good things to start with AppUp


Cloud Computing Services in Russia Offer Huge Growth Potential, Finds Frost & Sullivan
"The continuing adoption of cloud services will have a significant impact on both the public and private sectors in Russia. Implementation of the National Cloud Platform will increase the quality of healthcare and government services due to the unification of services and their higher availability via Internet and public universal access points (terminals)," notes Mr Vyatskikh.


Why We Find it Hard to Change Our Behavior
When we look at our behavior we have to understand that there is a thought going on in our heads that is tripping us up. And we have to change that first. Or we’re working on the wrong thing. The question becomes, “What thoughts do I need to change to make my behavior change?” New behavior will automatically follow a change in thinking. One right thought can correct a lot of bad behavior.


Microsoft keeps calm, issues emergency IE update
"It's as ordinary as only Microsoft could make an [out-of-band] release ordinary," said Andrew Storms, director of security operations at nCircle Security, in an interview via instant messaging. "While it's rare they go out of band, their idea of emergency is still calm and to the letter of the process." And that, said Storms, is a good thing.


Paving the way to cloud security certification is a two-way street
Security and compliance go hand in hand when cloud computing is involved. As cloud consumers, enterprises are responsible for defining security policies, authorizing end-user use and understanding cloud compliance requirements. But all that responsibility doesn't fall solely on enterprise IT.


'There is a need for better dialogue between industry and government'
"If you look at the relative economic scenario across the world, I would say that the India story is still very strong" says Sanket Akerkar, MD, Microsoft India in an interview with Dataquest. He shares his views on a wide range of subjects-from the state of the economy to India's growth prospects, the changing approach to IT outsourcing and the key areas where industry and government can work together. Excerpts


7 Ways You're Wasting Time and Don't Even Know It
Berry realized she needed to get smarter about managing time and making Provident Insurance Agency in Florissant, Mo., run more smoothly. She hired a productivity coach and saw immediate results. If you feel as overwhelmed as Berry did, you may need to rethink how you use your time. Here are seven ways you may be wasting time without even realizing it.


Offshoring has fuelled IT skills crisis, say UK firms
“We all look dreadfully surprised when five years later we need to find an [enterprise] architect. Where do we grow architects from? We grow them from our analysts. Then we realise ‘Ah, we don’t have many of those any more because we shifted them out’.” Harris was commenting on the findings of a report for the forum which found that 59 per cent, of forum members have been unable to find people with the right technical or business skills for an IT role.



Quote for the day:

"Knowing when to take your losses is an essential part of eventual success." -- Tom Peters

October 02, 2012

5 dysfunctional IT relationships -- and how to repair them
Why can't they all just get along? In many cases it's the tension between conflicting demands on the same systems -- say, DBAs who complain about network performance but refuse to streamline their storage needs or business users who want to roll out new apps quickly, blissfully unaware of the effect they could have on other critical systems.


Ultrabook sales fall short of expectations
IHS iSuppli, in a forecast earlier this year, said 22 million ultrabooks would be sold this year. However, the analyst firm lowered its forecast and said the industry is on track to ship 10.3 million ultrabooks worldwide in 2012.


Exit the mouse, enter the touch pad
While all the touch talk is going on, there's another trend gaining steam in the background. The standalone touch pad, once a very obscure computer accessory (even the Apple Magic Trackpad failed to make much of a splash at launch) is getting a shot at the mainstream, at least if you judge by the recent uptick in systems that include it.



Even with its improved apps, the acquisition of Instagram – which added to Facebook’s already very large mobile user base, although there is of course overlap – Facebook is still very vulnerable in mobile for one very clear reason: it doesn’t have its own mobile OS on hundreds of millions of phones like Google or Apple does.


Data Compression: An Opportunity and a Dilemma
The technology compresses data as it is written to a storage device and decompresses it when it is read without there being any need to change applications in any way. This is, by the way, unique patented technology that is baked into IBM's own Storwize devices, but will happily work with competitors’ storage technology as well.


Philippine cybercrime law under fire, 6th petition filed
Another temporary restraining order against the country's Cybercrime Prevention Act has been filed, as Filipinos protest against its vague definition of online libel and violation of personal rights. 


CIO Guide to Mobility
As people come to rely on their mobile devices and apps for more and more of life’s - and work’s - essential functions, IT must develop the strategic thinking and acquire the background knowledge not only to manage, but also take optimal advantage of this mobile revolution.


Why It Could Make Sense To Get Rid Of Patents Entirely, Even If They Work In A Few Cases
While this may sound similar to Boldrin and Levine's earlier works, this one goes further, and is definitely worth the read. In effect, they argue that not only do patents rarely help innovation, but, even worse, the existence of patents (even where they help) will only lead to the system being expanded to where they do more harm than good:


7 Tips to Offshore Agile Development
Distance, it seemed, would only make agile methods of close-working, collaborative teams, self-governance, and rapid, time-boxed development more difficult.


Opera 12.10 beta brings new APIs for extension developers
The new version of the browser adds the SPDY standard for faster webpage downloads and offers support for Windows 8 touch and the Mac's Retina Display. But the really intriguing changes are under the hood.



Quote for the day:

"Authority without wisdom is like a heavy axe without an edge, fitter to bruise than polish." -- Anne Bradstreet

July 02, 2012

You won't be left too far behind without it, but Android 4.1 Jelly Bean is a worthy update that brings improved voice search, notifications, and sharing.

Tips for Entrepreneurs Seeking the Next Big Thing
Every entrepreneur wishes that he could predict whether his idea could be the “next big thing,” before he spent his life savings and years of energy on it. Investors, on the other hand, typically don’t even look very hard at the product or service, but prefer to evaluate first the entrepreneur, and secondly the business plan.

Microsoft Cloud: Cooperating and Competing With Partners
“The question is… Is Microsoft a partner or a competitor in this space,” Staples said. “I want to answer that question honestly and directly…The answer is yes. Microsoft is a partner and a competitor in this space.”

Dave McCrory Unveils Initial Formula for Principle of Data Gravity
Data Gravity is a theory around which data has mass. As data (mass) accumulates, it begins to have gravity. This Data Gravity pulls services and applications closer to the data. This attraction (gravitational force) is caused by the need for services and applications to have higher bandwidth and/or lower latency access to the data.

IT firms face talent crunch in emerging business areas
"Analytics and big-data skills do not exist in adequate numbers in the industry right now," said Munshi, whose analytics institute in Bangalore boasts of having over 100 students, including several top-level executives. "Top IT firms are spending a lot of money and time on training employees on these skills. These areas are just beginning to boom."

Amazon Web Services: A guide to Amazon's cloud
ZDNet's complete guide to Amazon Web Services (AWS) and its runaway cloud looks at how the company has built up a huge lead in its sector, from its hold over the modern developer-led web and how it applies its retail skills to the cloud arena. - Download requires free registration

10 Ways to Find Your Breakthrough
Breakthrough moments rise up and grip you by the throat. Resist them and you’re stuck. Navigate them and you’ll achieve new levels of success.

Agile and Offshoring - the Twain shall meet
There is enough evidence that Agile works … in most cases much better than waterfall. Even when you are working in an enterprise scale, distributed, multi-vendor and strong regulatory environment – agile works better than any other method.

Quote
"It's hard to do a really good job on anything you don't think about in the shower" -- Paul Graham