October 17, 2013

Pushing the Boundaries of In-Memory Performance
Challenging those assumptions, Microsoft engineered for dramatically changing latencies and throughput for so-called “hot” transactional tables in the database. Lock-free, row-versioning data structures and compiling T-SQL and queries into native code, combined with making the programming semantics consistent with SQL Server means our customers can apply the performance benefits of extreme transaction processing without application rewrites or the adoption of entirely new products.


SDN Adoption Puts DevOps Pros in High Demand
This push toward automation is a crucial element of SDN technology and one of the main reasons DevOps experience will be in high demand, says Shah. "The kind of expertise you'll look for is no longer a hard-core, specialized programmer who focuses on individual devices and pieces of the network, but someone who can write code or scripts to automate processes and actions," Shah says.


Hackers attack PR Newswire, get user data
PR Newswire, a company owned by marketing and communications services firm UBM, confirmed the breach Wednesday. "We recently learned that a database, which primarily houses access credentials and business contact information for some of our customers in Europe, the Middle East, Africa and India, was compromised," Ninan Chacko, PR Newswire's CEO, said in a blog post.


An iPad wish list for the enterprise
While new iPads would definitely focus on consumer features, Apple could also continue its efforts in the business and enterprise sectors with new features for business users and enterprise IT. With that thought in mind, here's my next generation iPad enterprise wish list. While some of these features are all but certain, there are some that are also a bit unlikely.


Does SSL decryption deserve a place in the enterprise data center?
While this practice might seem underhanded at first glance, there are valid reasons why SSL decryption has been implemented in numerous enterprise networks. The first reason pertains to protecting proprietary or sensitive information from being stolen from an enterprise network. However, a report by analyst and research firm NSS Labs Inc. states that the primary reason for implementing SSL decryption has to do with SSL-encrypted malware.


Oracle plugs critical security holes that are putting systems at risk
Out of 51 vulnerabilities patched in this Java security update, 40 affect only client deployments which include the frequently targeted Java Web browser plug-in and 8 affect both client and server deployments. These vulnerabilities can be exploited through Java Web Start applications or Java applets, and, in the case of flaws that also affect server deployments, by sending data to application program interfaces (APIs) in the vulnerable components.


Best practices for combatting integration problems
"When you go to IBM, you get an integrated IBM solution. When you go to HP, they lead with an HP solution. But when you say, 'I already have Dell servers, and I'd like to add HP storage,' that can become problematic, and that's where the integration challenge comes from," said Roger Channing, chief technology officer at MicroTech. "That's where customers are coming from. They don't want to buy bits and pieces and integrate it themselves. They want one belly button they can press to say, 'Here is the solution.' It's our job to make sure the integration is done correctly."


5 ‘Unsolved Problems’ That Have Now Been Solved and the Stories Behind Them
What connects being late to class, computer games, and being a recluse in your mum’s house? No, it’s not the latest Grand Theft Auto game. These are, in fact, the approaches to successfully solving some of the longest standing ‘unsolved problems’ – those which have puzzled the world’s brightest for centuries, until a new approach sparked a breakthrough. Each has its own interesting story behind it…


An API for Simple HTTP Requests
URLDownloadToCacheFile is one such API and comes courtesy of Internet Explorer. This function is ideally suited to console applications because it doesn't imply any particular threading model. It blocks while the file is downloaded and provides progress reporting using a callback. I'm going to show you how to use it to write a console application to download a given HTTP resource, present progress and download the file.


Snapping out of your leadership struggle
There are plenty of reasons for this struggle. It might mean that you’re unhappy in your job, frustrated with all of the things that are out of your control or that you’re lacking a skill set that will help you lead at your best. No matter the reason, there are some things you can do to ease the struggle, clearing your heart and your mind for making decisions and taking action that will send you on your way to greatness



Quote for the day:

"Start by doing what is necessary, then do what is possible, and suddenly you are doing the impossible." -- St. Francis of Assisi

October 16, 2013

The New HIPAA/HITECH Rules: Compliance vs. Cybersecurity
Whether you are a covered entity or BA, it is imperative you understand the difference between being secure and being compliant. The two are not mutually exclusive. The law requires you to be compliant, and with privacy a huge issue in the news, your customers and your reputation require you be secure. Complying with the HIPAA/HITECH rules does not mean you will be secure. In fact, it’s important to remember that 100% security is nearly impossible.


What the Internet of Things Means for Security
Experts say the security threats of the Internet of Things are broad and potentially even crippling to systems. Since the IoT will have critical infrastructure components, it presents a good target for national and industrial espionage, as well as denial of service and other attacks. Another major area of concern is the personal information that will potentially reside on networks, also a likely target for cyber criminals. One thing to keep in mind when evaluating security needs is that the IoT is still very much a work in progress.


Webservices Security: Potential Threats to Combat
Securing webservices is more complicated than any other end user systems, as the webservices are built as the conduit between systems rather than human users. Most of us are very familiar with the first line of defense, namely authentication, data integrity, confidentiality and non repudiation. These are certainly critical security concerns, but there are well established tools and practices that help address these security issues. But, this it not just be enough to be contempt with solving these concerns, as the services are no longer constrained within the trust boundaries.


