January 14, 2013

The Right-Hand Man Of Steve Jobs Has Broken His Silence
Higa explained that there were "two things" that got him the job: One was an ability to be frank, honest, and able to go toe-to-toe with him on any question. The other was wide peripheral vision. He’s always wanted that in the people around him. The ability to connect dots is really important. A Renaissance perspective on the world. Because it was always about the intersection of technology and liberal arts.


MapReduce / Map Reduction Strategies Using C#
The C# programming language provides many features and classes that can be used to successfully perform map reduction processing as described in the sections above. In fact, certain forms of parallel map reduction in C# can be performed by individuals having a minimal knowledge of thread pools or hardware specific thread management practices.


John Baldoni on Developing a More Effective Leader
John Baldoni talks about his new book titled "Leader's Pocket Guide 101" in this AMA Edgewise podcast. He explains the importance of critical thinking, self-selection and presence when connecting with your colleagues and shares the mantras he uses to influence others: competence, credibility, and confidence.


An inside look at Internet Explorer 10's mysterious Flash whitelist
For Internet Explorer 10 on Windows 8 and Windows RT, Microsoft has tried to walk a delicate balancing act with Flash. The underlying theory is that Flash itself isn't evil. Instead, its bad reputation can be traced to the impact of poorly written Flash programs, which drain batteries and hog CPU resources, or malicious Flash content that exploits weaknesses in the Flash runtime to spread malware.


White Paper: Increasing Marketing RoI with Predictive Response Models
What is surprising, is that while predictive response modelling usually does improve response rates, in many cases it actually increases customer acquisition cost per account ... To overcome these challenges, Integrated Marketing employs an alternative approach, called the Value Adjusted Optimization Model that is changing how many in the industry manage their direct marketing campaigns. - Download requires free subscription.


US judge rules for Texas school district in RFID tracking case
Unlike passive chips that transmit data only when scanned by a reader, these chips have batteries and broadcast a constant signal so they can track students' locations on school property. Andrea Hernandez was one student who took issue with the badge, saying she had religious and privacy concerns and refused to wear it. Since then, her case went to court but now a judge has ruled against her.


Driving Analytic Value From New Data
The use of new information can enable huge leaps in the effectiveness, predictive power, and accuracy of your analytics. Most of the time, effort is spent trying to incrementally improve results by using existing data and information in a more effective manner. This isn’t as much because analytic professionals don’t realize that new data can be powerful as it is because new data only becomes available occasionally.


Implementing RSA asymmetric public-private key encryption in C#: encrypting under the public key
Performing RSA Encryption is not particularly difficult, but neither is it straightforward. Andrew writes in his blog with C# code sample - To make this code more general, we are going to allow users to specify the bit length of the public key, allowing us to easily encrypt under 1024, 2048 and 4096 bit keys.


The Unreasonable Effectiveness of C
Damien's love with C: I've had intense and torrid love affairs with Java, C++, and Erlang. I've built things I'm proud of with all of them, and yet each has broken my heart. They've made promises they couldn't keep, created cultures that focus on the wrong things, and made devastating tradeoffs that eventually make you suffer painfully. And I keep crawling back to C.


HCL Technologies is Coming of Age in Asia
Revenue-wise, HCL is the fifth largest India centric IT service providers after TCS, Infosys, Cognizant and Wipro. While it only derived about 15% of its global FY12 revenues from markets outside of Europe and the U.S., lightly lower than the four larger Indian firms, HCL has built a strong base in Asia and now boasts more than 300 customers serviced by more than 8,000 employees.


How to Create Governance Policies in InfoSphere Business Glossary 9.1
Business Glossary 9.1 can act as the central nervous system for a Data Governance program. Previous versions of the product allowed the cataloguing and management of technical and business metadata – Categories, Terms, Database tables, BI Fields, ETL Jobs. The new version adds in Policies and Terms so you can document and define a greater range of Governance requirements – with the pay off that Rules can be linked straight to the information assets that must conform to those rules via Glossary linking.



Quote for the day:

‎"The act of taking the first step is what separates the winners from the losers." -- Brian Tracy

January 13, 2013

The Soft Underbelly of Technology Services
Shyam Sankar looks into ScanSource's lawsuit and brings out the key lessons to learn.  The lawsuite said a software project estimated to cost $17 million and take 11 months instead mushroomed to $37 million over three years, and ScanSource said it still doesn’t have a Dynamics software up and running. Accenture has estimated it will cost $29 million more to complete the ERP project, according to ScanSource’s lawsuit.


