September 18, 2013

Data Scientists Talk Privacy Worries
Data scientists working in the healthcare and life science fields showed the greatest support (92%) for a code of ethics. "Out of all the industries, life science and healthcare is the one, I think, that is most advanced in setting up frameworks for using data in an ethical way," Smith said. Overall, the survey results didn't surprise Smith. "It's really a confirmation of what we would have expected to see," he noted. "These are people who have their hands working with data in and out every day. They understand the power of data and the importance of it being used in an appropriate fashion."


China-based hacking group behind hundreds of attacks on U.S. companies
Haley said members of Hidden Lynx appear loosely organized into two teams: an A-team, comprising a relatively small number of elite hackers with access to sophisticated tools like Trojan Naid; and a B-team, which appears comprised mainly of foot soldiers responsible for carrying out large attacks using Backdoor Moudoor and similar tools. The elite hackers are usually deployed for special operations involving a high-degree of skill and secrecy, Haley noted.


How digitisation is shaking up IT outsourcing
Ridder said IT departments should be proactive and approach the business departments to help them buy the IT they need in the correct way rather than just block it. He said a lack of involvement from IT sourcing experts could present major risks to the business. For example, although buying software as a service (SaaS) might appear less expensive, it might cost more because it could mean falling short of the number of licences needed to trigger a discount for another application.


Challenges & solutions - Architecture of a Modern Web Application - Part 1
On the other hand, end users use web applications on myrid of devices, ranging from desktops, laptops, tablets, HDTV, printers, phone display and smart phones. All these devices come in variety of screen sizes, native frameworks and browser compatibilities for CSS3, JavaScript & Html5. This leaves web application development teams in making variety of decisions regarding application compatibility, performance, usability and maintainability. Let's discuss device and server side code bases separately.


Look at Risk Before Leaping Into BYOD, Report Cautions
"If you're going to put any technology on any device that you don't control, and you don't think you're not going to create some liability for your company, you're wrong," Gula said. Any BYOD management program, however -- even one weak on risk management -- may be better than no program at all. "There isn't an option for companies not to have a mobile strategy," said Caleb Barlow, an application, data and mobile security director for IBM.


IT driving UK economy as skills gap widens
Rachel Pinto, research manager at UKCES, said: “The digital sector contributes nearly £69 billion to the economy. It is also one of the most productive sectors with a growth rate since the recession three times above the average. “But the impact of IT specialists goes much further than this - of the total 1.1 million IT specialists in the UK, just under half are employed in the digital sector, with the rest most likely to be employed in finance and professional services, manufacturing or the public sector."

Banking CISOs Evolve Risk Control Mechanisms to Secure Cloud
While risks are obvious, Dr K Harsha, Head-IT, HKM Technologies, finds that the risk of financial data being hacked is huge for banks to go in for the cloud, where it is easy to hack banking and financial cloud base applications. The key aspects for CISOs of the banking and financial segment to adhere to in a cloud model are: to customise the application as per cloud capabilities, have strong applications even though end point vulnerabilities exist, ensure frequent reference of logs, and notification alerts for configurations.


Case study: 3 heavyweights give gamification a go
But now companies are gamifying internal applications to engage employees. Burke expects internal efforts to overtake consumer-engagement uses in the next year or so. By 2015, 40% of global 1000 organizations will use gamification as the primary mechanism to transform business operations, Gartner predicts. "We see gamification being leveraged for change management," says Burke. "We see that as a big opportunity."


Canvas Inspection using Chrome DevTools
Sometimes you want to capture the instructions sent to a canvas context and step through them one by one. Fortunately there is a new Canvas Inspection feature in Chrome’s DevTools that lets us do just that! In this article Paul Lewis shows you how to use this feature to start debugging your canvas work. The inspector supports both 2D and WebGL contexts, so no matter which one you're using, you should be able to get useful debugging information straight away.


The insight driven organisation
Why do business leaders struggle so much with incorporating qualitative judgement into their innovation decisions? Our research uncovered two main causes. First is what can be called Schumpeter’s bias. We all pay lip service to Schumpeter’s vision of the lone and creative entrepreneur. This image is so entrenched that people unconsciously tend to believe that the magic of an insight is not replicable. Many business leaders believe that we depend on “individual” genetic talent. But scientific evidence of the last 30 years proves just the opposite.



Quote for the day:

"The quality of a man's life is in direct proportion to his commitment to excellence, regardless of chosen field of endeavor." -- V. Lombardi

September 17, 2013

The Human Body is the New Password
A few weeks ago Motorola demonstrated a so called password pill. A vitamin pill that contains a computer chip which transmits an encrypted signal to identify the individual. Google recently filed a patent to recognize faces in a unique way. Normal facial recognition software can easily be fooled by keeping a picture in front of the camera. Google has therefore found a way that the static portraits can be broken, simply by winking, “at least one of a blink gesture, a wink gesture, an ocular movement, a smile gesture, a frown gesture, a tongue protrusion gesture, an open mouth gesture, an eyebrow movement, a forehead wrinkle gesture, and a nose wrinkle gesture.”


