December 24, 2012

Cloud-Powered GPS Chip Slashes Smartphone Power Consumption
A Microsoft Research project suggests that there’s a way for location chips inside smartphones to use far less power. Reducing the power consumption of GPS chips could not only extend the battery life of smartphones and tablets, it could also make it practical to add GPS functionality to more devices, including low-power remote sensors.


Excel: Data Model specification and limits
A data model is embedded data inside a workbook that powers data visualizations such as PivotTable, PivotChart, and Power View reports. This article documents the maximum and configurable limits for Excel workbooks that contain data models.


5 myths that hold back brainpower
Deepak Chopra and Rudolph E. Tanzi, explain that new discoveries and new thinking are helping people create a new “relationship” with their brains that help unveil new perceptions and new opportunities. In their latest book, Super Brain: Unleashing the Explosive Power of Your Mind to Maximize Health, Happiness, and Spiritual Well-Being, they explain that people need to acknowledge their roles as “leaders,” “inventors,” ‘teachers,” and “users” to their brains.


The Innovator's Straitjacket
A person in a straitjacket also loses the ability to do many other things, particularly creative tasks that require typing, drawing, manipulating objects, and so on. Even the sanest of companies can unintentionally put themselves in a straitjacket that makes it hard for them to create high-potential new growth opportunities. Here's how leaders unintentionally limit their innovation efforts.


Despite Apple, NFC is catching on -- just not for payments quite yet
Near Field Communication (NFC) is steadily making headway in the U.S. for sharing data and music among smartphones, but the technology faces years of slow growth as a replacement for physical wallets.


India's Lava aims for 100 mobile app patents
In an Economic Times report Sunday, SN Rai, the company's co-founder and director, said: "We have realized just by selling handsets it is not possible to maintain growth momentum. Innovation in product is key to survival. Our wishlist is to make a century of patents in the next 2 to 3 years."


4 Fantastic, Free Things Google Drive Will Now Do For You
Now, however, would be a good time to pay Drive some mind. Google has done impressive work making it easier to keep your files organized, share any file with anyone, and keep everything in your work life one search away. Very specifically, these are the things Drive can do for you at no cost, and requiring just enough effort to remember Drive can do that.


Splunktalk: Getting the Message from MOM
In many respects you can think of MOM as the glue that stitches heterogeneous enterprise computing environments together. Now why am I so interested in this ? Well, MOM and the messages transported represent a massive source of machine data that Splunk can index and resolve into operational visibility on many different levels..core operations , business analytics, transaction tracing etc..


Taking Healthcare IT Seriously Demands Culture Changes
Healthcare is moving cautiously into cloud computing, virtualization, BYOD and other IT innovations. And there's good reason for the caution. Until an organization's IT leaders take meaningful steps to change what's typically seen as a lackadaisical privacy and security culture, the risk of patient-information loss remains high and costly.


Boost up your serialization/deserialization similar to JSON
MessagePack is effectively JSON, but with efficient binary encoding. Like JSON, there is no type checking or schemas, which depending on your application can be either be a pro or a con. But, if you are already streaming JSON via an API or using it for storage, then MessagePack can be a drop-in replacement.


How Object Storage and Information Dispersal Address Big Data Challenges
Object-based storage offers an alternative approach that is ideally suited for storing massive amounts of unstructured data. Object-based storage systems are not organized hierarchically. Instead, an object is identified and located by its unique identifier. This enables the number of objects to grow substantially beyond the limitation of traditional file systems while still maintaining the integrity and consistency of the data



Quote for the day:

"The secret of business is to know something that nobody else knows" -- Aristotle Onassis

December 23, 2012

SANS Netwars Tests Cybersecurity Pros Against Peers
The competition is both educational and fun, said Jorge Orchilles, manager of the infrastructure vulnerability assessment team at Citi Global Security Operations. Orchilles participated in the competition last week and finished in third place in a NetWars competition in 2011.


The CloudTimes Year in Review – And 2013 Cloud Predictions
The question now should focus on what will happen to the data that we store on public clouds by 2013. There are a lot of moves that are supposed to protect our data but we all know that technology is moving faster than legislation. Let’s take a look the possibilities on how public clouds, such as social media, will use our data.


