April 10, 2013

Microsoft takes new 'Scroogled' shot at Google
"When you buy an Android app from the Google app store, they give the app maker your full name, email address and the neighborhood where you live," Microsoft asserted on its revamped Scrooggled.com site. "This occurs without clear warning every single time you buy an app. "If you can't trust Google's app store, how can you trust them for anything?"


CUDA Programming Model on AMD GPUs and Intel CPUs
Programming of GPUs is still a different approach to conventional programming, the benefit had to be significant enough to make the effort worthwhile. NVIDIA's CUDA platform has really simplified development. Arguments that it is still too complicated miss the point that massively parallel programming actually needs a different way of looking at things. How you split an algorithm over 1000s of cores must and should be different.


Vudu resets user passwords after hard drives lost in office burglary
"We believe it would be difficult to break the password encryption, but we can't rule out that possibility given the circumstances of this theft," Ganesan wrote in the e-mail (see below). "So we think it's best to be proactive and ask that you be proactive as well." ... Naturally, Ganesan suggested that if the expired passwords were used on other sites, that those be changed as well. Passwords of users who accessed the site through a third party were unaffected, he wrote.


Capacity management and sizing overview for SharePoint Server 2013
This article provides an overview of how to effectively plan and manage the capacity of SharePoint Server 2013 environments. This article also describes how to maintain a good understanding of the capacity needs and capabilities of your deployment, by analysis of performance and volume data. It also reviews the major application impacts that affect capacity, including content characteristics and usage.


LMAX - How to Do 100K TPS at Less than 1ms Latency
Martin Thompson and Michael Barker talk about building a HPC financial system handling over 100K tps at less than 1ms latency by having a new approach to infrastructure and software. Some of the tips include: understand the platform, model the domain, create a clear separation of concerns, choose data structures wisely, and run business logic on a single thread.


The perils of customising IT service management software
IT service management (ITSM) software is meant to reduce complexities associated with implementing IT services to meet business needs. There is a temptation for enterprises to customise ITSM software to fit their organisations like a glove, but if Suncorp and NSW Businesslink's stories are anything to go by, that may not be such a good idea.


Prepare your https sites for Firefox 23
On May 23, Firefox 23 will be released, and by default, it will block any non-SSL content loading on an SSL page. This means that any scripts, CSS, plugin contents, inline frames, fonts, or WebSockets that are loading with http instead of via https protocol will spark a notification to life. Avoiding this mechanism will be images, video, or audio.


Making data analytics work: Three key challenges
Tim McGuire sets out the triple challenge that companies face: deciding which data to use (and where outside your organization to look), handling analytics (and securing the right capabilities to do so), and using the insights you’ve gained to transform your operations. Misconceptions around these tasks trip up many companies.


4 Barriers Stand Between You and Big Data Insight
"The amount of information and data that we're collecting now is truly enormous in terms of the volume that is outside the four walls of the organization," says Anand Rao, principal at PwC. "Organizations don't have the right people, they don't have the right structure in place and they're still struggling with some of the tools and techniques."


The 5 Biggest Online Privacy Threats of 2013
"There's a pretty big disparity between what folks think their privacy rights are online and what they actually are online," says legislative counsel Chris Calabrese of the American Civil Liberties Union. "They mistake a privacy policy for meaning that they have privacy. That policy is frequently a way to describe the rights you don't have." As you watch your privacy being kicked around like a football in a scrum, pay close attention to the following five major threats.



Quotes for the day:

"A clever person solves a problem. A wise person avoids it" -- Albert Einstein

Don't feel bad if you’re unhappy with the status quo; feel motivated to change it. -- Tweet by Dan Rockwell

April 09, 2013

Update on TOSCA
TOSCA is an emerging industry standard which will improve portability of complex application workloads between clouds, to increase customer choice among cloud providers and to enable cloud-bursting. TOSCA is being developed in OASIS; the 1.0 version has passed the vote to be a committee specification; the specification is stable enough to develop to; and interoperability between 2 independent implementations has been demonstrated. ... Join this webinar for an update on TOSCA.


Fusion-io releases 1.6TB flash card, HP preps workstations for them
The new ioFX card has a top speed of 1.4GBps for reads, and 1.1GBps for writes. The previous version of the card had the same write speed, but a 700MBps read speed. "There are so many more [flash] chips configured in parallel, we naturally get a much higher write performance," said Vincent Brisebois, Fusion-io's director of visual computing. "But, usually write performance is not the focus of workstations."


Software lifecycle: Pay early attention to cloud performance
The best way to prevent performance problems is to take cloud issues into account early in the software lifecycle. That is notoriously difficult to accomplish, said Stephen Pierzchala, a technology strategist for Detroit-based Compuware Corp., which sells application performance management software. "Getting developers to factor in performance before they [write a line of code] is challenging," he said. "It's the biggest fight."