The future bank will be the one with biggest (inter)network
Banks are very poor at collaboration – apart from creating their cooperative SWIFT – and many areas of banking today will not exist in the future without collaboration. We need to make collaboration work to survive. If you look at how the world works today, everything has ‘crowd’ in it somewhere with crowdsourcing and crowdfunding being two that really apply to the banking world. This is why we will need far more collaboration in the future as you cannot work or stand alone in a globally connected world.


With No Camera Required Armband Converts Gestures Into Controls
The Tom Cruise action-thriller Minority Report, made in 2002 and set in 2054, envisioned a world where people spoke to computers and controlled them with a swipe of the wrist. We only had to wait ten years for the science fiction imaginings to become a reality, with gesture recognition, and more recently wearable tech, blurring the lines between digital interfaces and human commands to making communicating with machines easier than ever before.


Disrupting the Consultants: Clayton Christensen and Friends Sound the Alarm
Now, more than ever before, companies want to connect to the originator, the source of an idea - instead of going with organizational middlemen. Thought-leadership translates to market leadership. Some of the big firms are hiring these gurus to harness their I.P. but the list of independent, disruptive gurus is growing fast.


Get an Inside Look at Microsoft Datacenters and Hardware
Have you ever wondered what a datacenter looks like? Maybe you saw a datacenter 5 years ago. I can tell you first hand a lot has changed in datacenter construction and implementation in the last 5 years. There are a couple of great videos on YouTube that show off a few of the things that Microsoft is doing with cloud computing hardware and datacenters.


Cybersecurity business booming in Silicon Valley
"It's a multibillion-dollar business in and of itself," said John Grady, a security specialist with the International Data Corporation, of the criminal enterprises. "So the industry, to keep up on the defensive side, has just skyrocketed." Although HP doesn't reveal how much money it gets from its cybersecurity products, which are designed to discourage attacks and minimize losses when breaches occur, the amount is a tiny portion of its revenue.


Hybrid Databases Gaining Favor for Enterprise Big Data Analytics
“Traditional databases do not go away,” said Sastry Malldi, the chief architect for StubHub. ... The more unstructured data coming into the company, the more structured you have to become in dealing with all those sources. StubHub uses a four-layer data approach overseen by a data management umbrella. The data and data management reside in eBay’s private infrastructure cloud. ... The hybrid database will be the goal of the enterprise data architect for years to come.


Postgres Gets Even More Reliability, High Availability, Several Developer-Friendly Features
PostgreSQL 9.3 comes with Fast Fail-over and streaming-only Remastering as well as many developer-focussed features such as materialized views, auto-updateable views, many features for JSON data-type and more. ... Features include: Optional ability to Checksum data pages and report corruption; Fast Failover option for Standby servers: enables sub-second switch from master to replica; and Streaming-Only Remastering: easier, faster reconfiguration of cascading replicas after failover


Valve CEO: Why Linux is the future of gaming
"Linux is the future of gaming for gamers on the client as well, because, besides Microsoft moving to a more locked-in style of computing, "Open systems were advancing much faster. The old console guys are not competitive, and there's huge tension in proprietary systems." For example, Newell said, "It took us six months to get one update through the Apple store. Closed systems are at odds with the evolution of gaming." So, Valve has been bringing its Steam games to Linux. There are now 198 Steam games running on Linux. The issues of bringing the games to Linux have been solved.


Innovation under the covers
There are a number of reasons for what I call "innovation under the covers". First, every firm wants to be viewed as an innovator, so it pays to talk about innovation externally, regardless of what you are actually doing internally. Second, innovation is risky, so rather than make a big, public bet that may fail, executives are often willing to allow innovation to happen, but in a quiet, discrete way in case it doesn't pan out.



Quote for the day:

"The leadership instinct you are born with is the backbone. You develop the funny bone and the wishbone that go with it." -- Elaine Agather

September 16, 2013

The Future of The Database
If you listen to the media you would believe that the end of relational database is here. The truth is in spite of the big data hype, the future of relational database has never looked better. That said the pace of database technology innovation is at an unprecedented rate. To help you cut through the hype and modernize your approaches, our database experts have developed the Clustrix 2013 predictions for the future of the database. View this infographic to be prepared to address the database challenges ahead.


Google, the Network Company: From Theory to Practice
Google puts into practice the idea that a network is a living animal composed of smaller, malleable groups. The average team size ranges from five to ten depending on the topic that serves perfectly Google’s motto: “We prefer to be fast than to be right”. Indeed, the malleability and small team size allows Google to focus on execution, one of its core strengths. As a result, there are more than 10,000 daily conferences on Google+ to facilitate working together on team projects.


The Do’s and Don’ts of OpenStack
Before a business even considers adopting OpenStack, the project management needs to have a full view of its IT landscape –a detailed matrix that classifies all of the organisation’s workloads needs to exist. This matrix should consider basics like Cloud Security (Data and Privacy Rules and Regulations), Locality Rules (Where is the consumer and where can this data be placed by regulation), Interconnections and Dependencies to other Applications and Application-Specifics like Scaling and High-Availability Architectures (Can an application be horizontally scaled, does it work highly available with stateless nodes on all tiers?).


