Showing posts with label portfolio. Show all posts
Showing posts with label portfolio. Show all posts

Daily Tech Digest - January 17, 2026


Quote for the day:

"Success does not consist in never making mistakes but in never making the same one a second time." -- George Bernard Shaw



Expectations from AI ramp up as investors eye returns in 2026

Billions in investments and a concerted focus on the tech over the past few years has led to artificial intelligence (AI) completely transforming how major global industries work. Now, investors are finally expecting to see some returns. ... Investors will no longer be satisfied with AI’s potential future capabilities – they want measurable returns on investment (ROI), says Jiahao Sun, the CEO of Flock.ie, a platform that allows users to build, train and deploy AI models in a decentralised manner. AI investment is entering its “show me the money era”, he says. This isn’t to say that investments into AI will pause, but that investors will begin prioritising critical areas that give guaranteed returns. These could include agentic AI platforms that enable multi-agent orchestration; AI-native infrastructures built for scale, security and interoperability; data modernisation tools that unlock the full potential of unstructured data; and AI observability and safety tools that monitor, govern and refine agent behaviour in real time, explains Neeraj Abhyankar, the VP of Data and AI at R Systems. ... “Single-purpose tools will be absorbed into unified AI platforms. The era of juggling 10 different AI products is ending and the race to offer a complete, integrated experience will intensify,” he adds. Meanwhile, some experts say that the EU’s AI Act will – for better or for worse – prohibit European firms from experimenting with high-risk use cases for AI.


The Next S-Curve of Cybersecurity: Governing Trust in a New Converging Intelligence Economy

Cybersecurity has crossed a threshold where it no longer merely protects technology ~ it governs trust itself. In an era defined by AI-driven decision-making, decentralized financial systems, cloud-to-edge computing, and the approaching reality of quantum disruption, cyber risk is no longer episodic or containable. It is continuous, compounding, and enterprise-defining. What changed in 2025 wasn’t just the threat landscape. It was the architecture of risk. Identity replaced networks as the dominant attack surface. Software supply chains emerged as systemic liabilities. Machine intelligence ~ on both sides of the attack began evolving faster than the controls designed to govern it. For boards, investors, and executives, this marked the end of cybersecurity as a control function and the beginning of cybersecurity as a strategic mandate. ... The next S-curve of cybersecurity is not driven by better tooling. It is driven by a shift in how trust is architected and governed across a converging ecosystem. This new curve is defined by: Identity-centric security rather than network-centric defense; Data-aware protection instead of application-bound controls; Continuous assurance rather than point-in-time audits; and Integration with enterprise risk, governance, and capital strategy Cybersecurity evolves from a defensive posture into a trust architecture discipline ~ one that governs how intelligence, identity, data, and decisions interact at scale.


Why Mental Fitness Is Leadership's Next Frontier

The distinction Craze draws between mental health and mental fitness is crucial. Mental health, he explains, is ultimately about functioning—being sufficiently free from psychological injury or mental illness to show up and perform one's job. "Your mental health or illness is a private matter between yourself, and perhaps your family or physician, and is a matter of respecting your individual rights," he says. Mental fitness, by contrast, is about capacity. "Assuming you are mentally healthy enough to show up and perform your job, then mental fitness is all about how well your mind performs under load, over time, and in conditions of uncertainty," Craze explains. "Being mentally healthy is a baseline. Being mentally fit is what allows leaders to think clearly at hour ten, stay composed in conflict, and recover quickly after setbacks rather than slowly eroding away," he says. Here, the comparison to elite athletics is instructive. In professional sports, no one confuses being injury-free with being competition-ready. Leadership has been slower to make that distinction, even as today’s executives face sustained cognitive and emotional demands that would have been unthinkable a generation ago. ... One of the most persistent myths in leadership development, according to Craze, is the idea that thinking happens in some abstract cognitive space, detached from the body. "In reality, every act of judgment, attention and self-control has an underlying physiological component and cost," he says. 


Taking the Technical Leadership Path

Without technical alignment, individuals constantly touch the same codebase, adding their feature in the simplest way (for them) but often they do this without ensuring the codebase is kept consistent. Over time accidental complexity grows such as having five different libraries that do the same job, or seven different implementations of how an email or push notification is sent and when someone wants to make a future change to that area, their work is now much harder. ... There are plenty of resources available to develop leadership skills. Kua advised to break broader leadership skills into specific ones, such as coaching, mentoring, communicating, mediating, influencing, etc. Even when someone is not a formal leader, there are daily opportunities to practice these skills in the workplace, he said. ... Formal technical leaders are accountable for ensuring teams have enough technical leadership. One way of doing this is to cultivate an environment where everyone is comfortable stepping up and demonstrating technical leadership. When you do this well, this means everyone can demonstrate informal technical leadership. Formal leaders exist because not all teams are automatically healthy or high-performing. I’m sure every technical person can remember a team they’ve been on with two engineers constantly debating about which approach to take, and wish someone had stepped in to help the team reach a decision. In an ideal world, a formal leader wouldn’t be necessary, but it’s rare that teams live in the perfect world.


From model collapse to citation collapse: risks of over-reliance on AI in the academy

Model collapse is the slow erosion of a generative AI system grounded in reality as it learns more and more from machine-generated data rather than from human-generated content. As a result of model collapse, the AI model loses diversity in its outputs, reinforces its misconceptions, increases its confidence in its hallucinations and amplifies its biases. ... Among all the writing tasks involved in research, GenAI appears to be disproportionately good at writing literature reviews. ChatGPT and Google Gemini both have deep research features that try to take a deep dive into the literature on a topic, returning heavily sourced and relatively accurate syntheses of the related research, while typically avoiding the well-documented tendency to hallucinate sources altogether. In some ways, it should not be too surprising that these technologies thrive in this area because literature reviews are exactly the sort of thing GenAI should be good at: textual summaries that stay pretty close to the source material. But here is my major concern: while nothing is fundamentally wrong with the way GenAI surfaces sources for literature reviews, it risks exacerbating the citation Matthew effect that tools like Google Scholar have caused. Modern AI models largely thrive on a snapshot of the internet circa 2022. In fact, I suspect that verifiably pre-2022 datasets will become prized sources for future models, largely untainted by AI-generated content, in much the same way that pre-World War II steel is prized for its lack of radioactive contamination from nuclear testing. 


