Showing posts with label wallet. Show all posts
Showing posts with label wallet. Show all posts

Daily Tech Digest - February 12, 2025


Quote for the day:

“If you don’t have a competitive advantage, don’t compete.” -- Jack Welch


Security Is Blocking AI Adoption: Is BYOC the Answer?

Enterprises face unique hurdles in adopting AI at scale. Sensitive data must remain within secure, controlled environments, avoiding public networks or shared infrastructures. Traditional SaaS models often fail to meet these stringent data sovereignty and compliance demands. Beyond this, organizations require granular control, comprehensive auditing and full transparency to trace every AI decision and data access. This ensures vendors cannot interact with sensitive data without explicit approval and documentation. These unmet needs create a significant gap, preventing regulated industries from deploying AI solutions while maintaining compliance and security. ... The concept of Bring Your Own Cloud (BYOC) isn’t new. It emerged as a middle ground between traditional SaaS and on-premises deployments, promising to combine the best of both worlds: the convenience of managed services with the control and security of on-premises infrastructure. However, its history in the industry has been marked by both successes and cautionary tales. Early BYOC implementations often failed to live up to their promises. Some vendors merely deployed their software into customer cloud accounts without proper architectural planning, resulting in what was essentially remotely managed on-premises environments. 


The Importance of Continuing Education in Data and Tech

Continuing education plays a vital role in workforce development and career advancement within the tech industries, where rapid technological advancements and evolving market demands necessitate a culture of lifelong learning. As businesses increasingly rely on sophisticated data analytics, artificial intelligence (AI), and cloud technologies, professionals in these fields must continuously update their skills to remain competitive. Continuing education offers a pathway for individuals to acquire new capabilities, adapt to emerging technologies, and gain proficiency in specialized areas that are in high demand. By engaging in ongoing learning opportunities, tech professionals can enhance their expertise, making them more valuable to their current employers and more attractive to potential future ones. ... Professional certifications and competency-based education have become significant avenues for career advancement in the data and tech field. As the landscape of technology rapidly evolves, organizations increasingly seek professionals who possess validated skills and up-to-date knowledge. Professional certifications serve as tangible proof of one’s expertise in specific areas such as data governance, analytics, cybersecurity, or cloud computing. These certifications, offered by leading industry bodies and tech companies, are designed to align with current industry standards and demands.


Agents, shadow AI and AI factories: Making sense of it all in 2025

“Agentic AI” promises “digital agents” that learn from us, and can perceive, reason problems out in multiple steps and then make autonomous decisions on our behalf. They can solve multilayered questions that require them to interact with many other agents, formulate answers and take actions. Consider forecasting agents in the supply chain predicting customer needs by engaging customer service agents, and then proactively adjusting warehouse stock by engaging inventory agents. Every knowledge worker will find themselves gaining these superhuman capabilities backed by a team of domain-specific task agent workers helping them tackle large complex jobs with less expended effort. ... However, the proliferation of generative, and soon agentic AI, presents a growing problem for IT teams. Maybe you’re familiar with “shadow IT,” where individual departments or users procure their own resources, without IT knowing. In today’s world we have “shadow AI,” and it’s hitting businesses on two fronts. ... Today’s enterprises create value through insights and answers driven by intelligence, setting them apart from their competitors. Just as past industrial revolutions transformed industries — think about steam, electricity, internet and later computer software — the age of AI heralds a new era where the production of intelligence is the core engine of every business. 


Is VMware really becoming the new mainframe?

“CIOs can start to unwind their dependence on VMware,” he says. “But they need to know it may not have any material reduction in their spend with Broadcom over multiple renewals. They’re going to have to get completely off Broadcom.” Still, Warrilow recommends that CIOs running VMware consider alternatives over the long term. They should also look for exit strategies for other market-dominant IT products they use, given that Broadcom has seen early success with VMware, he says. “The cautionary tale for CIOs is that this is just the beginning,” he says. “Every tech investment firm is going to be saying, ‘I want what Broadcom has with their share price.’  ... “The comparison works a bit, maybe from a stickiness perspective, because customers have built their applications and workload using virtualization technology on VMware,” he says. “When they have to do a mass refactoring of applications, it’s very, very hard.” But the analogy has its limitations because many users think of mainframes as a legacy technology, while VMware’s cloud-based products address future challenges, he adds. “The cloud is the future for running your AI workload,” Shenoy says. “Customers have trusted us for the last 20 to 25 years to run their business-critical applications, and the interesting part right now is we are seeing a lot of growth of these AI workloads and container workloads running on VMware.”