Is Radical Business Transformation the Only Way?
In its annual Predicts research on industry trends titled "Top Industries Predicts 2014, it has featured 12 strategic planning assumptions that CIOs, senior business executives and IT leaders should factor into their enterprise planning and strategy-setting initiatives. Harris-Ferrante, vice president and distinguished analyst at Gartner says, “Transformation remains a critically important phenomenon across all industries. Many industries will face intense challenges in 2014 and beyond, and will have no choice but to radically change their established business models.”


How the Internet of Things will transform our lives forever!
In an interview to Govindraj Ethiraj, Karthikeyan Natrajan, Global head, Integrated Engineering Solutions at Tech Mahindra says, "If you look at what has happened to the products in the last 20 years, it became smart and the real piece of things that is likely to happen in the next 20 years is that there is going to be lot more intelligence and they are going to be helping you lot more than you're supposed to"


Oracle says open source has no place in military apps
It also warns that open source software may not scale. “Commercial software companies have developed highly refined methodologies to perform these tasks,” the document suggests. “Don’t underestimate the difficulties associated with testing open source software and incorporating required changes into the main development stream, especially when it comes to testing for robustness and reliability under load”.


Webcast: Security controls to help confront modern cyberthreats
In this four-part SearchCompliance webcast, Ross joins Theresa M. Grafenstine, inspector general of the U.S. House of Representatives, to discuss cyber-risk and effective security controls companies can implement to protect corporate data. Here in part one, they discuss common cybersecurity threats facing modern organizations.


The next server operating system you buy will be a virtual machine
If you visit VMware's Virtual Appliance Marketplace, you'll get an idea of what you're in for in days to come. There are hundreds of virtual appliances ready for you to download and run in your virtual environments. True, due to licensing, most of them are Linux-based, but it won't be long until you're able to purchase and download Windows-based VMs — VMs tailored and tuned for a variety of purposes and applications. In fact, it wouldn't surprise me if application vendors started delivering their applications on VMs too.


Ethernet's 400-Gigabit challenge is a good problem to have
The complexity of the task has only grown since the last standard-setting process, which produced the 802.3ba standard that covers both 40-Gigabit and 100-Gigabit Ethernet, D'Ambrosia and others at the event said. That project started out focused solely on a 100Gbps standard, which service providers wanted, but expanded to include 40Gbps because enterprise servers weren't ready for the higher speed. If the 802.3ba experience is any guide, the next standard -- to be called 802.3bs -- will probably not be ratified until the first half of 2017, D'Ambrosia said.


A lot of data could be stored here one day
It’s not just the power generation features that make Niobrara a good site for a data center: There is also massive network infrastructure already at the site. The Denver area serves as a hub for traffic flowing across the country so the site has 6 long-haul fiber carrier connections nearby, and another 21 fiber connections in close proximity. Sprint, CenturyLink, AT&T, Verizon and Level 3 all run fiber connections by the location. Whoever builds out this data center has plug-and-play network connections that can send data out to the entire world at high speeds.



Quote for the day:

"You are the only one who can use your ability. It is an awesome responsibility." -- Zig Ziglar

October 15, 2013

A 160 TB disk drive?
Regular readers of Storage Bits know that there are two promising technologies to overcome the current limitation: Heat Assisted Magnetic Recording (HAMR) and Bit Patterned Media (BPM). Magnetic bits written at higher temperatures are more stable when they cool and bit patterned media enables higher densities by enabling the use of the entire volume of the magnetic pit. But even these heroic and not yet proven feasible for mass production technologies will only take hard drives up to about 20 TB capacity. That's where 3-D magnetic recording could save the day.


ODB: C++ Object-Relational Mapping (ORM)
ODB is an open-source, cross-platform, and cross-database object-relational mapping (ORM) system for C++. It allows you to persist C++ objects to a relational database without having to deal with tables, columns, or SQL and without manually writing any mapping code. ODB supports MySQL, SQLite, PostgreSQL, Oracle, and Microsoft SQL Server relational databases as well as C++98/03 and C++11 language standards.


Defining Business Architecture
Business Architecture on it’s own only provides a small subset of a complete solution. For example, only understanding a business model doesn’t get your stakeholders any closer to defining a solution to a problem or opportunity. It’s when you bring in the macro level EA methods combined with the other domains of architecture where you really see the power behind business architecture. From an industry perspective, there is a tendency to try to make business architecture an independent framework.


Ten Predictions for Business Architecture in 2020
Architects of all types like to peer into the future and I am no different. When my Forrester colleague, Gordon Barnett, mentioned he was working on a new report on the state of business architecture in 2020, I thought it was time for me to look into my business architecture crystal ball. For the record, I haven’t read Gordon’s article so I have no idea how we align or misalign. Even though business architecture was born out of enterprise architecture, big changes are coming. The children are leaving home, off to greater success than their parents.


