October 23, 2013

CISOs' Role Becoming More Strategic, But there Are Growing Pains
When it comes to business practices, the security leaders interviewed by IBM stressed the need for strong business vision, strategy and policies, comprehensive risk management and effective business relations to be impactful in their roles. Understanding the concerns of their C-suite is also critical. More mature security leaders meet regularly with their board and C-suite, thereby improving relations.


The Real Privacy Problem
Thus the balance between privacy and transparency is especially in need of adjustment in times of rapid technological change. That balance itself is a political issue par excellence, to be settled through public debate and always left open for negotiation. It can’t be settled once and for all by some combination of theories, markets, and technologies. As Simitis said: “Far from being considered a constitutive element of a democratic society, privacy appears as a tolerated contradiction, the implications of which must be continuously reconsidered.”


5 Reasons Hadoop is Kicking Can and Taking Names
Hadoop’s momentum is unstoppable as its open source roots grow wildly into enterprises. Its refreshingly unique approach to data management is transforming how companies store, process, analyze, and share big data. Forrester believes that Hadoop will become must-have infrastructure for large enterprises. If you have lots of data, there is a sweet


How leadership can rise above office politics
The confusion between politics and leadership is understandable because both require social interaction. In certain political relationships, there is an expectation that a negative response (failure to complete the circle) comes with a punishment: Do as I say or you’re fired. This kind of power seeks to alter someone’s behavior via threat, intimidation, or coercion.


Freedom is All That Matters
Free software concretely means that the users have the four essential aspects of freedom: Free-dom 1 - freedom to run the program as you wish for whatever purpose; Freedom 2 - freedom to study the source code and to change it to make the computing as per your wish; Freedom 3 – to redistribute exact copies to others and freedom 4 – to redistribute modified copies to others.


Traditional App Development Stifles Government Innovation
It is a pointless practice for government agencies today to code and build single-use applications, or to integrate a dozen different products to deliver a single, specific functionality. Technology vendors now provide efficient platforms to provide such services without the need for coding, creating ready-to-run applications that work on all devices, whether in the cloud, on-premises, or both. The applications built on these new platforms offer simple, intuitive user interfaces to improve collaboration and decision-making, and support better service to internal and external agency customers.


The ins and outs of extending DLP
That being the case, we have two options for monitoring outbound Internet traffic for the enterprise. The first is to install DLP network sensors at each office (or alternatively, to provision virtual servers at all of our remote offices). The problem with this approach is that it provides no visibility into what users do once they take their laptops off the network.


DevOps - Pivoting Beyond Pockets
“You can’t buy a culture transformation. It is hard work from within the Organization”. An uncalculated and solely engineering based approach to DevOps can be less effective and not so sustainable. Operations are generally locked in the fixed mindset with focus on "control" (controlling change, controlling risk, etc.) They often "harden" their controls, under the delusion that they can actually control change and risk. The more Agile the Dev mindset is (and it's always more agile than the ops mindset) - the more tension and the greater the friction.


Maturity models are proxies for value, not value itself
The heart of the problem is that “maturity” is not value. Value is an outcome, and maturity is not an outcome; it’s something we pursue in order to develop the capabilities that make an outcome possible. At best, increasing maturity is a leading indicator for value, not the thing itself. An IT organization that touts its improving “maturity” to an executive team is not talking about value, but about IT activities.


Dubai thinks big with plan to turn itself into a wi-fi connected smart city
Its biggest announcement is a project being driven by Dubai's ruling Sheikh, Mohammed bin Rashid Al Maktoum, and called Dubai Smart City. He wants pervasive wireless across the city. In a series of tweets, he said: "We launched a new project to transform Dubai into a smart city. Education, healthcare and general security will be managed via smart systems. The project aims to provide all Dubai residents with high-speed internet in public places, and live services and information."



Quote for the day:

"The person who seeks all their applause from the outside has their happiness in another's keeping." -- Dale Carnegie

October 22, 2013

Hack in the Box: Researchers attack ship tracking systems for fun and profit
AIS protocol “was designed with seemingly zero security considerations,” but is a mandatory tracking system “for all passenger ships and commercial (non-fishing) ships over 300 metric tons.” AIS works “by acquiring GPS coordinates and exchanging vessel’s position, course and information with nearby ships, offshore installations, i.e. harbors and traffic control stations, and Internet tracking and visualization providers.” By 2014, it is estimated that AIS will be on one million ships.