Behind Microsoft Deal, the Specter of a Nokia Android Phone
Still, a functioning Nokia Android phone could have served as a powerful prop in Nokia’s dealings with Microsoft, a tangible reminder that Nokia could move away from Microsoft’s Windows Phone software and use the Android operating system, which powers more than three out of every four smartphones sold globally. Susan Sheehan, a spokeswoman for Nokia, declined to comment, as did Frank Shaw, a Microsoft spokesman.


SSDs do die, as Linus Torvalds just discovered
"The timing absolutely sucks, but it looks like the SSD in my main workstation just died on me," Torvalds wrote. "I had pushed out most of my pulls today, so realistically I didn't lose a lot of work." While SSDs are vastly better performers than hard disk drives and are considered more reliable for mobile devices because they have no mechanical parts to break, they do have a limited lifespan. With some early SSDs, that lifespan ended up being less than a year, depending on the quality and use of the drive.


Google quietly dumps Oracle MySQL for MariaDB
Specifically, Google is moving to its own customized version of MariaDB 10.0. This version of MariaDB is equivalent to MySQL 5.6. Google's version of MariaDB, according to Cole, is "Not really true 'forks' [but are] branches for internal use." He added that Google had been making its own tweaks to the MySQL DBMS family for years. Reading Cole's presentation it appears that there are several reasons why Google is shifting to MariaDB


Big Switch shifts SDN strategy to bare-metal switches and software
Big Switch's next move will focus on what it has dubbed "cloud fabrics" or "P+V" (physical plus virtual). The company will try to sell software built on top of bare-metal switches to companies that are looking to build out new capacity in existing data centers for private cloud. This strategy contrasts with layering a virtual overlay on top of the legacy network or ripping out legacy switching for new OpenFlow switches.


Implementing Software Lifecycle Integration (Part Two)
If software is a key business process, it needs to be treated that way – with a clear focus, ownership and design. The practice of creating this process is emerging as a new discipline in ALM, one not focused on delivering the software, but instead on the process for manufacturing and maintenance of that software. This is in part similar to the evolution from craft approaches to more systematic engineering practices of the industrial revolution


The Importance of Smartphone Security
Cyber criminals are increasingly targeting smartphone devices using a variety of tactics for malicious intent. These tactics include the repackaging of popular applications with malicious code for download in app stores or marketplaces, malicious URLs designed to deceive users into downloading apps or provide personal information, or leveraging erroneous SMS messages or “smishing” as a means to drive up a smartphone subscriber’s bill.



Quote for the day:

"Unless you try to do something beyond what you have already mastered, you will never grow." -- Ralph Waldo Emerson

September 15, 2013

Steps Toward a Hybrid Development Philosophy
It’s a completely different way of doing things. People think they know what they want. But, as we have proven over decades of application development, they don’t know what they want. They really know what they want when they see it. The concept of Agile is ‘let’s discover what you desire rather than what you’ve planned.’ That’s a very different way of thinking, and it’s a change for IT associates.


Cryptographers Have an Ethics Problem
And that may be why cryptographers see blurred ethical lines. Code-making and code-breaking have always been tied up with war and diplomacy. For instance, Alan Turing, the brilliant mathematician for whom the ACM’s top annual prize is named, was involved in helping to crack the Nazi enigma cipher during World War II, which allowed the Allies to read German communications.


Anomaly Detection Lets You Find Patterns in Log Data
Anomaly Detection combines machine learning, statistical analysis and human knowledge from your domain experts to analyze streams of machine data, detect events in the stream and provide alerts on those events, allowing you to remediate issues before they affect business services. "Basically, we reduce log lines into a set of patterns," Sarathy says.


The Nike+ gamification platform delivers valuable big data insights
Nike did a remarkable step, they decided to share that data with the rest of the industry so that the entire industry can start to populate the database as well as use it to make better decision. The objective is to build a “vendor index”, containing details concerning every vendor including ratings and how trustworthy the vendor is. The key is to turn big data into smart data at the point where the persons in the supply chain that needs to use it, actually can use the data.


4 Hiring Mistakes Most Entrepreneurs Make
You can teach skills, but you cannot teach passion, a good work ethic and respect for the collaborative process. When you add a lone ranger to an efficient and collaborative group, you can undermine the entire team and the evolution of your company. When interviewing, ask about the candidate's most and least favorite projects. Compare the passion with which they describe each, the effort they brought to each project and the results they achieved.


Cloud industry needs to standardize, says fed CIO
"We recognize different solutions are needed for different problems," said Baitman. "Ultimately we would love to have a competitive environment that brings best value to the taxpayer and keeps vendors innovating." To accomplish this, the agency plans to adopt a cloud broker model, an intermediary process that can help government entities identify the best cloud approach for a particular workload.


