September 09, 2013

Trust no one, advises security expert after NSA revelations
The new revelations should raise major concerns from Internet users over who they can trust, Schneier added. "I assume that all big companies are now in cahoots with the NSA, cannot be trusted, are lying to us constantly," he said. "You cannot trust any company that makes any claims of the security of their products. Not one cloud provider, not one software provider, not one hardware manufacturer."


PostgresSQL: The Other big open-source database has a new release
Jonathan S. Katz, CTO of VenueBook, an event-planning company, said in a statement, "PostgreSQL 9.3 provides features that as an app developer I can use immediately: better JSON (JavaScript Object Notation) functionality, regular expression indexing, and easily federating databases with the PostgreSQL foreign data wrapper. I have no idea how I completed projects without 9.3."


David Linthicum Named One of TechTarget's Top 11 Cloud Computing Industry Movers and Shapers
"David earned his place on the list not just because he is such a visible presence across virtually any cloud computing website or conference, but due to the fact that he isn't just saying what vendors want to hear. He has earned his status as a thought leader by consistently challenging the status quo." The feature details how via his blogs, webinars, keynote addresses, podcasts and over 13 books, Linthicum advocates for change in the cloud market.


VMware NSX: Network virtualization doesn't need to be a turf war
"To me it just feels like the VMware NSX folks are saying the network is the biggest problem," said network engineer and blogger Tom Hollingsworth. "If you are going to blame the network for all the problems that we've been dealing with for years, give us a solution that works with the people who have been trying to fix this the whole time. Don't tell me that I'm the problem and that you'll just fix it and go around me."


Securing the Virtual World
The report showed that one-third of the group think virtualization and cloud computing make security “harder,” while one-third said it was “more or less the same,” and the remainder said it was “easier.” The results seem to indicate that many are either in the process of defining policy for virtual environments, or have chosen to postpone that effort until a later date. Perhaps, as a result of this failure to tackle the security question when deploying virtualized servers, there are experts who believe that the majority of virtual deployments may be less secure than physical deployments.


4 survival strategies for IT chaos
Today's youth are, of course, tomorrow's customers. "They demand immediacy, which is driving what IT has to deal with," says Kippelman, who is CIO at Covanta Energy and a Computerworld blogger. But the need for speed is just the tip of the iceberg. Across all industries, IT teams are up against unprecedented volatility, uncertainty, complexity and ambiguity, also known as VUCA.


The Wonder Years: Businesses Transform as Cloud Adoption Matures
Along with deeper benefits, early adopters are discovering deeper complexity in using cloud for day-to-day operations. After initial cloud transitions where integration is a top challenge, companies with more experience are seeing changes to IT policy become their primary concern. These changes could involve the way that technology is procured throughout the organization or the functions within the IT department as they interact with lines of business, both of which are steps towards a fully cloud-enabled business.


U.S. court takes on Internet traffic fight
The outcome will also determine whether Internet service providers can restrict some so-called crossing content, for instance, by blocking or slowing down access to particular sites or charging websites to deliver their content faster. Public interest groups have termed the FCC rules too weak, saying the agency was swayed by big industry players and needs to forge more direct and clearer power of oversight.


Myths about Enterprise Application Orchestration
It combines business processes that cut across functional areas as well as associated IT services. Orchestrating or designing an Enterprise Application is an art which can be compared with the composition of music: It requires the same amount of effort or integration to produce the desired results. The term orchestration in music refers to the way instruments are played to render any aspect of melody or harmony


Kanban - Isn’t It Just Common Sense?
Thus in response to the question in title of this post, the answer to whether kanban is common sense is “No!” However, common sense is an example of a heuristic, and I do believe kanban is a heuristical approach to solving the many challenges of product development. The remainder of this article will explore more about what heuristics are, the primary sources that led me to the realisation that heuristics are the right approach, and how we can use heuristics to design kanban systems.



Quote for the day:

"Let a man lose everything else in the world but his enthusiasm and he will come through again to success." -- H. W. Arnold

September 08, 2013

FAQ: What is the COBIT framework's approach to IT management?
The aim is to provide an overarching framework that incorporates different subsets of information management and control while promoting greater consistency among these areas. Unlike prescriptive requirements for a specific regulation, COBIT can be used for a wide range of enterprise needs, including information security, regulatory compliance, risk management and financial processing.


Criteria for Determining Which SaaS Platform to Choose
For every SaaS entrepreneur in B2B, choosing the right platform is one of the first and most important decisions you will have to make. It will affect everything. To understand why it’s such a difficult task, I will review the three integrations of SalesClic, with both their upsides and downsides.  So which platform would you have started with? With our application, we started with Google Apps, then integrated with Salesforce followed by Highrise.


