January 04, 2013

Debating international cyberespionage, poor secure coding practices
In this video, conducted at the 2012 (ISC)2 Security Congress in Philadelphia, Schou discusses why international cyberespionage and corporate intelligence gathering are inextricably linked. Schou also discusses other secure coding practices and his concerns about cloud computing security, as well as why the security community must do a better job teaching the importance of secure software development practices.


Historians versus Futurists – Who is More Valuable?
Futurists enjoy taking out their crystal ball and projecting future innovations, but they are typically wrong. For example, George Orwell’s book, “1984,” which was published in 1949, did not come close with its projections. And in the 1960s, I recall a Walt Disney television show describing automobiles that required no driver and were guided by a magnet-like strip imbedded in the street’s or highway’s roadbed. Nice try.


Ultimate guide to SSDs (plus reviews of 7 new drives!)
Many vendors sell SSDs, but the devices are far from equal. Flash memory and controller technology have both advanced so quickly that what was fast last year is now second-class. The drives you might find in the bargain bin will be faster than a consumer-grade mechanical hard drive, but they won't deliver the astounding performance boost you'll be looking for after you read this article.


Google must change search business practices after FTC decision
The Federal Trade Commission handed down a full bag of decisions in its antitrust investigation of Google during a press conference on Thursday. Essentially, Google is going to have to make a number of changes to its business practices -- especially regarding search.


Biggest concerns of cloud adopters
A study shows that enterprises are most concerned over vendor lock-in and portability. The study initiated by HP reveals that over 60% of senior business and technology executives surveyed are concerned about vendor lock-in when implementing cloud solutions, while 72% of respondents feel portability of workloads between cloud models is important when implementing cloud solutions.


Meaningful Use, Data Quality and Data Access – Three Sides of the Same Coin
Richard Cramer, Informatica's Chief Healthcare Strategist had the privilege to be invited to testify to the Health I.T. Policy Committee workgroup on the topic of data quality. Through this blog, he shares the testimony that he presented in which he raises questions about metrics & standards for data quality, the trustworthiness, completeness and accuracy of clinical DBs and how important is data quality for an attestation program.


‘Mere operational efficiency won’t cut it, IT needs to do more’
First, they needed IT to automate and streamline manual operations for improved efficiency. Now, they want it to drive business growth. A global survey of C-class executives and business managers has revealed businesses—while happy with the efficiency IT brings to their operations—want IT to help them identify new growth opportunities.


UK to launch public cyber security awareness campaign
Marking the strategy’s first anniversary last month, minister for the Cabinet Office, Francis Maude, said business and government needed to continue to educate customers so that everyone using the internet is better informed of the potential risks and how to protect themselves online. The new programme is aimed at raising public awareness about threats online and where to go for more information.


IDC Estimates Shed Light on Cloud Skills Gap for IT
According to an IDC (News - Alert) report sponsored by Microsoft Corp., through 2015, with as many as seven million cloud-related jobs available worldwide, the demand for cloud-ready IT workers will grow by 26 percent annually. Cloud computing has already begun changing how IT delivers economic value to countries, industries, and businesses although it is still emerging as a computing style.


Cloud financials and revenue management in 2013
This blog post is the first in a planned series covering various enterprise application categories. What follows below is an overview of the leading SaaS vendors in the category historically known as ERP. Prospective buyers may well use the term to describe what they're looking for. But in today's highly automated, ubiquitously connected business environment, they need much more than conventional ERP has ever delivered.



Quote for the day:

"Success is more a function of consistent common sense than it is of genius." -- An Wang

January 03, 2013


10 CIO considerations for disruptive trends in 2013
With predictions season well upon us, here are ten CIO considerations with regard to the disruptive IT trends in 2013. Rather than predictions per se, these are simply underlying considerations, and in some cases, challenges that CIOs might expect to encounter whilst continuing to leverage the disruptive trends for strategic business benefit across their organizations.


Roundup: high-speed 802.11ac Wi-Fi routers
The ratification process for the next-generation 802.11ac Wi-Fi standard is now up to Draft 4.0, but final approval is still some way off. However, vendors seem confident that no major bombshells will be dropped and that any minor tweaks in the final standard will be addressable by firmware upgrades. Here's a quick overview of three recent launches, all designed for cable/BT Infinity broadband services and based on the same Broadcom BCM4360 chip.


REST vs SOAP
This article is to compare REST vs SOAP. There is huge difference between REST and SOAP. Comparing SOAP and REST is not just right as they are different things. It is like comparing orangutan and octopus, I have high regard for both of them. But still, as it is a popular topic lets have a discussion on SOAP vs REST.