Meet the challenges involved in migrating to the cloud
Swidler discusses cloud design and patterns for application migration to the cloud. One question he answers is about why, in a very general sense, does it make sense to move into the cloud. He begins this discussion with an examination of the developers' motivation to create software. ... The developer's job isn't finished when the application is deployed, he says, and continues until the customer has consumed the value of the developer's ideas.


Multiple convolution neural networks approach for online handwriting recognition
As the most of recent approaches, the system proceeds by segmenting handwriting words into smaller pieces (usually characters) which are recognized separately. The recognition results are then the composition of the individually recognized parts. They are sent to the input of a word recognition module in turn to choose the best one by applying some dictionary search algorithms. The proposed classifier overcomes obstacles and difficulties of traditional ones to big character classes.


Technology Revolution and Risk
Technology change is part of the fabric of our society and with any technological revolution or change comes risks that need to be managed. The recent articles on Google Glass have highlighted the risks surrounding privacy, which is a key legal & compliance risk, and strategic risk in regards to competitor response to their innovation. The Apple iPhone 5 articles highlight risks around the operational risks of customers and products and strategic risk.


Bringing Big Data into Focus
The meaning of "big data" remains hard to pin down, and perhaps this will always be so because it describes what lies beyond the known limits of an organization's information technology implementations. Why are the limits there? It could be due to inadequacies in technology, skill sets, funding, data architecture, all of the above, or even none of the above.


Centralized vs. decentralized SDN architecture: Which works for you?
An area of concern for the centralized model in the network device element is the way OpenFlow forwarding is actually supported. Most modern switches and routers use custom silicon to manage the data-forwarding process, but not all implementations of OpenFlow take full advantage of this "fast-path" technology. As a result, OpenFlow forwarding performance is slower than native protocol support would be.


3 Ways to Overcome IT Outsourcing People Problems
IT outsourcing providers do a little better in the talent development department. It is their core business after all. Yet just under half of service providers said they had formal training programs in place to develop industry expertise and skills in analytics and relationship management, according to the survey. And just 60 percent of providers said they invest in core capabilities such as transition management and continuous improvement.


US Air Force designates cyber tools as weapons
Speaking to a cyber conference held in conjunction with the National Space Syposium in Colorado Springs on Monday,according to Reuters, the official said "this means that the game-changing capability that cyber is is going to get more attention and the recognition that it deserves. It's very, very hard to compete for resources [...] You have to be able to make that case."



Quote for the day:

"To win…you've got to stay in the game…" -- Claude M. Bristol

April 08, 2013

It's twilight for small in-house data centers
Service providers are growing dramatically. Of the new data center space being built in the U.S., service providers accounted for about 13% of it, but by 2017 they will be responsible for more than 30% of this new space, said Rick Villars, an analyst at IDC. "Most of the rapid growth is in service providers," which includes hosting, co-location and things such as a Facebook buildout, said Villars.


Government ramps up cloud market
By creating a marketplace for cloud computing services in two on-shore data centres, the NSW government would reduce perceived legal and security risks associated with offshore providers. “It's not a unique approach but is almost identical to the one the New Zealand government put in place,” said IDC analyst Chris Morris.


PMO Lingo and Acronyms to Tickle Your Funny Bone
Running a PMO is challenging. It can be nerve wrecking some times. To keep things into perspective and not to take self too seriously, it is good to joke about it once in a while. Here is a list of funny terms from workplace lingo that help lighten up a tough situation. To keep the blog “G” rated, PM Hut changed some of the words. However the idea remains and the humor hopefully still comes through.


Clayton Christensen Talks Venture Capital, Crowd Funding, And How To Measure Your Life
There is a different business model that is disrupting us, and that’s online learning. On-the-job education. So Intel University, GE Crotonville. This model of learning is: You come in, we’ll spend a week teaching you about strategy, and then you go off and develop the strategy. You come back for two weeks in product development, and we send you – you know. You use it and you learn it and you do it while you’re employed. It a very different business model, and that’s what’s killing us. And it’s truly what’s going to kill us.


Accenture Cloud Platform to Help Businesses Integrate and Manage Technology
“Already in use on more than 200 projects, the Accenture Cloud Platform features proven technologies and business processes to help our clients make the safe journey to cloud,” said Jack Sepple. “We foresee the growing use of public cloud services and are uniquely positioned to offer the best of breed from a variety of vendors. We are committed to moving our extensive portfolio of cloud offerings, broad ecosystem of alliance relationships, and large global client base to the cloud in all forms – public, private and hybrid.”


