June 10, 2013

Automated Verification of Design Patterns: A Case Study
Given the complexity of design verification and the frequency by which they need be carried out, practitioners also need tools that automate and report any conflicts between design and implementation at the click of a button. However, these needs have so far been di cult to reconcile in practice. Proving and preserving the conformance of a program to its design documentation is largely an unsolved problem.


Google Biometrics Tests Show There's No Magic Pill for Passwords
Regina Dugan, who leads special projects at Google-owned Motorola, disclosed at the All Things Digital conference last week that the company was experimenting with the new forms of biometrics. The technologies are a long way from adoption, but they reflect the boldness with which Google is looking for password alternatives.


Silk platform combines blogging and data visualization
Silk mixes unstructured blogging with structured data, allowing you to visualize and query the structured portion of your information. "Explore" lets you generate a sortable table; bar, line or pie chart; or map (oddly, Silk will attempt to map non-geographic data, such as plotting "iOS" in Greece). Visualizations can be filtered interactively to look at just some columns or only records that meet certain criteria.


Business Analytics Will Be Central for Business Reinvention-Gartner
“We are rapidly heading towards a world of analytics everywhere,” said Dan Sommer Principal Research Analyst at Gartner. “Gartner predicts that analytics will reach 50 per cent of potential users by 2014. By 2020, that figure will be 75 per cent, and we will be in a world where systems of record, systems of differentiation and systems of innovation are enabling IT, business and individuals to analyze data in a much denser fashion than before.


Strategic capacity planning in virtualized data centers
Virtualization is great for streamlining data center operations, but overstuffing servers can easily backfire. The technology is here to stay, so IT teams must look to strategic capacity planning and make the most of their hardware or end up wrangling with inefficiencies in the future. Virtualization expert David Davis talks about maximizing server space, capacity planning tools and the challenges of capacity planning.


DHCS Unveils Enterprise Architecture Plan
The Department of Health Care Services (DHCS) unveiled its enterprise architecture plan, a technology blueprint to make progress on it's nearly $1 billion project portfolio and help implement the Affordable Care Act in California. In a presentation led by DHCS CIO and Deputy Director Chris Cruz, Enterprise Architect Ben Word and Chief Medical Information Officer Dr. Linette Scott, the department laid out it's guiding principles and detailed plans including business, information and technical architectures.


Meta-Decisions: Agreeing on the criteria before discussing the alternatives
In general, the difficulty in reaching an agreement is caused by the fact that different people are forming their opinions using different criteria. Thus, the solution to reduce the time spent in discussions and to make decisions faster is to first agree on the criteria that should be applied when choosing among the several options.


What Managers Can Do To Support Agile Transformation
In a phrase, Agile practices rely on building a collaborative culture. That means the HR department needs to create appropriate teams for the projects at hand, implement fluid systems of engagement versus the more stolid, rigid structures that used to serve organisations well and foster an environment that supports continuous learning at all levels of the enterprise.


3 Lessons From 5 Years Of Federal Data Center Consolidation Delays
Obviously, data center consolidation is more difficult than anyone expected it to be, a reality I've seen firsthand while working on the effort. The problems aren't unique to the public sector. A lack of record keeping and plain old resistance to change are universal human traits. I've learned a few lessons that may help make enterprise data center consolidation efforts more efficient than the feds have thus far been.


Intel unveils Thunderbolt 2
Thunderbolt 2, which had previously only been known by its code name Falcon Ridge, is a reworking of the original Thunderbolt interface to offer 20Gbps of bidirectional transfer rate. ... Thunderbolt made use of four independent 10Gbps channels, two upstream and two downstream, whereas Thunderbolt 2 combines these four channels into two 20Gbps bi-direction channels.



Quote for the day:

"Liberty is the right to do what I like; license, the right to do what you like." -- Bertrand Russell

June 09, 2013

The digital-wallet business is rough — just ask Google
While a decent amount of Android, Blackberry and Windows Phones have NFC enabled in their hardware, only Sprint allows Google Wallet on devices. Having to battle with other carriers, on top of other wallet companies and Apple, with its own forays into Passbook, will further stretch Google Wallet as it struggles to find a steady audience that has access to the product.


SugarSync rolls out remote wipe for PCs and Macs
With the new Remote Wipe feature, both business and individual consumer users can remove all of their synced files. The new tool is also being marketed as a way to make transferring ownership of a computer simpler as all personal or business data stored in the SugarSync cloud can be easily removed and then quickly synced again to a new device.


How to Cultivate a Data Driven Marketing Team
Data: You can’t live with it, and you can’t live without it . At least, that’s how a lot of marketers feel. In fact, the affair between marketers and their data is often somewhat of a love-hate relationship. ... even though data can come with its challenges, successful marketers understand that it’s a necessary evil, and most even learn to love data because it makes them better marketers.


