Showing posts with label study. Show all posts
Showing posts with label study. Show all posts

April 06, 2016

How secure is your boardroom data?

So cyber security is not just a concern for the CIO and their team – it’s something that everyone at board level needs to be aware of. In its 2015 whitepaper, ‘10 Steps: A Board Level Responsibility’, the UK government warned that security was now a board level responsibility, and offered help for senior executives on how to keep sensitive data safe. This has to include both an increased level of awareness around cyber security – knowing the company’s cyber security policies, ensuring they are functioning and are being enforced as intended, and having an awareness of the type of risks that the company may face.This requires a link from IT to the board to make sure these knowledge gaps are filled, and that board members are kept up to date with latest threats. Perhaps there is a role for a sub-committee that focuses only on the analysis of cyber threats and reports back to the board.


Build Your Own Offshore Development Team - or Not?

There is an historical “garbage in, garbage out” approach to leveraging overseas dev/test talent and cost savings. We throw something to essentially a coding factory on another continent and wonder why it doesn’t come back looking like it was tailor-made. Or we think we’ve secured the services of a hotshot overseas coder and wonder why he leaves us for Microsoft and a work visa six months later. I’ve been on both sides of the outsourced development puzzle—client side and vendor side. Some may be in the unique position to create their own offshore center due to business connections, existing infrastructure, unique cultural background, or a combination of all three. But this is not typical or practical for most of us and here’s why:


How to do data-driven marketing right

Enterprises today accumulate a lot of data, which they typically use internally for CRM, sales forecasting, and marketing strategies, among other things. But some savvy companies, particularly those in the technology industry, share this data with the media and the world at large. The benefits of data-driven content marketing can be considerable. Here's how some companies leverage their own data for marketing, brand awareness, and thought leadership, along with tips and best practices for success.


How to Prepare for a DDoS Attack

Visibility is critical when preparing for issues in your network. SNMP graphing platforms will tell you an extraordinary amount of information on volumetric attacks. You’ll be able to see and (depending on the platform) sometimes even alert on anomalous bandwidth events. You’ll be able to track at which port it entered your network, if it’s saturating any links, and even where the attack is headed. It’s surprising how many companies I’ve worked with over the years that do not deploy this because it’s such an easy and basic thing to implement. Primarily, you need devices that can speak SNMP, such as managed switches, routers, etc., and then you need a platform to query them.


Study: Interest in location intelligence technology nascent but rising

Interest in location intelligence is dependent on the industry. “If you’re doing things like sales operational planning, you have to use location intelligence to do that. Otherwise, you’re not going to understand how to allocate resources appropriately,” he said. Indeed, when broken down by industry, the survey reveals that retail has the highest interest in location intelligence with 65% of those representing the industry indicating that location intelligence is either critically important or very important to their company. Only 40% of survey takers from health care and 35% of survey takers from education said the same. Yet Dresner predicts location intelligence will rise in importance across all industries eventually. One driver is Internet of Things (IoT), he said, pointing to the growing network of Wi-Fi enabled physical objects such as Fitbits and connected vehicles.


Next-Generation Databases Shift IT Priorities

IT professionals do not want their next-generation database solution to require a "media-heavy server architecture," Thakur pointed out. "They want native formats on secure storage." They want a scalable system that can handle ever-increasing data loads, Thakur added. They want resiliency. "Given this highly distributed world, a node could go up or down fairly quickly. Customers want backup infrastructure that is highly available," Thakur said, which is preferable to doing the backup all over again should a node ever quit. But there is a trade-off. IT professionals can either have eventual data consistency on the next-generation platform, or strong consistency, which is the hallmark of the relational database, Thakur explained. "If you want scalability, you have to give up something," he said. IT professionals will give up strong consistency to gain the benefits of scalability that big data has to offer, he added.


Technology, IoT monetization to usher in 'programmable economy'

Over the next few years, Furlonger predicted, there will be a transition to an economic model that will better support organizations' move to digital business. IoT will play a key role in this transition. "The Things will start to act as proxies for us. You see that with things like virtual personal assistants, virtual customer assistants, different algorithms for robots … making decisions on our behalf in the transactional supply chain. That's just the beginning," he said. Furlonger said robotic services -- including those attached to IoT -- will become increasingly autonomous. "There's no reason -- because everything is connected to the Internet -- why they can't access your bank account, why they can't pay tax, why they can't transfer money. It's just another Internet-based connection, and then they become part and parcel of this new economic environment," he said.