Flossie, the 50-year-old computer, to be resurrected
The National Museum of Computing has taken delivery of what it believes is the last ICT 1301 computer to ever have a chance of working again. The machine - known as Flossie - had originally been used to produce exam results for students at the University of London. The museum hopes to put it on display by 2016. One of its trustees said Flossie was one of the first computers specifically designed for use by UK businesses rather than scientific institutions.


Why Precious Leaders Fail
Precious leaders have precious problems. Simple solutions won’t work. Small steps aren’t sufficient. Nothing helps because no one understands. Precious leaders create their own prisons. Precious leaders grow discouraged and isolated, then defeated. Eventually, they run. You’re frustrated and stuck because you’re precious. You can’t take actions that work for “average” people.


Salesforce launches identity service, eyes Okta
Salesforce.com on Tuesday launched an identity service, Salesforce Identity, in a bid to be the central hub to connect Web, mobile and on-premise applications with things like single sign-on, directory integration and authentication. With the move, Salesforce aims to be the keeper of identity for customers, employees and partners. The service is built on Salesforce's Force.com platform and on the surface looks like it competes with Okta on many fronts.


Researchers create indelible record on mankind for aliens to someday find
The nearly indestructible disks were created by the MESA Institute for Nanotechnology at the University of Twente in The Netherlands and The Freiburg Institute for Advanced Studies in Freiburg, Germany. The disk consists of a 338-nanometer (nm) thick layer of silicon nitride on top of a silicon wafer. A 50 nm layer of tungsten is patterned into QR (Quick Response) codes using optical etching lithography on top of the silicon nitride wafer.


Five Key Principles of a BI Program
The partner to the data warehouse in most cases is business intelligence. The proper foundation for data storage is critical, but enabling the business to drive value and make good decisions will take your organization to the next level. To achieve this, a business intelligence program has to be put in place. To get started, here are five fundamental principles of an effective business intelligence program.


Culture Hacking: The Prospect of Magnificence
While leading projects at Bell Laboratories, The Whitewater Group, and Microsoft Jim McCarthy saw there was a better way to build products by focusing on the team. He discusses culture hacking, a distinct kind of culture engineering, expressing a particular hacker ethos, an ethos originating in the world of software hacking, promoting freedom, openness, and embodying rationality and design elegance.



Quote for the day:

"For our own success to be real, it must contribute to the success of others." -- Eleanor Roosevelt

October 14, 2013

IBM Wants to Predict Heart Disease Through Big Data Analytics
Sophisticated analysis of EHR data could reveal the unique presentation of these symptoms at earlier stages and allow doctors and patients to work together sooner to do something about it. IBM is applying advanced tools for analyzing medical data, including text, and reviewing a patient’s health records for new insight. IBM utilizes Unstructured Information Management Architecture (UIMA) to extract the known signs and symptoms to heart failure from available text.


Sketching a Roadmap for EA in the Age of Digital Disruption
EA’s Enterprise Lifecycles – illustrating the need to co-ordinate product, capability, business model and brand with the enterprise strategy and objectives. This is truly an exciting time for practitioners of enterprise architecture and business model innovation. If you’d like to learn more, please review the Hugh Evans's Webinar recording and the presentation


Don’t get fooled by the false “Open” and get locked-in once again
Today, open source is driving much of the innovation around data whether it be OpenStack for IT infrastructures or Hadoop for Big Data and analytics. This is happening to such an extent that many proprietary vendors are being forced to adopt some components of open source technology, whether they want to or not, which can lead to confusion and the risk of IT getting trapped in a “false Open” and once again locked-in situation which will constrain innovation and introduce hidden costs.


Are Entrepreneurs Born or Made?
In the past five years, multiple studies have indicated that there may be an "entrepreneur gene"--or at least that people with certain genetic characteristics and personality traits are more likely to be successful entrepreneurs than others. In his 2010 book Born Entrepreneurs, Born Leaders, Scott Shane, professor of entrepreneurial studies at Cleveland's Case Western Reserve University, suggests that genes don't just influence whether a person will start a business; they may even determine how much money a person will earn. In other words, some people are born to be alpha wolves, and the rest will work


Advent of Predictive Analytics in China
It now seems that that the concept is gaining significance among local corporations and managers. More and more companies in China are now putting into practice this idea and ramping up their predictive analytics capabilities. The reasons for such a growing interest are rather obvious:


20X Faster Hadoop Execution Now Possible With ScaleOut hServer V2
ScaleOut hServer V2 adds a full MapReduce self-contained execution engine that runs standard Hadoop MapReduce code to provide real-time performance for continuous live data analysis. It also provides blazingly fast analysis of large, static data sets. Best of all, you don't need to learn anything new – if you know Hadoop MapReduce, you can use ScaleOut hServer right away.


Applying Agile principles to Service Management
Agile teams work with the principle that plans will change; that we will understand more about the work once we near completion and that no amount of planning really prepares us for the road ahead. This is true for software development projects where Agile is accepted but of course it’s also true for IT maintenance and operational projects too. How many of your projects delivered exactly as predicted on day one? Knowing that business requirements will change frequently and that the assumptions made before work begins are normally wrong, Agile teams handle this by working in iterations.