IT hardware vendors reject govt's step to curb cyberthreat
Indian government's joint working group set up by the National Security Council Secretariat has decided to make it mandatory on the part of hardware sellers to provide cyber security awareness brochures while sale of such hardware. ... However, this step is very timely, but at the same IT vendors are concerned it could give rise to logistical issues.


Jeremy Lightsmith Discusses Lean Startup and Design Thinking at Agile 2012
Jeremy Lightsmith is a seasoned agile coach, trainer & facilitator, excels at creating environments where teams can discover how they work best. He sits down with us to discuss how Nordstrom is using Lean Startup and Design Thinking to create innovation in a fortune 500 company.


NBN Co continues to defend 'Rolls-Royce' satellite strategy
There have been questions as to whether it was necessary for NBN Co to blow almost AU$1 billion on new Ka-band satellites, with Shadow Communications Minister Malcolm Turnbull claiming at the time that it was an unnecessary move, calling it the "Rolls-Royce" approach to providing satellite services to remote regions. He also said there is enough capacity from existing commercial satellite providers.


What is a Keylogger?
The keylogger often has the ability to sit between the keyboard and the operating system and intercept all of the communications without the user’s knowledge. The keylogger can either store the recorded data locally on the compromised machine or, if it’s implemented as part of a larger attack toolkit with external communication capabilities, sent off to a remote PC controlled by the attacker.


S'pore calls for 'new approaches' in cybersecurity
One way is to build up "anticipatory capabilities" through environment scanning as well as exchanging information and intelligence, so it will be easier to join the dots and form a more complete picture of the situation, Teo noted. This includes a theoretical element involving data analytics, risk analytics, and relationship modelling, along with a practical element. This requires testing concepts in real life to see if there are false positives and false negatives, he said.



Quote for the day:

"You can't let praise or criticism get to you. It's a weakness to get caught up in either one." -- John Wooden

April 07, 2013

Do You Need a Data Scientist?
The perception exists that you need a data scientist to capitalize on big data, but how do you find such a person and what do you do if your organization doesn’t have one? Krish Krishnan discusses the important skills needed and advises how to fill the data scientist role in the organization.


Choosing the Right ESB for Your Integration Needs
Different applications within companies and between different companies need to communicate with each other. The Enterprise Service Bus (ESB) has been established as a tool to support application integration. But what is an ESB? When is it better to use an integration suite? And which product is best suited for the next project? This article explains why there is no silver bullet and why an ESB can also be the wrong choice. Selecting the right product is essential for project success.


Hackers target Israeli websites
Yitzhak Ben Yisrael, of the government's National Cyber Bureau, said hackers had mostly failed to shut down key sites. "So far it is as was expected, there is hardly any real damage," Ben Yisrael said. "Anonymous doesn't have the skills to damage the country's vital infrastructure. And if that was its intention, then it wouldn't have announced the attack of time. It wants to create noise in the media about issues that are close to its heart," he said.


Handwritten Notes Are a Rare Commodity. They're Also More Important Than Ever.
While saying "thank you" is important, the beauty of a well-crafted handwritten note is that it can show deeper investment and appreciation than a simple thank-you can. It can follow up on a conversation, remind someone they're not forgotten, raise new issues, or even include a gift, like Bridgett's, that carries its own meaning. ... these simple acts of investment, remembrance, gratitude, and appreciation can show the people who matter to your life and business that they are important to you.


A Personal History of Compilation Speed, Part 2
Borland's other languages with "Turbo" in the name--like Turbo C--weren't even remotely close to the compilation speeds of Turbo Pascal. Even Turbo Assembler was slower, thanks in part to the usual step of having to run a linker. So what made Turbo Pascal so fast?


Disney closes LucasArts, will outsource development on future titles
A statement from LucasArts reads: "After evaluating our position in the games market, we've decided to shift LucasArts from an internal development to a licensing model, minimizing the company's risk while achieving a broader portfolio of quality Star Wars games. “As a result of this change, we've had layoffs across the organization. We are incredibly appreciative and proud of the talented teams who have been developing our new titles."


Women & Leadership: Ten Critical Steps Forward
A post for women and men who seek to empower stronger and better leadership in a world of unprecedented change, challenges and opportunities. The future lies in the hands of those who can empower and enable others. It is time for women and men to light the fire of human potential, of great leadership; doing so starts with women leading forward!


Gartner's Technology Trends for Information Infrastructure
Big Data, NoSQL databases and In-Memory computing are some of the technologies that will play key role in modernizing information management in 2013 and beyond, according to Gartner. A recent report released by Gartner team identifies the top technology trends that will have impact on the information infrastructure and governance.