2012: The tech year in cartoons
From SOPA to the Petraeus affair, here's a look at some of the year's biggest IT stories from the pen of Computerworld's editorial cartoonist, John Klossner.


Can Extragalactic Data Be Standardized
According to the authors heading an initiative at TWEA-DC, “As part of the setup of a new Data Center in Taiwan we aim at designing an open-source, distributed solution to enhance data analysis capabilities.” This solution, if it is realized, would create a standardized astrophysical programming language designed specifically for handling vast amounts of other-worldly data.


MDM Does Not Equal The Single Source of Truth
IT missed the point that the business wants data to support a system of engagement. The value of MDM is to be able to model and render a domain to fit a system of engagement. Until you understand and align to that, your MDM effort will not support the business and you won’t get the funding. If you somehow do get the funding, you won’t be able to appropriately select the MDM tool that is right for the business need, thus wasting time, money, and resources.


Five things you should know about Google Analytics
Google Analytics is an advanced technology which can help you measure how your company’s online marketing and presence is working. It gathers vast amounts of data and can serve as an EKG for your website so you can skip the supernatural shenanigans and get right to the core of what’s successful and what isn’t. With that in mind, here are five important things to know about Google Analytics.


RiverMeadow Software(TM) Cloud Migration SaaS to Be Offered to VMware Service Providers
RiverMeadow Software™ Inc., developer of the RiverMeadow™ cloud migration SaaS, the world's only automated server migration solution developed specifically for Carrier and Service Provider Clouds, today announced it will offer its cloud migration SaaS to VMware Service Provider Program (VSPP) partners.


Advancing and assessing analytics maturity: part 2
Looking at any analytically-oriented organizational maturity chart it is immediately apparent that the levels are not defined using a uniform set of criteria. Usually classification systems shift definitional requirements when comparing lower levels to higher ones. Since SAS was the first to patent a five-tiered classification system called the Information Evolution Model), Phil Weiss extends that model by proposing these five stages of development:


Ubuntu Linux to run on Android handsets! Who saw that coming?
In surprising news from jolly old England, Canonical announces that Ubuntu has developed an Ubuntu for smartphones and tablets. We'll be able to switch out Android for Ubuntu on many existing devices and the company also hopes that manufactures will ship devices with it pre-installed.



Quote for the day:

"The future belongs to those who believe in the beauty of their dreams. " -- Eleanor Roosevelt

January 02, 2013

IBM DOVE: Big Blue enters the network virtualization battleground
IBM's virtual network overlay technology, called Distributed Overlay Virtual Ethernet(DOVE), will let engineers abstract the physical network infrastructure from hypervisor hosts, so they can make network changes in software rather than hardware. These network instances will better manage and support virtual machines as they migrate within and between data centers.


Big Data --- From Priests to Data Scientists and Back
If you were paying attention over the past few years to the book and subsequent Brad Pitt movie Moneyball and more recently to the Presidential Election in the USA there was a relatively new face in the crowd. That was the face of Nate Silver. He was the brains behind the FiveThirtyEight blog and was generally dismissed by many of the pundits. He proved all of them wrong by using data and his incisive mental skills to slice through the data and build accurate models of how the election work.


Innovation Is About Arguing, Not Brainstorming. Here’s How To Argue Productively
Turns out that brainstorming--that go-to approach to generating new ideas since the 1940s--isn’t the golden ticket to innovation after all. Both Jonah Lehrer, in a recent article in The New Yorker, and Susan Cain, in her new book Quiet, have asserted as much. Science shows that brainstorms can activate a neurological fear of rejection and that groups are not necessarily more creative than individuals. Brainstorming can actually be detrimental to good ideas.


How to Master a New Skill
We all want to be better at something. After all, self-improvement is necessary to getting ahead at work. But once you know what you want to be better at — be it public speaking, using social media, or analyzing data — how do you start? Of course, learning techniques will vary depending on the skill and the person, but there are some general rules you can follow.


Software-defined network technology interest now, future investment
While software-defined networking (SDN) technology seems to be on everyone's minds these days, vendors and customers have only touched the tip of the iceberg when it comes to understanding how software-defined network technology will change the enterprise network.