Data breaches caused mostly by negligence and glitches, study finds
Almost two-thirds of data breaches in 2012 could be attributed to negligence or human error (35 percent) and system glitches (29 percent), reported the eighth annual Ponemon Global Cost of a Data Breach study. However, malicious attacks remain the single highest cause of breaches, with 37 percent of the intrusion pie.
Those figures vary by nation, the report showed.


Dell, Oracle form strategic partnership for integrated systems
"We test it together, we patch it together, we support it together," Hurd said. The goal is to free enterprises from integration and maintenance tasks and let IT departments spend more time on internal innovation, Hurd said. "This allows customers to get integrated solutions and support from Dell, with Oracle support backing their entire solution," Hurd said.


Under the covers of the NSA’s big data effort
Yes, the agency has a lot of data and can do some powerful analysis, but, the argument goes, there are strict limits in place around how the agency can use it and who has access. Whether that’s good enough is still an open debate, but here’s what we know about the technology that’s underpinning all that data.


IaaS infringes on acceptance of true PaaS cloud architecture
“PaaS gave us the flexibility to be very nimble as a team, to prototype quickly -- and to throw stuff away if it didn’t work,” said Mario Cruz, Choose Digital’s CTO and cofounder. It meant the company didn’t need to hire dedicated infrastructure and operations staff, and instead could focus on hiring developers. “It’s like having a whole infrastructure team in-house, without actually having an infrastructure team,” Cruz said.


Managing the people side of risk
The cultural differences between companies that acknowledge risk and those that do not are quite stark. ... The best cultures actively seek information about and insight into risk by making it everyone’s responsibility to flag potential issues. ... In the best of cases, respect for rules can be a powerful source of competitive advantage.


Beginner's guide to R: Introduction
Because it's a programmable environment that uses command-line scripting, you can store a series of complex data-analysis steps in R. That lets you re-use your analysis work on similar data more easily than if you were using a point-and-click interface, notes Hadley Wickham, author of several popular R packages and chief scientist with RStudio.


The 90 Minute Guide to Agile – What, Why, How
Allan Kelly, the author of 'Business Patterns for Software Developers' (2012) and 'Changing Software Development: Learning to become Agile' (2008) and also the originator of Retrospective Dialogue Sheets, explains What Agile is, Why companies are adopting it in increasing numbers and How it works, providing suggestions on how to start an Agile initiative and how to do things right.



Quote for the day:

"Those who hate you don't win unless you hate them, and then you destroy yourself." -- Richard M. Nixon

June 08, 2013

ZTE sends 400Gbps over 3,100 miles
While a growing number of operators are upgrading to 100Gbps-links, vendors such as ZTE are preparing for the next step. The company's 400Gbps test was conducted on a WDM (Wavelength-Division Multiplexing) system using single-mode fiber, which is what is currently used for data transmissions over long distances, said Magnus Isaksson, ZTE CTO in the Nordic countries.


Big data analytics: New patterns emerge for security
Intelligence-driven security fueled by big data analytics will disrupt several infosec product segments in the next two years, according to executives at RSA, the security division of EMC. “With the pervasiveness of big data touching everything we do,” said Arthur Coviello, Jr., EMC executive vice president and chairman of the RSA security division, during his RSA keynote in February, “our attack surface is about to be altered and expand, and our risks magnified in ways that we couldn’t have imagined.”


A Futurist's Take on Managing Big Data and Disruptive Technology
Indeed, people have been making the argument that it’s extremely hard to manage technology futures. “But it’s not,” he said. “We’ve been doing it.” IT executives have, in just the last three decades, jumped from the mainframe era, to the PC era, to the client-server era, to the Internet enterprise software era of today. What trips up IT, he said, is focusing on the wrong thing. IT often talks about buying new technology. But, he said, “organizations don’t buy technology. They buy the benefits technology enables.”


Look for Innovation From the Edge
Edges are powerful sources of business innovation because they are places of potential and friction, where traditional products and practices are no longer adequate to address unmet needs or unexploited potential. Much tinkering and experimentation occurs on the edge, as well as heated debate about the most promising options to address emerging needs, intensified by the diverse backgrounds, skill sets, and perspectives of participants gathering on the edge.


Using Power to Empower
Empowering for Ann is: Preparing those who report to her to anticipate and be ready to answer the toughest questions partners or senior executives might ask so thoroughly and accurately that they do not need to go to Ann. Three benefits occur—the recipients’ questions and issues are resolved, they believe that Ann is doing a great job developing her people and Ann has freed up time to concentrate on strategy with peers and partners.