The Leadership Brand: How to Discover Your Personal Brand Persona
To help you discover your brand persona, Todd Nielsen lists twelve of the most common archetypes into which leaders fit and included examples from the 2011 TIME 100 list of leaders. These types vary based on personality, style of leadership and a number of other things.


Does disaster risk management pay?
A new study, published last week in the journal Risk Analysis, provides a new methodology based on Cost-Benefit analysis to assess the economic efficiency of disaster risk reduction efforts in disaster hot spots in developing and emerging economies. Faced with fiscal austerity, many national and international policymakers have increasingly become interested in the economic case for disaster risk management.


BYOD, Enterprise Mobility and Beyond – What to expect in 2013
Interestingly enough for Trend Micro – the company that has made the “Journey to the Cloud” its corporate mantra – Raimund’s top two predictions are not related to the cloud but rather to the inevitable impact of consumer mobile platforms on corporate IT – a topic particularly relevant to the Consumerization blog and to the Enterprise Mobility professionals among us


2013 Will Be Dominated By Mobile, Cloud Developments: IDC
"The IT industry as a whole is moving toward the mobile/social/cloud/Big Data world of the 3rd Platform much more quickly than many realise: from 2013 through 2020, these technologies will drive around 90 percent of all the growth in the IT market," said Frank Gens, Senior Vice President and Chief Analyst at IDC. "Companies that are not putting 80 percent or more of their competitive energy into this new market will be trapped in the legacy portion of the market, growing even slower than global GDP."


European Privacy Watchdogs Examine Microsoft's Services Policies
Microsoft confirmed on Tuesday that it had received a letter from the Article 29 Working Party that it would proceed with a probe. On October 26, the computer giant was notified of a preliminary investigation. The Article 29 Working Party (A29 WP) is made up of the data regulators from all European Union member states as well as the European Data Protection Supervisor (EDPS).


After first-round success, Microsoft accelerator lines up its new start-ups
“Over 300 companies, consisting of 1,000 entrepreneurs, applied to enter the Microsoft Accelerator for Windows Azure, but we could only accept 13,” said Weisfeld. Based on the results of the first group, which began its four-month participation in the first accelerator group last March, the chosen few have a busy — and enriching — future to look forward to, with the new program running from December through March.


Engine Yard Continues Trend of Local Fabric for Public Clouds
Last month, platform-as-a-service (PaaS) provider Engine Yard released a “cloud in a box” that developers can use to test their applications locally before publishing to the public cloud. Multiple cloud providers have now embraced this deployment model as a way to accelerate development while making it easier to try a particular cloud before committing to it.


9 Triumphant Open Source Projects of 2012
The platform namely open source has undergone a profound revolution in recent years as this unique software project has staged itself to be so ample and apt mainly because of its support to challenge the characteristics of similar software from other private vendors like Microsoft. And now with the year 2013 around the corner, let’s take a look at some of the most successful open source projects of the year 2012.



Quote for the day:

"Never be afraid to try, remember, amateurs built the ark. Professionals built the Titanic." -- Anonymous

December 22, 2012

India developing own OS to boost cybersecurity
India currently is dependent on many imported OSes based on Windows and Linux, which are likely to have malicious worms and security issues, DRDO's Director-General VK Saraswat said at the Navigation and Communication (NAVCOM) conference, The Times of India reported Thursday. Hence, it is essential India builds its own operating system, he said.


6 Steps IT Can Take to Bring Business Into Tablet Decisions
Tablets are the darlings of hypermobile employees and business leaders looking to improve their processes. Because each tablet-enabled business scenario is different, only business people--those meeting with customers, inspecting stores or sitting in decision meetings, for example--know what they really need from their tablets.


Designing for Resilience in n-Tier applications
One of the most common problems that we face as support engineers is performance issues. Usually, the problem is explained to us as the application being “slow”, “hanged”, “crashed”, “stopped”… well, you name it really! Depending on who’s talking to you and the amount of information gathered about the problem, usually our first task is determining what are the correct symptoms, which many times it’s a challenge on its own.


A look back at 2012's IT news in video
Smartphones, tablets, hirings and firings were all part of the tech landscape in 2012. In this year's Tech News Review, Computerworld takes a look at some of the biggest stories of the year.