Lowering the cost of private cloud software
One of the biggest long-term costs in virtualization and private/hybrid cloud environments isuncontrolled, unmonitored growth in computing demand. Costly growth occurs when users, empowered by self-service provisioning, deploy and scale workloads and then eventually abandon unneeded workloads within the private cloud without scaling down or decommissioning them.


Winning ‘the War to Keep Your Employees’ Requires Re-Recruiting Your Top Talent
Much like married couples can re-energize their marriage by renewing their vows, managers should periodically change and update what the company has to offer during the re-recruiting process. Re-recruiting is necessary because even if your top performers are loyal and have not actively applied for a new job, they are still constantly being identified, assessed, and contacted by corporate recruiters and by employees seeking out potential employee referrals.


AngularJS on top of ASP.NET: Moving the MVC framework out to the browser
Mixing .NET code with HTML in views can soon get very messy. Wouldn’t it be nice if the presentation layer (HTML) could be pure HTML? Also, in the ASP.NET MVC model, some of the business logic invariably resides in the controller. It is tempting to use an anti­pattern like the one shown above ... In this article we will see how Angular JS, a new JavaScript framework by Google can be used effectively to build web applications where: Views are pure HTML; Controllers (in the server sense) are pure REST based API calls; and The presentation layer is loaded as needed from partial HTML only files.


5 Tips for Managing Clouds at Scale
At a recent panel of cloud users, one thing became clear though: Managing a public cloud deployment at small scale is relatively straightforward. The problem comes when that deployment has to scale up. "It gets very complex," says IDC analyst Mary Turner, who advises companies on cloud management strategies. "In the early stages of cloud we had a lot of test and development, single-purpose, ad-hoc use case. We're getting to the point where people realize the agility cloud can bring, and now they have to scale it."


Rakuten’s CEO on Humanizing E-Commerce
When people talk about “social shopping” or “social commerce,” they’re referring to the fact that people like to connect with others for advice about purchases. Some people think that friends—whether in real life or on social media—have a big influence on what we buy. I don’t believe they’re that powerful. The curators running our shops know quite a bit more about products and are a much better source of recommendations. If you want to buy a tennis racket, do you ask a friend or the pro at the shop? If you want to learn about wine, do you ask a friend or a sommelier?


Passing PCI firewall audits: Top 5 checks for ongoing success
If you are an information security professional whose organization handles credit card information, then unless you have been living under a rock since PCI DSS was first introduced in 2004, PCI compliance is a fact of life. Many love to bash the standard as the "low bar" for security, but when it comes to "Requirement 1: Install and maintain a firewall configuration to protect cardholder data," special attention to these five components


Managing virtualization machine security for in-house IaaS deployments
Many virtualization platforms offer specific controls for securing virtual machines; organizations should certainly take advantage of these. For example, VMware Inc.'s virtual machines have configuration settings that specifically prohibit copy and paste between the VM and the underlying hypervisor, which helps prevent sensitive data from being copied to hypervisor memory and clipboards. Platforms from Microsoft and Citrix Systems offer similar copy-and-paste restrictions.


Fighting Shadow IT: 10 Best Practices to Prevent Enterprise Data Leaks
Businesses are struggling to securely share files because employees are turning to consumer services outside the network to get the job done themselves without bothering to communicate to IT. Easy data access will win just about every time if it comes up against corporate policy. Since the single biggest cause of data leaving the network is a company's employees, guidelines need to regulate how corporate information is shared.


PCI SSC 2013 Community Meeting Takeaways
For PCI DSS v3.0, where segmentation is used to reduce scope and limit the network boundaries of the cardholder environment, penetration tests will be required to test the effectiveness of network boundaries. This means that internal penetration tests will need to include the internal network not just on the inside of the cardholder environment but also on the outside of the cardholder environment, from the vantage point of internal network zones that face the cardholder environment.