Facebook's first data center DRENCHED by ACTUAL CLOUD
"I got a call, 'Jay, there's a cloud in the data center'," Parikh says. "'What do you mean, outside?'. 'No, inside'." There was panic. "It was raining in the datacenter," he explains. The problem occurred because of the ambitious chiller-less air conditioning system the data center used. Unlike traditional facilities, which use electricity-intensive, direct-expansion cooling units to maintain a low, steady temperature, consumer internet giants such as Google, Facebook, and others have all been on a tear building facilities that use outside air instead.


Facebook's React JavaScript User Interfaces Library Receives Mixed Reviews
Following the recent trend of frameworks like AngularJS, MeteorJS and Model-Driven Views as implemented in Polymer, React is based on the idea of declaratively specifying user interfaces on top of a data model, where user interfaces automatically keep themselves in sync with underlying data. Unlike the aforementioned frameworks, React uses JavaScript rather than HTML to construct those user interfaces, citing flexibility as the reason for this design decision.


Free Google Drive Tools You're Not Using (But Should Be)
But like Google's Chrome browser, Google Drive becomes even more useful when you take advantage of third-party add-ons and services. These five totally free and easy-to-use tools will help you to encrypt your data, play your music, collaborate on slides, back up automatically, share files, and more. Some live on the desktop, some in Chrome, and some online, but all of them work to make Google Drive a happier online home for your data.


A Humble Indian Start-Up Features In Gartner Cool Vendors List
In the list announced for the year 2013, towards the end of April 2013, sharing the spotlight among the rest is a humble Pune based, Indian Start-Up, Qualitia – A Script-less Test Automation Platform. ... Qualitia is an easy yet powerful script less functional test automation platform for all leading test automation tools like QTP, RFT, Selenium and Web Driver.


Using enterprise architecture principles to facilitate SOA governance
While EA methodologies like TOGAF have been adapted to embrace SOA, few enterprises actually map business needs directly to SOA components. This mapping is the most important step in both securing EA benefits and starting SOA governance on the right footing. Enterprises report that the critical issue at this point is a failure to align SOA components with EA-defined processes.



Quote for the day:

"We don't have as many managers as we should, but we would rather have too few than too many." -- Larry Page

June 07, 2013

Cross-cutting concerns may be the next big step for IT
Cross-cuts go beyond standardization. Look at how data centers now use system virtualization, point-in-time storage snapshots and software version control systems. In the last ten years, they've massively overflowed their original banks and come to underpin broad swaths of how apps and services are developed, delivered, deployed and managed. And that's been a very good and helpful thing.


PWC finds IT & Business as Complementary Factors
Notwithstanding the unprecedented changes, the need to navigate through pitfalls and disruptions, businesses are striving to achieve the core objectives of fostering growth, meeting disparate consumer needs, reaching out to markets, compete and succeed. In such times, speeding up the adoption of key technologies like social networks, mobile computing, analytics, cloud computing (SMAC) and other emerging technologies will transform businesses and accelerate wealth creation, especially in the emerging markets economies


Managing and Retaining Data: Top Priority for CPAs
Data is growing at an estimated 50% per year and companies generally have access to that information on a real-time basis through the web and social network traffic, emails, voice mails, videos and data generated by software and sensors used in industrial processes. Advances in computer processing and information technology have made it possible for companies to take a large amount of data, quantify it, analyze it and use it for a variety of purposes.


VMware HA and DRS Capacity Planning
Although DRS and HA are completely independent processes, they can complement each other to create a robust, automated recovery mechanism for the virtualization platform. This paper is intended for VMware and Kingston partners, resellers, and customers who want to implement VI3 in production scenarios and want to proactively plan for physical memory requirements.


US gov defends NSA surveillance, slams 'reprehensible' journalists
Under FISA, Clapper says that Section 702 -- which is designed to gather data on non-U.S. persons residing outside of the United States -- was "recently reauthorized by Congress after extensive hearings and debate." The defence chief says that the order "cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States."


What Is Insight? Is It Visual?
Analytic logic: did you run through a series of possible matching words until you found the right association? For example, saying: “Does ‘cake’ work? No. Does ‘cone’ work? No. Does ‘tree’ work? No. Does ‘apple’ work? Yes.” Unconscious Insight: did you have a moment of pure insight, where your brain leapt to the right answer? You somehow just knew it, with no conscious thought process?


IT Departments Won't Exist in 5 Years
"Interns coming in for the summer are asked if they're familiar with Google Apps. They say, 'Of course we are,'" said Nathan McBride, vice president of IT & chief cloud architect at AMAG Pharmaceuticals. "Then we have other employees coming in who worked for other companies who say, 'I need Outlook.' We have to say we don't use that anymore."


The age of the 'recycled CEO'
Recycled CEOs don't always work out -- the late Kenneth Lay being a major case in point. He was brought back to revive Enron after a brief stint under Jeffrey Skilling's leadership. That ended badly. A different, but embarrassing, scenario beset Xerox (XRX), when nine-year veteran CEO Paul Allaire was called back by the board in 2000 for a stint.


