May 21, 2013

Enterprise architects: Please leave your framework at the door
There are a lot of valuable ideas in standard EA frameworks, but they need to be customised to be practical. Enterprise architects should use frameworks for inspiration on how to achieve specific outcomes, instead of trying to apply the entire structure to their organisation. What is needed is a "skinny" EA. Leading EA practitioners have refocused on a narrow set of business outcomes to slim down the work effort and maximize the impact of EA.


IT's new concern: 'Bring your own cloud'
"IT has to deal not only with bring-your-own devices but bring-your-own services," Gartner analyst Michael Gartenberg says. People will bypass even viable alternatives if they feel that the officially sanctioned professional cloud offering isn't equal to the task -- or if they have a personal cloud app they like better. "If it's digital and it's consumer, it's going to find its way into the office. People will come up with reasons for using it," he says.


4 VDI Success Tips from an Insider
Citrix is most definitely a front-runner, but that doesn't mean you should immediately disqualify solutions from VMware, Microsoft or Dell. Time has taught us that VDI is not an all-or-nothing proposition, it's not for everyone, nor is it right for all of your workloads. Even then, here are some guidelines you can follow when implementing a VDI project.


Five ways financial services firms can fight the biggest IT security threats
Financial institutions are in a race against cybercrime, and today’s cybercriminals are doing all it takes to come in first. For hackers, the ultimate prize is gaining access to data that can be sold to global criminal organizations. ... To get an idea of the scale of this problem, the 2012 Norton Cybercrime Report revealed that cybercrime cost Canadians $1.4 billion within a recent 12-month period, with the average victim losing $169.


JSON Spirit: A C++ JSON Parser/Generator Implemented with Boost Spirit
JSON is a text file format similar to XML, but less verbose. It has been called "XML lite". This article describes JSON Spirit, a C++ library that reads and writes JSON files or streams. It is written using the Boost Spirit parser generator. If you are already using Boost, you can use JSON Spirit without any additional dependencies.


Social Intelligence: The New Frontier for Business Intelligence
The ever expanding use of social media and mobile technologies has dramatically changed how we communicate and how we interact with the companies that sell to us. As channels of communication expand to include social media networks, blogs, forums and chat rooms, digital and physical lives are intersecting more than ever. What people do online provides an increasingly accurate picture of their customer profile, including lifestyle choices, buying preferences and brand perception.


40 years ago, Ethernet's fathers were the startup kids
"Our spec was, we wanted to connect 255 personal computers at a distance of a mile, at some number of hundreds of kilobits per second ... and we wanted to do it with a minimum of cabling, because the predecessor networks all had these rooms full of cables that we called 'rat's nests,'" Metcalfe said.


In Memory: Just Because You Can Doesn’t Mean You Should
A few pioneer database vendors realized that using memory as the prime storage resource was a good, albeit costly, idea. As the price of RAM has fallen (on average it seems to fall at about 30% per annum) more database vendors have begun to offer in-memory options and capabilities. Indeed it seems that the in-memory database might even become fashionable.


Q&A: Why WLAN test tools should evolve quickly -- but likely won't
As more enterprises shift their wireless LAN infrastructure from being a side feature to their primary access network, testing these environments is becoming increasingly crucial. Network design expert Peter Welcher of Chesapeake NetCraftsmen spoke to SearchNetworking about the impact of wireless LAN growth in the enterprise and what it means for network management tools and troubleshooting tactics.


CIO interview: Colin Rees, IT director, Domino's Pizza
Rees is also not fazed by cloud computing fears and security risks. “Part of the challenge is to separate reality and rumour,” he says.  “The reality is that the security risks are high even in an internal data centre if managed poorly. In fact, we have seen a big improvement in reliability and a reduction in downtime with cloud systems. Over time, the distinction between cloud and non-cloud will thin out,” he adds.



Quote for the day:

"Truly strong leaders find a way to be kind even when others aren't." -- Mary Jo Asmus

May 20, 2013

Realizing Efficient Enterprise Security Intelligence
Security intelligence is built on the same concepts that have made business intelligence an essential enterprise technology. It is the critical next step for organizations that recognize the importance of information security to their business health. In this IBM® Redguide™ publication, you see how security intelligence addresses the shortcomings and empowers organizations from Fortune 500 companies, to mid-sized enterprises, to government agencies, to maintain comprehensive and cost-effective information security


Countdown clock begins for Singapore data compliance
The date all data protection compliance project teams in Singapore have been waiting for has been announced. July 2, 2014, is D-Day when Personal Data Protection Act will come into effect and when organizations will need to complete data inventory mapping, process audits, staff training, and publication of various processes.