Why is Debugging Hard? How to Develop an Effective Debugging Mindset

Here’s how most developers debug code: Something is broken; Let me change the line; Let’s refresh (wishing the error would go away); Hmm… still broken!; Now, let me add a console.log(); Let me refresh again (Ah, this time it may…); Ok, looks like this time it worked! This is reaction-based debugging. It’s like throwing a stone in the dark or finding a needle in a haystack. It feels busy, it sounds productive, but it’s mostly guessing. And guessing doesn’t scale in programming. This approach and the guessing mindset make debugging hard for developers. The lack of a methodology and solid approach makes many devs feel helpless and frustrated, which makes the process feel much more difficult than coding. This is why we need a different mental model, a defined skillset to master the art of debugging. ... Good debuggers don’t fight bugs. They investigate them. They don’t start with the mindset of “How do I fix this?”. They start with, “Why must this bug exist?” This one question changes everything. When you ask about the existence of a bug, you go back to the history to collect information about the code, its changes, and its flow. Then, you feed this information through a “mental model” to make decisions that lead you to the fix. ... Once the facts are clear and assumptions are visible, the debugging makes its way forward. Now you’ll need to form a hypothesis. A hypothesis is a simple cause-and-effect statement: If this assumption is wrong, then the behaviour makes sense. If not, provide a fix.


Promptware Kill Chain – Five-Step Kill Chain Model for Analyzing Cyberthreats

While the security industry has focused narrowly on prompt injection as a catch-all term, the reality is far more complex. Attacks now follow systematic, sequential patterns: initial access through malicious prompts, privilege escalation by bypassing safety constraints, establishing persistence in system memory, moving laterally across connected services, and finally executing their objectives. This mirrors how traditional malware campaigns unfold, suggesting that conventional cybersecurity knowledge can inform AI security strategies. ... The promptware kill chain begins with Initial Access, where attackers insert malicious instructions through prompt injection—either directly from users or indirectly through poisoned documents retrieved by the system. The second phase, Privilege Escalation, involves jailbreaking techniques that bypass safety training designed to refuse harmful requests. ... Traditional malware achieves persistence through registry modifications or scheduled tasks. Promptware exploits the data stores that LLM applications depend on. Retrieval-dependent persistence embeds payloads in data repositories like email systems or knowledge bases, reactivating when the system retrieves similar content. Even more potent is retrieval-independent persistence, which targets the agent’s memory directly, ensuring the malicious instructions execute on every interaction regardless of user input.


AI SOC Agents Are Only as Good as the Data They Are Fed

If your telemetry is fragmented, your schemas are inconsistent, or your context is missing, you won’t get faster responses from AI SOC agents. You’ll just get faster mistakes. These agents are being built to excel at cybersecurity analysis and decision support. They are not constructed to wrangle data collection, cleansing, normalization, and governance across dozens of sources. ... Modern SOCs integrate telemetry from EDRs, cloud providers, identity, networks, SaaS apps, data lakes, and more. Normalizing all that into a common schema eliminates the constant “translation tax.” An agent that can analyze standardized fields once, and doesn’t have to re-learn CrowdStrike vs. Splunk Search Processing Language vs. vendor-specific JavaScript Object Notation, will make faster, more reliable decisions. ... If the agent must “crawl back” into five source systems to enrich an alert on its own, latency spikes and success rates drop. The right move is to centralize, normalize, and clean security data into an accessible store, like a data lake, for your AI SOC agents and continue streaming a distilled, security-relevant subset to the Security Information and Event Management (SIEM) platform for detections and cybersecurity analysts. Let the SIEM be the place where detections originate; let the lake be the place your agents do their deep thinking. The problem is that the industry’s largest SIEM, Endpoint Detection and Response (EDR), and Security Orchestration, Automation, and Response (SOAR) platforms are consolidating into vertically integrated ecosystems. ...”


IT portfolio management: Optimizing IT assets for business value

The enterprise’s most critical systems for conducting day-to-day business are a category unto themselves. These systems may be readily apparent, or hidden deep in a technical stack. So all assets should be evaluated as to how mission-critical they are. ... The goal of an IT portfolio is to contain assets that are presently relevant and will continue to be relevant well into the future. Consequently, asset risk should be evaluated for each IT resource. Is the resource at risk for vendor sunsetting or obsolescence? Is the vendor itself unstable? Does IT have the on-staff resources to continue running a given system, no matter how good it is (a custom legacy system written in COBOL and Assembler, for example)? Is a particular system or piece of hardware becoming too expense to run? Do existing IT resources have a clear path to integration with the new technologies that will populate IT in the future? ... Is every IT asset pulling its weight? Like monetary and stock investments, technologies under management must show they are continuing to produce measurable and sustainable value. The primary indicators of asset value that IT uses are total cost of ownership (TCO) and return on investment (ROI). TCO is what gauges the value of an asset over time. For instance, investments in new servers for the data center might have paid off four years ago, but now the data center has an aging bay of servers with obsolete technology and it is cheaper to relocate compute to the cloud.


