September 28, 2013

Some Robots Are Starting to Move More Like Humans
Mimicking human movement is ideal for a robot designed to take on human tasks. But such robots can also help researchers explore how biomechanics can give rise to more intelligent behavior, a field known as embodied intelligence or cognition. “Most people know that intelligence requires the body, but they don’t know why,” says Pfeifer. “I think [Roboy] can be a really interesting research platform for learning in systems with many degrees of freedom.”


Microsoft Creating New Office Touch Apps
The new Modern UI app, codenamed Office Reader, was demonstrated Thursday in front of thousands of Microsoft employees during a meeting in Seattle, according to a report in The Verge. Microsoft VP Kirk Koenigsbauer presented the multimedia tool, which supports Web pages, Office documents, PDFs and interactive e-books. The app reportedly will be able to recommend content and include several methods for organizing information.


IT does not know ethics
It is important that IT professionals put more focus on ethics because the business world is finally understanding how much trust and power they give us to run their IT infrastructure. The visibility of Business Ethics is increasing with online magazines by that title becoming popular as Sustainability and Corporate Responsibility continue to get focused attention. And, of course, there are all the horror stories about ethics. As Canadians, we should at least know about Bre-X.


Where Does Security Fit Into Change Management Processes?
If the course of action regarding the change is easy to identify (e.g., x will fix y), then it’s a good idea to have the risk evaluation piece completed after all other vetting for the change process. That is, once you have identified the solution, determined that it is feasible/cost effective/meats requirements, etc., you can present the change for a security evaluation. If it’s the only option, it will be the job of the evaluator to determine what risk the change might introduce to the organization.


How CIOs and IT Teams Can Make IT Matter Again
The shift in responsibilities will demand a shift in capabilities, and many CIOs would be well served by brushing up on some critical skill sets ... CIOs eyeing the future will find golden opportunities to become game-changers for their organizations. If they want to take full advantage of the opportunity, though, they need to reposition themselves within the organization, shifting from technology tactician to strategic technology visionary.


Hefty price premium awaits early DDR4 memory adopters
The adoption of DDR4 has been delayed due to the decline in the PC market and price stabilization this year of DDR3 memory, whose prices had been falling by double digits in previous years. Happy with DDR3 margins, companies like Samsung and SK Hynix shifted manufacturing capacity to make mobile memory for smartphones and tablets, which are growing markets.


RDBMS vs. NoSQL: How do you pick?
The market is abuzz with terms like NoSQL, Big Data, NewSQL, Database Appliance, etc. Often, IT decision makers can get very confused with all the noise. They do not understand why they should consider a newer, alternative database when RDBMSs have been around for 20+ years. However, many leading enterprises are already using alternative databases and are saving money, innovating more quickly, and completing projects they could not pursue before as a result.


Accidental Architectures and the Future of Intelligent Networks
There are, however, certain undeniable trends which drive the practical implementations of information systems. By no means is the challenge of heterogeneity new. Movements like the Service Oriented Architecture were focused on bringing some rhyme and reason to the otherwise scatterplot world of information and application landscapes. Today, SOA is not widely discussed, but that’s because its guiding principles now largely rule the roost.


Five Mistakes You Do Not Want to Make As a Project Manager
There are plenty of other mistakes, just waiting to be made - or avoided. Keep your eyes open and keep these five major mistakes in mind whatever project you are working on. Don’t forget that being a project manager is a constant learning exercise; gaining experience and improving your PM skills to be able to take on bigger and more complex challenges and grow your career as a project manager.


What Amazon should do: Think different. Be more like Apple
In addition to focusing on the device's design and function, Amazon will need to heavily market the Mayday feature, much like Apple did when it first unveiled Siri. Amazon wants to control how a consumer experiences its services through a device, but to achieve that it first needs people to want the gadget. Just look at how Samsung achieved its No. 2 ranking behind Apple. It used the sex appeal of its Galaxy S smartphone line, and extended it to its family of Galaxy tablets.



Quote for the day:

"Man can alter his life by altering his thinking" -- William James

September 27, 2013

Intel invests in Google Glass rival, the 'world's most advanced wearable computer'
On Thursday, Intel announced the investment, saying the "significant investment" in to wearable technology developer Recon will support product development, marketing and global sales expansion. Recon will also "benefit from Intel Capital's expertise in manufacturing, operations and technology," the company says. Intel's specific funding figures were not disclosed.


Using metro storage clusters to manage data growth, add value to IaaS
Service providers may gain significant business value by implementing metro storage clusters as well. They can use the technology to create multilayer data storage packages for customers, depending on which metro storage cluster design they chose to deploy. Requirements would dictate the design, architecture and services to be offered.


CloudPassage Extends Cloud Infrastructure Security To Large Enterprises
Unlike legacy security tools that were built for static environments and fixed perimeters that don't exist with cloud computing, Halo is the only massively scalable, portable security solution that can provide immediate visibility and control over any cloud infrastructure environment, including private cloud, virtualized data centers, public cloud, virtual private or managed clouds, and even bare-metal servers.