Quote for the day:

"Winning becomes easier over time as the cornerstones of confidence become habits" -- Rosabeth Moss Kanter

October 21, 2013

How using a test-execution model can improve software test results
Because the test passes, we'll never know, because we aren't going to investigate, ever. Similarly, fail doesn't mean there is a bug. The good news is that we're likely to figure out whether a bug was encountered, because fail really means we need to investigate. We usually eventually figure out whether the SUT behavior is expected under the circumstances.


Qualcomm’s Toq Is a Watch Smart Enough to Keep It Simple
The Toq can be paired with any Android smartphone by installing a companion app. You can then choose which of the apps on your phone can send notifications to your wrist. You can act on some of those notifications when they reach the Toq. For example, you can scroll through a text message on the device’s screen and reply to it in two taps, by selecting from a menu of canned or custom responses.


Living in a digital world.
No matter what business or service you deliver today, digitalization is changing it. Data collection and analysis are becoming highly sophisticated in this new era. Genuinely digitalized businesses are creating value and generating revenue through digitalized products and services. Technology will enable you to: optimise business processes; create new business models; and identify and exploit those business moments. That’s why every company will become a technology company.


IBM rolls “Internet of Things” starter kit
With the Internet of Things Starter Kit, a real-time operating system is integrated in Libelium Waspmote nodes to support more that 60 different sensors available off the shelf, letting developers build any application on top, IBM said. The Internet of Things SDK also includes the source code of the 6LoWPAN libraries so that researchers can modify and add their own algorithms and improvements.


Life in the cloud after Nirvanix
Nirvanix told customers to immediately seek a new service provider to host their data and to put no more data on its servers in the meantime. The announcement saw Nirvanix customers scrambling to find new service providers. On a wider-scale, it added to the concerns that many organizations already had about safety in the cloud. FierceCIO had the opportunity to speak with Ted Chamberlin, vice president of cloud market development at CoreSite, about the impact of the Nirvanix collapse. CoreSite helped some Nirvanix customers successfully migrate to other providers


Eight Things Leaders Need to Know About Speed
If you are leading a team with a significant crisis, speed may need to be increased, and fast! And there are other times when 70 mph just isn’t appropriate, necessary or safe. There are speed limits on the roads to take those factors into account, and we must look for the road signs with our teams as well – so that we set the current speed or pace based on what the organization and environment needs, not what we (or others) are comfortable with or like


The IT Role in Value Creation is Not a Technology
It is time to change the paradigm. IT needs to think of itself as a business organization that drives value rather than simply a delivery or technology organization. And transformational IT CIOs are doing just that. There are many who question IT’s ability to contribute to top line value. Based on the traditional paradigm, the question is well supported. However, in the new paradigm, IT can provide top line value creation through new revenue streams.


Information Governance on (or in?) the Data Warehouse – Does it Exist?
And so the extent of information governance in a data warehouse tends to focus on an exception, kicked out by an ETL or script, and IT chasing after business users who are “too busy to call IT back” to help solve the problem. In a nutshell, the work of information governance and stewardship is rarely, if ever, “operationalized” in the business process; it remains an IT effort. It does not become “how we do things around here”.


The Power of the Cube
There’s something to this. A big problem with BI is that its interaction model is very stilted: i.e., it makes us wait while it goes off and fetches data via SQL. In most cases, this means going out to a database and fetching some data and doing some calculations and – preferably in two to five seconds – bringing something back and displaying it on our screen. This approach works reasonably well for reporting, but not really for analysis where the user’s train of thought is important.


What CIOs, developers should know about the 'API economy'
A cloud-first [strategy] is appealing because it promises to lower costs and increase agility. However, CIOs should view their API strategy not just as the integration methodology that enables cloud-first, but also as a way to syndicate assets to new internal and external audiences. When considered this way, it becomes clear that a well-conceived and properly implemented API strategy also has the potential to drive innovation, increase productivity, and create new channels and markets.



Quote for the day:

"The discipline of writing something down is the first step toward making it happen. " -- Lee Iacocca

October 20, 2013

ATDD From the Trenches
In summary: Pretend that you have an awesome framework encapsulated behind a really convenient helper class; Write a very simple acceptance test for something that already works today; Write the acceptance test for your new feature. Make it run but fail; Make it green. While coding, write unit tests for any non-trival stuff; and Refactor. And maybe write some more unit tests for good measure, or remove redundant ones. Keep the code sqeaky clean!