Investing in technology: Setting IT priorities in an uncertain economy
In this video Q&A, filmed at the 2012 MIT Sloan CIO Symposium in Cambridge, Mass., SearchCIO.com Editorial Director Scot Petersen sits down with Richard Soley, CEO at Object Management Group Inc. in Needham, Mass., to discuss investing in technology areas such as cloud computing, big data and mobility.


Amazon Web Services now accommodates big data storage
High Storage, an Amazon Elastic Compute Cloud (EC2) package, is designed to run data intensive analysis jobs, such as seismic analysis, log processing and data warehousing, according to the company. It is built on a parallel file system architecture that allows data to be moved on and off multiple disks at once, speeding throughput times.


8 Must-Read Management Books for the Holidays
These eight books will keep the professional in your life – or your own management career – advancing during holiday downtime. Leadership guru Art Petty recommends you crack the covers of these books to keep your professional development moving forward.


End of an Era as Kodak Sells Patent Portfolio for $525 Million
Specifically Kodak said under the agreements, it will receive approximately $525 million, a portion of which will be paid by 12 intellectual property licensees organized by the consortium of Intellectual Ventures and RPX Corporation. The Los Angeles Times reports that group not only includes Apple and Google, but Microsoft, Research In Motion, Adobe, Samsung and Huawei.


ISACA Issues Guidelines on Managing Cybersecurity, Private Clouds and Data Privacy
Jeff Spivey, CRISC, CPP, international vice president of ISACA and director of Security Risk Management Inc. said, “As more devices utilize IP addresses, increasing the attack surface, cyber criminals will dedicate themselves to increasingly complex attacks in 2013.”


7 Android trends that need to end in 2012
As we get ready to usher in a new year, I thought it'd be a good time to identify some annoying Android trends that deserve to be left behind in 2012. Think of it as my holiday wishlist. The notion of some of these trends disappearing may be a long shot -- but hey, a guy can always dream.



Quote for the day:

"Knowing that you have complete control of your thinking you will recognize the power…" -- Mikhail Strabo

December 21, 2012

Video games to get scrutiny in U.S. gun violence review
Violence in video games and other aspects of pop culture in the U.S. will be among the areas examined as part of an investigation aimed at reducing gun violence in the country. The investigation, headed by U.S. Vice President Joe Biden, has been charged with producing proposals no later than the end of January on legislative action the government could take as it seeks to reduce gun violence.


12 Expert Health IT Predictions For 2013
InformationWeek Healthcare recently offered its own take on the subject. Now we've reached out to CIOs, health IT professionals, analysts, bloggers and other HIT heavyweights in a series of email interviews to get their health information technology predictions for 2013. Here's what they predicted


New Analyst Report Rips Agile: Says It's 'Designed To Sell Services,' a 'Developer Rebellion Against Unwanted Tasks'
The report includes data supporting what Voke calls the "Agile Dilemma," described as "the inherent risk and confusion created by the business desire for speed and flexibility misinterpreted as a mandate to participate in the developer-centric movement called Agile, which may not be appropriate for all organizations or projects."


2012 Dev Predictions: Hello DevOps and Cloud, Goodbye Single-Language Programmers
"When you build clouds and use cloud components," he said, "you don't just develop anymore; you develop and maintain. These things become living systems, and developers need to understand the use case a little better. They need to get comfortable with the idea of maintaining applications, rather than just building features and functionality.


What Comes First in Good BPM Design?
Clay Richardson blogs: Lately, I've become obsessed with evaluating the linkage between good process design and good experience design. This obsession was initially sparked by the primary research I did earlier this year around reinventing and redesigning business processes for mobile. The mobile imperative is driving a laser focus for companies to create exceptional user experiences for customers, employees, and partners.


Cisco IP Phones Vulnerable
“Once in, the attacker can use the phone’s microphones to stealthily exfiltrate audio data at any time, regardless of whether a phone call is in progress,” says Ang Cui, one of the Columbia computer scientists who discovered the vulnerability. The hacked phone can then infect other phones on the same network and attack connected computers and devices such as printers, he adds.


Teradata Offers Free Big Data Training
The free courses allow students to study to become either a Teradata Certified Professional (for those seeking IT careers) or Certified Associate (for business-oriented types who want a conceptual understanding of Teradata technology). The online information includes assignments, articles, case studies, PowerPoint presentations, research reports, software and other materials.


