April 05, 2013

U.S. government can't intercept iMessage, but it can still serve Apple a search warrant
One U.S. law enforcement agency is struggling to snoop on messages sent by Apple devices, claiming they "cannot be intercepted." But lack of transparency on Apple's part may mean the technology giant is facing an influx of search warrants — and yet we don't know about it.


Tech overhaul for Portland police, fire, 3 years behind schedule, $10M over-budget
These issues "are largely the result of a problematic and shifting governance structure and inconsistent management," according to the audit. Moreover, Portland officials didn't take proper advantage of some lessons learned through the city's troubled SAP project, such as the need to ensure proper staff training, the report states. That effort ended up tripling its budget and taking more than twice as long to complete, according to another audit released in 2010.


Judge awards class action status in privacy lawsuit vs. comScore
ComScore uses OSSProxy software to track users. The software is typically bundled along with free software products like screen savers and music sharing software and is downloaded to the systems of end users that install them. Once installed, the software is designed to constantly collect and send to comScore servers a wide range of data, such as the names of every file on the computer, information entered into a web browser, the contents of PDF files and other data.


Growing use of mobile BI apps sparks need to downsize designs
Instead of trying to cram everything that's included in a PC-based BI application onto a single screen for mobile devices, Sherman recommended that application developers examine the processes business users typically run through to do BI and analytics, and then design mobile apps and BI dashboards to follow those trails.


Non-volatile DIMM cards coming soon to a server and array near you
With 10GB/s of throughput, it is roughly two and a half times faster than PCIe flash cards and can be used as another tier of high-speed storage. It can also used as a memory buffer for solid-state drives (SSDs) because of DRAM's ability to never wear out, no matter how many writes it receives. NAND flash memory in SSDs, however, has a limited life due to write amplification, a phenomenon in flash memory that requires data to be marked for deletion before it can be rewritten to another cell.


TypeScript Language Capturing .NET Developers' Attention
"Talking with many of the attendees at these conferences and at community events, I find many of them miss coding in C# and XAML. It's just easier for them," he said, noting that JavaScript lacks the tooling and syntax C# developers prefer. "I believe that TypeScript can provide the tooling and syntax to reduce the negative feelings most C# developers get from JavaScript."


The freedom of “no”
You must learn to say “no” to some things. Feeling the freedom of “no” allows you to focus on what’s most important for you and your organization to be successful. Saying “no” when appropriate frees you up to make that big impact you want to make, to inspire others, have a vision or develop the relationships that are essential to great leadership.


Seven Rules for Managing Creative People
The more you pay people to do what they love, the less they will love it. In the words of Czikszentmihalyi, "the most important quality, the one that is most consistently present in all creative individuals, is the ability to enjoy the process of creation for its own sake." More importantly, people with a talent for innovation are not driven by money.


Tech groups protest anti-China provision in U.S. budget resolution
The budget amendment could impede the U.S. government from acquiring the "latest cutting-edge IT products," the letter said. The requirement to assess IT products will slow the federal acquisition process, it said. In addition, the provision could lead the Chinese government to retaliate against U.S. IT vendors, and it could encourage "copycat" legislation in other countries that limits their governments' purchase of U.S. products, the letter said.


Google Apps v. Office 365: Email and messaging
Ian Hardenburgh continues his in-depth comparison of Google Apps and Microsoft Office 365 office suites. In this segment, he compares the email and messaging features of both ... Although some features, such as the sheer ability to organize and search for email messages and personal contacts are covered here, these capabilities are all but an afterthought these days as desktop clients and standards/open based file formats like Personal Storage Table files have become status quo.



Quote for the day:

"Decisiveness is a characteristic of high-performing men & women. Almost any decision is better than no decision at all." -- Brian Tracy

April 04, 2013

On Attitude & Aptitude
There is a difference between attitude in thinking and aptitude in judging. The former is about our perception, or worldview, of a situation and the latter is about our ability to assess a situation. Complacency builds and danger looms when the emotional part of attitude overshadows the logical part of aptitude. This is usually the case for those failed projects that are overdose with optimism. It is important to have dreams, but we still have to wake up someday.


Create your VMware test lab using AutoLab
vExpert Alastair Cooke is the man behind this solution, with some help from Damian Karlson and Veeam, a virtual backup and recovery company. As of this writing, AutoLab version 1.1a is out. In general, AutoLab automates your lab setup. If you have access to VMware Workstation, VMware Player, or ESXi servers/clusters, then you can use AutoLab for free.


California introduces 'right to know' data access bill, and why Silicon Valley will hate it
The new law introduced into the California legislative arena [PDF] would require any business that holds a customer's personal information to disclose it within 30 days of that customer's request. Adding to this, names and contact information of all third parties with which the business has shared that customer's data with during the previous 12 months must also be disclosed.


