April 15, 2013

Internet of Things, once bitten, twice shy?
As you can see, the examples of Bruce Kasanoff are quit concrete. Think about what will happen, when we place sensors and wired-up objects in our bodies, in our houses, in our companies, in our cities and in our whole society. We will be able to measure every single part of society and business insights which will create competitor advantage on both short and long term.


Open standards critical for successful cloud strategy: Red Hat
For enterprises that have yet to take the cloud leap, the CEOs are increasingly putting pressure on CIOs to fast track their cloud journey as hype for the technology reaches fever pitch. But CIOs themselves are confronted by issues, such as how to adopt cloud in a manner that is not just relocating the company's IT infrastructure, and how to ensure IT security, according to McCabe.


Cloud-based security services market to reach USD 4.2 billion by 2016: Gartner
"Demand remains high from buyers looking to cloud-based security services to address a lack of staff or skills, reduce costs, or comply with security regulations quickly," said Eric Ahlm, research director at Gartner. "This shift in buying behavior from the more traditional on-premises equipment toward cloud-based delivery models offers good opportunities for technology and service providers with cloud delivery capabilities, but those without such capabilities need to act quickly to adapt to this competitive threat."


The Difference Between Finishers and 70-Percenters
There’s a class of professionals in the world one of my former bosses labeled as “70-Percenters.” They’re the people who are great at making noise, and even getting things started, but they don’t know how to close. They’re not finishers. Are you a Finisher or a 70-Percenter? Are you cultivating Finishers on your team?


14 cloud outages in 7 months, who is next?
Since January this year we have seen over 10 outages, wherein cloud providers were forced to eat their own words (read as claims) with regards to 99.999 per cent uptime and availability. The year, cloud outages began with online service provider Zoho's outage, which lasted for several hours on January 21, and affected about 5 million customers.


BYOL: Bring your own liabilities
In order to ensure that any savings are not outweighed by ongoing operational costs, organisations need to carefully consider how they intend to apportion liability between themselves and their employees in a number of important areas. For example, who will take responsibility for lost or stolen devices, and who will be responsible for malware or virus attacks associated with an employee’s device? There is no fixed answers to these questions under the law, and these are precisely the type of tricky operational issues that should be addressed in the policy.


How Will Google Glass Change Internet Marketing?
How might Google capitalize on Google Glass beyond the first wave of sales? It's a tricky question for several reasons. Google Glass is unlike anything that Google has done before. Come to think of it, it's unlike anything that anyone has ever done. Humankind is treading into an area of vague outcomes. There is so much potential for Google Glass that it's hard to get our head around all the possibilities.


The Worst Leadership Tragedy
Take yourself and a notebook to lunch once a month and askyourself probing questions: What is the message of repetitive frustrations? Frustrations are gifts that reveal development opportunities; What new connection should I develop? Dr. Henry Cloud, author of, “Boundaries for Leaders,” said, “We develop in the context of relationship.”; Is life’s trajectory upward or downward? ...


Interview with Michael Azoff from Ovum about How To Create the Agile Enterprise
The concept of the agile enterprise arises from practices that embrace common principles and values, such as putting uppermost the delivery of value to the customer and high-quality products. The ultimate goal is business agility, where the mainstream business processes have adopted agile ways of working and where IT use is optimized, from “run the business” to innovation, and from tactical requirements to long-term strategic requirements affecting the future of the business.


Finding Business Value in Information Management
There are many technologies entering our landscape that people need to be aware of in order to capitalize on the data available to organizations. William McKnight states that people need to challenge themselves to think beyond the traditional approaches and consider the new ways to bring value to their companies.



Quote for the day:

"One needs to be slow to form conviction, but once formed, they must be defended against the heaviest odds." -- Mohandas Gandhi

April 14, 2013

Critics Question Wording of Internet Freedom Bill
"This bill will have many unintended consequences on domestic telecom policy," she said. "The bill is about rehashing the debates of the past.A The bill is also about prejudicing the debates of the future, specifically concerning the transition to IP-based voice services."


A Framework for Cloud Strategy and Planning
A model based approach or a framework based approach to come up with the cloud strategy could help maximize value creation out of cloud adoption. With their expertise on the standards and frameworks and on the internal business capabilities, the Enterprise Architects are in the best position to take this mantle. Though there are various standards and frameworks that can be used to strategize and plan the Cloud Adoption, Mike Walker in his article suggests a simple three step framework for Cloud Strategy and Planning


A Unified Environment For Big Data Analytics
Big data is adding a burden on users, and for those who were starting to enjoy the freedom from worrying about the underlying systems, this isn’t a welcome development. The good news is that it doesn’t have to be this way. The market’s momentum is building towards merging big data systems and toolsets into a single, unified analytics platform that enables users to access any amount data of any type for any analysis at any time


Leveraging Technology for Disaster Risk Management
The Tokyo event highlighted technologies Japan leveraged in the aftermath of the Great East Japan Earthquake and tsunami, for instance: A real-time traffic map was generated and made available to the public (including via Google) using data gathered from moving vehicles; Observation data from flood sensors was distributed to car navigation systems and smartphones; and GPS data from mobile phones was used to reproduce and analyze the flow of people at the time of the earthquake.