Ransomware activity never dies, it multiplies

One of the most significant findings in the study involves extortion campaigns that do not rely on encryption. These attacks focus on stealing data and threatening to publish it, skipping the deployment of ransomware entirely. Encryption based attacks remained just above 4,700 incidents annually. When data theft extortion is included, total extortion incidents reached 6,182 in 2025. That represents a 23% increase compared with 2024. Snakefly, which runs the Cl0p ransomware operation, played a major role in this shift. These actors exploited vulnerabilities in widely used enterprise software to extract data at scale. Victims included large organizations in government and industry, with some campaigns affecting hundreds of companies through a single flaw. ... A newer ransomware strain tracked as Warlock drew attention due to its tooling and infrastructure. First observed in mid 2025, Warlock attacks exploited a zero day vulnerability in Microsoft SharePoint and used DLL sideloading for payload delivery. Analysis linked Warlock to tooling previously associated with Chinese espionage activity, including signed drivers and custom command frameworks. Some ransomware payloads appeared to be modified versions of leaked LockBit code, combined with older malware components. The study notes overlaps between ransomware activity and long running espionage campaigns, where ransomware deployment may serve operational or financial goals within broader intrusion efforts.

January 03, 2016

Enterprise Architecture - Guiding Principles

The usefulness of principles is in their general orientation and perspective; they do not prescribe specific actions. A given principle applies in some contexts but not all contexts. Different principles may conflict with each other, such as the principle of accessibility and the principle of security. Therefore, applying principles in the development of EA requires deliberation and often tradeoffs. The selection of principles to apply to a given EA is based on a combination of the general environment of the enterprise and the specifics of the goals and purpose of the EA. The application of appropriate principles facilitates grounding, balance, and positioning of an EA. Deviating from the principles may result in unnecessary and avoidable long-term costs and risks.


How to Flush DNS

There are wide arrays of DNS issues that can arise at the network administrator or power user level. For the end-user; however, the majority of DNS problems arise from either bad configuration entries or the local computer’s DNS storage requiring flushing. Independent of the type of operating system, many home computer users will input the DNS Server for their respective Internet Service Provider (ISP) incorrectly resulting in a failed Internet connection. Each ISP will have a slightly different configuration process; however, the IP address of the DNS server for your home network to use will be provided on registration for service. Many times the ISP will use the address for their actual DNS server, where others it will be the same as the Gateway IP for the service


The Disciplined Agile Framework

IT departments are complex adaptive organizations. What we mean by that is that the actions of one team will affect the actions of another team, and so on and so on. For example, the way that your agile delivery team works will have an effect on, and be affected by, any other team that you interact with. If you’re working with your operations teams, perhaps as part of your overall DevOps strategy, then each of those teams will need to adapt the way they work to collaborate effectively with one another. Each team will hopefully learn from the other and improve the way that they work. These improvements with ripple out to other teams. The challenge is that every area within IT has one or more bodies of knowledge, and in some cases published “books of knowledge”, that provide guidance for people working in those areas.


Designing the Business of IT

One of the core benefits that organisations can expect is a more cost-efficient IT environment. Senior IT leaders from MunichRe, Shell and Achmea, as well as research from Gartner, predicts that IT4IT will help organisations manage an increasingly complex IT estate in a more cost-effective fashion. It will also free up time and budget for innovation and new products. They feel the Reference Architecture provides a strong framework for managing multi-sourcing approaches, which are becoming more prominent in organisations around the world. Another key benefit of IT4IT is that it is not being introduced as an alternative to methodologies or frameworks such as TOGAF and ITIL.


Google's 'Lego' Smartphone, Smarter TVs: What We're Excited About In 2016

The Internet of Things should continue to provide the foundation for the technology industry's ambitions next year, framed by machine learning, analytics, networking, and ever-smaller devices. Connected sensors will proliferate. Intelligent software agents will learn new tricks that automate discrete tasks in a way that's similar to Gmail's Smart Reply service. Robots will emerge from private businesses to begin grocery deliveries on public sidewalks. If regulatory approval can be secured, drones will begin lawful package deliveries, following in the footsteps of flying contraband couriers.


TLS Client Authentication

Why TLS client authentication? Because that’s the most standard way to authenticate a user who owns a certificate. Of course, smartcard certificates are not the only application – organizations may issue internal certificates to users that they store on their machines. The point is to have an authentication mechanism that is more secure than a simple username/password pair. It is a usability problem, especially with smartcards, but that’s beyond the scope of this post. So, with TLS clientAuth, in addition to the server identity being verified by the client, the client identity is also verified by the server. This means the client has a certificate that is issued by an authority, which the server explicitly trusts.


Market Police Deploy New Algorithm Weapons Against Spoofers

“We have to capture every trade now,” O’Brien said. “In today’s markets it’s all about analyzing patterns and contexts.” Yet given how rapidly fraudsters can change their methods to hoodwink human beings, outwitting surveillance software could be even easier. Algorithms are sophisticated but they’re incapable of determining whether a flurry of buy and sell orders are legitimate or unlawful. “The surveillance tools are merely the first line of defense,” said Haim Bodek, founder of Decimus Capital Markets, a New York-based algorithmic investing firm. “These tools can help bring suspicious activity to the attention of regulators, trading venues and brokers, but they’re a poor substitute for a compliance program that monitors activity across affiliated accounts and groups of traders.”


2025: the five key attributes for your business surviving the next ten years in tech

The two make-or-break traits that rose to the top for these leaders were being able to spot new opportunities predictively and being able to innovate in an agile way. The survey also asked these leaders how prepared they believe their organisations are in each of these two dimensions. The gaps were quite remarkable. While 62% of those surveyed identified predictively spotting opportunities as being very important for their businesses, only 12% thought that their businesses had this capability. And only nine percent believed their organisations were capable of innovating extremely well in an agile way.