Google Glass gets competition from China's Baidu
"It's consistent for Chinese tech companies to copy US innovation," said Zeus Kerravala, an analyst with ZK Research. "I mean, Chinese engineering is very good. Top quality. But innovation still lives here in the U.S. The Chinese bring lower price points and push the U.S. companies to innovate faster." Kerravala also said he's not surprised that the challenge is coming from a search giant like Baidu.


Data Quality and the OK Plateau
In his book "Moonwalking with Einstein: The Art and Science of Remembering," Joshua Foer explained that “when people first learn to use a keyboard, they improve very quickly from sloppy single-finger pecking to careful two-handed typing, until eventually the fingers move so effortlessly across the keys that the whole process becomes unconscious and the fingers seem to take on a mind of their own.”


Google changes how Android stats are collected
Beginning in April, 2013, these charts are now built using data collected from each device when the user visits the Google Play Store. Previously, the data was collected when the device simply checked-in to Google servers. We believe the new data more accurately reflects those users who are most engaged in the Android and Google Play ecosystem.


Visualization as Process, Not Output
Roast beef sandwiches and scale models of the Eiffel Tower, in these sentences, are common nouns. Visualization, on the other hand, is a verbal noun. The word visualization encapsulates a process. And it's really that process that's the essential part, not the thing that results. A much more exciting e-mail — one that, sadly, I receive much more rarely — would be just use the verb. Something along the lines of: "Please visualize our data."


JavaScript Open Source Developers To Benefit From Enhanced jQuery
The new version of the popular JavaScript library jQuery may no longer support Internet Explorer 6, 7, and 8 versions, but will fully support Windows Store applications thanks to recent contributions from experts at appendTo and Microsoft Open Technologies, Inc. As Olivier Bloch wrote on the MSDN blog JavaScript developers could now develop apps for Windows 8 using what they already know along with their existing JavaScript code.


What is keeping the CIO up at nights?
Simple, existing technologies, however, have the power to be disruptive. G2 Crowd's co-founder Matt Gorniak agrees that the “acceleration of the disruption” is something that ought to be at the forefront of every CIO's mind. On the flip side of this, Rob May, founder and CEO of Backupify, is concerned with “technology lock-in.” Specifically, that being locked in to a specific technology set will limit an organization's ability to be innovative in a yet-to-be-determined fashion.


The real reason why Google forked WebKit
It seems like Google has given this a lot of thought, and the company believes that it will be able to remove seven build systems and delete more than 7,000 files from its rendering engine compared to WebKit, which means some 4.5 million fewer lines of code. This has already tempted Opera to adopt Blink.



Quote for the day:

"Knowledge has to be improved, challenged, and increased constantly, or it vanishes" -- Peter Drucker

April 03, 2013

Security Manager's Journal: Rights can be so wrong
The applications' vendors have been of little help, typically responding along these lines: "Our software needs to read and write a lot of files in many locations, so it requires a high enough level of permissions on the system to do that. Running as a domain administrator is the easiest way to ensure that the software will have enough access to run properly."


AMD sees the era of Moore's law coming to a close
"We [AMD] want to also look for the sweet spot," said Gustafson, "because if you print too few transistors your chip will cost too much per transistor and if you put too many it will cost too much per transistor. We've been waiting for that transition from 28nm to 20nm to happen and it's taking longer than Moore's Law would have predicted." "I'm saying you are seeing the beginning of the end of Moore's law."


CIOs Must Move From 'Mobile First' to 'Mobile Only'
It's not sufficient to think "mobile first" anymore, they say. Instead, CIOs who want to lead their enterprises into the postdigital future should begin thinking about "mobile only." The signs are clear, they say: In 2012, both Apple and Google Play surpassed 25 billion app downloads. Additionally, according toInternet trends research by Mary Meeker, a general partner at Kleiner Perkins Caufield & Byers, 13 percent of all Internet traffic in 2012 originated from mobile devices.


Top 10 Mobile Insurance Trends
Slide show: In new reserch, Strategy Meets Action offers insurers 10 of the most pertinent mobile business needs. This comes on the heels of SMA’s annua lInsurance Ecosystem research, which tracks IT spending plans and this year highlighted mobile as a key area, with 42 percent of property/casualty insurers and 27 percent of life and annuity insurers increasing spending in 2013. The trends are broken up into two groups, the first is related to content, and the second, technology.


Know the key legal and security risks in a cloud-computing contract
The two most important words to look for in a vendor contract are "vendor shall," Peterson said. Words such as "we'll strive to," "our goals," "targets" and "objectives" should raise red flags for users as they offer no concrete guarantees and give the vendor legal wiggle room ... "It used to be that a customer could negotiate a lot of protections in," Petersen said. "To some extent ... [now], you have to take contract terms they're offering."


