July 25, 2013

Disruptive Solution Secures Data Anywhere, Anytime — Q&A with Ionic Security’s Chairman
Startup Ionic Security’s platform touches data at its inception as it’s being created, which gives enterprise business policy owners and security group managers the ability to control that data no matter where it ends up anywhere in the world, in real time, as it’s being accessed. Founder, CTO and chairman Adam Ghetti explains how this cutting-edge security solution works and the path of its development. 


Insights Ahead: The Rise of Analytics as a Service
The benefit AaaS delivers is agility and scalability. This is valuable, given that modern analytics is now effectively replacing the management reporting processes designed for an age of limited data that changed slowly. By contrast, executives now want to work with dynamic data that reflects real-time reality. AaaS can not only deal with that dynamic data but also adapt quickly to solve new problems as they emerge.


Choosing an open source software license for your development project
This is not a discussion about the pros and cons of OSS development, but it is a guide for those who currently develop in the open community and for those who wish to learn more about the various licensing options that are available for OSS. You will also want to consult with a legal expert before adopting any software license for your projects.


Cloud Computing for the CFO and the entire C-Suite
Executives responsible for customer care and support will get the IBM Watson Engagement Advisor, which uses cognitive computing to enable personalized customer conversations. The head of HR is targeted for the IBM SmartCloud for Social Business, which promises to find, analyze, source and acquire the best talent. Supply chain execs, chief procurement officers, the CFO, and even the CIO have been targeted.


Disaster is Coming. Are You Ready?
It doesn’t take a once-in-a-hundred-years kind of storm to trigger a power outage or disk failure. If you operate a small or mid-size business, now is the time to make sure you have the right continuity plans in place. There is good news: The emergence of cloud services now enables every business to have the kind of continuity plans that bigger companies routinely do.


How to Foster an IT Youth Movement
The Jet Propulsion Laboratory (JPL) IT Outreach Program aims to entice students of all ages and backgrounds to consider careers in IT. We showcase real uses of IT in a fun and energetic way. The JPL IT Petting Zoo began as a cost-effective way to evaluate emerging technologies and their viability for JPL.


Cloud's effects on data center design principles, locale
Cloud computing's influence on data center design principles is still emerging. Companies implementing a private cloud platform should have undergone rigorous application rationalization, hardware virtualization and consolidation exercises. This may have left them with around 20% to 40% of the original data center equipment


Microsoft to offer Java as a service
Microsoft will offer the Java Standard Edition (Java SE) by the end of the year both as a stand-alone PaaS (platform as a service) and as component of a Windows Server IaaS (infrastructure as a service), both on the Windows Azure service. For the Java runtime, Microsoft has commissioned Azul Systems to develop and maintain a version of the Java OpenJDK, the reference implementation of the Java Virtual Machine (JVM) and runtime for Java SE.


EMC backup changes planned around convergence, ViPR
The changes are part of a strategy to re-shape EMC's data protection technology. David Goulden, EMC president and chief operating officer, said the vendor has spent $5 billion over the last 10 years in backup acquisitions and research and development. Now it has four backup apps to go with its target deduplication Data Domain boxes.


Almost half of India Web users attacked by local malware
While these numbers are astonishing, the numbers are most likely even higher for mobile users, assuming users have mobile protection to begin with. The same types of exploitation for computers exists for mobile devices, but with even more opportunities, such as downloading and installing apps from places that are neither trusted nor verified sources.



Quote for the day:

"The measure of success isn't if you have a tough problem, but whether it's the same one you had last year." -- J.F. Dulles

July 24, 2013

Building Scalable Applications in .NET: Introducing the FatDB Distributed Computing Platform
Even today, it’s common to find many disparate technologies duct-taped together into a byzantine edifice that tends to be brittle, slow and overly complicated. The current explosion of new Cloud-, PaaS- and NoSQL-related technologies than can handle many of these shortcomings is no coincidence; the blunt reality is that “doing it right” and meeting the needs of stakeholders is hard and requires abandoning old patterns and adopting new ways of thinking.


Comparing Windows Defender in Windows 8 vs. third-party malware tools
But users should be aware that the Windows Defender that ships with Windows 8 is not the same Windows Defender available to previous Windows versions. The original Windows Defender is an anti-spyware app users can download for free. Windows 8 Defender is essentially a rebranding of Microsoft Security Essentials (MSE), an antivirus program also available for free for earlier Windows versions.