Will Cisco’s Focus on the Internet of Things Unlock Value
Cisco recently announced that the company plans to double its revenue from software, which is currently at $6 billion. CEO John Chambers said the growth will be mostly organic but will include some acquisitions. Cisco’s original business of routers and switches currently generates almost half of its total revenue. Cisco has already entered in the areas of cloud computing, data centers and applications. The company is aiming for eventually transforming itself into an all-round IT player in the "Internet of Things".


Anonymous: 'Expect us' in 2013
Along with a statement released over the weekend, which stated that the world should "Expect us 2013," the hackers issued a video boasting of cyberattacks which took place last year -- including temporarily shutting down the U.S. Department of Justice (DoJ) and attacks against the Motion Picture Association of America's (MPAA) web site in protest at the closure of file-hosting website MegaUpload.


Israel launches cyber warfare training program
According to The Jerusalem Post's report Wednesday, the program named "Magshimim Le'umit" has been in development for the past three years and targets outstanding pupils aged between 16 and 18 to join up. Israel Prime Minister Binyamin Netanyahu said the country's computer systems are facing attacks from Iran and other countries, and such attacks are set to increase in the digital age. The goverment is also bolstering its ability to deal with these threats through the Israel National Cyber Bureau (INCB), he added.


The Data Explosion: Big Data and Development
Despite all of these challenges, big data could possibly be very useful with its early awareness, real time data and lowered feedback gap. As Global Pulse states “the promise of Big Data for Development is, and will be, best fulfilled when its limitations, biases, and ultimately features, are adequately understood and taken into account when interpreting the data.”


WiX v3.7 - MSBuild, Self Update and Reference Counting
In addition to the creation of Windows installation packages, WiX toolset also includes several extensions which extend the functionality of the toolset such as ability to install IIS web sites, creation of SQL Server databases and register exceptions in the Windows Firewall. With the help of managed and native libraries included with WiX SDK, you will be able to write code that works with Windows installer in both C# and C++.



Quote for the day:

"Success usually comes to those who are too busy to be looking for it." -- Henry David Thoreau

January 01, 2013


9 IT Career Resolutions for 2013
The New Year is almost here. 2012 proved to be a tumultuous year for IT pros and 2013 is looking to be just as challenging. However, the IT job market has been slowly gaining strength and as more companies start growing and adding staff, employees who have been waiting for this turnaround are getting ready to spring into action. Here's CIO.com list of nine career-related resolutions to make for 2013.


Technology teaser: Who will call it right in 2013?
The world didn't end, the turkey has reached the dubious curry stage of its lifecycle, and the the tree has dropped needles all over the shag pile. This can mean only one thing. It is time for part one of the traditional Technology of Business lookahead to what 2013 holds. So select the device of your choice and settle down to find out what our experts have to say.


Enterprise Architecture -- The Missing Ingredient for CIO Success?
The best road to being a successful CIO, in my opinion, is by being a successful enterprise architect. More attention needs to be paid to enterprise architecture by CIOs and those aspiring to be CIOs. Being a great business person, communicator and leader is far from being enough to be a successful and “highest performing” CIO. It is time to embrace enterprise architecture, including the critical role it has to play in IT modernization.


Automatic encryption of secure form field data
Karl Stoney shows a simple method of automatically encrypting hidden form fields that you don't want the user to be able to change, or know the value of. An extension to the HtmlHelper, a custom ModelBinder is used to handle the decryption and also Rijndael encryption is used to secure data . That this is simply one measure to ensure the security of data, and should always validate the action at the code and finally database level, to ensure a secure application!


Microsoft Industry Reference Architecture for Banking (MIRA-B)
MIRA-B, a development and delivery framework that provides clarity on technical capabilities and implementation approaches to support enterprise IT architecture planning, helps financial institutions modularize and align business and technology assets in a predictable way. MIRA-B outlines a roadmap for the future that provides the architectural flexibility to deliver industry solutions on-premise or in the cloud.


IBM’s Reference Architecture for Creating Cloud Environments [Updated]
IBM has recently submitted the IBM Cloud Computing Reference Architecture 2.0 (CC RA) (.doc) to the Cloud Architecture Project of the Open Group, a document based on “real-world input from many cloud implementations across IBM” meant to provide guidelines for creating a cloud environment. Update: interview with Heather Kreger, one of the authors of Cloud Computing Reference Architecture.


4 Reasons Why 2013 Will Be The Year of The Innovator
Times change. Innovation is ripe again. Here are four reasons, apart from competitive pressures, why 2013 will see a surge in intelligent, strong ROI-related innovation writing, thinking and action. It could be your opportunity, too.


