Showing posts with label source code control. Show all posts
Showing posts with label source code control. Show all posts

June 22, 2016

How Big Data Is Changing The Game For Backup And Recovery

In the world of today's next-generation databases -- where data is distributed across small machines -- it's not quite so simple. "There is no concept of a durable log because there is no master -- each node is working on its own stuff," Thakur explained. "Different nodes could get different rights, and every node has a different view of an operation." That's in part because of a trade-off that's been required to accommodate what's commonly referred to as the "three V's" of big data -- volume, velocity, and variety. Specifically, to offer scalability while accommodating the crazy amounts of diverse data flying at us at ever-more-alarming speeds, today's distributed databases have departed from the "ACID" criteria generally promised by traditional relational databases. Instead, they've adopted what are known as "BASE" principles.


How to hire for the right big data skill set

And before you can even determine what skills you need for data collection, it's important to first consider your audience and customer base. Polich gives the example of a bank, which can't withstand any down time or lag in data retrieval, so companies need to hire accordingly. That might mean hiring people who have worked in similar high-stress environments, where certain aspects of data matter more than in other industries. Alternatively, he also gives the example of a social media network, which can probably withstand a minimal amount of lag or inconsistency in data retrieval, especially if it results in cost-savings. That might mean you can hire someone with other skills that are important to your business or someone more accustomed to working in agile and innovative environments.


New life for residential Wi-Fi

The contrast between this modern approach and older residential Wi-Fi routers shows what happens when a market advances in linear fashion. The main selling features of a home router have for years been lower cost and higher headline speeds. This resulted in standard reference hardware implementations, packaged unimaginatively; the physical design and user-interface were contracted out to the lowest bidders, and we got what we paid for. With the exception of Apple (and Google, with a niche product), these are beastly products that even experts shrink from tinkering with. But the primary technical advance promoted by eero and Luma is, in the vernacular, “Wi-Fi that doesn’t suck.” These startups have seized on the universally recognized coverage issue: A single Wi-Fi router installed at the most convenient spot in the house is unable to provide reliable building-wide coverage in perhaps 10 percent of cases.


Expert panel explores the new reality for cloud security and trusted mobile apps delivery

When we look at mobile, we've had people who would have a mobile device out in the field. They're accustomed to being able to take an email, and that email may have, in our situation, private information -- Social Security numbers, certain client IDs -- on it, things that we really don't want out in the public space. The culture has been, take a picture of the screen and text it to someone else. Now, it’s in another space, and that private information is out there.  You go from working in a home environment, where you text everything back and forth, to having secure information that needs to be containerized, shrink-wrapped, and not go outside a certain control parameter for security. Now, you're having a culture fight [over] utilization. People are accustomed to using their devices in one way and now, they have to learn a different way of using devices with a secure environment and wrapping. That’s what we're running into.


Q&A with Roman Pichler about Strategize

Product strategy and product roadmap are neither agile nor anti-agile; it entirely depends on how we apply them. The challenge for any product is to first find a valid strategy—an approach that is likely to be effective—and then to review and adapt it on a regular basis so that the product becomes and stays successful. It would be a mistake to think of strategy as something static that merely has to be implemented: As the product grows and as the market and technologies change, the strategy and the roadmap have to change too. In some cases, these changes can be drastic—think of YouTube, for instance, which pivoted from a video-dating site to a video-sharing product. In other cases, the changes are incremental. Take the evolution of the iPhone, for example. When the first iPhone was launched in 2007, it did not allow people to take videos. But the latest generation uses video to set the product apart from the competition.


Top website domains are vulnerable to email spoofing

Of those vulnerable, 40 percent were news and media sites, and 16 percent were software-as-a-service sites, Detectify said in an email. A common way these domains are trying to prevent email spoofing is through a validation system called Sender Policy Framework or SPF. It essentially creates a public record, telling the Internet which email servers are allowed to use the domain. Ideally, any messages impersonating the domain will be detected as spam and rejected before delivery. In practice, however, the system can often come up short. The SPF will filter out spam emails best when on the so-called "hardfail" setting, but many website domains decide to implement the SPF at the "softfail" level. Although this will flag any forged emails as suspected spam, the messages will still be sent out to the recipient.


