December 31, 2012

Brief Introduction to Aspect Oriented Programming
Aspect Oriented Programming, or AOP, refers to this type of functional requirements as cross-cutting concerns and is designed specifically to address this issue: if such requirements are met by coding the cross-cutting concern into objects throughout the system, we can easily end up with a messy, hard-to-maintain implementation split across many objects.


Would You Want To Use Your NFC-Enabled Phone As Car Keys?
Hyundai's Connectivity Concept, which won't actually go into production until around 2015, aims to harness the power of your NFC phone to make it way cooler than your keys ever were. Not only could the phone unlock your car and start it, but it could also save a sort of user profile, flipping to the right radio station or streaming music while adjusting the seat and mirrors for you as soon as you slam it into the dashboard dock.


Building a Business-Aware Cloud Solution
There are three key areas that enable business awareness. The business process area includes the business functions, related-activities, and the individual tasks that must be performed in order to generate the desired business results. The business role(s) area includes the concatenation (grouping) of business activities into responsibilities that can be competently accomplished. Finally, business awareness also requires an understanding how an industry operates and how it is influenced by local, national and global economics.


How to Handle a Manipulative Employee
Most employees really do want to do a good job, but sometimes you run into a few who would rather not bother. Here are five phrases that serve as "warning signs" that an employee is trying to manipulate you, along with advice on how to turn the tables.


Sure, Big Data Is Great. But So Is Intuition.
Claudia Perlich, chief scientist at Media6Degrees, an online ad-targeting start-up in New York, puts the problem this way: “You can fool yourself with data like you can’t with anything else. I fear a Big Data bubble.” The bubble that concerns Ms. Perlich is not so much a surge of investment, with new companies forming and then failing in large numbers.


5 Reasons 2012 Was a Great Year for Linux
The end of the year is always a good time to take stock of where things stand in any niche or field, and Linux is no exception. There's no doubt that there have been challenges for the free and open source operating system over the course of 2012--the Secure Boot challenge A comes immediately to mind--but so, too, have there been numerous successes.


The Most Misunderstood Aspect Of Great Leadership
A leader simply operates at their best when they understand their ability to influence is much more fruitful than their ability to control. Here’s the thing – the purpose of leadership is not to shine the spotlight on yourself, but to unlock the potential of others so they can in turn shine the spotlight on countless more. Control is about power – not leadership. Surrender allows a leader to get out of their own way and focus on adding value to those whom they serve.


Why Wasn’t 2012 The Year Of The G-Cloud?
Despite the tidal wave of interest in the Cloud, CloudStore, the government’s new initiative for procuring cloud services, also known as the G-Cloud, has been slow to catch on since its launch in February 2012. Considering its anticipated benefits, including ease of sourcing and procurement which offer a projected savings of up to £180 million by 2015, the government is hoping this is simply a matter of being slow off the starting block. This article looks at who is actually using G-Cloud, who isn’t and why not.


Is cloud threat for SMB channel partners?
According to Miglani, cloud computing cuts two ways for small SMB channel partners. It allows them to offer new kinds of services and solutions to their SMB customers without having to incur high initial capital expenditures. But automated service delivery via the cloud will also reduce the need for internal IT staff. As a result, SMB channel partners could lose more than 200,000 IT jobs over the next decade, said AMI Partners’ recent Cloud Computing Research studies.


Simon: Open-Source Speech Recognition
After years of hard work, the Simon team is proud to announce the new major release: Simon 0.4.0. This new version of the open source speech recognition system Simon features a whole new recognition layer, context-awareness for improved accuracy and performance, a dialog system able to hold whole conversations with the user and more.



Quote for the day:

"The ability to summon positive emotions during periods of intense stress lies at the heart of effective leadership." — -- Jim Loehr

December 30, 2012

Optimizing the cloud for the BYOD movement
Bring your own device (BYOD) policies complicate cloud because they limit a company's ability to optimize application delivery to a single platform -- a major benefit of cloud adoption. There are ways, however, to optimize the cloud so enterprises don't have to choose between either a cloud project or BYOD.


BPM Patterns & Practices in Industry
Download this complimentary whitepaper to find out how Financial Services, Communications, Utilities and Retail customers have adopted business process management, employed best practices, and addressed the pertinent process challenges within their industry to deliver relevant business value.


