September 13, 2013

Model driven development – where to from here?
The modeling community has so far focused solely on building the right kind of business applications from their high level specifications – a subset of how. The harder problem of identifying what change needs to be introduced where and what would be the likely benefits of this adaptation is largely ignored. Models should help capture core properties such as ‘Every credit entry must have a debit entry’ in double book accounting. Then they can be analyzed for their properties.


Oracle finally adds whitelisting capabilities to Java
Oracle added a feature in Java that lets companies control what specific Java applets are allowed to run on their endpoint computers, which could help them better manage Java security risks. The new feature is called the "Deployment Rule Set" and was added in Java 7 Update 40 (Java 7u40) that was released Tuesday.


DDoS Attacks Occur on Average Every 2 Minutes, Security Firm Finds
According to NSFOCUS, TCP Flood and HTTP Flood remained the most popular attack methods, and accounted for 38.7 percent and 37.2 percent of attacks, respectively. Hybrid attacks also became more prevalent, with ICMP+TCP+UDP Flood serving as the most common combination. Increasingly, denial-of-service attacks are occurring from and within online gaming communities, according to a new report from DDoS-mitigation firm Prolexic.


Crafting Efficient Big Data Solutions
These next-generation servers come with high-performance, ARM-based CPU cores, a disk controller, and memory management, making them ideal for massively parallel applications in Big Data. Deployed in high-density chassis, SoC designs require far fewer components than current IT systems, provide integrated, high-speed fabric networks and greatly reduce space and power requirements. By using advanced SoC technology, Big Data systems can be deployed on microserver clusters with significantly high cost performance.


Google's Coder tool turns Raspberry Pi into a mini web server
According to Google, Coder offers a simple platform that teachers and others can use to demonstrate how to build for the web through browser-based projects written in HTML, CSS and Javascript. Using Coder obviously requires a Raspberry Pi device, although the tool itself can be downloaded from the web to a Mac or PC — a Mac OS X installer is included in the bundle, but PC users will need to download separate utilities. Users will also need a 4GB SD card to transfer the Coder SD image to the Raspberry Pi.


The Predictive Analytic Evolution of R
R, the open source programming language for statistics and graphics, has now become established in academic computing and holds significant potential for businesses struggling to fill the analytics skills gap. The software industry has picked up on this potential, and the majority of business intelligence and analytics players have added an R-oriented strategy to their portfolio. In this context, it is relevant to look at some of the problems that R addresses and some of the challenges to its adoption.


Is OpenStack IPv6-ready?
After all, when we evaluated the IPv6 readiness of proprietary cloud platforms, it quickly became clear that many, at best, needed a bit of work. And as an open source project, OpenStack allows us to fix and tweak components that are not IPv6-ready. OpenStack is gaining significant traction with service providers and large enterprises, which are both also experiencing increasing pressure to migrate to IPv6.


Google knows nearly every Wi-Fi password in the world
The list of Wi-Fi networks and passwords stored on a device is likely to extend far beyond a user's home, and include hotels, shops, libraries, friends' houses, offices and all manner of other places. Adding this information to the extensive maps of Wi-Fi access points built up over years by Google and others, and suddenly fandroids face a greater risk to their privacy if this data is scrutinised by outside agents.


IDC: 87% Of Connected Devices By 2017 Will Be Tablets And Smartphones
IDC is predicting the worldwide smart connected device market will accelerate past 2B units by the end of 2015, attaining a market value of $735.1B.  PCs will drop from 28.7% in 2013 to 13% in 2017. Tablets will increase from 11.8% in 2013 to 16.5% by 2017, and smartphones will increase from 59.5% to 70.5%. The following graphic shows the distribution of sales by platform.

Developer Evangelists Build Community, Engagement for Software Firms
Put simply, a developer evangelist, acts as a liaison between third-party, independent software developers and users and a company's software and product development teams. But there's a lot more to it than that, says Terry Ryan, whose official title is Educational Evangelist for Adobe. "We are the people responsible for bridging the gap between when a product is sold and when people actually have to use it," Ryan says.



Quote for the day:

"Low self-esteem is like driving through life with your hand-break on." -- Maxwell Maltz

September 12, 2013

CFOs Holding CIOs’ Feet to the Fire
The role of today’s IT department has to change from selecting technology providers to vetting the tech providers chosen by the business unit, said Thoran Rodrigues, the owner of BigData Corp. in Rio de Janeiro, which provides cloud-based big-data services. That would include making sure that the technology provider will provide benefits, low exit costs, reliability, interoperability, security and the long-term vision that it promised, he said.


CPUsage Makes It Easier To Harness The Cloud’s Compute Power
The idea behind the service is to allow anybody to take their existing applications and then allow them to run on virtually any cloud computing service available, whether that’s AWS, Microsoft’s Azure or one of their competitors. That’s still in the future, though. What the company is launching today is support for AWS, with support for Azure and Google’s Compute Engine coming by the end of the calendar year.