Financial services and the public cloud: Go or no go?
“You have to overcome a lot of resistence from regulated industries before moving their stuff to the public cloud … You’ll have a hard time with your auditors in the short term if you go to public cloud,” Perretta told me recently. But, he’s keeping his eyes open because the cost savings of the public cloud are too good to ignore if these other issues can be resolved.


Linux/Cdorked.A malware: Lighttpd and nginx web servers also affected
Before going any further, one point needs to be clear about Linux/Cdorked.A. We still don’t know for sure how this malicious software was deployed on the web servers. We believe the infection vector is not unique. It cannot be attributed solely to installations of cPanel because only a fraction of the infected servers are using this management software. One thing is clear, this malware does not propagate by itself and it does not exploit a vulnerability in a specific software.


Is the Software-Defined Data Center a Good Fit for Financial Services?
The main concern with using a public cloud is that services are typically provided in multi-tenant environments. ... As a result, financial services, healthcare and insurance companies usually bypass pubic cloud solutions in favor of implementing private clouds within wholly owned or dedicated data centers. The capabilities offered by the software-defined data center (SDDC) are perfect for private clouds, and accordingly, are an appropriate fit for financial services, healthcare and insurance companies ...


How technology is changing the way we think about security
Indeed, the prelude to "destructive" attacks are disruptive attacks, which incidentally appear to be coming from nations that sponsor terror. The Distributed Denial of Service (DDoS) attacks which the financial sector has experienced in recent months are a good example of disruptive attacks ... So what can we do about it? In a recent security brief, Big Data Fuels Intelligence Driven Security (pdf), experts from RSA, Northeastern University in the US and Booz Allen Hamilton, set out the components for a big data-oriented security management system


Visibility Fabric Architecture
Sitting between the IT infrastructure and the tools that need the access to the traffic traversing the network, the Visibility Fabric architecture is comprised of the GigaVUE® family of fabric nodes and patented, advanced-level intelligence that can aggregate, filter, replicate or modify traffic to centralized management, analysis and security tools. The Visibility Fabric architecture is modular and extensible—suitable for a variety of networks of different size and scale from 1Gb connectivity to 2.4Tb chassis-based solutions.


Collaborative Approach to Smart IT
As the CIO of a large merged entity, Dohsung Yum, CIO, The Attachmate Group, had the tough task of ensuring a smooth IT integration of four businesses. As a veteran of the IT industry, Yum advises senior IT executives on how to plan IT strategy and work out an effective collaborative approach and a smart project plan in a merger scenario


Business Architecture
Business Architecture should be expressed independently of how the business architecture will be mapped to the underlying application architecture and infrastructure architecture, but is more connected to the business/contextual view of the information/data architecture and will include the organisation architecture.


What does done look like? - Project World Collectable Card #6
The reason why your project exists, is because it has to fulfil a goal, create an end result. The organization has a challenge to conquer or an opportunity to take advantage of. The goal of your project is a powerful mechanism for alignment. Everyone is working towards the same result. But first you have to make sure we all have the same understanding of what “done” looks like.



Quote for the day:

"Close scrutiny will show that most "crisis situations" are opportunities to either advance, or stay where you are." -- Maxwell Maltz

May 19, 2013

How a Scrum Master Can Handle Impediments with a Team
The expectations and collaboration between the scrum master and the team are important to make impediments work. Impediments are handled in different ways, a look at how some scrum masters do it. In the blog post, Gunther Verheyen discusses the role of the scrum master with respect to impediments. Starting from the scrum guide, he explains that the scrum master is expected to remove impediments, but that doesn't mean that (s)he has to find them:


When was the last time you assessed your coding risk?
Many coding errors that are identified go unreported externally as they are either found very quickly, appear to be an isolated problem for a customer, or do not impact customers in a significant manner. What is most amazing is that many of these events are identified and reported to organisations by customers rather than through internal processes. Therefore, we ask the question.


Enterprise Architecture – Needing Governance and Compliance
Whilst acknowledging that exceptions to strict adherence to Enterprise Principles and Standards may be required, the impact can be managed as part of Governance andCompliance processes. The risks brought to the business by the exceptions, once identified, can be mitigated. A Framework plus Governance plus Compliance are all essential components of an Enterprise Architecture.


How to Lead Great Leaders
As a boss or team leader, you have to lead people every day. It makes life easier when you have established authority and your followers are generally compliant. But someday you may find yourself leading powerful leaders, perhaps for a board meeting, a nonprofit, or even a high-level management team. These focused and dynamic people create completely different challenges for a facilitator.


