Showing posts with label social networking. Show all posts
Showing posts with label social networking. Show all posts

Daily Tech Digest - September 03, 2018

Taking the pulse of machine learning adoption

ml-recorded-future.png
The least surprising part of the survey is how respondents categorized their organizations' experience with ML: roughly half are in beginners in exploration phase who are just starting to investigate ML. The remainder -- early adopters with roughly 2 years of ML experience and "sophisticated" organizations with at least 5 years or more accounted for 36% and 15%, respectively. Our take is that if you blew out the survey to a totally blind sample taken from the general population, those numbers would drop considerably. Nonetheless, we'd surmise that these organizations, by virtue of their budgeting for IT/data or analytics-related learning are among those who will be spending the lion's share on IT -- and AI and ML in particular. In the interest of full disclosure, these results are of more than passing interest to us because of the primary research that we're conducting for the day job -- Ovum research jointly sponsored with Dataiku on the people and process side of AI, where we'll be presenting the results at the Strataconference next month.


The Moral Responsibility of Social Networks
How can social media outlets better tune their algorithms? It's a challenging technical problem, but it would also require a willingness to forgo ad revenue that plays on the back of intentionally manipulative or offensive content. There are also battles to be waged against crafty legitimate users who post edgy content that constantly skirts the boundaries of terms of service. As an example, Twitter struggled internally with how to handle right-wing commentator Alex Jones. But the decisions over Jones and lesser firebrands shouldn't be difficult. Neither Twitter nor Facebook or any other company would allow a speech in their corporate headquarters that, for example, employs racist dog whistles or subtly encourages aggression against refugees. And online, their policies should be no different. Such censorship would raise ire, of course. Just a handful of social media outlets have become the main channels for distributing information. Drawing up guidelines for acceptable content isn't difficult, but it is hard to evenly apply them.



For CIOs and CISOs security decision is no less than a dilemma

Just imagine the scene through the eyes of any CIO, CISO or CSO and most would agree it’s certainly a big dilemma – if not done in a right way then it could detrimental in its own way.  “Exactly, of course we know that is the dilemma and what should be right the (security) approach – is what we are saying,” said Bhaskar Bakthavatsalu, Managing Director – Check Point, a cybersecurity solutions company, which is known for firewall technology.  More than a thousand security vendors to deal, a wide security technology products and solutions to choose, putting security controls to match unique needs in the organisation and business domains, and adhering to government and industry regulations plus distinctive business demands. ... On top of that, there are these continuous cyber threats and unknown sophisticated virus and malware attacks emerging almost every day from anonymous sources and cybercriminals operating from untraceable locations on the earth.


Most UK businesses are not insured against security breaches and data loss, says study

Most UK businesses are not insured against breaches and data loss image
“Third party risk is an interesting topic for cyber insurance underwriting that will certainly evolve as this space matures. Currently cyber insurance underwriting is more focused on the entities themselves being insured, however underwriting takes numerous variables into consideration, and the third-party risk will certainly be a factor for the underwriting process, in particular for larger enterprises.” “Security ratings is one of many variables utilised in the underwriting process. Things such as the company itself, the overall industry risk, responses from questionnaires issued, etc. are all factored in, in addition to security ratings. Each area is weighted accordingly to the overall risk being assessed. As the security ratings industry matures, more weight will certainly be lent to the information security ratings provides. When it comes to SMBs, insurers are less focused on assessing the individual risk of each individual company and more on managing the overall risk of the portfolio”


Difference Between UX and UI Design

Difference between the UX and UI
Years ago, we had doctors - just doctors. They practiced every kind of medicine, had small offices, and even made house calls. We called them general practitioners. As the field of medicine grew and research and knowledge expanded, doctors began to specialize. Now we go to one doctor for ear, nose and throat issues; we go to another for skin issues; we go to others for issues with any of our major internal organs. ... So, now we have UX and UI designers, each with their specific facets of web design. These terms are often used interchangeagably, however, and there is some disagreement as to what exactly each specialty entails. So here is a basic definition of each. While UX designers do a lot in the area of how users interact with products and services and designing that flow of interaction, but they do not focus on marketing or sales. They do, however, work with marketing departments, in, for example, the sequence in which products and services may be presented.


Understanding Type I and Type II Errors

In statistical test theory, the notion of statistical error is an integral part of hypothesis testing. The statistical test requires an unambiguous statement of anull hypothesis, for example, "this person is healthy", "this accused person is not guilty" or "this product is not broken". The result of the test of the null hypothesis may be positive or may be negative. If the result of the test corresponds with reality, then a correct decision has been made. However, if the result of the test does not correspond with reality, then two types of error are distinguished: type I errorand type II error. ... Type I and type II errors are highly depend upon the language or positioning of the null hypothesis. Changing the positioning of the null hypothesis can cause type I and type II errors to switch roles. It’s hard to create a blanket statement that a type I error is worse than a type II error, or vice versa. The severity of the type I and type II errors can only be judged in context of the null hypothesis, which should be thoughtfully worded to ensure that we’re running the right test.


Data breach reports see 75% increase in last two years

Data breach reports see 75% increase in last two years image
“Reporting data breaches wasn’t mandatory for most organisations before the GDPR came into force,” explained Andrew Beckett,  “so while the data is revealing, it only gives a snapshot into the true picture of breaches suffered by organisations in the UK. “The recent rise in the number of reports is probably due to organisations’ gearing up for the GDPR as much as an increase in incidents. Now that the regulation is in force, we would expect to see a significant surge in the number of incidents reported as the GDPR imposes a duty on all organisations to report certain types of personal data breach. “We would also expect to see an increase in the value of penalties issued as the maximum possible fine has risen from £500,000 to €20 million or 4 per cent of annual turnover, whichever is higher. The ultimate impact is that businesses face not only a much greater financial risk around personal data, but also a heightened reputational risk.”


5 Lessons I Have Learned From Data Science In Real Working Experience

Be like a Detective. Carry out your investigation with laser focus on details. This is particularly important during the process of data cleaning and transformation. Data in real life is messy and you must have the capability to pick up signals from the ocean of noise before you get overwhelmed. Therefore, having a detail-oriented mindset and workflow is of paramount importance to be successful in Data Science. Without a meticulous mindset or a well-structured workflow, you might lose your direction in the midst of diving into exploring your data. You may be diligently performing Exploratory Data Analysis (EDA) for some time but still may not have reached any insights. Or you may be consistently training your model with different parameters to hopefully see some improvement. Or perhaps, you may be celebrating the completion of arduous data cleaning process, when the data could in fact be not clean enough to feed to your model.


Is It Time to Replace Your Network's Annual Check-Up?

shutterstock 667627561
The evolution toward a more holistic, personalized health maintenance program will create an explosion of data. In fact, the amount of worldwide health care data is expected to grow to 25,000 petabytes in 2020. This will put more pressure on our communication networks. As a result, it's imperative to ensure the "health" of the data network is robust and that sharing patient information amongst all stakeholders is possible. Much like the annual physical health checkup, the traditional approach of many network managers was to conduct infrequent network performance checkups and to take action only when there is an unexpected outage or issue. In today's on-demand world where users expect their communications to be available 24/7, this is no longer acceptable. If network managers look only for alarms, they see just a fraction of the information available at any given moment and lose the ability see the complete network health picture. This can restrict how much preventive action can be taken to avoid network disruption.