SDN Revenues to Hit $3.7 Billion by 2016: IDC
In a Dec. 19 report, IDC analysts said SDN revenues driven by sales to enterprises and cloud service providers will hit $360 million in 2013, and will grow to $3.7 billion by 2016. Those numbers includes sales of everything SDN-related, from the associated network infrastructure and applications to control plane solutions and professional services.


Can we create a Silicon Valley in India?
Over the last 50 years, Stanford faculty, staff and graduates have launched nearly 1,200 companies. More than 50 percent of Silicon Valley’s products come from companies started by Stanford alumni —and that excludes Hewlett-Packard, one of the Valley’s largest firms. Here is a round table discussion with the dean of Stanford on what does India need to do to come up with it's own Silicon Valley?


The 10X Developer in You
These creatures eschew laws of nature, compared to average Joe Programmer they produce more high quality work in less time. But are they really some special superhero? Born with a keyboard in their hands, mind made of linear algebra and visualising complex systems before they can walk? Or just normal people with an opportunity to actually¬†work?



Quotes for the day:

"Every really new idea looks crazy at first." -- Abraham H. Maslow
"It is better to know some of the questions than all of the answers." -- James Thurber

December 20, 2012

Drucker and Deming = Lean Marketing
Once this is identified and organized you are well on your way in creating a great marketing system. Now, all you have do is put it into action. Granted a well-defined problem is half the work but how do you enact it and improve upon the process.


A walk through the integrated Cloud
No doubt, Cloud computing brings great benefits such as affordability, scalability and manageability for businesses, especially for small and medium enterprises (SMEs). And that's one truism Mumbai-based Neural Integrated Systems had in mind while choosing ERPNext, a Cloud-based enterprise resource planning solution from WebNotes Technologies for their business.


Game developers need to diversify to survive
The challenge for these game houses is--apart from creating addictive games--developing a successful monetization strategy around these games to increase revenue. "No games company can thrive without these two components," Luong pointed out.


Avnet Story: How to Integrate 100% of B2B Data Sources
Avent is a large distributor of electronic components with a diverse ecosystem of customer and suppliers. Their B2B infrastructure reflects the complexity of their environment but, despite a sophisticated and mature EDI infrastructure, they were still manually re-keying invoices and product updates from hundreds of spreadsheets and .PDFs received from partners.


Chinese e-commerce sector main target of cybercriminals
According to John Ellis, director of enterprise security at Akamai Technologies, e-commerce is the most widely targeted industry in China by cybercriminals within the country. The sector is booming and growing rapidly in China generating a lot of revenue for the country, he noted, in an interview here Thursday.


The Age of Cognitive Computing
The new technologies that IBM provides this time are directly interrelated. They are all linked to the human senses. That’s why the company indicates the next era as the “the age of cognitive computing”. The computer reaches a higher level in the DIKW hierarchy. The computer already moved from the level of data processing to the level of information processing.


Cloud environments to remain low on attacker’s radar in 2013: Verizon
Increasing popularity of Cloud among enterprises may lead those in the security biz to believe that such deployments would become favored targets for hackers and cybercriminals in the days ahead, but that’s hardly the case. Experts predict that despite its rising fame, Cloud-based environments will remain low on attacker’s radar, at least in 2013.


Windows 8 Management, Security and Licensing Changes: What IT Pros Need To Know
Simply put, Windows 8 will bring new ways for IT pros to deal with client management, security and licensing. Those changes largely reflect Microsoft's moves to address a shift toward a more mobile device-centric world that is taking shape. And while much is known about Windows 8 at this point, much also remains shrouded in mystery, even at this late date.


Private cloud computing benefits occur on a case-by-case basis
"Private cloud is hard and expensive, and at the end of the day, you still own the infrastructure and have to manage and integrate it. Yikes!" said Ellen Rubin, vice president of cloud products at Terremark, a Verizon company that offers managed hosting and cloud services.


Web designer sentenced after building torrent website
What happens if you design a website and the client puts it to potentially illegal services? According to one court, you're just as culpable. First reported by TorrentFreak, a website designer who was contracted to work on a now-dead torrent search website, StudentBay, has been found guilty of copyright infringement offences.



Quote for the day:

"Always bear in mind, that your own resolution to succeed is more important than any other thing. " -- Abraham Lincoln

December 19, 2012

Shipping software at 20% completion
DeNA first puts out its games on browsers rather than applications, which allows for “tweaking and tuning” in real time, says Mr Moriyasu. A Japanese game may be only 20% completed when it is made available to gamers. Its developers believe this enables them to finesse it, so that it stays popular for longer.