The New Generation of Database Technology Includes Semantics and Search
If you have a RDBMS running that’s giving you what you need, then you shouldn’t replace it just for the sake of it. Of course, if you want to combine your relational data with unstructured data or more complex structured data, then it can make sense to ingest it into MarkLogic so that you can benefit from unified search and query across all relevant data. Think of it as a data warehouse, but where you get to search and query all data instead of just pre-computed aggregates along predefined dimensions.


Future Airborne Capability Environment: FACE™ 101
Check out this videlo presentation - The Future Airborne Capability Environment (FACE™) leads the development of open standards for avionics systems. FACE 101 introduces concepts, technical standards, business model and consortium structure.


5 Ways A Flat Management Structure Can Empower Your Business
In a traditionally structured company, the low-level guys—such as customer support staff—are the people who truly have the pulse of a company. They’re the ones who are dealing with customers and who know everything that’s great and everything that’s not-so-great about a company. But if their experiences on the front lines inspire an idea, it’s virtually impossible for it to make its way to the CEO’s desk.


NSA Code-Cracking Puts Google Under Fire
“This is a fundamental attack on how the Internet works,” Joseph Lorenzo Hall, senior staff technologist at the Washington-based policy group Center for Democracy & Technology, said in an interview. “Secure communications technologies are the backbone of e-commerce” including the transfer of medical records and financial exchanges. “People in business will either not engage in those activities, or find other ways,” Hall said.


Minimizing Oracle db file sequential Read Wait Events
Unless you trace a session with the event 10046 or have a continuously running wait event data collector, it is difficult to determine the SQL statement that is responsible for the cumulated wait time. Take the preceding SID #192 again, for example. The 243113 centiseconds wait time may be caused by one long-running or many fast SQL statements. The latter case may not be an issue. Furthermore, the SQL statement that is currently running may or may not be the one that is responsible for the waits.


Outsourcing and TOGAF 9.1 - What is the connection?
Enterprise Architecture (EA) is about developing a fundamental structure of your Business and IT components to respond to business drivers, realise business goals and establishing principles which will guide their evolution into the future. This includes core and non core components of IT and Business. When you outsource some of these components, whether they are parts of Business or IT, you need to ensure that the service provider delivers to the Enterprise Architecture of your company.


Dissecting Design
In the past few years, we’ve recognized the danger in jumping headfirst into full-comp design before we really understand the design direction. Other disciplines have recognized this for a long time—think mood boards in branding—and taken steps to ramp up their design effort. The goal here is to establish the basic building blocks we’ll use in the rest of the design process: things like color, type, texture, illustration style, photography treatment, iconography. Once these are established, the success rate for the rest of the process is greatly increased. There are a number of ways to do this on the web; let’s look at a few.


Building a Cohesive Design Team
In many organizations, skill building is a secondary activity, done only when project work is in a lull. However, amongst the most successful teams, it was a primary activity that was scheduled with the project work. One manager told us, When the [team members] come back from training jazzed to apply a new technique, that’s when we see real benefits. In order to bypass roles, the most successful teams would use techniques for facilitating discussions that equalized the power in the room.



Quote for the day:

"Storytelling is the most powerful way to put ideas into the world today." -- Robert McKee

September 07, 2013

Despite Sales Surge, Enterprises Still Not Excited by 10Gbit/sec Ethernet
10Gbit/sec Ethernet is an upgrade, but not really the next generation of datacenter switching, the honor for which will go to 40Gbit/sec and 100Gbit/sec switches whose sales are growing at more than 100 percent per year and will make up the majority of Ethernet switching revenues by 2017, Crehan predicted. ... Price cuts did help increase sales, but most of the growth seemed to stem from systems makers and datacenter-service providers whose inventory of 10Gbit/sec Ethernet gear had run low, Boujelbene said in the report.


6 Time Management Mistakes You're Probably Making
Tim Ferriss, author of The 4-Hour Workweek, calls it "time famine." Your doctor calls it "dangerous levels of stress." The '80s band Rush called it "too many hands on my time." Whatever label you put on the entrepreneurial trait of having more tasks than time, it's a factor of almost every successful business life. But it doesn't have to be. Check your own daily schedule to see if you're falling into one of these six time management traps.


Intel Targets Cloud Data Centers with New Atom C2000 Chips
Within the Atom Series-C processor family the configurations are highly optimized for the target workload – ranging from 2 cores and 6 watts for entry level web hosting, 4 cores and 9 or 14 watts for cold storage, and 8 cores and 12 or 20 watts for front end web tier (scale-out workloads). With the Silvermont modular design, the AtomC2000 can have 2 to 8 Silvermont cores, with shared 1MB L2 per module, or 4MB.


The Top 10 Skills for a New Business Analyst to Shore Up On
Be sure to get your manager’s feedback wherever possible and select skills that are relevant to your immediate success. ... In that case, meeting facilitation could be on the back-burner while you work on your analysis skills and learning relevant software. You won’t know what skills are most important until you ask, but now you have a starting point for having a productive conversation with your manager.