The differences in internal controls at each level of architecture
Enterprise architecture is most often associated with transformation. We may ignore operational management for the moment, and focus on transformational management. If operational management ever changes (transforms) and requires a new architecture, it becomes transformational management of some type.


WAN Acceleration Slows Down
These days, IT funding models aim to incur costs on a monthly or quarterly basis to match ROI; a technology deployment such as WAN optimization that requires a year or more to show ROI is likely a non-starter. Some analysts and engineers believe WAN acceleration has a future in hybrid cloud applications, which could perhaps justify capital and operational expenses. But I think dynamic bursting between private and public clouds is an edge case at best, not a mass-market play. Hybrid cloud rarely survives a close technical inspection.


Red Hat Storage Server 2.1 improves geo-replication performance
In addition to GlusterFS, Red Hat Storage Server includes the Red Hat Enterprise Linux (RHEL) operating system, the single-node XFS file system for each Linux box and a console management station based on the oVirt open source virtualization platform. Red Hat Storage supports file, object and virtual block, but not iSCSI block-based storage.


Include JavaScript exceptions in your server side logs with JSNLog
JSNLog is a logging package, similar to Log4Net, NLog, Elmah, etc. However, instead of server side events (in your C# or VB code), it logs events that happen in your JavaScript. ... JSNLog assumes you already have installed server side logging. It simply passes its log messages on to your server side logging package, so client side log message will go to the same logs as your server side log messages. It will interface with Log4Net, NLog, Elmah and Common.Logging.



Quote for the day:

"If you listen to your fears, you will die never knowing what a great person you might have been" -- Robert H. Schuller

September 14, 2013

Business Architecture 101 – It’s results that count!
Some see Business Architecture as a variation of Enterprise Architecture, but for others it is a different discipline. At OpenText we see it as different; whether we like it or not traditional Enterprise Architecture is seen as the domain of the IT folks. On the other hand, Business Architecture is, as the name implies, focused on helping business people manage business problems. It is this accessibility and relevance to business teams that we believe is leading the interest.


The Age of Data
A significant reversal happened as we moved from the Age of Hardware through the Age of Software to The Age of Data. Initially the buyers of computer capability, both hardware and software, were large organizations. This began to reverse with the emergence of the PC, with consumers gradually becoming the driving force in the market. The dynamics were that products were sold to consumers earlier or at the same time that they were sold to companies.


NetIQ Declared a Leader in Identity and Access Management Suites
In the report, Forrester Research singled out NetIQ as having consistently built a strong stack of identity and access management products. Forrester Research also named NetIQ as one of the leaders that provide an "IAM suite that encompasses identity provisioning (Identity Manager), attestation (Access Governance Suite), web SSO and federation (Access Manager)" with "easy-to-use interfaces, a differentiated vision and thought leadership for IAM, and strong execution."


Insider Threat: Limit Privileged Access
Controlling who has access to these accounts and tracking and monitoring exactly how they are being used is a critical part of preventing data leaks and network breaches. Organizations need to perform a comprehensive audit of their infrastructure to identify privileged accounts that are high-risk and need to be managed. They then must apply different levels of controls, based on the risk. And a group outside of IT needs to monitor and audit all of these privileged accounts to ensure the controls are correctly enforced.


Cybersecurity: Locks are fine, alarms better
Instead of investing loads of money building better locks for protection, Caudill encouraged agencies to develop better alarms that use available data to determine when outsiders have gotten in. "Big data analytics' capabilities have constantly improved and gotten more effective," said Caudill, speaking at an FCW cyber-security briefing Sept. 12 in Washington, D.C.


An innovative data center offers to heat up Paris homes
The team at Qarnot is rethinking data centers by breaking up the collection of servers and dispersing them into Parisians’ homes or other buildings in the form of digital radiators. “The idea was to generate the waste in the only place where it is not a waste — directly in people’s homes,” Danuta Pieter, an engineer and partner at Qarnot Computing said. This new service could provide an enticing alternative to traditional, yet costly data centers while helping bring heat to those who can’t afford it.


Next role for robots: data center diagnosticians
One of the systems on its research plan might include the use of robots for energy management and conservation. Recently IBM and EMC developed robots designed to rove data centers and collect temperature, power usage and other data that could affect the performance of data center IT systems. ... The EMC Data Center Robot helps combat these problems by patrolling for temperature fluctuations, humidity and system vibrations and locating sources of cooling leaks and other vulnerabilities.


Anatomy of an API Gateway
There are a couple of rules that many of the vendors break: They mix business and non-functional requirements together in the same architecture; and They describe the complete proxy implementation as policy. One of the most important principles we follow with our API Gateway is the separation of process, binding (style), transport, and policy; and the resulting ability to declaratively define APIs.


Risk Management And Bias: Is Human Nature in Your Way?
One of the assertions of the paper is that, when it comes to risk, we often ignore facts and apply our own subjective biases to the decisions we make. “Risk is traditionally defined in terms of probability. However, people often have difficulty in processing statistical information and may rely instead on simplified decision rules. Decision making under risk is also critically affected by people’s subjective assessments of benefits and costs.”