The pressure's on: digital transformation seen as a make-or-break proposition for IT managers

As with many technology trends over the years, many executives rush to buy the shiny new gadgets, expecting them to work miracles on their calcified, customer-repelling processes. Digital transformation -- and all the technologies associated with it -- is only the latest example. Companies attempt to put digital approaches in place, thinking they can do things cheaper, without funding the essential background work, such as data integration. But the competitive pressure is intense: 85 percent said disruption in their industry has accelerated over the past 12 months. Thirty-five percent say the primary driver for digital transformation is advances made by competitors, 23 percent changes in regulation, and 20 percent pressure from customers - "meaning digital transformation is mostly being driven by reactive needs, instead of proactive ideas," the survey's authors conclude.



Quote for the day:


"If You Don't Like Your Situation, Take Actions To Change It, Hope Is Not A Strategy." -- Gordon TredGold


Daily Tech Digest - July 28, 2017

The Virtues Of Digital: Creating A Truly Digital Bank

From Uber to Buzzfeed, Spotify and Netflix, we’ve been finding the new paradigms that best fit digital capabilities to replace and disrupt the digitised analogue products and services that came before. Banking is no exception to this rule. We’ve moved from a passbook to a printed statement that was first mailed to us, then put on a PC screen and eventually shrunk to your phone. Digitised banking – tick! Truly digital banking – we haven’t seen it yet! When I co-founded Monzo, a new digital challenger bank in the UK, that was the challenge that faced me. As Chief Customer Officer I led product and proposition, and I knew that I didn’t want to just digitise banking, I wanted to find the new paradigm, an approach that delivered digital banking rather than just digitising what had come before.


Cyber security not a priority for most sectors, study finds

Above the hospitality and food sector on the lower end are manufacturing (31%); admin and real estate (28%); construction (23%); transport and storage (23%); and entertainment and service (21%). This is despite the fact that cyber security has featured increasingly in mainstream media because of several high-profile data breaches and the fact that millions of UK firms are being hit by cyber attacks. According to research by business internet service provider Beaming, 2.9 million UK firms suffered cyber security breaches in 2016, costing them an estimated total of £29.1bn. According to security professionals consulted by networking hardware company Cisco, the operations of an organisation (36%) are most likely to be affected by any potential cyber attack.


The seven V’s of a data fabric

A data fabric must support the modernization of storage and data management, and move away from the proliferation of data silos. But a data fabric must also integrate with legacy systems, without requiring their presence for the long-term. To work effectively a data fabric must be broad and support a vast array of applications and data types at scale across locations. While data fabrics are a significant change from the assumptions that usually surround data storage and processing, the requirements have their roots in big data. The big data era was driven by the three V’s – Volume, Variety and Velocity. A data fabric does encompass these requirements but goes well beyond. In fact, an interesting way to summarize the requirements of a data fabric is the seven V’s – Volume, Variety, Velocity, Veracity, Vicinity, Visibility, and Value.


Design Patterns for Deep Learning Architectures

Pattern languages are an ideal vehicle for describing and understanding Deep Learning. One would like to believe the Deep Learning has a solid fundamental foundation based on advanced mathematics. Most academic research papers will conjure up high-falutin math such as path integrals, tensors, hilbert spaces, measure theory etc. but don't let the math distract oneself from the reality that our collective understanding remains minimal. Mathematics you see has its inherent limitations. Physical scientists have known this for centuries. We formulate theories in such a way that the expressions are mathematically convenient. Mathematically convenience means that the math expressions we work with can be conveniently manipulated into other expressions.


Scale up DevOps processes against the odds

Start with absolute buy-in from all the teams involved and a good architectural footprint. Embrace the minimum viable product, and build on it. For example, if you build servers manually, develop processes to create and deploy a golden image in your virtualization platform of choice. The next step: Implement a secure and compliant base image across all Windows systems and another across all Linux systems, then generalize the application stack. Entrenched organizations can have 50,000 servers with as many different configurations, he pointed out, so iterative platform changes must happen before DevOps processes can translate to, "I can push a button and get my application stack." "Ultimately, you want to get [to end-to-end automation], but don't go in expecting it," said Herz. "Do a little bit, make that little bit better and move up the stack."


7 steps to baking AI into your business

Cognitive resources, algorithms, and learning models are now widely available through APIs and cloud services. IBM, which has been in the AI game since the ’50s, leans on Watson and Bluemix, but Amazon, Google, and Microsoft are also heavily invested and have strong offerings. And it’s not a game for traditional big tech only. Marketing platforms like Salesforce and Adobe are also starting to offer AI as platform, and a vast number of specialized startups are popping up. OpenAI and related nonprofit initiatives also offer resources and training tools. There’s not going to be one right answer for all. Like a web services stack, your cognitive stack will be guided by your needs, learning models that fit the job, expertise of your scientists and technologists, data sources and formats, and integration needs.


The CEO’s guide to competing through HR

Many organizations have already built extensive analytics capabilities, typically housed in centers of excellence with some combination of data-science, statistical, systems-knowledge, and coding expertise. Such COEs often provide fresh insights into talent performance, but companies still complain that analytics teams are simple reporting groups—and even more often that they fail to turn their results into lasting value. What’s missing, as a majority of North American CEOs indicated in a recent poll,1is the ability to embed data analytics into day-to-day HR processes consistently and to use their predictive power to drive better decision making. In today’s typical HR organization, most talent functions either implicitly or explicitly follow a process map; some steps are completed by business partners or generalists, others by HR shared services, and still others by COE specialists.


HR in the age of disruption

First, HR needs to truly understand the flexible work environment. Employees of the future are no longer bound to stay in the office, sit in a cubicle and work from 9 to 5. Rather, they will become location-independent and will be able to work when and where they want as long as they can get access to WiFi and manage to get the jobs done. This is because internet and mobile devices have transformed the way people work, interact and collaborate. Next, the use of new methods to communicate and collaborate must be promoted immediately. Email will no longer be considered the most effective or efficient way to communicate or collaborate. Instead, technologies such as internal collaboration platforms are going to replace email in many situations.


Microsoft explores 'safe' manual memory management in .Net

Microsoft’s model for manual memory management builds on the notion of unique owners of manual objects, with locations in the stack or heap holding only the reference to an object allocated on the manual heap. The concept of shields is introduced to enable safe concurrent sharing of manual objects. The shield creates state in local thread storage to prevent de-allocation while the object is being used. While garbage collectors such as the .Net GC offer high throughput through fast thread-local bump allocation and collection of young objects, studies show that GC can introduce performance overhead compared to manual memory management, the researchers said. These overheads are amplified in big data analytics and real-time stream processing applications, partly due to the need to trace through large heaps, they explained.


Social Intelligence: How To Mine Social Media For Business Results

“There will always be a need for people to read, interpret and understand what customer needs are and how the brand should react,” he says. Nissan North America has six to eight analysts that review data aggregated in queues by the social media management tool Sprinklr, which monitors corporate Twitter handles, Facebook pages, Instagram and Google Plus. The analysts, Long says, are the ones who decide when to respond. “An individual instance of concern might not be enough to warrant a look, but when you get into a top 10 or top 20 ranked concern, you have to start paying attention,” he says. Long considers social intelligence a very important data point that, when coupled with satisfaction surveys and other customer feedback, can help inform and shape the organization’s products, advertising and customer experience.