Startup Aims SDN Technology at Cisco WANs
Glue's gluware software runs in the cloud and provides a cloud-based service for turning up remote sites and teleworkers worldwide. It is designed to lower the cost of private WAN networking by automating those operations and handling ongoing maintenance, monitoring, life-cycle management and feature extension.


RBI penalizes JPMorgan for risk norms violation
“On a careful examination of the bank’s written reply and the documents available on record, the Reserve Bank found that the violations were conclusively established and a penalty of Rs5 lakh was thus imposed,” an RBI release said. The Indian central bank had issued a show-cause notice to the US lender first and imposed a penalty as it was not satisfied with the explanation. A JP Morgan spokeswoman said the bank had “noted the central bank’s concern and had taken remedial action.”


Lawsuit could put kink in Microsoft's push for cloud security
According to a statement by StrikeForce, PhoneFactor's authentication technology infringes a patent issued to StrikeForce in 2011 for "several key technologies underlying a multichannel security system for granting and denying access to a host computer in response to a demand from an access-seeking individual and computer." Although StrikeForce's lawsuit is aimed at Microsoft, other companies may also find themselves in the crosshairs of patent litigation.


Bahrain is poised to benefit from ICT trends says expert
Microsoft Middle East and Africa vice-president Charbel Fakhoury said the kingdom has agility by virtue of its small size, which can be a decisive advantage in bringing about transformational change. "Bahrain can use technology to surpass big transcending geographical limitations to become a key regional powerhouse. "For Microsoft, Bahrain has been a key market for more than 20 years and the challenge is how to take the country into the new area of cloud, big data, social computing and mobility, creating new economic opportunities along the way," he said.


Innovation through PoS
A new age PoS solution can facilitate rich MIS on: Central aggregation of credit card transactions--transactions from all PoS terminals are all stored / archived in a central server; Facility to upload bank Payment Advice file; Automatic bank reconciliation and transaction dispute management; Financial closures; and Proactive alerts for better operational efficiency


Mobile apps: Devising software requirement specifications
In the mobile space, retention metrics are an important measure of the combined utility and user experience. Retention metrics typically show how much time users spend with an app, relative to the time elapsed since they first installed it. The key for B2C mobile apps is creating a great user experience around functionality, while also providing value to company behind the app.



Quote for the day:

"Really great people make you feel that you, too, can become great" -- Mark Twain

April 13, 2013

Data and data sets are not objective; they are creations of human design. We give numbers their voice, draw inferences from them, and define their meaning through our interpretations. Hidden biases in both the collection and analysis stages present considerable risks, and are as important to the big-data equation as the numbers themselves.


BMC's MyIT May Be the Future of IT Services
The ideal defensive move for IT departments is to treat consumer technology as the competition that it is and step up to the challenge. It isn't that IT can't win the battle by providing more reliable and more secure services; it's that often IT isn't even in the fight. However, BMC Software's recent MyIT initiative is designed to address this problem directly by providing a personal UI that's tailored to a user's role and is accessible on mobile devices as well as the traditional desktop.


Flexible Search using Stored Procedures: varying the WHERE clause at run-time
The technique uses a single stored procedure with a single WHERE clause containing all search terms and uses nullable parameters and boolean logic to decide exactly which combination of search terms is executed.


Google Submits Antitrust Remedies to EU
According to reports, the proposed remedies submitted Thursday are similar to a settlement Google struck with the U.S. Federal Trade Commission, and involve Google sharing more information through its advertising APIs (application programming interfaces) and agreeing not to scrape Web content from rivals.


Nasdaq Cloud Gets Rated as Regulation-Ready
The R3 service, the consulting firms said, meets the electronic records storage, retrieval and management requirements of: Securities and Exchange Commission Rule 17a-4(f), which regulates exchange members, brokers or dealers; Commodity Futures Trading Commission Regulation 17 C.F.R. §1.31(b)-(c), which regulates commodity futures trading. Cohasset said FinQloud adequately preserves records in “a non-erasable, non-rewriteable format” and with “ a highly secure deletion process.”