Data Center Consolidation and Adopting Cloud Computing in 2013
Cloud computing and virtualization continue to have an impact on all consolidation discussions, not only from the standpoint of providing a much better model for managing physical assets, but also in the potential cloud offers to solve disaster recovery shortfalls, improve standardization, and encourage or enable development of service-oriented architectures.


10 Phrases That Can Resolve Any Conflict
One of the biggest mistakes small-business owners make is trying to avoid conflict. This is problematic because in any capitalistic economy, conflict is not only an inevitable but a necessary part of all business. Through the process of “productive conflict,” companies can grow and become more profitable. The key is to be able to resolve them effectively. Authors of Perfect Phrases for Conflict Resolution Lawrence Polsky and Antoine Gerschel describe the perfect phrases to resolve any conflict.


Defrag Tools: #21 - WinDbg - Memory User Mode
In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen continue looking at the Debugging Tools for Windows (in particular WinDbg). WinDbg is a debugger that supports user mode debugging of a process, or kernel mode debugging of a computer.



Quote for the day:

"Planning is bringing the future into the present so that you can do something about it now" -- Alan Lakein

December 31, 2012

Brief Introduction to Aspect Oriented Programming
Aspect Oriented Programming, or AOP, refers to this type of functional requirements as cross-cutting concerns and is designed specifically to address this issue: if such requirements are met by coding the cross-cutting concern into objects throughout the system, we can easily end up with a messy, hard-to-maintain implementation split across many objects.


Would You Want To Use Your NFC-Enabled Phone As Car Keys?
Hyundai's Connectivity Concept, which won't actually go into production until around 2015, aims to harness the power of your NFC phone to make it way cooler than your keys ever were. Not only could the phone unlock your car and start it, but it could also save a sort of user profile, flipping to the right radio station or streaming music while adjusting the seat and mirrors for you as soon as you slam it into the dashboard dock.


Building a Business-Aware Cloud Solution
There are three key areas that enable business awareness. The business process area includes the business functions, related-activities, and the individual tasks that must be performed in order to generate the desired business results. The business role(s) area includes the concatenation (grouping) of business activities into responsibilities that can be competently accomplished. Finally, business awareness also requires an understanding how an industry operates and how it is influenced by local, national and global economics.


How to Handle a Manipulative Employee
Most employees really do want to do a good job, but sometimes you run into a few who would rather not bother. Here are five phrases that serve as "warning signs" that an employee is trying to manipulate you, along with advice on how to turn the tables.


Sure, Big Data Is Great. But So Is Intuition.
Claudia Perlich, chief scientist at Media6Degrees, an online ad-targeting start-up in New York, puts the problem this way: “You can fool yourself with data like you can’t with anything else. I fear a Big Data bubble.” The bubble that concerns Ms. Perlich is not so much a surge of investment, with new companies forming and then failing in large numbers.


5 Reasons 2012 Was a Great Year for Linux
The end of the year is always a good time to take stock of where things stand in any niche or field, and Linux is no exception. There's no doubt that there have been challenges for the free and open source operating system over the course of 2012--the Secure Boot challenge A comes immediately to mind--but so, too, have there been numerous successes.


The Most Misunderstood Aspect Of Great Leadership
A leader simply operates at their best when they understand their ability to influence is much more fruitful than their ability to control. Here’s the thing – the purpose of leadership is not to shine the spotlight on yourself, but to unlock the potential of others so they can in turn shine the spotlight on countless more. Control is about power – not leadership. Surrender allows a leader to get out of their own way and focus on adding value to those whom they serve.


Why Wasn’t 2012 The Year Of The G-Cloud?
Despite the tidal wave of interest in the Cloud, CloudStore, the government’s new initiative for procuring cloud services, also known as the G-Cloud, has been slow to catch on since its launch in February 2012. Considering its anticipated benefits, including ease of sourcing and procurement which offer a projected savings of up to £180 million by 2015, the government is hoping this is simply a matter of being slow off the starting block. This article looks at who is actually using G-Cloud, who isn’t and why not.


Is cloud threat for SMB channel partners?
According to Miglani, cloud computing cuts two ways for small SMB channel partners. It allows them to offer new kinds of services and solutions to their SMB customers without having to incur high initial capital expenditures. But automated service delivery via the cloud will also reduce the need for internal IT staff. As a result, SMB channel partners could lose more than 200,000 IT jobs over the next decade, said AMI Partners’ recent Cloud Computing Research studies.