The 'IoT' Is Changing the Way We Look at the Global Product Value Chain

The traditional product value chain has been shaken up with the unstoppable spread of globalization and the universal commodification of goods and services. Globalization has forced companies to adjust and respond. In fact, Internet of Things (IoT) products are playing a pivotal role in the alteration of B2C relationships, delivery channels and product pricing, and their continued proliferation is shaping the very nature of how we look at the product value chain. The "Internet of things" refers to objects that can communicate among one other through a network. IoT is becoming prolific and commonplace in everyday objects. And, with experts predicting that the IoT network will consist of some 50 billion devices by 2020, those devices will only become more and more ubiquitous. The IoT revolution is truly just beginning, and it will most certainly will be televised!


Test Management Revisited

While test management is largely irrelevant in this world, there is still a desperate need for test leadership. Why is this? The main reason is that as organisations struggle to become more innovative to respond quickly to market changes, engineering has responded by turning to continuous deployment and cross-functional teams to help meet demand. How testing fits into this picture is proving to be an Achilles heel for many organisations, which struggle to solve the challenge of how to making testing relevant and faster, yet uphold the quality they need to develop trust with their customer base. The truth is, agile or not, most organisations adopt a testing approach constructed not long after the computer came into being—despite the enormous technological advances made in the last 70 years.


Why Banks Should Go Easy On The Blockchain

The banks are certainly getting schooled on the technology, with most of the world’s top FIs participating in some type of blockchain development scheme, if not investing on their own internal programs to explore the tool. FinTech innovators were the first to forge a path that could bring blockchain into the real world, but it wasn’t until financial institutions began investing and taking interest in the sector that it began to be taken seriously. It may not seem fair, but Lawlor said it was necessary. “Any time we’re dealing with people’s money, there’s a need for the legitimacy of a financial institution that’s been around for potentially hundreds of years,” he noted. “They also have the regulatory and compliance structures already in place.”



Quote for the day:


"Don't expect to build up the weak by pulling down the strong." -- Calvin Coolidge


July 20, 2014

Being a Good Enterprise Architecture Citizen
One of the big problem I see with most enterprise level tools is they want to do everything. Most large enterprises would already have a financing system, organization directory, customer relationship management, document management, messaging, business process, calendaring and user authentication systems in place already. Yet, quite a few enterprise tools I have seen have their own data store for finance, organization directory, customer relationship management, document management, messaging, business process, calendaring and user authentication.


Fujitsu designs leaner supercomputer with fewer switches
Fujitsu has developed an approach to cluster supercomputers that reduces the number of network switches by 40% without sacrificing performance. The approach centers on using a new communications algorithm that efficiently controls data transmissions as well as deploying a multilayer full-mesh topology in the arrangement of the network. Compared to a three-layer "fat-tree" network topology, which employs a tree-like structure of connections, the multilayer full-mesh topology eliminates a layer of switches through more efficient mapping.


A Checklist for Architecture & Design Review
One of the key aspects of the IT Governance is to ensure that the investments made in software assets are optimal and there is a quantifiable return on such investments. This also means that such investment does not lead to risks that could lead to damages. Most of us are well aware that reviews play a key role in ensuring the quality of the software assets. As such, in this blog post, I have tried to come up with a checklist for reviewing the architecture and design of a software application. While the choice of specific design best practice is interdependent on another, a careful tradeoff is necessary. For a detailed discussion on Trade off Analysis of Software Quality Attributes.


How Data and Analytics Can Help the Developing World
First, data can be used to keep people healthy. With the help of IBM, the city of Tshwane, South Africa piloted a crowdsourced app known as WaterWatchers that lets users report water supply information, such as faulty pipes, through SMS. As a result, IBM found that the city was losing almost $30 million in wasted water annually. A similar effort by Cipesa, a Kampala-based communications technology non-profit, allows journalists and citizens to monitor and document health services delivery in Northern Uganda with a mobile app, in order to identify discrepancies in official reports and drive infrastructure improvement efforts


Can You Trust Your Algorithms?
A lot depends on the data, including when it was measured, by whom, and with what accuracy. “It also depends on the algorithms you use to mine the data,” he says. “Yes of course we can get patterns and yes of course there are many case studies where the patterns really buy you something. But optimizing and calibrating these models to certain situations is, for the foreseeable future, going to be the central component. Without algorithmic differentiation, it’s going to be a major pain.” Failure to abide by the laws of mathematics could doom some big data projects being susceptible to the dreaded random factor.