Deep Learning – a Necessity

It is essential in architecture that we realize that a skill set is not an arbitrary thing. It isn’t learn one skill and you are done. It also isn’t learn any skill from any background and you’re in. It is the application of all of the identified and necessary skills combined that makes a distinguished architect. It is also important to understand the purpose and context of mastery. Working in a startup is very different from working in a large corporation. Industry can change things significantly as well. Always remember that the profession’s purpose has to be paramount in the learning. For example, both doctors and lawyers have to deal with clients and need human interaction skills to be successful. Yet, the nature and implementation of these differ drastically. We will explore this point in a further article. However, do not underestimate the impact of changing the meaning of the profession while claiming similar skills. The current environment is rife with this kind of co-opting of the terminology and tools to alter the whole purpose of architecture fundamentally. ... In medicine and other professions, an individual studies and practices for 7+ years to become fully independent, and they never stop learning. This learning is tracked by both mentors and the profession. Because medicine is so essential to humans it is important that professionals are measured and constantly update and hone their competencies.


Crawl, then walk, before you run with AI agents, experts recommend

The best bet for percolating AI agents throughout the organization is to keep things as simple as possible. "Companies and employees that have already found ways to operationalize intelligent agents for simple tasks are best placed to exploit the next wave with agentic AI," said Benjamin Lee, professor of computer and information science at the University of Pennsylvania. "These employees would already be engaging generative AI for simple tasks and they would be manually breaking complex tasks into simpler tasks for the AI. Such employees would already be seeing productivity gains from using generative AI for these simple tasks." Rowan agreed that enterprises should adopt a crawl, walk, run approach: "Begin with a pilot program to explore the potential of multiagent systems in a controlled, measurable environment." "Most people say AI is at the toddler stage, whereas agentic AI is like a tween," said Ben Sapp, global practice lead of intelligence at Digital.ai. "It's functional and knows how to execute certain functions." Enterprises and their technology teams "should socialize the use of generative AI for simple tasks within their organizations," Lee continued. "They should have strategies for breaking complex tasks into simpler ones so that, when intelligent agents become a reality, the sources of productivity gains are transparent, easily understood, and trusted."


Growth of digital wallet use shaking up payment regulations and benefits delivery

Australian banks are calling on the government to pass legislation that accommodates payments with digital wallets within the country’s regulatory framework. A release from the Australian Banking Association (ABA) argues that with the country’s residents making $20 billion worth of payments across 500 million transactions each month with mobile wallets, all players within the payment ecosystem should be under the remit of the Reserve Bank of Australia. ... Digital wallets are by far the most popular method of making cross-border payments, according to a new report from Payments Cards & Mobile. The How Digital Wallets Are Transforming Cross-Border Transactions report shows digital wallets are chosen for international transactions by 42.1 percent. That makes them more people than the next two most popular methods, money transfer services (16.8 percent) and bank accounts (14.8 percent) combined. Transactions with digital wallets are much faster than wire transfers, are available to people who don’t possess bank accounts, and have lower fees than bank transfers, the report says. Interoperability remains a challenge, and regulations and infrastructure limitations could pose barriers to adoption, but the report authors only expect the dominance of digital wallets to increase in the years ahead.


My vision is to create a digital twin of our entire operations, from design and manufacturing to products and customers

We approach this transformation from three dimensions. First is empathy – truly understanding not just who our customers are, but their emotions. This is where the concept of creating a ‘digital twin’ of the customer comes in. Second is innovation – not just adopting new technologies but ensuring that our processes are lean, digitised, and seamless throughout the customer journey, from research to purchase, service, and brand loyalty. The goal is to provide a consistent and empathetic experience across all touchpoints.  ... The first challenge is identifying our customers. For example, if a distributor in one business also buys from another or if a consumer connects with one of our industrial projects, it’s hard to track. To address this, we launched a customer UID project, which has been in progress for months. It helps us identify customers across channels while keeping an eye on privacy and adhering to upcoming data protection regulations. The second part involves gathering all customer-related data in one place. Over the past three years, we unified all customer interactions into a single platform with a one CRM strategy, which was complex but essential. Now, with AI solutions like social listening combined with sentiment analysis, we can understand what our customers are saying about us and where we need to improve, both in India and globally. 


Will AI Chip Supply Dry Up and Turn Your Project Into a Costly Monster?