Don’t be an ‘idea killer’: 10 tips for cultivating creativity
The broader leadership equivalent would be an idea killer, wouldn’t it? An idea killer may be a boss who actively shoots down proposals, or passively lets them languish. It may be be a manager who doesn’t know what it takes to build a culture of effective brainstorming, networking and innovation. So that’s how I danced my way into crafting this list. It’s for leaders who never want to be known as idea killers:


Why Software Product Delivey is not Identical to a Car Delivery?
A well written SoW (Statement of Work) clearly lists down the acceptance criteria, which when met would constitute acceptance of the delivery by the client. For a given requirements, no two vendors would build an identical solution. That's due to the tools, technologies out there for use and the varying intellectual abilities of those involved in building the software.


Azul Systems release Zing Platform Edition for WebSphere Application Server
InfoQ interviewed Azul CEO Scott Sellers about the launch and about Azul Systems. "The Zing PE announcement is special in that we have introduced specific optimizations for WebSphere Application Server (WAS) that make it really easy to deploy Zing in the context of WAS deployments, which are traditionally complex, especially when deployed to multiple instances"


The Postdigital CIO: Transforming Business Through Innovation
Recognizing that businesses can harness these postdigital forces to produce breakthrough innovations that transform the competitive landscape, C-suite executives throughout industry sectors are turning to CIOs to play an increasingly strategic role. What are the possibilities for the CIO’s role in the postdigital era? Two examples illustrate the potential that some organizations have already captured.


JavaScript Design Patterns - The Revealing Module Pattern
Addy Osmani describes the Revealing Module pattern as: "The Revealing Module pattern came about as [Christian] Heilmann was frustrated with the fact that he had to repeat the name of the main object when he wanted to call one public method from another or access public variables. He also disliked the Module pattern's requirement of having to switch to object literal notation for the things he wished to make public"


ESB Persists As Application Integration Tool
ESB has entered yet another transitional phase. Jason Bloomberg, president of ZapThink, a Dovel Technologies company, says there's a lot of noise in the market for and against ESBs. "It's a little hard to cut through and find out what's really going on," Bloomberg says. "Customers are generally confused about the whole thing."



Quote for the day:

"Have no fear of perfection--you'll never reach it." -- Salvador Dali

May 18, 2013

Researchers uncover 'SafeNet,' a new global cyberespionage operation
"While determining the intent and identity of the attackers often remains difficult to ascertain, we determined that the SafeNet campaign is targeted and uses malware developed by a professional software engineer that may be connected to the cybercriminal underground in China," the Trend Micro researchers said in their paper.


The Journey from Big Data to Big Promise
While much around big data remains hype, many companies are in the fledging stages of drawing value from their big data corpus, and given an army of discussions and opinions around the topic, it’s still hard to find a clear roadmap to arrive at the Big Promise. ... basically analytics can be categorized into three categories functionally, they are Descriptive Analytics, Relationship Analytics, Prescriptive Analytics.


Why an Internet sales tax is such an incomprehensibly bad idea
It will result in further damaging our economy while also causing the loss of jobs while also causing states and the federal government to collect less revenue, not more. It's not just that consumers will buy less online if their purchases are taxed. It's that operating an online store that deals with sales tax accounting is a very non-trivial task.


When Rule Books Block the Road, Throw Them Out
“We’re not going to be governed by a culture that defines a set of rules. We’re going to be governed by a culture in which we hold ourselves accountable for great performance, and for understanding that we trust each other enough that people are going to make good decisions because they’re here for the right reasons.”


10 key questions about software-defined networking
SDN as a network solution is not nearly as far along as virtualization in the server and storage worlds. Nevertheless, SDN is coming — and the more IT decision-makers and business leaders know about it, the better they’ll be able to determine where and when to introduce it to their data centers. Here are 10 of the questions they’re asking about SDN.


9 takeaways from Google I/O that matter to users
Google held its sixth annual I/O developers conference this week. During a nearly four-hour keynote address Google executives outlined some of the more enhanced features they are working on, several of which are available now. While many were geared specifically toward developers, most of them apply directly to consumers. Here are some of the more intriguing announcements.


How the consumerization of the enterprise has affected two firms
The companies' approaches to the consumerization of the enterprise were as different as the size and distribution of their workforces: Slalom has about 2,000 employees spread out across the country, whereas Huber's previous employer had 45,000 global employees. Huber shared his perspectives on how two companies handle consumerization differently, from mobility management to cloud support and more:


Innovation Isn't Working At 4 Out Of 5 Companies
Alon thinks the questions left plenty of wiggle room for execs to give their innovation programs the benefit of the doubt. "We didn't frame it as 'everlasting' competitive advantage," Alon said. Another metric in the study shows that for every one of 15 different innovation areas, execs were less likely than they were three years ago to rate them "very satisfied." "Commercialization and launch" and "consistent innovation performance" fared particularly badly.