Beyond Voice Recognition: It's The Age Of Intelligent Systems
Expect the current generation of virtual personal assistants to evolve into ubiquitous intelligent systems. These will communicate with people through voice, text, vision, touch and gestures and will factor in ambient information like location or motion to understand context, giving greater relevance of every interaction. Here’s a look at some developments to watch in intelligent systems for 2013


Essential Facebook Programming: Building a Windows Client
In this column Dino Esposito builds a Windows Presentation Foundation (WPF) client app that uses the Facebook API to authenticate users and post updates with pictures. Because the Web is a different environment from the desktop, this column obviously will be different from what I wrote last month. The Facebook API, however, is the same. You can get the Facebook C# SDK via NuGet (see facebookapi.codeplex.com for more details on the Facebook API for C#/.NET developers).


The 12 Critical Questions You Need to Ask When Choosing an AD Bridge Solution
What do you need to know when evaluating AD bridge solutions? This Quest Software white paper helps you understand the questions to ask when choosing the best solution for your company. Don't waste any more time and money with systems that don't coexist! Downloading this white paper requires free registration.


Configuring your JavaScript loggers with JSNLog
Matt Perdeck shows how to configure your JavaScript loggers with JSNLog, a JavaScript logging library that is well integrated with .Net. It lets you configure loggers in your web.config. And it lets you receive log amessages from the client and store them on the server, without any coding.


NXP on route to automotive future
NXP has made automotive a priority, striving to enable all electronic communication to, from and within the vehicle – reliably, securely, and efficiently. Using in-vehicle networks and RF cryptography.


New Specs Ease Connections by Wire or Wireless
The Wi-Fi Alliance demonstrated the emerging Miracast wireless display technology at International CES here Tuesday by sending live computer game animation from a smartphone to a 27-in. television. The new Miracast wireless display technology has just started emerging in mobile devices, said Kelly Davis-Felner, marketing director for the industry group.


Microsoft Refreshed .NET Framework 4.5 with Updates
Microsoft has released several updates for .NET Framework 4.5 which fixes reliability, compatibility, stability, and performance issues while working with Windows Presentation Foundation, Common Language Runtime, Windows Forms, XML, Network Class Library, ASP.NET, Entity Framework, Windows Workflow Foundation and Windows Communication Foundation.


Circumventing Windows RT’s Code Integrity Mechanism
It’s taken longer than expected but it has finally happened: unsigned desktop applications run on Windows RT. Ironically, a vulnerability in the Windows kernel that has existed for some time and got ported to ARM just like the rest of Windows made this possible. MSFT’s artificial incompatibility does not work because Windows RT is not in any way reduced in functionality.


Jenkins - An Open Source Continuous Integration Server
Jenkins is an award-winning application that monitors executions of repeated jobs, such as building a software project or jobs run by cron. Among those things, current Jenkins focuses on the following two jobs: Building/testing software projects continuously; Monitoring executions of externally-run jobs



Quote for the day:

"If you want to go fast, go alone. If you want to go far, you need a team." -- John Wooden

January 12, 2013

3 transformational technology trends that we seem to be missing in 2013
Contrary to what most analysts are predicting, Udayan Banerjee, CTO, NIIT Technologies says that we are unlikely to hear success stories about Big Data in 2013 and that cloud will go down the “trough of disillusionment.” Banerjee details three transformational technology trends to watch out for in 2013


Characteristics of High Maturity SOA Implementation
Benchmarking is a good approach to identify the current state of SOA implementation as compared to an industry recognized maturity model. This also helps to define a target state and then work towards achieving it. Amongst many SOA maturity models the Open Group's OSIMM v2 is quite popular and defines seven levels


Revolution Analytics Uses Open Source R To Compete With SAS, SPSS
Revolution Analytics provides an enterprise distribution of R. The company is looking to battle both SAS ans SPSS on price, performance on distributed and massively parallel computing, and adoption in the cloud, according to Davis Smith, Revolution’s vice president of marketing and community.


Top 20 exciting features of SQL Server 2012 – Part 1
In this article Shivprasad Koirala discusses 20 features of SQL Server 2012 which he personally like (we can agree to disagree on my list) and from these 20 features, 7 are revolution and 13 are evolution. This article is divided in to 4 parts, in every part we will discuss 5 features. So let’s start with the first 5 top features.