Quote for the day:


"The quality of a leader is reflected in the standards they set for themselves." -- Ray Kroc


May 03, 2016

Now or Never: The Ultimate Strategy for Handling Defects

Let’s stop using the backlog as a trash can. Having a longer queue of issues will increase the average lead time of our system. We could say that any backlog isn’t just a “first in/first out” queue and manage it that way, but managing our bug log demands time and energy. In my experience, the benefits of these activities with long bug logs are overrated. Just stop doing it. If a bug is critical enough but we haven’t fixed it, it will remind us about itself — don’t worry about that. Just recently, one of my teams had such a case. They knew about the problem, which appeared rarely in unpredictable situations. After a quick analysis, the team decided it was not important enough (below the line) because of its infrequency and closed the issue. However, the bug reappeared in several weeks under different conditions.


Will Fintech Destroy The Banks?

Whether the conversation starts with a vague reference to bitcoin, blockchain or crowd-funding, we're increasingly hearing from clients who are curious or worried about the implications of "Fintech" on their business or investment portfolio, particularly as it pertains to the banks.  Although wrapped in jargon and buzz words, "fintech" or financial technology, is simply the application of technology to improve the efficiency or delivery of financial services, at scale. Put this way, the concept goes from complex and obscure to obvious and unavoidable. There are, however, different themes to the innovation that could be very disruptive for both financial institutions and their customers:


I'm Calling it: Social Networking is Over

Confusion about the difference between social networking and social media is why most people haven't noticed the decline of social networking. People don't stop to think about the difference. Social networking is personal content. Social media is professional content. The sharing of social media -- professionally produced videos, articles, podcasts and photos -- is gradually replacing the sharing of personal content about one's life. For example, as you read my column, this article is being shared on Facebook, Twitter, Google+ and other so-called "social networking" sites. But that isn't social networking; it's social media. Micro-blogging, micro-schmogging. No matter what you call it, Twitter is included in every roundup, comparison or article about social networking. It's universally included in the "social network" category.


Strengthening authentication through big data

The idea is to unobtrusively gather information from several sources, including user behavior and device usage, to create a profile that is unique to the account owner and cannot be stolen or replicated by fraudulent users. The next steps would be to use the profile to detect activities that hint at malicious activity and only then initiate extra authentication steps to make sure the account hasn’t been hijacked or compromised. This model has many strengths. It’s not something you lose, such as physical tokens; it doesn’t require extra memorization efforts; it can’t be stolen or replicated, such as passcodes, or even fingerprint and retina scans; and, above all, it’s not cumbersome and it doesn’t introduce extra complexities to the user experience.


Forensics expert fights crime with digital weapons

As the volume of electronic data grows exponentially and the number and type of devices "owned" by people — such as smartphones and tablets — increases, the need to be able to identify, collect, consolidate, filter and analyse relevant data, compounded by "peripheral data" such as CCTV, physical access control logs, satnav or computer log files, becomes even more important. Historically, during an investigation numerous techniques and tools would be used to attempt to piece together the various pieces of the puzzle, especially around chronology. For example, when trying to link a call on a mobile phone with a person having just entered a secure office, against an unauthorised log onto a computer and the copying of files to a remote device.


The Rise of Threat Intelligence Gateways

Why is threat intelligence gaining momentum? Security professionals know that since they can’t block every conceivable cyber-attack, they need to collect, process, and analyze all types of internal and external security data to improve their incident detection and response capabilities. Many also want to use threat intelligence more proactively for threat prevention. In fact, 36% of enterprise cybersecurity professionals say that their organizations intend to use threat intelligence feeds to automate remediation actions over the next 24 months. ... When threat intelligence points to bad IP address, URL, or DNS lookups, why not simply block them from the get go? Unfortunately, this hasn’t always been easy in the past as it involved normalizing disparate threat intelligence feeds, building custom dashboards and rule sets, integrating various network security devices, etc.


Is There Really Such a Thing as a “Hybrid Agile” method?

Are there projects that don’t require business cases and annual budget planning? Probably. But not many in larger organisations. So finding a way of making the existing waterfall processes more lean, will enable us to shift from “Hybrid Agile” to “real Agile”. The go-live preparation is different. I think there are many technologies for which we already have good answers that allow us to go-live as required using Continuous Delivery practices. For other technologies, COTS come to mind, we will likely continue to see some waterfall validation and testing practices being used before we can go live, but as the technologies and tools evolve this will become shorter and shorter until this final phase disappears.


IT leaders pick productivity over security

Security is on the top IT leader's mind, especially as hacks become more frequent, sophisticated and malicious, but the report also uncovered some shocking truths about cybersecurity in the enterprise. The report showed major flaws in how businesses and IT leaders approach security, and it boils down to a lack of communication between the C-Suite and IT leaders, as well as a general frustration with how security slows down overall productivity in the company. But just because security might bog down productivity, or IT leaders and executives suffer from a lack of communication, businesses need to remain vigilant regarding security. Jack Danahy, CTO and co-founder of Barkly, says efficiency should be redefined. "Good security does not bog down efficiency.


The race to create smart homes is on

Two things are needed to make homes truly “smart.” First are sensors, actuators and appliances that obey commands and provide status information. There are already hundreds if not thousands of smart home products on the market. These have evolved in recent years beyond simple door sensors and light switches to smart thermostats such as Nest and voice command devices such as the Amazon Echo. Second are protocols and tools that enable all of these devices, regardless of vendor, to communicate with each other. However, this is a major undertaking and it won’t happen overnight. In the meantime, smartphone apps, communication hubs and cloud-based services are enabling practical solutions that can be implemented right now.


Enterprise UX: Past, present and future

Looking ahead, there are multiple technology developments underway that will affect how user experiences -- for both consumers and business users -- are created. Wearables, IoT devices, virtual and augmented reality, and increasingly sophisticated artificial intelligence (AI) will all profoundly change the way humans and computers interact with one another, and with the world around them. Gesture and voice control, for example, are set to play an increasingly important roles. The emerging umbrella term for where all this is heading is the 'post-app' world of pervasive computing, where desktop WIMP and mobile touch-driven interfaces are augmented or superseded by more 'natural' methods of user interaction.



Quote for the day:


"I never look at the glass as half empty or half full. I look to see who is pouring the water and deal with them." -- Mark Cuban


August 29, 2015

Automate the Boring But Essential Parts of Your Data Warehouse

Until recently, DWA was associated mostly with automating ETL development – such as generating SSIS packages in the Microsoft environment. Today, however, it covers all the major components of data warehousing from design, development and testing to deployment, operations and change management. It also covers advanced functionality like support for slowly changing dimensions and change data capture. In our experience, DWA delivers up to 80% improvements in the cost-effectiveness of building and running a data warehouse. And, just as important, DWA is far better aligned with modern agile development practices because it encourages a rapid, iterative approach to design.


Women give boards real depth

A recent meta-analytic study investigated the relationship between women on boards and performance, finding that women can make more of a difference in some countries. In countries with better shareholder protection, female board representation is positively related to profitability; in such contexts, greater gender diversity on boards ensures that the directors bring different knowledge, experience and values. In countries with greater gender parity, female board representation is positively linked to market performance. This relationship between female directorships and market performance is negative in countries with low gender parity.