New Guidance for Healthcare Organizations to Assess Cybersecurity Preparedness
The HITRUST Cybersecurity Working Group was established to review the CSF and ensure the controls fully incorporate best practices consistent with the various risk factors related to cybersecurity for healthcare organizations. Given the increasing volume, sophistication and risks associated with cyber attacks perpetrated on healthcare organizations and increased awareness by legislators and regulators, HITRUST believes there is real value in providing additional guidance to organizations wanting to review their current level of preparedness, according to the group.


Surrounded by management consultants? Speak up.
"There are good consultants and bad consultants," Phelan says. "Good consulting is a combination of detective work, counseling, and in-depth industry knowledge." Such knowledge can really only come from experience. And the bad kind? "Bright, highly educated young kids -- and I know, because I was one -- who lack real expertise but who come in and impose a standard methodology they've been trained by their firms to use." Sound familiar?


Cloud haters: You too will be assimilated
The cloud will be a better experience than you have now, and it will be less expensive in terms of asset expenditure and total cost of ownership. But we at The Cloud Continuum are not entirely without compassion. Let's go down the list of your grievances and address your concerns. I mean, it's not like we have to, because we'll just end up owning your infrastructure anyway. But we are, if anything, attentive.


Wireless IP cameras open to hijacking over the Internet, researchers say
The vendors selling these cameras also have them configured to use their own dynamic DNS services. For example, Foscam cameras get assigned a hostname of the type [two letters and four digits].myfoscam.org. By scanning the entire *.myfoscam.org name space an attacker could identify most Foscam cameras connected to the Internet, the researchers said.


Congressional panel approves Internet freedom bill
The House Energy and Commerce Committee's communications subcommittee approved the Internet freedom bill, an attempt to discourage other countries from advocating for control of the Internet by the United Nations' International Telecommunication Union and other international agencies.



Quote for the day:

"Pull a string & it'll follow wherever you wish. Push it & it'll go nowhere at all." –-- Dwight D. Eisenhower

April 12, 2013

Want To Really Be Agile? Swarm!
The hackneyed phrase, "Good, fast, cheap -- choose two," is wrong in the agile world where collaboration is more powerful than divide and conquer. Our Agile Architect explains how to increase productivity significantly while also increasing code quality with a simple process change.


Modern Apps or Desktop? The Answer May be Spelled W-E-B
iOS and Android have proven that people still love their native apps, a lot. The real issue is that Web technologies are certain to be relevant for a long time and the native platform game, after having been stable for more than 20 years, is encountering upheaval that hasn't resolved yet. To which platform should you allocate more investment: the one that's volatile or the one that's stable? The latter would seem more sensible in the majority of cases.


Key benefits of architecting loosely coupled SOA-based solutions
The goal of every SOA architect is to develop a highly componentized, largely de-coupled system that makes application lifecycle management (ALM) easier -- from the start of the systems development lifecycle (SDLC) right through to the end. But are loosely coupled SOA-based systems always the answer? And isn't it true that, in some cases, tightly coupled systems aren't such a bad thing?


Privacy protections booted from CISPA data-sharing bill
Rep. Jan Schakowsky (D-Ill.), who proposed three unsuccessful privacy amendments, said afterward she was disappointed her colleagues did not limit the NSA and other intelligence agencies from collecting sensitive data on Americans. Her privacy amendments would have "required that companies report cyber threat information directly to civilian agencies, and maintained the long-standing tradition that the military doesn't operate on U.S. soil against American citizens," Schakowsky said.


Dell pushes the tablet envelope with the XPS 18
Rather than another slate somewhere between 5 and 10 inches, the XPS 18 is a monstrous 18-inch device. While this device is obviously not something that you’ll slip into your pocket, the XPS 18 presents a rather intriguing use case, especially in the office where most workers’ mobility consists of moving between meeting rooms rather than traipsing across continents.


Red Hat Updates JBoss Data Grid
The list of new features in this release includes cross-data center replication (XDR), which allows for replication across clusters and locations. The result, the company says, is better performance for remote users and applications. Another new feature, non-blocking state transfer (NBST), improves elasticity through a new pause-less join-and-leave protocol.


Is OpenDaylight the Next Penguin?
The OpenDaylight Project has a good technical overview, but even there it sounds more than a little like mumbo jumbo: "The business logic and algorithms reside in the applications. These applications use the controller to gather network intelligence, run algorithms to perform analytics, and then use the controller to orchestrate the new rules, if any, throughout the network."


Kaspersky discovers hacker group targeting online games
According to its blog post Thursday, Kaspersky fingered a group named "Winnti" to be responsible for breaking into the servers of at least 35 games developers and publishers since 2009. The evidence it had uncovered suggested the cybercriminals were looking to steal proprietary source codes to possible develop into pirated versions of the games, or to steal virtual currency which can be converted into real money, it said.