Securing data with Authentication as a Service in the cloud, mobile era
Authentication and identity management systems can be complex and costly, but AaaS brings the cost benefits of SaaS to authentication. Keeping up with advances in authentication, managing two-factor authentication and incorporating mobile devices can also be time-consuming. Shifting these burdens to a service provider is an appealing option.


Key Market Trends In Disaster Recovery
The growing instances of natural disasters, along with a rise in data loss, have increased the significance for having an effective disaster recovery (DR) strategy in place. IT industry trends are having a profound influence on enterprises’ current DR strategies. Organizations are being forced to reevaluate how they plan test, and execute their disaster strategies. This brief looks at some of the prominent trends currently taking place in disaster recovery.


Consulting on the Cusp of Disruption
Although McKinsey and other consulting firms have gone through many waves of change—from generalist to functional focus, from local to global structures, from tightly structured teams to spiderwebs of remote experts—the launch of McKinsey Solutions is dramatically different because it is not grounded in deploying human capital. Why would a firm whose primary value proposition is judgment-based and bespoke diagnoses invest in such a departure when its core business was thriving?


How will we integrate all these enterprise cloud apps?
Dhillon believes that people who aren’t programmers should to be able to integrate applications without learning Java or hiring a consulting company. Just drag-and-drop connections on a simple visual grid (say an order in Salesforce into an order object on the ERP system) and, voila, it all just works, and when your salespeople close an order in Salesforce it spits out the order in your financial system.


Cisco Unveils Mega Chip for New Network Demands
It’s a new product line called the nPower, and Cisco says the chips can pump as much as 400 gigabits of data per second. By contrast, the company’s prior technology could handle 140 gigabits and required more than one chip, Cisco says. The new capacity translates into hundreds of millions of transactions per second.


10 yrs later, DHS still plagued with cybersecurity, critical infrastructure problems
Today marks 12 years after the 9/11 terrorist attacks; it’s been a decade since 22 government agencies were combined into the Department of Homeland Security in response to those attacks. “DHS has spent more than $35 billion on homeland security grants, but cannot measure whether we are safer from terrorist attacks,” according to Republican Senator Tom Coburn.


14 Things You Need to Know About Data Storage Management
So how do you formulate that sound data storage management strategy? CIO.com asked dozens of storage and data management experts, which resulted in these top 14 suggestions regarding what steps you need to take to choose the right data storage solution(s) for your organization -- and how you can better ensure your data is properly protected and retrievable.


How to revamp your IT operational plan without getting fired
If you didn't run the generators, check the power distribution units, monitor the ambient temperature on the data center floor, perform change control, replace or rack and stack new equipment, put out fires, upgrade the storage frame, open the ports, plug the holes, and stop the distributed denial-of-service attacks, at some point nothing will work. The problem is that nobody cares that you do any of these things until one thing breaks.



Quote for the day:

"Thunder is good, thunder is impressive; but it is lightning that does the work" -- Mark Twain

September 11, 2013

Cloud financial accounting: Not just for SMBs anymore
Not every financial accounting solution does debits and credits. Beyond the general ledger, accounts payable, fixed asset and other transactional systems, there are some other important financial accounting solutions that assist in cash management, planning, budgeting and more. These other financial software products are also moving to the cloud.


NoFlo's crowd-funding effort helps coders go with the flow
Generally, flowcharts are design tools that don't make it beyond the mockup stage, but NoFlo is designed to be a crucial part of how people construct programs written in JavaScript. With NoFlo, JavaScript code modules can be wired together by dragging links from one to another. The idea is to separate the structure of the software -- especially large, complicated programs with lots of moving parts -- from the gory details of various components.


With iBeacon, Apple is going to dump on NFC and embrace the internet of things
iBeacon could be a NFC killer because of its range. NFC tags are pretty cheap compared to NFC chips, but NFC tags are required on each product because NFC works only in very close proximity. In theory, NFC range is up to 20cm (7.87 inches), but the actual optimal range is less than 4cm (1.57 inches). Also, mobile devices need to contain a NFC chip that can handle any NFC communications. On the other hand, iBeacons are a little expensive compared to NFC chips, but iBeacons range is up to 50 meters. Not all phones have NFC chips, but almost all have Bluetooth capability.


The end of enterprise-architecture?
The danger here is that if it does become someone’s role, someone’s job, there can be some unfortunate unintended-consequences. Of these, the most common traps are: the enterprise-architects interpret everything solely in terms of enterprise-architecture itself – and try to force everyone else to do likewise; and enterprise-architecture becomes regarded as solely the responsibility of the enterprise-architects – not as the necessary responsibility of everyone


IT Pros and BYOD Users See Support Much Differently
BYOD users sounded off about their issues with IT. Some were age-old refrains: "Improve IT's availability for technical issues, including faster response times." Others were specific to mobility: "Allow us to access apps which could be used for work so we aren't as dependent on our PCs." For the most part, though, users simply want better training and communication from IT as they find their way in the brave new world of mobile devices.