Big data applications require new thinking on data integration
Copying data sets from the file structure of HDFS into a database table format for storage in HBase wasn't that big of a challenge, said Hannon, who took part in a panel discussion at the conference in San Jose, Calif. "The more difficult part," he said, "was unpacking the 10 to 15 years of ETL we'd done to find out what rules were important and which weren't." Then the developers had to incorporate the business rules deemed worth keeping into the new implementation.



Quote for the day:

"Action may not always bring happiness; but there is no happiness without action." -- Benjamin Disraeli

September 13, 2013

Model driven development – where to from here?
The modeling community has so far focused solely on building the right kind of business applications from their high level specifications – a subset of how. The harder problem of identifying what change needs to be introduced where and what would be the likely benefits of this adaptation is largely ignored. Models should help capture core properties such as ‘Every credit entry must have a debit entry’ in double book accounting. Then they can be analyzed for their properties.


Oracle finally adds whitelisting capabilities to Java
Oracle added a feature in Java that lets companies control what specific Java applets are allowed to run on their endpoint computers, which could help them better manage Java security risks. The new feature is called the "Deployment Rule Set" and was added in Java 7 Update 40 (Java 7u40) that was released Tuesday.


DDoS Attacks Occur on Average Every 2 Minutes, Security Firm Finds
According to NSFOCUS, TCP Flood and HTTP Flood remained the most popular attack methods, and accounted for 38.7 percent and 37.2 percent of attacks, respectively. Hybrid attacks also became more prevalent, with ICMP+TCP+UDP Flood serving as the most common combination. Increasingly, denial-of-service attacks are occurring from and within online gaming communities, according to a new report from DDoS-mitigation firm Prolexic.


Crafting Efficient Big Data Solutions
These next-generation servers come with high-performance, ARM-based CPU cores, a disk controller, and memory management, making them ideal for massively parallel applications in Big Data. Deployed in high-density chassis, SoC designs require far fewer components than current IT systems, provide integrated, high-speed fabric networks and greatly reduce space and power requirements. By using advanced SoC technology, Big Data systems can be deployed on microserver clusters with significantly high cost performance.


Google's Coder tool turns Raspberry Pi into a mini web server
According to Google, Coder offers a simple platform that teachers and others can use to demonstrate how to build for the web through browser-based projects written in HTML, CSS and Javascript. Using Coder obviously requires a Raspberry Pi device, although the tool itself can be downloaded from the web to a Mac or PC — a Mac OS X installer is included in the bundle, but PC users will need to download separate utilities. Users will also need a 4GB SD card to transfer the Coder SD image to the Raspberry Pi.


The Predictive Analytic Evolution of R
R, the open source programming language for statistics and graphics, has now become established in academic computing and holds significant potential for businesses struggling to fill the analytics skills gap. The software industry has picked up on this potential, and the majority of business intelligence and analytics players have added an R-oriented strategy to their portfolio. In this context, it is relevant to look at some of the problems that R addresses and some of the challenges to its adoption.


Is OpenStack IPv6-ready?
After all, when we evaluated the IPv6 readiness of proprietary cloud platforms, it quickly became clear that many, at best, needed a bit of work. And as an open source project, OpenStack allows us to fix and tweak components that are not IPv6-ready. OpenStack is gaining significant traction with service providers and large enterprises, which are both also experiencing increasing pressure to migrate to IPv6.


Google knows nearly every Wi-Fi password in the world
The list of Wi-Fi networks and passwords stored on a device is likely to extend far beyond a user's home, and include hotels, shops, libraries, friends' houses, offices and all manner of other places. Adding this information to the extensive maps of Wi-Fi access points built up over years by Google and others, and suddenly fandroids face a greater risk to their privacy if this data is scrutinised by outside agents.


IDC: 87% Of Connected Devices By 2017 Will Be Tablets And Smartphones
IDC is predicting the worldwide smart connected device market will accelerate past 2B units by the end of 2015, attaining a market value of $735.1B.  PCs will drop from 28.7% in 2013 to 13% in 2017. Tablets will increase from 11.8% in 2013 to 16.5% by 2017, and smartphones will increase from 59.5% to 70.5%. The following graphic shows the distribution of sales by platform.

Developer Evangelists Build Community, Engagement for Software Firms
Put simply, a developer evangelist, acts as a liaison between third-party, independent software developers and users and a company's software and product development teams. But there's a lot more to it than that, says Terry Ryan, whose official title is Educational Evangelist for Adobe. "We are the people responsible for bridging the gap between when a product is sold and when people actually have to use it," Ryan says.



Quote for the day:

"Low self-esteem is like driving through life with your hand-break on." -- Maxwell Maltz

September 12, 2013

CFOs Holding CIOs’ Feet to the Fire
The role of today’s IT department has to change from selecting technology providers to vetting the tech providers chosen by the business unit, said Thoran Rodrigues, the owner of BigData Corp. in Rio de Janeiro, which provides cloud-based big-data services. That would include making sure that the technology provider will provide benefits, low exit costs, reliability, interoperability, security and the long-term vision that it promised, he said.