The Personas that Matter Most in Business Analytics
Understanding this context-driven user experience is the first step toward defining the personas found in today’s range of analytics users. The key is to make the personas simple to understand but comprehensive enough to cover the diversity of needs for business analytic types within the organization. To help organizations be more effective in their analytic process and engagement of their resources and time, we recommend the following five analytical personas: (Note that in my years of segmentation work,


4 Million Patient Records Stolen in Second Largest HIPAA Data Breach
A senior vice president from Advocate acknowledged that the sensitive data shouldn’t have been stored on the computers’ hard drives, but instead maintained on their secure network. One of the steps they’re taking toward remediation includes mapping its computer and software systems in order to identify where patient data is stored, and how to secure it. This is also one of the first steps that should be taken toward data encryption – classifying sensitive data and then selecting a proper encryption method is next.


In light of the NSA, how to think about encryption
But rest assured, governments crack encryption. If there happens to be some kind of encryption they can't crack, they don't just write it off. They redouble their efforts to find a way to get inside those communication streams. It is what they do. National security (and often national sovereignty) depends on it.


The Art of Reviewing Code
Arjan van Leeuwen a developer at travel software giant Amadeus, where he mainly works with C++, overviews code reviews advantages and disadvantages, how much can be done in a code review, types of critiques, how to handle critiques and conflicts that might arise from them. ... Reliability and speed are things that matter every day, but code quality is the subject that can really rile him up.


Ten Ways to Kill An Enterprise Architecture Practice
Have you seen practices that you know could kill an Enterprise Architecture practice? Nick Malik has seen it happening. A recent LinkedIn thread asked for examples, and he came up with his top ten which are listed here. He is seeking addition to the list by his blog readers.


What is Software Quality?
It is important to make this distinction because so much time and energy is spent by people arguing over what is and what is not a “defect”. If we define separate terms then we can at least reason about this situation and the fact that individual, teams and organizations often have incentives for classifying something as a defect whether it is or is not. Jon Jagger pointed out in his comment on the previous blog that “Jerry Weinberg's definition of quality is "value to someone" or "value to some persons”.



Quote for the day:

"You cannot build character & courage by taking away a man's initiative & independence." -- Abraham Lincoln

September 06, 2013

Successfully Integrating Project-Impacting Processes
If project-impacting processes are not aligned, project risk may increase because a project team may not be aware of applicable policies, standards, or best practices; or due to the effort involved in complying with all of them. To minimize this risk, PMOs can expand their scope to include alignment of these requirements/policies/mandates.


How PayPal Can Succeed Where Google Wallet Failed
Nothing will dampen consumer curiosity and enthusiasm faster than failed attempts to use loudly touted cool new features and services. PayPal is facing the proverbial chicken and egg situation of mobile payments. PayPal says it has been very focused on demonstrating and delivering value to merchants, but only time will tell if it receives the required return on its investment to soon claim “success” with in-person mobile payments.


Culture Eats Strategy for Lunch: How True Is It?
Culture eats strategy for lunch, culture as the most invisible but powerful corporate fabric, is both 'hard' competency and 'soft’ asset of business. Effective execution of a strategy relies on a strong culture. When does a weak culture ‘eats’ strategy and undermine success? How shall you be mindful of culture? What are the strong culture traits, and how can culture, like water, to push the organization toward the right direction and reach the destination?


Integration on the Edge: Data Explosion & Next-Gen Integration
Instead of spending your organization's hard-earned money on the three iPaaS Research Reports, take one of the two following options instead: Spend a little more money and invest in an hour of Pezzini's time and have him explain it all to you; or Buy & read the research reports and THEN cough up a bit more cash to get an hour of Pezzini's time so that he can explain it all to you.


IBM Database Conversion Workbench, Part 1: Overview
DCW provides the following benefits: Common graphical interface with uniform look and feel for all phases of the conversion; A consolidated process with well-defined steps based on best practices; Faster enablement for client and partner teams in conversion methodology; and Wizards that guide you through all steps of the conversion


Small businesses' BYOD practices leave them one cyber attack away from bankruptcy
"The main thing criminals are trying to do is get banking Trojans into the system so they can get login details for online banking. You don't see with SMBs any kind of espionage, they're too small it's all financially based. It's usually the stuff you can buy and customise, things like Zeus and SpyEye, all those families of malware," said Ben-Itzhak.


CIOs Say Mobilizing Enterprise Apps Is Not That Easy
Surprisingly, 53 percent of enterprise apps are Web-based, so you'd think they'd be easy to mobilize. So what's putting the brakes on the mobile movement? The biggest barrier is mobile development costs, say 65 percent of CIOs. The cost of re-engineering enterprise apps as mobile apps is high because of the ballooning platform fragmentation of the market, particularly the many flavors of the Android operating system.