7 Top Wishes of IT Project Managers
"If the IT project manager doesn't know what his employees are working on, he doesn't know if he can assign additional tasks or if the task is moving forward," Nielson explains. "With a cloud tool that keeps the project in one central location, the whole team can see the project details, in real time, eliminating extra emails that flood inboxes every day."


The programmable WAN: Applications are boss and networks bend
A programmable WAN with SDN allows machine-to-machine APIs to respond to autonomous capacity requests so that when an application or cloud orchestration decides it needs more bandwidth, SDN can immediately increase that bandwidth, Auster said. "Programmable WAN using SDN solves challenges by turning the bandwidth up or down on demand based on application prioritizations for transactions that are latency sensitive, so migrations can complete satisfactorily," he said.


Backdoor found in D-Link router firmware code
Craig Heffner, a vulnerability researcher with Tactical Network Solutions who specializes in wireless and embedded systems, found the vulnerability. Heffner wrote on his blog that the web interface for some D-Link routers could be accessed if a browser's user agent string is set to "xmlset_roodkcableoj28840ybtide." Curiously, if the second half of the user agent string is reversed and the number is removed, it reads "edit by joel backdoor," suggesting it was intentionally placed there.



Quote for the day:

"Data mining is the search for new, valuable, and nontrivial information in large volumes of data." -- Mehmed Kantardzic

October 13, 2013

Understanding CouchDB and NoSQL with Jan Lehnardt
In this Hasselminutes podcast, Scott talks to open source developer Jan Lehnardt about the NoSQL movement and CouchDB. Is HTTP too heavy to use for a database? How does NoSQL data modeling differs from classic ER systems? Does Couch matter in the Enterprise?


10 Skills of Effective Data Scientists
The field of data science is a relatively new one, with a growing handful of academic programs making early attempts at setting a rubric. As a result, its definition and the roles it encompasses remains up for debate. There are plenty of broad definitions, but the suite of skills at the disposal of successful practitioners is more oblique. ... A recent post at Data Science Central by Mitchell A. Sanders presents an in-depth survey of the skills shared by effective data scientists in the industry.


AOL Cofounder Frets That the U.S. Could Lose Its Entrepreneurial Edge
“Other nations have figured out that entrepreneurialism and innovation are the secret sauce.” ... In lobbying both Democrats and Republicans on Capitol Hill to ease immigration rules, Case says he tries to lay out the problem in stark terms. He asks them if it would make sense to bring people from China to the U.S. Naval Academy, teach them everything about naval warfare, and then send them home to build the Chinese navy. “They say, ‘Oh, no, we wouldn’t do that.’ “


Leadership and Faith
The truth is, Leadership asks a great deal of us. It often demands that we strike out into the unknown and convince other people it’s a good idea. It asks us to trust that some things do not come complete with scientific or rational explanation. It asks us, too, to believe in our own abilities: the potential and ability of those who work with us; and in the value and viability of our vision, even at times when that vision seems unlikely enough to be unattainable.


Marketing and IT Get Together: The Elephants in the Room
Marketing typically does not understand systems thinking, or the concept of long-term cost of ownership. That quickly calmed the IT leaders down; I made it out of there alive. In fact, there are a number of hard truths – elephants in the room – about how we think and act that Marketing and IT have to realize and come together on. A short list might include:


IBM Hits the Throttle on Big Data Discovery With New Lab
The company says that it will also bring to bear the considerable human talent, with broad domain expertise in such areas as biology, medicine, finance, weather modeling, mathematics, computer science, and information technology. The goal, says IBM, is to provide a nexus of talent and technology to gain leverage on the time to insight in the big data discovery process.


Optimizing SQL Server Memory Configuration
Configuring a maximum value for the buffer pool is the more important of the two settings and will prevent SQL Server from taking too much memory. This is particularly significant on 64-bit systems, where a lack of free physical memory can cause Windows to trim SQL Server’s working set. See the section “Lock Pages in Memory” for a full description of this issue. There are several different ways to calculate an appropriate value for configuring Max Server Memory


Where Agile and enterprise architecture collide
Incorporating architecture into software development "is definitely a struggle," said Fred Albert, senior director of enterprise architecture at Mitchell, a San Diego, Calif.-based provider of property and casualty claims management solutions. "But it's not a new problem that has occurred because of the introduction of Agile. The role of architects historically can be interpreted as being disruptive or slowing down the progress of engineering teams because they're driving toward a bigger vision. I don't believe that has changed."


Template Method Design Pattern
Template Method is used prominently in frameworks. Each framework implements the invariant pieces of a domain’s architecture, and defines “placeholders” for all necessary or interesting client customization options. In so doing, the framework becomes the “center of the universe”, and the client customizations are simply “the third rock from the sun”. This inverted control structure has been affectionately labelled “the Hollywood principle” - “don’t call us, we’ll call you”.


Mission Control and Flight Recorder on HotSpot JVM
Mission Control is the starting place for monitoring, management and troubleshooting, while Flight Recorder is the facility to collect and evaluate profiling data. Both tools have been available for JRockit and are now finally ported to HotSpot after being hinted at by Mark Reinhold in a webcast in 2010 and already announced by Mission Control Team Lead Marcus Hirt at JavaOne 2011.