Microsoft plugs Outlook.com, knocks Google after Sync death notice
Last week, Google announced it would phase out synchronization via Microsoft Exchange ActiveSync (EAS), which companies like Apple and Google license from their Redmond, Wash. rival to push email to smartphones and tablets, and sync calendar entries and contacts on multiple devices.


.NET Framework 4.5 Multi-Threaded Globalization
The .NET Framework 4.5 includes a simplified way of setting the default culture and UI culture for an application domain. In .NET Framework 4 and earlier frameworks, if you wanted to set the Culture and UI Culture for an application, you’d typically set the culture settings on the current Thread.


How to trick Siri into using Google Maps
All you do ask for directions like you normally would, but tack on "via transit." So, for example, to find the nearest Starbucks, you'd say, "Take me to the nearest Starbucks via transit." What happens next is that Siri pulls up a list of any installed "routing apps" -- including Google Maps


Instagram says it now has the right to sell your photos
The new intellectual property policy, which takes effect on January 16, comes three months after Facebook completed its acquisition of the popular photo-sharing site. Unless Instagram users delete their accounts before the January deadline, they cannot opt out.
Update: Instagram apologizes to users: We won't sell your photos


The Year Ahead: Disposable Storage Infrastructure
Employees, including upper-level managers, love these devices so much that they won't wait for the enterprise to issue one; they'll bring their own and expect IT to support it (BYOD). These new mobile devices change the relationship between data and devices. The data is virtualized and made available via Web services from giant providers such as Amazon AWS. This is the consumer cloud. Expect a rapid demand for similar corporate data services to support a new breed of mobile applications.



Social Science Pushing Data Frontiers
Addressing the pressing need to recruit suitable university graduates for careers in data science, the Nokia mother-daughter data science team of Amy O’Connor and Danielle Dean made the case at Strata-Hadoop World 2012 for college grads with math/stats, bioengineering and social science educational backgrounds.


Five Qualities of Successful Leaders
In his book, The Corner Office: Indispensable and Unexpected Lessons from CEOs on How to Lead and Succeed, Bryant shares what he has learned from Xerox CEO Ursula Burns, Ford CEO Alan R. Mulally, Yum Brands CEO David C. Novak, Teach for America CEO Wendy Kopp, Zynga CEO Mark Pincus, and other leaders.


Ovum: SDN architecture is the way to go for future networks
In a new report, researchers at Ovum have revealed that the three-tier hierarchy (access, aggregation, and core) of network architecture is going away in favour of flatter architectures, virtualized application software is replacing network appliances, and network infrastructure is becoming much more programmable.


But, You Are Infected
Before you write your plan to make next year rock, take a few minutes (or longer, if you’re serious about your goals), and decide what you need to unlearn. Over the course of your life, you’ve been infected by some beliefs that you now hold as truths. You’ve learned to take some actions based on those beliefs, and to avoid other actions—some of which would help you to produce much greater results.


How Do We Read Code?
The goal is to figure out some way of measuring what features in programming systems help programmers understand wht they are doing, and how this can be used to make systems that lead to higher quality software. Mike is currently running an experiment where he shows people several short Python programs and asks them to tell the output of the program.


Derivative-free nonlinear optimization for .NET and Java
There are several more or less time-efficient ways of solving (constrained) non-linear optimization problems, including simulated annealing, genetic algorithms and direct search methods such as the Nelder-Mead method (a good overview of mathematical optimization with several links is provided here.)



Quote for the day:

"If you're never scared or embarrassed or hurt, it means you never take any chances." -- Julia Sorel

December 18, 2012

Chasing the Network Visibility Problem
IT organizations need a virtual tap that monitors traffic flowing over the virtual switch and forwards the information to a centralized analysis solution that presents end-to-end visibility into the application -- across both the virtual and physical network -- from the same dashboard.


Discovering Hidden Purpose and Meaning in the Work We Do
Many search for years, then eventually give up and settle into enduring work with dogged determination while keeping one eye on retirement. However, a few are lucky enough to discover their unique purpose for work — a purpose that uniquely matches their interests and personalities.