Providers struggle to turn a profit with current cloud pricing model
Aspiring cloud providers should identify a specific market to sell to before launching a cloud business, Nolle said. "Going out and launching IaaS with no idea of who [the providers] plan on selling to, and no idea what the value proposition will be for the purchase of their [services] is not doing it right," he said.


Creating Resilient Software with Akka
Let’s face it: failure does happen. No matter how hard you try, there is always one more case which you did not foresee and which your testing did not reveal. The question is thus not “how can I avoid failure”, it is “how do I deal with it”. Resilience is defined by Oxford Dictionaries as: the ability of a substance or object to spring back into shape; elasticity; and the capacity to recover quickly from difficulties, toughness


Quote for the day:

"Striving for excellence motivates you; striving for perfection is demoralizing." -- Harriet Braiker

June 06, 2013

Rethink Cloud Security to get Ahead of the Risk Curve
Ever since the cloud sprung up to the top of every IT discussion, the issue of cloud security was right alongside it. Let’s face it, enterprise security has never been easy, and the rapidly expanding use of software in the cloud has added layers of complexity – and risk – to the job. More valuable intellectual property, personally identifiable information, medical records and customer data now sit in the cloud. Risk should not prevent this, but it’s a risk that needs to be managed.


Tactical and strategic health care CIO drives through industry turmoil
Finalist Deanna Wise is CIO and executive vice president at San Francisco-based Dignity Health, the nation's fifth largest health system with 40 acute care hospitals and more than 150 ancillary care sites. A model example of a tactical and strategic CIO, she has led IT and Dignity Health through a period of rapid change by striking an impressive balance between delivering consistent, reliable IT services and breaking new technology ground.


Bank of America CIO on Big Data, Emerging Enterprise Tech
Rather than Big Data, she would prefer to just use the term "data." Despite the overhyping and haziness of the phrase, Big Data is important to $2.2 trillion-asset Bank of America, which has been using data analysis to examine customers' branch visits, calls to the call center, chat sessions, and online banking sessions to get a full view of customer behavior.


Queensland's open data push goes 'global'
Essentially, Queensland Globe is a free application that lets users apply state government data to Google Earth satellite images. Some of the data sets integrated carry information about land tenure status, property and electoral boundaries, and areas affected by floods. But the Premier said the program also included topographical maps and aerial photography that was “a step above” Google Earth.


The Usefulness of Useless Knowledge
In The Usefulness of Useless Knowledge, originally published in the October 1939 issue of Harper’s, American educator Abraham Flexner explores this dangerous tendency to forgo pure curiosity in favor of pragmatism — in science, in education, and in human thought at large — to deliver a poignant critique of the motives encouraged in young minds, contrasting those with the drivers that motivated some of history’s most landmark discoveries.


Cisco Betters its Best-Selling Catalyst Ethernet Switch
Per-port power consumption on the Catalyst 2960-X is 0.9 watts, vs. 2 watts on the 2960-S/SF. Energy efficiency is achieved through support of the IEEE's Energy Efficient Ethernet standard, as well as Cisco's own EnergyWise software. The switches can engage in two modes of "hibernation" during downtime: downlink mode, which powers down less active links; and switch mode, which powers down the switch itself.


Businesses ignore early warning signs of hacking: NAB
There is enough information for organisations to be able to determine whether a form, which could take a user a few seconds to fill out, is actually being submitted in a fraction of a second. Similarly, given that the information submitted in a query should match the form's elements, including their order, any variance to these could give organisations an early warning that someone is planning an attack or performing reconnaissance on their systems.


Microsoft, FBI crack cybercrime ring
"The harm done by Citadel shows the threat that botnets, malicious software, and piracy pose to individuals and businesses around the world," said Brad Smith, Microsoft general counsel and executive vice president, Legal and Corporate Affairs. "Today's coordinated action between the private sector and law enforcement demonstrates the power of combined legal and technical expertise and we're going to continue to work together to help put these cybercriminals out of business."


100 Columns and Counting: Gary Cokins on His Life in Analytics
"My observation is that although it is ideal to have executive sponsorship for new projects and methods, often executives are distracted with fire-fighting and short-term priorities. I enjoy empowering champions who want to improve their organizations. I have seen the successful outcome of EPM systems I have helped implement with substantial tangible results. I get pleasure knowing I made an impact. "


IPv6 in action: How Mythic Beasts does it
RFC1883, the document that describes IPv6, was written in 1995. It was the next big thing on the Internet. Google records how many IPv6 requests come in and last year the total reached the dizzying heights of 1%! After most of two decades, one in a hundred Google requests are not IPv4. You couldn’t really say IPv6 is taking off like a rocket. That’s all going to change in the next few years. Cisco reckon IPv6 takeup will hit 23.9% in 2017.