Quote for the day:

"Your success will be the degree to which you build up others who work with you. While building up others, you build up yourself." -- James Casey

October 12, 2013

Avoiding too many user stories in software development
Too often project teams use only the user's perspective to rank the value of all product requirements. In this scenario, the team forgets to consider other product partners such as the business, compliance and technology perspective when prioritizing. The user may want to have the story realized in the next release, but it may not be the best option when weighting the value considerations of all the partners.


Microsoft Thinks DRM Can Solve the Privacy Problem
Mundie, who until late last year was in charge of Microsoft’s research wing as its chief research and strategy officer, thinks a system of DRM technology, accompanied by laws and regulations to enforce it, could provide the answer. “I think we’re going to have to have a usage-based way of controlling this now,” he said. “One way to do that is to put cryptographic wrappers around these things that control uses of this data.”


Leveraging HBase and Hive
In short, think of Hive as an append-only SQL database and HBase as a more typical read-write NoSQL data store. Hive is useful for SQL integration if you want to store long-term data to be processed and summarized and loaded back. Hive's major limitation is query speed. When dealing with billions of rows, there is no live querying of the data that would be fast enough for any interactive interface to the data.


HP leads war against Microsoft; will other PC makers follow?
When it comes to Microsoft what she's talking about, of course, is Microsoft's line of Surface tablets. And what's really got her really riled is that Microsoft isn't content to sell just to consumers. It's also using the same strategy that HP and other business-oriented OEMs pursue, of authorizing distributors and resellers to sell to businesses as well. That's HP's bread and butter, and in Whitman's view, Microsoft is trying to take it away, especially because the Surface Pro and Surface Pro 2 are being marketed not just as tablets, but as ultralight notebooks.


How Microsoft’s server offerings blur the boundary between on-premises and the cloud
Microsoft is using the release of its R2 wave of server and management tools to bring on-premises infrastructure and cloud closer together, while leaving you the option of running your network the way you always have. That’s a smart move — you can upgrade and gain the performance benefits of an updated kernel, as well as many new features across many of the server roles, and when you’re ready, you can start to take advantage of its private cloud features in your networks.


Chucky’s top BI Dashboard design and delivery worst practices (Part One)
Unfortunately, a careless approach to BI dashboards is far too common, and has the potential to derail and devalue your entire analytics project.  To avoid becoming an unwitting victim of cavalier dashboard cowboys – and ensure that your BI dashboards deliver accurate, timely, relevant and actionable insights at-a-glance – avoid these design and delivery mistakes. ... Check out part two of this series as well.


New NIST cybersecurity standards could pose liability risks
The framework was developed with input from industry stakeholders. It is not designed to mandate specific security controls. Rather, it offers broad standards for identifying and protecting critical data, services and assets against cyber threats. It offers a set of best practices for detecting and responding to an attack, mitigating the fallout from cyber incidents and for managing risks overall.


Providers see revenue opportunity with cloud load balancer technology
As providers show more interest in buying cloud load balancers, there is an opportunity for ADC vendors like Array to partner with providers. "Providers are becoming customers/partners/resellers," Anderson said. "Providers can buy our ADCs for their environment, or if their customers want to purchase dedicated load balancing or physical appliances as a part of a private cloud offering, they are buying our ADC technology through the provider."


Recruiting Is a People Business
“Technology without people can be pretty worthless,” Hoyt said later. There are a lot of tools we can use, but “if you’ve implemented a solution without adoption, you’ve failed.” Recruiting leaders shouldn’t just pick up the next big thing, they need to work with the people involved to find what really works. When you’re going global, one of the first things you learn is to talk less and listen more because “all of the great ideas don’t come from North America,” said Kent Kirch, Deloitte’s global director of talent acquisition and mobility .


So much data, so little security -- what happens if your city gets hacked?
To date, users have agreed to give away certain discrete pieces of information -- such as a name or email addresses -- in exchange for something -- a product or a service, for instance. That situation is no longer viable, Craig Mundie, senior advisor to Microsoft CEO Steve Ballmer, told attendees at the Emtech conference held at the Massachusetts Institute of Technology (MIT) here today.



Quote for the day:

"No act of kindness, no matter how small, is ever wasted." -- Aesop

October 11, 2013

Will cloud services be traded just like stocks and bonds one day?
There are a handful of other companies pursuing this idea too though. Generally, the process would work the same: Blocks of cloud computing resources - for example a month’s worth of virtual machines, or a year’s worth of cloud storage - would be packaged by service providers and sold on a market. In the exchange, investors and traders could buy up these blocks and resell them to end users, or other investors, potentially turning a profit if the value of the resource increases.


Cybersecurity is hot: Here are the biggest backers
There have been nearly 80 sales and IPOs in the past 12 months by cybersecurity startups with an average tenfold return on investment, CB Insights reported. In the same time frame there has been about $1.4 billion invested in 239 deals in the sector by venture firms. The biggest investors in the sector since January 2012 have been Kleiner Perkins Caufield and Byers and Andreessen Horowitz, with 13 deals each.