Google Smart Contact Lens Focuses On Healthcare Billions
Today, under a new development and licensing deal between Google and the Alcon eyewear division at Novartis, the two companies said they will create a smart contact lens that contains a low power microchip and an almost invisible, hair-thin electronic circuit. The lens can measure diabetics’ blood sugar levels directly from tear fluid on the surface of the eyeball. The system sends data to a mobile device to keep the individual informed. Google co-founder Sergey Brin said the company wanted to use “the latest technology in ‘minituarisation’ of electronics” in order to improve people’s “quality of life”.


Home router security to be tested in upcoming hacking contest
Researchers are gearing up to hack an array of different home routers during a contest next month at the Defcon 22 security conference. The contest is called SOHOpelessly Broken—a nod to the small office/home office space targeted by the products—and follows a growing number of large scale attacks this year against routers and other home embedded systems. The competition is organized by security consultancy firm Independent Security Evaluators and advocacy group the Electronic Frontier Foundation (EFF), and will have two separate challenges.


Apple-IBM deal threatens Android's enterprise push
The analyst firm said IBM's Endpoint Manager software "excels in patch management, multiplatform support and overall scalability" and called the software a "good choice for organizations heavily focused on security configuration management, including patching and those that require strong multiplatform server management in addition to client management or scalability to support tens of thousands of endpoints." But Gartner said in the May report that the IBM software is "not as good a choice" for those organizations that require simple usability, a failing which seems to beg for the kind of help that Apple may provide. Gartner also faulted IBM for complexity in its packaging, bundling and pricing of its various management software functions.


A Large-Scale Empirical Study on Software Reuse in Mobile Apps
The fact that software reuse, in the form of inheritance, class, and library reuse, is prevalent in mobile apps of the Google Play app store, means that app developers reap all the typical reuse benefits, such as improved productivity, higher-quality software and faster time to market, although many didn’t receive a formal training in software engineering. It isn’t clear whether this successful reuse is due to the quality of mobile platforms, development tools, app stores, or a combination of other factors. Possible other factors could be the relatively small size of the mobile app code base and development teams, although in recent work, we’ve found that for these characteristics, mobile apps behave identically to small Unix utility applications


A Few BGP Security Considerations
BGP uses TCP for transport which makes it vulnerable to TCP based attacks. The example used in the book is the TCP reset attack, and it involves sending a spoofed a packet with the TCP reset bit set. If such a packet is received, the TCP session is immediately terminated. For this attack to be successful, the packet must have src/dst IP addresses and src/dest TCP ports that match what the BGP speaker expects to receive from its neighbour. Since it’s BGP, it’s known to the attacker that either source or destination port is 179 (depending on who is client/server in the particular session), with the other port being a randomly generated number. Armed with this knowledge, the attacker sends a series of packets with varying port numbers, eventually sending just the right one, resetting the session between the two BGP speakers.



Quote for the day:

"Your chances of success in any undertaking can always be measured by your belief in yourself." -- Robert Collier

October 03, 2013

What makes models interesting
George Box said that so much better than I would have. While he was referring to science and statistics, his advice applies to Enterprise Architecture rather well. What it means is this: if you have two models, both that capture the USEFUL elements needed to describe something, and one is simpler than the other, go simple. In other words, I don’t care what is “correct.” I care what is useful.


Depth-Sensing Cameras Head to Mobile Devices
The first mobile depth-sensing technology to hit the market is likely to be the Structure Sensor, an accessory for Apple’s iPad that gives the device capabilities similar to those of Microsoft’s Kinect gaming controller. Occipital, the San Francisco company behind the device, says it will start shipping its product in February 2014. A Kickstarter campaign for the device has raised almost $750,000, with more than a month to run.


Cloud Service Brokerage Expands in Canada with ComputeNext and CACloud.com Partnership
Cloud consumers can now use CA Cloud IaaS through the ComputeNext cloud brokerage platform for discovery and procurement and provisioning of cloud services such as servers, storage, and on-demand software. IT professionals looking for cloud servers and storage will now have access to IaaS locations in Canada that are geographically separated with options for West Coast and East Coast Canadian cloud servers that provide low-latency and performance solidified with a coast-to-coast network backbone.


New Red Hat Enterprise Linux licensing plan designed to unify cloud, physical environments
Socket pairs and virtual nodes are now treated as interchangeable under Red Hat’s Enterprise Linux Server license, allowing for various combinations of physical servers and virtualized machines. RHEL for Virtual Data Centers also got an update, with a purely per-socket option allowing for an unlimited number of VMs on Hyper-V, VMware, or Red Hat’s own Enterprise Virtualization.