Simon: Open-Source Speech Recognition
After years of hard work, the Simon team is proud to announce the new major release: Simon 0.4.0. This new version of the open source speech recognition system Simon features a whole new recognition layer, context-awareness for improved accuracy and performance, a dialog system able to hold whole conversations with the user and more.



Quote for the day:

"The ability to summon positive emotions during periods of intense stress lies at the heart of effective leadership." — -- Jim Loehr

December 30, 2012

Optimizing the cloud for the BYOD movement
Bring your own device (BYOD) policies complicate cloud because they limit a company's ability to optimize application delivery to a single platform -- a major benefit of cloud adoption. There are ways, however, to optimize the cloud so enterprises don't have to choose between either a cloud project or BYOD.


BPM Patterns & Practices in Industry
Download this complimentary whitepaper to find out how Financial Services, Communications, Utilities and Retail customers have adopted business process management, employed best practices, and addressed the pertinent process challenges within their industry to deliver relevant business value.


Resilient Systems - Survivability of Software Systems
What is important to understand about resilience is that failure is expected and is inherent in any systems or processes, which might be triggered due to changes to the platform, environment and data. While Reliability is about the system’s robustness of not failing, Resilience is its ability to sense or detect failures ahead and then prevent it from encountering such events that lead to failure and when it cannot be avoided, allow it to happen and then recover from the failure sooner.


Risk Management Resolutions for 2013
Risks today are interconnected and horizontal, running across departments and business units. In conversations with CEOs, board members and banking executives, there are a few key overlapping risk areas that are most top of mind going into 2013.


Persistence is the Key
Calvin is a C++ persistence library or framework that allows programmers to easily save and load objects using keys. Objects are associated with a user configurable type of key that can be used to name objects specifically and save them or load them by that name. This feature is the primary distinguishing difference between Calvin and the many other persistent libraries.


5 enterprise cloud predictions for 2013
The mega Internet sites and applications are the new era enterprises. These will become the role models for the traditional enterprise. IT needs remain the same with regards to scale, security, SLA, etc. However, the traditional enterprise CIO has already set the goal for next year: 100% efficiency.


The Worst Security Mishaps of 2012
Every year security breaches have been of great annoyance to corporate and enterprises. And this year, there was not much of a difference. The year 2012 was of total mayhem. From hacker exploits to bad corporate behavior, 2012 was simply a plethora of security breaches. With that in mind, let’s take a look at some of the worst mishaps that marked in the year 2012.


Tools for Building Advanced Media Applications
In the recently concluded //Build/, Mike Downey, Principal Evangelist, Media Platform at Microsoft examined the tools and frameworks that are responsible for the development of Windows 8 apps that feature advanced media playback functionality such as streaming, DVR controls, advertising, and closed captioning. He also demonstrates the role of Microsoft Media Player Framework, which is employed behind the scenes for various live online streaming events.


Reduce Your Breach Risk: File Integrity Monitoring for PCI DSS Compliance and Data Security
This paper discusses the importance of file integrity monitoring (FIM), which facilitates the detection of attacks by cybercriminals, as well as insider threats that may result in costly data breaches. It also discusses file integrity monitoring as a critical component of Payment Card Industry Data Security Standard (PCI DSS) compliance, and shows how NetIQ addresses both security and compliance challenges through the NetIQ Identity and Security Management family of products.


5 Epic Tech Fails in 2012
Google+ leads tech journalist John Brandon's list of this year's five worst technology failures for its inability to gain traction as a social media service even as Facebook and Twitter continue to boom. 3D projectors also made the list for becoming a clunky tool at business meetings instead of a slick one, as did Bluetooth watches for doing the same things the smartphones already do. Rounding out the end of the list were Klout scores and Dropbox



Quote for the day:

"A good plan violently executed now is better than a perfect plan executed next week." -- George Patton

December 29, 2012

Private cloud computing planning from concept through deployment
Creating a blueprint on what your company expects to get out of cloud computing, getting buy-in from all departments, automating IT workloads, and transitioning to a self-service model are the initial steps in creating a private cloud. But the journey doesn't stop there. Let's take a look at the five final steps, including initiating chargeback, bolstering security and monitoring cloud performance, to help you with planning so you can create a fully functioning private cloud in your enterprise.


What Is a Real-Time Enterprise?
Originally the term real-time was only applied to systems that were reactive within a given time frame. They had very definite operational constraints. So, process control systems which might, for example, be controlling the speed of a production line had to make specific decisions within a given time frame. If they were too slow, the whole operation would grind to a halt, so speed of execution was critical.