Podcast: Portfolio Management & The Agile Extension

In agile, we need to be prepared to constantly adapt our plans. That approach works extremely well at the project or initiative level, but at an organizational level, budgets and plans tend to be longer term and less adaptable. The current rate of change often means that those plans are negated and organizations find it difficult to adapt quickly to changing market conditions. We need to take the concept of backlog management and apply it at a higher level to programs and portfolios so that we are able to adaptively respond to changes in the world around us. The traditional definition of project success has been on time, on scope, and on budget. Those constraints still exist, but they are not the driving factors today.


Cybersecurity in 2016: will it come down to luck or leadership?

Unfortunately in most respects, 2016 won’t change much: users will still unknowingly click on malicious links; IT departments will still be bad at staying up to date with patching; the bad guys will continue to attack; and the tide of misery from breaches will persist. What matters most is whether your organisation will be a victim or not. Of course you could do nothing, and be lucky. But the only way to control your fate is to lead your organisation to the high ground based on a well-considered, security-first strategy. It is important to remember that, despite their claims, most security vendors cannot help you. Within the market we see too many 'me too' vendors, who’s main focus in on the staple of detection.



Quote for the day:

"It is literally true that you can succeed best and quickest by helping others to succeed." -- Napoleon Hill

November 27, 2015

How Robots Can Quickly Teach Each Other to Grasp New Objects

Tellex says robotics researchers are increasingly looking for more efficient ways of training robots to perform tasks such as manipulation. “We have powerful algorithms now—such as deep learning—that can learn from large data sets, but these algorithms require data,” she says. “Robot practice is a way to acquire the data that a robot needs for learning to robustly manipulate objects.” Tellex also notes that there are around 300 Baxter robots in various research labs around the world today. If each of those robots were to use both arms to examine new objects, she says, it would be possible for them to learn to grasp a million objects in 11 days.


Mobile Cyber Security: Minimizing Loss and Maximizing Profit

Another very realistic threat that’s emerging recently is mobile botnet. Pierre-Marc Bureau, Security Intelligence Program Manager from ESET explains what we’re dealing with here: The word botnet is made up of two words: bot and net. Bot is short for robot, a name we sometimes give to a device that is infected by malicious software. Net comes from network, a group of systems that are linked together. A botnet is a network of infected devices, where the network is used by the malware to spread. One potential advance in security currently being developed as a response to the number of cyber attacks rising 100% between 2013 and 2014, is the creation of artificial intelligence (AI) platforms.


Big Data Analytics: Unlock Breakthrough Results - Step 2

A set of tools and platforms which are ideal for Centralized Provisioning are usually terrible and completely unsuited for use within a Decentralized Analytics operating model. Critical capability essential to Embedded Analytics is very different from Governed Data Discovery. Yes there are some capabilities that cross operating models (e.g. metadata), and some that are far important than others. In general this is a truly sound way to determine where your investment in capability should be occurring – and where it is not. Along the way you will surely stumble across very clever professionals who have solved for their own operating model limitations in ways that will surprise you. And some just downright silliness; remember culture plays a real and present role in this exercise.


Many embedded devices ship without adequate security tests, analysis shows

Costin presented the team's findings at the DefCamp security conference in Bucharest on Thursday. It was actually the second test performed on firmware images on a larger scale. Last year, some of the same researchers developed methods to automatically find backdoors and encryption issues in a large number of firmware packages. Some of the firmware versions in their latest dataset were not the latest ones, so not all of the discovered issues were zero-day vulnerabilities -- flaws that were previously unknown and are unpatched. However, their impact is still potentially large, because most users rarely update the firmware on their embedded devices. At DefCamp, attendees were also invited to try to hack four Internet-of-Things devices as part of the on-site IoT Village.


The Definitive Q&A for Aspiring Data Scientists

Know what you are good at and what you care about, and pursue that. So, you might be good at math, or programming, or data manipulation, or problem solving, or communications (data journalism), or whatever. You can do that flavor of data science within the context of any domain: scientific research, government, media communications, marketing, business, healthcare, finance, cybersecurity, law enforcement, manufacturing, transportation, or whatever. As a successful data scientist, your day can begin and end with you counting your blessings that you are living your dream by solving real-world problems with data. I saw a quote recently that summarizes this: "If you think your scarce data science skills could be better used elsewhere, be bold and make the move."


The Target breach, two years later

Two years later, Target has largely recovered from the breach in terms of both consumer trust and financial impact. But no matter how grand its remediation efforts were, Target will be forever associated with the data breach and its lasting repercussions. "Target remains the most significant breach in history because it was the fist time the CEO of a major corporation got fired because of a data breach," said John Kindervag, vice president and principal analyst on risk for research firm Forrester. "You can't underestimate that in terms of getting people's attention. People started taking credit card security seriously -- before that, it was just a pain-in-the-neck compliance issue."


An Engineer’s Guide to GEMM

I’ve spent most of the last couple of years worrying about the GEMM function because it’s the heart of deep learning calculations. The trouble is, I’m not very good at matrix math! I struggled through the courses I took in high school and college, barely getting a passing grade, confident that I’d never need anything so esoteric ever again. Right out of college I started working on 3D graphics engines where matrices were everywhere, and they’ve been an essential tool in my work ever since. I managed to develop decent intuitions for 3D transformations and their 4×4 matrix representations, but not having a solid grounding in the theory left me very prone to mistakes when I moved on to more general calculations.


Ambient Intelligence: What's Next for The Internet of Things?

It could manage mass transit for optimal efficiency based on real-time conditions. It could monitor environmental conditions and mitigate potential hotspots proactively, predict the need for government services and make sure those services are delivered efficiently, spot opportunities to streamline the supply chain and put them into effect automatically. Nanotechnology in your clothing could send environmental data to your smart phone, or charge it from electricity generated as you walk. But why carry a phone when any glass surface, from your bathroom mirror to your kitchen window, could become an interactive interface for checking your calendar, answering email, watching videos, and anything else we do today on our phones and tablets?