Quote for the day:

"Everything's in the mind. That's where it all starts. Knowing what you want is the first step toward getting it." -- Mae West

June 05, 2013

Comparing SAN and NAS
Both SANs and NAS are based on open industry-standard network protocols—Fibre Channel for SANs and networking protocols such as TCP/IP for NAS. While SANs support a broad range of applications—including providing storage for NAS appliances—NAS storage is typically limited to applications that access data at the file level. Regardless of their differences, both SANs and NAS play vital roles in today’s enterprises and provide many advantages over traditional server-attached storage implementations.


NFC forecast dims at Gartner
For 2013, NFC-related transactions will make up only 2% of total mobile payment transactions, growing to 5% in 2017, Gartner said. Those percentages translate into about $4.7 billion for NFC-related payments globally in 2013, increasing to about $36 billion in 2017. In the previous Gartner forecast, the 2017 value of NFC payments was expected to reach an estimated $60 billion.


Tiering storage: Best practices to promote efficiency
Tape has always played the role of tier-three storage because of its extraordinarily high capacity and low per-gigabyte cost, while we've recently seen flash SSD suggested as a tier-zero layer because of its super-fast performance, very high cost and comparatively low capacity. In between these layers, we see tier-one storage comprising 15,000 rpm Fibre Channel (FC) or SAS drives and tier two representing lumbering, high-capacity, low-cost SATA arrays.


The Benefits of a Reverse Proxy
A reverse proxy is server component that sits between the internet and your web servers. It accepts HTTP requests, provides various services, and forwards the requests to one or many servers. Having a point at which you can inspect, transform and route HTTP requests before they reach your web servers provides a whole host of benefits. Here are some:


HTTPS is confusing one of the core metadata tools of the Internet: HTTP Referrers. HTTP Referrers disappear when going from HTTPS to HTTP, but, more worryingly, sensitive HTTPS Referrers still get carried when going from HTTPS to HTTPS. Most secure applications aren't aware of where their HTTP Referrers do or don't go. Don't worry though: there's hope. Or at least meta hope.


But despite all the virtual machine (VM) hoopla, not all SQL Server environments should be virtualized. Issues around licensing, performance, availability and support must be considered before SQL Server can be committed to a virtual environment. Failure to do so could result in a substandard production environment that wears the VM label proudly but fails to deliver on the VM promise.


Windows Phone to overtake the iPhone? It will happen.
A new Canalys report says that by 2017, the iPhone will have a 14.1 percent market share, with Windows Phone nipping at its heels, with a 12.7% share. In 2012, the report says, the iPhone had a 19.5% market share, and Windows Phone a 2.4 percent market share. Android dominates now and will dominate in the future, with a 67.7 percent market share in 2012, and a 67.1 percent market share in 2017.


Dell Challenges Cisco, HP With Converged Infrastructure Lineup
Dell on Tuesday unveiled an expanded range of converged infrastructure products, opening the technology, which Dell had previously pitched to large enterprises, to new classes of customers. Designed to simplify daily IT tasks and enable companies to more rapidly provision and deploy virtual machines, the offerings not only combine storage, networking, and computing into a single chassis but also bring all components under the control of a single management console.


Mobile and cloud to reduce enterprise costs by $28tn by 2015
The data also reflect a growing trend towards bring-your-own-application (BYOA), which is a huge challenge for IT. According to Ovum’s survey, roughly 50 per cent of those bringing their own tablets or smartphones to work are doing so without the knowledge of their IT departments. “IT needs to get on board or risk losing out,” said Adrian Drury, practice leader of consumer impact IT at Ovum.


Five web-based network troubleshooting tools
Network troubleshooting can run the gamut of possibilities. From hardware to software to external, uncontrollable forces, to powerful Jedi mind tricks. When you’re troubleshooting networking issues, the problem can often point toward many and varied issues. When that happens, you’ll want to have access to tools to help you diagnose the issue. One place to turn for such a tool set is the good old Internet.



Quote for the day:

"The struggle you're in today is developing the strength you need for tomorrow. So don't give up!" -- Annymous

June 04, 2013

10 key questions about software-defined networking (SDN)
The difference is that SDN as a network solution is not nearly as far along as virtualization in the server and storage worlds. Nevertheless, SDN is coming — and the more IT decision-makers and business leaders know about it, the better they'll be able to determine where and when to introduce it to their data centers. Here are 10 of the questions they're asking about SDN.


How To: Component Licensing in .NET
.NET has a built-in licensing system that is very useful, although without modifying the default implementations or the provided license provider (LicFileLicenseProvider), its almost comically easy to break. The LicFileLicenseProvidersimply holds a license file that has the full type name and version in a text file. If the text file contains this text, then the component is licensed.