Pushdo botnet is evolving, becomes more resilient to takedown attempts
In March, security researchers from Damballa identified new malicious traffic patterns and were able to trace them back to a new variant of the Pushdo malware. "The latest variant of PushDo adds another dimension by using domain fluxing with Domain Generation Algorithms (DGAs) as a fallback mechanism to its normal command-and-control (C&C) communication methods," the Damballa researchers said Wednesday in a blog post.


The Immune System is Risk
An effective risk management system is the immune system of the organisation. It is built to identify and mitigate against the “bad” viruses (problems) and to ensure the promotion and proliferation of the benefits. It also provides processes to continuously monitor the effective performance of the organisation in mitigating the “bad” viruses.



Quote for the day:

"Company cultures are like country cultures. Never try to change one. Try, instead, to work with what you've got." -- Peter Drucker

May 17, 2013

IT performance measurement is critical for strategic business decision making process
Organizations are now beginning to look at how they measure IT performance against fast changing business and organizational needs as IT and the business are expected to work more closely to drive business growth. Dataquest spoke to Amit Chatterjee, country director, HP Software India, to get insights on the HP-Coleman-Parkes Research study conducted in late 2012 across the APacJ region to assess the changing nature of IT performance measurement.


Google issues YouTube ultimatum to Microsoft as Hatfield-McCoy feud heats up
The letter read. "We were surprised and disappointed that Microsoft chose to launch an application that deliberately deprives content creators of their rightful earnings, especially given that Windows Phone 8 users already have access to a fully-functional YouTube application based upon industry-standard HTML5 through the Web browser."


3 Ways Co-location Data Centres Are Helping Your Business
Aside from talking about big data exclusively, Ian shared his view on data storage and suggested that the importance is where the solution is being built: “If the solution is built on a rock rather than on sand, that could be the very difference between that solution being a strategic competitive advantage for a company or failing versus the competition.”


Cross-Platform Development with Portable Class Libraries
Portable Class Libraries (PCLs) allow you to write code that can be targeted at a combination of .NET frameworks. You select the frameworks you want to target when creating a PCL project to gain assembly portability across those frameworks. You do lose some functionality, however -- the feature set available to your library is the intersection set of the features in the selected frameworks


Google rolls out by-the-minute cloud billing, introduces a new NoSQL database
At its developer’s conference today, Google also announced a cloud-hosted database for managing non-relational data. Cloud Datastore includes auto-scaling and replication for high availability, along with the ability to run SQL-like queries, the company says. The database is a natural complement to Google BigQuery, a data analysis application that’s already part of the company’s cloud platform.


Is outsourcing the answer to IT innovation?
Innovation Process Outsourcing is a critical step in embedding innovation habits into an organisation's DNA. An experienced innovation firm will be intimately familiar with the difficulties of involving broad sets of enterprise stakeholders in a collaborative process. Working underneath the innovation leader, outsourced programme managers can be embedded into the organisation as change agents and campaign managers.


Do you Really Need to Embrace Analytics?
If you have not witnessed the deluge of big data and business analytics media coverage to date, then welcome back from the coma you were apparently in for the last couple of years. For the rest of you, perhaps you have the same nagging question that I have: Are big data and business analytics such a big deal that if our organization is late to the party in deploying them, we will never catch up to our competitors?
The company has vehemently denied and dismissed this as a mere ‘speculation'. But the fact is Polaris, going by a report in Times of India, it says, "IT majors Wipro, HCL Technologies, and L&T Infotech has evinced keen interest in buying Polaris' service business which constitutes up to 80% of its revenues. The deal size is pegged at anywhere between $300 mn to $350 mn and Axis Capital is facilitating the deal".


DDoS attack trends highlight increasing sophistication, larger size
Morales indicated that attackers are "doing a bit more of their homework" when it comes to understanding the attack surface of a potential target. For example, a bank might serve a lot of SSL-encrypted traffic to its online users, so attackers will employ methods specifically geared toward exploiting that traffic. "That's what the attackers do, is figure out where your least point of resistance is and they use that against you," he said.


Google Wallet makes payments possible through Gmail
To send money through Gmail, the user composing the email has to hover over the attachment paperclip, click a $ icon to attach money to the message, enter the amount, and send the mail, Travis Green, Google Wallet product manager, said in a blog post on Wednesday. The recipient will receive an email confirmation that the money was sent immediately after.



Quote for the day:

"Enterprise Architecture is NOT a project. It is a way of life." -- John A. Zachman

May 16, 2013

21 principles of enterprise architecture for the financial sector
The article lists the most relevant architectural principles for an IT department to follow in the financial market, with details about each principle. These principles are essential for an IT department to take on a strategic role in the company and to indicate actual value generation in IT decisions within an environment where pressure and business decisions are critical.