CIOs and other IT leaders face tremendous pressure to quickly develop GenAI strategies in the face of a potential supply shortage. With the cost of individual units, spending can easily reach into the multi-million-dollar range. But it wouldn’t be the first time companies have dealt with semiconductor shortages. During the COVID-19 pandemic, a spike in PC demand for remote work met with global shipping disruptions to create a chip drought that impacted everything from refrigerators to automobiles and PCs. “One thing we learned was the importance of supply chain resiliency, not being overly dependent on any one supplier and understanding what your alternatives are,” Hoecker says. “When we work with clients to make sure they have a more resilient supply chain, we consider a few things … One is making sure they rethink how much inventory do they want to keep for their most critical components so they can survive any potential shocks.” She adds, “Another is geographic resiliency, or understanding where your components come from and do you feel like you’re overly exposed to any one supplier or any one geography.” Nvidia’s GPUs, she notes, are harder to find alternatives for -- but other chips do have alternatives. “There are other places where you can dual-source or find more resiliency in your marketplace.”


WTF? Why the cybersecurity sector is overrun with acronyms

Imagine an organization is in the midst of a massive hack or security breach, and employees or clients are having to Google frantically to translate company emails, memos or crisis plans, slowing down the response. When these acronyms inevitably migrate into a cybersecurity company’s external marketing or communications efforts, they’re almost guaranteed to cause the general public to tune out news about issues and innovations that could have a far-reaching impact on how people live their lives and conduct their businesses. This is especially true as artificial intelligence (AI!) and machine learning (ML!) technologies expand and new acronyms emerge to keep pace with developments. Acronyms can also have unfortunate real-life connotations — point of sale, to name just one example. When shortened to POS, it can suggest something is… well, crappy. ... So, what’s behind the tendency to shorten terms to a jumble of often incomprehensible acronyms and abbreviations? “On the one hand, acronyms, abbreviations and jargon are used to achieve brevity, standardization and efficiency in communication, so if a profession is steeped in complex and technical language, it will likely be flowing with acronyms,” says Ian P. McCarthy, a professor of innovation and operations management at Simon Fraser University in Burnaby, British Columbia.

April 28, 2016

Vulnerability in Java Reflection Library Still Present after 30 Months

The ability to load classes dynamically at runtime using custom ClassLoaders has created the opportunity for a number of applications that wouldn’t be possible otherwise, but unfortunately it has also created a number of security concerns, particularly around class impersonation. A developer could, in theory, create a custom ClassLoader that loads a compromising implementation of the primordial class java.lang.Object, and use this custom Object in a Java application. ... When the issue resurfaced in March 2016, the latest available version at the time, 8u74, proved to be vulnerable. Since then, Oracle has released three updates for Java, namelt 8u77, 8u91and 8u92. However, judging by their release notes, none of those seems to have addressed the problem. 


Docker on Windows Server 2016 Technical Preview

To build and run your first Windows container, get Windows Server 2016 TP5 running, begin writing Dockerfiles for Windows, share images on Docker Hub and don’t hesitate to reach out with questions or feedback on the Docker Forums. ... Docker and Microsoft have come a long way since the 2014 partnership announcement of the Windows Server port of Docker engine, through the first publicly available version, up to today’s release. This journey also sawJohn Howard from Microsoft join the ranks of core Docker maintainers. We’re proud of the progress we’ve made to empower developers and ops teams using Windows with Docker’s proven tools and APIs for building, shipping and running containers and that we can help bring together the Windows and Linux communities with a common toolset for shipping software.


Paying ransomware is what ills some hospitals

Data backups are the key to surviving ransomware attacks. But some hospitals and physician practices don’t back up their data at all. This lack of security awareness puzzles McMillan. “It’s possible is that security is still not seen as a critical business function” in those organizations, he suggests.  Even if a hospital or a physician group does back up its data, it might do so only on a nightly basis. So, if a ransomware attack occurs and the organization uses its data backup to continue operations, the database will be missing everything that has been entered into the system since the previous evening, notes Gibson. That’s much better than nothing, but it will still send clinicians scrambling.  Many hospitals do near-real-time backups of data on mirrored servers. In case one server goes down, the other can take up the slack.


Technologically Constrained Banks Face A Challenge From Agile Fintech Firms

“Banks still struggle with legacy systems and with their culture.” One European bank partnered with a fintech firm on a project. Eighteen days later the technologists had a app and a proof of concept, while the bank was still struggling with deciding who should be in the room to meet with them. Interviews with bank CXOs revealed some startling contrasts with some large banks realizing the need for change while some regionals and super-regionals don’t think fintech innovations will impact them. “Banks are underestimating the value fintech firms provide in delivering a good experience and efficient service, as well as their potential influence on all areas of banking,” the report said. “From the customers’ perspective, fintech firms have value in being easy to use (81.9 percent), offering faster service (81.4 percent), and providing a good experience (79.6 percent).