Four Master Data Management Mistakes to Avoid
Unfortunately, corporate data doesn’t naturally play well together. One customer may be present in five different systems. Three of those, however, may be derived from the first system, with one of them located in the cloud. Likewise, customer information may be stored in different ways. The finance system wants formal naming, akin to a Chamber of Commerce registry. The CRM system, meanwhile, caters to salespeople needing to trace contacts into specific business divisions, to prevent duplicate sales efforts.



A Practical Intro to Data Science
There are far fewer resources out there about the steps to take in order to obtain the skills necessary to practice this elusive discipline. Here we will provide a collection of freely accessible materials and content to jumpstart your understanding of the theory and tools of Data Science.



Quote for the day:

"When you innovate, you've got to be prepared for everyone telling you you're nuts." -- Larry Ellison

April 11, 2013

USB Says New Specification to Double Transfer Speed in the Works
The new specification is an improvement over the existing USB 3.0, which can transfer data at 5Gbps. Most PCs today ship with USB 3.0 ports, while smartphones and tablets have micro-USB ports based on the older and slower 2.0 specification. Mobile devices will get faster signalling rates with micro-USB 3.0 ports in the future.


How to Become a More Decision-Centric Organization
Many organizations’ success or failure is determined by the decisions they make. Insurance companies must make good decisions about which claims to pay or what to charge for a policy. Health care organizations must decide if it is safe to discharge someone or give them a particular medication. Retailers must decide what to stock where and how to promote it to their customers. Telecommunication companies must decide if they want to retain a customer and what offer is most likely to succeed.


A Guide to SQL Server 2012
The arrival of SQL Server 2012 brings both good news and news that’s less good. On one hand, the latest version of one of Microsoft’s best-established products is full of new features, including core support for Windows Server, enhanced auditing features and enhanced PowerShell support. In this free guide from Redmond magazine, learn more about the inner workings of SQL Server 2012, which new features are the most impressive, and how to budget for and manage this new and critical product.


Intel lays out plans for the hyperscale datacentre
The reference hyperscale design will be based around current and upcoming Intel technologies. Intel has already released the sub-10w Atom Centerton S1200 targeted at the microserver market and later this year will release the 22nm Avoton SoC with integrated Ethernet and improved performance per watt over Centerton processors. Avoton samples are with customers and the first systems are expected to be available in the second half of 2013.


Self-service software broadens BI usage, reduces reliance on IT
Self-service applications offer a way to extend the scope and reach of BI deployments while also creating a more personalized and collaborative decision-making environment for information workers, added Claudia Imhoff, president and founder of Intelligent Solutions Inc., a BI and analytics consultancy in Boulder, Colo.


How to Validate the Data Model
In response to my columns on the qualifications of the data modeler and how that can help business, a reader inquired about who is responsible for validating the data model. The answer to this question depends on the type of model being validated. In this column, I will examine the responsibilities for the business data model and in a future column, I will look at the validation responsibilities for the technology data model.


Tech jobs: CIOs look safe, IT managers face chop, chief digital officer is the next big thing
Firms are planning to crank up the hiring of chief digital officers and chief data officers, but it won't necessarily be at the expense of CIOs. In fact, it is IT middle management who look more likely to lose out. Some 19 percent of business leaders expect to recruit a chief digital officer by 2014, while 17 percent foresee a chief data officer appointment, according to a study by Gartner.


More than 6 out of 10 companies approve of personal device use for work
The online survey of 502 U.S. IT and business executives was conducted in February. It also found that the most popular option, cited by 58% of the respondents, was to have a mix of corporate-owned and employee-owned devices. For 53% of those surveyed, the top reason for allowing employees to use or select their own devices was to increase productivity while employees are away from the office.


IT helpdesk must up ante in cloud, BYOD era
The result is users are now accustomed to the idea of self-service in IT and generally do not approach the IT helpdesk, at least not at the beginning until the problem escalates, he noted. Also, with increased awareness of cloud services targeted for enterprises, some business units or departments have become more confident in engaging vendors without asking for IT's help. As such, any IT helpdesk that still provides only entry level type of support with a slow response rate "has no place" in today's corporate environments, Leow stated.


Data skepticism
So, if we really want to do data science, it has to be done by incorporating skepticism. And here’s the key: data scientists have to own that skepticism. Data scientists have to be the biggest skeptics. Data scientists have to be skeptical about models, they have to be skeptical about overfitting, and they have to be skeptical about whether we’re asking the right questions. They have to be skeptical about how data is collected, whether that data is unbiased, and whether that data — even if there’s an inconceivably large amount of it — is sufficient to give you a meaningful result.