7 real NASA technologies in sci-fi movie The Martian

The movie, which will be released Oct. 2, merges science fiction with actual science about Mars, technology that NASA is working on and the space agency's plans to send astronauts to the Red Planet in the 2030s. Jim Adams, NASA's deputy chief technologist, who has read the book, said he was impressed with the way the author represented the science and means of survival on Mars. "It stimulated a lot of my thinking about what we are doing and our plans on getting to Mars in the 2030s with humans." According to scientists at NASA, they already are developing many of the technologies that appear in the film. Here's a look at some of them.


The Impacts Of Big Data That You May Not Have Heard Of

Historically, data was used as an ancillary to core business and was gathered for specific purposes. Retailers recorded sales for accounting. Manufacturers recorded raw materials for quality management. The number of mouse clicks on advertising banners was collected for calculating advertisement revenue. But as the demand for Big Data analytics emerged, data no longer serves only its initial purpose. Companies able to access huge amounts of data possess a valuable asset that when combined with the ability to analyze it, has created a whole new industry. ITA Software is a private company that gathers flight price data from almost all major carriers with the exception of Jet Blue and Southwest that sells that information to travel agents and websites.


What exactly is social engineering?

The problem is… that email wasn’t from your bank, and the link did not take you to your banking page. It took you to a fake website mimicking the real website’s look and feel, and you just gave the fraudsters the login details for your online banking. You did it because it looked real and you were scared that someone was going to take your money – but instead you walked straight into a trap. Sometimes the emails come with a phone number to call that lead you to an interactive voice system, just like your bank’s. You are asked to enter your bank account number and your sort code, and to divulge digits of your access code – little realising that you are giving this information straight to the criminals.


How Savvy Businesses Tackle Change Management

We spend hours looking at data about companies that are successful when they try to do major software implementation. The first thing is: it’s not for the faint of heart. There are so many things to consider. One of the interesting things we’re finding in the HR space, is more and more human capital departments, and HR departments actually running the software implementations. It used to be IT always bought the software. But now that Software as a Service (SaaS) provides different price point for things, we are seeing HR directors or professionals who are much more involved in running new HR software initiatives. Not only do we have more HR people, but we also have people who may not have actually ever managed an implementation before.


Why virtual reality could finally mend its broken promise

VR hasn't been completely dormant. "The folks who are just entering the field and are excited by the Oculus and the related technology product development are mistaken in thinking that what they're doing is new," said Linda Jacobson. Jacobson is the author of Garage Virtual Reality, a 1994 book outlining the past, present, and future of VR. She was one of the founding contributing editors of Wired Magazine, and a former virtual reality evangelist for Silicon Graphics. "What's new is this particular set of products at a new price point, as well as the availability of new people and new talent who are looking at it," she said. During those seemingly quiet years for VR, car manufacturers started using it to design cars and test user experience.


Agile Goal Setting with OKR - Objectives and Key Results

OKR (Objectives and Key Results) is a goal setting framework created by Intel and adopted by several Silicon Valley companies. Google is the most famous case, having adopted OKR in it's first year. Twitter, LinkedIn, Dropbox and Oracle are among other adopters. ... The main objective of OKR is to create alignment in the organization. In order to do so, transparency is key. OKRs are public to all company levels — everyone has access to everyone else's OKRs. All OKRs, including the CEO's, are usually available on the Intranet. OKRs exist to set clear priorities and to focus the organization. In order to to that, you should have few OKRs.


IT unions: The wrong approach to achieving a noble goal

This may sound like a "let the markets decide" argument against unionization, but rather than the markets, it's up to the individual IT worker to ensure his or her interests are well represented and accounted for. Neither an uncaring marketplace nor a collective-oriented union can fully represent one's individual, rational self-interest. While there may be a line of people waiting to take my position, I maintain control over my skills and qualifications, and I will happily say "no" to an unreasonable demand as long as my skills and capabilities are appropriate for my job, and my performance is more attractive than that of the nearest competitor.


Agile, TOGAF and Enterprise Architecture: Will They Blend?

Enterprise architecture provides an Agile project with a vision in the form of principles and models. Agile provides Enterprise Architecture with a good set of principles, showing that a multidisciplinary way of working is key. Also, we can learn from the success of Agile and Scrum. If you look at them as architectures, they can even help improve the enterprise architecture profession. Organizations do need to ask themselves whether all architects they currently have will remain relevant. Some of what architects currently do (this holds especially true for solution architects) is now the responsibility of Agile teams. So what is the impact of this from a training and consulting perspective? The first thing is that both enterprise architecture and Agile remain relevant and people and organizations will require training and consulting in both.



Quote for the day:

"It's not about how smart you are--it's about capturing minds." -- Richie Norton

April 05, 2015

Three Emerging Themes of Big Data Analytics
For years, analytics has been changing the face of business, but never to the degree we are witnessing now. Technologies that have shown promise for years are starting to deliver tangible results. New entrants are using analytics to disrupt established markets, and big data conversations have migrated from the IT department to the boardroom. The code has finally been cracked, and enterprises are taking notice. With all the attention that big data receives, three emerging themes rise to surface in my daily interactions with senior executives: the realization of personalized marketing, the collapse of the middleman, and the recognition of data equity.


Machine Learning at American Express: Benefits and Requirements
In the case of fraud detection and prevention, machine learning has been helpful to improve American Express’s already excellent track record, including their online business interactions. To do this, modeling methods make use of a variety of data sources including card membership information, spending details, and merchant information. The goal is to stop fraudulent transactions before substantial loss is incurred while allowing normal business transactions to proceed in a timely manner. ... It’s a challenge to do version control at the scale of terabytes and more of data, because it’s too expensive in space and time to make full copies. What is needed instead are transactionally consistent snapshots for data versioning, such as those available with the MapR data platform.


Collecting private information - Uses and abuses
In business, personal information has become a sort of raw material. Many smartphone apps can afford to be free because the companies that develop them sell the users’ personal data, something barely explained in the terms and conditions. If the service is free, then you’re the product, goes an old saw in Silicon Valley. ... Likewise, he rightly argues for better oversight and protection of whistle-blowers as a way of helping restrain government power. But his recommendation to “break up the NSA” is idealistic. Distributing surveillance authority to numerous agencies would indeed prevent an unhealthy concentration of power. But the specialised skills and huge resources required to perform surveillance well call for centralising responsibility.


The six burning questions for firms looking to make money from big data
Extracting, refining and ultimately capitalising on data is notoriously difficult, particularly for existing firms who have to contend with an ingrained company structure, culture and traditional revenue streams. But it is the competitive advantage associated with effective big data utilisation that is driving the desire for existing mainstream businesses to become data-driven. Up to now there has been no systematic framework to enable established organisations and business start-ups to transform an innovative data-driven idea into a feasible business model that is driven by data. As a result of our research, we have devised a template for what we call the Data-Driven Business Model (DDBM) Innovation Blueprint.


Evaluating re-identification risks with respect to the HIPAA privacy rule
Most risk evaluation metrics for individual level data focus on one of the following factors: (1) the number, or proportion, of unique individuals; or (2) the worst case scenario, that is, the identifiability of the most vulnerable record in the dataset. Of those that consider the first factor, the most common approach simply analyzes the proportion of records that are unique within a particular population. Alternative approaches that have been proposed add nuance, for instance not just considering unique links, but the probability that a unique link between sensitive and identified datasets is correct. This accounts for the complexities of the relationship between the populations represented.