CPUsage Makes It Easier To Harness The Cloud’s Compute Power
The idea behind the service is to allow anybody to take their existing applications and then allow them to run on virtually any cloud computing service available, whether that’s AWS, Microsoft’s Azure or one of their competitors. That’s still in the future, though. What the company is launching today is support for AWS, with support for Azure and Google’s Compute Engine coming by the end of the calendar year.


Securing data with Authentication as a Service in the cloud, mobile era
Authentication and identity management systems can be complex and costly, but AaaS brings the cost benefits of SaaS to authentication. Keeping up with advances in authentication, managing two-factor authentication and incorporating mobile devices can also be time-consuming. Shifting these burdens to a service provider is an appealing option.


Key Market Trends In Disaster Recovery
The growing instances of natural disasters, along with a rise in data loss, have increased the significance for having an effective disaster recovery (DR) strategy in place. IT industry trends are having a profound influence on enterprises’ current DR strategies. Organizations are being forced to reevaluate how they plan test, and execute their disaster strategies. This brief looks at some of the prominent trends currently taking place in disaster recovery.


Consulting on the Cusp of Disruption
Although McKinsey and other consulting firms have gone through many waves of change—from generalist to functional focus, from local to global structures, from tightly structured teams to spiderwebs of remote experts—the launch of McKinsey Solutions is dramatically different because it is not grounded in deploying human capital. Why would a firm whose primary value proposition is judgment-based and bespoke diagnoses invest in such a departure when its core business was thriving?


How will we integrate all these enterprise cloud apps?
Dhillon believes that people who aren’t programmers should to be able to integrate applications without learning Java or hiring a consulting company. Just drag-and-drop connections on a simple visual grid (say an order in Salesforce into an order object on the ERP system) and, voila, it all just works, and when your salespeople close an order in Salesforce it spits out the order in your financial system.


Cisco Unveils Mega Chip for New Network Demands
It’s a new product line called the nPower, and Cisco says the chips can pump as much as 400 gigabits of data per second. By contrast, the company’s prior technology could handle 140 gigabits and required more than one chip, Cisco says. The new capacity translates into hundreds of millions of transactions per second.


10 yrs later, DHS still plagued with cybersecurity, critical infrastructure problems
Today marks 12 years after the 9/11 terrorist attacks; it’s been a decade since 22 government agencies were combined into the Department of Homeland Security in response to those attacks. “DHS has spent more than $35 billion on homeland security grants, but cannot measure whether we are safer from terrorist attacks,” according to Republican Senator Tom Coburn.


14 Things You Need to Know About Data Storage Management
So how do you formulate that sound data storage management strategy? CIO.com asked dozens of storage and data management experts, which resulted in these top 14 suggestions regarding what steps you need to take to choose the right data storage solution(s) for your organization -- and how you can better ensure your data is properly protected and retrievable.


How to revamp your IT operational plan without getting fired
If you didn't run the generators, check the power distribution units, monitor the ambient temperature on the data center floor, perform change control, replace or rack and stack new equipment, put out fires, upgrade the storage frame, open the ports, plug the holes, and stop the distributed denial-of-service attacks, at some point nothing will work. The problem is that nobody cares that you do any of these things until one thing breaks.



Quote for the day:

"Thunder is good, thunder is impressive; but it is lightning that does the work" -- Mark Twain

September 11, 2013

Cloud financial accounting: Not just for SMBs anymore
Not every financial accounting solution does debits and credits. Beyond the general ledger, accounts payable, fixed asset and other transactional systems, there are some other important financial accounting solutions that assist in cash management, planning, budgeting and more. These other financial software products are also moving to the cloud.


NoFlo's crowd-funding effort helps coders go with the flow
Generally, flowcharts are design tools that don't make it beyond the mockup stage, but NoFlo is designed to be a crucial part of how people construct programs written in JavaScript. With NoFlo, JavaScript code modules can be wired together by dragging links from one to another. The idea is to separate the structure of the software -- especially large, complicated programs with lots of moving parts -- from the gory details of various components.


With iBeacon, Apple is going to dump on NFC and embrace the internet of things
iBeacon could be a NFC killer because of its range. NFC tags are pretty cheap compared to NFC chips, but NFC tags are required on each product because NFC works only in very close proximity. In theory, NFC range is up to 20cm (7.87 inches), but the actual optimal range is less than 4cm (1.57 inches). Also, mobile devices need to contain a NFC chip that can handle any NFC communications. On the other hand, iBeacons are a little expensive compared to NFC chips, but iBeacons range is up to 50 meters. Not all phones have NFC chips, but almost all have Bluetooth capability.