FDA asks hackers to expose holes in medical devices, but many researchers fear CFAA & jail
Black Hat USA, which normally has 80-90 talks, will feature a record-breaking number of 110 talks this year. SC Magazine wrote about how the fear of being sued or worse—going to prison—makes some security researchers edgy about disclosing vulnerabilities. And every year after Black Hat and Def Con, some red-faced company whose product was hacked will point fingers and make nasty accusations


Time and Distance Enemies of Agile Project Management
With physical distance comes increased opportunity for misunderstanding or delayed communications. Even if team members are just on a different floor of the building, you need more checkpoints and redundant communications to keep everyone in sync. ... The project isn't that important, doesn't have the right team members, serves as a political football, has goals that are a moving target or has simply been ill-conceived


Who Can Get Your Data Operations Up to Speed?
“Your ability to hire somebody for that role requires you to have a rather mature and robust organization, otherwise I think it’s always going to be the CIO’s ultimate responsibility,” says Manley. “And for me, the chief data officer is still somebody reporting to the CIO, somebody still a part of the technology organization. ... very, very large insurance businesses, what they’re doing as a result of the wild and uncontrollable nature of data that has grown in a 100-year-old organization, is a bit different, since I started from scratch.”


NTSB calls for wireless technology to let all vehicles 'talk' to each other
The board recommended that the National Highway Traffic Safety Administration develop standards for "connected-vehicle technology" — wireless components that would let vehicles communicate on the road. ... With those standards in place, "NHTSA can then require this technology to be installed on all highway vehicles," Deborah Hersman, chairman of the NTSB, said at the board's meeting Tuesday. "This technology more than anything else holds great promise to protect lives and prevent injuries."


CIOs and the chief data officer: Who's the pioneer and who's the settler?
"[CIOs] have enormous portfolios to manage -- everything from data centers, cloud, desktop support, mobile; but the reality is that the business is trying to deal with being part of an integrated information economy," Casey said. "For organizations trying to be more competitive … folks can't wait for IT to keep up anymore."


The 4 Blind Spots That Could Lead to Failure
Blinders are also used by small-business owners, but they shouldn't be. Typically, business owners want to concentrate on sales, expenses and employees—and are "blind" to other things happening around them. They believe almost every problem can be solved with more sales, more productive employees and fewer expenses. In business, what you don’t see is often what hurts your business the most. I liken it to getting hit in the back of your head with a 2x4. You never see it coming.


Is Your Organization Ready for Total Digitization?
How are enterprises managing the spread and scope of total digitization? We at MIT CISR have found that enterprises are using one or more of three approaches to managing total digitization: convergence, coordination, or a separate digital innovation stacks approach. Each approach has very different objectives and measures of success.


WebLogic + Coherence + Tuxedo = Cloud Application Foundation
Cloud Application Foundation has been optimized to run on Oracle's Exalogic Elastic Cloud appliance for private cloud deployments, and can also run on public clouds, like the Oracle Java Cloud service. It comes with a new integrated management framework (install, update, patch and provisioning) for WebLogic Server, Coherence and Oracle Web Tier.



Quote for the day:

"The discipline of writing something down is the first step toward making it happen. " -- Lee Iacocca

July 23, 2013

Will CSOs become CROs in the future?
At a high level, the new responsibilities include understanding your company's risk profile and risk appetite and then mitigating the risks accordingly. Greg Thompson, vice president of enterprise security services and deputy CISO at Toronto s Scotia Bank, already sees his role evolving into something like head of operational risk management. Scotia is Canada's third largest bank.


Cisco: Multimode Small Cells Coming Early 2014
"The 3G and Wi-Fi pieces are mature," Mishra said. "The work we are doing is on LTE on the access side and core network infrastructure side. It's all available today with our packet core, so we can reuse that." As the company moves to multimode, it's still focusing on areas where network congestion is most acute, such as indoor venues.


F5 data center firewall aces performance test
The F5 firewall moved static objects over SSL at rates that met or exceeded the capacity of the Avalanche test tool, moving 10- and 512-kbyte objects at 17.288G and 20.919Gbps respectively. Both numbers are at least 1Gbps faster than those for the Avalanche tool running back to back with no firewall inline.


From evolution to revolution with the Internet of Things
The idea is that all of our devices will be able to communicate with each other to assist users in businesses in doing their jobs, with particular influence on hospitals and factories. But General Electric hijacking the conversation on the Internet of Things shouldn't hide the fact that this isn't a new idea, argues David, along with his guest, Adrian Bowles, founder and CEO at STORM Insights Inc.