Robot recruiters
Some insights are counter-intuitive. For instance, firms routinely cull job candidates with a criminal record. Yet the data suggest that for certain jobs there is no correlation with work performance. Indeed, for customer-support calls, people with a criminal background actually perform a bit better. Likewise, many HR departments automatically eliminate candidates who have hopped from job to job. But a recent analysis of 100,000 call-centre workers showed that those who had job-hopped in the past were no more likely to quit quickly than those who had not.


Mark Zuckerberg Might Be Right About Moore’s Law Of Sharing
So Zuckerberg sees the overshare, not just as a platform-specific phenomenon, but a societal phenomenon. He believes we’ll be sharing more “in the world” beyond Facebook. Assuming he’s right about the anthropology here, how could our technology allow sharing double, double, and double again?



Quote for the day:

"Nothing so conclusively proves a man's ability to lead others as what he does from day to day to lead himself." -- Thomas J. Watson

April 06, 2013

Data storage challenges outpace decision-making strategies
Jon Toigo, CEO and managing principal of Toigo Partners International, and chairman of the Data Management Institute, examines common decision-making processes in today's IT environments. According to Jon, these processes aren't effective enough to deal with the 'storage infrastruggle,' a term he's coined to describe the many data storage challenges faced by storage pros.


Nonstop cloud computing price war: Amazon, Google both drop rates again
Pricing for the default small VM running Windows OS dropped from $0.115 per hour to $0.091 per hour, a 21% drop. Other Windows VM types also fell in price, in some cases by an even higher percentage, including high-memory (now $0.51 per hour) and high-CPU (now $0.225 per hour). The news of AWS's price reduction was seemingly in response to the announcement by Google that same day of its Amazon-competitor cloud.


United HomeCare Services informs patients of data breach
United HomeCare Services, Inc. will offer two years of free credit monitoring for patients affected by the breach. PHIPrivacy also reports that the organization has said all of their laptops are now encrypted and are in full compliance with their encryption policy. And now all employees have been retrained laptop and client record privacy and security.


CxO Talk: Can a CIO and CMO be friends?
On this week's show, the CMO of legal information provider, LexisNexis, and CIO of Seton Hill University share advice on enterprise relationships, software, and selling advice to vendors. The discussion includes an insider's look at the CIO and CMO roles, along with advice for technology vendors selling to senior executives.


US executives 'question business value' of tech spend
Almost none of those surveyed (3%) rate their companies as "excellent", according to a new survey of more than 150 senior finance executives by CFO Research in collaboration with consultants AlixPartners. The survey also finds that more than two-thirds of financial executives (66%) give their companies a "C" or "D" grade when it comes to measuring financial returns from discretionary IT projects, such as big data ones, designed to improve or add to a company’s business and profits. Only 5% gave their companies an "A".


Big Data Protects Intel's Info
In 2012, Intel made significant progress in implementing this architecture, which is based on four pillars. The first pillar is identity and access management, which allows users' access privileges to be dynamically adjusted as the level of risk changes. Intel has tested this system in its production environment and continues to refine these tools for a range of devices, locations and infrastructure technologies.


Startup Hiring: When One Entrepreneur Is Enough
He or she could quickly leave when another hot startup pops up or when the business progresses past the initial stages. Most startups are fine with one or two of these early visionary types, but they need a different person as the second, third, or twenty-third hire. What they need is the "WANT-trepreneur." The Want-repreneur is the guy or girl that will someday become the entrepreneur — the ones who have the curiosity to build and explore new ideas, but haven't developed the full-on "entrepreneurial spirit" that so many employers claim to want.


How a trickle of BYOD costs can turn into a deluge
But take that one person's extra costs and multiple them by the other 5,000 people in the company who are doing the same thing every month. Now you have a run rate of $50,000 a month -- that's $600,000 a year. It didn't seem like much when it was only $10 for each person. It was easy to ignore. But when you add it up, it can be a real issue.


Making Sense of the Myriad SDN Offerings
One way to get your arms around it is to organize the various SDN announcements into buckets of common features and functionality. As you can see below, we can classify them into four buckets: 1) legacy proprietary systems; 2) overlay network virtualization; 3) abstracted network management systems; and, 4) open SDN architectures.


Amazon Announces CloudHSM To Secure Enterprises
According to a blog post published by Amazon Web Services, customers can have full control of their keys and entire cryptographic operations. All the keys are protected by a tamper resistant HSM designed in accordance with strict security standards.The new CloudHSM service is powered by a Luna SA appliance from SafeNet. The appliance features a tamper resistant hardware enclosure. Enterprises can use it to store their keys on the dedicated hardware unit and even use then to encrypt and decrypt data.



Quote for the day:

"Trying to get everyone to like you is a sign of mediocrity." -- Colin Powell

April 05, 2013

U.S. government can't intercept iMessage, but it can still serve Apple a search warrant
One U.S. law enforcement agency is struggling to snoop on messages sent by Apple devices, claiming they "cannot be intercepted." But lack of transparency on Apple's part may mean the technology giant is facing an influx of search warrants — and yet we don't know about it.