Why I Prefer Merge Over Rebase

Why would anyone be based on your work-in-progress branch? Because it happens. Sometimes tasks are not split that strictly and have dependencies – you write a piece of functionality, which you then realize should be used by your teammates who work on another task within the same story/feature. You aren’t yet finished (e.g. still polishing, testing), but they shouldn’t wait. Even a single person may want to base his next task on the previous one, while waiting for code review comments. The tool shouldn’t block you from doing this from time to time, even though it may not be the default workflow scenario.


Infographic: CIOs reveal IT hiring trends for 2016

On Tuesday, Robert Half Technology released the results of a survey that showed 21% of US CIOs plan on adding more staff to their IT department and 63% plan on only filling open IT roles. The report forecast IT hiring trends in the second half of 2016. The data was collected from 2,500 phone interviews with CIOs. John Reed, senior executive director of Robert Half Technology, said that many organizations are getting the go-ahead on new technology projects, which is leading to more hires, but they are still running into problems. "Technology leaders continue to struggle to find highly skilled talent in a market with low unemployment," Reed said. "They seek IT professionals with specialized skills, especially in the areas of cloud computing, data analytics, mobile strategies and cybersecurity."


IT talent biggest roadblock to digital transformation

When looking at hiring for new and in-demand skills, you might first want to look within your own workforce and see if there is an employee who could be trained in that area, says Holland. Another options, he says, to look to at third-party services "who are selling a full solution without the need to unpack what specific skills are necessary." ... Mark Troester, vice president of Solutions Marketing at software provider Progress, hiring for digital transformation is about striking a balance between skills. "From a leadership perspective, look for individuals that live in the middle of business and technology -- individuals that are entrepreneurial in spirit and have the ability to apply technology in new and creative ways. If that skillset is lacking then you may need to go outside the organization," he says.


Power of Teamwork In Data Science

Data science can be summarized as the interplay of data, statistics, technology and business. So by default, doing data science is about collaboration, teamwork and combining different skill sets. It does include but is not limited to statistics and mathematics. It would also include skills like computer science, machine learning, industry expertise (banking, insurance, retail etc.) and expertise on functional domains like sales, customer service or marketing, communication and presentation skills and last but not least, data visualization. A wide set of skills will not necessarily make it easier for organizations to find and recruit data scientists in the war on talent that has already started. My colleague Bhima Auro recently wrote a blog on how organizations can hire talent.



Quote for the day:


"Do not go where the path may lead; go instead where there is no path and leave a trail." -- Juliean Smith


February 02, 2013

HP's Building an Avatar to Manage Your Mobile Connections
Their idea is to give individual users an identity that transcends the many smartphones, tablets and other devices they may carry, as well as all the Wi-Fi and cellular networks they use in different situations. HP's avatar would pick the best combination of hardware and network for each situation and automatically set up and take down connections, said HP Fellow Paul Congdon, who works in the company's Networking & Communications Lab.


The Datomic Information Model
Datomic considers a database to be an information system, where information is a set of facts, and facts are things that have happened. Since one can't change the past, this implies that the databaseaccumulates facts, rather than updates places, and that while the past may be forgotten, it is immutable. Thus if someone 'changes' their address, Datomic stores the fact that they have a new address without replacing the old fact (it has simply been retracted as of this point in time).


Predictive Modeling Now “Essential” to Insurers
Findings from a new Towers Watson survey indicate that P&C insurers are seeing those opportunities in their data; and according to the “P&C Insurance Predictive Modeling Survey” of small, midsize and large personal and commercial lines carriers, the capture and transformation of data into useful information has turned into a critical differentiator of performance within the marketplace.


Cyberwarfare evolves faster than rules of engagement
As the rhetoric heats up over cyberwar -- including warnings that attacks on the U.S. are imminent and alarms that the U.S. has escalated the risk via malware attacks on Iran's nuclear program -- the rules of engagement are missing in action. The current framework of international law and treaties doesn't adequately address cyberconflict, Jody Westby, CEO of Global Cyber Risk, said Monday at the Techonomy 12 conference.