How Criticism Creates Innovative Teams
When ideas are still being developed or decisions still being considered, criticism and constructive conflict are vital to testing the value of the ideas and helping increase that value. Conflict is an indicator that diverse viewpoints are being considered and that the competition for ideas is still ongoing. During this competition, ideas are strengthened through further research, consideration or through the blending of different ideas into one stronger concept.


CRM-Cloud Relationship Management
Michel van Woudenberg, Vice President, CRM, Oracle Asia Pacific, on CRM cloud is revolutionizing the customer space: "I think a lot of industries in India are actually quite in the forefront on adopting cloud in order to be differentiating towards their customers. I would say the government in India and BSFI, especially the public banks, are a bit behind compared to other regions in Asia Pacific."


750 million phones vulnerable to spying: Hack SIM card via tainted text to get root
Give this German cryptographer two minutes on a PC and he can send a send a secret text message that contains a “virus” to a mobile phone’s SIM card, and then basically get “root” and take over the phone. That text can allow him to eavesdrop, make purchases via mobile payment systems and otherwise “trick mobile phones into granting access to the device's location, SMS functions and allow changes to a person's voicemail number.”


User Defined Field
Usually the best option is to use a Serialized LOB, essentially creating a large text column into which you store the user-defined fields as a JSON or XML document. Many databases these days offer pretty nice support for this approach, including support for indexing and querying based on the data structure within the LOB. ... Another route is using some kind of attribute table. A table might look something like this.


5 Exciting Tech Companies You've Probably Never Heard Of
The new technologies that we usually hear about are from tech giants. On any given day, it seems that one of those companies steals the headlines. That’s a shame, because some of the most interesting companies are ones that rarely make headlines. They are often located in out of the way places or develop technologies behind the scenes, where their logo isn’t paraded in front of us on a daily basis. Nevertheless, they are important and do exciting work.

Why security metrics aren't helping prevent data loss
The survey appears to have found the disconnect --business speak versus IT speak. Business metrics that executives are familiar with tend to reflect strategic goals, prioritizing cost over less tangible security benefits. Where security metrics favor operational goals, and prioritize technical improvements over business contingencies.



Quote for the day:

"Absolute identity with one's cause is the first and great condition of successful leadership." -- Woodrow Wilson

July 22, 2013

UK spies aren’t breaking law by using PRISM data, security oversight committee claims
The committee issued a statement on Wednesday in which it said it had extracted “substantive reports” out of UK intelligence service GCHQ, which detailed which citizens were monitored through PRISM, what information was gleaned, which warrants were obtained and so on. The committee also talked to the NSA and Congress.


Big data privacy concerns spur research, innovation
Masses of mobile phone data already exist, said panelist Alex “Sandy” Pentland, director of MIT’s Human Dynamics Lab and Media Lab Entrepreneurship Program. “Companies gather it but are scared to use it,” he said. “It’s politically controversial. But we have to start to see that cell phone and public data is for the public good.”


Closing the Big Data Skills Gap Requires Educational Innovation
Here's the issue that the IT industry is already starting to deal with: Big data creates lots of new, well-paying jobs but in a digital update of the prime maxim of Adam Smith, the father of modern economics, demand will outstrip supply, some experts contend. And it will get worse, because those newly graduated data scientists are too few in number and possess the wrong skills needed to fill that big data gap.


6 Surprising Secrets of Truly Great Bosses
The very best managers do the exact opposite of what the average manager does. At best, following conventional wisdom results in mediocrity. Truly great bosses don't just march to the beat of a different drummer, they convince everyone else to march along with them. Here's how:


When Will ‘Bursting’ Become Acceptable Boardroom Terminology?
The “so what” factor here comes down to how CIO’s are referring to cloud and explaining its “burstability” (not a real word) to the CEO; indeed, this use of the term bursting has been as widely adopted by cloud hosting providers such as Amazon Web Services and Rackspace as it has by companies selling broader IT services such as HP, IBM or any of the other usual “big vendor” suspects.


Data, Metadata and the Assumption of Quality
We have no way of knowing if the underlying operational data is accurate (as well as other aspects of data quality), nor do we have any way of verifying any aspect of the information quality. Some of the metadata could be verified by cross-referencing other sources (e.g., for books, we could verify the metadata with the publishers and other sellers such as Barnes & Noble).


Is there room for network admins in software-based networking?
The good news for IT professionals is that virtualization reduces costs and improves flexibility, but it increases complexity. Management software companies have diligently worked to develop solutions that take the pain out of this complexity. In fact, it is management software that allows admins to wrangle herds of servers with drag and drop -- not the virtualization technology itself.