Smartphone Navigation Without Looking Down
To help reduce the dangers of distracted driving, GPS maker Garmin has come up with the Garmin Head-Up Display, or HUD. The dashboard accessory connects to your iPhone, Android or Windows Phone device via Bluetooth and projects directions from its Garmin StreetPilot or Navigon smartphone app onto your windshield. By displaying information in the driver's line of sight, Garmin argues it's safer than using just your smartphone for navigation.


New and emerging technology trends carry heavy compliance burden
But, as you're already surely aware, along with their potential to positively transform the enterprise, these emerging technology offerings also carry with them inherent security risks, presenting real anxieties to compliance officers everywhere. We searched our sister sites to uncover some recent stories that explain why some organizations are hesitant to embrace the big four, and share expert opinions on how to tackle the security and compliance risks these technologies pose.


Wireless charging from 30 feet away -- does startup have a game-changer?
The Cota wireless charging system includes a charge-transmitting unit and a charge receiver. The charging unit in the video was only shown briefly, but it appeared to be a pillar-shaped piece of equipment that's about 6 feet tall. The receiver can be either a dongle unit or technology integrated into a device, such as a smartphone or a battery. While it has yet to be miniaturized, Zeine said the wireless technology will eventually be small enough to fit onto the motherboard of a smartphone or even in a triple-A battery.


Big Data Governance - Protect And Serve Are Equals
The mission of data governance, and for chief data officeers, in a big data era has to be about catering to the speed, access and education of business stakeholders to make good decisions about what to trust if they look outside of IT to support their data driven initiatives. Just as IT has established policies to do things more efficiently and managing resource ratios across internal, off-shore, and outsourced venues, so will the business.



Quote for the day:

"For our own success to be real, it must contribute to the success of others." -- Eleanor Roosevelt

September 10, 2013

The SSD Endurance Experiment: 22TB update
We expect flash wear to decrease SSD performance over time, but these drives still have a lot of life left in them. Each SSD has SMART attributes that tally bad blocks, bytes written, and other variables. We're tracking those attributes, and the SSDs are so far free from bad blocks, which means all of their NAND remains intact. The data we've collected also provide some insight into SandForce's write compression mojo.


Berg’s CEO on the experience of connected devices & avoiding the creep factor
Long term it’s Amazon Web Services for connected devices. There are so many difficult things when you try making connected devices. Moving bits and bytes between the cloud and the device is just 10 percent of what you’re trying to do. The rest of it is common developer challenges. Everything from figuring out a password reminder button, to debugging tools and analytics, to fleet management, and all those sorts of things.


eHealthCareFramework - Framework for HealthCare Apps
This article we will see the various aspects , need for HealthCare Framework. The entire framework is implemented for helping the developers to easily implement applications by re-using or extending this framework. The framework purely depends on the third party API's. Most of them are CarePass API from Aetna. One has to register for the API and get keys in order to make of the framework.


Gartner Says Enterprise Architecture Is Key to Driving Digital Strategy
"Senior business executives are challenging CIOs and their IT organizations to be at the front of digital strategy, identifying innovative new business models and technologies, and getting more business value out of each technology investment," said Marcus Blosch, research vice president. "Enterprise architects can provide unique capabilities to help CIOs develop a new agenda for 'hunting and harvesting' in a digital world."  Mr. Blosch said that organizations are looking to grow and improve efficiency of their operations, creating new demands on CIOs and EA.


What's the Point of Creativity?
The best creativity comes from a much deeper place than the desire to win. It comes from a desire to contribute to the lives of others, either by introducing something new that improves the quality of their lives or by showing people that something thought to be impossible is in fact possible. When you change people's perceptions about what can be accomplished or achieved, you contribute to their humanity in the richest possible way.


Seagate wants to put hard drives into tablets
Seagate still thinks that there's more life to squeeze out of the aging hard drive technology, and is releasing a new Ultra Mobile HDD. The drive combines a super-slim (5mm) 500GB 6GB/s SATA hard disk drive with 16MB of on-board cache to deliver a peak data transfer rate of 600MB/s, but this drops to only 100MB/s for sustained transfers.


U.S. and U.K. spies crack BlackBerry BES encryption, report says
Der Spiegel said that to acquire BES data involves a sustained effort on the part of the NSA's Office of Tailored Access Operations, a specialized hacking team based in Forte Meade, Maryland. An NSA presentation entitled "Your target is using a BlackBerry? Now what?" seen by the magazine shows what can be achieved.


Negating network latency's effects without bending law of physics
Although we cannot bend the laws of physics, we can avoid some of latency's more deleterious effects on application performance, using CDNs, TCP optimization and peering agreements. At a technical level, data can readily move between networks, but at a business level, agreements between network service providers dictate what data moves between networks.