Modern Programming Languages
Each of the languages is seemingly designed to take advantage of various platform affordances or work within their constraints. And, as the history of computing has shown us repeatedly, the advent of innovative hardware often leads to a rethinking of language — especially when it comes to the entrenched options (C, C++, Fortran), which are probably not going away anytime soon but might face serious threats from the latest to crash the language party.


More data-wiping malware found in Iran
Maher Center described the new threat as a targeted attack, but said that it has a simple design and is not similar to other sophisticated targeted attacks previously seen in the region. "Despite its simplicity in design, the malware is efficient and can wipe disk partitions and user profile directories without being recognized by anti-virus software," the center said in its advisory.


Incentive-based pricing models for your next IT outsourcing contract
The strength of the gain sharing pricing approach, Martin said, is that even without a contractual obligation, the provider still has an incentive to identify these kinds of cost-reduction measures because they ultimately benefit the provider in the form of improved margins.


The Role of Analytic Databases in Modern BI Architectures
In the year ahead we will see how vendors (and their customers) will choose to adopt the integration of multiple data stores for BI and how modern BI architectures will evolve over the next several years in companies leveraging Hadoop. Likewise, the ongoing balance of semantics as part of the modern BI architecture – with in-database federation, data virtualization and BI services layers – will continue to be increasingly important for BI development methodologies.


Insurers Need CDOs to Maintain a Modern Enterprise
Converting data to information, and then to actionable analytics and modeling, is the next competitive frontier in the insurance industry. The CDO could drive this conversion by creating an ‘Information Strategic Plan’ that would clearly articulate the ultimate vision for information usage in the organization. He or she would translate that vision into action steps.


SSD prices continue to plunge
Dynamite Data said it has monitored the price, rebate and stock status of more than 600 individual SSDs at hundreds of e-commerce merchants over the past three years. In August, it noted in a blog post that SSDs had finally broken the "magic" $1-per-gigabyte price point, proclaiming it "the new normal."


How much money will top tech firms make from mobility next year?
The study suggests that over 2013, Google will generated approximately $4 billion in mobile advertising revenue. Google's mobile ad revenue is predicted to jump 84 percent in 2013 from a predicted figure of $2.2 billion this year, and reach $6.33 billion in 2014, mainly through the tech firm's search and advert business.


IBM: Computers Will See, Hear, Taste, Smell and Touch in 5 Years
The five senses are really all part of one grand concept: cognitive computing, which involves machines experiencing the world more like a human would. For example, a cognizant computer wouldn't see a painting as merely a set of data points describing color, pigment and brush stroke; rather, it would truly see the object holistically as a painting, and be able to know what that means.


Data Decisions: You Can’t Be Held Responsible (Or Can You?)
In other words, what happens when a strategy goes awry, a product flops or investors lose money? Can data analysts be held accountable? Data mining newsletter KDNuggets asked its readers the question: Should data scientists/data minters be responsible for their predictions? Its results are here.



Quote for the day:

"Vision is a picture of the future that produces passion." -- Bill Hybels

December 17, 2012

10 skills for developers to focus on in 2013
Software development had a few years of relative calm. But now the rollercoaster is back on track and it’s picking up speed, as HTML5 gains a foothold and Windows 8 threatens to significantly change the Windows development landscape. If you want to stay ahead of the curve, you should consider learning at least a few of these 10 software development skills.


Public Cloud Services Will Gain New Momentum in 2013
Over the 2012–2016 forecast reporting period, IDC believes that public IT cloud services will enjoy a compound annual growth rate (CAGR) of 26.4 percent, that's five times the traditional IT industry, as more business leaders accelerate their shift to the cloud services model for IT applications.


Last chapter for e-readers?
Analysts are sounding a proverbial death knell for e-readers, which have declined 36% in 2012 as buyers turned instead to multi-use tablets. Both IHS Suppli and IDC recently issued dire warnings, if not obituaries, for e-readers. IHS said Monday that e-readers will see a 36% drop in shipments to retailers in 2012 over last year, and another 27% contraction in 2013.


Financial Platform Hits 500,000 Transactions Per Second
The platform uses ”in memory” matching atop of GigaSpaces’ XAP solution, running the application in a pure data and compute GigaSpaces grid with no database attached. The tests were conducted with Intel Xeon Processor E7 family, at Intel’s Computing lab in Reading, United Kingdom


Is the cloud the right place for your data warehouse?
Forward-looking businesses that have already embraced Amazon's cloud may move more quickly to the cloud for services like data warehousing, whereas larger enterprises that have been slow to jump into the public cloud may test the service on a use-case basis to see if it's the right fit for them.