Q&A: The value of corporate information governance as a business asset
As information continues its transformation into a commodity, companies need to rethink how they manage and protect that asset. Jeffrey Ritter, an attorney expert on law and technology, says the first thing companies need to do is realize that information is property -- and develop the right corporate information governance strategy to protect that property.


CRM pain points: On-premise or in the cloud, still room to improve
The integration between CRM and internal corporate systems is not entirely seamless. Various software purveyors publish their own sets of APIs (application programming interfaces) and there has been significant industry effort to standardize these-but every integration takes on its own flavor and involves some custom configuration. Because the configuration is custom, follow-on maintenance can also become a CRM headache.


A Shortage of Privacy Engineers
Companies are increasingly realizing the importance of designing privacy into their products and services from the beginning. There are numerous cases in which companies have had to scramble to retrofit privacy into existing systems. Many highly publicized incidents have involved social networks whose users were surprised when they realized information they considered private was transmitted to other users, advertisers, or even the public.


Does your cloud vendor protect your rights?
Google was the first out of the gate when it began issuing its Google Transparency Report three years ago. Since then, more cloud vendors, including Twitter, Dropbox and, most recently, Microsoft have followed suit by issuing their own transparency reports. These reports typically provide statistics regarding how often the vendor receives and fulfills government requests to provide access to customer data.


Disaster Recovery as a Service Considerations
Many organizations are exporting certain workloads -- like messaging and collaboration -- to the cloud. You can throw disaster recovery in with them. Many of my clients tell me that they cannot justify paying a hefty price for a secondary DR site to protect against disasters that may never happen. For those clients, DR is a workload that is well suited for the cloud.


Three Traps of Change Practitioners
We must recognize that our character is important to the quality of the process of change. A change practitioner who doesn't understand the impact of both “who we are” and “what we do” in the management of change can fall into one of three traps in which his or her ability to succeed is put at risk: The trap of pride; The trap of hypocrisy; The trap of deceit


FBI trains bank executives on cyberattack threats
Members of the financial industry were taken to over 40 FBI offices around the country to join a classified video conference, according to the FBI's Executive Assistant Director Richard McFeely. Many attacks aimed at online bank services were attributed to Iran, although McFeely did not comment on whether Iran was directly responsible for the attacks, or which banks participated at the conference.


Top Ten Misconceptions about ITIL
"ITIL is since many years the most popular IT Service Management framework out in the market. As an IT professional I use this framework for some time and as an ITSM-consultant and -trainer I am often confronted with some typical misconceptions around ITIL and… I learned over time the limits of ITIL and that it is not the ‘ITSM fruit for everything’." In the following I would like to share my ‘Top Ten List’:


Data Velocity: Why Decreasing Your Time to Insight Matters
Inevitably, greater speed costs more. For this reason, one challenge for CIOs and their colleagues is to determine when non-real-time data can be effectively applied. The aim should be to combine faster and slower technologies and systems to cost effectively solve. ... In today’s global business environment, where volatility has become a constant state, data velocity is the key to securing a competitive advantage. Reducing “the time to insight” is a business necessity.



Quote for the day:

"The pessimist complains about the wind. The optimist expects it to change. The Leader adjusts the sails." --John C. Maxwell

May 15, 2013

Data centers show signs of 'green fatigue'
Those service providers and colos are also the ones investing the most in going green, he said. IT energy costs make up a big part of their overall operating costs, so "every penny they save is profit," he said. Other companies, including big retailers and manufacturers, see less incentive to improve efficiency. For some, reliability and security are a bigger priority.


Security Auditing In Microsoft SQL Server
This paper(pdf) by Aaron C. Newman, CTO & Founder of Application Security Inc is based on “theoretical best-practices” combined with  “real-world practicality” to define a usable policy for auditing and monitoring databases. By following the policies we outline in this paper, you can properly implement a database system that will work well, and provide adequate security for the data it houses.


Doctors take their tablets to work
Broward Health, which has 2,000 physicians who practice at its hospitals, recently launched a "bring your own device" program at its Imperial Point hospital. The program invites doctors to bring their laptops or tablets into the hospital to enroll and encrypt them for use at the hospital or wherever they may want to update their patient orders or see records online. Two-hundred physicians have enrolled so far, and Broward Health will soon launch the program in Coral Springs.


Creativity, Innovation and Cake
Creativity is combining two or more different ideas or concepts in order to create a novel, new idea. Innovation is using those ideas to change your world for the better. In short, creativity is about the ideas. Innovation is about the implementation of those ideas in order to institute change. In a business context this would typically involve more money generated either through increased income (successful new product ideas), reduced costs or a combination of the two.