Google fights to kill email-scanning lawsuit brought by Gmail users
"This case involves plaintiffs' effort to criminalize ordinary business practices that have been part of Google's free Gmail service since it was introduced nearly a decade ago," Google lawyers said in a motion filed with the court. "While Plaintiffs go to great lengths to portray Google in a sinister light, the complaint actually confirms that the automated processes at issue are Google's ordinary business practices implemented as part of providing the free Gmail service to the public. This is fatal to Plaintiffs' claims."


Enabling the Third Platform
In some ways, the move toward the third platform has been foreshadowed by another trend that has been building for years – the bring your own device phenomenon. This trend of employees working on their own, unsecure devices is occurring because they want mobility that their organizations may not provide. In the third platform era, it’s a foregone conclusion that many of the mobile devices involved will be employee-owned and outside the control of IT administrators.


For cloud providers, fraud detection is integral part of business plan
"While cloud has been a phenomenal enabler for legitimate businesses, it's also been a phenomenal -- and I mean phenomenal -- enabler for fraud and fraudulent activity," said John Rowell, senior vice president of research and development as well as global service operations at Dimension Data, a South African cloud and managed services provider. "Fraud is a huge deal on the business side."



Quote for the day:

"3 Rules of Work: Out of clutter find simplicity; From discord find harmony; In the middle of difficulty lies opportunity." -- Albert Einstein

September 05, 2013

Active/Active WAN-based Replication in GemFire vs Oracle and MySQL
The type of replication it uses is parallel replication. Parallel replication spreads the work across servers and eliminates contention, or communication bottlenecks between data stores. Data partitioning breaks the data and work apart across many servers, building in horizontal scalability. Each partition has a replication queue that has one or more redundant backups in case of failure and streams data to a disk store for recovery.


WAN optimizer technologies to counteract data center network hogs
It's hard to maintain fast and reliable wide area network (WAN) connectivity in the face of increasing data center workloads, user bases and real-time traffic. This acute demand for WAN services, combined with more geographic separation between physical data centers and/or service providers, creates bandwidth and latency problems. To address WAN bottlenecks, you can add costly WAN connectivity to the data center, curb network services to end users or deploy WAN optimizer technologies.


No Extract, Transform and Load? Really?
By eliminating ETL with a drag and drop tools without knowing the adverse impacts to enterprise data enablement can land the average project sponsors in to serious trouble. In order to take the best advantage of the data acqusition tools that claim to eliminate or reduce ETL, make sure that the business situation where this can be experimented on. The following are some such business scenarios,


The Five Definitions of ROI
Return on Investment. That's what the term ROI has signified all along. But based on my recent posts, this term has taken on other dimensions, because enterprises look for returns from various dimensions of investment, whether it’s information, infrastructure, innovation, or individuals. The fact that all these terms start with the letter “I” is merely coincidental. It behooves enterprises to take the right steps to realize the returns from the perspective of all these dimensions. Let’s see how:


Fluid Motion aims to make gesture recognition tech more accessible
According to Abhinav, their presentation application was recently used at the India Design Forum by the Indian School of Design and Innovation to showcase the upcoming design school and latest courses in a really immersive and interactive way. It also garnered attention at the Rolls Royce exhibition where customers could interactively design their own Rolls Royce by simple hand gestures.


A Tiny, Boring Kodak Takes Consumers out of the Picture
Boring, however, may prove to be beautiful for a company that teetered on the brink of the abyss. If all goes according to Kodak’s reorganization plan, the company will post $2.5 billion in revenue this year and $167 million in earnings before interest, taxes, and such noncash expenses as depreciation and amortization. It will also have only 8,500 workers, down from almost 64,000 a decade ago.


Championing Telecoms Innovation in the Middle East
Sleep deprivation aside, heading a telecommunications company at this point in history is not a position everyone would aspire to. The stress of second guessing what’s coming and the demand for ever more broadband from limited resources is intense. Meanwhile, industry leaders are making major capital investments in next-generation services over IP networks and want to monetise their investments with new products and services as rapidly as possible.


DataStax Building NoSQL, Big Data Partner Program
NoSQL adoption has accelerated in recent years as customers pursue new ways to manage Big Data applications. Forrester Research predicts the NoSQL market will grow from $200 million in 2013 to $1 billion in 2017. ... In the meantime, the foundation for a partner program is already in place for the open source company. Schweitzer says the intial channel effort includes about 80 partners across six market segments:


'Hash Hunters' Web service cracks password hashes for bitcoins
Hash Hunters is a bit rough around the edges, Gosney wrote. It doesn't use "https," which is a standard security technology that encrypts communication between a client and a server. Gosney, who created an account on Hash Hunters, said it doesn't seem to have a reliable way for contract password crackers to communicate with their clients, the site crashes occasionally and it doesn't appear that cracked passwords can be uploaded.