The end of enterprise-architecture?
The danger here is that if it does become someone’s role, someone’s job, there can be some unfortunate unintended-consequences. Of these, the most common traps are: the enterprise-architects interpret everything solely in terms of enterprise-architecture itself – and try to force everyone else to do likewise; and enterprise-architecture becomes regarded as solely the responsibility of the enterprise-architects – not as the necessary responsibility of everyone


IT Pros and BYOD Users See Support Much Differently
BYOD users sounded off about their issues with IT. Some were age-old refrains: "Improve IT's availability for technical issues, including faster response times." Others were specific to mobility: "Allow us to access apps which could be used for work so we aren't as dependent on our PCs." For the most part, though, users simply want better training and communication from IT as they find their way in the brave new world of mobile devices.


Smartphone Navigation Without Looking Down
To help reduce the dangers of distracted driving, GPS maker Garmin has come up with the Garmin Head-Up Display, or HUD. The dashboard accessory connects to your iPhone, Android or Windows Phone device via Bluetooth and projects directions from its Garmin StreetPilot or Navigon smartphone app onto your windshield. By displaying information in the driver's line of sight, Garmin argues it's safer than using just your smartphone for navigation.


New and emerging technology trends carry heavy compliance burden
But, as you're already surely aware, along with their potential to positively transform the enterprise, these emerging technology offerings also carry with them inherent security risks, presenting real anxieties to compliance officers everywhere. We searched our sister sites to uncover some recent stories that explain why some organizations are hesitant to embrace the big four, and share expert opinions on how to tackle the security and compliance risks these technologies pose.


Wireless charging from 30 feet away -- does startup have a game-changer?
The Cota wireless charging system includes a charge-transmitting unit and a charge receiver. The charging unit in the video was only shown briefly, but it appeared to be a pillar-shaped piece of equipment that's about 6 feet tall. The receiver can be either a dongle unit or technology integrated into a device, such as a smartphone or a battery. While it has yet to be miniaturized, Zeine said the wireless technology will eventually be small enough to fit onto the motherboard of a smartphone or even in a triple-A battery.


Big Data Governance - Protect And Serve Are Equals
The mission of data governance, and for chief data officeers, in a big data era has to be about catering to the speed, access and education of business stakeholders to make good decisions about what to trust if they look outside of IT to support their data driven initiatives. Just as IT has established policies to do things more efficiently and managing resource ratios across internal, off-shore, and outsourced venues, so will the business.



Quote for the day:

"For our own success to be real, it must contribute to the success of others." -- Eleanor Roosevelt

September 10, 2013

The SSD Endurance Experiment: 22TB update
We expect flash wear to decrease SSD performance over time, but these drives still have a lot of life left in them. Each SSD has SMART attributes that tally bad blocks, bytes written, and other variables. We're tracking those attributes, and the SSDs are so far free from bad blocks, which means all of their NAND remains intact. The data we've collected also provide some insight into SandForce's write compression mojo.


Berg’s CEO on the experience of connected devices & avoiding the creep factor
Long term it’s Amazon Web Services for connected devices. There are so many difficult things when you try making connected devices. Moving bits and bytes between the cloud and the device is just 10 percent of what you’re trying to do. The rest of it is common developer challenges. Everything from figuring out a password reminder button, to debugging tools and analytics, to fleet management, and all those sorts of things.


eHealthCareFramework - Framework for HealthCare Apps
This article we will see the various aspects , need for HealthCare Framework. The entire framework is implemented for helping the developers to easily implement applications by re-using or extending this framework. The framework purely depends on the third party API's. Most of them are CarePass API from Aetna. One has to register for the API and get keys in order to make of the framework.


Gartner Says Enterprise Architecture Is Key to Driving Digital Strategy
"Senior business executives are challenging CIOs and their IT organizations to be at the front of digital strategy, identifying innovative new business models and technologies, and getting more business value out of each technology investment," said Marcus Blosch, research vice president. "Enterprise architects can provide unique capabilities to help CIOs develop a new agenda for 'hunting and harvesting' in a digital world."  Mr. Blosch said that organizations are looking to grow and improve efficiency of their operations, creating new demands on CIOs and EA.


What's the Point of Creativity?
The best creativity comes from a much deeper place than the desire to win. It comes from a desire to contribute to the lives of others, either by introducing something new that improves the quality of their lives or by showing people that something thought to be impossible is in fact possible. When you change people's perceptions about what can be accomplished or achieved, you contribute to their humanity in the richest possible way.


Seagate wants to put hard drives into tablets
Seagate still thinks that there's more life to squeeze out of the aging hard drive technology, and is releasing a new Ultra Mobile HDD. The drive combines a super-slim (5mm) 500GB 6GB/s SATA hard disk drive with 16MB of on-board cache to deliver a peak data transfer rate of 600MB/s, but this drops to only 100MB/s for sustained transfers.


U.S. and U.K. spies crack BlackBerry BES encryption, report says
Der Spiegel said that to acquire BES data involves a sustained effort on the part of the NSA's Office of Tailored Access Operations, a specialized hacking team based in Forte Meade, Maryland. An NSA presentation entitled "Your target is using a BlackBerry? Now what?" seen by the magazine shows what can be achieved.