How could anyone confuse BPM and event processing?
The fact is that more than a few corners of the marketplace know very little about the difference between BPM (business process management) and what’s typically called CEP (complex event processing). These two concepts are very different and understanding those differences in today’s business climate will mean success or failure for many organizations.


Sony to sell 'world's first' SD card-based backup for PCs
Sony announced the product on Thursday, and said it will be available in Japan from August 20 in 16GB, 32GB, and 64GB versions. The backup software will initially support only Windows-based machines. The cards are rated Class 4 speed, a standard that provides write speeds of at least 4MBps.



Quote for the day:

"No man can think clearly when his fists are clenched." -- George Jean Nathan

July 21, 2013

It's getting warmer in some data centers
The U.S. General Services Administration, as part of data center consolidation and efficiency efforts, has recommended raising data center temperatures from 72 degrees Fahrenheit to as high as 80 degrees. Based on industry best practices, the GSA said it can save 4% to 5% in energy costs for every one degree increase in the server inlet temperature.


eProvided SD Recovery Firm Confirms Samsung's Mass Production of 128GB NAND Chips
With SD recovery problems, it's important to remember that even though digital media is safer to use when compared to HDD's, digital devices and USB flash drives, they do fail and a service to recover USB drive devices will be badly needed. Compact flash data recovery services have also been used for years by professional and amateur photographers experiencing SD recovery issues.


User Acceptance Testing (UAT) for Software Systems
User Acceptance Testing should never be used to detect programming bugs, integration bugs, or design flaws. These should be detected by the previous testing phases: development testing and Quality Assurance testing. To achieve these goals UAT must be conducted in a production-like environment and the system exercised by at least one representative of every functional group in the user community.


Mahendra Singh Dhoni's leadership style offers invaluable lessons for managers
MS Dhoni, India's most successful cricket captain, is well on his way to be regarded as one of the greatest leaders the game has seen. In the past, people have attributed his success to luck, timing, good fortune and the like. But on closer analysis of his success, we see a clear pattern emerging. Dhoni's leadership style offers invaluable lessons to managers at all levels.


Why In-Memory Computing Is Cheaper And Changes Everything
Some people think that we’re talking about in-memory because of all the hype that’s been going on in the market – but it’s not just SAP. Every single vendor out there is getting involved in in-memory technology. ... You won’t have tape drives, you won’t have disk drives. You’ll be using flash and memory. Flash will be your backup, your archive, and memory is where you’re going to run everything.


What Data Do the Five Largest Tech Companies Collect? [INFOGRAPHIC]
Baynote has created an infographic that shows the vast amounts of different types of data that is collected by the five largest tech companies in the world: Google, Apple, Facebook, Yahoo! and Amazon. Not surprisingly they collect vast amounts of different types of data, ranging from search queries, profile information to even your phone number.


Some Data Center Operators Take Their Chances with Floods
One thing is certain, experts say: Few IT organizations -- even those that suffered or narrowly escaped damage during recent major storms -- are thinking long term. Most IT leaders are, if anything, taking the path of least resistance and least expense. For instance, the response to Hurricane Sandy, on the East Coast at least, "is nothing more than hardening existing data centers," says Peter Sacco


IT Cannot Be Only the CIO's Responsibility
Accountability for some of these areas reside with the CEO and the other members of the C-suite (we are assuming CIO is a member of the c-suite), for others with LOB manager, and some will be shared. What is clear is that they are not the sole responsibility of the CIO. All members of the C-suite needs to recognize and embrace their fundamental roles.


SAN Vs NAS Storage Network
A SAN (storage area network) and NAS (network attached storage) are two primary options for large storage across a network. Both have storage devices unique to their solution and specific network connection configuration. Although there are clear differences between the two, vendors are beginning to package the two as one, leveraging the benefits each solution provides.


Today’s datacentres are not fit for the cloud, shows study
“Many datacentres that exist today are based on 20-year-old technologies and they can no longer keep up with demand,” said Jason Nolet, vice-president datacentre switching and routing at Brocade. “Virtualisation and cloud models require greater datacentre network agility and performance, as well as reduced operational cost and complexity.



Quote for the day:

"One of my guiding principles is, don't do anything that other people are doing" -- Seymour Cray

July 20, 2013

Things CIOs need to know about Microsoft reorganisation
Last week's big Microsoft reorganisation should have caught exactly zero people by surprise. A couple of high-ranking executives departed, and departments were shifted so the senior leadership team can purportedly focus on engineering excellence and becoming more relevant across a spectrum of devices. But what does this mean for the CIO? What do Microsoft's internal machinations imply for its corporate customers?