Quote for the day:

"No person was ever honored for what he received. Honor has been the reward for what he gave." -- Calvin Coolidge

April 10, 2013

Microsoft takes new 'Scroogled' shot at Google
"When you buy an Android app from the Google app store, they give the app maker your full name, email address and the neighborhood where you live," Microsoft asserted on its revamped Scrooggled.com site. "This occurs without clear warning every single time you buy an app. "If you can't trust Google's app store, how can you trust them for anything?"


CUDA Programming Model on AMD GPUs and Intel CPUs
Programming of GPUs is still a different approach to conventional programming, the benefit had to be significant enough to make the effort worthwhile. NVIDIA's CUDA platform has really simplified development. Arguments that it is still too complicated miss the point that massively parallel programming actually needs a different way of looking at things. How you split an algorithm over 1000s of cores must and should be different.


Vudu resets user passwords after hard drives lost in office burglary
"We believe it would be difficult to break the password encryption, but we can't rule out that possibility given the circumstances of this theft," Ganesan wrote in the e-mail (see below). "So we think it's best to be proactive and ask that you be proactive as well." ... Naturally, Ganesan suggested that if the expired passwords were used on other sites, that those be changed as well. Passwords of users who accessed the site through a third party were unaffected, he wrote.


Capacity management and sizing overview for SharePoint Server 2013
This article provides an overview of how to effectively plan and manage the capacity of SharePoint Server 2013 environments. This article also describes how to maintain a good understanding of the capacity needs and capabilities of your deployment, by analysis of performance and volume data. It also reviews the major application impacts that affect capacity, including content characteristics and usage.


LMAX - How to Do 100K TPS at Less than 1ms Latency
Martin Thompson and Michael Barker talk about building a HPC financial system handling over 100K tps at less than 1ms latency by having a new approach to infrastructure and software. Some of the tips include: understand the platform, model the domain, create a clear separation of concerns, choose data structures wisely, and run business logic on a single thread.


The perils of customising IT service management software
IT service management (ITSM) software is meant to reduce complexities associated with implementing IT services to meet business needs. There is a temptation for enterprises to customise ITSM software to fit their organisations like a glove, but if Suncorp and NSW Businesslink's stories are anything to go by, that may not be such a good idea.


Prepare your https sites for Firefox 23
On May 23, Firefox 23 will be released, and by default, it will block any non-SSL content loading on an SSL page. This means that any scripts, CSS, plugin contents, inline frames, fonts, or WebSockets that are loading with http instead of via https protocol will spark a notification to life. Avoiding this mechanism will be images, video, or audio.


Making data analytics work: Three key challenges
Tim McGuire sets out the triple challenge that companies face: deciding which data to use (and where outside your organization to look), handling analytics (and securing the right capabilities to do so), and using the insights you’ve gained to transform your operations. Misconceptions around these tasks trip up many companies.


4 Barriers Stand Between You and Big Data Insight
"The amount of information and data that we're collecting now is truly enormous in terms of the volume that is outside the four walls of the organization," says Anand Rao, principal at PwC. "Organizations don't have the right people, they don't have the right structure in place and they're still struggling with some of the tools and techniques."


The 5 Biggest Online Privacy Threats of 2013
"There's a pretty big disparity between what folks think their privacy rights are online and what they actually are online," says legislative counsel Chris Calabrese of the American Civil Liberties Union. "They mistake a privacy policy for meaning that they have privacy. That policy is frequently a way to describe the rights you don't have." As you watch your privacy being kicked around like a football in a scrum, pay close attention to the following five major threats.



Quotes for the day:

"A clever person solves a problem. A wise person avoids it" -- Albert Einstein

Don't feel bad if you’re unhappy with the status quo; feel motivated to change it. -- Tweet by Dan Rockwell

April 09, 2013

Update on TOSCA
TOSCA is an emerging industry standard which will improve portability of complex application workloads between clouds, to increase customer choice among cloud providers and to enable cloud-bursting. TOSCA is being developed in OASIS; the 1.0 version has passed the vote to be a committee specification; the specification is stable enough to develop to; and interoperability between 2 independent implementations has been demonstrated. ... Join this webinar for an update on TOSCA.


Fusion-io releases 1.6TB flash card, HP preps workstations for them
The new ioFX card has a top speed of 1.4GBps for reads, and 1.1GBps for writes. The previous version of the card had the same write speed, but a 700MBps read speed. "There are so many more [flash] chips configured in parallel, we naturally get a much higher write performance," said Vincent Brisebois, Fusion-io's director of visual computing. "But, usually write performance is not the focus of workstations."


Software lifecycle: Pay early attention to cloud performance
The best way to prevent performance problems is to take cloud issues into account early in the software lifecycle. That is notoriously difficult to accomplish, said Stephen Pierzchala, a technology strategist for Detroit-based Compuware Corp., which sells application performance management software. "Getting developers to factor in performance before they [write a line of code] is challenging," he said. "It's the biggest fight."