It’s Time to Put More Context in Your Conversations
Much of our workplace communication is transactional in nature, and lacks connectivity to the bigger picture. It lacks the critical context that our colleagues and team members need to understand how their work connects to the bigger picture of customers, markets and strategies, and this lack of context adversely impacts performance.


How even agile development couldn't keep this mega-project on track
"Hard-nosed contract managers within large suppliers will see this as a change to the requirements and will often want to charge for each iteration," said John Turner. "Here the supplier can stand to make a lot of money and as such agile can introduce contract complexities. Agile developments need careful cost, time, quality and outcome definitions within the contract so that the power of agile will be of benefit but also impose the discipline on the need to deliver to the targets."



Quote for the day:

"Empty pockets never held anyone back. Only empty heads and empty hearts can do that." -- Norman Vincent Peale

September 09, 2013

Trust no one, advises security expert after NSA revelations
The new revelations should raise major concerns from Internet users over who they can trust, Schneier added. "I assume that all big companies are now in cahoots with the NSA, cannot be trusted, are lying to us constantly," he said. "You cannot trust any company that makes any claims of the security of their products. Not one cloud provider, not one software provider, not one hardware manufacturer."


PostgresSQL: The Other big open-source database has a new release
Jonathan S. Katz, CTO of VenueBook, an event-planning company, said in a statement, "PostgreSQL 9.3 provides features that as an app developer I can use immediately: better JSON (JavaScript Object Notation) functionality, regular expression indexing, and easily federating databases with the PostgreSQL foreign data wrapper. I have no idea how I completed projects without 9.3."


David Linthicum Named One of TechTarget's Top 11 Cloud Computing Industry Movers and Shapers
"David earned his place on the list not just because he is such a visible presence across virtually any cloud computing website or conference, but due to the fact that he isn't just saying what vendors want to hear. He has earned his status as a thought leader by consistently challenging the status quo." The feature details how via his blogs, webinars, keynote addresses, podcasts and over 13 books, Linthicum advocates for change in the cloud market.


VMware NSX: Network virtualization doesn't need to be a turf war
"To me it just feels like the VMware NSX folks are saying the network is the biggest problem," said network engineer and blogger Tom Hollingsworth. "If you are going to blame the network for all the problems that we've been dealing with for years, give us a solution that works with the people who have been trying to fix this the whole time. Don't tell me that I'm the problem and that you'll just fix it and go around me."


Securing the Virtual World
The report showed that one-third of the group think virtualization and cloud computing make security “harder,” while one-third said it was “more or less the same,” and the remainder said it was “easier.” The results seem to indicate that many are either in the process of defining policy for virtual environments, or have chosen to postpone that effort until a later date. Perhaps, as a result of this failure to tackle the security question when deploying virtualized servers, there are experts who believe that the majority of virtual deployments may be less secure than physical deployments.


4 survival strategies for IT chaos
Today's youth are, of course, tomorrow's customers. "They demand immediacy, which is driving what IT has to deal with," says Kippelman, who is CIO at Covanta Energy and a Computerworld blogger. But the need for speed is just the tip of the iceberg. Across all industries, IT teams are up against unprecedented volatility, uncertainty, complexity and ambiguity, also known as VUCA.


The Wonder Years: Businesses Transform as Cloud Adoption Matures
Along with deeper benefits, early adopters are discovering deeper complexity in using cloud for day-to-day operations. After initial cloud transitions where integration is a top challenge, companies with more experience are seeing changes to IT policy become their primary concern. These changes could involve the way that technology is procured throughout the organization or the functions within the IT department as they interact with lines of business, both of which are steps towards a fully cloud-enabled business.


U.S. court takes on Internet traffic fight
The outcome will also determine whether Internet service providers can restrict some so-called crossing content, for instance, by blocking or slowing down access to particular sites or charging websites to deliver their content faster. Public interest groups have termed the FCC rules too weak, saying the agency was swayed by big industry players and needs to forge more direct and clearer power of oversight.


Myths about Enterprise Application Orchestration
It combines business processes that cut across functional areas as well as associated IT services. Orchestrating or designing an Enterprise Application is an art which can be compared with the composition of music: It requires the same amount of effort or integration to produce the desired results. The term orchestration in music refers to the way instruments are played to render any aspect of melody or harmony


Kanban - Isn’t It Just Common Sense?
Thus in response to the question in title of this post, the answer to whether kanban is common sense is “No!” However, common sense is an example of a heuristic, and I do believe kanban is a heuristical approach to solving the many challenges of product development. The remainder of this article will explore more about what heuristics are, the primary sources that led me to the realisation that heuristics are the right approach, and how we can use heuristics to design kanban systems.