Resilient Systems - Survivability of Software Systems
What is important to understand about resilience is that failure is expected and is inherent in any systems or processes, which might be triggered due to changes to the platform, environment and data. While Reliability is about the system’s robustness of not failing, Resilience is its ability to sense or detect failures ahead and then prevent it from encountering such events that lead to failure and when it cannot be avoided, allow it to happen and then recover from the failure sooner.


Risk Management Resolutions for 2013
Risks today are interconnected and horizontal, running across departments and business units. In conversations with CEOs, board members and banking executives, there are a few key overlapping risk areas that are most top of mind going into 2013.


Persistence is the Key
Calvin is a C++ persistence library or framework that allows programmers to easily save and load objects using keys. Objects are associated with a user configurable type of key that can be used to name objects specifically and save them or load them by that name. This feature is the primary distinguishing difference between Calvin and the many other persistent libraries.


5 enterprise cloud predictions for 2013
The mega Internet sites and applications are the new era enterprises. These will become the role models for the traditional enterprise. IT needs remain the same with regards to scale, security, SLA, etc. However, the traditional enterprise CIO has already set the goal for next year: 100% efficiency.


The Worst Security Mishaps of 2012
Every year security breaches have been of great annoyance to corporate and enterprises. And this year, there was not much of a difference. The year 2012 was of total mayhem. From hacker exploits to bad corporate behavior, 2012 was simply a plethora of security breaches. With that in mind, let’s take a look at some of the worst mishaps that marked in the year 2012.


Tools for Building Advanced Media Applications
In the recently concluded //Build/, Mike Downey, Principal Evangelist, Media Platform at Microsoft examined the tools and frameworks that are responsible for the development of Windows 8 apps that feature advanced media playback functionality such as streaming, DVR controls, advertising, and closed captioning. He also demonstrates the role of Microsoft Media Player Framework, which is employed behind the scenes for various live online streaming events.


Reduce Your Breach Risk: File Integrity Monitoring for PCI DSS Compliance and Data Security
This paper discusses the importance of file integrity monitoring (FIM), which facilitates the detection of attacks by cybercriminals, as well as insider threats that may result in costly data breaches. It also discusses file integrity monitoring as a critical component of Payment Card Industry Data Security Standard (PCI DSS) compliance, and shows how NetIQ addresses both security and compliance challenges through the NetIQ Identity and Security Management family of products.


5 Epic Tech Fails in 2012
Google+ leads tech journalist John Brandon's list of this year's five worst technology failures for its inability to gain traction as a social media service even as Facebook and Twitter continue to boom. 3D projectors also made the list for becoming a clunky tool at business meetings instead of a slick one, as did Bluetooth watches for doing the same things the smartphones already do. Rounding out the end of the list were Klout scores and Dropbox



Quote for the day:

"A good plan violently executed now is better than a perfect plan executed next week." -- George Patton

December 29, 2012

Private cloud computing planning from concept through deployment
Creating a blueprint on what your company expects to get out of cloud computing, getting buy-in from all departments, automating IT workloads, and transitioning to a self-service model are the initial steps in creating a private cloud. But the journey doesn't stop there. Let's take a look at the five final steps, including initiating chargeback, bolstering security and monitoring cloud performance, to help you with planning so you can create a fully functioning private cloud in your enterprise.


What Is a Real-Time Enterprise?
Originally the term real-time was only applied to systems that were reactive within a given time frame. They had very definite operational constraints. So, process control systems which might, for example, be controlling the speed of a production line had to make specific decisions within a given time frame. If they were too slow, the whole operation would grind to a halt, so speed of execution was critical.


Apache Crunch: A Java Library for Easier MapReduce Programming
Crunch provides a library of patterns to implement common tasks like joining data, performing aggregations, and sorting records. Unlike those other tools, Crunch does not impose a single data type that all of its inputs must conform to. Instead, Crunch uses a customizable type system that is flexible enough to work directly with complex data such as time series, HDF5 files, Apache HBase tables, and serialized objects like protocol buffers or Avro records.


How to Effectively Audit Your IT Infrastructure
Native Microsoft auditing tools lack the abilities of convenient tracking and ongoing review of changes in systems and applications putting organizations at risk of losing control over security. Unauthorized, unwanted, and malicious changes in an IT infrastructure can have tremendous impact on business continuity and predictability.


Storage and PaaS shine in cloud computing adoption spotlight
Cloud computing adoption goes far beyond the choice of public, private or hybrid models. Enterprise IT pros and administrators also need to decide on the specific services each cloud model provides. And certain trends are starting to emerge with regards to how IT departments are utilizing cloud services. Storing data in the cloud, as well as SaaS and PaaS, are the clear winners so far.