How to Overcome the Perils of Caring Deeply
Organizations move toward mediocrity when they silence those who care deeply. Pursue your passion or accept irrelevance. Every initiative, project, department, and product needs a champion who obsessively cares. CEO’s become champions of average when they don’t freakishly care for their organizations. Excellence is a function of caring deeply.


A glimpse into the “Making of IRCTC” apps
Half a million transactions per day, over a million enquiries every day are the facts that prop up when the word ‘IRCTC’ is discussed in the technology world. The numbers are startling and one can imagine the infrastructure that has been put in place to cater to millions of Indians on a daily basis. Be it booking tickets or enquiry on the web (individual users and through agents), IRCTC.CO.IN is a one stop shop for train reservations in India. Users of Windows 8 and Windows Phone devices are the beneficiaries as they now have a native app to look up to for their rail ticket reservation needs


Return on Ignorance: The Highest form of ROI
With each eliminated unknown, the risk-adjusted discount rate fell. Each time that rate fell, the project’s value rose. “Return on ignorance,” quipped Donald Farmer, QlikTech vice president of product management. When the laughter died, he continued, “If you decide in advance what your measure’s going to be, you’re only going to perform to that measure.”


Usage-based auto insurance found to pose privacy risks
With pay-as-you-drive plans, insurance companies typically require drivers to plug in a small telematics device into the vehicle's on-board diagnostic port. The device monitors the vehicle operator's driving behavior and records data like speed, cornering and braking patterns over a specified time period. The information is used to adjust insurance rates and to offer more customized plans for individual drivers. Insurance companies claim that such plans can help substantially lower auto insurance rates, especially for safe and low-mileage drivers.


Smartphones: Transforming society into a sea of stupid
While we can certainly point towards societal detachment with the introduction of radio and television, those were only consumptive technologies rather than interactive ones. The move towards Personal Computing starting in the early 1980s added an element of societal detachment. By comparison, radio and TV could be enjoyed in groups, whereas the PC and online interaction was by nature a single-user activity.


Will the cloud exchange be the next big ecosystem player?
German stock exchange operator Deutsche Börse is set to launch the first vendor-neutral marketplace for cloud services in 2014 when it turns up service on its Deutsche Börse Cloud Exchange (DBCE). The DBCE will offer standardized products allowing accredited sellers to contract with any registered buyer in a unified market and legal framework.


Malicious browser extensions pose a serious threat and defenses are lacking
BrowserProtect, another Firefox extension, claims to protect the browser against "homepage, search provider, extension, add-on, BHO and other hijacks." This extension also fails to protect against malicious extensions, the researcher said. Browser security extensions are not really trying to protect against malicious extensions and they wouldn't be able to because by design they run with the same privileges as those extensions, Balazs said.



Quote for the day:

“We cannot change anything until we accept it.”  --  Carl Jung

September 26, 2013

'Icefog' spying operation targeted Japan, South Korea
The "Icefog" hackers probed victims one by one, carefully copying select files and then exiting the systems, according to security vendor Kaspersky Lab, which released a 68-page report on the group Wednesday. "The nature of the attacks was also very focused," Kaspersky wrote. "In many cases, the attackers already knew what they were looking for."


Governance: More Than Just DataWhen an organization establishes its data governance program and the different tiers or levels of responsibility, this does not mean that other important “players” in the organization are not heard. Interviewing a number of experienced individuals across different roles regarding their views on data governance can give a unique perspective on the direction and possible initiatives where value can be added to your organization. You may find that there are similar, smaller initiatives occurring that can be leveraged.


Playing the economics game with IT lifecycle management
ITLM requires that you find out and log exactly what equipment assets are in the data center. Use an IT asset management tool. Many organizations carry out rudimentary asset management with spreadsheets with serial numbers and dates of purchase and delivery to keep track of items, but these systems rapidly become out-of-date as equipment is updated with new components.


Reduce Waste by Changing from Waterfall to Agile
The Agile Method does not attempt to “nail and freeze the requirements” all up front at one time. It assumes that the requirements will evolve and change as the customer begins to visualize their own requirements. ... Essentially, the Agile Method is a series of smaller contained waterfalls. End users and business stakeholders get to see and experience the system as it unfolds.


Enterprise security increasingly challenging, study finds
“Part of the problem is that information security professionals are typically having to take on the work and roles of two or three people,” Tipton told Computer Weekly at the (ISC)2Security Congress 2013 in Chicago. Tipton said the study indicates a shortfall of around 300,000 qualified information security professionals this year, which is evidenced by the constant poaching of the top people in the industry.


Review: Samsung's most affordable, triple-level cell SSD
The new processor boasts 400MHz clock speeds, compared with 300MHz in previous generations, so it's about 33% faster. That faster clock speed translates into a 27% increase in the number of input/output operations per second (IOPS), according to Samsung. The company has also advanced the signal processing in the controller -- a move that's designed to ensure that the higher-density drive keeps the same level of endurance and reliability as Samsung's previous SSDs.