SaaS integration costly and challenging
Sabharinath Bala, research manager of enterprise applications at IDC Asia-Pacific, said companies increasingly prefer a hybrid IT environment which combines existing on-premise software withSaaS applications. To facilitate integration, these SaaS vendors would offer a number of connectors or adaptors in their software to traditional applications, he noted.


Four Lessons From the Best Bosses I Ever Had
Guide your people's passion and get out of the way: the autonomy and freedom I was given to create and do my job exponentially increased my passion, excitement and success. ... Many companies treat their employees as employees — nicely and kindly, even generously — but not as humans.


A List of Data Science and Machine Learning Resources
Every now and then Matt get asked for some help or for some pointers on a machine learning/data science topic. He use to respond with links to resources by folks that I consider to be experts in the topic area. Over time his list has gotten a little larger so he decided to put it all together in a blog post. I am sure this will be of use for many of you.


FortiGuard Labs’ 2013 Top Threat Predictions
Fortinet, a high-performance network security player revealed FortiGuard Labs’ 2013 threat predictions, highlighting six threats to watch out for next year.


ReactiveUI 4.2 is Released!
In ReactiveUI 4.2, View Bindings automatically support conversions between types. This feature is analagous to the IValueConverter class in XAML bindings.These converters are registered using Service Location (RxApp.Register), and custom ones can be easily registered as well. In WPF, theTypeConverter framework is used to convert between many common types.



Quote for the day:

"The man who does things makes many mistakes, but he never makes the biggest mistake of all - doing nothing." -- Ben Franklin

December 16, 2012

Problems – An Opportunity for Radical Innovation
Rowan Gibson writes in his blog ... I see this same ‘problem as opportunity’ attitude when I talk to Indian companies of every stripe. When I asked one CEO recently about the impact of the weak Dollar on his business, his reply was stunningly upbeat. “Oh,” he said with a grin, “that really works in our favor. It’s going to make it much easier for us to expand in the U.S. market. Now we can buy up American companies at bargain basement prices”.


Why IBM and Intel Are Chasing the $100B Opportunity in Nanophotonics
The idea behind Nanophotonics (or Silicon Photonics) is actually quite simple: take the world’s fastest communication technology (light), and build it directly into semiconductor chips using well-known and massively scalable production processes.


Effective vs Ineffective Security Governance
Comparing and contrasting a set of behaviors and actions is useful to further illustrate effective versus ineffective security governance. Sometimes the absence of a quality, value, or cultural norm is a more revealing indicator than its presence.


Google Shuts Down Shopping Service for China
"Shopping in China was not providing businesses with the level of impact we had hoped, so we will be sunsetting it in order to focus on the products that do," the company said in a statement. Google will instead devote more resources to its advertising services for apps and search, and connecting Chinese suppliers with overseas customers with tools including its Global Market Finder.


Welcome to the Converged Future of Cloud
Disruption comes in all shapes and sizes. Sometimes, you can't even see it. Regardless, a cool name doesn't hurt a disruptive force, and can actually enhance its impact. Such is the case with the mCloud Helix, a wild-sounding mechanism that offers a bold promise: private cloud in a box. Granted, the cloud is all about servers, so in-and-of-itself, this offer isn't terribly novel. But when you peek under the covers, coolness does appear.


The Rewards of Ignoring Data
Can you make smarter decisions by ignoring data? It certainly runs counter to our mission, and sounds a little like an Orwellean dystopia. But as we’re going to see, ignoring some of your data some of the time can be a very useful thing to do.


DotNetNuke 7 with Active Directory and SharePoint Lists
DotNetNuke 7 provides support for active directory authentication and includes a SharePoint connector which enables fast and secure publishing of SharePoint documents to websites, intranets and extranets. In an exclusive interview to InfoQ, Richard Dumas, Senior Director of Product Marketing, DotNetNuke Corp shares his views about the features included with the recent release.