Tech overhaul for Portland police, fire, 3 years behind schedule, $10M over-budget
These issues "are largely the result of a problematic and shifting governance structure and inconsistent management," according to the audit. Moreover, Portland officials didn't take proper advantage of some lessons learned through the city's troubled SAP project, such as the need to ensure proper staff training, the report states. That effort ended up tripling its budget and taking more than twice as long to complete, according to another audit released in 2010.


Judge awards class action status in privacy lawsuit vs. comScore
ComScore uses OSSProxy software to track users. The software is typically bundled along with free software products like screen savers and music sharing software and is downloaded to the systems of end users that install them. Once installed, the software is designed to constantly collect and send to comScore servers a wide range of data, such as the names of every file on the computer, information entered into a web browser, the contents of PDF files and other data.


Growing use of mobile BI apps sparks need to downsize designs
Instead of trying to cram everything that's included in a PC-based BI application onto a single screen for mobile devices, Sherman recommended that application developers examine the processes business users typically run through to do BI and analytics, and then design mobile apps and BI dashboards to follow those trails.


Non-volatile DIMM cards coming soon to a server and array near you
With 10GB/s of throughput, it is roughly two and a half times faster than PCIe flash cards and can be used as another tier of high-speed storage. It can also used as a memory buffer for solid-state drives (SSDs) because of DRAM's ability to never wear out, no matter how many writes it receives. NAND flash memory in SSDs, however, has a limited life due to write amplification, a phenomenon in flash memory that requires data to be marked for deletion before it can be rewritten to another cell.


TypeScript Language Capturing .NET Developers' Attention
"Talking with many of the attendees at these conferences and at community events, I find many of them miss coding in C# and XAML. It's just easier for them," he said, noting that JavaScript lacks the tooling and syntax C# developers prefer. "I believe that TypeScript can provide the tooling and syntax to reduce the negative feelings most C# developers get from JavaScript."


The freedom of “no”
You must learn to say “no” to some things. Feeling the freedom of “no” allows you to focus on what’s most important for you and your organization to be successful. Saying “no” when appropriate frees you up to make that big impact you want to make, to inspire others, have a vision or develop the relationships that are essential to great leadership.


Seven Rules for Managing Creative People
The more you pay people to do what they love, the less they will love it. In the words of Czikszentmihalyi, "the most important quality, the one that is most consistently present in all creative individuals, is the ability to enjoy the process of creation for its own sake." More importantly, people with a talent for innovation are not driven by money.


Tech groups protest anti-China provision in U.S. budget resolution
The budget amendment could impede the U.S. government from acquiring the "latest cutting-edge IT products," the letter said. The requirement to assess IT products will slow the federal acquisition process, it said. In addition, the provision could lead the Chinese government to retaliate against U.S. IT vendors, and it could encourage "copycat" legislation in other countries that limits their governments' purchase of U.S. products, the letter said.


Google Apps v. Office 365: Email and messaging
Ian Hardenburgh continues his in-depth comparison of Google Apps and Microsoft Office 365 office suites. In this segment, he compares the email and messaging features of both ... Although some features, such as the sheer ability to organize and search for email messages and personal contacts are covered here, these capabilities are all but an afterthought these days as desktop clients and standards/open based file formats like Personal Storage Table files have become status quo.



Quote for the day:

"Decisiveness is a characteristic of high-performing men & women. Almost any decision is better than no decision at all." -- Brian Tracy

April 04, 2013

On Attitude & Aptitude
There is a difference between attitude in thinking and aptitude in judging. The former is about our perception, or worldview, of a situation and the latter is about our ability to assess a situation. Complacency builds and danger looms when the emotional part of attitude overshadows the logical part of aptitude. This is usually the case for those failed projects that are overdose with optimism. It is important to have dreams, but we still have to wake up someday.


Create your VMware test lab using AutoLab
vExpert Alastair Cooke is the man behind this solution, with some help from Damian Karlson and Veeam, a virtual backup and recovery company. As of this writing, AutoLab version 1.1a is out. In general, AutoLab automates your lab setup. If you have access to VMware Workstation, VMware Player, or ESXi servers/clusters, then you can use AutoLab for free.


California introduces 'right to know' data access bill, and why Silicon Valley will hate it
The new law introduced into the California legislative arena [PDF] would require any business that holds a customer's personal information to disclose it within 30 days of that customer's request. Adding to this, names and contact information of all third parties with which the business has shared that customer's data with during the previous 12 months must also be disclosed.