Investing in Impact - Portfolio Management for Agile Deliveries

Rightly or wrongly, the role of Project Manager remained in place in some companies, the role was re-introduced by some others, particularly larger companies working with bigger bodies of work - programmes involving many ‘agile’ feature teams for example. Companies forgot to update the Project Management toolkit though and in lots of cases we’ve seen companies also forgot to update the people, by which I mean train, educate, inform them about the key principles of agility, how to support it and how to take advantage of it. This resulted in many Project Managers applying traditional thinking and tools into agile projects. This included things like tightly managing scope and trying to fix it down early on; managing project progress and success based only on scope and time; requesting very precise estimates; measuring just velocity or worse, effort.


Rant: Cloud applications are s-l-o-w. Too s-l-o-w.

Chances are the offline office suite will have been faster than the online one. In some of my tests, working offline is three to five times faster. That's mainly due to the overhead of running code in a browser. Then there's the issue of internet connections, which are rarely perfect. They should be, I know. This is 2015, after all. But we don't even have perfect video-conferencing yet, as highlighted by this humorous article (NSFW). A lost connection can be infuriating when you're halfway through updating a document using a cloud-based application. If you're outside a 20-mile radius from Silicon Valley, this will be a factor. Microsoft has the right idea here. Its office suite lets you work online if necessary, but the offline software remains the primary productivity tool. So you can work in a fast, internet-independent office suite for most of the time, only using the online version when you need to.



Quote for the day:



"Don't look for ideas to confirm your thinking, rather look for trends that will disrupt your thinking." -- Rich Simmonds


March 03, 2015

Why You Need a Strategic IT Roadmap
Unfortunately, they work in a cycle of reaction that manages to short-term needs rather than strategic priorities and many cannot find a way out.Enterprise software is a victim of this cycle. Since it’s complex and pervasive it requires constant feeding by the IT department. Because it’s used to support fundamental business functions users frequently request new functionality. This makes it difficult to adopt the newest, most exciting technologies available because the immediate priorities are always fixing what exists. CIOs themselves recognize this. Steven Norton at the Wall Street Journal summarized the Top 5 priorities for CIOs this year. Two of the five are directly related to strategic vision


The internet of things and big data: Unlocking the power
The IoT and big data are clearly intimately connected: billions of internet-connected 'things' will, by definition, generate massive amounts of data. However, that in itself won't usher in another industrial revolution, transform day-to-day digital living, or deliver a planet-saving early warning system. As EMC and IDC point out in their latest Digital Universe report, organisations need to hone in on high-value, 'target-rich' data that is (1) easy to access; (2) available in real time; (3) has a large footprint (affecting major parts of the organisation or its customer base); and/or (4) can effect meaningful change, given the appropriate analysis and follow-up action.


5 Emerging Themes for 21st Century Business
User experience will continue to be a critical requirement for enterprise software adoption. Consumers today have high expectations from their technologies, as they are accustomed to modern, engaging, personalized and intuitive experiences. Those expectations don’t change at the workplace. Millennials will demand it. Customers will require it. And thanks to the cloud enterprise software providers we will finally be able deliver modern, innovative and elegant user experiences. No longer will long enterprise software upgrades get in the way of investment in user experience. The cloud allows vendors to deliver at the pace of change that we all have grown to expect.


Enterprise Portfolio Management - Getting Started
The enterprise portfolio management process consists of two main phases. First, there is a design phase in which the process is tuned to the specific requirements of the organization. The organization’s goals and stakeholders are investigated, suitable portfolios are defined and valuation criteria are chosen. This phase is repeated regularly so that the EPM process is up to date with the business strategy, addresses actual concerns of the stakeholders and reflects lessons learned.  The execution phase is a continuous process in which first the assets or change initiatives are inventoried, then the portfolios are analyzed, decisions are based on this analysis, and these are input to the realization. This is repeated regularly, with a rhythm that depends on the portfolios’ characteristics.


Software robots for process automation: fudge or strategic solution?
The name “robotic software automation” was coined as an illusion to the use of robots in manufacturing to replace humans on the factory line. The idea is more subtle than it might first appear. Robotic software is designed to be used by business users to allow them to build and deploy new processes across systems that were never designed or intended to work together. Suppose you are the manager of a BPO unit or call center operation. You are being asked to do more with less. You are facing targets for head count reduction. Or perhaps your business is growing, and more customer interactions need to be supported yet the business cannot afford to increase front-office capacity. With the right tool, perhaps a software robot could offload repetitive work from humans?


Break Me If You Can: 4 Rugged Tablets Put to the Test
Rugged tablets offer reinforced frames, tough skins, watertight seals, hardened glass, soft corner bumpers and major components that are shock-mounted. In other words, if ordinary consumer tablets can be considered sports (or economy) cars, rugged tablets are tanks. To see what the current state of the art is for rugged tablets, I gathered together three of the newest Windows-based worker-proof slates: the Mobile Demand xTablet Flex 10, the Getac F110 and the Panasonic Toughpad FZ-G1. I also tried out Samsung's Galaxy Tab Active, a reinforced Android tablet.


The rise of systems of intelligence: Rethinking your enterprise data strategy
The sheer amount of data being created is staggering. According to IBM, 2.5 exabytes of data was generated every day in 2012. The importance of data is becoming so big, even the US Government has launched an initiative to help access and analyse it. It is no longer sufficient for organisations to have a strategy around legacy data. Instead, they need a plan that considers the evolving enterprise data landscape and transforms their existing systems of records into systems of intelligent information.