Entity Framework 6: Alpha2 Now Available
The Entity Framework team recently announced the 2nd alpha release of EF6. The alpha 2 package is available for download from NuGet. Since this is a pre-release package make sure to select “Include Prereleases” in the NuGet package manager, or execute the following from the package manager console to install it:


So What If You Have Big Data? Without Data-Driven Processes And Products, It’s Useless
You don’t win gold medals just for having data. The real winners are those like Amazon and Netflix that find ways to leverage their data better than the competition. Without a game plan to turn your data into revenue, you may as well scrap your badass Hadoop cluster and the petabytes of data it contains.


How to Become a Morning Person
This is not like trying to become a professional basketball player if you are only 5'6" tall. This is more like trying to change a belief system and a set of habits. You can do it if you are intentional. “Morning people” tend to make more money, be more productive, be healthier and live longer and be more happy and satisfied in their lives.



Quotes for the day:

"Very few of the great leaders ever get through their careers without failing, sometimes dramatically." -- Philip Crosby

"Leadership is a matter of having people look at you and gain confidence in how you react.If you're in control,they're in control" -- Tom Landry

December 15, 2012

Official document reveals the rules of Oracle's cloud
Customers should be mindful of other policies, such as one that allows Oracle to turn off access to accounts in the event of a dispute or account violation. "Customers may want to get clarity on the type of incidents that would result in a temporary turn-off of service," Wang said.


A decision maker's guide to organizational records management strategy
In the past, unless you were being sued or were part of some niche industry, records management strategy was often left on the back burner. ... "A lot of organizations don't do a very good job of it, if they do anything at all," said Jim Just, a partner at Imerge Consulting Inc., about the lack of respect for records management. "They just sort of let it roll along at its own impetus. They need to get control of it, and they are starting to realize it."


Computing and the Law: The America Invents Act
The twelfth in a series of articles in Computer magazine provides basic information on legal issues facing people and businesses that operate in computing-related markets discusses employment law issues faced by new companies.


SMS stealing apps uploaded to Google Play by Carberp banking malware gang
Several malicious Android apps designed to steal mobile transaction authentication numbers (mTANs) sent by banks to their customers over SMS (Short Message Service) were found on Google Play by researchers from antivirus vendor Kaspersky Lab.


With JOBS Act, Sarbanes-Oxley compliance likely won't get easier
With the arrival of the JOBS Act, Sarbanes-Oxley compliance requirements are bound to change, or are they? As with many compliance questions, the answer is, “It depends.” In this tip, we'll first take a look at the general provisions of SOX as they apply to IT controls, and then, in that context, discuss the impact of the JOBS Act.


Cybersecurity firm identifies ‘credible threat’ to 30 U.S. banks
The report, scheduled to be released Thursday by McAfee Labs, warns the financial industry to be wary of software that creates fraudulent online banking transactions. Hackers could create fake bank transactions, or skim a portion of high-dollar bank transfers, the report said.


Dell software aims to automate mobile device management
The Dell KACE K3000 Mobile Management Appliance combines the new software with a rack-mounted Dell server. The K3000 appliance handles jobs such as over-the-air provisioning of iOS and Android smartphones and tablets, enforcing through user profiles a range of security and management policies, tracking hardware software inventories and managing distribution of enterprise mobile apps.


Why You Must Develop the Right Talent Channels
At an early stage company, hiring is the CEO’s job. It should not be outsourced, delegated or de-prioritized. The assumption is that the CEO has defined company culture and is hiring within that cultural norm. As Brad Feld wrote, focusing on cultural fit is a must. ... The CEO probably should be spending between 40% and 70% of their time hiring in the early stages.


The role of software-defined networks in cloud computing
Given the elasticity of views about what a software-defined network is, it's hardly surprising that SDN's specific role in the cloud is elusive. There are two software-defined networking models and two different SDN missions in cloud computing. Since networks create the cloud, managing the interplay between these two factors could be the key to cloud efficiency and success.


IT Outsourcing Hits Nine-Year Low In Q3
The U.K.-based research group pegged the total contract value of deals signed worldwide during the period at $18.9 billion, down 33% from the same time a year ago.The analyst blamed the tech services downturn on the weak global economy. Looking to the fourth quarter, "There will need to be a significant upturn in both TCV and deal volume if last year's performance is to be matched," said Thomas.



Quote for the day:

"It is a mistake to look too far ahead. Only one link in the chain of destiny can be handled at a time." -- Winston Churchill