IronKey Workspace review: Windows 8 PC on a stick
IronKey's new USB is certified to use Windows To Go -- an enterprise feature of Windows 8 -- to deliver a fully portable desktop. Windows To Go can be booted up from a USB-connected external drive on PCs that meet the Windows 7 or Windows 8 certification requirements, regardless of the operating system running on the PC. While Imation doesn't promote this feature, users can also boot up this USB on any Intel-based Apple computer.


Enterprise software wars: 5 points of advice for CIOs
In short, software is eating the world. My own theory is that we are in the middle of a dramatic and broad technological and economic shift in which software companies are poised to take over large swathes of the economy. More and more major businesses and industries are being run on software and delivered as online services--from movies to agriculture to national defense.


IBM Connect – Impactful Ideas, But Messaging Still in Motion
What IBM has not yet been able to do – even as it develops and promotes concepts like “Social Business” – is be consistent in its communication of those concepts. If 30 or so customers and partners at IBM’s own defining event cannot articulate or agree on the meaning of IBM’s core themes, that suggests that IBM has room for improvement in its communication and consistency.


Fail Fast Or Fail Smart?
The practice of being able to conduct quick, cheap and relatively painless tests, experiments or research exercises in order to gain invaluable insights, feedback, solutions to hypotheses and the like becomes vital in order to rethink, close the loop and ultimately “pivot” or change course based on integrating the new lessons into the model.


Visual Studio Gets Git
This past Wednesday Microsoft announced native support in Visual Studio for the Git distributed version control system (DVCS). Git has long been familiar in the open source world since it was created by Linus Torvalds to support the development of the Linux kernel. Since its release in 2005 it has grown in popularity and can be found supporting countless private and public projects. 


The CTO Role Broken Down
There is a big misconception about who should be a CTO. A CTO shouldn’t necessarily be the smartest code developer because, as a CTO, they must by definition be an integrator and a manager of people. CTO’s have to understand the entire organization. Specifically, they need to understand what all of the technical parts of the team are up to, what all the players in the organization are up to, and what the programs are that are underway.



Quote for the day:

"Never confuse a single defeat with a final defeat." --F. Scott Fitzgerald, American writer

July 20, 2012

Leading yourself into Humility
What you think about what you know matters more than what you know. With that in mind it may be risky to give you more knowledge about humility. Hopefully you’ll add doing to knowing.


AMD has scary things to say about the PC market
"For the first time since 2001, client PC shipments have declined sequentially for three consecutive quarters-and have been below historical averages for the last seven quarters,"


Who wants to be in the PC business? Not Dell
Now this week, Michael Dell, founder and CEO of Dell, said during a conference sponsored by Fortune that the "new Dell" really isn't in the PC business anymore.


Rulings hold banks responsible for cyber-attacks on SMBs
Two recent court rulings are giving those business owners new hope that banks which don't cater to their specific security needs may be held liable for funds stolen by hackers who increasingly have focused on attacking small businesses.


Why you shouldn't train employees for security awareness
 If employees and/or executives at RSA, Google, eBay, Adobe, Facebook, Oak Ridge National Laboratory and other technologically sophisticated organizations can be phished, doesn't that suggest that even knowledgeable and trained people still fall victim to attacks?

Create a Validating Corporate Culture
Wouldn’t it be great to have an authentically “friendly” work place? Does your organizational culture provide a courteous, safe, inspiring environment where people thrive, where work gets done, customers are wow’ed daily, and stakeholders are equally thrilled?


Honda enters connected car race (with some help from smartphones)
Honda ... to unveil an in-car connected infotainment system. Called HondaLink, the platform uses Harman’s Aha technology to connect to reams of different content sources, ranging from Facebook newsfeeds to audiobook libraries and Internet radio, all of which drivers can activate through a touch of a button or voice command.


CIOs won't exist in five years: study
Let's face it: CFOs have been gunning for the CIO and IT for decades. Famous for their inability to demonstrate a positive impact on the bottom line, IT giving CFOs headaches


Adding Post-commit Hook to SVN Source Control
Tortoise SVN is a free source control tool that is used by many. One of the things I find missing is email notifications on check-in or commit (as it is called in SVN). Here, I try to share how we can send email notifications on commit. The code presented in this article sends an automated email to predefined list of people with details about files that were checked-in/committed.



Quote for the day:

"The best job goes to the person who can get it done without passing the buck or coming back with excuses." - Napoleon Hill