Fail fast, but learn quicker: How to take chances without risking tech disasters
IT leaders, therefore, need a more nuanced approach to experimentation. And Cohen says the concept of 'succeeding fast and learning fast' should resonate strongly with CIOs. "Failing fast without learning is absolutely useless," he says. "There's much more to the process than just throwing money at something and thinking you can afford to fail quickly." ... "Ensure you have a deliverable in terms of experience and lessons going forwards," he says. "The prototype might cost your business £50,000, but you won't have spent the £500,000 the full project would have cost, and you'll have learnt some valuable lessons along the way. "


Who ‘owns’ an investigation into a security breach?
The general principle is what the name implies: An effective investigation cannot be fragmented. It has to be unified, with a clear leader, clear lines of responsibility and comprehensive lines of communication. And the chances for fragmentation are high. The SEC found that organizations, “may be responsible for up to 67 different types of investigations and up to 13 different business functions could be engaged in these investigative activities.” Those business functions range from audit to business conduct and ethics, corporate security, compliance, crisis management, environmental health and safety, governance, government affairs, HR, information security, legal, privacy and risk management.


Qualcomm and Intel to Introduce New Biometric Security Technology
Both announcements are expected to be made at the World Mobile Congress, a technology industry event in Barcelona, Spain. While the Intel product will be on the market first, the Qualcomm technology may be the more compelling over the long term, and not just because Qualcomm wants the fingerprint to replace passwords altogether. For one thing, the sensor that does the sonar work operates independently of the computer’s operating system, and its functions can be stored within a phone’s hardware. Those things make it hard to hack. A phone using the sensor can also be set to take more than one fingerprint, while restricting individual access to particular apps. In other words, you can share a phone with your mother, but she can’t get into your Snapchat app.



Quote for the day:

"To do great things is difficult; but to command great things is more difficult." -- Friedrich Nietzsche

December 28, 2014

The future is Machine Learning, not programs or processes.
But how practical is such machine learning to simplify process management for the business user. Does it require AI experts or big data scientists and huge machines? Absolutely not, as it too uses the LESS IS MORE approach. Recognized patterns are automatically compacted into their simplest, smallest form and irrelevant information is truncated. But in 2007 it still used IT data structures and not business terminology. Using an ontology to describe processes in business language enables human-to-human collaboration and run-time process creation, and simplifies human-computer cooperation.


Hayim Makabee on the Role of the Software Architect
In this talk Hayim will present the practical aspects of the role of the Software Architect, including the architect’s contribution at the diverse stages of the software development life cycle, and the cooperation with the diverse stakeholders: Developers, Team Leaders, Project Managers, QA and Technical Writers. Hayim Makabee was born in Rio de Janeiro. He immigrated to Israel in 1992 and completed his M.Sc. studies on Computer Sciences at the Technion. Since then he worked for several hi-tech companies, including also some start-ups. Currently he is a Research Engineer at Yahoo! Labs Haifa.


From Print to Digital: Adopting Standards, Transforming Paradigms
Pearson is the world's largest education company,. Pearson executive Ryan Hunt will outline how digital and technology have triggered Pearson's reinvention as a worldwide learning provider rather than a textbook publisher, and how Pearson is leveraging and driving the development of global standards including instigating the EDUPUB initiative.


Next-Gen Business Analytics Paving the Way to Success in 2015
Business analytics give arrangements which help to settle on key choice and business strategies by gathering expansive data and information. You would find that it does have not simple but complex data like profits, losses, transactions, marketing return, customer feedback and so forth. Normally business analytics programming is utilized to create these sorts of information. This is not another term; however it has ended up being more exact and organized with time. Individuals frequently require a legitimate structure to assess the gigantic measure of data and information accessible.


2014 in Numbers: Huge Valuations, Shocking Security Stats, and a Big Climate Deal
55 percent: Proportion of the supposedly secure servers on Alexa’s list of the million most widely used websites that were vulnerable to a two-year-old vulnerability in the widely used encryption software library known as OpenSSL, including 44 of the top 100. When the flaw was found this year, many website operators scrambled to address the vulnerability, but patching efforts seemed to stall just months after the initial discovery, and hundreds of thousands of devices could still be vulnerable.


Cynefin 101 – Portfolio Management
The Cynefin practice of ritualised dissent is used here to review and validate the initiatives and this is something that most organisations are not good at. It is all too common, due to the siloed structure of most organisations, for an initiative to be proposed from an individual or small group of people without wide review and support. This technique ensures that a wide review is undertaken and therefore when it presented it is more likely to be complete and supported. The idea behind the practice are similar to UCL’s Vincent Walsh idea of ‘trashing’. Again the idea is that a proposal is reviewed in a rigorous manner to ensure that it fully formed. This practice ensures an objective review of the idea and removes the subjectively.


Identifying and Mitigating Multiple Vulnerabilities in NTP
Multiple Cisco products exhibit vulnerabilities when processing crafted Network Time Protocol (NTP) IP version 4 (IPv4) packets. These vulnerabilities can be exploited remotely without authentication and without end-user interaction. Successful exploitation could allow arbitrary code execution or result in a denial of service (DoS) condition. Repeated exploitation attempts could result in a sustained DoS condition. The attack vector for exploitation is through NTP using UDP port 123 over IPv4 packets. An attacker could exploit these vulnerabilities using spoofed packets.


A Guide to Choosing a Next-Generation Firewall
It is important to note that these five vendors were selected as they were highlighted in the most recent industry reports; they're not the only NGFW vendors on the market today and enterprises have other options. We simply highlight five of the highest rated devices according to NSS Labs' testing and our own evaluation of the products. ... The bottom line is that all of the products discussed here are from well-respected vendors and each provides a complete NGFW solution. Because of this, it will come down to the individual specs and features that will sway each buyer to one product over another.


Lockdown: Information Security Threats on the Edge of 2015
Look at information security threats. While the number of high-profile attacks may go up or down in any given year, there will always be attacks, and there isno "magic bullet" to prevent them from occurring. What does change is the scope. The adoption of new technologies leads to new attack vectors. Malware authors, malicious individuals and groups, and nation-states all have the necessary discipline (and in many cases, the resources) to exploit our increasing technology footprint.