Homeland Security warns to disable Java amid zero-day flaw
"We are currently unaware of a practical solution to this problem," said the DHS' Computer Emergency Readiness Team (CERT) in a post on its Web site on Thursday evening. "This vulnerability is being attacked in the wild, and is reported to be incorporated into exploit kits. Exploit code for this vulnerability is also publicly available."


Firefox adds built-in HTML5-based PDF viewer to improve security
The browser maker described the built-in PDF viewer as more secure and safer than proprietary PDF viewing plug-ins, like those installed by Adobe Reader or Foxit Reader. However, several security experts noted that it probably won't be free of vulnerabilities.


Best practices to navigate the Dodd-Frank/SEC whistleblower program
Whistleblowers, and the broader topic of how companies respond to internal reports of regulatory violations, have always been topics of concern, said R. Todd Cronan, partner at Boston-based law firm Goodwin Procter LLP. Additionally, the SEC whistleblower program has elicited even more upper-management attention.


Async Unit Tests, Part 1: The Wrong Way
If you don't write unit tests - or if you or your manager think writing tests just delays software development - then I refer you to the best computer book ever written, Code Complete. In that book, Steve McConnell presents some very interesting hard facts about testing. I hope we can all agree that unit testing is a fundamental skill in Modern Programming. And this brings me to a sad chapter in async/await support: the "obvious" way to do unit tests is wrong.


SAS and IBM at forefront of growing Big Data predictive analytics market: Forrester
The Forrester Wave: Big Data Predictive Analytics Solutions Q1 2013 report evaluated 10 vendors providing predictive analytics solutions, pointing to SAS and IBM as having the strongest market presence and strategy. According to Forrester, end user customers are increasingly looking to predictive analytics in order to boost profitability and predict business outcomes by analysing correlations and trends in data sets.


SecurEnvoy, PasswordBank Take Tokenless Authentication to Cloud
SecurEnvoy, a provider of tokenless authentication products, has partnered with PasswordBank to take tokenless, two-factor authentication to the cloud and provide it as a service to PasswordBank's customers, complementing PasswordBank's identity management solutions.



Quote for the day:

"Some defeats are only installments to victory" -- Jacob A. Riis

January 11, 2013

10 Project Management Trends that Dominate in 2013
Behind most business and IT projects are the guidelines of basic project management, and these principles can often make the difference in a successful rollout. Here are the top 10 project management issues expected to play out this year, as outlined by training provider ESI International.


The Business/Process/IT Partnership (Your Secret Ingredient for Process Transformation Success)
Successful business process transformation requires an unprecedented level of collaboration among business owners, process teams, and IT, three groups not accustomed to working together.IT usually limits participation to technical topics or doesn't get involved. Process teams lean toward continuous improvement and can be technology phobic. And the business functions? While a small number of visionary execs seek transformation, most are content with incremental improvement that does not lead to transformation while others don’t know how to get started.


The User Interface Design Process
Once you start letting others review your UI, you'll find that everyone has a whole bunch of "UI preconceptions" that have more basis in superstition than fact: "Oh, users don't like that" and "You should always put x near y" are common phrases you hear; but if you ask why you should or shouldn't do something, no one has a good answer (the first statement usually boils down to "I don't like that," for instance) let alone one based on the design of the human body.


Excerpt: The key concepts of Oracle WebLogic server
In order to fully comprehend how WebLogic Server works and to get the best performance out of it, it's important to understand several concepts. The most important concepts are discussed in the following section. This excerpt is from Oracle WebLogic Server 11g Administration Handbook by Sam R. Alapati


An Agile Holiday Open House
One of my great joys of working in an agile environment is being able to show off how we operate. I've been in the software industry for many years (don't ask!) and have worked in just about every environment imaginable, from the utterly stifling to the wonderfully open and innovative. I can say without a doubt that the open, collaborative nature of a truly agile environment is the most enjoyable and most productive workplace I've known.


How-to: Create an Android Support Package
Much has been made about fragmentation of the Android platform. The truth is that the Android platform is not as fragmented as developers think. Google provides a set of libraries that allow older versions of Android to get support for newer APIs. In this article, I'll create a version of the Star Trek navigation application (from my previous column) that runs on Android 2.x to 4.x for handsets and tablets.


Businesses looking to monetize information assets
According to research and consulting firm Gartner, many enterprises are starting to appreciate the real market value that their harvested information assets have within their own industries or beyond. However, the lack of expertise in handling big data and developing information products will create an opportunity for the growth of specialist intermediaries, acting as information brokers or resellers.