Quote for the day:

"Let a man lose everything else in the world but his enthusiasm and he will come through again to success." -- H. W. Arnold

September 08, 2013

FAQ: What is the COBIT framework's approach to IT management?
The aim is to provide an overarching framework that incorporates different subsets of information management and control while promoting greater consistency among these areas. Unlike prescriptive requirements for a specific regulation, COBIT can be used for a wide range of enterprise needs, including information security, regulatory compliance, risk management and financial processing.


Criteria for Determining Which SaaS Platform to Choose
For every SaaS entrepreneur in B2B, choosing the right platform is one of the first and most important decisions you will have to make. It will affect everything. To understand why it’s such a difficult task, I will review the three integrations of SalesClic, with both their upsides and downsides.  So which platform would you have started with? With our application, we started with Google Apps, then integrated with Salesforce followed by Highrise.


The New Generation of Database Technology Includes Semantics and Search
If you have a RDBMS running that’s giving you what you need, then you shouldn’t replace it just for the sake of it. Of course, if you want to combine your relational data with unstructured data or more complex structured data, then it can make sense to ingest it into MarkLogic so that you can benefit from unified search and query across all relevant data. Think of it as a data warehouse, but where you get to search and query all data instead of just pre-computed aggregates along predefined dimensions.


Future Airborne Capability Environment: FACE™ 101
Check out this videlo presentation - The Future Airborne Capability Environment (FACE™) leads the development of open standards for avionics systems. FACE 101 introduces concepts, technical standards, business model and consortium structure.


5 Ways A Flat Management Structure Can Empower Your Business
In a traditionally structured company, the low-level guys—such as customer support staff—are the people who truly have the pulse of a company. They’re the ones who are dealing with customers and who know everything that’s great and everything that’s not-so-great about a company. But if their experiences on the front lines inspire an idea, it’s virtually impossible for it to make its way to the CEO’s desk.


NSA Code-Cracking Puts Google Under Fire
“This is a fundamental attack on how the Internet works,” Joseph Lorenzo Hall, senior staff technologist at the Washington-based policy group Center for Democracy & Technology, said in an interview. “Secure communications technologies are the backbone of e-commerce” including the transfer of medical records and financial exchanges. “People in business will either not engage in those activities, or find other ways,” Hall said.


Minimizing Oracle db file sequential Read Wait Events
Unless you trace a session with the event 10046 or have a continuously running wait event data collector, it is difficult to determine the SQL statement that is responsible for the cumulated wait time. Take the preceding SID #192 again, for example. The 243113 centiseconds wait time may be caused by one long-running or many fast SQL statements. The latter case may not be an issue. Furthermore, the SQL statement that is currently running may or may not be the one that is responsible for the waits.


Outsourcing and TOGAF 9.1 - What is the connection?
Enterprise Architecture (EA) is about developing a fundamental structure of your Business and IT components to respond to business drivers, realise business goals and establishing principles which will guide their evolution into the future. This includes core and non core components of IT and Business. When you outsource some of these components, whether they are parts of Business or IT, you need to ensure that the service provider delivers to the Enterprise Architecture of your company.


Dissecting Design
In the past few years, we’ve recognized the danger in jumping headfirst into full-comp design before we really understand the design direction. Other disciplines have recognized this for a long time—think mood boards in branding—and taken steps to ramp up their design effort. The goal here is to establish the basic building blocks we’ll use in the rest of the design process: things like color, type, texture, illustration style, photography treatment, iconography. Once these are established, the success rate for the rest of the process is greatly increased. There are a number of ways to do this on the web; let’s look at a few.


Building a Cohesive Design Team
In many organizations, skill building is a secondary activity, done only when project work is in a lull. However, amongst the most successful teams, it was a primary activity that was scheduled with the project work. One manager told us, When the [team members] come back from training jazzed to apply a new technique, that’s when we see real benefits. In order to bypass roles, the most successful teams would use techniques for facilitating discussions that equalized the power in the room.



Quote for the day:

"Storytelling is the most powerful way to put ideas into the world today." -- Robert McKee

September 07, 2013

Despite Sales Surge, Enterprises Still Not Excited by 10Gbit/sec Ethernet
10Gbit/sec Ethernet is an upgrade, but not really the next generation of datacenter switching, the honor for which will go to 40Gbit/sec and 100Gbit/sec switches whose sales are growing at more than 100 percent per year and will make up the majority of Ethernet switching revenues by 2017, Crehan predicted. ... Price cuts did help increase sales, but most of the growth seemed to stem from systems makers and datacenter-service providers whose inventory of 10Gbit/sec Ethernet gear had run low, Boujelbene said in the report.


6 Time Management Mistakes You're Probably Making
Tim Ferriss, author of The 4-Hour Workweek, calls it "time famine." Your doctor calls it "dangerous levels of stress." The '80s band Rush called it "too many hands on my time." Whatever label you put on the entrepreneurial trait of having more tasks than time, it's a factor of almost every successful business life. But it doesn't have to be. Check your own daily schedule to see if you're falling into one of these six time management traps.