Google Glass gets competition from China's Baidu
"It's consistent for Chinese tech companies to copy US innovation," said Zeus Kerravala, an analyst with ZK Research. "I mean, Chinese engineering is very good. Top quality. But innovation still lives here in the U.S. The Chinese bring lower price points and push the U.S. companies to innovate faster." Kerravala also said he's not surprised that the challenge is coming from a search giant like Baidu.


Data Quality and the OK Plateau
In his book "Moonwalking with Einstein: The Art and Science of Remembering," Joshua Foer explained that “when people first learn to use a keyboard, they improve very quickly from sloppy single-finger pecking to careful two-handed typing, until eventually the fingers move so effortlessly across the keys that the whole process becomes unconscious and the fingers seem to take on a mind of their own.”


Google changes how Android stats are collected
Beginning in April, 2013, these charts are now built using data collected from each device when the user visits the Google Play Store. Previously, the data was collected when the device simply checked-in to Google servers. We believe the new data more accurately reflects those users who are most engaged in the Android and Google Play ecosystem.


Visualization as Process, Not Output
Roast beef sandwiches and scale models of the Eiffel Tower, in these sentences, are common nouns. Visualization, on the other hand, is a verbal noun. The word visualization encapsulates a process. And it's really that process that's the essential part, not the thing that results. A much more exciting e-mail — one that, sadly, I receive much more rarely — would be just use the verb. Something along the lines of: "Please visualize our data."


JavaScript Open Source Developers To Benefit From Enhanced jQuery
The new version of the popular JavaScript library jQuery may no longer support Internet Explorer 6, 7, and 8 versions, but will fully support Windows Store applications thanks to recent contributions from experts at appendTo and Microsoft Open Technologies, Inc. As Olivier Bloch wrote on the MSDN blog JavaScript developers could now develop apps for Windows 8 using what they already know along with their existing JavaScript code.


What is keeping the CIO up at nights?
Simple, existing technologies, however, have the power to be disruptive. G2 Crowd's co-founder Matt Gorniak agrees that the “acceleration of the disruption” is something that ought to be at the forefront of every CIO's mind. On the flip side of this, Rob May, founder and CEO of Backupify, is concerned with “technology lock-in.” Specifically, that being locked in to a specific technology set will limit an organization's ability to be innovative in a yet-to-be-determined fashion.


The real reason why Google forked WebKit
It seems like Google has given this a lot of thought, and the company believes that it will be able to remove seven build systems and delete more than 7,000 files from its rendering engine compared to WebKit, which means some 4.5 million fewer lines of code. This has already tempted Opera to adopt Blink.



Quote for the day:

"Knowledge has to be improved, challenged, and increased constantly, or it vanishes" -- Peter Drucker

April 03, 2013

Security Manager's Journal: Rights can be so wrong
The applications' vendors have been of little help, typically responding along these lines: "Our software needs to read and write a lot of files in many locations, so it requires a high enough level of permissions on the system to do that. Running as a domain administrator is the easiest way to ensure that the software will have enough access to run properly."


AMD sees the era of Moore's law coming to a close
"We [AMD] want to also look for the sweet spot," said Gustafson, "because if you print too few transistors your chip will cost too much per transistor and if you put too many it will cost too much per transistor. We've been waiting for that transition from 28nm to 20nm to happen and it's taking longer than Moore's Law would have predicted." "I'm saying you are seeing the beginning of the end of Moore's law."


CIOs Must Move From 'Mobile First' to 'Mobile Only'
It's not sufficient to think "mobile first" anymore, they say. Instead, CIOs who want to lead their enterprises into the postdigital future should begin thinking about "mobile only." The signs are clear, they say: In 2012, both Apple and Google Play surpassed 25 billion app downloads. Additionally, according toInternet trends research by Mary Meeker, a general partner at Kleiner Perkins Caufield & Byers, 13 percent of all Internet traffic in 2012 originated from mobile devices.


Top 10 Mobile Insurance Trends
Slide show: In new reserch, Strategy Meets Action offers insurers 10 of the most pertinent mobile business needs. This comes on the heels of SMA’s annua lInsurance Ecosystem research, which tracks IT spending plans and this year highlighted mobile as a key area, with 42 percent of property/casualty insurers and 27 percent of life and annuity insurers increasing spending in 2013. The trends are broken up into two groups, the first is related to content, and the second, technology.


Know the key legal and security risks in a cloud-computing contract
The two most important words to look for in a vendor contract are "vendor shall," Peterson said. Words such as "we'll strive to," "our goals," "targets" and "objectives" should raise red flags for users as they offer no concrete guarantees and give the vendor legal wiggle room ... "It used to be that a customer could negotiate a lot of protections in," Petersen said. "To some extent ... [now], you have to take contract terms they're offering."