Man jailed for failing to decrypt hard drives

"His confinement stems from an assertion of his Fifth Amendment privilege against self-incrimination," wrote the man's lawyer, Keith Donoghue. The US Constitution's Fifth Amendment is designed to protect people from being forced to testify and potentially incriminating themselves and states: "No person shall be... compelled in any criminal case to be a witness against himself." The Electronic Frontier Foundation, which campaigns for digital rights, said: "Compelled decryption is inherently testimonial because it compels a suspect to use the contents of their mind to translate unintelligible evidence into a form that can be used against them." The man's appeal also contends that he should not be forced to decrypt the hard drives because the investigators do not know for certain whether indecent images are stored on them.


Singapore Is Taking the ‘Smart City’ to a Whole New Level

“Singapore is doing it at a level of integration and scale that no one else has done yet,” says Guy Perry, an executive of the Los Angeles engineering design firm Aecom who studies “smart city” technologies. It helps in Singapore that government- or state-owned companies own or control many aspects of daily life, including public transport networks and housing. More than 80% of Singapore’s 5.5 million people live in government housing. And while Singapore is a democracy, it has always been dominated by a single party whose control of the system means it can move quickly. Leaders also see a chance to pioneer applications for export. The market for smart-city technology in Asia alone will reach US$1 trillion a year by 2025, according to IDC Government Insights, a unit of International Data Corp., the Framingham, Mass., research firm.


Why Won’t They Pair?

The organizational challenges continue from the physical equipment to how developers are rated for recognition, raises and promotions. If an organization stack ranks their employees, the chance of developers learning to pair effectively is severely hampered. In many cases, the developer wants to be seen as the super hero thereby raising their rank above their peers. Performance reviews are another blocker. Few companies recognize teamwork as a valued skill and instead look for the ‘super hero’ who can come in to save the day during a crisis. Further, organizations that consistently work in a tactical fire-fighting mode will struggle to see the value that comes from pairing where developers share knowledge of technical and domain expertise.


BIP 75 Simplifies Bitcoin Wallets for the Everyday User

One of the main downfalls of BIP 70 is that it doesn’t work well for P2P payments. While it gets the job done for transactions between a customer and a merchant, Bitcoin wallets are unable to receive payment requests when they’re offline. Store-and-forward servers can be used to forward new payment requests to wallets when they come online, but this setup creates new privacy and security concerns. BIP 75 is an attempt to solve this issue by encrypting all communication in the Payment Protocol end to end. “By adding encryption at the application layer we create secure private communications, even in the case where there is a store and forward server for mobile or desktop wallets,” Netki founder and CEO Justin Newton, who co-authored BIP 75, told Bitcoin Magazine.


Ransomware-as-a-service is exploding: Be ready to pay

It starts with a fast click on a link in a harmless-looking email. Then your PC slows to a crawl. A message suddenly pops up and takes over your screen. "Your files and hard drive have been locked by strong encryption. Pay us a fee in 12 hours, or we will delete everything." Then a bright red clock begins counting down. No antivirus will save your machine. Pay the fee or lose everything. You're the latest victim of a ransomware attack. The scary thing is, you're not alone. The ransomware market ballooned quickly, reported TechRepublic's Michael Kassner, from a $400,000 US annual haul in 2012, to nearly $18 million in 2015. The average ransom—the sweet spot of affordability for individuals and SMBs—is about $300 dollars, often paid in cash vouchers or Bitcoin.


Cyber Attacks on Small Businesses on the Rise

Almost half of cyber-attacks worldwide, 43%, last year were against small businesses with less than 250 workers, Symantec reports. The FBI reported last summer that more than 7,000 U.S. companies of all sizes were victims of cyber hacks via phishing email scams as of late 2013, the latest data available, with losses of more than $740 million.  The cyber crooks steal small business information to do things like rob bank accounts via wire transfers; steal customers’ personal identity information; file for fraudulent tax refunds; commit health insurance or Medicare fraud; or even steal intellectual property. The criminals can also hijack a small business’s website to cyberhack other small businesses. “There are probably 20 different ways a bad guy can get into a website” run by a small business, Scott Mann, CEO of Orlando-based Highforge Solutions, has said.