Intel Targets Cloud Data Centers with New Atom C2000 Chips
Within the Atom Series-C processor family the configurations are highly optimized for the target workload – ranging from 2 cores and 6 watts for entry level web hosting, 4 cores and 9 or 14 watts for cold storage, and 8 cores and 12 or 20 watts for front end web tier (scale-out workloads). With the Silvermont modular design, the AtomC2000 can have 2 to 8 Silvermont cores, with shared 1MB L2 per module, or 4MB.


The Top 10 Skills for a New Business Analyst to Shore Up On
Be sure to get your manager’s feedback wherever possible and select skills that are relevant to your immediate success. ... In that case, meeting facilitation could be on the back-burner while you work on your analysis skills and learning relevant software. You won’t know what skills are most important until you ask, but now you have a starting point for having a productive conversation with your manager.


The Personas that Matter Most in Business Analytics
Understanding this context-driven user experience is the first step toward defining the personas found in today’s range of analytics users. The key is to make the personas simple to understand but comprehensive enough to cover the diversity of needs for business analytic types within the organization. To help organizations be more effective in their analytic process and engagement of their resources and time, we recommend the following five analytical personas: (Note that in my years of segmentation work,


4 Million Patient Records Stolen in Second Largest HIPAA Data Breach
A senior vice president from Advocate acknowledged that the sensitive data shouldn’t have been stored on the computers’ hard drives, but instead maintained on their secure network. One of the steps they’re taking toward remediation includes mapping its computer and software systems in order to identify where patient data is stored, and how to secure it. This is also one of the first steps that should be taken toward data encryption – classifying sensitive data and then selecting a proper encryption method is next.


In light of the NSA, how to think about encryption
But rest assured, governments crack encryption. If there happens to be some kind of encryption they can't crack, they don't just write it off. They redouble their efforts to find a way to get inside those communication streams. It is what they do. National security (and often national sovereignty) depends on it.


The Art of Reviewing Code
Arjan van Leeuwen a developer at travel software giant Amadeus, where he mainly works with C++, overviews code reviews advantages and disadvantages, how much can be done in a code review, types of critiques, how to handle critiques and conflicts that might arise from them. ... Reliability and speed are things that matter every day, but code quality is the subject that can really rile him up.


Ten Ways to Kill An Enterprise Architecture Practice
Have you seen practices that you know could kill an Enterprise Architecture practice? Nick Malik has seen it happening. A recent LinkedIn thread asked for examples, and he came up with his top ten which are listed here. He is seeking addition to the list by his blog readers.


What is Software Quality?
It is important to make this distinction because so much time and energy is spent by people arguing over what is and what is not a “defect”. If we define separate terms then we can at least reason about this situation and the fact that individual, teams and organizations often have incentives for classifying something as a defect whether it is or is not. Jon Jagger pointed out in his comment on the previous blog that “Jerry Weinberg's definition of quality is "value to someone" or "value to some persons”.



Quote for the day:

"You cannot build character & courage by taking away a man's initiative & independence." -- Abraham Lincoln

September 06, 2013

Successfully Integrating Project-Impacting Processes
If project-impacting processes are not aligned, project risk may increase because a project team may not be aware of applicable policies, standards, or best practices; or due to the effort involved in complying with all of them. To minimize this risk, PMOs can expand their scope to include alignment of these requirements/policies/mandates.


How PayPal Can Succeed Where Google Wallet Failed
Nothing will dampen consumer curiosity and enthusiasm faster than failed attempts to use loudly touted cool new features and services. PayPal is facing the proverbial chicken and egg situation of mobile payments. PayPal says it has been very focused on demonstrating and delivering value to merchants, but only time will tell if it receives the required return on its investment to soon claim “success” with in-person mobile payments.


Culture Eats Strategy for Lunch: How True Is It?
Culture eats strategy for lunch, culture as the most invisible but powerful corporate fabric, is both 'hard' competency and 'soft’ asset of business. Effective execution of a strategy relies on a strong culture. When does a weak culture ‘eats’ strategy and undermine success? How shall you be mindful of culture? What are the strong culture traits, and how can culture, like water, to push the organization toward the right direction and reach the destination?


Integration on the Edge: Data Explosion & Next-Gen Integration
Instead of spending your organization's hard-earned money on the three iPaaS Research Reports, take one of the two following options instead: Spend a little more money and invest in an hour of Pezzini's time and have him explain it all to you; or Buy & read the research reports and THEN cough up a bit more cash to get an hour of Pezzini's time so that he can explain it all to you.


IBM Database Conversion Workbench, Part 1: Overview
DCW provides the following benefits: Common graphical interface with uniform look and feel for all phases of the conversion; A consolidated process with well-defined steps based on best practices; Faster enablement for client and partner teams in conversion methodology; and Wizards that guide you through all steps of the conversion


Small businesses' BYOD practices leave them one cyber attack away from bankruptcy
"The main thing criminals are trying to do is get banking Trojans into the system so they can get login details for online banking. You don't see with SMBs any kind of espionage, they're too small it's all financially based. It's usually the stuff you can buy and customise, things like Zeus and SpyEye, all those families of malware," said Ben-Itzhak.