Top 25 Best Linux Performance Monitoring and Debugging Tools
Ramesh Natarajan has compiled 25 performance monitoring and debugging tools that will be helpful when you are working on Linux environment. This list is not comprehensive or authoritative by any means. However this list has enough tools for you to play around and pick the one that is suitable your specific debugging and monitoring scenario.


Enterprise Mobility -- Are You Ready for the Ride?
Consumer mobile devices create countless new opportunities to engage your customers, employees, and business partners at a level never before seen. As Melissa points out, this will change nearly every facet of how your business operates. Here are the areas that I’m excited about:


Microsoft launches open source VM image 'Depot' for Windows Azure
The aim is to get more open-source apps running on Linux as a guest on the Windows cloud. Azure already has a store that allows developers to deploy applications to Azure, but VM Depot is closer to what Amazon Web Services is doing with its Amazon Machine Images service.



Quote for the day:

"The toughest thing about success is that you've got to keep on being a success" -- Irving Berlin

January 10, 2013

Making Yourself a CEO
Being CEO requires lots of unnatural motion. From an anthropological standpoint, it is natural to do things that make people like you. It enhances your chances for survival. Yet to be a good CEO, in order to be liked in the long run, you must do many things that will upset people in the short run. Unnatural things.


Questions for an Enterprise Architect
Erik Dörnenburg, Head of Technology Europe at ThoughtWorks answers: What is Enterprise and Evolutionary Architecture?, discussing 4 issues: Turning strategy into execution, Ensuring conformance, Where do the architects sit? Buying or building?


Eric Ries On How To Make Any Company Move Like A Lean Startup
"It's like an alternate reality," Eric Ries says. The entrepreneur-turned-author whose Lean Startup--the book, then the movement--infused the Valley/Alley lexicon with now-ubiquitous terms like "pivot" and "minimum viable product," is now boldly going where few startup guys have gone before: corporate America.


Analysis of Rails XML Parameter Parsing Vulnerability
The root cause of the vulnerability is Rails handling of formatted parameters. In addition to standard GET and POST parameter formats, Rails can handle multiple different data encodings inside the body of POST requests. By default JSON and XML are supported. While support for JSON is widely used in production, the XML functionality does not seem to be known by many Rails developers.


Azure DataMarket + BigML = Powerful Insights
BigML has made the process of creating a predictive model from a dataset one-click easy. For example, a store owner can use her sales data to predict the optimal inventory levels given the time of year. But what if you have an idea for a model, for example predicting the unemployment rate for London Boroughs based on demographic information, but you don’t have the data? While it is trivial to build this model with BigML once you have data, where do you get it and how do you know if the data is from a reliable source?


EU hopes to impose data restrictions on Internet firms
According to Reuters, Internet companies including social networking site Facebook and search engine giant Google may have to get additional permission from their users before selling or using data in the future if the European Union gets its way. The EU wants to give consumers an additional layer of data protection by imposing harsher regulations on firms with an online presence, giving users more control over their personal data as well as limiting what firms can do with data they gather.


NSTIC set to fire up more identity pilots
The National Strategy for Trusted Identities in Cyberspace (NSTIC) pilots are meant to cultivate ideas that will anchor an online "identity ecosystem" to be built and managed by the private sector. The idea is that the programs will build and test technology, identity models and frameworks to support a standards-based identity infrastructure.


4 Common Project Budgeting Mistakes
This month here at ProjectManagement.com we are looking at everything to do with resolutions and plans for the coming year. Here are 4 common project budgeting mistakes – how many of these will you be avoiding during 2013?


The lifecycle of your enterprise cloud adoption strategy
This excerpt from Chapter 3 of Is Your Company Ready for Cloud? Choosing the Best Cloud Adoption Strategy for Your Business, by Pamela Isom and Kerrie Holley, examines how an enterprise should strategically plan its cloud adoption, taking into consideration specific business goals, cloud standards, best practices and current and future use.


The Impact of the SaaS, Cloud Evolution on ISVs
The SaaS business model enables ISVs to reduce costs, enter new market, and launch and run a future-oriented SaaS business in the cloud. But transforming an existing on-premises application into reliable, scalable software capable of supporting many customers simultaneously is not a small thing – and the business changes are harder and still ongoing. In essence, the delivery method has changed, and therefore the business model of selling SaaS and cloud services needs to change as well.