Code as a Second Language – And Why It Matters
Learning to code is being proposed by some as an alternative to learning a second language. Imagine having the choice: French, English or JavaScript. It’s an interesting concept, but could present problems if you’re, for example, traveling in Spain and order a bottle of fine Rioja with something like“function getwine(‘2 liter’,’house’){};” ... According to our brains and MRI research, playing music and programming computers are the same thing. In fact, just thinkingabout playing music is the same as programming. These three activities each activate a portion of the brain known as Brodmann’s area 40, located slightly above your ear.


The Cloud Could Be Your Best Security Bet
One of this issues around cloud computing is who exactly controls the data. If law enforcement comes knocking at the door, would the cloud company be forced to hand over your content, even if you didn’t want it to? The rules aren’t crystal clear, but some cloud vendors are forcing the issue. Earlier this year, Box released a product called Enterprise Key Management that puts your company firmly in control of your content. Box couldn’t give the content to law enforcement no matter what because it’s encrypted and only the owner has the encryption keys, forcing the law enforcement official back to you to get at it. But much like Cowan’s assessment of cloud security, not every cloud vendor has this capability and without it, the situation becomes much murkier.


Cloud Architecture #2: Eventual Consistency Patterns
Eventually data consistency (EC) is used to improve performance and avoid contention in data update operations. This is not a simple and straightforward model to use. In fact, if possible to architect an application to use the native transactional features for update operations – then do that! Only use eventual consistency (and the compensating operations) when necessary to satisfy needs that a strongly consistent data story cannot. A typical business process consists of a series of autonomous operations. These steps can be performed in all sequences or partially in parallel. While they are being completed that overall data may be in an inconsistent state.


Cynefin 101 – Shared Context and Sense Making
Remember that diversity and naivety are key tenets of Cynefin so it desirable to engage other parties as they bring different perspectives to bear. If you are doing this in the context of a department think about engaging people who you see as your clients and suppliers, those that depend on you and in turn those that you depend upon to ensure that you are taking a holistic view. You may want to keep this exercise internal to avoid ‘washing your dirty laundry in public’ but if this is the case then see if you can get some people who would act as surrogates for these external parties.


The battle for an open internet: A look at the Net Neutrality debate
"The TRAI consultation leans significantly towards finding some middle ground between what the telecom industry wants and the Internet that we've all grown up with," says Pahwa, who, along with 70 other enthusiasts, crunched it down to a concise 23 pages that you can actually understand ... It's important to remember that it's not just telecom companies that are interested in a non-neutral Internet in India. According to the TRAI consultation paper, 83 percent of India's Internet users access the Internet from their mobile phones. This massive audience is crucial for multi-billion dollar corporations like Twitter, Facebook and Google.



Quote for the day:

"I find that the harder I work, the more luck I seem to have." -- Thomas Jefferson

March 28, 2015

Work in the 21st Century: Between the Industrial and the ICT Revolution
In the age of social media and the end of fixed workstations, large corporations have no choice but to adapt themselves. In order to survive, companies must promote change from within. The new BBVA headquarters in Madrid, designed by Herzog & de Meuron, is an example of how corporate architecture can adapt to a new working environment, where a culture of collaborative, flexible and open work is nurtured, supported by technology. The “New Approaches to Work” project linked to the newly built BBVA headquarters focuses on the functional and personal needs of employees, as the BBVA New Headquarters Team explains in OpenMind.


The economic laws of positive technology disruption
Increasingly this decision comes down to the IT leader, but this person is perhaps not always the CIO or the CTO. The emergence of the Chief Digital Officer (CDO) might require an additional key to the C-suite washroom, but it is a role worth creating. With a CDO firms are creating a special new role in terms of someone who understands business outcomes as much as he or she understands software application development (or at least what the code is supposed to achieve) today. The Chief Digital Officer’s role today revolves around IT value. But specifically, what does this really mean? The CDO has to be able to read the disruption barometer, decide how to ride the storm and be able to assess outcomes and future direction for the firm as a result of actions taken.


Microsoft EA 101
So how can an EA help you take advantage of this exciting, new cloud-first, mobile-first world? Microsoft has released some pretty interesting products in the last six months to help guide you through that. As part of the Enterprise enrollment, you get a cloud-optimized option with Office 365. You get the server cloud enrollment that’ll give you Azure and other products that are all catered towards the cloud. In the newest offering, the Enterprise Cloud Suite even offers Windows on a user base license as needed. There’s a tremendous amount of flexibility there. Oh, and don’t get the wrong idea—those “big savings” I mentioned earlier are still there. If you’re comparing EA to current select licenses, you could have anywhere between 15–45% savings. There’s still no better way to save on Microsoft.


A Look at How Keyless SSL Works
In keyless SSL used by CloudFlare, the “handshake” operations are typically broken down into two segments. One, the public key operation, and Two, the private key operation. In order to prevent the private key from being handed over to a third party, all aspects of the private key handshaking process happens within the origin website's infrastructure. To do this, CloudFlare simply sets up a remote key server at the customer's end. This way, the private part of the handshaking process is complete within the origin web server and thus stays exclusive. So what happens now is that when a visitor approaches a secure website, the web server first sends out the public key certificate along with the random symmetric encryption key to the browser.


Delving deeply into the narrative hierarchies of computer vision analytics
The more disruptive real-world applications of deep learning will be those that generate deeper situational insights through correlation with additional contextual variables. This added context can help deep learning algorithms to unambiguously identify that a particular person is in a particular circumstance at a particular time and place. ... This is a daunting technical challenge, and deep learning researchers aren’t promising that they’ll crack it any time soon. But this challenge has a clear path to a solution, through ongoing efforts in the deep learning community to leverage the extrinsic context that comes from other machine learning algorithms, such as those used for natural language processing, sentiment analysis and behavioral analytics.


Facebook Lets Developers Build on Its Chat App
Messenger Platform became available Wednesday, and Marcus said that more than 40 apps are participating. Facebook also unveiled a plan to let businesses chat with customers in a new way. The hope is that when you’re buying something online, a retailer will let you choose to be contacted via Messenger about your order, and if you assent, you can see an order confirmation, shipping details, and other information in the app. You’ll even be able to do things like change your order or, as a demo with online clothing retailer Everlane indicated, buy additional items via chat.


The Indian Banking Community Cloud
Community clouds offer services to support organizations with shared objectives and common security and privacy requirements. By providing cloud-based services exclusively to Indian banks, the Indian Banking Community Cloud (IBCC) aims to address the financial sector’s growing demand for secure cloud-based services. ... The IBBC team developed a cloud security framework based on the available guidelines from the US National Institute of Standards and Technology, PCI-DSS, the European Network and Information Security Agency, and the Cloud Security Alliance, and recommendations from chief in- formation security officers in the Indian bank- ing sector. This framework is used to implement IBCC security.


Microsoft's Nano Server: What to expect from this leaner, meaner Windows Server
As traffic increases, administrators will want to launch additional VMs with shorter boot times, but Windows Server isn’t the best operating system (OS) for elastic workloads. It also undergoes frequent reboots, usually in response to a new software patch or security update, which has a knock-on effect on the uptime of applications. With the addition of components and services that are not core to the applications, Windows’ footprint has increased over time, bringing with it a larger attack surface for malware and viruses. Furthermore, the large VM image size hogs network bandwidth during provisioning, which should go some way to further explaining why Microsoft is looking to introduce a pared-back version of Windows server.