Infinite Scrolling: Let’s Get To The Bottom Of This
Infinite scrolling promises a better experience for users. However, the good is often accompanied by the bad and the ugly. Once we understand the strengths and weaknesses of infinite scrolling, we can begin to use it to enhance our interfaces. Human nature demands hierarchy and structures that are easy to navigate. But infinite scrolling sometimes leaves users feeling disoriented as they travel down a page that never ends.


Microsoft votes for free Windows 8.1, collects kudos
"Microsoft has a chance here," he said. "By the second half of 2014, there will be a lot more touch-enabled systems. That, and these updates, could help Windows 8 long term. I don't think Windows 8 will be more successful than Windows 7 [in the enterprise] but if 8.1 is easy to deploy, that could change over time."


Microsoft’s Uphill Battle with Analytics, Mobility
Microsoft has been steadily pouring money into big data and business intelligence. The company of course owns the most widely used analytical tool in the world, Microsoft Excel, which our benchmark research into Spreadsheets in the Enterprise shows is not going away soon.


This is why big data is the sweet spot for SaaS
When it comes to using big data technology effectively, there’s a lot to like about SaaS. When companies like BloomReach create and analyze massive web-wide data sets, they automate insights that almost no individual company could discover on its own. ... Companies are tired of managing applications and infrastructure, so something that optimizes a common task using techniques they don’t know on servers they don’t have to manage is probably compelling. It’s called cloud computing.


Wanted: More Directors With Digital Savvy
"The avalanche of digital activity is making directors conclude they are increasingly ill-equipped in the boardroom," observes Tuck Rickards, a managing director of recruiters Russell Reynolds Associates Inc. Digital directors, who are sometimes decades younger than many of their colleagues, weigh in on marketing strategy, business alliances and even recruitment, several company leaders say.


8 Risks Inherent to All Organizations
A critical part of achieving a state of “manageable risks” is realizing your organization is “never perfect.” In that ongoing risk assessment process – even mid-project – Schwager says the cultural shift of risk as integral to business may be the most difficult. “The trick is, actually, to move the risk function as close as possible to the business in order to have a really effective risk culture and management. And that can sometimes be painful in today’s risk environments,” Schwager says.



Quote for the day:

"Plans are only good intentions unless they immediately degenerate into hard work" -- Peter Drucker

May 14, 2013

Facebook to release data center switch spec for Open Compute Project
"If we don't do something differently now, it is quite possible that the closed and proprietary approach to technology development will be the limiting factor to how we scale the Internet and deliver awesome experiences to people," Frankovsky said. The Open Compute Project grew out of Facebook’s efforts to custom design and build software, servers and other data center components to deal with the ever-increasing demands placed on its infrastructure.


Change Management is Redundant Without Configuration Management
The first law of change management is not to use change management until you use configuration management first. ... If configuration management seeks to classify, quantify and qualify every element of computational and administrative resources alongside physical and human assets, then change management techniques can then be more accurately exerted upon any business or technical function once a process of pre-analysis has been undertaken.


Android is crushing Apple and Microsoft in the mobile device market
The market — which takes into account smartphone, tablet, and notebook shipments — grew to 308.7 million, representing year-on-year growth of 37.4 percent. But despite this market segment including traditional notebook devices powered by Windows, it is Android, a product of the Open Handset Alliance, that is making the biggest gains.


Sony to launch super-thin, flexible e-reader for universities
Sony said the bare-bones device is meant to mimic real paper and will have a feature set far smaller than other tablets or e-readers. It can handle only the PDF format, although it supports file creation as well as adding highlights and notes to existing documents. "Through actions such as replacing paper texts and materials used in universities with 'Digital Paper,' we aim to make classes more efficient and increase the learning effectiveness," the company said in a Japanese press release.


Canvas Control Library and New Forms Based System for building Web Pages and Websites
The newly introduced canvas element in HTML5 allows for drawing whatever you want on it using JavaScript. The current situation though is there are no controls you can use that are available that are purely based on the canvas. Akshay Srinivasan has created a Canvas Control Library with all the common controls and advanced ones like TreeView which due to the nature of canvas allow for great control over the graphical presentation of the controls and their item contents.


PayPal Check-in pays in shops without taking out your wallet
Once you've checked in using your phone, you wander round and do your shopping as normal. Then, when you go to the till, the shop's till system has registered you're on the premises and shows the assistant your photo. They check it's you, OK the purchase, and payment is magically made via PayPal as you trip lightly off into the sunshine with your new purchase.


DaaS vs. IaaS for Desktops
Elias Khnaser highlights few things that DaaS needs before it is a viable alternative to VDI. The biggest hurdle is Microsoft licensing. At the moment, the company doesn't have a Service Provider License Agreement for its desktop operating system products and that means customers have to provide their own Microsoft licensing to their DaaS provider. Without one, it gets very complicated, even more so than VDI Besides, it then is no longer provided in an "as a service" model.