Quote for the day:

"The real leader has no need to lead - he is content to point the way." -- Henry Miller

January 09, 2013

Five Types of Bad Chief Architect Characters – We Have The Whole List!
The Open Group: We have looked at some of the extreme personality types of chief architects to provide some hints on how to deal with them. Below is a list of five Enterprise Architecture characters we have unfortunately encountered in the real world with a few tips on how these characters can be managed.


Extending Spring MVC with Spring Mobile and JavaScript
Craig Walls Senior Engineer with SpringSource and Roy Clarkson currently working as an engineer with SpringSource explain how to extend Spring MVC to mobile devices with Spring Mobile and popular JavaScript frameworks.


10 More New T-SQL Functions
SQL Server 2012 was released last April, making it the 11th major release of the product. Every new version has delivered new functionality that should excite developers, and this release is no different. With the latest release of SQL Server, Microsoft produced 14 new T-SQL functions.The first part of this article detailed four new T-SQL functions available in SQL Server 2012. This article demonstrates 10 additional functions. Dig in!


Fun with PowerShell's Out-GridView
Even though Windows PowerShell is primarily a console-based management engine, there are a few GUI bits you might want to take advantage of. One of them, which we've had since PowerShell 2 is Out-Gridview. As the name implies, this is a cmdlet that you pipe objects "out" to - What you get is a graphical display of the default view


IT Salary Survey 2012: GRC professionals looking for a challenge
New and expanding regulatory compliance rules, coupled with incessant IT security threats, are influencing operations in virtually all industries. That puts an inordinate amount of pressure on governance, risk and compliance professionals as they strive to protect company assets and follow federal rules to a T.


Application Integration: Infrastructure basics for real-world integrations
Read this expert e-guide to explore study results indicating how your peers are creating seamless interoperability within their extended IT environments. Also, discover recommendations from the analysts at Gartner and other leading firms regarding best practices for modern application integration. - Requires registration to download.


Avoid Making the Cloud Your Next Legacy System
Glenn Donovan writes: It’s taken me some time and effort to decode the cloud hype into a coherent value proposition for a business trying to use IT to accomplish business goals, as I’m sure many of you reading this article have had to do. Whether it’s SaaS, PaaS or IaaS, what is the opportunity for businesses? What gains can be made in the real world? Here’s how my analysis/thought process unfolded and perhaps some of you can relate.


Developer divide: 19 generations of computer programmers
If you're searching for a fountain of youth, the easiest way to get that feeling of continual rebirth is to hang around a few tech product launches. Every new rollout comes with the fresh, unabashed feeling that this has never been done before. Ever. But it has. Apple has been bringing us "one more thing" for more than 30 years. Even the iconic commercial introducing the Macintosh is nearing 29 years old. Newness has never been so old.


Technology Manager: Information and Technology Strategy Game
Technology Manager is an I.T management board game set in an economy similar to the real world of businesses, with different industry markets. Battle for winning clients, manage money, make deals, and band together to survive in the I.T industry. This game teaches “Information and Technology Processes” so you will learn different strategies and concepts of Managing an IT business and the issues involved so it makes an exciting adventure.


Naive Intervention – Part 1: From Antifragile to Models Behaving Badly
This three-post series by Max J. Pucher discusses why any approach that ignores real-world dynamics and complexity will eventually cause catastrophical failures. These books show that I am not alone with my opinions and proposals and that much of the BPM community is wearing blinders.


TLDR is for when you don't have time to read the whole article
TLDR is software that summarizes Web information automatically when you don't have time to read the whole story. It's available now as a plugin for Firefox, Chrome, and Safari, but developers Stremor say the Android and iPhone apps have been submitted to the major app stores, so you'll be able to use it on your smartphone as early as this week.



Quote for the day:

"Learning is not compulsory... neither is survival" -- W.Edwards Deming

January 08, 2013

Analytics ROI – Strategy to Execution
Over the next two years, executives say they will focus on supplementing standard historical reporting with emerging approaches that make information come alive. These include data visualization and process simulation, as well as text and voice analytics, social media analysis, and other predictive and prescriptive techniques.


CRM Watchlist 2013: It all starts...now. The Finalists
After a year of monitoring and five weeks of reviewing questionnaires, I'm ready to name the finalists for CRM Watchlist 2013. Remember, these aren't the winners. Each winner will get a review. This is just a list. There is SO much more analysis coming it will make your head spin.


Insight: Identity Management Will Take Off in 2013
The growing use of tablets, smart phones and cloud services is making it more complicated for IT organizations to manage user authentication and authorization to enterprise resources. Consequently, the market for technology that provides secure single sign-on is heating up. In recent weeks, a number of companies have moved to raise the IDMaaS ante including Centrify, Microsoft and Okta.