Cyber drills like Quantum Dawn 2 vital to security in financial sector
"Cybersecurity is a top priority for the financial industry," Schimmeck noted. "This exercise gave participants the opportunity to run through their crisis response procedures, practice information sharing and refine their protocols relating to a systemic cyber attack." SIFMA will review the results of the cyber exercise with its members to identify areas for improvement, he said.


Is the Purpose of Analytics Just to Turn a Buck?
As a business analytics professional, it’s often too easy for me to think about analytics in the business context (i.e. how they can reduce costs, increase profits, speed time-to-market, improve employee productivity etc.) In fact, the mission for analytics can easily cross over from the land of shareholder value to safeguarding and improving the well-being and long term sustainability of other stakeholders.


EMC Avamar: High Performance Backup and Recovery For a Software-Defined Data Center
For CIOs, the data protection equation is rapidly becoming further complicated by a growing trend among corporate departments to store “copy data” as an internal way to deal with their own needs for local data backup, and protection. Propelling the data copy problem is a toxic brew that is one part fear of government regulations and compliance mandates on how companies function ...


In the online hunt for criminals, social media is the ultimate snitch
Nancy Kolb, the program director who oversees the center for social media at the International Association of Chiefs of Police (IACP), says there were certain forward-thinking police departments that started venturing into social networks as early adopters during the MySpace days, but this really took hold later. “It was around 2009, 2010, 2011, where we really saw an exponential increase and huge growth in terms of law enforcement agencies using social media.


The Changing Role of the IT Professional
SDN, however, is not the only factor driving change in the role of role of the network professional. The convergence of technology is also driving change. Many IT organizations have begun to implement systems that integrate compute, storage and networking. Typically these systems come with a management system that enables a single administrator to manage the entire system.


Four realities for the future of corporate IT
IT has always had an important role in driving productivity but traditional approaches such as process automation and outsourcing are running out of steam. ... CEB has surveyed tens of thousands of business leaders and frontline employees to understand the new work environment. The workplace has been reshaped by four realties. CEB’s data shows that the realities are near universal; they are not limited to desk-bound employees nor to the millennial generation.


The Value of Vision Series - An Interview With Doug Conant
Jesse Lyn Stoner shares the views of a leader who is not spouting theory, but who is speaking from his own personal experience - Doug Conant, newly appointed Non-Executive Chairman of Avon and the former President and CEO of Campbell Soup, where he led the company through a dramatic transformation, reversing the declining trend in earnings and employee engagement.


Banks big and small are embracing cloud computing
Big banks have generally migrated less of their activity to the cloud than newer, smaller ones. This is partly because of legacy systems, partly because of regulatory concerns about data security and privacy. But the pressure to reduce spending is likely to force the pace of change. ... One way of improving cost-income ratios is to lob activities into the cloud.



Quote for the day:

"Let a man lose everything else in the world but his enthusiasm and he will come through again to success." -- H. W. Arnold

July 19, 2013

Has virtualization killed tape?
But tape still has some serious advantages to disk storage systems. For one, the cost per Terabyte is relatively low, and it is very portable. Linear write and read streams also perform quite well for current tape systems. But, my preference is for disk systems. I have horror stories from tape; in fact, I have five stories that are all quite entertaining as to why I hate tape. Find me in a pub sometime, I’ll tell you the stories; they’re worth the listen.


PayPal to let Australians use their digital wallets in real-world cafes
"We realised about a year ago with that digital wallet, for it to truly be essential to consumers lives, we need to give them access to it in their everyday life," he said. "When you're getting your morning coffee or buying your groceries or getting a sandwich for lunch, PayPal was not relevant in consumers' lives a year ago. "And now we're starting to innovate at the retail point of sale."


Surviving the coming datacenter apocalypse
So what kind of IT professions are the most valuable in a Cloud-centric world? Any job that deals with architecting, implementing and managing cloud stacks and the virtual infrastructure that sits beneath it, whether they are on-prem, hybrid or totally off-prem. Cloud security and cloud storage experts. SaaS transition/software migration types of folks who understand how to move a legacy system with complex multi-tier apps to a hybrid or off-prem model.