E-waste disposal challenge 'not serious' in Singapore
The disposing of electronic waste (e-waste), which is growing rapidly, is of concern in Asia, but the situation in Singapore is not as severe as those experienced in other parts of the region. The situation is further helped by the government launching guidelines by this year to help companies better manage the recycling of infocommunication technology (ICT) equipment.
A recent survey by the eHealth Initiative found HIE organizations most concerned about developing a sustainable business model, securing funding, engaging with a wide range of stakeholders (which includes hospitals, laboratories, insurers and other care providers) and convincing those stakeholders that data exchange is secure. HIE entities also face competition from vendors, large integrated delivery networks and other HIEs, all of whom could promise healthcare providers better data exchange at a lower cost.


Machine learning needs human helping hand
Foong Sew Bun, chief technologist and distinguished engineer at IBM Asean, said computer algorithms are evolving to become more complex and, in some cases, able to process information in a way that is similar to how people think. Watson, for example, shows how algorithms can be fine-tuned to quickly analyze, understand and respond to big data challenges in a "near-human fashion", he said. That said, Foong noted these technologies have not reached the stage where they can understand the full breadth of the human communication process, as this involves intangible factors such as feelings and instincts.


Samsung taps Absolute Software for mobile security on Knox, Galaxy S4
Headed for Samsung Knox when it debuts this year, Absolute boasted that Samsung's mobile devices will then be the first worldwide to offer "constant, tamper-proof security connection for tracking, wiping, recovery and IT servicing" by including its endpoint security and management software. For reference, Knox is Samsung's mobile security platform for professional and personal accounts on enhanced versions of Android.


The 21st Century Data Center: An overview
Data centers range from on-premise facilities running traditional enterprise applications to massive outsourced installations offering a variety of cloud services. We examine the state of play in data center-land, and consider some of the trends that will shape its future.



Quote for the day:

"A culture of discipline is not a principle of business; it is a principle of greatness." -- Jim Collins

April 02, 2013

Confusing Story of the Week: PayPal Dumping VMware for OpenStack?
why can't PayPal keep VMware at the infrastructure layer and simply adopt OpenStack at the cloud management layer? After all, OpenStack is really a competitor to VMware's vCloud (not to vSphere virtual infrastructure). In the era of cloud to think that companies as large as PayPal or eBay will standardize on a single virtual infrastructure is not realistic and to think that these companies can afford to dump VMware in favor of any other hypervisor is also unrealistic.


500 Startups sees potential in India's e-commerce, education
The Indian startup community was abuzz with the arrival of prominent angel investor Dave McClure, founder of business incubator 500 Startups last month. His flagship Geeks on a Plane event (#GOAP) last month was certainly quite a hit. While McClure is back in the Valley, the work still continues with entrepreneur Pankaj Jain who was appointed as the venture partner for 500 Startups in India last October.


The Designing of a Logic Reasoning Methodology
To understand the relationship of logic reasoning and English language, we need to see the grammatical rules of English language; and how a predicate calculus can be constructed on it. Logical reasoning, especially deductive logic in the computational form of the predicate calculus (propositional calculus) is established as such that: all the predicates (sentences) form the basis of the reasoning and the foundation of the knowledge closure; and we test our conclusion (a test sentence) through the traversal of these predicate sentences which have been parsed using set of PC rules.


The humorous side of IT
Some geek humor is only appreciated by IT pros. Alan Norton discusses clueless user stories, silly names, and more, as well as when humor and IT don’t mix. Whether you call it geek humor or IT humor, there is a class of humor told by IT professionals that only they understand and appreciate. Here are just a few categories of IT humor


Big Data and In-Memory: Are They Related?Most of the big data applications are analytics. With OLTP we get a transaction that updates or adds some data, and once it is complete the business result has been achieved. OLTP transactions are short, sharp and fast. With analytics, the data analyst conducts a fairly extensive dialogue with the data. There may be many steps to this. In modeling a problem the analyst may read just a small sample of the data and then interacts with it using various statistical techniques.


Infrastructure provisioning challenges: Linking physical and virtual
Many organizations deployed virtualization for the capital expense savings, but found they save on operational expenses as well. The operational expense savings results from improved manageability and the ability to use automation to work with large numbers of VMs with minimal manual effort. Keeping these savings in mind, how could you mimic the improvements in the physical parts of your infrastructure?


Thousands of Companies Diagnosed with Dreaded "Silo Syndrome"
A silent epidemic afflicting hundreds of thousands of companies worldwide was diagnosed as "Silo Syndrome" today by leading Big Data authorities. Long speculated as the cause behind loss of agility, business insight and competitive advantage, Silo Syndrome does not discriminate, and is particularly dangerous to organizations in the financial services, healthcare, technology, e-business and government sectors.


H-1B demand this year will be fast, furious
Opponents will counter that H-1B visa employees are displacing U.S. workers, and they will point in particular to H-1B visa demand by offshore outsourcing companies. Immigration experts say visa demand this year will be high enough to cause the U.S. Citizenship and Immigration Service (CIS) to hold a lottery to decide who gets a visa. The last time this happened was in 2008.