It’s Not Only About Testing!
Testing is only one of the tools we use (maybe the most powerful tool we possess) in order to gather the data. But as with any tool, you need to use it correctly in order to meet your purpose. If your projects change so should your test plans Fighting project change is like fighting the Sun and the winds, a total waste of time and efforts. In the best case you will seem like a grumpy tester, and in the worst case you will be the team buffoon that no one takes seriously anymore and who is constantly stating that they won’t be able to release the project on time…


What is Cloud Mirroring and Why Does It Matter?
The rationale behind cloud mirroring is similar to that of any redundant security measure – you lock your car doors when you leave your vehicle, which is probably sufficient to protect your car most of the time, but an electronic security system provides an additional layer of protection. Leaving your car in a secure parking garage is safer still. Cloud mirroring offers you the data storage equivalent of multiple layers of preventive measures, helping to guarantee that your data will be there when you need it.


Cold Data Storage: An Answer To The IT Budget Meltdown?
If archival data does not warrant a real-time response time, why not just turn off the storage disks when they are not in use? In fact, this is exactly the approach that has been adopted by Facebook and shared via the Open Compute Project under the new name, Cold Storage. By storing inactive data using disks that are turned off at least 50% of the time, and by accepting a 30 second spin-up delay for retrieval, three good things happen:


Governance over IT Service Management Processes using COBIT 5.0
IT Governance ensures business requirements are linked to IT Services. IT is being measured based on service performance, including performance measures for setting up new or changed services via projects. Services are being organized by defined and accepted processes, functions (organizations, people and technology- All those are leveraged resources or, in COBIT terms, enablers. Services, processes, organization, people and technology are being managed by a set of control objectives -usually structured as an “IT balanced scorecard”.


NoSQL Data Modeling Techniques
To explore data modeling techniques, we have to start with a more or less systematic view of NoSQL data models that preferably reveals trends and interconnections. The following figure depicts imaginary “evolution” of the major NoSQL system families, namely, Key-Value stores, BigTable-style databases, Document databases, Full Text Search Engines, and Graph databases


SQLstream Analyzes Data On the Flow
SQLstream founder and CEO Damian Black calls it big data stream processing. "We're there to feed and enhance your core data systems, and provide continuous analytics, continuous cleaning and validation, continuous alerting and alarming," he says. "We're turning the raw data into streams of data that you may then want to store in some of your other big data systems. Or you may just want to interpret now because you may not need to store all the information."


The Rise of Digital Cities
Vegara says the combination of these technologies and platforms will usher in new opportunities for cities. “Cloud based technologies, for example, can offer a huge advantage for municipalities. Since both cities and municipalities, in general, produce copious amounts of data every day, leveraging cloud technology will help them democratise access to information and intelligence. This will allow municipalities to leapfrog and have the same capacity and intelligence as most advanced cities have.”


Raise the Anticipation Quotient with Mobile BI
Mobile BI creates a powerful opportunity for information managers to raise the anticipation quotient of their organizations. Obviously, your organization’s leaders and managers need to be able to anticipate what the right decision is before it’s made. However, what’s often overlooked is anticipating a decision that will need to be made and being prepared to make it. For example, a colleague told me a story about playing a round of golf with a friend. Halfway through the round, the temperature dropped suddenly.



Quote for the day:

"A good plan today is better than a great plan tomorrow." -- General George S. Patton

October 10, 2013

How the Rack is Changing the Cooling Game
One of the newest forms of liquid cooling is the rear-door heat exchanger (RDHx). The RDHx can be added to existing equipment racks, or you can provide new rack enclosures with an RDHx incorporated as part of the new rack enclosure. RDHx systems can provide supplemental cooling support for a few high-density racks, or provide the total cooling solution with or without a raised floor.


How Big Data Becomes Smart Data
Some would say that only human intelligence can transform data into insight. While it certainly takes intelligence to interpret data, such a statement begs the question as to how to make the connections necessary to reach actionable conclusions from these massive repositories of information. In other words, how do we turn Big Data into Smart Data? Context, it turns out, is key. When we examine the surrounding environment and identify the types of data that influence a given situation, we can cross-analyze those sets to provide illumination.


Is the Internet of Things More Fact or Fiction?
Though Cisco and several other vendors have thrown tremendous support behind the IOT, most channel organizations continue to maintain a wait-and-see attitude until the business case is more firmly established. Of course, many of the core technologies required to drive this Internet-enablement initiative are already here, including wireless networks, RFID and barcode readers, temperature sensors and other measurement systems.


Has Hadoop Entered the Mainstream?
After all the hype around Apache Hadoop, we are starting to see some successful implementations that highlight its benefits. However, we do not yet see the kind of enterprise adoption typically associated with a technology that promises to manage high volumes, reduce implementation costs and, more importantly, monetize data. The question is why?


Shattered Trust: IT Survey Shows PRISM Allegations Have Brought Cloud Misgivings
A survey of Redmond magazine's readership also shows a significant number of organizations are putting some planned cloud migrations on hold, while many are retreating from those already underway. More than one-third put planned projects on hold in wake of the NSA leaks, while 13 percent brought cloud projects back in-house, according to an online survey of 300Redmond readers conducted in mid-August.