Data Center Power: Zooming in Where it Matters
By shifting attention from the cooling systems to the servers which account for the majority of the power consumed in the data center, managers can introduce a holistic energy optimization solution. Accurate monitoring of power consumption and thermal patterns creates a foundation for enterprise-wide decision-making with the ability to Monitor and analyze power data by server, rack, row or room, Track usage for logical groups of resources that correlate to the organization or data center services ...


Imperfect leadership
So if you focus on perfection, you will get discouraged, because perfection seldom happens and never happens for long. Or you will choke, trying too hard. Or you might freeze, engulfed by fear. Aim for perfection and bank on discouragement, dissatisfaction, broken relationships, frustration and worse.


Google's Enterprise Chief: We're Going To Grab 90% Of Office Users Away From Microsoft
Google ramped up its enterprise business in several ways this year. It launched a full-on "infrastructure-as-a-service" cloud, Compute Engine, that competes head on with Amazon Web Services and Microsoft Azure. It introduced Drive, which let's Google App users store any type of document in the cloud. It eliminated the free version of its Google Apps, and is now charging companies with 10 employees or less. It launched the next-generation of Chromebooks and introduced its first ever PC-like device for businesses, the Chromebox.


IDC Sees US Public IT Cloud Services To Top $43 Billion by 2016
Revenue for US public IT cloud services will grow from $18.5 billion in 2011 to $43.2 billion in 2016, according to a report by International Data Corporation (IDC). The report focuses on the public cloud services that are shared among unrelated enterprises and consumers and that are designed for a market, rather than just one enterprise.


The C# Memory Model in Theory and Practice
This is the first of a two-part series that will tell the long story of the C# memory model. The first part explains the guarantees the C# memory model makes and shows the code patterns that motivate the guarantees; the second part will detail how the guarantees are achieved on different hardware architectures in the Microsoft .NET Framework 4.5.



Quotes for the day:

"Leadership is an opportunity to serve. It is not a trumpet call to self-importance." -- J. Donald Walters

"Pick battles big enough to matter, small enough to win." -- Jonathan Kozol

December 28, 2012

The Power of Business Rules Management
The use of these Business Rules Management Systems(BRMS) to support the practice of decision management to automate and manage high-volume, transactional decisions is growing rapidly. A new standard, called the Decision Model and Notation standard, is under development that will bring consistency of representation to the industry.


One-on-one with Randy Bias: Cloud standards and the battle for control
In this one-on-one interview, Randy Bias, co-founder and chief technology officer of open source cloud infrastructure provider Cloudscaling, talks about the lack of cloud standards among providers and how today's cloud computing service provider patchwork will ultimately give way to a more uniform cloud universe.


Is culture your company’s most important asset?
Most managers can easily reframe key messages in ways that demonstrate care, that encourage employees, and that make employees feel heard and valued. The trick is to invite employee opinion, then refine behaviors to better serve their needs — and, in the process, create a safe, inspiring work culture.


Analysis: Amazon, Google on collision course in 2013
"Amazon wants to be the one place where you buy everything. Google wants to be the one place where you find everything, of which buying things is a subset," said Chi-Hua Chien, a partner at venture capital firm Kleiner Perkins Caufield & Byers. "So when you marry those facts I think you're going to see a natural collision."


It's "locking" if it's blocking
"Atomic" (only) means that nobody will mess up the state midway through the operation. "Atomic" doesn't mean, for example, that a single instruction is used - in fact, often it's not the case. Nor does "atomic" imply "lock-free". An implementation of atomic addition could legitimately use:


Wearable Computers the Size of Buttons to Monitor Health
In just the latest of many recent developments, the University of Texas at Dallas, in a new press release, notes that patients who require continuous observation of their medical condition—for example, to see if they're taking their medications on time—could benefit substantially from button-sized wireless computers to monitor a person’s health.


Better Integrate IT Risk Management With Enterprise Risk Activities
"By aligning IT GRC with its cousins in financial and legal GRC, organizations can accelerate GRC program growth and maturity to better realize the value of information risk management and its disproportionately high impact on operational risk management," says Ben Tomhave, senior consultant for security consultancy LockPath.


How to choose between scale-up vs. scale-out architectures for backup and recovery
More and more organizations are reducing or eliminating the use of tape by deploying disk-based appliances that use deduplication. But the architectural approach used by the appliance vendor can make a significant difference to the performance, scalability and total cost of the selected solution.