Building trust in your managers
That question is not just about right versus wrong. It’s also about competence versus incompetence. Sometimes managers let things slide because they “trust” their employees will perform. Trust is a bond between individuals or between teams and their supervisors. It can never be expected, nor imposed. It is earned through example and reinforced through success as well as recognition.


Knimbus enables Web-based knowledge discovery, collaboration
Knimbus aims to democratize information by connecting and enabling knowledge-based communities around the world. The company's platform helps researchers find and access millions of journal articles, patents, and e-books. Users can tag, share, and discuss relevant content with their peers, and their activities create an information signal around the most relevant content and helps other users discover similar information.



Quote for the day:

"The men who try to do something and fail are infinitely better than those who try to do nothing and succeed." -- Lloyd Jones

April 01, 2013

KPMG Study on Government Cloud Use Urges Faster Adoption
KPMG conducted a global study on government cloud adoption. They found out that many government agencies from across the globe are now adopting cloud technology for their respective operations, which allows them to start new venues of interaction with other government agencies as well as the private sector and the citizens. Another big reason for embracing the technology is that it has allowed many of them to focus more on the effectiveness of their programs instead of being distracted by the management of IT.


Veterans Affairs BYOD Plans On Hold
Legal concerns are just the latest in a series of questions that have arisen throughout government as a growing number of federal agencies tackle bring-your-own-device (BYOD) policies. The Federal Chief Information Officers Council drew up a 43-page document last year in an effort to help agencies navigate the challenges of moving toward BYOD.


What Losing My Job Taught Me About Leading
Personally acknowledging their work sets you apart as a candidate — and later on, as a leader. If you cultivate a relationship in a genuine, thoughtful way, people will be more inclined to want to help you even though they don't have to help you. When you're connecting with people, honoring them, and thanking them for their contributions, you'll naturally find yourself with a larger network — something you need not only to find a job, but to lead effectively once you have a new job.


How to secure data on private cloud
"In-house private cloud computing implementations are often a triumph of hope over experience unless the in-house team truly has the funding and skills to implement a world-class quality of service offering. Few, for example, can ever hope to have the economies of scale and investments in technology, process and people excellence of a market leading enterprise-grade cloud services provider."


Mobile Computing and BYOD Challenges the Data Center
Responses to the question on budgets for mobile device management clearly indicate that the majority of the sample base is casually involved, and/or not directly involved in mobile device management. Nonetheless the responses to question sequences are consistent; however, caution should be applied when extrapolating business opportunities from this data set.


'A CIO's role in BFSI is increasing in importance'
With banking and finance regulations occupying center stage, a CIO has become a member in strategy planning. Today, regulators want to see the sector following the rules and aren't lenient in their terms. This is a move to introduce transparency, audibility and credibility. Regulations have brought CIOs back in limelight. It has shifted his role from a backend executive to a strategy planning role. His/her position has been elevated and is more involved in decision-making blueprint of technology and information backbone.


Windows Intune Wave D: Tooled up for BYOD
What's most important about this release of Intune is that it's a pointer to a more modern way of managing users and devices — one that's more in tune with the growing popularity of bring your own device (BYOD) schemes. Intune isn't about making devices part of a controlled environment — it's about understanding what rights users have, and what tools they need to support their tasks.


With new lab, IBM puts the CIO on notice
The lab's mission dovetails perfectly with IBM's core mission to use data to help businesses make better decisions; that's not the news here. The notable aspect of this announcement is that the chief information officer is -- at least in name -- a waning part of that vision. It's all about transforming the front office: technology touches everything now; it's not a departmental specialty anymore.


How Microsoft lost the future of gesture control
The rise of Apple as a consumer electronics company, Google's emergence as an everything company, and the advent of Web 2.0, the cloud and the social Internet have left Microsoft struggling to find a way to succeed in the markets of the future. There was one shining exception to this trend in the consumer market: Xbox in general and Kinect for Xbox 360 in particular.


5 strategic tips for avoiding a big data bust
Following are five strategic tips for avoiding big data failure. In many cases, the advice pertains to any data management project, regardless of the size of the data set. But the advent of massive data stores has brought with it a particular set of pitfalls. Here's how to increase the chances that your organization's urge to mix large data pools from disparate sources is a success.



Quote for the day:

"It does not matter how slowly you go as long as you do not stop." –-- Confucius

March 31, 2013

Next hurdle for mobile lifecycle teams: User experience skills
Commercial mobile developers generally understand the importance of getting that experience right. But for most enterprise development teams, it's a whole new ball game. Mobile ALM teams typically lack user experience (UX) skills, said Rege. "It's rare for [enterprise software teams] to have UX experts on staff. Until now, the user experience role didn't exist."