CIOs Say Mobilizing Enterprise Apps Is Not That Easy
Surprisingly, 53 percent of enterprise apps are Web-based, so you'd think they'd be easy to mobilize. So what's putting the brakes on the mobile movement? The biggest barrier is mobile development costs, say 65 percent of CIOs. The cost of re-engineering enterprise apps as mobile apps is high because of the ballooning platform fragmentation of the market, particularly the many flavors of the Android operating system.


Google fights to kill email-scanning lawsuit brought by Gmail users
"This case involves plaintiffs' effort to criminalize ordinary business practices that have been part of Google's free Gmail service since it was introduced nearly a decade ago," Google lawyers said in a motion filed with the court. "While Plaintiffs go to great lengths to portray Google in a sinister light, the complaint actually confirms that the automated processes at issue are Google's ordinary business practices implemented as part of providing the free Gmail service to the public. This is fatal to Plaintiffs' claims."


Enabling the Third Platform
In some ways, the move toward the third platform has been foreshadowed by another trend that has been building for years – the bring your own device phenomenon. This trend of employees working on their own, unsecure devices is occurring because they want mobility that their organizations may not provide. In the third platform era, it’s a foregone conclusion that many of the mobile devices involved will be employee-owned and outside the control of IT administrators.


For cloud providers, fraud detection is integral part of business plan
"While cloud has been a phenomenal enabler for legitimate businesses, it's also been a phenomenal -- and I mean phenomenal -- enabler for fraud and fraudulent activity," said John Rowell, senior vice president of research and development as well as global service operations at Dimension Data, a South African cloud and managed services provider. "Fraud is a huge deal on the business side."



Quote for the day:

"3 Rules of Work: Out of clutter find simplicity; From discord find harmony; In the middle of difficulty lies opportunity." -- Albert Einstein

September 05, 2013

Active/Active WAN-based Replication in GemFire vs Oracle and MySQL
The type of replication it uses is parallel replication. Parallel replication spreads the work across servers and eliminates contention, or communication bottlenecks between data stores. Data partitioning breaks the data and work apart across many servers, building in horizontal scalability. Each partition has a replication queue that has one or more redundant backups in case of failure and streams data to a disk store for recovery.


WAN optimizer technologies to counteract data center network hogs
It's hard to maintain fast and reliable wide area network (WAN) connectivity in the face of increasing data center workloads, user bases and real-time traffic. This acute demand for WAN services, combined with more geographic separation between physical data centers and/or service providers, creates bandwidth and latency problems. To address WAN bottlenecks, you can add costly WAN connectivity to the data center, curb network services to end users or deploy WAN optimizer technologies.


No Extract, Transform and Load? Really?
By eliminating ETL with a drag and drop tools without knowing the adverse impacts to enterprise data enablement can land the average project sponsors in to serious trouble. In order to take the best advantage of the data acqusition tools that claim to eliminate or reduce ETL, make sure that the business situation where this can be experimented on. The following are some such business scenarios,


The Five Definitions of ROI
Return on Investment. That's what the term ROI has signified all along. But based on my recent posts, this term has taken on other dimensions, because enterprises look for returns from various dimensions of investment, whether it’s information, infrastructure, innovation, or individuals. The fact that all these terms start with the letter “I” is merely coincidental. It behooves enterprises to take the right steps to realize the returns from the perspective of all these dimensions. Let’s see how:


Fluid Motion aims to make gesture recognition tech more accessible
According to Abhinav, their presentation application was recently used at the India Design Forum by the Indian School of Design and Innovation to showcase the upcoming design school and latest courses in a really immersive and interactive way. It also garnered attention at the Rolls Royce exhibition where customers could interactively design their own Rolls Royce by simple hand gestures.


A Tiny, Boring Kodak Takes Consumers out of the Picture
Boring, however, may prove to be beautiful for a company that teetered on the brink of the abyss. If all goes according to Kodak’s reorganization plan, the company will post $2.5 billion in revenue this year and $167 million in earnings before interest, taxes, and such noncash expenses as depreciation and amortization. It will also have only 8,500 workers, down from almost 64,000 a decade ago.


Championing Telecoms Innovation in the Middle East
Sleep deprivation aside, heading a telecommunications company at this point in history is not a position everyone would aspire to. The stress of second guessing what’s coming and the demand for ever more broadband from limited resources is intense. Meanwhile, industry leaders are making major capital investments in next-generation services over IP networks and want to monetise their investments with new products and services as rapidly as possible.