3 Toxic Employees You Need to Fire Now
"You can have someone who is a very good technical performer but that makes other people in the office go home crying," Benoit says. "If you have people who are interfering with the performance of others, you need to consider letting them go." It's a good idea to consult legal counsel before you terminate someone for their behavior to ensure you've protected yourself. But, in her experience, Benoit says these three types of employees usually just have to go.


Sencha Space HTML5 App Management Platform Launches
"This is an interesting development and a sign of the coming together of various mobile software and services markets," Al Hilwa, an analyst with IDC, told eWEEK. "As organizations embrace mobile applications, they are increasingly looking at simplifying their vendor portfolios and will consider offerings from their existing technology providers in adjacent markets. Sencha's reputation in HTML5 tools and frameworks will give this offering good visibility with existing Sencha customers."


Java 7 vulnerability opens door to 10-year-old attack
According to Gowdiak, the vulnerability is located in the Reflection API (application programming interface), a feature that was introduced in Java 7 and which has been the source of many critical Java vulnerabilities so far. Security Explorations confirmed that its PoC exploit code works against Java SE 7 Update 25 and earlier versions, he said.


Smart mobile strategies curb wasteful IT spending
"Oddly enough, I've seen more companies not spending money on mobile efforts because they don't know where to start," Jack Gold added. "However, once they start, it's really easy to lose budgets to disposable spending because there was no plan in place." Further, the shift to mobile computing gives IT departments the chance to become a strategic partner with the business side of the company after years of having the not-so-fun task of keeping the lights on.


DDoS attacks getting bigger, stronger and longer
"This quarter we logged increases for all major DDoS attack metrics, and some have been significant. DDoS attacks are getting bigger, stronger and longer," said Stuart Scholly, president at Prolexic. "We believe this growth is being fuelled by the increasing prevalence of compromised Joomla and WordPress web servers in increasingly large botnets."


CIOs Must Lead Outside of IT
Most CIOs find it relatively easy to convince an executive team to invest in a technology that increases near-term revenue. They find it considerably harder to ask their colleagues to invest in a major infrastructure upgrade that will take 12 months or more before delivering direct business benefit. But all CIOs need to find a way to convince their peers that without these infrastructure investments, they will be mortgaging their company's future.


What Happens When we Die: Estate Planning of Digital Assets
When administering digital assets for a decedent‘s estate, there are eight steps that experts recommend fiduciaries take. In addition to these eight steps, a fiduciary should also take care to adhere to common practices required by law when dealing with digital assets. By following such steps, a fiduciary can begin to decrease the amount of hardship and stress associated with digital estate planning.



Quote for the day:

"The true sign of intelligence is not knowledge but imagination." -- Albert Einstein,

July 18, 2013

Predictive Analytics: Beyond the Predictions
Predictive analytics are applied in the process of determining business events that are likely to occur and actionable. The probability threshold of "likely" differs from company to company and risk factor to risk factor. A risk-averse company may decide to prepare for a relatively low probability event that comes with a particularly bad outcome. Companies that are more risk tolerant, unaware or distracted by other projects will be less poised to take action.


Huawei sees 5G's emergence by 2020
Since LTE, along with its next generation LTE-Advanced (LTE-A) and LTE-Beyond (LTE-B), had only just started gaining traction, and will start to be more popular in 2014, the natural progression would be for 5G to be rolled out in 2020, he explained, speaking to ZDNet Asia at an interview here on Thursday. Mobile broadband technologies have always been introduced before widespread rollout of the network itself, and 5G will be no exception, Zhou observed.


Post-Trade Processing Solution to Help Banks Transform their Operations
“Investment banks need to transform and are actively seeking solutions that help them enter new markets and comply with regulatory changes, all while meeting client demands,” said Steve Racioppo, Chief Revenue Officer, Broadridge Financial Solutions. “With Broadridge’s technology as the engine behind the solution and Accenture’s expertise in capital markets, we can see this solution becoming the industry standard for post-trade processing.”


New Intel Chief Sees $150 Atom Tablets This Year
Speaking on his first quarterly earnings call for Intel on Wednesday, new CEO Brian Krzanich acknowledged Intel's missteps and said it can't afford to be caught off guard again. "We've not always lived up to the standard we've set for ourselves," Krzanich said, admitting that Intel was "slow to respond" to the tablet market. There will always be "another big thing," he said, and Intel must be constantly "scanning" for it.


Most enterprise networks riddled with vulnerable Java installations
The most widely deployed Java version, according to Bit9's data, was Java 6 Update 20, which was installed on a little over 9 percent of endpoints. This version of Java is vulnerable to a total of 215 security issues, 96 of which have the maximum impact score on the Common Vulnerability Scoring System (CVSS) scale, Bit9 said.