Critical denial-of-service flaw in BIND software puts DNS servers at risk
The flaw stems from the way regular expressions are processed by the libdns library that's part of the BIND software distribution. BIND versions 9.7.x, 9.8.0 up to 9.8.5b1 and 9.9.0 up to 9.9.3b1 for UNIX-like systems are vulnerable, according to a security advisory published Tuesday by the Internet Systems Consortium (ISC), a nonprofit corporation that develops and maintains the software. The Windows versions of BIND are not affected


Risk management strategy must be in place before moving data to the cloud
Any migration of company data to the cloud should be preceded by a thorough assessment of the nature of the data, including the relative impact a loss or theft of that data would have on internal operations, business partnerships and client/customer relations, plus the capabilities, security protocols and interdependencies of potential cloud service providers, the experts said last week during a panel discussion at Business Insurance's 2013 Risk Management Summit in New York.


Renesas Hopes to Put Powerful ARM Processor in Cars
The system-on-a-chip will be able to handle four streams of 1080p video, including Blu-Ray support at 60 frames per second, image and voice recognition and high-resolution 3D graphics with almost no CPU load, according to Renesas. The graphics performance is helped by the use of Imagination Technologies' PowerVR Series6 G6400 GPU.


10 portable battery chargers keep your device powered
Who among us hasn’t found ourselves silently cursing smartphone developers when our batteries run out of juice just when we need them most? These small but powerful portable battery chargers can help you out in a pinch; some can even charge your tablet, too. Just throw one of these handy little gadgets in your bag or pocket and you'll never find yourself without a power source when you are on the go. Arranged from largest capacity to lowest, here are 10 mobile battery chargers that can help keep you in power.


Malware-Detecting 'Sandboxing' Technology No Silver Bullet
The security technology called "sandboxing" aims at detecting malware code by subjecting it to run in a computer-based system of one type of another to analyze it for behavior and traits indicative of malware. Sandboxing -- one alternative to traditional signature-based malware defense -- is seen as a way to spot zero-day malware and stealthy attacks in particular. While this technique often effective, it's hardly foolproof, warns a security researcher who helped establish the sandboxing technology used by startup Lastline.


Software Complexity - an IT Risk perspective
Complexity as the above definition goes, requires more resources to be expended than normal and thus is counter productive. We have numerous best practices, standards and frameworks that advocate for eliminating complexity, but somehow it creeps in and pose as a challenge in most cases. The consequence of software complexity as we have put it above clearly is risk, and it could be even be a business risk, when we look at it in the end user perspective.


High Performance Messaging for Web-Based Trading Systems
This presentation by Frank D. Greco, Director of Technology for Kaazing Corporation will investigate WebSocket and how trading systems can be designed to leverage this new web protocol for reliability, security and performance for desktop, mobile, datacenter and cloud environments.


Pentaho Instaview Templates Improves Big Data Access And Analysis
To accelerate the big data analytics cycle, Pentaho Corporation has new templates for its Instaview big data discovery application. These new templates analyses big data in 3 easy steps and enable data analysts and IT professionals to discover, visualize and explore large volumes of diverse data.


Emerging Expectations of a CIO
CIO’s are witnessing significant change. Gone are the days of simply keeping IT running efficiently, reducing costs and mitigating risks. Today’s CIOs must also balance a broader role on the executive team and new responsibilities that directly influence business strategy. Carl Wilson, former Marriott CIO and executive consultant, and Craig Ledo, Director of Product Marketing, FrontRange discusses emerging expectations of a CIO and how to leverage IT to meet business demands



Quote for the day:

"Truly successful decision making relies on a balance between deliberate and instinctive thinking." --Malcolm Gladwell

March 30, 2013

IT Concerns About Targeted Malware Rising
"The whole thing with targeted malware is that targeted threats are aimed at you," says Goddess. "They are the most difficult to defend against because it's like a virus that only affects you. And the attackers are not stopping. They'll persist until they get in whether it takes months or years. Antivirus isn't going to work because people haven't seen the signatures before."


Building a Web Security Architecture – Deciding on the right form factor
The solution you choose should align to your business objectives. Beyond risk mitigation, you may need to support your business’ expansion; perhaps you are opening up new offices to accommodate your rapid growth or have to quickly absorb new offices coming into your network as the result of mergers and acquisitions. It may be that you are being asked to drive operational efficiencies; perhaps you need to consolidate IT resources, standardize your architecture or support virtualization and cloud initiatives.


Does completing a PCI compliance checklist ensure security?
The PCI DSS is not without value, but, ultimately, it is insufficient on its own to act as a basis for an effective software security program. One notable aspect of the PCI DSS is that it was the first major commercial standard to mandate specific application security measures. This had great potential to help organizations improve the security of the software they were producing and deploying, but, in practice, the PCI compliance checklist is pretty limited in its scope.


Windows Blue under the hood: MinKernel and BaseFS
Villinger found mention of something called "BaseFS" buried in the Windows Blue code. This doesn't seem to be a new name for ReFS, the new file system for Windows 8 and Windows Server 2012. Instead, according to one of my contacts, BaseFS is more of an internal concept that has to do with shared functionality between the different file systems


Top 10 consumerization definitions IT pros should know
It's important for IT professionals to stay ahead in this rapidly changing technological world. This list counts down our top tech terms related to the consumerization of IT, and explains how they affect IT. The rankings are based on our most popular terms, and the 10 definitions that made the cut say a lot about where IT has come from, where it is now and where it's headed.