A Budget is Not an IT Strategy
The generally accepted rule of thumb is that, for most companies, IT-spend usually runs somewhere between 1 to 5 percent of overall revenues. Many CEOs assume that so long as their IT leaders keep it within an acceptable range, they don’t need to focus too much on how it’s being spent. But a revenue-based metric is meaningless unless you think about factors such as the organization’s business model, maturity, industry, capital structure, and most importantly, their overall objectives. Investing in IT Does Not Imply Investing Wisely


How virtual reality will impact the enterprise
This is most useful for remote observers in order to feel like they are actually there and in conjunction with telepresence robots could allow remote employees, students, security guards, managers, or executives to instantly feel they are actually in a remote location and gain similar freedom of movement and engagement to folks that are actually there.  This is much better than teleconference because it forces the remote person to concentrate on the image they are seeing and it makes them less likely to be looking at something else on their PC screen or their local room when an important point is being made or a critical observation needs to be captured.



Quote for the day:

"If you spend your life trying to be good at everything, you will never be great at anything." -- Tom Rath

January 24, 2015

Security principles of bitcoin
Bitcoin is dramatically different. A bitcoin transaction authorizes only a specific value to a specific recipient and cannot be forged or modified. It does not reveal any private information, such as the identities of the parties, and cannot be used to authorize additional payments. Therefore, a bitcoin payment network does not need to be encrypted or protected from eavesdropping. In fact, you can broadcast bitcoin transactions over an open public channel, such as unsecured WiFi or Bluetooth, with no loss of security.


Publisher/Subscriber pattern with Event/Delegate and EventAggregator
Publisher/Subscriber pattern is one of the variation of the Observer designer pattern introduced by GOF in software devlopment. In Publisher/Subscriber pattern publisher(entiry responsible for publishing message) publish message and there are one or more Subscriber(entity who subsribe(i.e. intested in message) to perticular message type) who capture published message. Below image desribe the senario of publisher and subscriber pattern where Publisher publisher two type of message (MessageA and MessageB) and Subscribers of the message receive the message in which they subscribed


Shout Offers A New Take On Location-Based Social Networking
“We’re not anonymous – and we don’t want to be – because I think that ultimately hurts the value of the content that can be shared over the course of an app’s lifecycle,” he says. While he believes that the trend toward anonymous social networking, popularized by apps like Yik Yak, Secret and Whisper, is more than a flash-in-the-pan, he also thinks it dictates the kind of community that results. “I definitely think it encourages a certain kind of information, and you have to make the decision: is that the kind of information you want to be shared and you want your users to share?” he says.


Gartner: APAC Public Cloud Spending to Reach $7.4 Billion in 2015
Gartner says many countries in the mature Asia Pacific including Japan region have solid reliable telecommunications infrastructure and relatively advanced technology usage profiles. Despite challenges in the global economy, Gartner expects consistent and stable growth to continue through to 2018. Increased intra-region integration in APJ across services and industries will drive public cloud usage as countries in this region break down borders through trade bloc agreements such as the ASEAN Economic Integration 2015 and the Trans Pacific Partnerships, which will drive more mobility, big data sharing and analytics and public cloud infrastructure and applications to support these initiatives.


Can I trust my data in the cloud?
IBM Cloud gathered some of the top #cloudminds in the industry for an informative discussion about hybrid cloud. In this video, they discuss trust and security in cloud computing.  We'd like to thank our fantastic panelists: Sarah Cooper, VP Business Development, M2Mi; Andi Gutmans, CEO & Co-founder, Zend; Duncan Johnston-Watt, CEO & Founder, Cloudsoft Corporation; Mark Wyllie, CEO, Flagship Solutions; Mike Dorosh, Program Manager, Cloud Technical Partnerships, IBM.


How to avoid "Hybrid Enterprise" tension headaches
For hybrid enterprises, the promise of savings mount from a less expensive physical footprint as well as more flexibility to get data and apps where they need to be and quicker—especially when you have the right application performance platform in place. If not, you'll be chasing blind spots in your application delivery chain that come from only using point solutions from the past—that is, one tool for each segment from a vendor that specializes in one thing and no integration with the overall complete picture.


Conference calls a waste of time?
By 1915, the American Telephone and Telegraph Co. network spanned the continent with a single copper circuit 6,800 miles (11,000 kilometers) long that could carry exactly one call at a time. There were already 8.6 million phones served by AT&T, but hearing someone’s voice from the other side of the continent was astounding, like being able to go to the moon, said Anthea Hartig, executive director of the California Historical Society. It was a fitting event leading up to the exposition, which celebrated the completion of the Panama Canal and the latest technological and cultural achievements of the day.


Google’s Scientific Approach to Work-Life Balance
The fact that such a large percentage of Google’s employees wish they could separate from work but aren’t able to is troubling, but also speaks to the potential for this kind of research. The existence of this group suggests that it is not enough to wish yourself into being a Segmentor. But by identifying where employees fall on this spectrum, we hope that Google can design environments that make it easier for employees to disconnect. ... Googlers reported blissful, stressless evenings. Similarly, nudging Segmentors to ignore off-hour emails and use all their vacation days might improve well-being over time. The long-term nature of these questions suggests that the real value of gDNA will take years to realize.


How we really use our camera phones
The slight male dominance in video recording is also interesting, as it could point to a perception problem for video that may have to do with the way it’s currently being presented in capturing and editing apps. Or maybe it’s just long-ingrained collective gender stereotypes. Just think back to your family parties back in the 1990s or even the ’80s, long before everyone recorded everything with smart phones. That cousin dramatically crawling on the floor with a camcorder in one hand to get the best shot? Likely a guy. And just for the record: Male Android users take the least amount of photos, with an average of just 90 photos per month.


Actionless Frameworks
Simply put, actionless frameworks are extremely prepared for future changes and can make your application behave better/look better by a new configuration. If you are using it to edit records, then if in the future you create a better editor, you can simply replace the editor registration and the new (and I imagine better) editor will be used in all places. There is no need to search all the calls to the old editor to replace it by the new one. If you are using it to convert data and now you have a faster algorithm, simply register the faster algorithm and benefit from better performance.



Quote for the day:

"Trust is the lubrication that makes it possible for organizations to work." -- Warren G. Bennis

January 14, 2015

Obama Cybersecurity Plan Seen Needing More Company Incentives
Most of what Obama will propose isn’t new. He’ll renew calls for Congress to pass stalled proposals, such as a federal data-breach notification law and legislation giving companies legal protections for sharing information about hacking threats with each other and the government. However, the concerted push has given industry officials who support the proposals reasons to be optimistic that they will finally be implemented, potentially setting the stage for even more progress this year.


Is banning encryption a crazy plan or an absolute necessity?
Comments this week by UK prime minister David Cameron have re-ignited the debate about how to weigh individuals' online privacy against the needs of law enforcement to be able to detect and prevent crime. "In our country, do we want to allow a means of communication between people, which even in extremis, with a signed warrant from the home secretary personally, that we cannot read?" said Cameron in a speech. "Up until now, governments of this country have said no, we must not have such a means of communication."