Innovation is a leap of faith, says former Corning CEO
'We don't know what's going to happen but if you spend money on research, something good will happen and therefore it's worth doing. Take fiber optics. The original concept - that you could communicate with light by taking a certain amount of energy and put it into the threads of glass fiber - had been around for a long time but a small group of Corning scientists started working on the problem in the 1960s by trying to develop incredibly pure glass.


Next generation Wi-Fi network extends the Fernbank museum experience
"The project started with Joey Shultz, AT&T vice president of marketing and a Fernbank board member, who wanted to provide basic Wi-Fi connectivity in the museum. After seeing Cisco's Connected Mobile Experiences solution, the museum and AT&T realized that the Wi-Fi network could be a much more strategic asset in engaging a museum guest," according to Doug Webster, vice president of networking solutions marketing for Cisco.


SQL Server 2012 PDW: Game on!
There is a great deal of activity around SQL Server 2012 Parallel Data Warehouse. As of March 1st, you can order what was previously known as “PDW V2″. This post will be pointers to several other pages and posts providing good information on the product. The SQL Server PDW landing page has been updated with information around the 2012 product.


Microsoft Announces SQL Server 2014
A key feature of SQL Server 2014 is the incorporation of in-memory, online transaction processing (OLTP) technology stemming from a project that has been in the works for several years, codenamed "Hekaton," Clark said. Developed in conjunction with Microsoft Research, Hekaton greatly improves transaction processing speeds and reduces latency by virtue of working with in-memory data, as opposed to disk-based data.


Insurers Raise Their Voices on Mobile Tech
Customer demand can’t be underestimated, even if it means establishing an entirely new platform to accommodate that demand. Such is the case with interactive voice assistant (IVA) technology, and a couple of notable insurers are leading the way. When Geico, a Berkshire Hathaway Inc. company, discovered that two in five of its existing customers already had voice recognition technology resident on their smartphones, it moved quickly to establish a way for those customers ...


Intel's new fourth-gen 'Haswell' processors: What you need to know (FAQ)
Intel has officially revealed its next-generation lineup of desktop and mobile processors in the Core i3, i5 and i7 family, also known as "fourth-generation" or code-named "Haswell." The two-part announcement started over the weekend with Intel's quad-core enthusiast-level processors, and now the veil has been lifted on dual-core desktop and mobile processors, too. This FAQ will mainly focus on the dual-core processors and what they'll do for mobile systems.


IBM shows off nickel-sized chip that backs Gb/sec wireless data-rates, cutting edge radar images
The integrated circuit takes advantage of millimeter-wave spectrum which spans the 30 GHz to 300 GHz range, 10 to 100 times higher than the frequencies used for mobile phones and Wi-Fi. Frequencies in the range of 90-94GHz are well suited for short and long range, high-resolution radar imaging, IBM said.


Black Hat: It only takes a minute to hack an iPhone
They discovered how the capabilities of the USB standard as used in the charger can be used in such a way as to bypass Apple's own built-in protections against arbitrary software installation. The researchers then built a compromised charger as a proof of concept of their findings. Dubbed, "Mactans", this charger was built using a BeagleBoard.



Quote for the day:

"Experience is a hard teacher because she gives the test first, the lesson afterwards" -- Vernon Sanders Law

June 03, 2013

Parsing through the software-defined storage hype
Essentially, SDS is emerging as an ecosystem of products that decouples software from underlying storage networking hardware, placing it in a centralized controller or hypervisor. This centralized software will provide visibility of all physical and virtual resources, enabling programmability and automated provisioning based upon consumption or need.


ERM: 5 Steps to Success
Everyone agrees the role of ERM is for risk management to be involved in the "key business decisions," however, some misinterpret this as interviewing only the senior executives in "big picture" assessments. In reality, aligning day-to-day activities of all managers to the strategic objectives set senior leadership, and then aggregating and analyzing this information is the winning approach. So how is this accomplished?  Here are the 5 steps to quickly and practically embed risk management enterprise-wide.


Your company's cloud strategy must come from the top
Define, refine, understand, and publicize your cloud strategy, then implement your plans in small phases. IT should drive any technological shift from the top down. Moreover, in doing so, IT should make sure it understands user and development requirements as related to the company strategy.


Microsoft Survey Picks Up Early Signs Of New Trend - Bring Your Own Service
Bring Your Own Device (BYOD) to work it seems is old hat already. Early signs of a new trend have now been spotted – that of, what can be loosely called, Bring Your Own Service (BYOS). A recent survey by research firm Ipsos on behalf of Microsoft Corp. found that nearly half of the employees surveyed were of the opinion that social tools at work helped increase their productivity.