USB 3.0 standard will soon allow up to 10Gbps
An enhanced version of USB 3.0 will deliver up to 10Gbps, twice the data speed of current connections. The 10G bps SuperSpeed USB supplement to the existing USB 3.0 specification is expected to be completed by the middle of the year, the USB 3.0 Promoter Group said Sunday at the International CES trade show in Las Vegas


M2M makes sense for DBS Bank
In an interview with ZDNet Asia, Gledhill said the number of mobile devices used to interact with the bank has "exploded". People ... now use their mobile devices and social media accounts to engage with the bank too, he noted. "The prize now is to understand what's going on across all of these touchpoints and, help us improve our services, get to know the customer better, and allow us to sell our products in a timely way," he said.


Cloud availability appears higher than enterprise data center uptime
While Amazon's cloud availability appears higher than that of enterprise data centers, a true comparison is tough to make as there don't appear to be statistically significant studies surrounding private enterprise data center availability, according to IDC's Villars.


Designing Next-Generation Massively Multithreaded Architectures for Irregular Applications
Current high-performance computing systems are designed to efficiently execute floating-pointintensive workloads. HPC systems are mainly built for scientific simulations, which are characterized by high computational density and locality, and regular, partitionable data structures. These application requirements are driving processor designs toward fast SIMD (single instruction, multiple data) arithmetic units, and deep cache hierarchies to reduce access latencies.


Honk if you love change. Quotes and resources on innovation.
“It’s human nature to love our own ideas. But sometimes that means that we hang on to them too long. Along the innovation journey, every innovator must ask: Are we making sufficient progress to believe that our original hypothesis is correct, or do we need to make a change?


Quick action pattern in Android and simple implemention.
Basically, it's a context menu that doesn't cover up the data that is being acted on. Implementiong this pattern might probably make your application more interactive and interesting. The QuickActions dialog is not included in standard Android SDK, so we have to create it manually.


3 Big UX Lessons Ripped from 2012 Tech Headlines
It’s fascinating how the Samsung QA team focused, like great QA teams do, on the little details that make a product frustrating. Each diagram shows how a certain S1 function works, pointing out exactly what needs to be done to make it better. The team held Apple’s design as the benchmark and the Galaxy S1 didn’t meet it. You can see the entire document here.



Quote for the day:

"Always mistrust a subordinate who never finds fault with his superior" -- J.C. Collins

January 07, 2013

A director's duties when negotiating IT contracts
Based on the NKF incident, key learning points for directors are: (a) Directors can be liable for failing in their duties to their companies/organizations. This can happen especially if there are ownership or organizational changes. (b) Being a volunteer does not absolve one from his duty. (c) Unfamiliarity with IT and legal issues should be addressed by getting the appropriate advice from in-house and external experts and asking the right questions. Departure from such advice must be carefully considered. ...


China’s Computing Giants Eyes Overseas Growth in 2013
Needless to say, the Chinese government is keen to keep pushing growth forward, and it has a plan to increase the country’s online population to 800 million by 2015, and to expand Web sales to reach to 18 trillion yuan ($2.9 trillion) by 2015—taking the top spot in global e-commerce. Gartner is predicting enterprise IT spending alone in China will grow from $117.8 billion in 2013 to $172.4 billion by 20160


Leap Motion gets $30M to change how you interact with computers
With a $30 million second round of funding, Leap plans to manufacture its peripheral device at scale. The funding round, led by Founders Fund with previous investor Highland Capital Partners participating, follows a $14.5 million Series A round. It will also support today’s second piece of news — namely that ASUS will bundle the Leap Motion device in with its all in one computers as well as select notebooks this year.


1/6/13: Leadership Reading to Start Your Week
Here are choice articles on hot leadership topics culled from the business schools, the business press and major consulting firms, to start off your work week. I'm pointing you to articles about leadership, start-ups, Starbucks, the entrepreneurial Murphy clan, the sharing economy, the paper industry, and industrial excellence and American manufacturing, as well as surveys, studies, statistics, and lists. Be sure to look for dots that you can connect.


Don’t overlook your Big Data leadership and management
Although your strategy provides an essential component of leadership, it’s not enough to lead a Big Data team. And although you have competent management within your strategic business units, they may not be appropriate for your Big Data team. You must have management and leadership built within your Big Data team. Big Data capability is not built on data scientists alone; you must also build competence in dealing with change and complexity.