Expert Advice on Co-Working Spaces for Small Businesses
Before you start a co-working space, it’s a good idea to build a community of people who would be the potential users. You can do this without even having a physical location. You can host a “jelly” — a regular meet-up of freelancers in a location such as a library or cafe. You can host other meetings in the evenings. This way you’ll get to know how much demand there is for your idea.


'Team mobile' takes shape
Mobile applications emerging today are true enterprise applications, in that they connect to key company databases and legacy systems, Murphy said. "You have to have an understanding of the back end in order to develop the front end that users see on their mobile devices." Early mobile apps didn't require that skill set, added Nathan Clevenger, chief technology officer for iFactr Inc., a St. Paul, Minn.-based firm that sells mobile tools for Microsoft developers.


Disruptive digital cliques
The core of successes in achieving enduring success with modern digital tools to enhance and simplify business performance is fundamentally about people, not the technology. Alarmingly large numbers of people have no clear idea of how they are expected to use powerful technologies at work and the result is typically very inefficient, with information and collaboration silos being spun up to suit cliques.


John Maeda on creative leadership
Innovating something, be it a stand alone product or a massively interconnected system, involves many more days of getting to the peak than it does scaling the peak. This is because there are so many pitfalls along the way -- so it always feels like you're climbing something. ... It can't be helped; if you're innovating, by definition you're venturing out through the dark unknown, so of course you'll stumble and fall and have to pick yourself up.


Capturing Compliance Requirements: A Pattern-Based Approach
We can considerably reduce the errors and omissions generated in expensive manual process inspections by partially or fully automating assurance tasks, thereby lowering compliance assurance’s overall cost. The degree of this automation is contingent on the ability to capture and formalize compliance requirements. Unfortunately, using formal languages to capture compliance requirements is diffi cult for business users who are unskilled or inexperienced with such languages.



Quote for the day:

"If you can find a path with no obstacles, it probably doesn't lead anywhere." -- Frank Clark

March 29, 2013

Straight talk on security gets employees to listen -- and comply
"Compliance is necessary, but it's not sufficient," says Malcolm Harkins, vice president and chief information security officer at Intel. Harkins' goal is to get employees to go beyond compliance toward full commitment to protecting the company's information. "If they're committed to doing the right thing and protecting the company, and if they're provided with the right information, [then] they'll make reasonable risk decisions."


Build Simple Web UIs with the Nancy Framework
According to the github page, the Nancy framework (NancyFx) provides the "super-duper-happy-path" -- a "lightweight, low-ceremony framework for building HTTP-based services." This is exactly what a Windows service needs for exposing a simple configuration UI. Normally, you'd plug NancyFx into ASP.NET and use it instead of Web Forms or Model-View-Controller (MVC). But NancyFx supports other hosts such as Windows Communication Foundation (WCF), and even supports the concept of "self-hosting."


New Windows 8 hardware specs hint at 7-inch tablets and a Microsoft Reader
The new guidelines relax the minimum resolution for Windows 8 devices to 1024 x 768 at a depth of 32 bits. That’s a significant change from the current guidelines, which require a minimum resolution of 1366 x 768 for a device to be certified with the Windows 8 logo. From the announcement, it appears that the new guidelines are effective immediately, but it’s likely that any new devices that use this form factor will ship along with the forthcoming Windows Blue update.


Microsoft makes good on promise, publishes list of 41K patents
"Transparency around patent ownership will help prevent gamesmanship by companies that seek to lie in wait and 'hold up' companies rather than enable a well-functioning secondary market," said Brad Smith, Microsoft's general counsel, on a blog announcing the searchable list. "[And] transparency is a prerequisite to enforceability of patent licensing pledges. Quite simply, without transparency it is impossible to determine if a company is in fact abiding by those commitments."


Our Security Models Will Never Work — No Matter What We Do
If security won’t work in the end, what is the solution? Resilience — building systems able to survive unexpected and devastating attacks — is the best answer we have right now. We need to recognize that large-scale attacks will happen, that society can survive more than we give it credit for, and that we can design systems to survive these sorts of attacks. Calling terrorism an existential threat is ridiculous in a country where more people die each month in car crashes than died in the 9/11 terrorist attacks.


8 Reasons Enterprise Architecture Programs Fail
Enterprise architecture was conceived some 25 years ago to address the increasing complexity of IT systems and their poor alignment with business goals. The same problems still exist today, amplified by the accelerating pace of technology change. Why is it that EA programs are more likely to fail than succeed? Here are eight typical failure modes, followed by recommendations on how to avoid them.