Apache Crunch: A Java Library for Easier MapReduce Programming
Crunch provides a library of patterns to implement common tasks like joining data, performing aggregations, and sorting records. Unlike those other tools, Crunch does not impose a single data type that all of its inputs must conform to. Instead, Crunch uses a customizable type system that is flexible enough to work directly with complex data such as time series, HDF5 files, Apache HBase tables, and serialized objects like protocol buffers or Avro records.


How to Effectively Audit Your IT Infrastructure
Native Microsoft auditing tools lack the abilities of convenient tracking and ongoing review of changes in systems and applications putting organizations at risk of losing control over security. Unauthorized, unwanted, and malicious changes in an IT infrastructure can have tremendous impact on business continuity and predictability.


Storage and PaaS shine in cloud computing adoption spotlight
Cloud computing adoption goes far beyond the choice of public, private or hybrid models. Enterprise IT pros and administrators also need to decide on the specific services each cloud model provides. And certain trends are starting to emerge with regards to how IT departments are utilizing cloud services. Storing data in the cloud, as well as SaaS and PaaS, are the clear winners so far.


Data Center Power: Zooming in Where it Matters
By shifting attention from the cooling systems to the servers which account for the majority of the power consumed in the data center, managers can introduce a holistic energy optimization solution. Accurate monitoring of power consumption and thermal patterns creates a foundation for enterprise-wide decision-making with the ability to Monitor and analyze power data by server, rack, row or room, Track usage for logical groups of resources that correlate to the organization or data center services ...


Imperfect leadership
So if you focus on perfection, you will get discouraged, because perfection seldom happens and never happens for long. Or you will choke, trying too hard. Or you might freeze, engulfed by fear. Aim for perfection and bank on discouragement, dissatisfaction, broken relationships, frustration and worse.


Google's Enterprise Chief: We're Going To Grab 90% Of Office Users Away From Microsoft
Google ramped up its enterprise business in several ways this year. It launched a full-on "infrastructure-as-a-service" cloud, Compute Engine, that competes head on with Amazon Web Services and Microsoft Azure. It introduced Drive, which let's Google App users store any type of document in the cloud. It eliminated the free version of its Google Apps, and is now charging companies with 10 employees or less. It launched the next-generation of Chromebooks and introduced its first ever PC-like device for businesses, the Chromebox.


IDC Sees US Public IT Cloud Services To Top $43 Billion by 2016
Revenue for US public IT cloud services will grow from $18.5 billion in 2011 to $43.2 billion in 2016, according to a report by International Data Corporation (IDC). The report focuses on the public cloud services that are shared among unrelated enterprises and consumers and that are designed for a market, rather than just one enterprise.


The C# Memory Model in Theory and Practice
This is the first of a two-part series that will tell the long story of the C# memory model. The first part explains the guarantees the C# memory model makes and shows the code patterns that motivate the guarantees; the second part will detail how the guarantees are achieved on different hardware architectures in the Microsoft .NET Framework 4.5.



Quotes for the day:

"Leadership is an opportunity to serve. It is not a trumpet call to self-importance." -- J. Donald Walters

"Pick battles big enough to matter, small enough to win." -- Jonathan Kozol

December 28, 2012

The Power of Business Rules Management
The use of these Business Rules Management Systems(BRMS) to support the practice of decision management to automate and manage high-volume, transactional decisions is growing rapidly. A new standard, called the Decision Model and Notation standard, is under development that will bring consistency of representation to the industry.


One-on-one with Randy Bias: Cloud standards and the battle for control
In this one-on-one interview, Randy Bias, co-founder and chief technology officer of open source cloud infrastructure provider Cloudscaling, talks about the lack of cloud standards among providers and how today's cloud computing service provider patchwork will ultimately give way to a more uniform cloud universe.


Is culture your company’s most important asset?
Most managers can easily reframe key messages in ways that demonstrate care, that encourage employees, and that make employees feel heard and valued. The trick is to invite employee opinion, then refine behaviors to better serve their needs — and, in the process, create a safe, inspiring work culture.


Analysis: Amazon, Google on collision course in 2013
"Amazon wants to be the one place where you buy everything. Google wants to be the one place where you find everything, of which buying things is a subset," said Chi-Hua Chien, a partner at venture capital firm Kleiner Perkins Caufield & Byers. "So when you marry those facts I think you're going to see a natural collision."