Iceland and the Data Center Industry
It’s been five years since Verne Global announced plans to build a data center business in Iceland, which offers nearly ideal scenarios for power and cooling servers. The company’s facility on a former NATO base is now filling with customers, with a boost from cloud hosting provider Datapipe. The latest arrival is RMS, which specializes in modeling catastrophe risk for the insurance industry.


Adidas Runner's Watch Puts Diverse World of Wearables in the Spotlight
One of the big challenges in developing the watch was leaving out features and streamlining it for the task of running, Gaudio said. Synchronizing with a mobile phone was one capability the company determined many runners could do without. "At a certain level, they get to a point where they don't want to be bothered with carrying a phone," Gaudio said. It can be a matter of both reducing carried weight and escaping from the world of alerts and calls.


Common File Elimination Demystified
Common File Elimination ensures that the same data is never transmitted offsite more than twice, thereby saving the bandwidth to transmit only new, unique data. Customers often wonder why files are transmitted twice and not only once. Simply said, the system needs to see the file three times before it classifies it as common and moves it to the appropriate folder - common file library.


Data Discrimination Means the Poor May Experience a Different Internet
As Crawford and Jason Schultz, a professor at New York University Law School, wrote in their paper: “When these data sets are cross-referenced with traditional health information, as big data is designed to do, it is possible to generate a detailed picture about a person’s health, including information a person may never have disclosed to a health provider.”


Integrating Cloud and In-house Storage
Cloud storage makes disaster recovery significantly easier, and your data is backed-up offsite in a secure location. But there is also the additional security that most cloud storage providers can ensure. Many small businesses or remote offices use out-of-the-box solutions for data storage, which are typically much easier for hackers to gain access to. You can rest assured that these larger providers have a greater level of expertise protecting data than a local IT professional you have set up your system.


Learn From Your Failures and Build Something Great
What happens when engineers become leaders? That’s the question at the core of “Cultivate,” a new conference from O’Reilly focused on entrepreneurial leadership for technology companies. In this morning’s keynote, Tim O’Reilly examined the topic using an approach familiar to data center managers: the failure analysis. O’Reilly, the founder and CEO of O’Reilly Media, discussed the failures he experienced in building one of the industry’s leading brands for publishing and events, and what he learned from them.


5G Will have to Do More Than Send Speed Up Your Phone, Ericsson Says
More so than any previous generation of cellular gear, 5G will have to serve two masters, Nandlall said. Between wireless sensors, industrial equipment and an array of consumer gadgets, in a few years there are likely to be 10 mobile connections per person. If 5 billion humans join the mobile world, that's 50 billion connections that 5G networks will need to serve.


What Puzzles You Most About Functional Programming?
With so much diversity, it’s hard to define the exact scope of what exactly functional programming is. Is it a question of how to design your program, that is, using functions as the primary abstraction? Or is it about programming with mathematical functions, meaning pure functions that do not have side effects? And what are those monads again? In this InfoQ research, we ask you: what puzzles you most about functional programming? The following is an incomprehensive list of things that might puzzle you about functional programming.


Li-Fi Turns Every Lightbulb Into an Ultra-Fast Wireless Network
First, data are transmitted to an LED light bulb — it could be the one illuminating the room in which you’re sitting now. Then the lightbulb is flicked on and off very quickly, up to billions of times per second. That flicker is so fast that the human eye cannot perceive it. Then a receiver on a computer or mobile device — basically, a little camera that can see visible light — decodes that flickering into data.



Quote for the day:

"We must walk consciously only part way toward our goal and then leap in the dark to our success." -- Henry David Thoreau

October 19, 2013

ODBC Rocks!
Both OLE DB and ODBC are true native APIs for SQL Server in that they map API calls directly into SQL Server’s network protocol, Tabular Data Stream (TDS). When Microsoft recommended best practices are followed, ODBC is a very thin wrapper over TDS with no intermediate buffering between network packet buffers and the application. It therefore has excellent performance and scalability characteristics.