Quote for the day:


"A business of high principle attracts high-caliber people more easily, thereby gaining a basic competitive and profit edge."-- Marvin Bower


March 13, 2016

IT's Shift From Service Provider to Business Partner

IT is a business enabler, providing secure and highly available technology solutions that enhance the efficiency and effectiveness of TRS and our members. As such, it's my job to ensure IT is seen by our individual business areas as a true business partner, not just simply a service provider. IT needs to truly understand the business of TRS and be proactive in helping solve business problems and recommend innovations that move our business forward. ... The one thing that is certain in IT is it's going to change. Many times these technology changes have a significant impact on the rest of the business and/or provide an opportunity for improving efficiency. As such, the CIO often finds himself or herself in the position of change agent, promoting and leading enterprise projects that bring about significant shifts in the organization.


Amazon India planning to launch digital wallet

"Building own wallet helps it restrict access to customer data in the company's ecosystem and monetise customer insights," said another person familiar with Amazon India's plans. Amazon did not comment specifically on whether it plans to launch a digital wallet, only saying that it was "always exploring" acquisitions. "Payments are key to the e-commerce ecosystem," said Srinivas Rao, director at Amazon Payments India, in an emailed statement. "Developing a trusted, frictionless and ubiquitous payments ecosystem is critical to our customer-centric philosophy and we will invest in building the capabilities to drive our strategy." Currently, Amazon India uses its gift cards as pre-paid instruments for buying on its online marketplace, offering customers the option to top up these cards for up to Rs 10,000, which is the limit applicable to digital wallets under Indian regulations.


So You Think You Can Agile?

The interesting thing here is that everyone in the market—customers, communities, consultants, vendors and partners—wants the same outcome. Improving the way organisations work to ultimately enhance our way of life as a society: eliminating waste and responding to change quickly and confidently (well, at least that’s what my team and I want).So, one can only live hoping that’s why we're all here—to continue toward autonomy, mastery and purpose and in turn help enterprises do the same. We all want to embrace, educate and coach great outcomes for the people who work in these enterprises. Who doesn’t want to get up and be excited about the day of work ahead and help people improve their capabilities to ultimately create a better society?


Demand for security skills is ballooning: So can former hacker hotbed Romania help?

"Although companies are actively searching for security experts, many of these jobs aren't listed on the web," she says. HR professionals prefer to hire based on referrals. Many engineers are self-taught, building on top of the computer-science knowledge they acquired in school. Developer Gabriel Cirlig says cybersecurity was a hobby he had during high school. ... Cybrary co-founder Ryan Corey says Romanian users have a grasp of the basics but come to training providers to hone more advanced, niche security skills. "While US and UK users tend to take more beginner-level, general-interest courses such as Network+, CCNA and Linux+, Romanian users tend to take higher-level, more advanced security offerings like Malware Analysis and Advanced Penetration Testing," he says.


The Hidden Security Risks of Our IoT Devices

As IoT devices gather more and more data about us and our lives, we as consumers should be extremely concerned about these vulnerabilities. We may not think about it very much, but these IoT devices have collected a lot of information about our private lives. The refrigerator that orders your milk must have some sort of payment method set up with the grocer. Your thermostat knows when you are likely to be at home – and also when you are not. And your smart watch or wearable fitness tracker may have private information about your health and habits that you wouldn’t want anyone but your doctor to know. Last year, the Federal Trade Commission (FTC) released a report urging IoT manufacturers to put security first with these new technologies.


Why Are We Fighting the Crypto Wars Again?

Is it any wonder that the government is rebooting the crypto wars? For the first time, it’s really struggling with the results of the first war, as more information is now encrypted, increasingly in a manner the government finds really hard (or impossible) to decode. Apple has been impressively aggressive in its refusal to comply with that order, even though this test case involves possible information from a murderous terrorist. The company’s court filings outline with withering precision how complying with the government order — to essentially rewrite part of its operating system, an action it regards as an act of “compelled speech” — violates its rights and compromises the rights of its customers. With John Oliver-strength sarcasm, it refers to the software the FBI has ordered it to produce as “GovtOS.”


One API, Many Facades?

When developing an API that is going to be used by others, it’s important not to break that contract. Often, frameworks and tools allow you to generate an API definition from the codebase — for example, with an annotation-driven approach where you label your endpoints, query parameters, etc. with annotations. But sometimes, even if your own test cases still pass, the smallest code refactoring could very well break the contract. Your codebase might be fine, but the refactoring might have broken the code of your API consumers. To collaborate more effectively, consider going with an API-contract-first approach and make sure your implementation still conforms with the shared agreement: the API definition. There are different API definition languages available and popular these days, like Swagger, RAML, or API Blueprint. Pick one you’re comfortable with.