Enhancing enterprise readiness of private clouds
SUSE today announced the general availability of SUSE Cloud 2.0, the next version of the original enterprise-ready OpenStack distribution for building Infrastructure-as-a-Service private clouds. Based on OpenStack Grizzly, it helps in setting up a mixed hypervisor private cloud environment that can be rapidly deployed and easily managed, helping enterprises increase business agility and reduce IT costs.


Oracle Channel Chief to Partners: Master Exadata
"We're rewarding partners for that behavior," said LaRocca. "And frankly, we need more partners selling Exadata. We need them invested and building competencies in the Exadata area. If you don’t have both hardware and software competencies, you wouldn’t have the confidence and ability to do Exadata." At the same time, Oracle has been driving ISVs to optimize their solutions for Exadata -- as part of a broader push called the Exastack program.


CIOs Share How They Made the Leap to CEO
The CEO job has never looked more attainable to CIOs. In today's business climate, the monster forces of social media, mobility and analytics technology are moving tectonic plates beneath traditional C-suite roles. CIOs are bumping up against fellow officers as IT becomes the number-one tool for building strategic advantage. A CIO who can make clever use of data and technology to create new revenue may be well-positioned to lead a company


Cloud Architecture: Get It Right The First Time
First, effective IT managers should map out their organization's specific goals in moving to the cloud, then search for the cloud service that seems most oriented toward meeting them. Unlike Facebook, which publishes the details of its infrastructure, Google offers little information about its own. Google Compute Engine, however, sits on the same infrastructure as Google Search.



Quote for the day:

“Put your best people on your biggest opportunities.” -- Jim Collins

September 25, 2013

How to Make Your In-memory NoSQL Datastores Enterprise-Ready
In-memory NoSQL datastores such as open source Redis and Memcached are becoming the de-facto standard for every web/mobile application that cares about its user’s experience. Still, large enterprises have struggled to adopt these databases in recent years due to challenges with performance, scalability and availability. ... This article will outline how to make an in-memory NoSQL datastore enterprise-ready, with tips and recommendations on how to overcome the top seven challenges associated with managing these databases in the cloud.


Virginia Tech breach exposes data on 145K job applicants
"The server was placed in service without our normal cyber protection protocols," thereby allowing illegal access to the data, Hincker said in an email. The university said the oversight allowed someone to illegally access the server and potentially the data it contained. "We became aware on Aug. 28 that it had been compromised," Hincker said without elaborating on how the university discovered the problem. In many cases, such data compromises go unnoticed until the breached entity is notified by law enforcement, credit card companies or victims.


Uses for Hadoop: Exploring the storage, appliance and analytics options
Hadoop can be a beneficial tool for big data environments, but according to John Webster, a senior partner at Boulder, CO-based Evaluator Group Inc., a lot of the criticism stems from a lack of understanding of the uses for Hadoop. In the first of this two-part podcast, Webster explains Hadoop's role in data storage, whether it can be used as an alternative to object storage and what needs to change to spread Hadoop adoption. Listen to the podcast or read the transcript below.


Are You a High-Performer--or Just an Overachiever?
An overachiever can ram through a new marketing strategy. They can wear down a recalcitrant team member. They will outlast a recession, explode past their competition, annihilate technical constraints. This all looks good from a distance, but up close, internally, it’s tearing muscle from bone, weakening the business. Performance-based leaders, on the other hand, deliver results while building up the business, not weakening it. Like the overachiever, they make things happen, but at the same time, they make their organization better, fitter, more growth-oriented, rather than weakening it.


Value-Based Health Care Is Inevitable and That’s Good
Data can help identify variations in clinical practice, utilization rates, and performance against internal and external benchmarks, leading to improved quality and a sustained change in culture. Last year, we established a values-based care team, which seeks to eliminate unnecessary practice variation by developing evidence-based care paths across diseases and to improve comprehensive care coordination so that patients move seamlessly through the system, reducing unnecessary hospitalizations and ER visits.


Look before you leap: Evaluating cloud migrations in high-performance LAN environments
On paper, cloud looks great. You're going to save a bundle of money, have less headaches to deal with, less systems to manage, etc. But you suspect that if you move your systems and data that run at LAN speeds to the cloud, productivity could grind to a proverbial halt. But at some point, you may need to prove it to senior management, and, “I’ve got a bad feeling about this,” probably won’t cut it, Han. Besides, don’t you really want to know for sure before putting up a fight?


Neural Network Data Normalization and Encoding
A topic that's often very confusing for beginners when using neural networks is data normalization and encoding. Because neural networks work internally with numeric data, binary data (such as sex, which can be male or female) and categorical data (such as a community, which can be suburban, city or rural) must be encoded in numeric form. ... This article explains how to normalize and encode neural network data from a developer's point of view. The process is conceptually simple but surprisingly difficult to implement.