Study: IT, business alignment tightens, but gaps remain
The Internet of Things, the concept that describes a Web-enabled world encompassing millions of devices, from automobiles to medical devices, was familiar to only 42% of respondents. That should send a strong signal to vendors and organizations backing IPv6 that much more work needs to be done to educate IT execs of the impact a copiously enabled world will have on today's infrastructure.


APAC CEOs Viewed as Tech-Savvy Pioneers-Gartner
“It is interesting that the Asia Pacific region, long seen anecdotally as more conservative in leveraging technology and driving innovation, has overtaken the global average of CEOs (26%) who describe their company cultures as being pioneering in the adoption of innovation,” said Gartner vice president and distinguished analyst Partha Iyengar.


Native Cross-Platform Apps with Tabris
To successfully develop a native App, it is not enough to display native widgets. The user navigation must also reflect the platform-specific concepts. In the case of native App development, the developer has access to the relevant platform concepts for designing the application. In the case of iOS, this is the ‘ViewController’ principle, for Android ‘Activities’ and the ‘ActionBar’. Only a few cross-platform toolkits abstract these concepts and unify them. This is exactly where Tabris comes in.



Quote for the day:

"The key to success is...to locate that sweet spot between Idealism and Pragmatism" -- Mark Evanier

May 13, 2013

Preserving Big Data to Live Forever
Internet Archive is attempting to capture every webpage, video, television show, MP3 file, or DVD published anywhere in the world. If Internet Archive is seeking to keep and preserve data for centuries, what can we learn from this non-profit about architecting a solution to keep our own data safeguarded and accessible long-term?


Cloud Integration Do’s and Don’ts
Check out this webinar recording on cloud data integration and the impact the right strategy can have on your Salesforce.com and overall SaaS application implementation success. The discussion also featured implementation guidance from one the top systems integrator partners of both Informatica Cloud and Salesforce –Silverline. Gireesh Sonnad, a partner at the firm, outlined what he sees as the Top Cloud Integration Do’s and Don’ts.


The Science of App-Wrapping
The essential operation of app wrapping lies in setting up a dynamic library and adding to an existing binary that controls certain aspects of an application. For instance, at startup, you can change an app so that it requires authentication using a local passkey. Or you could intercept a communication so that it would be forced to use your company's virtual private network (VPN) or prevent that communication from reaching a particular application that holds sensitive data, such as QuickBooks.


The Space Between Supervising Closely and Delegating
As a leader, where do you spend most of your time? If you really want to know, ask your direct reports. You might be surprised at what they have to say. When should you stop hanging out in the middle and move to Delegating? – When they have demonstrated they are fully competent and confident to do the work independently.


Microsoft responds to 'extreme' Windows 8 criticism
"There is a trend to the extreme," Frank X Shaw, corporate vice president of corporate communications at Microsoft, wrote on The Official Microsoft Blog on Friday, addressing some of the harsher attacks. ... where those who want to stand out opt for sensationalism and hyperbole over nuanced analysis. In this world where page views are currency, heat is often more valued than light. Stark black-and-white caricatures are sometimes more valued than shades-of-grey reality. So let's pause for a moment and consider the centre.


How the Cloud is Changing Backup Vendor Strategy
“I believe that backup, as we know it, is dead. We live in an always-on world where there’s an expectation that businesses of all sizes, run without interruption. Today’s ‘backup’ companies are built around the old model of copying files and folders to prevent data loss. Businesses need a new paradigm of protection – one that enables them to not only protect and access their data, but also their applications and systems at all times. ..."-- Justin Moore, Chief Executive Officer, Axcient


IPv6: From Internet to SuperNet
The IPv6 expansion of network addressing will allow many more connections to the Internet. ... In two weeks, I've already seen a major evolution in smart parking, with an idea that the license plate reader will hook up to the GPS in your phone and guide you to your car. No more lost cars! ... Bank notes fitted with RFID tags will become common, and all the apps to track stolen money etc. will keep more than a few coders busy.


Predictive Maintenance Solutions made possible by Big Data, Open Standards, and Analytics
With PMML, a predictive solution may be built in one system and deployed in another where it can be put to work immediately. The adoption of PMML by all the major analytic vendors is a testimony to their commitment to interoperability and the advancement of predictive analytics as a critical factor to the betterment of society.