Meet the challenges involved in migrating to the cloud
Swidler discusses cloud design and patterns for application migration to the cloud. One question he answers is about why, in a very general sense, does it make sense to move into the cloud. He begins this discussion with an examination of the developers' motivation to create software. ... The developer's job isn't finished when the application is deployed, he says, and continues until the customer has consumed the value of the developer's ideas.


Multiple convolution neural networks approach for online handwriting recognition
As the most of recent approaches, the system proceeds by segmenting handwriting words into smaller pieces (usually characters) which are recognized separately. The recognition results are then the composition of the individually recognized parts. They are sent to the input of a word recognition module in turn to choose the best one by applying some dictionary search algorithms. The proposed classifier overcomes obstacles and difficulties of traditional ones to big character classes.


Technology Revolution and Risk
Technology change is part of the fabric of our society and with any technological revolution or change comes risks that need to be managed. The recent articles on Google Glass have highlighted the risks surrounding privacy, which is a key legal & compliance risk, and strategic risk in regards to competitor response to their innovation. The Apple iPhone 5 articles highlight risks around the operational risks of customers and products and strategic risk.


Bringing Big Data into Focus
The meaning of "big data" remains hard to pin down, and perhaps this will always be so because it describes what lies beyond the known limits of an organization's information technology implementations. Why are the limits there? It could be due to inadequacies in technology, skill sets, funding, data architecture, all of the above, or even none of the above.


Centralized vs. decentralized SDN architecture: Which works for you?
An area of concern for the centralized model in the network device element is the way OpenFlow forwarding is actually supported. Most modern switches and routers use custom silicon to manage the data-forwarding process, but not all implementations of OpenFlow take full advantage of this "fast-path" technology. As a result, OpenFlow forwarding performance is slower than native protocol support would be.


3 Ways to Overcome IT Outsourcing People Problems
IT outsourcing providers do a little better in the talent development department. It is their core business after all. Yet just under half of service providers said they had formal training programs in place to develop industry expertise and skills in analytics and relationship management, according to the survey. And just 60 percent of providers said they invest in core capabilities such as transition management and continuous improvement.


US Air Force designates cyber tools as weapons
Speaking to a cyber conference held in conjunction with the National Space Syposium in Colorado Springs on Monday,according to Reuters, the official said "this means that the game-changing capability that cyber is is going to get more attention and the recognition that it deserves. It's very, very hard to compete for resources [...] You have to be able to make that case."



Quote for the day:

"To win…you've got to stay in the game…" -- Claude M. Bristol

April 08, 2013

It's twilight for small in-house data centers
Service providers are growing dramatically. Of the new data center space being built in the U.S., service providers accounted for about 13% of it, but by 2017 they will be responsible for more than 30% of this new space, said Rick Villars, an analyst at IDC. "Most of the rapid growth is in service providers," which includes hosting, co-location and things such as a Facebook buildout, said Villars.


Government ramps up cloud market
By creating a marketplace for cloud computing services in two on-shore data centres, the NSW government would reduce perceived legal and security risks associated with offshore providers. “It's not a unique approach but is almost identical to the one the New Zealand government put in place,” said IDC analyst Chris Morris.


PMO Lingo and Acronyms to Tickle Your Funny Bone
Running a PMO is challenging. It can be nerve wrecking some times. To keep things into perspective and not to take self too seriously, it is good to joke about it once in a while. Here is a list of funny terms from workplace lingo that help lighten up a tough situation. To keep the blog “G” rated, PM Hut changed some of the words. However the idea remains and the humor hopefully still comes through.


Clayton Christensen Talks Venture Capital, Crowd Funding, And How To Measure Your Life
There is a different business model that is disrupting us, and that’s online learning. On-the-job education. So Intel University, GE Crotonville. This model of learning is: You come in, we’ll spend a week teaching you about strategy, and then you go off and develop the strategy. You come back for two weeks in product development, and we send you – you know. You use it and you learn it and you do it while you’re employed. It a very different business model, and that’s what’s killing us. And it’s truly what’s going to kill us.


Accenture Cloud Platform to Help Businesses Integrate and Manage Technology
“Already in use on more than 200 projects, the Accenture Cloud Platform features proven technologies and business processes to help our clients make the safe journey to cloud,” said Jack Sepple. “We foresee the growing use of public cloud services and are uniquely positioned to offer the best of breed from a variety of vendors. We are committed to moving our extensive portfolio of cloud offerings, broad ecosystem of alliance relationships, and large global client base to the cloud in all forms – public, private and hybrid.”