Negating network latency's effects without bending law of physics
Although we cannot bend the laws of physics, we can avoid some of latency's more deleterious effects on application performance, using CDNs, TCP optimization and peering agreements. At a technical level, data can readily move between networks, but at a business level, agreements between network service providers dictate what data moves between networks.


It’s Time to Put More Context in Your Conversations
Much of our workplace communication is transactional in nature, and lacks connectivity to the bigger picture. It lacks the critical context that our colleagues and team members need to understand how their work connects to the bigger picture of customers, markets and strategies, and this lack of context adversely impacts performance.


How even agile development couldn't keep this mega-project on track
"Hard-nosed contract managers within large suppliers will see this as a change to the requirements and will often want to charge for each iteration," said John Turner. "Here the supplier can stand to make a lot of money and as such agile can introduce contract complexities. Agile developments need careful cost, time, quality and outcome definitions within the contract so that the power of agile will be of benefit but also impose the discipline on the need to deliver to the targets."



Quote for the day:

"Empty pockets never held anyone back. Only empty heads and empty hearts can do that." -- Norman Vincent Peale

September 09, 2013

Trust no one, advises security expert after NSA revelations
The new revelations should raise major concerns from Internet users over who they can trust, Schneier added. "I assume that all big companies are now in cahoots with the NSA, cannot be trusted, are lying to us constantly," he said. "You cannot trust any company that makes any claims of the security of their products. Not one cloud provider, not one software provider, not one hardware manufacturer."


PostgresSQL: The Other big open-source database has a new release
Jonathan S. Katz, CTO of VenueBook, an event-planning company, said in a statement, "PostgreSQL 9.3 provides features that as an app developer I can use immediately: better JSON (JavaScript Object Notation) functionality, regular expression indexing, and easily federating databases with the PostgreSQL foreign data wrapper. I have no idea how I completed projects without 9.3."


David Linthicum Named One of TechTarget's Top 11 Cloud Computing Industry Movers and Shapers
"David earned his place on the list not just because he is such a visible presence across virtually any cloud computing website or conference, but due to the fact that he isn't just saying what vendors want to hear. He has earned his status as a thought leader by consistently challenging the status quo." The feature details how via his blogs, webinars, keynote addresses, podcasts and over 13 books, Linthicum advocates for change in the cloud market.


VMware NSX: Network virtualization doesn't need to be a turf war
"To me it just feels like the VMware NSX folks are saying the network is the biggest problem," said network engineer and blogger Tom Hollingsworth. "If you are going to blame the network for all the problems that we've been dealing with for years, give us a solution that works with the people who have been trying to fix this the whole time. Don't tell me that I'm the problem and that you'll just fix it and go around me."


Securing the Virtual World
The report showed that one-third of the group think virtualization and cloud computing make security “harder,” while one-third said it was “more or less the same,” and the remainder said it was “easier.” The results seem to indicate that many are either in the process of defining policy for virtual environments, or have chosen to postpone that effort until a later date. Perhaps, as a result of this failure to tackle the security question when deploying virtualized servers, there are experts who believe that the majority of virtual deployments may be less secure than physical deployments.


4 survival strategies for IT chaos
Today's youth are, of course, tomorrow's customers. "They demand immediacy, which is driving what IT has to deal with," says Kippelman, who is CIO at Covanta Energy and a Computerworld blogger. But the need for speed is just the tip of the iceberg. Across all industries, IT teams are up against unprecedented volatility, uncertainty, complexity and ambiguity, also known as VUCA.


The Wonder Years: Businesses Transform as Cloud Adoption Matures
Along with deeper benefits, early adopters are discovering deeper complexity in using cloud for day-to-day operations. After initial cloud transitions where integration is a top challenge, companies with more experience are seeing changes to IT policy become their primary concern. These changes could involve the way that technology is procured throughout the organization or the functions within the IT department as they interact with lines of business, both of which are steps towards a fully cloud-enabled business.


U.S. court takes on Internet traffic fight
The outcome will also determine whether Internet service providers can restrict some so-called crossing content, for instance, by blocking or slowing down access to particular sites or charging websites to deliver their content faster. Public interest groups have termed the FCC rules too weak, saying the agency was swayed by big industry players and needs to forge more direct and clearer power of oversight.


Myths about Enterprise Application Orchestration
It combines business processes that cut across functional areas as well as associated IT services. Orchestrating or designing an Enterprise Application is an art which can be compared with the composition of music: It requires the same amount of effort or integration to produce the desired results. The term orchestration in music refers to the way instruments are played to render any aspect of melody or harmony


Kanban - Isn’t It Just Common Sense?
Thus in response to the question in title of this post, the answer to whether kanban is common sense is “No!” However, common sense is an example of a heuristic, and I do believe kanban is a heuristical approach to solving the many challenges of product development. The remainder of this article will explore more about what heuristics are, the primary sources that led me to the realisation that heuristics are the right approach, and how we can use heuristics to design kanban systems.



Quote for the day:

"Let a man lose everything else in the world but his enthusiasm and he will come through again to success." -- H. W. Arnold