Big Data: Why You Must Consider Open Source

“There are multiple – and at this point in history, thoroughly validated – business benefits to using open source software.” Among those reasons, he says, are the lack of fees allowing customers to evaluate and test products and technologies at no expense, the enthusiasm of the global development community, the appeal of working in an open source environment to developers, and the freedom from “lock in”. This last one has one caveat, though, Kestelyn explains – “Be careful, though, of open source software that leaves you on an architectural island, with commercial support only available from a single vendor. This can make the principle moot.” The literal meaning of open source is that the raw source code behind the project is available for anyone to inspect, scrutinize and improve.


Web Application Firewall: a Must-Have Security Control or an Outdated Technology?

Gartner predicts that by 2020, more than 60 percent of public web applications will be protected by a WAF. However, in 2015 Gartner had only one vendor listed in its WAF MQ as a Leader (Imperva), and only two vendors listed as Visionaries. All other vendors are either Niche Players or Challengers. Many more WAF vendors were simply not present in the MQ for not meeting the inclusion criteria. Last year, security researcher Mazin Ahmed published a White Paper to demonstrate that XSS protection from almost all popular WAF vendors can be bypassed. XSSPosed prior to announcing its private and open Bug Bounty programs, published new XSS vulnerabilities on the largest websites almost every day and was effectively an insightful resource for observing just how security researchers bypassed almost every WAF mentioned in the Magic Quadrant.


Data Is a Toxic Asset

Our Internet search data reveals what's important to us, including our hopes, fears, desires and secrets. Communications data reveals who our intimates are, and what we talk about with them. I could go on. Our reading habits, or purchasing data, or data from sensors as diverse as cameras and fitness trackers: All of it can be intimate. Saving it is dangerous because many people want it. Of course companies want it; that's why they collect it in the first place. But governments want it, too. In the United States, the National Security Agency and FBI use secret deals, coercion, threats and legal compulsion to get at the data. ... When a company with personal data goes bankrupt, it's one of the assets that gets sold. Saving it is dangerous because it's hard for companies to secure. For a lot of reasons, computer and network security is very difficult. Attackers have an inherent advantage over defenders, and a sufficiently skilled, funded and motivated attacker will always get in.



Quote for the day:


"Informed intuition, rather than analytical reason, is the most trustworthy decision-making tool to use." -- G. Moore


May 29, 2014

Federal CIOs, Take Open Data To Next Level
As usual, authorities tout the benefits of improved transparency, accountability, and innovation as the rationale for increased data transparency. But government CIOs are also in a unique position to provide additional benefits from open data, as government data analysis reveals countless opportunities to improve quality of life. These opportunities often are overlooked because -- unless you are the CIO of an agency with oversight responsibilities, such as the Government Accountability Office or OMB -- you are typically considered a "data producer" rather than a "data consumer." In fact, most stories immediately presume that innovation stemming from open data will originate in the private sector.


8 Key Attributes of a Data Center Infrastructure Platform
many companies have no software to see and control what’s going on across the entire data center footprint – or worse, numerous, different, non-integrated applications that can’t give an overall picture of performance. So, to be blunt, your ability to reach and satisfy your customers, to grow your business, and therefore a major portion of your enterprise’s business value, rests on this chaos. Unless you fix this, you’re potentially another Borders waiting to get knocked off by someone who sees how to deliver value to customers with a cohesive, unified, and more powerful digital infrastructure.


DBS Bank launches mobile wallet
The bank had launched another mobile banking app, called mBanking, in 2011 but this also saw slow adoption despite its focus on making user experience "seamless and intuitive", it said. DBS then introduced new features including investment services and card activation. To date, there are more than 800,000 mBanking users in Singapore, DBS said.  ...   Louis Foo, the bank's senior vice president of consumer banking group e-business in Singapore, said in the statement: "Mobile payment is on an upward trajectory. While our customers have become increasingly tech-savvy, mobile wallets remain a new frontier in the Singapore's payment landscape.


Launch Of Release 4.6 Of Test Management Software Zephyr
Zephyr which offers free community edition for upto 10 users is now releasing major release with lots of new features. This comes after release of Zephyr for Jira, available on Atlassian marketplace. Let us dive into few of the new features and enhancement to existing features Zephyr is Test management software that manages every aspect of the testing cycle to ensure what was delivered against what was specified. This includes managing teams and resources, designing test strategies and implementing their execution, organizing and reusing testing assets and environments, defining quality standards and processes, collaborating with the entire team and communicating with internal and external stakeholders.