Cisco reveals its Internet of Everything router
The system is not a core router like the Cisco CRS, or a successor to the CRS, the company says. Rather, it is a network fabric designed to scale CRS cores and ASR 9000 edge routers in service provider networks from centralized systems to distributed architectures able to accommodate the growth of Internet connected "things," like cars, homes and machines.


Better Agile Adoptions
Usually, the following pattern is used to implement Agile methods, usually after a small pilot test of Agile with a small team: Authority says we are all “going Agile”; Authority says we will be using a specific practice, like Scrum, or Kanban, or some other Agile practice, method, or framework. The message is that this is not negotiable; Authority selects a coach on the basis of his or her expertise with the prescribed practices. Typically, Scrum skills. The coach is imposed on the people, just like the prescribed Agile practices.



Quote for the day:

"Face reality as it is, not as it was or as you wish it to be." -- Jack Welch

September 24, 2013

Microsoft's Surface 2 Tablet Follows Faithfully in the Footsteps of Failure
Despite the fresh name and a handful of helpful tweaks, the Surface 2 is still saddled with the same ho-hum value proposition and half-baked Windows RT operating system as the original Surface RT--a disaster that ended up costing Microsoft nearly $1 billion in write-downs. The Surface 2 doesn't look any more appealing.


Intel's Haswell-Y promises PC performance in tablets
Lately Intel has been focused on its Atom processor and tablets, but there’s another new chip in its family that could prove to be equally important. The latest Haswell-Y processors use so little power that they are now a viable option for tablets and 2-in-1 devices. The focus on power efficiency in Core processors is nothing new. Even before laptop shipments eclipsed desktops for the first time five years ago, Intel began working on power and it has long offered a line of low-voltage Core processors--typically rated at around 15 watts compared with 37 watts for standard notebook chips.


Using predictive analytics to make your data actionable (part 1)
Predictive analytics can only be actionable if incorporated into operational processes. Businesses do not just need the power to know, they need the power to act. If they are able to work through the challenges highlighted above, they will be well on their way to developing the crystal ball that is proven to deliver tremendous value and insight that drives growth.


Tips for Tuning the Garbage First Garbage Collector
This is the second article in a two-part series on the G1 garbage collector. You can find part one on InfoQ July 15, 2013: G1: One Garbage Collector To Rule Them All. Before we can understand how to tune the Garbage First garbage collector (G1 GC), we must first understand the key concepts that define G1. In this article, I will first introduce the concept and then talk about how to tune G1 (where appropriate) with respect to that concept.


Indifferent innovation
If only customers were smart enough to use the products in the way in which they were designed to be used, everything would be hunky-dory. What we as innovators need to understand is that instead of ridiculing customers who use products in unorthodox ways or for unintended uses, we should be asking: why? Why are people using our product in these unintended ways? What could they possibly gain from doing that? And, what could we learn if we'd simply understand that, to misquote Kotler, people don't want drills, they want holes.


Gartner: 64% of organizations looking at Big Data projects this year
“For big data, 2013 is the year of experimentation and early deployment,” said Frank Buytendijk, Gartner research vice president. “Adoption is still at the early stages with less than 8% of all respondents indicating their organization has deployed big data solutions. 20% are piloting and experimenting, 18% are developing a strategy, 19% are knowledge gathering, while the remainder has no plans or don’t know.”


Health IT Advocates Press for Interoperability
The push for greater interoperability around EHR systems was one of three "asks" the health IT advocates lobbied for in their meetings with lawmakers and staffers. They are also prevailing on members to champion a nationwide strategy for identifying patients and accurately matching them to their EHRs, citing industry estimates that between 8 percent and 14 percent of medical records contain faulty information that results from misidentifying the patient.


Selling SaaS: Operational requirements for consumers vs. businesses
The key to successfully selling Software as a Service (SaaS) across all market segments is recognizing and addressing the different operational requirements among different buyer groups, which often stem from the value propositions that drive SaaS in the consumer, SMB and enterprise market segments.


We Need a New Approach to Solve the Innovation Talent Gap
Observing this problem, I’ve begun wondering: What if there was a talent exchange model that wasn’t people and skill centric, but rather project and role centric? Said differently, I think the existing talent evaluation models should be reversed. Right now the model starts with people, then skills, then accomplishments. Validating the information is getting better (due to innovations such as LinkedIn’s endorsed skills), but most accomplishments are not vetted.


Java exploits seen as huge menace so far this year
"Of the top five most targeted vulnerabilities, four are found in the Java development, either the Runtime Environment (JRE) or the browser plug-in," according to the report, based on information about attacks detected through F-Secure's sensors and telemetry systems. The company notes that it's not surprising Java is an appealing target since "next to the Windows operating system (also a popular target for exploits), Java is probably the second most ubiquitous program in an organization's IT setup."