A Proposal to Enhance the UML Notation
Requirements and test cases, in particular acceptance tests, are strictly related. Agile methodologies highlight this aspect basing themselves on test driven approaches. The notation of UML use cases may be enhanced in order to allow enhanced UML tools to properly handle links between use cases and tests.


Are project forecasters “fools or liars”
“Estimates are commonly poor predictors of the actual value and viability of projects, and cannot be trusted as the basis for informed decision-making,” Professor Bent Flyvbjerg says. “These forecasts frequently misinform decision makers on projects instead of informing them. Some of the inaccuracy comes from genuine forecasting mistakes arising from over-optimism, but some estimates are deliberately misleading, designed to secure financial or political support for a project.”



Quote for the day:

"A good leader is a person who takes a little more than his share of the blame and a little less than his share of the credit." -- John C Maxwell

December 27, 2012

Emerging Enterprise Architecture Drives 10 Trends for 2013
The driving force behind the top trends of 2013 is the continued, and accelerating, emergence of the Boundary-free Enterprise™ - a framework and architecture based on loosely-coupled IT and Business services, technologies, and operations that are in turn enabled and driven by Cloud-based innovation.


Is the public cloud the best place for legacy applications?
If an application is due for a refresh, why settle for just a facelift via an incremental hardware upgrade or new GUI? Instead, why not go whole hog and re-platform the application on a state-of-the-art cloud platform that delivers scalable performance, flexibility and resilience—not to mention an operational expenditure (opex) rather than capital expenditure (capex) model?


Next-Generation Wi-Fi: As Fast as We'll Need?
The latest generation of 802.11, 802.11ac, is slated to be officially approved by the end of 2013. It's expected to bring further diminution of wired infrastructure within areas such as manufacturing floors and campus uses. The faster 802.11ac technology will also likely boost aggregate performance of legacy Wi-Fi networks, and its wider channels could deliver more data to end devices.


Changing Perceptions of Big Data
Business requirements are moving toward resolving how business wants to use Big Data solutions rather than allowing technical platforms to dictate use cases. The use of the technology platforms is more about how a particular use case in a Big Data initiative should be addressed rather than starting with a technology platform and working out what can be done within its limitations.


Moving to SaaS? Five Considerations for Your Application Integration Strategy
The first few years of this decade have seen consumers develop an unprecedented level of interest in the power of connecting devices. For instance, the integration on a smartphone can be mind-boggling. Your phone, camera, email, contacts, calendar, Internet searches, mapping software and even social networks and restaurant review applications are all connected. Integration is seamless, personal and transparent.


How To Handle Personality Conflicts At Work
At some point in our professional lives, most of us will have to deal with people we just don’t like or can’t seem to get along with. A clash of personalities is most likely at the root of these conflicts. Despite our best efforts, we sometimes just can’t seem to make it work. The unfortunate result is that the quality and enjoyment of our work suffers, and our stress levels skyrocket. In most cases when personality conflicts happen in the workplace, the entire team is disrupted as well.


BookLog: The Dip by Seth Godin
Every new project (or job, or hobby, or company) starts out exciting and fun. Then it gets harder and less fun, until it hits a low point-really hard, and not much fun at all. And then you find yourself asking if the goal is even worth the hassle. Maybe you’re in a Dip-a temporary setback that will get better if you keep pushing. But maybe it’s really a Cul-de-Sac, which will never get better, no matter how hard you try.


It's not all about the cloud: Why hybrid ITSM is here to stay
For companies that use some cloud-based applications, or need to cover branch offices and other sites that have few or no IT resources, a cloud-based ITSM offering may well make sense. But for enterprises that run the vast majority of their applications in-house, or that have lots of custom requirements, an in-house ITSM offering is likely the better choice. To cover both, then, enterprises need an ITSM solution that can deal with both worlds; in other words, a hybrid ITSM strategy.


Developing That Connected Space Between The Cloud And Everything Else
Yoics hits on a huge problem. The gap between device manufacturers is enormous. Each smartphone maker has different ways they configure their devices. Further, the cloud in its current form is not meant to accommodate networking between devices and their respective features. And it’s why the definition of that space between the cloud and everything else represents one of the biggest opportunities for the new year and well beyond.