The Cultural Impedance Mismatch Between Data Professionals and Application Developers
It is well known that there is a technical impedance mismatch between object-oriented technology and relational database technology. It is also well known, although not as well recognized, that there is a cultural impedance mismatch which refers to the politics between the developer community and the data community. Specifically, these politics are the difficulties of developers and data professionals experience when working together, and generally to the dysfunctional politics between the two communities that occurs within IT organizations and even the IT industry itself. Worse yet, this impedance mismatch has become even more pronounced between the agile and data communities.


Facebook Unveils Facebook At Work, Lets Businesses Create Their Own Social Networks
The product puts Facebook head-to-head with the likes of Microsoft’s Yammer, Slack, Convo, Socialcast, and a huge number of others who are trying to tackle the “enterprise social network” space. Even LinkedIn conveniently let drop last night that it too was looking at building a product for coworkers to communicate and share content (but not chat, as a LinkedIn spokesperson tells me). Not all of these have been a hit: Lars Rasmussen, the engineering director at Facebook who is heading up the project, had in his past once headed up one of the failed efforts at an enterprise social network, Google Wave.


Use the Windows 8 registry to reduce CPU cycle waste
The Windows 8 registry is a big repository for the operating system to store its volatile and nonvolatile information. A Microsoft OS cannot operate without the registry database. Several actions are performed in Windows, depending on what is configured in the registry. In addition to using Registry Editor for desktop configuration, you can tweak two types of registry settings to improve the overall performance of Windows PCs. Let's start by looking at how to disable the background checks and other OS activities through the Windows 8 registry.


4 ways for IT to connect better with customers
IT workers who truly understand the business are better able to design systems to support and advance the organization's mission. And what better way to help IT workers gain that understanding than by bringing them together with the users they serve? In fact, according to Computerworld's 2015 Careers Survey, IT professionals report that the ability to interact with business colleagues is the top skill outside of technical expertise that will make them more valuable. Here's how leading IT shops model their workflows and business processes to incorporate communication and interaction between IT and its customers, and how that setup benefits the company — and the careers of IT professionals.


3 Common SQL Mistakes You are Probably Making as a Java Developer
Java developers also need to understand project requirements, design and develop a prototype for the assigned project, keep themselves updated with the latest changes happening in the programming industry and also have basic knowledge of other languages like HTML, SQL and many more! Professional life for Java developers is not a bed of roses and they have to try and meet each and every challenge head on. Even the best Java developers, at times, fall prey to some mistakes that could be avoided. Take for example the mistakes they make while writing SQL. These can definitely be avoided.


Keeping Skynet at bay: How humans can keep AI in check
"Perhaps the most salient difference between verification of traditional software and verification of AI systems is that the correctness of traditional software is defined with respect to a fixed and known machine model, whereas AI systems - especially robots and other embodied systems - operate in environments that are at best partially known by the system designer. "In these cases, it may be practical to verify that the system acts correctly given the knowledge that it has, avoiding the problem of modelling the real environment," the research states. The FLI suggests it should be possible to build AI systems from components, each of which has been verified.


A Manager’s Guide to Executive Coaching: 10 Questions and Answers
At some point in a manager’s career there may be an opportunity to consider hiring an executive coach. I’ve been coached, coached others, and managed executive coaching programs for a number of companies. Based on that experience, along with the advice of others, here are 10 questions and answers that managers may have about executive coaching.


Learning Fast in Design, Development and DevOps
User testing is of course another key element in the product manager's tool box. We don’t do it systematically but month after month we test our assumptions better, by observing users interacting with our products in conditions as close as possible to the real situations. Those practices and tools may seem pretty obvious now but it still a big cultural shift from 'thinking we know best what our users want and are willing to pay for' to relying more on discovery and user testing. This movement is still ongoing, but we had really impressive improvements recently! We also favor practices that maximize learning for all the actors whether they are fromproduct, devs, or ops:



Quote for the day:

"The one quality that can be developed by studious reflection and practice is the leadership of men." -- Dwight D. Eisenhower

December 30, 2014

Consumerization Of Government Services Starts With Case Management
With a case-centric approach, agencies can track information more efficiently, make automated intelligent decisions, and route casework accordingly. This can mean serving a specific customer and fulfilling a request, or working across agencies to achieve a shared result, such as solving a crime, reducing the time required to determine whether a citizen is eligible for certain benefits, or even responding to a natural disaster and supporting recovery. The move to digital is critical if agencies wish to improve their standard of service -- and it means taking a holistic perspective at how your agency interacts with customers and considering new ways to leverage technology.


The World's Biggest Data Breaches, In One Incredible Infographic
In late November, hackers targeted Sony Pictures Entertainment in an unprecedented cyber attack. This led to the exposure of thousands of sensitive emails from Sony executives and threats to release more if the release of the film "The Interview" wasn't canceled. While this breach was indeed historically devastating, it's not the first successful cyber attack on a big corporate powerhouse. The folks over at Information Is Beautiful have put together an amazing infographic with the biggest data breaches in recenty history. You can see when the attack happened, who it happened to, and how large the impact was.


Alleged tech support scammers come up with all kinds of alibis to counter complaints
All four allegedly operated telemarketing scams where consumers were told that their Windows PCs were infected with malware or needed to be optimized to work properly. Some consumers had contacted the companies themselves after seeing their websites or search result ads, while others had been cold-called by the firms. The "help" provided was largely worthless, and in some cases the companies' representatives planted malware on the victims' PCs, the FTC and Microsoft charged. Customers were charged hundreds for the calls or fast-talked into expensive multi-year service contracts.


The Future of Everything? It’s About People Connecting with People
While a majority of organizations are starting to embrace social, mobile, real-time to various extents, if you really stop to think about it, they are simply running to where they think customers are rather than taking the time to understand why they’re in each channel, what they expect and how they (and you) define value. More importantly, there needs to be an integrated experience in these channels that align with the new customer journey that’s taking shape and evolving every day. The traditional funnel that exists today, or what I refer to in the new book as the Cluster Funnel, reflects how businesses are organized today.


The 2015 State of the U.S. Health & Fitness Apps Economy
It’s difficult to know what the best apps are for anything. So many apps populate Google Play and Apple App Store for each category that it is nearly impossible to know what is quality and what is merely mediocre. To help people understand what the best apps are for tracking their health & fitness and medical goals, Applause, the 360º app quality company, introduces the ARC 360 research report on The 2015 State Of The U.S. Health & Fitness Apps Economy. The report also helps companies determine where they stand in terms of quality vis-à-vis their competitors.


Designers Are Ditching The Mouse For The “Flow” 3D Motion Touch Controller
Co-founder Tobias Eichenwald thinks there are better ways to work than squinting at a screen. He wants Flow to let you control your computer “blindly, unconsciously, naturally” — like a guitar. Normally, designers have to dig through Photoshop menus, then use a clumsy mouse or hit the bracket button, which changes things in increments that are too big. “You can never do pixel-perfect graphics” says Eichenwald. With Flow, you can bump up or down the hue or brush size in Photoshop, alter model angles in AutoCAD, switch layers in Illustrator, select frames in a video editing app, and more.


5 Hyperscale Lessons For Mainstream Datacenters
In 2014, industry watchers have seen a major rise in hyperscale computing. Hadoop and other cluster architectures that originated in academic and research circles have become almost commonplace in the industry. Big data and business analytics are driving huge demand for computing power, and 2015 should be another big year in the datacenter world. What would you do if you had the same operating budget as one of the hyperscale datacenters? It might sound like winning the lottery, or entering a world without limitations, but any datacenter manager knows that infrastructure scaling requires tackling even bigger technology challenges -- which is why it makes sense to watch and learn from the pioneers who are pushing the limits.