Quote for the day:

"Just because something doesn't do what you planned it to do doesn't mean it's useless." --Thomas A. Edison

September 23, 2013

Here’s what you need to know about the Apple TouchID “hack”
A big selling point of the new generation of fingerprint readers, including that in the iPhone 5s, is that they don’t simply read the outer, dead layer of skin – instead, they use a radio frequency (RF) scanner to read a living layer of skin underneath. ... then TouchID isn’t actually that good at making sure it’s dealing with a living finger. It appears that it can be fooled by, as Starbug describes, breathing on the latex sheet “to make it a tiny bit moist” before using it on the sensor.


Vodafone pilots ‘Virtual Shelf’ shopping wall
"We are combining the traditional grocery store with the online store," Bruser continued. "We invented the idea and we developed the Virtual Shelf in partnership with Vodafone, who supplied the LED screens for the display and helped us in making our idea become a reality." The Virtual Shelf is based on an array of monitors so does not include NFC tags in the display itself — something which is much more easily achieved with printed shopping walls.


The Dysfunctionally Connected Workplace
Our friends at the Ken Blanchard Companies just released an stunning inforgraphic about leadership and communication. According to their research, over 80% of leaders don’t listen effectively or give praise to their followers. Check out the entire info graphic below or click on it to download it as a PDF.


Introduction to Java multitenancy
Sharing the JVM saves both memory and processor time. But with traditional JVM technology, sharing the JVM normally removes any remaining isolation from the infrastructure layer, requiring the top-level application itself to provide that isolation. This article introduces the multitenant feature that's available for trial use in IBM's latest Java 8 beta. This feature enables deployments to gain the advantages of sharing the JVM while it maintains better isolation than can be achieved when a traditional JVM is shared.


Towards a Blended Reality: Interview with augmented reality pioneer Thad Sterner
With no need to "want" I'll always get the digital things I need in the physical world. This experience of a "blended realty" won't be far off from a true experience of a digital Singularity. "Doe's it blend?" will have a whole new meaning when applied to digital gadgets and technologies. Here is an interview of Nikola Danaylov talking with Thad Starner, professor at the Georgia Institute of Technology, and technical lead for Google Glass.


Larry Ellison Unveils ‘In Memory’ Oracle Databases
In a speech to kick off a big Oracle conference in San Francisco, Ellison discussed the launch of a new database that stores information on memory chips rather than disk drives. He said with speeds 100 times faster than traditional databases, a retailer can analyze its sales trends quickly and make adjustments accordingly. Such “in-memory” databases have been getting more popular, aided by technology changes and lower prices for memory chips. Ellison also unveiled new back-end computing hardware to pair with the software, and a new type of machine to back up its zippier databases.


COBOL on an Integration Spree
The key has been to keep the language current with new processing ideas and new capabilities. This makes it easy to adapt COBOL to new environments even though it is a mature language with a lot of operating lines of code. COBOL has a unique capability in that the same COBOL code can be compiled into native code, .NET and to the JVM without changing a single line of code.


E-SBCs take on WebRTC gateway and BYOD security functionality
The battle lines are being drawn over where WebRTC will connect in enterprise UC platforms. With WebRTC standards firming up and support already built into Google's Chrome and Mozilla's Firefox browsers, real-world deployments of Web-enabled communication applications are just on the horizon. Staking a claim as the logical broker for WebRTC applications, nearly every E-SBC vendor has included support for the standard in their product roadmap.


Managing Sustainability in Development Projects
Scholars have described a dichotomous nature of sustainability where the linkages between sustainable development and project management may be spotted. The famous dichotomy is that “Sustainability is about both short term and long term orientation”. This dichotomous nature of sustainability describes well the linkage between sustainable development and project management. In fact, the project nature is mostly short-term though the wish is to get it flowing in the long term orientation of the organization.


Cloud Shines Brightly as Future of Disaster Response IT
Disaster response IT comprises the same building blocks as traditional IT—servers, networks, applications and the like—but its deployment is as unpredictable as the disasters themselves. Moreover, in the best-case scenario, money invested in response technology will never be used in practice. For disaster responders, this unique challenge creates an intricate calculus of benefit against cost, in which, unlike traditional IT, what sits in the balance is human life and well-being, rather than simply productivity and efficiency.



Quote for the day:

"The world is changing very fast. Big will not beat small anymore. It will be the fast beating the slow." --Rupert Murdoch

September 22, 2013

The next big market for data and connected devices? Agriculture
Alicia Asin, the CEO of sensor-making company Libelium, said in a recent interview that 18 percent of her company’s €3 million (about $4 million) in sales this year came from agricultural buyers. ... Finding the right historical weather patterns that might match the current conditions is something connected weather stations could help with. At a more fundamental level, bringing the data about crops online and matching it to weather patterns could help him select better crops as the climate shifts.


The Skillset of a Big Data Analyst
A big data analyst needs to be able to support the business and management with clear and insightful analyses on the data at hand. This includes data mining skills (including data auditing, aggregation, validation and reconciliation), advanced modelling techniques, testing and creating and explaining results in clear and concise reports.


The Best Online Learning Platforms
Online learning platforms or E-Learning has become very popular nowadays offering thousands of different courses from Business, Marketing, Science and Health. We have listed 6 of the best learning platform, free & paid, for you entrepreneur or not to gain new skills.