Assessing Risk Management Culture to Better Understand the Characteristics of ERM Programs
“Risk management should be an influencing stakeholder regarding certain compensation decisions, i.e., risk management targets in areas outside risk management and weighting of the risk management segment in balanced scorecards. Additionally, risk management should sign-off on all new product/new business decisions” says Graham.



Quote for the day:

"Nothing can add more power to your life than concentrating all of your energies on a limited set of targets." -- Nido Qubein

December 26, 2012

Strategy Implementation (Balanced Scorecard)
The improvement of the effectiveness of companies’ strategic management process will be maintained by eliminating the disconnection between the formulation of strategy and its effective implementation throughout the organization. The key issues identified for the disconnection are discussed in this article


As BYOD catches on, IT sector gets ready for 1m malicious apps
Reports published by Trend Micro and McAfee maintained that as the number of people bringing their own devices to work turns from a trickle to flood, security challenges from using multiple devices would also multiply. These challenges multiply in the face of a breakdown of a hitherto homogenous computing culture dominated by Windows and Blackberrys.


How IT Pros Can Improve Their Interpersonal Skills
Remember that the "suits" and "techies" are going to mix about as well as oil and water. That's OK. They don't have to best friends and get together every weekend for a barbecue or Star Trek marathon. But those differing cultures can't be used as an excuse to avoid working together. Consider having IT employees shadow department managers at work to become more comfortable interacting with them.


Apache Camel: Enterprise Integration Patterns
Camel supports most of the Enterprise Integration Patterns from the excellent book by Gregor Hohpe and Bobby Woolf. If you are new to Camel you might want to try the Getting Started in the User Guide before attempting to implement these patterns. The EIP icons library is available as a Visio stencil file adapted to render the icons with the Camel color : sand.



Digital Citizens Group Focuses on Internet Safety
The new Digital Citizens campaign, launched Thursday, will also strive to shed light on the online sale of counterfeit goods, including prescription drugs, and on pirated Web content, said Tom Galvin, executive director of the new group. Digital Citizens will investigate online scams by showing how people can get fooled -- for example, one of the first projects will be to purchase counterfeit drugs from online pharmacies, he said.


The Employee-Motivation Checklist
Through many years of research, trial and error, and working with companies of all sizes in numerous industries, Dave has identified 16 critical ways to motivate your employees, which are listed in this article. Learn these techniques and adapt as many as possible in your business.


10 predictions how cloud computing will transform traditional IT in 2013
Kevin and Cary predict IT will undergo 10 transformational, cloud-related impacts in 2013 -- effects so massive that they will be the most fundamental changes to the way businesses and governments have approached technology in the past 25 years:


India aims for world's big data
In its report "Big data: The next big thing", Indian IT services industry group Nasscom expects the country's big data industry to grow from US$200 million in 2012 to US$1 billion in 2015. The biggest challenge--and opportunity--is to satisfy the demand for data scientists. Avendus Capital, for one, estimates the United States will suffer a shortage of up to 200,000 data scientists by 2018, a gap that will most likely be filled by outsourcing.


Nine Forms of Analytics Data That Matter the Most
Big Data takes a lot of forms and shapes, and flows in from all over the place – from the Internet, from devices, from machines, and even from cars. In all the data being generated are valuable nuggets of information. The challenge is being able to find the right data needed, and being able to employ that data to solve a business challenge. What types of data are worthwhile for organizations to capture?


IBM unveils IBM Connections, a new social analytics software
IBM has unveiled new software and services that bring the power of big data analytics into the hands of today's social savvy workforce anytime, anywhere. Now, organizations can apply analytics to their social business initiatives, allowing them to gain actionable insight on information generated on networks and put it to work in real-time.



Quote for the day:

"A man without a goal is like a ship without a rudder." -- Thomas Carlyle

December 24, 2012

Cloud-Powered GPS Chip Slashes Smartphone Power Consumption
A Microsoft Research project suggests that there’s a way for location chips inside smartphones to use far less power. Reducing the power consumption of GPS chips could not only extend the battery life of smartphones and tablets, it could also make it practical to add GPS functionality to more devices, including low-power remote sensors.


Excel: Data Model specification and limits
A data model is embedded data inside a workbook that powers data visualizations such as PivotTable, PivotChart, and Power View reports. This article documents the maximum and configurable limits for Excel workbooks that contain data models.