Intel Accelerates the Data Center and Telecom Network Transformation with New Reference Architecture
"SDN and NFV are critical elements of Intel's vision to transform the expensive, complex networks of today to a virtualized, programmable, standards-based architecture running commercial off-the-shelf hardware," said Rose Schooler, vice president of Intel Architecture Group and general manager of Intel's Communications and Storage Infrastructure Group. "The reference designs announced today enable a new phase in the evolution of the network and represent Intel's commitment to driving an open environment that fosters business agility and smart economics."


Networks in 2020: More Traffic, Less Energy
The tools that make this possible include new devices, components, algorithms, architectures and protocols, Klein said. All have been proved in labs, he said. The potential energy savings represents a comparison between a 2010 network with that year's traffic levels and a theoretical 2020 network with projections of traffic amounts for that year.



Quote for the day:

"An excuse is worse and more terrible than a lie, for an excuse is a lie guarded." -- Pope John Paul II

May 12, 2013

Essential Steps to a Successful Cloud Deployment Initiative (Part II)
Technology is only 20 percent of a successful IT initiative – 80 percent still comes down to the people driving it and the policies in place. Preparing to move to the cloud requires strategic planning and analysis, from concept to completion. So without further ado, let’s take a look at the final seven steps that will help companies launch a successful, working cloud environment.


Authenticity Deficit Disorder
Rarely do we keep our word if it will cost us, but we should always keep our word . . . especially when it costs us. We are so concerned about our short-term interest (time, money, reputation, etc.) that we lose sight of the long-term trust that will be gained by sticking to our promises. What if your promise will cost you your job or will cause your house to go into foreclosure? Or what if it will cause you to lose your professional license or something else of great value?


The Big Data Scientist's Skillset
They need to have statistical, mathematical, predictive modelling as well as business strategy skills to build the algorithms necessary to ask the right questions and find the right answers. They also need to be able to communicate their findings, orally and visually. They need to understand how the products are developed and even more important, as big data touches the privacy of consumers, they need to have a set of ethical responsibilities.


Google's Cloud Drops Custom Linux For Debian
In moving to Debian, Google is demonstrating that it wants Google Compute Engine to become less Google-technology specific and more of a standard platform. Compute Engine's predecessor, App Engine, a developer's platform as a service, restricted itself to Google's favorite language, Python, at its launch. Compute Engine workloads based on Debian means the favored operating system will be supported by a community larger than Google's development team itself.


New Research: What Sets Effective Middle Managers Apart
Large-scale innovation and change include hundreds or thousands of moving parts that require palpable, intelligent, and emotional steps that no IT system can execute. Because of their 360-degree view of organizations, MLMs are uniquely positioned to implement such large-scale initiatives. Yet, as our research found, MLMs have become cautious and unsure of their authority due to their experiences during the IT revolution and the recession.


The story of Mr. 85%
“Great Finishers force themselves to stay focused on the goal, and never congratulate themselves on a job half-done.” Dr. Heidi Grant Halvorson in HBR: How to Become a Great Finisher. I asked Dr. Halvorson about her observation and she told me the story of Mr. 85%. “I sometimes tell this story about my husband because it drives me crazy – I call him “Mr. 85%” because that’s about how much he does of any project around the house before he stops, pats himself on the back for getting that far, and wanders off ...


Telecommuting: The Risks and Reward
By some estimates, a full fifth of the global tech workforce telecommutes at least occasionally, and 84% of that group does so at least once per month. One projection has up to 30% of the overall American workforce telecommuting by 2019. But, while workers consider telecommuting to be a major perk, there are risks for employers. According to one survey, 43% of employees who telecommute admit to watching TV or movies while on the clock, while 20% say they've played video games.


San Francisco Adds Social Networking Element to Emergency, Disaster Planning
"We did a lot of studies around how can we talk about preparedness in a different way," said Francis Zamora, the department's spokesman. "What we were finding was that connected communities, communities that had natural social networks, that had people who knew each other, they were a lot more resilient in terms of what happens during disasters."

What Makes a Great Risk Manager: Q&A With Michael Lopez of Booz Allen Hamilton
This Tuesday, May 14, marks the second annual World Risk Day—a global forum for those in the industry to discuss trends, challenges and best practices in risk management. One of the many speakers lined up for the event is Michael Lopez, senior associate at Booz Allen Hamilton. To get his take on the role of the modern risk manager, RMM asked him a few questions.


Why So Many Changes Fail—and What You Can Do About It
Undoubtedly, you know that the ability to get results from new initiatives is vitally important to your organization’s survival, but did you know that about 70% of changes in organizations fail?  That is an astounding failure rate given that the field of change management has been around for almost two decades. Over those years many books and hundreds of articles have been written. Consulting practices were created just to address the challenge of leading change, and yet the failure rate remains high. What is going on?



Quote for the day:

"Always bear in mind, that your own resolution to succeed is more important than any other thing. " -- Abraham Lincoln