Rethinking high-availability architecture: Scale out to save money
A more economical approach is a scale-out multiserver architecture, where the workload is shared across multiple servers. A classic example is a Web server farm. To improve website performance, you use more VMs and only care about having enough Web servers running to support the current load. Newer open source database servers have the same sort of architecture: Redis, Apache Cassandra and MongoDB all scale out for performance rather than requiring a single-node scale-up.


The real value of introspection
The notion that we just lead outwardly and spend no time inwardly belies the value of introspection. Introspection and its byproduct, self-awareness, are central to any leadership, no matter what level or position. It is the essence of decision-making, behavioral efforts, action, focused energy, prioritization. Introspection is the key to clarifying what you stand for and what matters to you — in other words, what is important. It drives who we are in all aspects of our leadership.


Why a secure, multi-vendor strategy is crucial for the cloud
Even before you went to the cloud, you (hopefully) had a backup strategy in place that would help you recover critical systems in the event of an equipment malfunction or disaster. Perhaps your first foray into the cloud was as a backup measure, replacing tape or other backup media with highly scalable cloud storage. But if you are running primary or mission critical applications in the cloud, it’s even more critical that you have a plan should your provider go down for a few minutes—or forever.


Experts, users weigh in on OpenPower's open source data center systems
With denser chip-level transistors and more on-chip integration, processors can share a chip with GPUs, peripheral bus controllers (PCIe or even USB) and network interconnects. These system-on-a-chip designs are simpler and less expensive for server makers because there are fewer chips to connect and test externally on a motherboard. However, there is a disconnect between what server vendors are developing and what data center teams want, said Doug Feltman, director of systems and applications at 24 Seven Inc.


Software Is Eating Your Organizational Silos
There’s no question that ultimately, we’ll find all of our applications running in service-level, on-demand infrastructure. The software running on commoditized hardware will itself be commoditized. The vast majority of our applications will no longer be unique snowflakes with highly specific infrastructure requirements — instead, they’ll be able to run on common software platforms that eliminate the need at the application layer to worry about infrastructure at all



Quote for the day:

"Great minds have purposes, others have wishes." -- Washington Irving

October 09, 2013

MDM and Next-Generation Data Sources
New data sources and real-time analytics continue to change the IT landscape as never before. Big data and other new information management technologies now allow organizations to uncover relationships that have long been buried in their data stores. ... top master data management expert Aaron Zornes, chief research officer of The MDM Institute, see another new trend emerging: master relationship management.


Building and Testing a Web API Service
Microsoft's latest tool for creating server-side services is ASP.NET Web API, so that's what I'll use as the next step in creating my sample application. The Web API isn't JavaScript and, technically, not part of this column. However, the services used by the client are a critical part of my sample application and, more important, a brief look at the service will let me make a few points about TypeScript before I return to the client, later in this article.


Gartner warns of vendor upheaval in technology shift
Gartner analysts warned that a data explosion threatens to overwhelm, sensors will be everywhere, 3-D printing will change everything, and smart machines will replace people. CIOs that don't adapt will become simple custodians of back-end systems. Companies that fail to change will join Kodak, Blackberry and Wang, each of which was slow to recognize new forces in technology.


Health Care: Big Data’s Next Frontier
Readers with experience in the health care industry might now be thinking “Privacy!” “HIPAA!” -- incredulous as they consider the challenges of sharing and integrating health data for analyses. Indeed, privacy regulations are a big obstacle blocking the use of all the data in the industry to meet health and financial goals.  But help may be on the way. Last week at the Strata Rx 2013 conference in Boston, I learned of two exceptional cases that illustrated researchers leveraged big data technologies to revolutionize modern health care.


Your car is about to go open source
Automakers are working to standardize on a Linux-based operating system for in-vehicle infotainment (IVI) systems that would make it easier for cars to act more like smartphones. An IVI is the "black box" that powers a car's audio and entertainment systems, as well as hands-free phone service and satellite navigation systems. Most IVIs today have touchscreens and can be voice-activated, but many car buyers pass up those options.


Rebuild or Reorganize: SQL Server Index Maintenance
First off: ‘Reorganize’ and ‘Rebuild’ are two different operations that each reduce fragmentation in an index. They work differently toward the same end. You don’t need to run both against the same index. (I sometimes find that people are doing both against every index in a maintenance plan. That’s just double the work and NOT double the fun.)


Superhero DBAs: How to fuel productivity gains with automation
Scoring high in “Delivery” means there is a higher probability that your DBAs will maintain service levels, even if the “Environment” gets more complex in the future. With high levels of “Delivery” maturity, your DBA’s can be proactive and business-driven. They can actively implement database consolidation initiatives to keep database counts low. Or actively implement data archival and pruning mechanisms to keep overall database sizes constant even in the face of high data growth rates. By addressing the areas that make up “Delivery” metrics, you can actively improve your productivity level.