JPMorgan Chase’s Weak Link—and What It Means for Healthcare
One is that the breach occurred during a period of high turnover in the bank cybersecurity team. It’s also possible that vetting of outside vendors might also have been an issue: he same group of hackers that penetrated the JPMorgan network attacked JPMorgan’s Corporate Challenge charitable race website, which was run by a separate company. Another issue is related to the bank’s size, and the difficulty of securing the networks of companies that had been acquired. In JPMorgan’s case, the name “Bank One”—a bank that was acquired in 2004—still appears in a web URL, according to the Times.



Quote for the day:

"Instead of worrying about what people say of you, why not spend time trying to accomplish something they will admire." -- Dale Carnegie

November 23, 2014

Performance Impact of an IO-Intensive Application
The bottleneck of an IO-intensive app is usually when the system flushes the dirty pages to disk, not during the journaling step. The throughput of flushing is limited by the device bandwidth. A typical 15K RPM could reach a bandwidth of 120MB/sec in the best case of sequential access, in case of random IO the actual bandwidth is even less. To better illustrate, assuming the system uses the default Redhat Linux flush policy of 30 seconds, and the application writes at a rate of 20 MB/sec. After 30 seconds, the system would have accumulated 600 MB of dirty data to flush to disk. In Linux, the flushing is done by the pdflush daemon.


Tuning Large Scale Java Platforms
The session covers various GC tuning techniques, in particular focusing on tuning large scale JVM deployments and showing how to optimally size a platform for enhanced memory consumption. It also presents Pivotal Application Fabric reference architecture where a comprehensive performance study was done. ... Emad Benjamin is Principal Technocrat and CTO Ambassador at VMware. Jamie O'Meara is a Platform Architect and software engineer for Pivotal.



Aligning ITSM with Business Objectives
This discussion will focus on the need for the Business to understand what IT can do for them, things like: enter new markets, create new services, provide new solutions or industry shifts. Then we will look at why IT and in particular the importance of the CIO to be embedded within the business and understand it’s business goals and objectives to ensure both “lights on” and “strategic direction incorporating innovation”. The ITIL Service Strategy book will be used as part of our guide. So come and hear how to start aligning IT service management with the Business objectives.


How to align talent management with business strategies
Through informed alignment of talent management strategy with business strategy, organisations can identify the capabilities that are really needed (thus providing a realistic business case for the development investment). Strengthening this business case raises another challenge: developing effective criteria for selecting the right candidates for development and thereby using available resources as effectively as possible to support the maximisation of potential. This effective long-term thinking can override short-term pressure from shareholders, who are often reluctant to invest in talent management.


Why Isn’t My Strategy Working? It’s Broken That’s Why
Declare “WHY” you are in business and then build a culture to support your “WHY.” Share it in a way that defines the experience your customers, staff and partners will have every time. ... After you have declared your “WHY” and everyone is busting with passion about the vision, the brand and being part of the culture, it is time to monetize that dream. Level II determines if customers, partners and investors will join you by saying yes. ... With Level II in place, everyone is clear about the strategy to monetize the “WHY,” and now the next step is to deploy the revenue strategy complete with a “True North,” a Revenue RoadMap and aligned metrics. Deployment must be both aligned to the “WHY” and the revenue strategy.


Microsoft Strategy Vice President Teper: 'Minecraft is a development tool'
"Minecraft is a development tool" Teper told attendees of the UBS Global Technology Conference in Sausalito, Calif., last week. "People build worlds out of it. If we can get eight-year-old girls and boys building worlds and getting inspired by creating content digitally, as they grow up they'll want to create in PowerPoint, or Visual Studio. And in addition to being one of the few gaming franchises that doesn't have to be freemium, Minecraft can actually charge money. It turns out it's a great business with lots of upside." The full transcript of Teper's remarks from November 19 is worth a read.


Six Steps for Developing a Governance Model for Strategic Portfolio Management (Part 1)
In today’s business environment, we have to make decisions quickly to take advantage of such things as market-moving news and events, client requirements, new technology and other factors. In order to do all of this, you need a streamlined, customized approach that works with, and not fights against, your culture and best interests. At the heart of all of this, controlling and driving this process forward is the Governance Model. That’s why I call it the engine room. Without it, portfolio management can’t happen in any structured, purposeful way. So, whether you’re just getting started in portfolio management, or you need to re-think your approach, the Governance Model is where you start.


360 Degree Embedded Analytics: Inside Apps, Inside Processes
These technologies will sit close to Business Intelligence (BI), data integration tools and online analytical processing (OLAP) services – plus we will also focus here on data mining and ‘extract, transform, load’ (ETL) functionalities. In terms of facilitating technologies, let us also remember that Hadoop serves as a central processing hub here where ‘analytics-ready’ data sets can be blended, refined, automatically-modeled and then automatically published directly to analytical databases (like HP Vertica for example) for deeper usage. If this is analytics embedded into the application, then what of analytics embedded into the business processes.


How to Improve Teamwork in Your Agile Team
Presenting this pyramid to the team could be the second exercise. Based on my experience, most of the team members will identify at least one problem from the pyramid. Visualizing this will make them think a bit about the status quo situation while realizing that much is required to be done in order to have a great team. I think one hour should be enough to familiarise the team with the pyramid and to answer all their questions. Since the base of the pyramid forms from an Absence of Trust, I will focus on an exercise for improving this specific aspect. My team tried this exercise some weeks ago. Clearly, we had problems in the team and lack of trust was one of them.