IT hardware vendors reject govt's step to curb cyberthreat
Indian government's joint working group set up by the National Security Council Secretariat has decided to make it mandatory on the part of hardware sellers to provide cyber security awareness brochures while sale of such hardware. ... However, this step is very timely, but at the same IT vendors are concerned it could give rise to logistical issues.


Jeremy Lightsmith Discusses Lean Startup and Design Thinking at Agile 2012
Jeremy Lightsmith is a seasoned agile coach, trainer & facilitator, excels at creating environments where teams can discover how they work best. He sits down with us to discuss how Nordstrom is using Lean Startup and Design Thinking to create innovation in a fortune 500 company.


NBN Co continues to defend 'Rolls-Royce' satellite strategy
There have been questions as to whether it was necessary for NBN Co to blow almost AU$1 billion on new Ka-band satellites, with Shadow Communications Minister Malcolm Turnbull claiming at the time that it was an unnecessary move, calling it the "Rolls-Royce" approach to providing satellite services to remote regions. He also said there is enough capacity from existing commercial satellite providers.


What is a Keylogger?
The keylogger often has the ability to sit between the keyboard and the operating system and intercept all of the communications without the user’s knowledge. The keylogger can either store the recorded data locally on the compromised machine or, if it’s implemented as part of a larger attack toolkit with external communication capabilities, sent off to a remote PC controlled by the attacker.


S'pore calls for 'new approaches' in cybersecurity
One way is to build up "anticipatory capabilities" through environment scanning as well as exchanging information and intelligence, so it will be easier to join the dots and form a more complete picture of the situation, Teo noted. This includes a theoretical element involving data analytics, risk analytics, and relationship modelling, along with a practical element. This requires testing concepts in real life to see if there are false positives and false negatives, he said.



Quote for the day:

"You can't let praise or criticism get to you. It's a weakness to get caught up in either one." -- John Wooden

April 07, 2013

Do You Need a Data Scientist?
The perception exists that you need a data scientist to capitalize on big data, but how do you find such a person and what do you do if your organization doesn’t have one? Krish Krishnan discusses the important skills needed and advises how to fill the data scientist role in the organization.


Choosing the Right ESB for Your Integration Needs
Different applications within companies and between different companies need to communicate with each other. The Enterprise Service Bus (ESB) has been established as a tool to support application integration. But what is an ESB? When is it better to use an integration suite? And which product is best suited for the next project? This article explains why there is no silver bullet and why an ESB can also be the wrong choice. Selecting the right product is essential for project success.


Hackers target Israeli websites
Yitzhak Ben Yisrael, of the government's National Cyber Bureau, said hackers had mostly failed to shut down key sites. "So far it is as was expected, there is hardly any real damage," Ben Yisrael said. "Anonymous doesn't have the skills to damage the country's vital infrastructure. And if that was its intention, then it wouldn't have announced the attack of time. It wants to create noise in the media about issues that are close to its heart," he said.


Handwritten Notes Are a Rare Commodity. They're Also More Important Than Ever.
While saying "thank you" is important, the beauty of a well-crafted handwritten note is that it can show deeper investment and appreciation than a simple thank-you can. It can follow up on a conversation, remind someone they're not forgotten, raise new issues, or even include a gift, like Bridgett's, that carries its own meaning. ... these simple acts of investment, remembrance, gratitude, and appreciation can show the people who matter to your life and business that they are important to you.


A Personal History of Compilation Speed, Part 2
Borland's other languages with "Turbo" in the name--like Turbo C--weren't even remotely close to the compilation speeds of Turbo Pascal. Even Turbo Assembler was slower, thanks in part to the usual step of having to run a linker. So what made Turbo Pascal so fast?


Disney closes LucasArts, will outsource development on future titles
A statement from LucasArts reads: "After evaluating our position in the games market, we've decided to shift LucasArts from an internal development to a licensing model, minimizing the company's risk while achieving a broader portfolio of quality Star Wars games. “As a result of this change, we've had layoffs across the organization. We are incredibly appreciative and proud of the talented teams who have been developing our new titles."


Women & Leadership: Ten Critical Steps Forward
A post for women and men who seek to empower stronger and better leadership in a world of unprecedented change, challenges and opportunities. The future lies in the hands of those who can empower and enable others. It is time for women and men to light the fire of human potential, of great leadership; doing so starts with women leading forward!


Gartner's Technology Trends for Information Infrastructure
Big Data, NoSQL databases and In-Memory computing are some of the technologies that will play key role in modernizing information management in 2013 and beyond, according to Gartner. A recent report released by Gartner team identifies the top technology trends that will have impact on the information infrastructure and governance.