Data will drive future successful enterprises
Rometty said every single decision made in an organisation, whether it was to buy another company or keep an employee, would be driven by the information derived from big data analysis. "All of us are going to have more complex decisions to make in a much more complex environment. Those that choose to be a smarter enterprise will get the chance, I think, to make the right decisions and it will be the basis of competitive advantage," she said.


Mobile BI: The misperceptions and the missteps
Increasingly with the shift to HTML 5, you can support a lot more devices that way, including even the Firefox device, in theory, that's coming out, and a lot of vendors are moving in that direction. So, if you already have a business intelligence product or platform in place, the first thing you ought to do if you want to do mobile BI is go talk to your existing vendor, see what they have and see if it meets your needs. There's a very good chance that it does.


Solution Architecture and Application Architecture
Solution Architecture takes looks at the overall problem and works with other experts to build the best possible solution that will work in the real world from those other available parts. Often, applications are not directly part of the solution. Application Architecture has almost exclusively been used for software architecture in my experience. The level of expertise needed to be a competent software/application architect usually prevents those practitioners from gaining expertise in systems architecture or enterprise architecture because they need to be extremely well versed in software design and construction.


Quote for the day:

"The one without dreams is the one without wings" -- Muhammad Ali.

October 08, 2013

KPMG’s analysis of third-party integrity risks
KPMG’s Astrus Insights, which analyzes some 8,000 integrity due diligence reports on third party relationships, covering 172 countries, has found that the Financial Services sector is the most exposed of any industry to the threats of fraud, corruption, insider trading, negligence and bankruptcy. Additionally, the analysis has shown that third party risks have an impact across many sectors with bribery and corruption identified as a key risk.


Microsoft enables CodePlex projects to use GPLv3 license
GPLv3 is now one of the license choices that CodePlex developers see in a drop-down list offering them licensing choices. Other options in the drop-down include Apache 2.0, Simplified BSD, GPLv2, Mozilla Public License 2 and a handful of Microsoft open-source licenses. Individuals interested in hosting an open source project on CodePlex need to select a license at the time they first put their projects on the site.


Big Data: How Can We Measure the Risks?
The chief risk factor surrounding big data is not knowing the potential future downsides associated with your failure to manage it all effectively. Making the risk factors transparent for all of your big-data sets—unstructured, structured and all gray areas in between—should be a top business priority. The above-referenced article presents a rigorous approach for modeling and measuring the risks associated with unstructured data.


Eleven Secrets of SaaS Product Design
This is the fifth and final post in a series that explores SaaS marketing strategies that drive growth throughout the customer lifecycle using the three fundamental SaaS growth levers: customer acquisition, customer lifetime value and customer network effects. In the course of this exploration, we’ve encountered numerous examples where the SaaS product itself is the instrument of growth. This final installment explores the product P in more detail providing Eleven Secrets of SaaS Product Design that drive growth at each stage of the customer lifecycle.


The Post-PC era will be the best of times for security and the worst of times for security vendors
Hardware security can make a device tens of thousands of times more secure than today’s PCs. For example, use of a Trusted Platform Module (TPM) (required by Windows 8) allows a device to securely attest to its own integrity when it powers on. In addition, CPU features for hardware isolation can allow the system to securely hardware-isolate the execution of untrusted code. The use of strong encryption for all data at rest means that a lost device need not result in a loss to the enterprise.


Gartner Identifies the Top 10 Strategic Technology Trends for 2014
“We have identified the top 10 technologies that companies should factor into their strategic planning processes,” said David Cearley. “This does not necessarily mean adoption and investment in all of the listed technologies, but companies should look to make deliberate decisions about them during the next two years.” Mr. Cearley said that the Nexus of Forces, the convergence of four powerful forces: social, mobile, cloud and information, continues to drive change and create new opportunities...


Hosting provider LeaseWeb falls victim to DNS hijacking
"Our security investigation so far shows that no domains other than leaseweb.com were accessed and changed," LeaseWeb said in a blog post Sunday after resolving the issue. "No internal systems were compromised. One of the security measures we have in place is to store customer data separately from any publicly accessible servers; we have no indication that customer data was compromised as a result of this DNS hijack."


Identifying and locking down known Java security vulnerabilities
Websense Security Labs showed that 94% of endpoints currently running Java contain at least one known vulnerability. First, is there an easy way for organizations to determine the security vulnerabilities in the Java versions they are running? Also, how can organizations further secure old versions of Java if they can't upgrade in a timely fashion?


Handbook: Architecting an Agile Enterprise
This white paper takes an in-depth look at the relationship between Agile business practices and mobile computing. Inside, learn more about the balancing act many modern businesses face when trying to provide a quick turnaround for mobile applications on a limited budget.


Open Agile Adoption: The Executive Summary
The core concept of OAA is the passage rite or “rite of passage”. A passage rite is a cultural event (and a kind of social game) that helps people make sense of complex transitions. Agile adoptions are complex transitions. These are the key events in the passage rite: A Beginning: An Open Space meeting; The Middle: With experimentation, play, and storytelling; and The End: An Open Space meeting



Quote for the day:

"When people talk, listen completely. Most people never listen." -- Ernest Hemingway