Conversation Patterns for Software Professionals.
Years of experience in the industry have shown us that the best way to get concrete and detailed knowledge from the business is to structure it. Structuring can be defined as organizing the acquired knowledge according to predetermined criteria, for example: functional requirements, non-functional requirements, domain-specific rules, architecture and implementation limitations. Such an ordered collection of information is a checklist for those who collect it and it helps them answer the following questions - What do I already know? What else do I need to know? What do I have to specify?



Quote for the day:

"Nothing great was ever achieved without enthusiasm." -- Ralph Waldo Emerson

July 07, 2014

A Growing Backlash Against the Relentless Advances in Technology?
Sustained innovations are improvements to existing products and services that do not create new markets, often in response to the requirements of a company’s most demanding, existing customers.  Disruptive innovations, on the other hand, generally start life as simpler, more convenient, less expensive good enoughofferings that appeal to new or less-demanding customers. What makes them so dangerous to existing products is that, if allowed to gain a market foothold, they can get on a learning curve of rapidly improving quality and capabilities, and over time end up toppling the incumbents from their leadership position. Disruptive innovation is mostly about discovering new markets for new technologies, products and services.


As the digital economy ramps up, expect a new identity management vision to leapfrog passwords
The past three years have seen a huge uptick in the number and types of mobile devices, online services, and media. Yet, we're seemingly stuck with 20-year-old authentication and identity-management mechanisms -- mostly based on passwords. The resulting chasm between what we have and what we need for access control and governance spells ongoing security lapses, privacy worries, and a detrimental lack of interoperability among cross-domain cloud services. So, while a new generation of standards and technologies has emerged, a new vision is also required to move beyond the precarious passel of passwords that each of us seems to use all the time.


The trajectories of great software companies
Software buyers are second only to teenage clothing buyers when it comes to being fickle. The best vendors are those that capture as much market and mindshare as possible while the products are still perceived to be “hot." By inference, does this mean that the fastest growing vendors are necessarily the best? The fickleness of software buyers has been known for decades and some may assume that the most successful software vendors are those that scale extremely quickly. But, is a great software company one that grows slowly, moderately or rapidly?


With New Management On Board and Latest Release Out, CFEngine Gears Up for Growth
The new executive team has been revving up the CFEngine’s go-to-market strategy. The release of version 3.6 saw ease-of-use improvements like a visual dashboard for alerts and reporting. ... “There’s magic happening. We are quiet but confident,” said Kumar, who himself joined as part of the exec refresh in late 2013. “We now have a seasoned executive team with a track record of success. We have consistently heard that we have a technical advantage from analysts, press and customers. However, we didn’t do a good job in terms of mindshare. Now we’re about focusing on the right things – you can have great technology but you need a good go-to-market strategy.”


Getty Images Gains Visibility and Alignment with Kanban Portfolios 
Over time, the Agile transition for application development became quite successful. The next area of focus quickly became demand and portfolio management. Getty Images executives’, business owners, and technology management wanted to focus on improving the prioritization process, visibility into technology work, and predictability. ... Seeking a solution and prior to bringing in Rally Portfolio Manager, Getty Images evaluated high-end IT project portfolio management tools, but Agile and Kanban support from those products was limited or nonexistent, and enterprise IT PPM tools were too expensive for the company's budget and the product capabilities were overkill for the company's needs


Cyber Insurance: The Next Big Thing for Businesses
"The trend early on was tech, financial and health-care companies buying insurance. That still continues" said Tim Francis, who heads insurer Travelers' cyber division. "In the last couple of years you've seen more retail and manufacturing firms buying insurance and now you are seeing small- and middle-market firms buying too." While many of the headlines about cybercrime tend to be about attacks at large firms, The Ponemon Institute's "2014 Cost of Data Breach Study: United States" found a company with less than 10,000 records is more likely to be hacked than a firm with more than 100,000 records, in part because smaller firms are less likely to have robust defenses


Why is the CMO running so much IT? Big data, says Ford exec
Lenard added, "I am heavily involved in the measurement of the effectiveness of our media in the digital space, but also the technology to better target customers." When it comes to using marketing data to inform the next generation of vehicles that Ford will build, the marketing department is also playing a role in the decision-making process of customer-facing technologies -- traditionally the realm of the CTO. Lenard and her team are especially focused on what customers want (or will want) in terms of integrating connectivity and consumer tech into Ford cars and trucks. "[Then there] is the connected car arena -- absolutely something we are all looking at," said Lenard.


Cisco iWAN marries MPLS and Internet for WAN aggregation
In most cases, web and cloud traffic will be sent through the Internet connection, but not all internal traffic must be routed through the WAN. Applications that require dedicated bandwidth and QoS guarantees are often best suited to an MPLS WAN that can make those guarantees. But other applications don’t require those guarantees. Some traffic between branches and the data center can be safely routed via the Internet, further reducing the need for WAN capacity. Taking advantage of this cost savings requires accurately determining the application to which each packet belongs.


“Pivot Points” and knowing that every leader has a unique journey
If there is a secret successful leaders have, it is this: Leading is about creating the job and the leader’s value to the mission. This is a very different approach from conventional thinking that success comes with doing what worked for others. Leaders want to know how others handled similar situations and their outcomes. However, leaders take that as a creative spark and adapt it to their own goals and methods.


How CIOs can adapt to embrace developer-led innovation
Developers that work in large enterprises should be considered the internal engine of innovation to the companies they work for. However, it is regretfully the case that IT budgets remain relatively flat and more often than not the developers are being asked to quarterback new projects that deliver competitive advantage. The new era of the developerisation of IT is well underway and much like its predecessor, the consumerisation of IT, it’s all about making stakeholders’ – in this case the developers’ – lives easier by giving them more flexibility to focus on producing great apps and delivering valuable IP.



Quote for the day:

“Purpose drives the process by which we become what we are capable of being.” -- Lolly Daskal