DataStax Building NoSQL, Big Data Partner Program
NoSQL adoption has accelerated in recent years as customers pursue new ways to manage Big Data applications. Forrester Research predicts the NoSQL market will grow from $200 million in 2013 to $1 billion in 2017. ... In the meantime, the foundation for a partner program is already in place for the open source company. Schweitzer says the intial channel effort includes about 80 partners across six market segments:


'Hash Hunters' Web service cracks password hashes for bitcoins
Hash Hunters is a bit rough around the edges, Gosney wrote. It doesn't use "https," which is a standard security technology that encrypts communication between a client and a server. Gosney, who created an account on Hash Hunters, said it doesn't seem to have a reliable way for contract password crackers to communicate with their clients, the site crashes occasionally and it doesn't appear that cracked passwords can be uploaded.


How cloud computing changes (almost) everything about the skills you need
"Traditional sysadmin skills will inevitably be in less demand in future, certainly in the SME space. Managing the relationship between the business and its suppliers will become ever more critical," he says.
Kevin Leypoldt, IS director at Structural Integrity Associates, is of similar mind: "I am now refocusing on customer service and desktop/helpdesk support as we move the hosting/infrastructure to the cloud. Because we have that skillset already, it's now becoming a larger focus."



Quote for the day:

"The only way to do great work is to love the work you do." -- Steve Jobs

September 04, 2013

How to Assess Security Risks in a Scientific Fashion
This advanced understanding from the medical field can be applied towards handling risks that information infrastructures face. Considering information assets to be patients, incidents including hacking and malicious programmes to be diseases, technical counter measures and controls to be medicines and different processes, policies and practices to be treatment protocols, we can draw a fair parallel between medical risk management and information security risk management practices.


How to decide when to pass on PaaS
In the current world of PaaS, you are required to commit to a combination of platform components in a similar way. The difference is that there are arguably a lot more moving parts. Back in the 80s, your platform often ran in a single box, such as a VAX or some Unix-based mini-computer. Platforms in today’s world of distributed computing usually involve a whole landscape of servers and services.


10 Wearable Devices To Keep Patients Healthy
Thanks in part to trends such as wearable devices, the overall mobile health market is growing substantially. Research and analysis firm GlobalData expects the market to grow in value from an estimated $0.5 billion in 2010 to over $8 billion by 2018, significantly revolutionizing healthcare delivery and management. Take a look at the range of devices in use now, from hospital settings to homes.


How Much CSS Should You Have?
According to the HTTP Archive, the average website has 35KB of CSS, and CSS transfer size has the highest correlation to render time. If you look at the graph directly above the one for render time at that link, you will also notice that total transfer size has the highest correlation to page load time. This makes the case for reducing the overall weight of your CSS pretty strong. Based on this data and what I've seen in my own work, you shouldshoot for less than 30KB of CSS on each page of your site (after gzip).


Creating a Performance Culture
Creating a culture of performance at your company is about creating a culture of quality. This is especially true because best (and worst) practices propagate quickly at web companies. Code written for product A is reused by product B. And folks who worked on team A transfer over to team C. If product A is built in a high performance way, those best practices are carried forward by the code and team members.


HR Departments Invaded By Data Scientists
IT must be at the center of the unfolding data-driven transformation. Not everyone has an HR data scientist like GM. Arena emphasizes the importance of his partnership with Bill Houghton, GM's CIO for global corporate functions. "A big piece is integration--ensuring the right systems are connected so we know where to draw the data from," says Arena. "IT has to play a role in that."


Cloud Leaders: Cloud, CXO and Data Conversation with Dana Gardner
C-level domains need to break down a little so there’s more cooperation between organizations, allowing them to propel efficiency instead of slowing it down. A top-down hierarchical vertical approach can be a detriment to agile business. ERP and business apps have traditionally acted as the glue for how business processes can be applied across the organization, and processes can be made efficient around manufacturing logistics/procurement/R&D.


9 Fallacies of Java Performance
Java performance has the reputation of being something of a Dark Art. Partly this is due to the sophistication of the platform, which makes it hard to reason about in many cases. However, there has historically also been a trend for Java performance techniques to consist of a body of folk wisdom rather than applied statistics and empirical reasoning. In this article, I hope to address some of the most egregious of these technical fairy tales.


EMC optimizes VNX hybrid array for flash
The performance gains from this and other improvements of the line are dramatic, according to EMC. With a similar configuration, a VNX from the current generation would top out at 240,000 IOPS (I/O operations per second) and the new version would reach 1.1 million IOPS, Herzog said. The VNX's bandwidth has tripled and its maximum capacity has doubled from 3PB to 6PB.


Network configuration tools: It's not your father's backup solution
With businesses throwing everything they can think of onto networks today, investing in a full-featured configuration and performance management tool pays immediate dividends. When problems occur, especially trouble that's more challenging to diagnose than a down interface, tools that combine configuration and performance contexts can take the headache out of troubleshooting.



Quote for the day:

"Liberty means responsibility. That is why most men dread it." -- George Bernard Shaw