5 myths that hold back brainpower
Deepak Chopra and Rudolph E. Tanzi, explain that new discoveries and new thinking are helping people create a new “relationship” with their brains that help unveil new perceptions and new opportunities. In their latest book, Super Brain: Unleashing the Explosive Power of Your Mind to Maximize Health, Happiness, and Spiritual Well-Being, they explain that people need to acknowledge their roles as “leaders,” “inventors,” ‘teachers,” and “users” to their brains.


The Innovator's Straitjacket
A person in a straitjacket also loses the ability to do many other things, particularly creative tasks that require typing, drawing, manipulating objects, and so on. Even the sanest of companies can unintentionally put themselves in a straitjacket that makes it hard for them to create high-potential new growth opportunities. Here's how leaders unintentionally limit their innovation efforts.


Despite Apple, NFC is catching on -- just not for payments quite yet
Near Field Communication (NFC) is steadily making headway in the U.S. for sharing data and music among smartphones, but the technology faces years of slow growth as a replacement for physical wallets.


India's Lava aims for 100 mobile app patents
In an Economic Times report Sunday, SN Rai, the company's co-founder and director, said: "We have realized just by selling handsets it is not possible to maintain growth momentum. Innovation in product is key to survival. Our wishlist is to make a century of patents in the next 2 to 3 years."


4 Fantastic, Free Things Google Drive Will Now Do For You
Now, however, would be a good time to pay Drive some mind. Google has done impressive work making it easier to keep your files organized, share any file with anyone, and keep everything in your work life one search away. Very specifically, these are the things Drive can do for you at no cost, and requiring just enough effort to remember Drive can do that.


Splunktalk: Getting the Message from MOM
In many respects you can think of MOM as the glue that stitches heterogeneous enterprise computing environments together. Now why am I so interested in this ? Well, MOM and the messages transported represent a massive source of machine data that Splunk can index and resolve into operational visibility on many different levels..core operations , business analytics, transaction tracing etc..


Taking Healthcare IT Seriously Demands Culture Changes
Healthcare is moving cautiously into cloud computing, virtualization, BYOD and other IT innovations. And there's good reason for the caution. Until an organization's IT leaders take meaningful steps to change what's typically seen as a lackadaisical privacy and security culture, the risk of patient-information loss remains high and costly.


Boost up your serialization/deserialization similar to JSON
MessagePack is effectively JSON, but with efficient binary encoding. Like JSON, there is no type checking or schemas, which depending on your application can be either be a pro or a con. But, if you are already streaming JSON via an API or using it for storage, then MessagePack can be a drop-in replacement.


How Object Storage and Information Dispersal Address Big Data Challenges
Object-based storage offers an alternative approach that is ideally suited for storing massive amounts of unstructured data. Object-based storage systems are not organized hierarchically. Instead, an object is identified and located by its unique identifier. This enables the number of objects to grow substantially beyond the limitation of traditional file systems while still maintaining the integrity and consistency of the data



Quote for the day:

"The secret of business is to know something that nobody else knows" -- Aristotle Onassis

December 23, 2012

SANS Netwars Tests Cybersecurity Pros Against Peers
The competition is both educational and fun, said Jorge Orchilles, manager of the infrastructure vulnerability assessment team at Citi Global Security Operations. Orchilles participated in the competition last week and finished in third place in a NetWars competition in 2011.


The CloudTimes Year in Review – And 2013 Cloud Predictions
The question now should focus on what will happen to the data that we store on public clouds by 2013. There are a lot of moves that are supposed to protect our data but we all know that technology is moving faster than legislation. Let’s take a look the possibilities on how public clouds, such as social media, will use our data.


The Leadership Brand: How to Discover Your Personal Brand Persona
To help you discover your brand persona, Todd Nielsen lists twelve of the most common archetypes into which leaders fit and included examples from the 2011 TIME 100 list of leaders. These types vary based on personality, style of leadership and a number of other things.


Does disaster risk management pay?
A new study, published last week in the journal Risk Analysis, provides a new methodology based on Cost-Benefit analysis to assess the economic efficiency of disaster risk reduction efforts in disaster hot spots in developing and emerging economies. Faced with fiscal austerity, many national and international policymakers have increasingly become interested in the economic case for disaster risk management.