DirectX made simple
With Windows 8, WinRT, C++/Cx I think the time to write an elegant C# / XAML app using some DirectX rendering in C++ has finally come! Thanks WinRT! :-) Here the codeproject blogger just plan to describe my attempt at learning DirectX and C++ and integrate it nicely in a C# XAML app. Note this is a metro app. It requires VS2012 and Windows 8.


Architecture Definition - Requirements Report (Expanded)
The purpose of this document is to define the relevant operational, performance, user application, and architectural requirements of the system. Project Managers should be aware that there may be significant overlap between this document, the Current Situation and Requirements Report produced in the Systems Planning phase and the Functional Specification produced in the Analysis phase. Careful tailoring in the context of what has been produced, and what will be produced, is required.


Amazon Web Services launches Redshift, datawarehousing as a service
"Large companies feel like they are paying too much. And small companies can't afford data warehousing solutions. As a result, they throw out some of their data," said Andy Jassy, senior vice president of AWS. Jassy made the comments at Amazon Web Services' inaugural re:Invent conference in Las Vegas. The powwow was designed to bring together developers and customers to talk cloud migration and other key topics.


SQL Indexing and Tuning e-Book
SQL indexing is the most effective SQL tuning method and requires the same care as schema design yet it is often neglected during development. Use The Index, Luke explains SQL indexing from the source code perspective—covering ORM tools like Hibernate and Doctrine. It's a living book—make sure to follow via RSS, Twitter or Facebook.


The State of Cloud Computing Around the World: India
The market for cloud computing within the country has already doubled between 2009 to 2012, thanks to large businesses making up the bulk of Indian cloud computing growth. Additionally, since these large businesses don’t have legacy infrastructure to transform, they are more agile and can adopt new strategies as they come.



Quote for the day:

"Even if you're on the right track, you'll get run over if you just sit there." -- Will Rogers

January 06, 2013

New Year, New You: The IT Manager's Revitalization Guide
As we say goodbye to 2012 and start looking forward to another exciting year in tech, it's a good time to pause and take stock of your professional and personal progress as an IT manager. Take a few moments to read through the best of Computerworld's management and career, or click a link below to skip directly to your chosen topic.


What should Kodak do?
Arsalan writes in his analysis of Kodak ... "Additionally I would like to open offices in new markets so that we do not surround ourselves with “yes” men only here in Rochester, NY. The new offices would be in India and China where not only that we will have marketing and sales offices but also research and development (R&D) offices."


AWS Needs To Figure Out Its Enterprise Plan
Rodney Rogers, chairman and CEO of Virtustream as he writes in this TechCrunch Article recommends AWS some professional tips highlighting areas where AWS need to pay attention to and work out an Enterprise Plan so that it can look forward to find a place in the fortune 500 down the line.


VTU partners iCMG to set up world’s largest center of excellence in Enterprise Architecture
Visveswaraya Technological University (India’s leading and largest technical Universities having 194 affiliated engineering colleges and over 3,50,000 students) in partnership with iCMG, a global leader in Enterprise Architecture, is setting up the Sir Visveswaraya Center for Excellence in Enterprise Architecture, which is expected to be the world’s largest center in this domain.


Who Owns CRM Data at Your Company?
In most enterprise IT systems, record ownership is about as controversial as a ham sandwich. Not so in CRM. In fact, it can become quite the political topic. Fortunately, good governance can solve most CRM data ownership problems.


The Psychology of Social Commerce [Infographic]
There are many social factors routed in psychology that make people want to part with their money, but how can you leverage them to make your landing pages convert? The infographic below explores the stats of psychological spending, looking at some common brain triggers. If you think you’ve been impervious to these subtle persuasions of the expert salesperson, then read on and learn how you’ve been coerced over the years without your brain even knowing it.


Domain-Driven Design at ZendCon 2012
A person practicing domain-driven design does not attempt to model reality. Instead, domain experts and software practitioners use a mental model as a tool for solving problems within a given domain. The domain experts and software practitioners collaborate to explore and develop this model. No software of any reasonable scope has just one model


The future of ‘Big Data’ is apps, not infrastructure
The current media hype around Big Data has clouded where the real opportunity is: software applications that exploit Big Data. The infrastructure and platform plays that are grabbing the headlines are critical, but they won’t create the same long-term value as those entrepreneurs who figure out how to apply Big Data to the task of disrupting or accelerating a market.