E-waste disposal challenge 'not serious' in Singapore
The disposing of electronic waste (e-waste), which is growing rapidly, is of concern in Asia, but the situation in Singapore is not as severe as those experienced in other parts of the region. The situation is further helped by the government launching guidelines by this year to help companies better manage the recycling of infocommunication technology (ICT) equipment.
A recent survey by the eHealth Initiative found HIE organizations most concerned about developing a sustainable business model, securing funding, engaging with a wide range of stakeholders (which includes hospitals, laboratories, insurers and other care providers) and convincing those stakeholders that data exchange is secure. HIE entities also face competition from vendors, large integrated delivery networks and other HIEs, all of whom could promise healthcare providers better data exchange at a lower cost.


Machine learning needs human helping hand
Foong Sew Bun, chief technologist and distinguished engineer at IBM Asean, said computer algorithms are evolving to become more complex and, in some cases, able to process information in a way that is similar to how people think. Watson, for example, shows how algorithms can be fine-tuned to quickly analyze, understand and respond to big data challenges in a "near-human fashion", he said. That said, Foong noted these technologies have not reached the stage where they can understand the full breadth of the human communication process, as this involves intangible factors such as feelings and instincts.


Samsung taps Absolute Software for mobile security on Knox, Galaxy S4
Headed for Samsung Knox when it debuts this year, Absolute boasted that Samsung's mobile devices will then be the first worldwide to offer "constant, tamper-proof security connection for tracking, wiping, recovery and IT servicing" by including its endpoint security and management software. For reference, Knox is Samsung's mobile security platform for professional and personal accounts on enhanced versions of Android.


The 21st Century Data Center: An overview
Data centers range from on-premise facilities running traditional enterprise applications to massive outsourced installations offering a variety of cloud services. We examine the state of play in data center-land, and consider some of the trends that will shape its future.



Quote for the day:

"A culture of discipline is not a principle of business; it is a principle of greatness." -- Jim Collins

April 02, 2013

Confusing Story of the Week: PayPal Dumping VMware for OpenStack?
why can't PayPal keep VMware at the infrastructure layer and simply adopt OpenStack at the cloud management layer? After all, OpenStack is really a competitor to VMware's vCloud (not to vSphere virtual infrastructure). In the era of cloud to think that companies as large as PayPal or eBay will standardize on a single virtual infrastructure is not realistic and to think that these companies can afford to dump VMware in favor of any other hypervisor is also unrealistic.


500 Startups sees potential in India's e-commerce, education
The Indian startup community was abuzz with the arrival of prominent angel investor Dave McClure, founder of business incubator 500 Startups last month. His flagship Geeks on a Plane event (#GOAP) last month was certainly quite a hit. While McClure is back in the Valley, the work still continues with entrepreneur Pankaj Jain who was appointed as the venture partner for 500 Startups in India last October.


The Designing of a Logic Reasoning Methodology
To understand the relationship of logic reasoning and English language, we need to see the grammatical rules of English language; and how a predicate calculus can be constructed on it. Logical reasoning, especially deductive logic in the computational form of the predicate calculus (propositional calculus) is established as such that: all the predicates (sentences) form the basis of the reasoning and the foundation of the knowledge closure; and we test our conclusion (a test sentence) through the traversal of these predicate sentences which have been parsed using set of PC rules.


The humorous side of IT
Some geek humor is only appreciated by IT pros. Alan Norton discusses clueless user stories, silly names, and more, as well as when humor and IT don’t mix. Whether you call it geek humor or IT humor, there is a class of humor told by IT professionals that only they understand and appreciate. Here are just a few categories of IT humor


Big Data and In-Memory: Are They Related?Most of the big data applications are analytics. With OLTP we get a transaction that updates or adds some data, and once it is complete the business result has been achieved. OLTP transactions are short, sharp and fast. With analytics, the data analyst conducts a fairly extensive dialogue with the data. There may be many steps to this. In modeling a problem the analyst may read just a small sample of the data and then interacts with it using various statistical techniques.


Infrastructure provisioning challenges: Linking physical and virtual
Many organizations deployed virtualization for the capital expense savings, but found they save on operational expenses as well. The operational expense savings results from improved manageability and the ability to use automation to work with large numbers of VMs with minimal manual effort. Keeping these savings in mind, how could you mimic the improvements in the physical parts of your infrastructure?


Thousands of Companies Diagnosed with Dreaded "Silo Syndrome"
A silent epidemic afflicting hundreds of thousands of companies worldwide was diagnosed as "Silo Syndrome" today by leading Big Data authorities. Long speculated as the cause behind loss of agility, business insight and competitive advantage, Silo Syndrome does not discriminate, and is particularly dangerous to organizations in the financial services, healthcare, technology, e-business and government sectors.