It's "locking" if it's blocking
"Atomic" (only) means that nobody will mess up the state midway through the operation. "Atomic" doesn't mean, for example, that a single instruction is used - in fact, often it's not the case. Nor does "atomic" imply "lock-free". An implementation of atomic addition could legitimately use:


Wearable Computers the Size of Buttons to Monitor Health
In just the latest of many recent developments, the University of Texas at Dallas, in a new press release, notes that patients who require continuous observation of their medical condition—for example, to see if they're taking their medications on time—could benefit substantially from button-sized wireless computers to monitor a person’s health.


Better Integrate IT Risk Management With Enterprise Risk Activities
"By aligning IT GRC with its cousins in financial and legal GRC, organizations can accelerate GRC program growth and maturity to better realize the value of information risk management and its disproportionately high impact on operational risk management," says Ben Tomhave, senior consultant for security consultancy LockPath.


How to choose between scale-up vs. scale-out architectures for backup and recovery
More and more organizations are reducing or eliminating the use of tape by deploying disk-based appliances that use deduplication. But the architectural approach used by the appliance vendor can make a significant difference to the performance, scalability and total cost of the selected solution.


A Proposal to Enhance the UML Notation
Requirements and test cases, in particular acceptance tests, are strictly related. Agile methodologies highlight this aspect basing themselves on test driven approaches. The notation of UML use cases may be enhanced in order to allow enhanced UML tools to properly handle links between use cases and tests.


Are project forecasters “fools or liars”
“Estimates are commonly poor predictors of the actual value and viability of projects, and cannot be trusted as the basis for informed decision-making,” Professor Bent Flyvbjerg says. “These forecasts frequently misinform decision makers on projects instead of informing them. Some of the inaccuracy comes from genuine forecasting mistakes arising from over-optimism, but some estimates are deliberately misleading, designed to secure financial or political support for a project.”



Quote for the day:

"A good leader is a person who takes a little more than his share of the blame and a little less than his share of the credit." -- John C Maxwell

December 27, 2012

Emerging Enterprise Architecture Drives 10 Trends for 2013
The driving force behind the top trends of 2013 is the continued, and accelerating, emergence of the Boundary-free Enterprise™ - a framework and architecture based on loosely-coupled IT and Business services, technologies, and operations that are in turn enabled and driven by Cloud-based innovation.


Is the public cloud the best place for legacy applications?
If an application is due for a refresh, why settle for just a facelift via an incremental hardware upgrade or new GUI? Instead, why not go whole hog and re-platform the application on a state-of-the-art cloud platform that delivers scalable performance, flexibility and resilience—not to mention an operational expenditure (opex) rather than capital expenditure (capex) model?


Next-Generation Wi-Fi: As Fast as We'll Need?
The latest generation of 802.11, 802.11ac, is slated to be officially approved by the end of 2013. It's expected to bring further diminution of wired infrastructure within areas such as manufacturing floors and campus uses. The faster 802.11ac technology will also likely boost aggregate performance of legacy Wi-Fi networks, and its wider channels could deliver more data to end devices.


Changing Perceptions of Big Data
Business requirements are moving toward resolving how business wants to use Big Data solutions rather than allowing technical platforms to dictate use cases. The use of the technology platforms is more about how a particular use case in a Big Data initiative should be addressed rather than starting with a technology platform and working out what can be done within its limitations.


Moving to SaaS? Five Considerations for Your Application Integration Strategy
The first few years of this decade have seen consumers develop an unprecedented level of interest in the power of connecting devices. For instance, the integration on a smartphone can be mind-boggling. Your phone, camera, email, contacts, calendar, Internet searches, mapping software and even social networks and restaurant review applications are all connected. Integration is seamless, personal and transparent.


How To Handle Personality Conflicts At Work
At some point in our professional lives, most of us will have to deal with people we just don’t like or can’t seem to get along with. A clash of personalities is most likely at the root of these conflicts. Despite our best efforts, we sometimes just can’t seem to make it work. The unfortunate result is that the quality and enjoyment of our work suffers, and our stress levels skyrocket. In most cases when personality conflicts happen in the workplace, the entire team is disrupted as well.


BookLog: The Dip by Seth Godin
Every new project (or job, or hobby, or company) starts out exciting and fun. Then it gets harder and less fun, until it hits a low point-really hard, and not much fun at all. And then you find yourself asking if the goal is even worth the hassle. Maybe you’re in a Dip-a temporary setback that will get better if you keep pushing. But maybe it’s really a Cul-de-Sac, which will never get better, no matter how hard you try.