Tripartite Approach to Enterprise Architecture
Architectural work in an enterprise be designed and built around organizational accountability levels and be divided into three distinct yet interlinked architectures: Technical Architecture, Socio-Technical Architecture, and Ecosystemic Architecture. Each of these architectures would be self-contained and self-regulated with its paradigmatic function, methods, and tools.


Active/Active WAN-based Replication in GemFire vs Oracle and MySQL
The replication service in GemFire is transparent to applications and does not affect normal use of the distributed big data grid. Setup is easy too as there is nothing to change in your configuration other than enabling the WAN service and providing the WAN endpoint(s) to use for replication. GemFire automatically sets up a parallel asynchronous replication system across your machines that reaches out to the remote site and efficiently batches changes asynchronously across the WAN.


Virtualization security 101: A user's primer
Server virtualization allows you to float multiple 'virtual machines' on top of a physical server, using a hypervisor to manage them. The obvious benefits are better hardware utilization, faster scalability and the ability to move VMs around to get optimal processing power. However, this same structure creates some very real security concerns.


Big Data and the Cambrian Explosion of Information Sources
Welcome to the Age of Data! From every direction, along any number of trajectories, data now streams at us in unprecedented fashion. Customers, prospects, partners, competitors; Web sites, mobile phones, medical devices, manufacturing machines – the number and nature of data sources seems to be growing exponentially. What’s a data manager to do? Fasten your seat belt and prepare for a wild ride!


IE10 steals user share from IE9, jumps 53%
In relative terms, IE10 was the third-most-used browser of the five that Microsoft now supports, passing the 12-year-old IE6 for the first time. IE10's climb has been brisk: As late as January, it had a mere 2.3% user share of all of IE. The increase was prompted by the automatic update from IE9 to IE10 on Windows 7 PCs, which began shortly after IE10's release on the popular platform in late February.


5 Rockin’ Motivation Techniques That Won’t Cost a Dime
Managers often struggle to get their team into high gear without using financial incentives. They don’t realize that the best motivation is self-motivation—and you don’t need a dime to get your staff going. There are two parts when it comes to team motivation: preventing dissatisfaction and engendering satisfaction. Use them both.



Quote for the day:

"Why are you going to choose failure when success is an option?" -- Jillian Michaels

June 02, 2013

How Design Can Save the Average Data Center More than $1M
There are many options to consider in the area of data center power system design, and every choice has an impact on data center efficiency and availability. The data center is directly dependent on the critical power system, and a poorly designed system can result in unplanned downtime, excessive energy consumption and constrained growth.


The Latest Developments in Neo4j
Neo4j has announced Neo4j 1.9 GA and Neo4j 2.0 M03. A new project called Neo4j Mobile for Android intends to bring a graph database to smartphones and tablets. Among the most important enhancements are: Neo4j Enterprise edition now has its own clustering solution based on Paxos protocols, which replaces the previous one based on Zookeeper. This eliminates the need for a separate Zookeeper cluster.


7 Ways to ReWire Your Brain and Become a Better Leader
Our “fight-flight” reaction and strong memory for painful experiences are hardwired from birth. Our brains detect negative information faster than positive information and are drawn to bad news. This hardwiring is further reinforced as we grow up because our negative experiences leave an indelible trace in our brain. The brain continues to learn and change itself throughout our life.


Software Quality Attributes: Trade-off Analysis
It has always remained as a challenge for the software architects or designers in coming up with the right mix of the quality attributes with appropriate priority. This is further complicated as these attributes are highly interlinked as a higher priority on one would result in an adverse impact on another. Here is a sample matrix showing the inter-dependencies of some of the software quality metrics.


10 Things Really Amazing Bosses Do
Being a boss is hard. People don't naturally wish to have one. And not everyone aspires to be one. But most people are anxious to follow a good leader, and most organizations live and die on the quality of the leaders who run them. See how you stack up with these 10 traits.


A Very Short History Of Data Science
The term “Data Science” has emerged only recently to specifically designate a new profession that is expected to make sense of the vast stores of big data. But making sense of data has a long history and has been discussed by scientists, statisticians, librarians, computer scientists and others for years. The following timeline traces the evolution of the term “Data Science” and its use, attempts to define it, and related terms.


The Role of Decision Requirements in the Analytical Life Cycle
Decision requirements modeling provides the formal tools and techniques you need to develop business understanding for analytic projects. Established analytic approaches such as CRISP-DM as well as all the major analytic tools vendors stress the importance of understanding the project requirements from a business perspective.


Big Data Governance: Why Do You Govern Data Outside of Databases?
Frustration with results from data management programs such as Data Warehousing, Business Intelligence, and Master Data Management, has been the primary driver of the implementation of Data Governance programs at many of these organizations. Similarly, organizations are not getting the expected results from their Enterprise Content Management programs, frequently instantiated with Microsoft SharePoint , because they have not included sufficient Data Governance in the implementations.