How cloud computing changes (almost) everything about the skills you need
"Traditional sysadmin skills will inevitably be in less demand in future, certainly in the SME space. Managing the relationship between the business and its suppliers will become ever more critical," he says.
Kevin Leypoldt, IS director at Structural Integrity Associates, is of similar mind: "I am now refocusing on customer service and desktop/helpdesk support as we move the hosting/infrastructure to the cloud. Because we have that skillset already, it's now becoming a larger focus."



Quote for the day:

"The only way to do great work is to love the work you do." -- Steve Jobs

September 04, 2013

How to Assess Security Risks in a Scientific Fashion
This advanced understanding from the medical field can be applied towards handling risks that information infrastructures face. Considering information assets to be patients, incidents including hacking and malicious programmes to be diseases, technical counter measures and controls to be medicines and different processes, policies and practices to be treatment protocols, we can draw a fair parallel between medical risk management and information security risk management practices.


How to decide when to pass on PaaS
In the current world of PaaS, you are required to commit to a combination of platform components in a similar way. The difference is that there are arguably a lot more moving parts. Back in the 80s, your platform often ran in a single box, such as a VAX or some Unix-based mini-computer. Platforms in today’s world of distributed computing usually involve a whole landscape of servers and services.


10 Wearable Devices To Keep Patients Healthy
Thanks in part to trends such as wearable devices, the overall mobile health market is growing substantially. Research and analysis firm GlobalData expects the market to grow in value from an estimated $0.5 billion in 2010 to over $8 billion by 2018, significantly revolutionizing healthcare delivery and management. Take a look at the range of devices in use now, from hospital settings to homes.


How Much CSS Should You Have?
According to the HTTP Archive, the average website has 35KB of CSS, and CSS transfer size has the highest correlation to render time. If you look at the graph directly above the one for render time at that link, you will also notice that total transfer size has the highest correlation to page load time. This makes the case for reducing the overall weight of your CSS pretty strong. Based on this data and what I've seen in my own work, you shouldshoot for less than 30KB of CSS on each page of your site (after gzip).


Creating a Performance Culture
Creating a culture of performance at your company is about creating a culture of quality. This is especially true because best (and worst) practices propagate quickly at web companies. Code written for product A is reused by product B. And folks who worked on team A transfer over to team C. If product A is built in a high performance way, those best practices are carried forward by the code and team members.


HR Departments Invaded By Data Scientists
IT must be at the center of the unfolding data-driven transformation. Not everyone has an HR data scientist like GM. Arena emphasizes the importance of his partnership with Bill Houghton, GM's CIO for global corporate functions. "A big piece is integration--ensuring the right systems are connected so we know where to draw the data from," says Arena. "IT has to play a role in that."


Cloud Leaders: Cloud, CXO and Data Conversation with Dana Gardner
C-level domains need to break down a little so there’s more cooperation between organizations, allowing them to propel efficiency instead of slowing it down. A top-down hierarchical vertical approach can be a detriment to agile business. ERP and business apps have traditionally acted as the glue for how business processes can be applied across the organization, and processes can be made efficient around manufacturing logistics/procurement/R&D.


9 Fallacies of Java Performance
Java performance has the reputation of being something of a Dark Art. Partly this is due to the sophistication of the platform, which makes it hard to reason about in many cases. However, there has historically also been a trend for Java performance techniques to consist of a body of folk wisdom rather than applied statistics and empirical reasoning. In this article, I hope to address some of the most egregious of these technical fairy tales.


EMC optimizes VNX hybrid array for flash
The performance gains from this and other improvements of the line are dramatic, according to EMC. With a similar configuration, a VNX from the current generation would top out at 240,000 IOPS (I/O operations per second) and the new version would reach 1.1 million IOPS, Herzog said. The VNX's bandwidth has tripled and its maximum capacity has doubled from 3PB to 6PB.


Network configuration tools: It's not your father's backup solution
With businesses throwing everything they can think of onto networks today, investing in a full-featured configuration and performance management tool pays immediate dividends. When problems occur, especially trouble that's more challenging to diagnose than a down interface, tools that combine configuration and performance contexts can take the headache out of troubleshooting.



Quote for the day:

"Liberty means responsibility. That is why most men dread it." -- George Bernard Shaw

September 03, 2013

Data Scientist or Business Scientist?
Go-to guys provide an indispensible service to the organization. These are the Type IIIs in our model. What do they lack to move into a Type II role, defined in Figure 1 as Type II-B: light data scientist? Essentially, they need to learn about the data sources such as Twitter feeds, weblogs and other sources; they need to learn how to use (but not program) analytical, statistical and algorithmic models.


Can China's Xiaomi Make it Globally?
Xiaomi is joining the ranks of other Chinese smartphone vendors wanting to make it big in the international market. Telecommunication equipment vendors Huawei and ZTE have been selling handsets in the U.S., and PC maker Lenovo is also eyeing mature markets for its smartphone sales. But so far Chinese branded phones have yet to gain the worldwide recognition their rivals Apple and Samsung Electronics enjoy.