How I Got My Team To Fail More
When I talked about the failure metric and freeing the team to become more entrepreneurial, some in the larger PBS organization translated this as the digital group wanting a license to be undisciplined. So we worked to build a digital team that was left-brain, right-brain — embracing the nonlinear right-brain mojo of a startup (entrepreneurial, fast-moving, unafraid of risk) while filtering every initiative through the left-brain empirical rigor of goals, metrics, and KPIs. The KPIs also helped ensure our failures were disciplined failures, not the result of sloppiness.


Want Project Success? Kill the Ambiguity!
This insight about ambiguity is why people not only treat ambiguous, inexact, incomplete, or vague information as insufficient, but actually discount the data altogether. The frustrating implication for project managers is that, as a result of this aversion, people behave as if they have no information at all. Good change leaders must become good at converting ambiguous goals and plans into concrete, specific steps and messages to guarantee the behavior change they seek.


HDMI 2.0: What you need to know
The most important thing to understand about HDMI 2.0 is the increase of the size of the "pipe" transmitting data from the source (like a future native 4K Blu-ray player or PC) to display. This makes possible the increased frame rates at high resolutions. It also allows even more interesting lower-resolution images. For example, HDMI 2.0 supports dual video streams, so you can get two full HD shows on the same screen at the same time.


Big-Data a Big Deal for Executives
The 2013 survey indicates that a robust 91 percent of executives responded that their organizations have a big-data initiative planned or in progress. Of those, 60 percent of executives report that at least one big-data initiative has been implemented, with 32 percent reporting that big-data and initiatives are fully operational, in production, or operationalized across the corporation. Big-data, of course, is a term used to describe a collection of data so large, complex, or requiring such rapid processing, that they become difficult or impossible to work with using standard database management or analytical solutions.


Write I/O Performance & High Availability in a scale-out Distributed File System
Using a “scale-out” storage controller solution like Nutanix ensures consistent high write performance even immediately following a node failure by eliminating the requirement for RAID style rebuilds which are disk intensive and can lead to “Double Disk Failures” and data loss.The replication of data being distributed across all nodes in the cluster ensures minimal impact to each Nutanix controller, ESXi host and the network while ensuring the data is re-protected as soon as possible.


Dealing with Team Members Who Derail Meetings
Start your meeting by saying something like, “My understanding of the purpose of this meeting is X; does anyone have a different understanding, or think we need to add anything?” Even if you called the meeting and set the agenda, this ensures that if people think other issues need to be addressed, they can say so, and have them considered for the agenda, rather than raising them as off-track items.


Microsoft Is Quietly Becoming A Major Player In The 'Cloud'
Microsoft is now the second largest cloud software provider in the world behind Salesforce (CRM). The company's cloud offerings are also a key reason the company's revenue is projected to grow 5% to 7% both this fiscal year and in FY2014 despite a continuing decline in global PC sales. The company does not receive many plaudits for its rapidly growing cloud offerings but they are a critical part of Microsoft's future growth prospects.



Quote for the day:

"Great achievement is usually born of great sacrifice, and is never the result of selfishness." -- Napoleon Hill

September 21, 2013

Experts praise Pentagon's march to security standards
Thwarting hackers is also behind the Pentagon's move to have all four branches of the military, defense agencies and overseas commands use the same network and security systems. The expected benefits include killing redundancies and making it easier to detect hacker-induced anomalies. The transition away from the Pentagon's current mishmash of technology unique to the various government entities is expected to take years. However, experts contacted by CSOonline said the outcome will likely justify the time and expense.


Google starts new health company to tackle aging
This is the latest project that takes Google away from its Internet search origins. The company is already developing driver-less cars and giant hot-air balloons that bring Wi-Fi to remote corners of the world. Wall Street sometimes gets unnerved by such projects because investors worry that Google founders Larry Page and Sergey Brin are not concentrating fully on the main, money-making parts of the company.


Microsoft OS Chief: One API to Rule Them All
"We really should have one silicon interface for all of our devices. We should have one set of developer APIs on all of our devices," said Terry Myerson, executive vice president of Microsoft's Operating Systems Engineering Group, during the company's meeting with financial analysts on Thursday. "And all of the apps we bring to end users should be available on all of our devices," he added.


Data Mining and Analysis Textbook (Free Download)
Mohammed J. Zaki, Computer Science Professor at RPI, and Wagner Meira Jr., Computer Science Professor at Universidade Federal de Minas Gerais, have written the textbook Data Mining and Analysis: Fundamental Concepts and Algorithms. The book is currently available as a PDF download. Based upon the chapters, the book looks very good. It contains large sections on data analysis, clustering, and classification. The final book will be published sometime in 2014.


Is Tableau the New Leader in BI?
There was a long list of features and new capabilities showcased. The demonstration of story points was the most compelling in my opinion. Interestingly, "story telling" is a key theme of QlikView.Next , announced last year and currently in beta. At the ASUG BusinessObjects user conference in Anaheim last week, SAP also showed the concept of story boards in its upcoming Lumira SP12 due in a few weeks. So far, the Tableau demonstration seemed the more robust.