H-1B demand this year will be fast, furious
Opponents will counter that H-1B visa employees are displacing U.S. workers, and they will point in particular to H-1B visa demand by offshore outsourcing companies. Immigration experts say visa demand this year will be high enough to cause the U.S. Citizenship and Immigration Service (CIS) to hold a lottery to decide who gets a visa. The last time this happened was in 2008.


Building trust in your managers
That question is not just about right versus wrong. It’s also about competence versus incompetence. Sometimes managers let things slide because they “trust” their employees will perform. Trust is a bond between individuals or between teams and their supervisors. It can never be expected, nor imposed. It is earned through example and reinforced through success as well as recognition.


Knimbus enables Web-based knowledge discovery, collaboration
Knimbus aims to democratize information by connecting and enabling knowledge-based communities around the world. The company's platform helps researchers find and access millions of journal articles, patents, and e-books. Users can tag, share, and discuss relevant content with their peers, and their activities create an information signal around the most relevant content and helps other users discover similar information.



Quote for the day:

"The men who try to do something and fail are infinitely better than those who try to do nothing and succeed." -- Lloyd Jones

April 01, 2013

KPMG Study on Government Cloud Use Urges Faster Adoption
KPMG conducted a global study on government cloud adoption. They found out that many government agencies from across the globe are now adopting cloud technology for their respective operations, which allows them to start new venues of interaction with other government agencies as well as the private sector and the citizens. Another big reason for embracing the technology is that it has allowed many of them to focus more on the effectiveness of their programs instead of being distracted by the management of IT.


Veterans Affairs BYOD Plans On Hold
Legal concerns are just the latest in a series of questions that have arisen throughout government as a growing number of federal agencies tackle bring-your-own-device (BYOD) policies. The Federal Chief Information Officers Council drew up a 43-page document last year in an effort to help agencies navigate the challenges of moving toward BYOD.


What Losing My Job Taught Me About Leading
Personally acknowledging their work sets you apart as a candidate — and later on, as a leader. If you cultivate a relationship in a genuine, thoughtful way, people will be more inclined to want to help you even though they don't have to help you. When you're connecting with people, honoring them, and thanking them for their contributions, you'll naturally find yourself with a larger network — something you need not only to find a job, but to lead effectively once you have a new job.


How to secure data on private cloud
"In-house private cloud computing implementations are often a triumph of hope over experience unless the in-house team truly has the funding and skills to implement a world-class quality of service offering. Few, for example, can ever hope to have the economies of scale and investments in technology, process and people excellence of a market leading enterprise-grade cloud services provider."


Mobile Computing and BYOD Challenges the Data Center
Responses to the question on budgets for mobile device management clearly indicate that the majority of the sample base is casually involved, and/or not directly involved in mobile device management. Nonetheless the responses to question sequences are consistent; however, caution should be applied when extrapolating business opportunities from this data set.


'A CIO's role in BFSI is increasing in importance'
With banking and finance regulations occupying center stage, a CIO has become a member in strategy planning. Today, regulators want to see the sector following the rules and aren't lenient in their terms. This is a move to introduce transparency, audibility and credibility. Regulations have brought CIOs back in limelight. It has shifted his role from a backend executive to a strategy planning role. His/her position has been elevated and is more involved in decision-making blueprint of technology and information backbone.


Windows Intune Wave D: Tooled up for BYOD
What's most important about this release of Intune is that it's a pointer to a more modern way of managing users and devices — one that's more in tune with the growing popularity of bring your own device (BYOD) schemes. Intune isn't about making devices part of a controlled environment — it's about understanding what rights users have, and what tools they need to support their tasks.


With new lab, IBM puts the CIO on notice
The lab's mission dovetails perfectly with IBM's core mission to use data to help businesses make better decisions; that's not the news here. The notable aspect of this announcement is that the chief information officer is -- at least in name -- a waning part of that vision. It's all about transforming the front office: technology touches everything now; it's not a departmental specialty anymore.


How Microsoft lost the future of gesture control
The rise of Apple as a consumer electronics company, Google's emergence as an everything company, and the advent of Web 2.0, the cloud and the social Internet have left Microsoft struggling to find a way to succeed in the markets of the future. There was one shining exception to this trend in the consumer market: Xbox in general and Kinect for Xbox 360 in particular.


5 strategic tips for avoiding a big data bust
Following are five strategic tips for avoiding big data failure. In many cases, the advice pertains to any data management project, regardless of the size of the data set. But the advent of massive data stores has brought with it a particular set of pitfalls. Here's how to increase the chances that your organization's urge to mix large data pools from disparate sources is a success.



Quote for the day:

"It does not matter how slowly you go as long as you do not stop." –-- Confucius