How to Manage Big Data with a Data Governance Policy
Big data, when used wisely, can deliver tremendous value to organizations. The importance of data governance in this equation is gaining visibility. A recent report from the Institute for Health Technology Transformation, for example, indicated that a standardized format for data governance is essential for healthcare organizations to leverage the power of big data. The authors indicate that the first and most critical priority is to develop a carefully structured framework for enterprise data governance.


Building A Collaborative Culture
Companies should assess and qualify collaboration opportunities just as they qualify sales leads to decide whether a particular collaboration effort makes sense. Reducing the costs of collaboration improves the chance that a collaboration initiative will have a positive ROI.However, companies can improve their odds even further by following five guidelines for successful collaboration


CA global IT study reveals DevOps driving 20% faster time-to-market for new services
"In today's world of mobile apps and online consumer reviews, companies are under enormous pressure to deliver higher quality applications faster than ever before," says Jaco Greyling, CA Southern Africa, manager, service assurance & application delivery. "Companies which have been around for more than 20-30 years face big challenges as they have legacy systems. Those who are willing to undergo internal transformation can win the competition in fast-changing markets."


Mobile Business Application Testing: Challenges and Strategy
This unlikeness in mobile computing environments presents unique challenges in developing applications, quality assurance, and maintenance, requiring unique testing strategies. Which need to cover different types of testing such as functional, , Performance, network, compatibility, usability, installation & field testing. To address this, we have a range of options of tools and automation processes best suited to testing both mobile web and native mobile apps that can reduce complexity and time to market.


Graphene Could Make Data Centers and Supercomputers More Efficient
Graphene has a number of potential advantages over germanium, says Englund. Because of its exceptional electronic properties, devices made of the material can work at very high frequencies, and could in principle handle more information per second. Also, graphene can absorb a broader range of wavelengths than germanium can. That property could be exploited to transmit more data streams simultaneously in the same beam of light.


Creating a Culture of Learning and Innovation
A culture of continuous learning is vital to an organization that strives to be innovative. Knowledge is the foundation for new ideas, and the learning that produces knowledge is what keeps brains malleable to create innovative and disruptive solutions. So why build a culture of continuous learning in the workplace?



Quote for the day:

"When change programs fail it is because the attempt was non-systemic. Change in performance requires a change to the system." -- John Seddon

July 20, 2012

Leading yourself into Humility
What you think about what you know matters more than what you know. With that in mind it may be risky to give you more knowledge about humility. Hopefully you’ll add doing to knowing.


AMD has scary things to say about the PC market
"For the first time since 2001, client PC shipments have declined sequentially for three consecutive quarters-and have been below historical averages for the last seven quarters,"


Who wants to be in the PC business? Not Dell
Now this week, Michael Dell, founder and CEO of Dell, said during a conference sponsored by Fortune that the "new Dell" really isn't in the PC business anymore.


Rulings hold banks responsible for cyber-attacks on SMBs
Two recent court rulings are giving those business owners new hope that banks which don't cater to their specific security needs may be held liable for funds stolen by hackers who increasingly have focused on attacking small businesses.


Why you shouldn't train employees for security awareness
 If employees and/or executives at RSA, Google, eBay, Adobe, Facebook, Oak Ridge National Laboratory and other technologically sophisticated organizations can be phished, doesn't that suggest that even knowledgeable and trained people still fall victim to attacks?

Create a Validating Corporate Culture
Wouldn’t it be great to have an authentically “friendly” work place? Does your organizational culture provide a courteous, safe, inspiring environment where people thrive, where work gets done, customers are wow’ed daily, and stakeholders are equally thrilled?


Honda enters connected car race (with some help from smartphones)
Honda ... to unveil an in-car connected infotainment system. Called HondaLink, the platform uses Harman’s Aha technology to connect to reams of different content sources, ranging from Facebook newsfeeds to audiobook libraries and Internet radio, all of which drivers can activate through a touch of a button or voice command.


CIOs won't exist in five years: study
Let's face it: CFOs have been gunning for the CIO and IT for decades. Famous for their inability to demonstrate a positive impact on the bottom line, IT giving CFOs headaches


Adding Post-commit Hook to SVN Source Control
Tortoise SVN is a free source control tool that is used by many. One of the things I find missing is email notifications on check-in or commit (as it is called in SVN). Here, I try to share how we can send email notifications on commit. The code presented in this article sends an automated email to predefined list of people with details about files that were checked-in/committed.



Quote for the day:

"The best job goes to the person who can get it done without passing the buck or coming back with excuses." - Napoleon Hill