BYOD, Enterprise Mobility and Beyond – What to expect in 2013
Interestingly enough for Trend Micro – the company that has made the “Journey to the Cloud” its corporate mantra – Raimund’s top two predictions are not related to the cloud but rather to the inevitable impact of consumer mobile platforms on corporate IT – a topic particularly relevant to the Consumerization blog and to the Enterprise Mobility professionals among us


2013 Will Be Dominated By Mobile, Cloud Developments: IDC
"The IT industry as a whole is moving toward the mobile/social/cloud/Big Data world of the 3rd Platform much more quickly than many realise: from 2013 through 2020, these technologies will drive around 90 percent of all the growth in the IT market," said Frank Gens, Senior Vice President and Chief Analyst at IDC. "Companies that are not putting 80 percent or more of their competitive energy into this new market will be trapped in the legacy portion of the market, growing even slower than global GDP."


European Privacy Watchdogs Examine Microsoft's Services Policies
Microsoft confirmed on Tuesday that it had received a letter from the Article 29 Working Party that it would proceed with a probe. On October 26, the computer giant was notified of a preliminary investigation. The Article 29 Working Party (A29 WP) is made up of the data regulators from all European Union member states as well as the European Data Protection Supervisor (EDPS).


After first-round success, Microsoft accelerator lines up its new start-ups
“Over 300 companies, consisting of 1,000 entrepreneurs, applied to enter the Microsoft Accelerator for Windows Azure, but we could only accept 13,” said Weisfeld. Based on the results of the first group, which began its four-month participation in the first accelerator group last March, the chosen few have a busy — and enriching — future to look forward to, with the new program running from December through March.


Engine Yard Continues Trend of Local Fabric for Public Clouds
Last month, platform-as-a-service (PaaS) provider Engine Yard released a “cloud in a box” that developers can use to test their applications locally before publishing to the public cloud. Multiple cloud providers have now embraced this deployment model as a way to accelerate development while making it easier to try a particular cloud before committing to it.


9 Triumphant Open Source Projects of 2012
The platform namely open source has undergone a profound revolution in recent years as this unique software project has staged itself to be so ample and apt mainly because of its support to challenge the characteristics of similar software from other private vendors like Microsoft. And now with the year 2013 around the corner, let’s take a look at some of the most successful open source projects of the year 2012.



Quote for the day:

"Never be afraid to try, remember, amateurs built the ark. Professionals built the Titanic." -- Anonymous

December 22, 2012

India developing own OS to boost cybersecurity
India currently is dependent on many imported OSes based on Windows and Linux, which are likely to have malicious worms and security issues, DRDO's Director-General VK Saraswat said at the Navigation and Communication (NAVCOM) conference, The Times of India reported Thursday. Hence, it is essential India builds its own operating system, he said.


6 Steps IT Can Take to Bring Business Into Tablet Decisions
Tablets are the darlings of hypermobile employees and business leaders looking to improve their processes. Because each tablet-enabled business scenario is different, only business people--those meeting with customers, inspecting stores or sitting in decision meetings, for example--know what they really need from their tablets.


Designing for Resilience in n-Tier applications
One of the most common problems that we face as support engineers is performance issues. Usually, the problem is explained to us as the application being “slow”, “hanged”, “crashed”, “stopped”… well, you name it really! Depending on who’s talking to you and the amount of information gathered about the problem, usually our first task is determining what are the correct symptoms, which many times it’s a challenge on its own.


A look back at 2012's IT news in video
Smartphones, tablets, hirings and firings were all part of the tech landscape in 2012. In this year's Tech News Review, Computerworld takes a look at some of the biggest stories of the year.


Investing in technology: Setting IT priorities in an uncertain economy
In this video Q&A, filmed at the 2012 MIT Sloan CIO Symposium in Cambridge, Mass., SearchCIO.com Editorial Director Scot Petersen sits down with Richard Soley, CEO at Object Management Group Inc. in Needham, Mass., to discuss investing in technology areas such as cloud computing, big data and mobility.


Amazon Web Services now accommodates big data storage
High Storage, an Amazon Elastic Compute Cloud (EC2) package, is designed to run data intensive analysis jobs, such as seismic analysis, log processing and data warehousing, according to the company. It is built on a parallel file system architecture that allows data to be moved on and off multiple disks at once, speeding throughput times.


8 Must-Read Management Books for the Holidays
These eight books will keep the professional in your life – or your own management career – advancing during holiday downtime. Leadership guru Art Petty recommends you crack the covers of these books to keep your professional development moving forward.


End of an Era as Kodak Sells Patent Portfolio for $525 Million
Specifically Kodak said under the agreements, it will receive approximately $525 million, a portion of which will be paid by 12 intellectual property licensees organized by the consortium of Intellectual Ventures and RPX Corporation. The Los Angeles Times reports that group not only includes Apple and Google, but Microsoft, Research In Motion, Adobe, Samsung and Huawei.