Enterprise Wide Problem Mapping: Step 2 in Enterprise Transformation
This post is focused on identifying and prioritizing constraints within an organization as part of the transformation process. It's important as leaders and knowledge workers that you take the problem solving step very seriously. After all problem solving is the intent for the majority of transformation efforts.


Six Ways to Find Your Future
The past is the future for most. Persistence and endurance assure continuity. But, more of the same won’t birth new futures. Looking back and holding on stagnates, solidifies, and congeals life like cold bacon grease. 99% of the conversations I have about the future are actually about the past. Creating the future is recreating “glory days,” for most. It’s foolish and futile.



Quote for the day:

"Those who master the speaking game will always have a much better shot at wining the battle of ascendancy" -- Ganville N. Toogood, in his book The Articulate Executive

January 05, 2013

Understanding and Implementing Microsoft Azure Virtual Machines
It’ll take you about 30 minutes max to get a system running in the cloud, and since Microsoft is providing free evaluation of Azure VMs right now, it doesn’t cost anything nor is it difficult to setup at all. To create an Azure Virtual Machine, do the following:


4 Tips For Finding Great Career Mentors
Finding career mentors isn’t always easy and asking someone you don’t know to be your mentor can be intimidating. Obtain great mentors and overcome the ‘finding a mentor jitters’ by following these 4 tips:


Cisco and NXP invest in connected car technology company
Together Cisco, Cohda and NXP will develop applications that warn of hazards such as the potential of a collision ahead, alerting if a nearby vehicle is losing control, or of upcoming traffic congestion, they said on Friday. NXP and Cohda are far from new acquaintances; they have already developed a platform that combines radio technology from both companies for use in onboard car units.


Rogue Google SSL certificate not used for dishonest purposes, Turktrust says
On Thursday, Google, Mozilla and Microsoft announced that they are blacklisting two intermediate CA certificates that were mistakenly issued by Turktrust in August 2011 for two of its customers who should have received normal end-entity certificates for their respective domain names.


Improve Your Website: 3 Free Tools for 'Screencasting'
While a screenshot is a static image of a computer screen, screencasts essentially are short movies with narration that can show changes made to a site or page over time. They can be used to demonstrate how to use a new piece of software, to report problems with your site or to illustrate potential changes to your site through a redesign. All you need to create a screencast is a microphone and a service to capture the video. Here are three free tools that can help you get started on the right foot:


Achieving Greater Agility with Business Intelligence and Analytics
Join this TDWI Webinar and discover best practices and experience-based guidance for improving flexibility and speeding the delivery of value with BI and analytics. This Webinar is based on TDWI’s recently released Best Practices Report, Achieving Greater Agility with Business Intelligence and Analytics, which brings together insights from an extensive research survey and interviews with users and industry experts in agile development methods, cloud-based services, and cutting-edge BI and analytics technologies.


IE shocker: Microsoft's browser gains share in 2012
Net Applications, which tracks browser usage by monitoring unique visitors to customers' websites, said IE ended 2012 with a 54.8% share, up 2.9 percentage points from the start of the year. The uptick was in stark contrast to nearly a decade of decline. In each of the years from 2005 through 2011, IE lost major chunks of usage share, with several of those years recording decreases of seven or more percentage points.


Dutch Government Aims to Shape Ethical Hackers' Disclosure Practices
White-hat hackers and security researchers play an important role in securing IT systems by finding vulnerabilities, the NCSC said. However, the center maintained that security researchers are sometimes reluctant to disclose vulnerabilities to companies, instead using media outlets to announce vulnerabilities, which is an undesirable practice because it exposes a hole before it is fixed.


Meet 7 startups that could define the Chinese cloud
Because of cultural, regulatory and linguistic issues, private clouds are the hot topic while public cloud services (e.g., Amazon Web Services or any of the myriad SaaS startups in the United States) have little to no presence. This situation can make it tough for U.S. IT companies to make a strong cloud play in China, leaving the door open for Chinese startups to define the technologies


How Square's Transparent Office Culture Pays Dividends
What if you gave your newest employee access to the same information about your company as you do one of your VPs? That's the idea behind the inner-workings of Square, and one that is contributing to the mobile-payment company's success. "Whether it's your first day, or third year at the company, you're given the same amount of information and opportunity to contribute," Kyle Zink, director of experience at Square, told Mashable. "We want you to be as valuable and effective as you want to be, as soon as you're ready."



Quote for the day:

"Anger is never without a reason, but seldom a good one." -- Benjamin Franklin