Failing. And dealing with it.
You will fail. That's the reality of trying to bring new things to life. You will fail, and may fail over and over and over. You may never succeed, actually. But, some folks are able to take that failure and get to the mantra of Principle 14, which is Failure Sucks, But Instructs. The wonderful article titled "Following Your Bliss, Right Off the Cliff" published on New York Times examines the failures and recoveries of several entrepreneurs


10 Geeky Ways to Celebrate April Fools' Day
April Fools' Day has become increasingly geeky, since the Web, cameras and other high-tech tools make it so much easier to prank people. Here's a roundup of ways to make the most of your April 1.


Don’t Plan for Perfection
we simply let the future unfold without forecasting. On the contrary, as a good manager, you must understand your costs, your revenue model and how you make money. And you’re on the hook for growing and strengthening over time. However, instead of relying on what is most often an unnatural level of precision around an unpredictable set of numbers, build the systems and processes to incorporate learning, constantly refresh forecasts and push the planning


What does a CTO do?
Amr Awadallah summarizes his findings by answering four core questions: (1) what is the CTO Mission? (2) how to measure the CTO? (3) How should the CTO split his/her time internally vs externally? then finally (4) what are the specific responsibilities of the CTO towards the main constituents inside the organization? Note that this role description is focused on pure CTOs, as opposed to CTOs whom still own the operational aspects of the engineering organization, it is also biased towards enterprise CTOs vs other domains.



Quote for the day:

"We all need lots of powerful long-range goals to help us past the short-term obstacles." -- Jim Rohn

March 28, 2013

BYOD is not for everybody, and especially not for executives
As computing devices get more personal and pervasive, people are going to be more confident and competent in their personal use of technology whether they’re on a desktop computer or a mobile device. But if you’re a CEO, director, manager, or your employment status makes you eligible for litigation, then bringing your own device to work can be detrimental to your personal and professional life.


A Serious Question for Serious Practitioners
The question Daryl Conner about to ask is aimed at seasoned practitioners who are at least proficient (preferably highly skilled) in practicing their craft and who relate to this work as an aspect of their life’s mission. Anyone reading this blog is invited to consider the question but that’s who it’s aimed at. Here is the question: Is there something beyond the obvious you are hoping to achieve through your work?


Update: Spamhaus hit by biggest-ever DDoS attacks
Matthew Prince, CEO of CloudFlare, a San Francisco-based firm that has been helping Spamhaus over the past few days, today said that the attacks have been going on since March 19 and have generated up to 300Gbps of DDoS traffic. That's about three times bigger than the biggest DDoS attacks seen so far and several magnitudes greater than the 4Gbps to 10Gbps of traffic generated by typical DDoS attacks.


5 Leadership Lessons: Avoiding the "Mediocre Me" Mindset
Mediocre Me by Brigadier General John Michel is a challenge to think differently about your role in the world. “Instead of the term leader being synonymous with someone who strives to use their influence to build value into their surroundings,” writes Michel, “it is more likely we associate it with someone doing whatever it takes just to keep the routine going.” Here are five more thoughts from Brigadier General John Michel:


iPhones most 'vulnerable' among smartphones
According to SourceFire's "25 Years of Vulnerabilities" study released in early March, which analyzed vulnerabilities from the Common Vulnerabilities and Exposures (CVE) data and National Vulnerability Database (NVD), the majority of mobile phone vulnerabilities have been found in Apple's iPhone. The database provides 25 years of information on vulnerabilities to assess, spanning from 1988.


On Kickstarter: The $99 Android-Powered MiiPC May Be Your Child's Next Computer
It launches this summer with Jellybean 4.2, a 1.2GHz Dual Core processor, 1GB of memory, and 4GB of internal flash storage. The box also packs in 2 USB ports, a speaker and microphone jack, Wifi, Ethernet, Bluetooth, and HDMI out. The developers have made tweaks to both the UI and base Android OS, optimizing it for large-screen displays of up to 1920×1080 resolution and baking in support for unlimited user accounts.


Coursera - Machine Learning
This course provides a broad introduction to machine learning, datamining, and statistical pattern recognition. Topics include: (i) Supervised learning (parametric/non-parametric algorithms, support vector machines, kernels, neural networks). (ii) Unsupervised learning (clustering, dimensionality reduction, recommender systems, deep learning). (iii) Best practices in machine learning (bias/variance theory; innovation process in machine learning and AI).


Global IT Spend Will Rise 4.1% To $3.8T In 2013, With Mobile And Enterprise Leading The Way
Gartner has just released its annual projections on worldwide IT spend over the next two years — arguably the analyst house’s most wide-ranging report covering sales in hardware, software, enterprise and telecoms. The overall trends continue to point up: globally we will see $3.8 trillion spent across all categories, a rise of 4.1% on 2012. That’s a sign of some recovery on a year ago: growth in 2012 was only 2.1%. Mobile and enterprise services are fuelling a lot of the good news, and Gartner further notes that the same trends will largely continue into 2014.