What Are the Questions to Ask When Developing a Big Data Strategy?
Everyone talks about asking the right questions, but what are the questions you can ask depending on the choices you have made? Each strategy or each use case requires different questions to be asked. In addition, the analyses done and the tools used also result in different important questions that need to be asked before, during and after developing and implementing a big data strategy.


Is Quantum Cryptography Really Secure?
Not everyone is on board with the idea that quantum cryptography is unhackable; and regardless of whether it delivers perfect security in theory, if real implementations are less than ideal (which they always are), avenues of exploitation will remain. These avenues may be more or less accessible, but it’s all a matter of economics: if the rewards outweigh the risks (and costs), someone will find a way to beat the system


Shift employee engagement measurement from snapshot to real time
By using analytics software, HR managers can begin to mine data, which might help to uncover the root causes of disengagement. "A lot of people will do a survey of their employees, or they might move to the next step and do some social network analysis, but what about mining the data behind absenteeism? That can tell you a lot about the drivers for disengagement," Cameron said.


Francisco D’Souza of Cognizant, on Finding Company Heroes
It’s very hard to see your blind spots, by definition, and it’s very easy to fall into comfort zones, because people like patterns and a sense of familiarity. I’ve tried consciously to say, “What are the tools I can use to identify these blind spots and push through comfort zones?” And I always tell myself that if I wake up in the morning and feel comfortable, I’m probably not pushing myself hard enough.


Best tools for protecting passwords
For enterprises trying to get a handle on password management, the good news is that there are products that can help implement stronger password policies for end users logging into corporate and personal Web-based services, as well as for employees who share a local server login. The goal here is to make the password process more secure, and also to let users login to particular resources without having to remember all of their individual passwords.


Mobile Devices Burying Banks in Data
As consumers use multiple devices to execute financial tasks, banks are forced to evaluate how mobile trends impact other touch points. Generally, banks report digital customers have lower attrition rates and deeper engagement. Deciding what to measure remains an art. "You can't know from the outset that you are focusing on the right things," he says.


The Biggest Threat to Cloud Computing? The U.S. Government
“The recent revelations about the extent to which the National Security Agency (NSA) and other U.S. law enforcement and national security agencies have used provisions in the Foreign Intelligence Surveillance Act (FISA) and USA PATRIOT Act to obtain electronic data from third-parties will likely have an immediate and lasting impact on the competitiveness of the U.S. cloud computing industry if foreign customers decide the risks of storing data with a U.S. company outweigh the benefit,” stated an article by ITIF.


Five flow charting applications
As a freelance technology writer, I find myself often having to create various types of charts. In doing so, I have discovered that there are a number of different tools available to help you to create flowcharts. Here are five such tools.



Quote for the day:

"When you change the way you look at things, the things you look at change" -- Wayne Dyer

September 02, 2013

Application-defined networking grows with variety of vendor approaches
Cisco Systems recently announced its Application Centric Infrastructure initiative that would enable applications to run in any environment, cloud or traditional data center, virtually or on bare metal. The goal is that users will be able to specify application requirements via open interfaces, and the infrastructure will automatically supply network, compute and storage needs.


Postgres 9.2 invites large-scale enterprise deployment
Perhaps most notably, Postgres 9.2 can now run as a single instance across 64 processor cores, a big bump from the previous official limit of 16 cores in version 9.1. The new version can also write and read the data much more quickly than before. ... As for performance, Postgres can now respond to as many as 350,000 read queries per second, four times as many as previous versions, according to the software's developers. It can perform up to 14,000 writes per second, five times as many as before.


ITIL Dinner Conversation: "Please Pass the Whine"
You can’t force ITIL down someone’s throat, especially if it’s devoid of specific implementation guidance. To make people accountable you must give them very specific goals and objectives and guidance on how to achieve those goals. The more specific the better. That leaves less room for interpretation and more focus on execution


Next Microsoft CEO Faces Rocky Road in Easing NSA-Fueled Privacy Worries
In the latest fallout from the NSA's terrorist-hunting, the German national weekly newspaper Die Zeit reported that experts are warning the government not to use Windows 8 or its successor because they contain a backdoor that could be exploited by the U.S. agency Ironically, the offending technology, called Trusted Computing, is the foundation for a much higher level of security than what has existed in Windows PCs in the past.


The hot, confusing mess that is digital privacy
Here’s the TL;DR version: The secret court has no idea what’s going on and no real way to to find out other than by taking the NSA’s word for it. Its power to rule on the legality of certain actions is hamstrung as a result. The NSA seems actually to kind ofcare about doing things legally, but even it has a hard time keeping track of the deluge of data it’s collecting.