Meru: 802.11ac specification support on single-channel architecture
Meru's single-channel, MobileFlex architecture allows adjacent access points to share the same channel, whereas most other wireless LAN vendors rely on channel segmentation from one access point to another to avoid interference. The single-channel capabilities of Meru's new 802.11ac-enabled access point -- the AP832 -- eliminates the danger of channel overlap that exists in segmented networks, allowing Meru customers to use the full 80 MHz channels.


Dell's future gets messier: Shareholders expected to vote against buyout?
Shareholders were expected to vote tomorrow (Thursday, July 18). But, as if things weren't messy enough, that arrangement was also called into question earlier this week. The possible delay follows a move by prominent Dell investor Carl Icahn last week in which the business magnate dropped hints touting his new proposal to the company founder's plans once again.


Hidden cost of cloud computing is CIOs’ biggest concern
“Effectively monitoring and managing modern cloud-based applications and services requires a new approach designed to work in today’s complex, hybrid and dynamic environments. Failure to do so could have a hugely detrimental impact on reputation, customer loyalty and revenues,” said Mendel. The fact is that most traditional monitoring tools simply don’t work in the cloud, he warned.


Outsourcing, adieu: Companies retake the reins on IT services
While it would be misleading to say that insourcing is a new phenomenon -- companies have been cancelling major outsourcing deals as long as there have been major outsourcing deals -- indications are there is a shift in thinking underway. ... Whether they're ready to cut the cord or not, companies should take heed of these converging forces as their outsourcing deals come up for renewal.


Problem Areas in Project Communications – Part 2
Once you are given a project, your first task should be to ensure that you and management are in complete agreement. What is the purpose and the desired end result? You may execute a project according to the highest standards and come in on schedule and within budget. However, if you’re not meeting these key individuals’ expectations, then you’re not successfully delivering on the project.



Quote for the day:

"Someone's sitting in the shade today because someone planted a tree a long time ago." -- Les Brown

July 17, 2013

Agile software development methodologies and how to apply them
This article focus on how technology team work together well to plan, build and deliver software. It does not talk about code or not focus on specific technology or not only about Microsoft tools. Hope this will improve your professional life and the effectiveness of your team. ... The principles and values of agile software development were formed as a way to help teams to break the cycle of process inflation and mainly focus on simple techniques for achieving their goals.


Fix the 3 silent performance killers for IIS / ASP.NET apps
Watching for and fixing these 3 low-hanging issues could make a big difference in the performance of your ASP.NET application, with a minimal amount of work. ... the most direct way to improve performance is to proactively monitor it and periodically load test/profile it to address the actual bottlenecks in your code.


Mobile Leaks Make Banks Wary of 'Bring Your Own Device' Trend
"It's not clear whether the employer has a right to scan your phone; it's less clear whether or not the company can actually move your private records to a repository," says Larry Ponemon "Privacy issues haven't really been worked out or legislated as yet for employees. I can imagine a situation in which you have a whole bunch of photos, videos, and other things you cherish on your device. Now you lose the device, and IT implements a remote-wipe. That's a privacy issue."


Are you neglecting the Basics?
The term FLOW was first coined by Mihaly Csikszentmihalyi In his excellent Book Flow: the psychology of optimal experience he discusses the need for a tension between our level of Skill and Challenge. Too much challenge with not enough skill will lead to anxiety, stress and burn out. Too much skill with not enough challenge leads to boredom, complacency and apathy.


Worldwide IT outsourcing to reach $288 bn in 2013: Gartner
“We continue to see overall market growth being constrained by near-term market factors, such as evolving ITO delivery models, economic, political and labor conditions, and service provider financial performance," said Gartner, Research vice-president, Bryan Britz. Gartner's forecast includes slight upward revisions for both custom application outsourcing and infrastructure utility services (IUS) for 2014 through 2017.


Developing employees who aren’t “born leaders”
There is no better motivation to accomplish great things than loving what you do. Another way to shape employees into leaders is to talk to them about what they are passionate about and where they would like to see themselves, their department or the company. Allowing them to see projects through that will help accomplish that goal demonstrates your interest in their vision and that you value their input.


Seven steps to building an effective incident response program
An incident response program should be one of the strategic initiatives within the enterprise. Yet even after an organization experiences a breach, it doesn't get the attention it deserves. According to our most recent Forrester security survey, investments in incident response programs in 2011 and 2012, after a breach occurred, increased only five percentage points to 23% from 18%. In a shocking trend, 21% of organizations noted no changes resulting from a security breach.