2015 Prediction: FinServ & Regulators Will See Opportunity in Internet of Things
some legal gray areas might be whether it would be okay if a third party aggregated the farm information, combined it with satellite imagery of fields, and sold subscriptions to trading shops? If so, would that service come under regulatory scrutiny? And if that data could affect share price, how public would this data be? Would regulators call foul on firms that could not correlate the sensor data and flag suspicious employee behavior? What responsibility would a firm have to adopt these surveillance measures? "Regulators are going to be tapping into all these techniques and speeding up," Bates said. It is very probable they will leverage sensor data to track more people and things, just as firms will use the data to innovate their strategies.


Neglected Server Provided Entry for JPMorgan Hackers
The relatively simple nature of the attack — some details of which have not been previously reported — puts the breach in a new light. In August, when Bloomberg News first reported on the attack, which ultimately compromised some account information for 83 million households and small businesses, the bank’s security experts and the Federal Bureau of Investigation feared a sophisticated adversary. Some suspected the attack, possibly with backing from Russia, was intended as retaliation against economic sanctions levied by the United States and its allies in response to Russia’s policies in Ukraine. By mid-October, however, that theory began to fray, and the F.B.I. officially ruled out the Russian government as a culprit.


WiFi Preps for 5G, IoT Roles
The so-called NG60 study group has had just two meetings so far and may require as much as two years to complete its first draft standard. It is working on an upgraded version of the 60 GHz version of WiFi, 802.11ad, capable of delivering 20 Gbit/s over a very short range. Ultimately, NG60 also may include hardware support for mesh networks that could deliver a Gbit/s over 200 to 400 meters for backhaul links on small-cell base stations. Researchers at InterDigital Inc. are building a prototype of a 60 GHz directional mesh architecture using electronically steered phased array antennas that could support up to five hops.




Quote for the day:

"Great things are not something accidental, but must certainly be willed." -- Vincent van Gogh


December 20, 2014

Roy Fielding on Versioning, Hypermedia, and REST
Anticipating change is one of the central themes of REST. It makes sense that experienced developers are going to think about all of the ways that their API might change in the future, and to think that versioning the interface is paving the way for those changes. That led to a never-ending debate about where and how to version the API. ... This is precisely the problem that REST is trying to solve: how to evolve a system gracefully without the need to break or replace already deployed components.


Buckle up IT: The enterprise needs you for cloud adoption
"When you're talking about applications and services that are important to the enterprise, it's crucial to have IT in the loop so that they can assess security, performance and availability risk factors," Olds said. "Sort of like having your doctor by your elbow at the buffet. It's not as satisfying, but you'll be healthier in the long run." Allan Krans, an analyst with Technology Business Research, noted that the days of companies having multiple silos of information and applications running without IT's involvement or knowledge should be coming to an end in the coming year.


Dear Enterprises: Now Is The Time To Get Freelance Work Right
The writing is on the wall. In 2015, enterprises MUST get it right when it comes to managing independent contractors. More companies than ever are turning to freelancers and independent contractors — especially large, billion-dollar enterprises who can capture significant business value from deploying a flexible, non-employee workforce. Since we first started Work Market in 2010, we’ve been helping enterprise companies navigate the nuances of independent work. Fast forward five years, and we’re seeing a greater number of enterprises turn to independent workers than ever before.


SQL Zip Compression, RegEx and Random Functions
While SQL Server natively supports storing data as compressed, with this library we are able to achieve goals that transcend any one application layer. ... The biggest advantage is that since the data is stored and delivered compressed, it is low impact on SQL (both Disk I/O and CPU) and the network to deliver the data to the client. This opposed to SQL native compression where SQL compresses on receive and decompresses on send, the network then recompresses while sending, then the client decompresses the network packet on receive.


Wouldn’t it be fun to build your own Google?
Imagine you had your own copy of the entire web, and you could do with it whatever you want. (Yes, it would be very expensive, but we’ll get to that later.) You could do automated analyses and surface the results to users. For example, you could collate the “best” articles (by some definition) written on many different subjects, no matter where on the web they are published. You could then create a tool which, whenever a user is reading something about one of those subjects, suggests further reading: perhaps deeper background information, or a contrasting viewpoint, or an argument on why the thing you’re reading is full of shit.


New Intel Platform Rich with Transformative Features
Many high-performance computing (HPC) users are familiar with Intel AVX 1.0, which increased floating point packet processing from 128 bit to 256 bit. Now Intel AVX2 doubles integer packet processing, from 128 bit to 256 bit. That essentially doubles your integer processing ability on the same clock speeds. This advance will drive new workload performance gains, particularly for the demanding HPC applications used in life sciences, physics, engineering, genomic research, data mining, and other types of compute-hungry scientific and industrial work. In our testing, we have seen up to a 1.9x increase in performance with Intel AVX2.[1],[2]


We Still Don’t Understand Very Well How Social Change Occurs in the Digital Age
he Internet is responsible for one of the paradoxes of the digital age. We are just a click away from having a friend in the antipodes, but we end up following friends who we already know from work, school or just around the corner. Ethan Zuckerman, director of the Center for Civic Media at MIT, denounces the lack of globalism on the web and alerts us to a few hazards that may cause damage to the democratic quality of our governments. Zuckerman proposes alternatives to the current model of Internet business and puts the magnifying glass on users in order to understand how social changes come about in the digital age.


Creating a Sales Dashboard with Bootstrap and ShieldUI
Although a complete Dashboard can include any possible combination of widgets and layout elements, I have picked the most widely used. From a layout perspective, the page is divided into responsive panels, the positioning of which is determined by the Bootstrap layout system. On smaller screens, each section is adequately positioned to occupy all of the available space. The widgets used are JQuery QR code, JQuery rating control, two different layouts for the graphs, utilizing a JQuery Chart plugin, a circular progress bar, and a grid. From a development perspective, I have used a simple html file, which hosts all the required code.


Artificial Skin That Senses, and Stretches, Like the Real Thing
Finally, in a further effort to make the materials seem more realistic, they added a layer of actuators that warm it up to roughly the same temperature as human skin. The new smart skin addresses just one part of the challenge in adding sensation to prosthetic devices. The larger problem is creating durable and robust connections to the human nervous system, so that the wearer can actually “feel” what’s being sensed. In a crude demonstration of such an interface, Dae-Hyeong Kim, who led the project at Seoul National University, connected the smart skin to a rat’s brain and was able to measure reactions in the animal’s sensory cortex to sensory input.


Alchemy: Message Buffer
One topic that has been glossed over up to this point is how is the memory going to be managed for messages that are passed around with Alchemy. The Alchemy message itself is a class object that holds a composited collection of Datum fields convenient for a user to access, just like a struct. Unfortunately, this format is not binary compatible or portable for message transfer on a network or storage to a file. We will need a strategy to manage memory buffers. We could go with something similar to the standard BSD socket API and require that the user simply manage the memory buffer. This path is unsatisfying to me for two reasons:



Quote for the day:

"Ignorance is a death sentence for any leader as it eliminates the option to take action effectively." -- @ManagersDairy