Agile vs. Waterfall development: Embracing each method appropriately
By comparison, Agile seems more natural. It's adaptive, flexible and responsive, and you don't have to go back to the beginning if you encounter a problem. Do not pass "Go," do not collect $200. Scope creep isn't a problem, because Agile is about getting something out the door. It is the opposite of the Waterfall method, which can be like a Pekingese in need of a haircut when it hits a wall -- unable to maneuver quickly around new obstacles or requirements.


Game On! 6 Tips for Gamification in a Global Workforce
Gamification – or setting up game-like rewards to motivate people – hits nearly every one of the factors on the happiness at work list: ambition, challenge, a sense of purpose and mastery. Walmart’s program, for example, gives associates an “on the sales floor” game experience to teach them about the company’s products, processes, and culture. Gamification engages while training the workforce, especially remotely.


Adventures in Data Profiling (Part 4)
One of the possibilities is that we could have postal addresses from countries that do not have a postal code system. Just a few examples would be: Aruba, Bahamas (sorry fellow fans of the Beach Boys, but both Jamaica and Bermuda have a postal code system, and therefore I could not take you down to Kokomo), Fiji (home of my favorite bottled water), and Ireland (home of my ancestors and inventors of my second favorite coffee).


The Fail-Safe Organization
Getting to know people better does not require team lunches, parties, potlucks, or the occasional random surprise afternoon off to see the new Star Trek movie. These well-intentioned “team builders” may be fun but they don’t do a lot to build teams. Mostly what builds teams is trust among the people in them. Trust is something we build by getting to know people day in and day out in the context of our work together—and by letting people get to know us.


6 Ways To Develop Internal IT Talent
Prioritizing and rewarding employee skills development can improve hiring and retention, for starters. It can also help build internal technical expertise, even in organizations that lack a robust centralized IT department. Take heed, small and midsize business (SMB) pros. "I am a firm believer that technology-savvy people are always looking to improve their knowledge and work with cutting-edge technology," said Rona Borre, CEO and founder of IT recruitment firm Instant Technology, in an email interview.



Quote for the day:

"Failure is the line of least persistence." --W.A. Clarke

September 01, 2013

US, Others Criticize New Vietnamese Internet Law
Decree 72 is scheduled to go into effect on Sept. 1. It restricts the use of blogs and social media to the exchange of personal information. Posting of information that "harms national security" or "opposes" the government is banned. Further, it requires Internet companies and providers of information in Vietnam to cooperate with the government on enforcement of the decree.


Capture Knowledge and Make Decisions Transparent in a Design Thinking Process
During the Design Thinking process a lot of knowledge is created and it is very difficult to capture that knowledge in a structured way. Furthermore, you need to re-focus several times during the project. The team needs a basis on which to make and document good decisions. Both needs - (a) capturing of knowledge and (b) having a basis for making and documenting decisions - are supported by an Impact Map.


Suvola Appliance Technology
Leverage the power of ARM Based Servers: 1/10th the footprint, 1/10th the energy consumption, ½ the acquisition cost. An entire computer server on a chip – including multiple CPU cores, memory controllers, I/O controllers, interconnect switches and more; Dramatic reductions in footprint – e.g. four complete servers featuring 16 cores and 16 SATA ports on a card measuring 10 inches long


Service will be the next SaaS differentiator
“My entire career has been spent in the SaaS world, and customers always had very high expectations,” said Gardner. “But it didn’t change the fact that we initially had some growing here to do in the area of what was expected of customer service from our IT staff. In IT, you hire many individuals who are coming from an internal IT organization and dealing with co-workers.


The Best Of Open Source For Big Data
It was not easy to select a few out of many Open Source projects. My objective was to choose the ones that fit Big Data’s needs most. What has changed in the world of Open Source is that the big players have become stakeholders; IBM’s alliance with Cloud Foundry, Microsoft providing a development platform for Hadoop, Dell’s Open Stack-Powered Cloud Solution, VMware and EMC partnering on Cloud, Oracle releasing its NoSql database as Open Source.


Seven over 70
We meet extraordinary older innovators all the time, who after a lifetime of creativity are still solving big problems, generating wealth, or expanding our conception of what it means to be human. Below, in reverse alphabetical order, are seven innovators over the age of 70, chosen arbitrarily, because I am attracted to their lives, work, and character, and not according to the formal nomination and judging process that selected the 35 Innovators Under 35.


Google Glass for Bespectacled Coming in a 'few Months'
"In the next few months we will release a version that will integrate into glasses. So if you are wearing glasses, you'd be able to use this," said Babak Parviz, founder and head of the Google Glass project at Google, during a speech at the Hot Chips conference in Stanford, California, on Tuesday. If the Google Glass platform is successful, "you'll see different optics," Parviz said.