Robot recruiters
Some insights are counter-intuitive. For instance, firms routinely cull job candidates with a criminal record. Yet the data suggest that for certain jobs there is no correlation with work performance. Indeed, for customer-support calls, people with a criminal background actually perform a bit better. Likewise, many HR departments automatically eliminate candidates who have hopped from job to job. But a recent analysis of 100,000 call-centre workers showed that those who had job-hopped in the past were no more likely to quit quickly than those who had not.


Mark Zuckerberg Might Be Right About Moore’s Law Of Sharing
So Zuckerberg sees the overshare, not just as a platform-specific phenomenon, but a societal phenomenon. He believes we’ll be sharing more “in the world” beyond Facebook. Assuming he’s right about the anthropology here, how could our technology allow sharing double, double, and double again?



Quote for the day:

"Nothing so conclusively proves a man's ability to lead others as what he does from day to day to lead himself." -- Thomas J. Watson

April 06, 2013

Data storage challenges outpace decision-making strategies
Jon Toigo, CEO and managing principal of Toigo Partners International, and chairman of the Data Management Institute, examines common decision-making processes in today's IT environments. According to Jon, these processes aren't effective enough to deal with the 'storage infrastruggle,' a term he's coined to describe the many data storage challenges faced by storage pros.


Nonstop cloud computing price war: Amazon, Google both drop rates again
Pricing for the default small VM running Windows OS dropped from $0.115 per hour to $0.091 per hour, a 21% drop. Other Windows VM types also fell in price, in some cases by an even higher percentage, including high-memory (now $0.51 per hour) and high-CPU (now $0.225 per hour). The news of AWS's price reduction was seemingly in response to the announcement by Google that same day of its Amazon-competitor cloud.


United HomeCare Services informs patients of data breach
United HomeCare Services, Inc. will offer two years of free credit monitoring for patients affected by the breach. PHIPrivacy also reports that the organization has said all of their laptops are now encrypted and are in full compliance with their encryption policy. And now all employees have been retrained laptop and client record privacy and security.


CxO Talk: Can a CIO and CMO be friends?
On this week's show, the CMO of legal information provider, LexisNexis, and CIO of Seton Hill University share advice on enterprise relationships, software, and selling advice to vendors. The discussion includes an insider's look at the CIO and CMO roles, along with advice for technology vendors selling to senior executives.


US executives 'question business value' of tech spend
Almost none of those surveyed (3%) rate their companies as "excellent", according to a new survey of more than 150 senior finance executives by CFO Research in collaboration with consultants AlixPartners. The survey also finds that more than two-thirds of financial executives (66%) give their companies a "C" or "D" grade when it comes to measuring financial returns from discretionary IT projects, such as big data ones, designed to improve or add to a company’s business and profits. Only 5% gave their companies an "A".


Big Data Protects Intel's Info
In 2012, Intel made significant progress in implementing this architecture, which is based on four pillars. The first pillar is identity and access management, which allows users' access privileges to be dynamically adjusted as the level of risk changes. Intel has tested this system in its production environment and continues to refine these tools for a range of devices, locations and infrastructure technologies.


Startup Hiring: When One Entrepreneur Is Enough
He or she could quickly leave when another hot startup pops up or when the business progresses past the initial stages. Most startups are fine with one or two of these early visionary types, but they need a different person as the second, third, or twenty-third hire. What they need is the "WANT-trepreneur." The Want-repreneur is the guy or girl that will someday become the entrepreneur — the ones who have the curiosity to build and explore new ideas, but haven't developed the full-on "entrepreneurial spirit" that so many employers claim to want.


How a trickle of BYOD costs can turn into a deluge
But take that one person's extra costs and multiple them by the other 5,000 people in the company who are doing the same thing every month. Now you have a run rate of $50,000 a month -- that's $600,000 a year. It didn't seem like much when it was only $10 for each person. It was easy to ignore. But when you add it up, it can be a real issue.


Making Sense of the Myriad SDN Offerings
One way to get your arms around it is to organize the various SDN announcements into buckets of common features and functionality. As you can see below, we can classify them into four buckets: 1) legacy proprietary systems; 2) overlay network virtualization; 3) abstracted network management systems; and, 4) open SDN architectures.


Amazon Announces CloudHSM To Secure Enterprises
According to a blog post published by Amazon Web Services, customers can have full control of their keys and entire cryptographic operations. All the keys are protected by a tamper resistant HSM designed in accordance with strict security standards.The new CloudHSM service is powered by a Luna SA appliance from SafeNet. The appliance features a tamper resistant hardware enclosure. Enterprises can use it to store their keys on the dedicated hardware unit and even use then to encrypt and decrypt data.



Quote for the day:

"Trying to get everyone to like you is a sign of mediocrity." -- Colin Powell