Infusing Enterprise Architecture Into Your Bank’s Strategy
This is the essence of enterprise architecture, and even for smaller banks, keeping an eye on specific and measurable business results when driving technology changes is critical. When we help financial institutions work on transformative initiatives such as bringing multiple channels together (channel convergence) or implementing a mobile wallet, both near and far term business goals have to drive decisions.


Design patterns and practices in .NET: the Command pattern
The Command pattern is used to represent an action as an object. The action is abstracted away in an interface. In its simplest form the interface may only have a single method, e.g. Execute() which takes no parameters and returns no value. The interface gives an opportunity to the client to execute some command when appropriate. The main goal of the pattern is to decouple the client that wants to execute a command from the details and dependencies of the command logic.



Quote for the day:

"Success...My nomination for the single most important ingredient is energy well directed. " -- Louis Lundborg

June 01, 2013

Is Amazon becoming the Microsoft of cloud? Hold that thought
New report predicts Amazon Web Services will rule the enterprise world in 10 years. We'll see. ... On-premises server growth will slow because of the cloud; Private clouds will also eventually be migrated to AWS, creating "headwinds" for the virtualization market; and Storm clouds on the horizon for IT outsourcing as the cloud model gains traction.


Oracle reveals plans for Java security improvements
These changes, along with other security-related efforts, are intended to "decrease the exploitability and severity of potential Java vulnerabilities in the desktop environment and provide additional security protections for Java operating in the server environment," said Nandini Ramani, vice president of engineering for Java Client and Mobile Platforms at Oracle, in a blog post on Thursday.


How to Give (and Receive) Positive Criticism
People like to be right, correct, and accomplished, and when they're not, it hurts to hear the truth, no matter how nice your critic tries to be. Still, those who strive to improve, value direct feedback no matter how painful. And as long as the critic is not being malicious, he or she can actually build a higher level of trust by providing constructive criticism carefully and empathetically.


Data Velocity: Why Decreasing Your Time to Insight Matters
Business leaders understand that soaring volumes of data have the potential to offer valuable insights to their enterprises. They also realize the remarkable variety of data – be it financial information, customer tweets or mobile phone GPS signals – represents an enormous opportunity. Yet most leaders are only just beginning to grasp the concept of data velocity. The pace at which data can be gathered, sorted and analyzed to produce actionable insights is increasingly becoming a determinant of success.


Asking the right questions key to managing cloud security risks
"If we are going to manage effectively, we've got to honestly look at all three areas: the benefits, the costs and the risks," Holmquist said. "In the end, it's what you don't know that will bite you." In this video, get more tips on evaluating and managing relationships with cloud providers as Holmquist and former Accume senior manager Jason Novak discuss best practices for implementing a cloud security risk management strategy.


The BYOD Mobile Security Threat Is Real
Sound and comprehensive policies and procedures are certainly needed in the modern BYOD environment, but they're often not good enough by themselves. Most policies need to be updated to take into account the various places that employees will be using their devices, such as home use, the avenues through which data can travel, and the different types of communication that are occurring, such as Facebook, Twitter and text messages.


Real-life examples of simple, low-cost work/life efforts
Studies show that work/life programs can help improve employee engagement and productivity. But you may believe effective strategies are expensive and require a big-business budget.  Not true. Some larger and midsize employers have created innovative, low-cost work/life practices that even small businesses can adopt. Some examples:


Amazon cloud threatens ENTIRE IT ECOSYSTEM – report
The companies most at risk are those who will have trouble selling to Amazon or selling in a market where Amazon has grown. According to Morgan Stanley's report, if AWS experiences widespread adoption, the companies most likely to be put at risk are, in order, VMware, NetApp, Brocade, QLogic, and EMC. If adoption is mostly among SMBs, on the other hand, Morgan Stanley says NetApp, VMware, Brocade, QLogic and EMC are most at risk.


Signature-Based Endpoint Security on Its Way Out
"We are seeing about 150,000 new pieces of malware every day now," says Simon Hunt, vice president and CTO of Endpoint Solutions at security vendor McAfee. "The attack is just impossible&we're purely on the defensive. Before we know about any new virus, somebody has to be a sacrificial lamb and die and tell us about it. It's an awful way of doing things."


Project Lambda from the Inside. An Interview with Brian Goetz
Mark Reinhold, Chief Architect of the Java Platform Group at Oracle said in his blog: "the most important work that slipped past M6 is related to Project Lambda, the sole driving feature of the release. We integrated the language and VM changes for Lambda late last year, but between all the moving parts involved and the security work it’s taken a bit longer than expected to put the finishing touches on the stream API and the related core-libraries enhancements."



Quote for the day:

"A ship in port is safe, but that's not what ships are built for." -- Grace Murray Hopper