How Enterprise Architecture approach can help CSPs align IT with business goals
After an EA transformation, system availability improved 50 percent and was more predictable, and technology architecture capital expenses decreased by close to 8 percent. With a consolidated IT portfolio, operational costs and time also decreased. Call handling time at call centers decreased by 25 percent and customer experience measures improved by 50 percent.


Cognitive BPM - Making BPM Systems Learn with Experience
One of the key aspects which has remained largely unchanged is that the improvements have been largely around the Process and Technology aspects of the problem, while the People aspects have remained largely unchanged. There are obviously several challenges faced when trying to improve the People aspect, which has led to limited innovation in this front.


Insider Threat: Limit Privileged Access
A hacker or rogue employee can use these accounts to change firewall configurations, modify network settings and edit server logs to hide their activities. These accounts give anyone "god-like access" over the network, Chiu says. Controlling who has access to these accounts and tracking and monitoring exactly how they are being used is a critical part of preventing data leaks and network breaches.



Quote for the day:

"The art of leadership is saying no, not yes. It is very easy to say yes" -- Tony Blair

August 31, 2013

FTC: Medical lab lost patient info on peer-to-peer network
LabMD said it will "vigorously" fight against the FTC allegations. "The Federal Trade Commission's enforcement action against LabMD based, in part, on the alleged actions of Internet trolls, is yet another example of the FTC's pattern of abusing its authority to engage in an ongoing witch hunt against private businesses," the company said in a statement. "The allegations in the FTC's complaint are just that: allegations."


AWS down again? Nobody seems to care
The outcry when Amazon.com went down last week was much more muted, and last Sunday’s event really seems to have been barely a blip on most people’s radar. Despite the consistent pattern of failure with AWS and US-East, customers don’t seem to care. Consumers are seem to becoming acclimated to the semi-regular failures, developing an “It’s down, I’ll get back to it later” attitude during these outages. But that isn’t a good thing.


4 Tips for Mentoring Young Professionals
Established leaders, also have an obligation to pass the baton and help develop leadership in others. This, more than anything, is the hallmark of good leadership. Just as John Quincy Adams once noted, “If your actions inspire others to learn more, dream more, do more, and become more, you are a leader.” If you have young people in either your professional or personal life, lift them up and in so doing, inspire an entire generation of future leaders. Here’s how:


Test Studio: A Quick & Easy Solution To Automated AJAX App Testing Problems
Automating dynamic interfaces and complex AJAX applications is not an easy job. A major hurdle that one faces is, getting the proper reference to the dynamically created HTML objects once the DOM tree has been modified. Usually, a number of workarounds are necessary in order for your code to find the proper HTML element. Well, all these issues can be resolved in a jiffy with Telerik Test Studio, find out how. ASP.NET and AJAX applications have QAs face two major challenges:


Predictive Analytics for Insurers: Tackling the Seemingly Unpredictable
Insurers should deploy predictive analytics for marketing, product development, channel management, new market identification, customer acquisition and retention, customer service, litigation management, claims management risk management and cost control, the report notes. The insurance industry exists in a world filled with more and more rich data, according to Barry Rabkin, principal analyst at Ovum. Insurers must take the steps necessary to leverage all this information.


Theory vs. Learning Models
What the visualizations suggested to me is that the features Mike’s analyses hypothesized/tested as significant were indeed so, but that some of the relationships might in fact be non-linear and there may well be interaction effects in the data not captured in the regression models. And I suspect that by training and testing on the same data, the reported models might be somewhat overfit -- the actual relationships not as strong as those reported.


Why is Agile Data Warehousing Important?
It is difficult to translate a software development methodology to data warehousing, but it can be done. In this interview with TDWI’s David Stodder, Bruce Szalwinski discusses the value found in Cobalt’s commitment to the iterative style and incremental delivery of agile development for data warehousing.


Leadership Caffeine—Surviving and Thriving Under Uncertainty
The modern form of the organization allows us to assemble remarkably intelligent individuals and to organize in groups that when properly motivated, are capable of anything they set their collective mind on. The lack of pre-prescribed approaches or the constantly shifting rules of engagement in our markets and industries is indeed the fuel for the pursuit of great achievement.


Under legal pressure, Facebook clarifies how it uses your data
Facebook is not issuing the clarifications purely for altruistic reasons. On Monday a U.S. judge approved a US$20 million fund for Facebook to settle a class-action lawsuit against the site's "sponsored stories" advertising program, which pairs some Facebook members' information with commercial content to deliver ads to people on the site. Plaintiffs had claimed that their names and likenesses, such as their profile photos, were being misappropriated to promote advertisers' products and services.


Online Project Management Services
With cloud and SaaS becoming mainstream, product vendors are seriously revisiting their product offerings and many are moving towards services as against products. Project Management is one such area, where many have started to offer software tools as a service. Here is a list of SaaS based project management tools with varying abilities and pricing.



Quote for the day:

"No person was ever honored for what he received. Honor has been the reward for what he gave." -- Calvin Coolidge