What managers do at a company that’s trying to replace them with software
The focus is on making sure that those discrete tasks actually get done, people are accountable, and that managers don’t have to search for who’s working on what. That intense focus on tasks means that progress on those tasks is what managers track, instead of hours or any other metric of productivity. “That’s the really critical data source: What are people working on? What do they need help on?” Rosenstein says. “People look at things like how many lines of code someone wrote, and that’s just BS. Those sort of metrics give you really skewed understanding of the people’s value. The data that doesn’t lie is what work the person is accomplishing each week.”


Principle #3 of Capacity Planning: Matching Supply to Demand
The third principle of capacity planning, matching demand to supply, emphasizes the importance of making choices. It’s necessary to match overall portfolio demand with capabilities and capacity supplied by existing teams in the near-term, while shaping both the demand and supply sides of the portfolio for the long-term. Matching demand and supply must look deeper than just allocating resources to include the interactions between multiple sources of demand and the capabilities of the available teams. The net result is more effective delivery of value, aligned to overall business strategy by more clearly focusing on completing those things that matter most to the business.


UAE National ID Program: Model Worth Watching
One challenge, however, continues to undermine the progress of most countries' e-government initiatives: That's the need for a reliable system to manage the digital identities and private information of citizens securely -- and the need for infrastructure to integrate various government databases on the back end so that individuals receive all, and only, the services to which they are entitled. That's why a national identity card project making headway in the United Arab Emirates, and the project's leader, Ali M. Al-Khouri, director general of the Emirates Identity Authority (EIDA), are both worth watching.


Decoding the language of Microsoft: What 'growth hacking' means to Redmond
One phrase that's going around is "growth hacking". Often seen as just a Silicon Valley way of talking about marketing, it's actually a technique for analysing products and marketing that's very close to the existing Microsoft data driven way of working. Instead of leaving marketing to marketers, growth hacking gives fast-moving product teams the opportunity to come up with a combined strategy that mixes product design with marketing; making hypotheses about feature uptake and marketing messages, and then testing them in the real world; quickly pulling back if they don't work. Measurement is key, and if you can't measure something, you can't manage it, so you can't try it out.


How can leaders get the most out of a professional business organization?
Some CEOs approach professional organizations as transactional marketplaces. Instead of thinking about what someone can do for you (or you for them) in the next month or year, brainstorm ways to interact and check up. From considering PEOs to hiring new employees, interacting over time as your businesses grow can be instrumental in learning from other CEOs. ... As a leader, you have to stay ahead of everyone in the organization in terms of your understanding of the market, visibility into future challenges and anticipation of future opportunities. Spend time looking to the future.


CISOs taking a leap of faith
Forewarned of her upcoming unemployment, Moskites went on the lookout for new opportunities, and decided to do something completely different. During a conversation with Jeff Hudson, CEO at certificate and encryption key security firm Venafi, she temperature-checked the idea of moving from being a security executive for an the enterprise--a role she had always played--to working on the vendor side of the business. "I know my role is going to get eliminated with the restructuring, and I'm very excited about the opportunity to possibly make a move to the vendor side," she said to Hudson.A "He kind of laughed at me," Moskites explained months after the fact. "And he then asked, 'Are you serious?'"



Quote for the day:

“It's not about how smart you are--it's about capturing minds.” -- Richie Norton

October 19, 2013

ODBC Rocks!
Both OLE DB and ODBC are true native APIs for SQL Server in that they map API calls directly into SQL Server’s network protocol, Tabular Data Stream (TDS). When Microsoft recommended best practices are followed, ODBC is a very thin wrapper over TDS with no intermediate buffering between network packet buffers and the application. It therefore has excellent performance and scalability characteristics.


Portability challenges for government agencies moving to hybrid clouds
A key report finding is that while overall cloud spending will accelerate, federal agencies in the near-term will continue to leverage different cloud types (private, hybrid, public) based on their specific agency needs and concerns. The leading category of government cloud service is private, but public clouds and hybrid clouds continue to gain traction. As a result, many federal agencies will be employing a multi-cloud architecture.


Graphics Chips Help Process Big Data Sets in Milliseconds
Known as MapD, or massively parallel database, the new technology achieves big speed gains by storing the data in the onboard memory of graphics processing units (GPUs) instead of in central processing units (CPUs), as is conventional. Using a single high-performance GPU card can make data processing up to 70 times faster.


IBM unveils computer fed by 'electronic blood'
But for IBM to truly match the marvels of the brain, there is a third evolutionary step it must achieve - simultaneous liquid fuelling and cooling. Just as blood gives sugar in one hand and takes heat with another, IBM is looking for a fluid that can multitask. Vanadium is the best performer in their current laboratory test system - a type of redox flow unit - similar to a simple battery. First a liquid - the electrolyte - is charged via electrodes, then pumped into the computer, where it discharges energy to the chip.