Tips on becoming a transformational leader from CIO of the UN
Transformational leaders have a vision for future success, but paradoxically that vision is formed by being super-attuned to warning signs in the present. They understand that today's success will be tomorrow's failure if their organizations are not continuously innovating. They embrace disruption. "If you are not a risk-taker, and cannot take some calculated risk, you can't do your job," Riazi said.


The Social Banker v2.0
Risk is also a key concern for many organizations embarking on an internal collaboration strategy. And rightfully so: regardless of whether you are a bank dealing with customer data or a KPMG team working on a client’s financial report, caution must always be the default position when it comes to risk. It is critical, therefore, to enlist the legal and risk teams in the planning and development of any internal system from day one.


A CPU, a GPU, and a Data Center walk into a Bar
Fear of change will be a limiting factor to rapid adoption, but not as much as might be true for other layers of IT infrastructure. However, the unfortunate truth is that often we fail to make changes because we elect to accept functioning as the same thing as “working effectively”. As I describe in my “What is a “Working” Data Center” blog, running doesn’t mean efficiently and sustainably delivering appropriate functionality and performance.



Quote for the day:

"Learn to pause.... or nothing worthwhile will catch up to you." -- Doug King

July 16, 2013

The Virtual Tug of War
The basis of the age-old feud is clear – performance as dictated by the networking camp vs. a protected environment as advocated by the security folks. The uneasy Solomonic decision facing CIOs the world over is whether to skimp on security in order to ensure flawless application delivery or ensure the organization is safe by taking a performance hit in order to avoid becoming a security statistic.


Unusual file-infecting malware steals FTP credentials
Once the new EXPIRO variant runs on a system, it searches for .EXE files on all local, removable and networked drives, and adds its malicious code to them. In addition, it collects information about the system and its users, including Windows log-in credentials, and steals FTP credentials from a popular open-source FTP client called FileZilla.


Identity and access management market faces identity crisis in cloud
Legacy approaches to IAM, such as Active Directory or Oracle's Identity Manager, are failing organizations because those products can't manage access from consumer endpoints, don't support rapid adoption of cloud services and can't provide secure data exchange across user populations, said Wendy Nather, an analyst with the 451 Research Group.


Apple: Game over or room to grow?
No, the real problem with Apple is that this company, long the arbiter of cool, the corporate trendsetter on all matters from design to marketing to operational excellence, has gone from being insanely great to merely great. ... The criticism that stings Apple the most is that it has lost its edge for innovation. The defensiveness over the frequently repeated criticism shone through during Apple's keynote presentations at its annual conference for developers in June.


5 Ways to Refocus Your Small Business In Tough Times
Successful businesses need to be able to blend a great idea with a well-thought-out and repeatable plan.  Striking that balance has proven to be a big challenge for many small business owners. "This is a tough time to be in business," said Gary Barnes, a serial entrepreneur and founder of Gary Barnes International. "More of us than ever are facing new problems and challenges."


What should you know about Next Generation Firewalls?
NGFW vendors must resist the urge to continue to bundle every security module in a single device since this is not how most enterprise customers deploy their network security. In addition, it is important that NGFWs retain the implicit “deny all” when it comes to application traffic rather than expecting administrators to tune individual applications to prevent tunneling in the manner of IPS signatures.


Toshiba to sell world's fastest SD cards this year
Toshiba said its latest memory is the first to use a controller that is compliant with the UHS-II (Ultra High Speed) specification, which theoretically offers speeds up to 312 MBps. The specification was first announced by the SD Association in January 2011, at the annual CES Electronics show in Las Vegas.


Gigabit-Boosted DSL Internet Standard Could be Ready in 2014, ITU Says
The standard is expected to be deployed by service providers that want to offer Fiber to the Home-like services, the ITU said. G.fast is meant to enable flexible upstream and downstream speeds to support bandwidth-intensive applications such as uploading high-resolution video and photo libraries to cloud-based storage, and communicating via HD video, it said.


The Chain of Responsibility Pattern in .NET
The Chain of Responsibility Pattern consists of three components: the handler interface, at least one concrete handler, and the client application. The handler interface defines the contract for handling a request in the chain. The concrete handler class implements the handler interface and either handles the request or forwards it to its successor handler. The client application sends the request to the initial concrete handler.



Quote for the day:

"Whatever you do, do it with intelligence, and keep the end in view." -- Thomas à Kempis