It's not all about the cloud: Why hybrid ITSM is here to stay
For companies that use some cloud-based applications, or need to cover branch offices and other sites that have few or no IT resources, a cloud-based ITSM offering may well make sense. But for enterprises that run the vast majority of their applications in-house, or that have lots of custom requirements, an in-house ITSM offering is likely the better choice. To cover both, then, enterprises need an ITSM solution that can deal with both worlds; in other words, a hybrid ITSM strategy.


Developing That Connected Space Between The Cloud And Everything Else
Yoics hits on a huge problem. The gap between device manufacturers is enormous. Each smartphone maker has different ways they configure their devices. Further, the cloud in its current form is not meant to accommodate networking between devices and their respective features. And it’s why the definition of that space between the cloud and everything else represents one of the biggest opportunities for the new year and well beyond.


Assessing Risk Management Culture to Better Understand the Characteristics of ERM Programs
“Risk management should be an influencing stakeholder regarding certain compensation decisions, i.e., risk management targets in areas outside risk management and weighting of the risk management segment in balanced scorecards. Additionally, risk management should sign-off on all new product/new business decisions” says Graham.



Quote for the day:

"Nothing can add more power to your life than concentrating all of your energies on a limited set of targets." -- Nido Qubein

December 26, 2012

Strategy Implementation (Balanced Scorecard)
The improvement of the effectiveness of companies’ strategic management process will be maintained by eliminating the disconnection between the formulation of strategy and its effective implementation throughout the organization. The key issues identified for the disconnection are discussed in this article


As BYOD catches on, IT sector gets ready for 1m malicious apps
Reports published by Trend Micro and McAfee maintained that as the number of people bringing their own devices to work turns from a trickle to flood, security challenges from using multiple devices would also multiply. These challenges multiply in the face of a breakdown of a hitherto homogenous computing culture dominated by Windows and Blackberrys.


How IT Pros Can Improve Their Interpersonal Skills
Remember that the "suits" and "techies" are going to mix about as well as oil and water. That's OK. They don't have to best friends and get together every weekend for a barbecue or Star Trek marathon. But those differing cultures can't be used as an excuse to avoid working together. Consider having IT employees shadow department managers at work to become more comfortable interacting with them.


Apache Camel: Enterprise Integration Patterns
Camel supports most of the Enterprise Integration Patterns from the excellent book by Gregor Hohpe and Bobby Woolf. If you are new to Camel you might want to try the Getting Started in the User Guide before attempting to implement these patterns. The EIP icons library is available as a Visio stencil file adapted to render the icons with the Camel color : sand.



Digital Citizens Group Focuses on Internet Safety
The new Digital Citizens campaign, launched Thursday, will also strive to shed light on the online sale of counterfeit goods, including prescription drugs, and on pirated Web content, said Tom Galvin, executive director of the new group. Digital Citizens will investigate online scams by showing how people can get fooled -- for example, one of the first projects will be to purchase counterfeit drugs from online pharmacies, he said.


The Employee-Motivation Checklist
Through many years of research, trial and error, and working with companies of all sizes in numerous industries, Dave has identified 16 critical ways to motivate your employees, which are listed in this article. Learn these techniques and adapt as many as possible in your business.


10 predictions how cloud computing will transform traditional IT in 2013
Kevin and Cary predict IT will undergo 10 transformational, cloud-related impacts in 2013 -- effects so massive that they will be the most fundamental changes to the way businesses and governments have approached technology in the past 25 years:


India aims for world's big data
In its report "Big data: The next big thing", Indian IT services industry group Nasscom expects the country's big data industry to grow from US$200 million in 2012 to US$1 billion in 2015. The biggest challenge--and opportunity--is to satisfy the demand for data scientists. Avendus Capital, for one, estimates the United States will suffer a shortage of up to 200,000 data scientists by 2018, a gap that will most likely be filled by outsourcing.


Nine Forms of Analytics Data That Matter the Most
Big Data takes a lot of forms and shapes, and flows in from all over the place – from the Internet, from devices, from machines, and even from cars. In all the data being generated are valuable nuggets of information. The challenge is being able to find the right data needed, and being able to employ that data to solve a business challenge. What types of data are worthwhile for organizations to capture?


IBM unveils IBM Connections, a new social analytics software
IBM has unveiled new software and services that bring the power of big data analytics into the hands of today's social savvy workforce anytime, anywhere. Now, organizations can apply analytics to their social business initiatives, allowing them to gain actionable insight on information generated on networks and put it to work in real-time.



Quote for the day:

"A man without a goal is like a ship without a rudder." -- Thomas Carlyle