Make Business Agility a Key Corporate Attribute
Today, companies must break away from the assumption of sustainable competitive advantage and embrace adaptable differentiation, i.e., develop an agility advantage. But what does this mean? Forrester defines business agility as the quality that allows an enterprise to embrace market and operational changes as a matter of routine.


New iOS 7 security hack and other grumbles
The latest version of the iPhone’s operating system currently offers a gaping hole in its old-fashioned passcode lockscreen. Jose Rodriguez...shared the technique with me. ...anyone can exploit the bug by swiping up on the lockscreen...and then opening the alarm clock. Holding the phone’s sleep button brings up the option to power it off.


The Science Behind What Naps do for Your Brain 
Millions of Chinese workers continue to put their heads on their desks for a nap of an hour or so after lunch, for example, and daytime napping is common from India to Spain. ... Sleep experts have found that daytime naps can improve many things: increase alertness, boost creativity, reduce stress, improve perception, stamina, motor skills, and accuracy, enhance your sex life, aid in weight loss, reduce the risk of heart attack, brighten your mood and boost memory.

How the financial services sector uses big data analytics to predict client behaviour
The opportunity for the sector is to unlock the potential in the data through analytics and shape the strategy for business through reliable factual insight rather than intuition. Recognising that data is a significant corporate asset, a number of organisations are appointing chief data officers following pressure to police the integrity of the numbers as last year's Economist Special Report, "Data, Data Everywhere", put it.


Your story cards are limiting your agility
Storycards are lies, unless they are directly created BY a customer, an actual customer, not by a product owner/customer proxy. If stories are created by a product owner they are hypotheses, well educated guesses as to what they think the customer wants. Product Owners try to understand the mind of the customer but no one really knows what the market will do with a product or service until it is created.



Quote for the day:

"Management is nothing more than motivating other people." -- Lee Iacocca

September 20, 2013

Day in the life of a data scientist: investigate, collaborate, innovate
Shellman describes the lab’s innovation process as one that occurs rapidly, with working prototypes developed quickly for immediate feedback. The key to idea creation and implementation? Getting out and collaborating is the key, she says. Ironically, Shellman’s favorite tool for innovation and idea creation is pen and paper.


Cloud strategy: Power of the people
Despite the notion of all cloud services as “plug and play,” in reality, implementing major cloud deals—like ones in government, financial or telecommunications firms, for instance—requires real vertical industry expertise and skilled technology service professionals. Unlike when consumers buy cloud services, it’s not “all automated”—far from it. Experience and scale matter when you’re working with big enterprises and the US Federal government.


Gecko Is One Small Step For The Internet Of Things, One Huge Leap For Your Smartphone
The idea here is that the accelerometer-equipped Gecko connects to your smartphone via low energy Bluetooth to help you monitor the various things in your life, as well as bring gesture controls and triggers to your smartphone. With Gecko, the connectedness isn’t built into the devices themselves but can rather be applied to objects in the home through these accelerometer- and Bluetooth-based tags


When Developing Gamified Apps for Business, Avoid the Disruption of Processes at All Costs
Usability and user experience (UX) are core principles that guide functionality, interface design, and interactivity for mobile app and web designers. Gamified apps especially must meld directly into a workflow; If it hinders processes rather than optimizes, an entire gamification implementation may fail. A best bet would be to plant developers within the business environment to observe workers.


Home workers: Get out and meet people
"About a year ago I realized I was slipping into a routine that was keeping me isolated from the real world. I was happy working in my home office but I was missing vital interaction with others. That was not only less than ideal for me personally, but it wasn't helping in my work covering mobile tech. Besides work colleagues, I wasn't talking to folks enough to keep current with the tech people are using and why."


WAN vendor Ipanema Technologies sets cloud app performance platform
CAM has two parts: time evolution reports that paint a picture of how cloud applications are being consumed at certain sites over a period of time, and overview reports that detail where application performance is worst and the number of users accessing a particular application. The platform essentially lets companies provide Quality of Service to users, Piquer Durand said, even for applications operating outside the core network.


Steve Ballmer finally admits Microsoft blew it by focusing too much on Windows
Here's what he had to say, according to Business Insider: "If there's one thing I regret, there was a period in the early 2000s when we were so focused on what we had to do around Windows that we weren't able to redeploy talent to the new device form factor called the phone." Although he admitted the company's error in focusing too heavily on Windows, he's being a bit disingenuous here.


Experts, users weigh in on OpenPower's open source data center systems
"Rarely is a declining platform rescued from the abyss by such [initiatives as this consortium]," Treadway said. "The IBM Power Architecture, like all RISC-based systems, has been losing relevance for years, and it's unlikely that any open source move will garner more than a niche response. This is particularly true with OpenPower, which lacks an open governance model on the core technology."