The Challenges of Cloud Security Deployments
The complexity of the security landscape doesn't make this easier. A quick glance at network security reveals a diverse array of often-siloed solutions, some software, some hardware. These solutions frequently add even more data to the pile of Big Data demanding analysis, and that's just if they integrate well into the cloud security architecture in the first place. In many cases, these solutions are simply confusing and problematic to deploy in cloud environments.


Cloud To Dominate Data Center Traffic Within The Year, Cisco Study Predicts
Approximately 17 percent of data center traffic will be fueled by end users accessing clouds for web surfing, video streaming, collaboration and connected devices. Another seven percent will be traffic generated between data centers, primarily driven by data replication and software/system updates. An additional 76 percent of data center traffic will stay within the data center and will be largely generated by storage, production and development data in a virtualized environment.


Watch out, PayPal: Amazon's following the money
"Login and Pay with Amazon," which allows you to pay on other Web sites using your Amazon account, builds upon the web retailer's earlier Amazon Payments effort from a few years ago. If Amazon can get third-party merchants to integrate its log-in feature into their checkouts, Amazon's payment system would technically have more users than PayPal.


Mobile middleware: Data movement and application design best practices
A critical question with your mobile middleware application framework is the exposure of APIs. If you expect to support browser access (which likely you should), the basic application must present a RESTful front end. It's also expected that most mobile device applications use RESTful APIs. If you also intend to use RESTful APIs, design all your applications for Representational State Transfer (REST). Doing so means you can't presume the application will maintain state. That will be important when you look at your application-to-resource


The Shift to I/O Optimization to Boost Virtualization Performance
While hardware price per performance costs continue to come down, performance improvements are not keeping up with the rate of data growth and the need to extract value from that data. This performance chasm forces enterprises to purchase ever-increasing amounts of hardware to handle the increased I/O. As IT buys more storage, not for capacity but to spread I/O demand across a greater number of interfaces, organizations cannot fully capitalize on the promise of virtualization and other important technology trends.


What Does Next-Generation MDM Look Like?
The MDM Institute's 12 strategic planning assumptions for 2013-14 present an experience-based view of the key trends and issues facing IT organizations by highlighting master data management, data governance and related areas Master data management is quickly broadening its attractiveness both as a key enabler of strategic business initiatives as well tactical P&L initiatives. As of 2013, MDM is no longer "fast follower" technology strategy but is clearly a business strategy for the masses.



Quote for the day:

“The day you realize that your efforts and rewards are not related, it really frees up your calendar.” -- Scott Adams

July 07, 2012


Direct Database Updates – A Cause of Concern
Many organizations still have the practice of directly updating the production databases to fix data integrity issues. This shows that the one or more applications deployed on top of the database are not reliable enough to maintain the database integrity.

One day your iPhone and wallet will be one.
For years, there have been whispers that Apple is working on its own approach to reinventing mobile payments, including the possibility of a NFC-equipped iPhone.

Google Compute Engine – Not AWS Killer (yet)
GCE is missing a lot of what larger enterprises will need – monitoring, security certifications, integration with IAM systems, SLAs, etc. GCI also lacks some of the things that really got people excited about EC2 early on – like an AMI community, even the AMI model so I can create one from my own server image.

An inconvenient truth: Respect me
Yet what I am hearing from these key employees, most between the ages of 30 and 40, is that they absolutely demand to be treated with respect, have their opinions listened to, and stand as a peer with their leaders.


Top 5 wireless routers: Home-networking evolved
It was clear from CES that 2012 is going to be a year of many changes in home networking. To help you keep up with these changes, here's our list of the Top 5 networking products currently available.

Cloud Computing in Health Care to Reach $5.4 Billion by 2017: Report
Although regulatory and security concerns have held back the health care industry from widespread adoption of public clouds, the overall cloud computing market in health care will grow to $5.4 billion by 2017, according to a report by research firm MarketsandMarkets.


Avoiding Downtime When Cloud Services Fail
Another AWS outage hit several large websites and their services last week. What can be done to avoid downtime? Architect for failover not just for scale

Best Practices For Managing Big Data
What most people don’t know is that the vast majority of Big Data is either duplicated data or synthesized data. ... Now they must manage a total of over a petabyte of data, of which less than 150 terabytes is unique.


Quote for the day
"If you put off everything till you're sure of it, you'll get nothing done." ~ Norman Vincent Peale