ISACA Issues Guidelines on Managing Cybersecurity, Private Clouds and Data Privacy
Jeff Spivey, CRISC, CPP, international vice president of ISACA and director of Security Risk Management Inc. said, “As more devices utilize IP addresses, increasing the attack surface, cyber criminals will dedicate themselves to increasingly complex attacks in 2013.”


7 Android trends that need to end in 2012
As we get ready to usher in a new year, I thought it'd be a good time to identify some annoying Android trends that deserve to be left behind in 2012. Think of it as my holiday wishlist. The notion of some of these trends disappearing may be a long shot -- but hey, a guy can always dream.



Quote for the day:

"Knowing that you have complete control of your thinking you will recognize the power…" -- Mikhail Strabo

December 21, 2012

Video games to get scrutiny in U.S. gun violence review
Violence in video games and other aspects of pop culture in the U.S. will be among the areas examined as part of an investigation aimed at reducing gun violence in the country. The investigation, headed by U.S. Vice President Joe Biden, has been charged with producing proposals no later than the end of January on legislative action the government could take as it seeks to reduce gun violence.


12 Expert Health IT Predictions For 2013
InformationWeek Healthcare recently offered its own take on the subject. Now we've reached out to CIOs, health IT professionals, analysts, bloggers and other HIT heavyweights in a series of email interviews to get their health information technology predictions for 2013. Here's what they predicted


New Analyst Report Rips Agile: Says It's 'Designed To Sell Services,' a 'Developer Rebellion Against Unwanted Tasks'
The report includes data supporting what Voke calls the "Agile Dilemma," described as "the inherent risk and confusion created by the business desire for speed and flexibility misinterpreted as a mandate to participate in the developer-centric movement called Agile, which may not be appropriate for all organizations or projects."


2012 Dev Predictions: Hello DevOps and Cloud, Goodbye Single-Language Programmers
"When you build clouds and use cloud components," he said, "you don't just develop anymore; you develop and maintain. These things become living systems, and developers need to understand the use case a little better. They need to get comfortable with the idea of maintaining applications, rather than just building features and functionality.


What Comes First in Good BPM Design?
Clay Richardson blogs: Lately, I've become obsessed with evaluating the linkage between good process design and good experience design. This obsession was initially sparked by the primary research I did earlier this year around reinventing and redesigning business processes for mobile. The mobile imperative is driving a laser focus for companies to create exceptional user experiences for customers, employees, and partners.


Cisco IP Phones Vulnerable
“Once in, the attacker can use the phone’s microphones to stealthily exfiltrate audio data at any time, regardless of whether a phone call is in progress,” says Ang Cui, one of the Columbia computer scientists who discovered the vulnerability. The hacked phone can then infect other phones on the same network and attack connected computers and devices such as printers, he adds.


Teradata Offers Free Big Data Training
The free courses allow students to study to become either a Teradata Certified Professional (for those seeking IT careers) or Certified Associate (for business-oriented types who want a conceptual understanding of Teradata technology). The online information includes assignments, articles, case studies, PowerPoint presentations, research reports, software and other materials.


SDN Revenues to Hit $3.7 Billion by 2016: IDC
In a Dec. 19 report, IDC analysts said SDN revenues driven by sales to enterprises and cloud service providers will hit $360 million in 2013, and will grow to $3.7 billion by 2016. Those numbers includes sales of everything SDN-related, from the associated network infrastructure and applications to control plane solutions and professional services.


Can we create a Silicon Valley in India?
Over the last 50 years, Stanford faculty, staff and graduates have launched nearly 1,200 companies. More than 50 percent of Silicon Valley’s products come from companies started by Stanford alumni —and that excludes Hewlett-Packard, one of the Valley’s largest firms. Here is a round table discussion with the dean of Stanford on what does India need to do to come up with it's own Silicon Valley?


The 10X Developer in You
These creatures eschew laws of nature, compared to average Joe Programmer they produce more high quality work in less time. But are they really some special superhero? Born with a keyboard in their hands, mind made of linear algebra and visualising complex systems before they can walk? Or just normal people with an opportunity to actually¬†work?



Quotes for the day:

"Every really new idea looks crazy at first." -- Abraham H. Maslow
"It is better to know some of the questions than all of the answers." -- James Thurber