Business -- not IT -- should make the case for cloud
The true value of cloud computing -- or any technology, for that matter -- is its ability to make the business function in ways that can maximize its growth and value. This means allowing the business to move in new and innovative directions to capture new markets, or to keep up with the market by growing as quickly as the market will allow. For this to work, you need to use technology in agile and scalable ways. Typically, you can't do that with the existing set of technologies and approaches you use today.


What You Need to Maintain Effective Agile Software Development
It is a disservice to the client to impose upon them the requirement of a perfect plan or the acceptance of an undesired result, if an alternative is possible. In the real world, knowledge of the business is dispersed among many stakeholders, concepts suffer from varying degrees of vagueness, and the desired outcome often begins to crystallize after the work has begun. It is therefore more cost-effective to have the right technical talent that can function in an interactive environment with the stakeholder, and adapt the work to an evolving plan.



Quote for the day:

"If you can dream it you can do it." -- Walt Disney

September 19, 2013

How software-defined infrastructure shapes compute resources
"If you're running a data center today, you're big enough for a software-defined data center," said Poulin, who will speak on SDDCs at the Data Center World Fall 2013 conference in Florida. "If you have one rack or a small closet, you're more likely looking for a way to not run a data center anymore, and outsourcing is attractive." But software-defined infrastructure is in its infancy, and will likely evolve much like virtualization once did.


Security Researchers Create Undetectable Hardware Trojans
Hardware trojans have been the subject of considerable research since at least 2005 when the U.S. Department of Defense publicly expressed concerns over the military's reliance on integrated circuits manufactured abroad, Paar said. Often, the individual circuit blocks in a single microchip are designed by different parties, manufactured by an offshore foundry, packaged by a separate company and distributed by yet another vendor.


Microsoft Security Development Lifecycle Adoption: Why and How
Not only is the SDL integrated into a company’s internal development lifecycle, but it should also be applied to all software applications that are used by the company, no matter the development source. The SDL is a framework for the entire development process. Companies should require the use of an SDL which meets or exceeds the guidance in ISO/IEC 27034-1.


Understanding Samsung Knox
The Knox container feature is a second, secure Android environment within the normal operating system. The secure sub-operating system has its own separate home screen, launcher, applications and widgets. All the data and applications stored in the container are completely isolated from the rest of the operating system. No application or process inside the container can interact or communicate with any process outside of it and vice-versa.


Hey, CIOs: In a BYOD world, your new job is service provider
According to Matthew Finnie, CTO of Interoute, ”The idea that people are going to give up the freedom they have with the smartphone — I think that battle is completely lost.” Instead of “retrenching,” though, CIOs need to “define what’s useful and what’s critical for [them] to control.” He agreed with Short: The new role of the CIO is “almost like a mini service provider.”


Cybersecurity Field Not Ready to be Professionalized,  Study Finds
“One of the things that gave us pause was that when an occupation professionalizes, it erects barriers to entry,” said Dr. Ronald Sanders, a vice president at Booz Allen Hamilton and one of eight members of the committee producing the report. “On one hand, it improves the quality of people who enter the profession, but it also discourages some people from entering the field. At a time when the field is evolving and supply has not kept pace with demand, to professionalize the entire field would likely be counterproductive.”


Improving the Big Data Toolkit
Hadoop 2.0, said Merv Adrian, an analyst at Gartner, is “an important step,” making the technology “a far more versatile data operating environment.” The new version of Hadoop, he said, can handle larger data sets faster than its predecessor and it opens the door to analyzing data in real-time streams. So far, Hadoop has been used mostly to divvy up huge sets of data for analysis, but only in batches, not streams. The new Hadoop has also been tweaked to work more easily with traditional database tools, like SQL.


7 Biggest IT Compliance Headaches and How CIOs Can Cure Them
As if IT departments didn't have enough to worry about these days. They also have to ensure that the organization is in compliance with various industry and federal regulations (PCI, Sarbanes-Oxley, HIPAA) designed to keep sensitive customer data safe. An increasingly difficult task in today's decentralized, mobile, app-filled world. It's enough to give a CIO or CTO a headache.


Meditate for More Profitable Decisions
Meditation has become an increasingly popular practice amongst the C-suite elite. And, with CEOs such as Rupert Murdoch (News Corp); Bill Ford (Ford Motor Company); Rick Goings (Tupperware); and Marc Benioff (Salesforce.com) all touting its benefits, executive coaches are picking up on the trend introducing mindful techniques to programmes to calm the mind’s “chatter”, assist focus and manage stress.


Agile exploratory software testing: Why IT inefficiency pays off
Exploratory testing involves the admin fully and continuously in the development process. Testers don't just react to massive chunks of developer code; they act proactively to think of ways to break it. The most daring extension of the Agile exploratory testing approach is to the Agile side of operational app testing: Agile exploratory DevOps. The administrator fights fires and actively thinks of ways to break the code before problems happen. It requires "operational sandboxes" in which to test.



Quote for the day:

"Perfection isn't attainable, but if we chase perfection we can catch excellence" -- Vince Lombardi