Windows Blue: Why IE 11 is taking a leaf from BlackBerry's book
The version of IE 11 in the leaked build of Windows Blue doesn't do quite that, which is a good thing: browsers trying to interpret prefixes marked for other browsers is not the way to get well-built web pages that take advantage of standards. What is seems to do (remember, this is an unofficial leaked build), is to use a brand new user agent string: IE instead of MSIE. Developers can still target IE specifically, but IE 11 won't be hampered by being sent to versions of pages designed for old builds of IE with bugs long since fixed.


Digital skills a key to the C-Suite: The rise of the Chief Digital Officer
Enter the chief digital officer (CDO). While the CIO labours to keep leading companies abreast of cumbersome, enterprise-wide technology upgrades and efficiencies – virtual servers, enterprise resource planning (ERP) and IT infrastructure of all kinds – and working behind the scenes, the CDO's remit is customer-focused (front end) technologies, investigating the social web, online marketing, data analytics and the impact of the digital revolution on the essence of a company's business strategy.



Quote for the day:

"Give me six hours to chop down a tree and I will spend the first four sharpening the axe." -- Abraham Lincoln

March 27, 2013

Microsoft confirms it's shut off Windows 8-Google Apps calendar sync
"This rift impacts both consumers and businesses negatively and needs to be addressed immediately. Impacted users won't change calendar services [just] to work with Windows 8, so it's up to Microsoft to do the right thing and implement CalDAV. [But] Google deserves ridicule for stopping EAS support, too."


Google Compute Engine: interview with NuoDB
Meet engineers from NuoDB: an elastically scalable SQL database built for the cloud. We will learn about their approach to distributed SQL databases and get a live demo. We'll cover the steps they took to get NuoDB running on Google Compute Engine, talk about how they evaluate infrastructure (both physical hardware and cloud), and reveal the results of their evaluation of Compute Engine performance.


The CIO: Facilitator of engaging employee experiences
IT leaders will never be able to expand the conversation about how technology can enable employees or redefine the relationship between IT and employees if the focus is on provisioning and managing technology. The conversations CIOs should be driving is how to design technology experiences which align technology with specific work tasks to drive actions that help employees achieve the outcomes they, and the business, desire.


Data management strategies: Toigo's 5 quick tips for clearing clutter
In this expert video presentation featuring Data Management Institute chairman and Storage Decisions speaker Jon Toigo, storage pros in need of new data management strategies in 2013 can learn five quick and simple ways to get started. View this video or read some of Toigo's comments below to find out how to implement good data hygiene policies without having to make it a year-long initiative.


Softphones provide better communication flexibility for BYOD era
"To be able to have one phone number regardless of the device or where they are physically located is a huge benefit," Myers said. "What company doesn't want their employees reachable or working 24 hours per day?" While organizations will likely never move to a single device that does both computing and telephony, it's not out of the realm of possibilities that a tablet and Bluetooth phone dongle could one day become the only equipment an IT department supplies to employees.


By Paying Employees To Live Near The Office, Imo Cuts Commutes, Ups Happiness
The principal benefits of living near where you work are almost too obvious to mention; the time that would have spent commuting simply goes back to things you love: family, friends, hobbies, sleep. But Imo has found there are secondary benefits, too. A five-mile radius (plus Palo Alto’s climate) makes active commutes, via bike or foot, more likely. Employees find they’re able to pop home during their lunch break to take care of a few quick chores.


Three Steps To Enterprise Cloud Migration
The first stage is co-location or rack hosting, a model in which hardware moves to an offsite data centre. ... The next stage would be managed services, with the hardware continuing to be owned but the services delivered by a third party. ... The final stage is the move to the cloud, a move, Mr Kalla says, that requires a mature and long-term outlook. “It’s a totally hand’s-off environment which might not please technical staff who typically like control".


The problem with the iPad
Everything about the device was built around making it as easy to use as possible. But it's possible to take simplicity too far, especially when enterprise users are concerned, and there's one aspect of the iPad that Apple may need to address to keep enterprise users happy, and that's file system access. Jean-Louis Gassée of The Guardian succinctly summed up the problem facing the iPad.


Performance tradeoffs of TCP Selective Acknowledgment
Selective acknowledgment (SACK) is an optional feature of TCP that is necessary to effectively use all of the available bandwidth of some networks. While SACK is good for throughput, processing this type of acknowledgment has proven to be CPU intensive for the TCP sender. This weakness can be exploited by a malicious peer even under commodity network conditions. This article presents experimental measurements that characterize the extent of the problem within the Linux® TCP stack. SACK is enabled by default on most distributions.


Outdated Java weak spots are widespread, Websense says
A new Websense report suggests that approximately 94 percent of endpoints that run Oracle's Java are vulnerable to at least one exploit, and we are ignoring updates at our own peril.  According to security researchers at Websense, it's not just zero-day attacks that remain a persistent threat. Instead, Java exploits are now a popular tool for cybercriminals.



Quote for the day:

"Talent hits a target no one else can hit; Genius hits a target no one else can see" -- Arthur Schopenhauer