Portability challenges for government agencies moving to hybrid clouds
A key report finding is that while overall cloud spending will accelerate, federal agencies in the near-term will continue to leverage different cloud types (private, hybrid, public) based on their specific agency needs and concerns. The leading category of government cloud service is private, but public clouds and hybrid clouds continue to gain traction. As a result, many federal agencies will be employing a multi-cloud architecture.


Graphics Chips Help Process Big Data Sets in Milliseconds
Known as MapD, or massively parallel database, the new technology achieves big speed gains by storing the data in the onboard memory of graphics processing units (GPUs) instead of in central processing units (CPUs), as is conventional. Using a single high-performance GPU card can make data processing up to 70 times faster.


IBM unveils computer fed by 'electronic blood'
But for IBM to truly match the marvels of the brain, there is a third evolutionary step it must achieve - simultaneous liquid fuelling and cooling. Just as blood gives sugar in one hand and takes heat with another, IBM is looking for a fluid that can multitask. Vanadium is the best performer in their current laboratory test system - a type of redox flow unit - similar to a simple battery. First a liquid - the electrolyte - is charged via electrodes, then pumped into the computer, where it discharges energy to the chip.


The Challenges of Cloud Security Deployments
The complexity of the security landscape doesn't make this easier. A quick glance at network security reveals a diverse array of often-siloed solutions, some software, some hardware. These solutions frequently add even more data to the pile of Big Data demanding analysis, and that's just if they integrate well into the cloud security architecture in the first place. In many cases, these solutions are simply confusing and problematic to deploy in cloud environments.


Cloud To Dominate Data Center Traffic Within The Year, Cisco Study Predicts
Approximately 17 percent of data center traffic will be fueled by end users accessing clouds for web surfing, video streaming, collaboration and connected devices. Another seven percent will be traffic generated between data centers, primarily driven by data replication and software/system updates. An additional 76 percent of data center traffic will stay within the data center and will be largely generated by storage, production and development data in a virtualized environment.


Watch out, PayPal: Amazon's following the money
"Login and Pay with Amazon," which allows you to pay on other Web sites using your Amazon account, builds upon the web retailer's earlier Amazon Payments effort from a few years ago. If Amazon can get third-party merchants to integrate its log-in feature into their checkouts, Amazon's payment system would technically have more users than PayPal.


Mobile middleware: Data movement and application design best practices
A critical question with your mobile middleware application framework is the exposure of APIs. If you expect to support browser access (which likely you should), the basic application must present a RESTful front end. It's also expected that most mobile device applications use RESTful APIs. If you also intend to use RESTful APIs, design all your applications for Representational State Transfer (REST). Doing so means you can't presume the application will maintain state. That will be important when you look at your application-to-resource


The Shift to I/O Optimization to Boost Virtualization Performance
While hardware price per performance costs continue to come down, performance improvements are not keeping up with the rate of data growth and the need to extract value from that data. This performance chasm forces enterprises to purchase ever-increasing amounts of hardware to handle the increased I/O. As IT buys more storage, not for capacity but to spread I/O demand across a greater number of interfaces, organizations cannot fully capitalize on the promise of virtualization and other important technology trends.


What Does Next-Generation MDM Look Like?
The MDM Institute's 12 strategic planning assumptions for 2013-14 present an experience-based view of the key trends and issues facing IT organizations by highlighting master data management, data governance and related areas Master data management is quickly broadening its attractiveness both as a key enabler of strategic business initiatives as well tactical P&L initiatives. As of 2013, MDM is no longer "fast follower" technology strategy but is clearly a business strategy for the masses.



Quote for the day:

“The day you realize that your efforts and rewards are not related, it really frees up your calendar.” -- Scott Adams

October 18, 2013

Using NFC, IBM brings dual-factor authentication to mobile
Here's how IBM's approach works, using an app for using your bank as an example: First, you load up the bank's app. It sends a special challenge number to your phone. Next, the app asks you for your password. But here's the catch: after you enter it, you tap your phone against the NFC-enabled card your bank gave you. Third, the phone transfers the challenge number to the card using NFC, the card transforms it through a calculation based on its own key, then sends it back to the phone, which sends it to the bank.

More about Microsoft’s plans to consolidate around ODBC and deprecate OLE DB
Though this is an older post, thought that these facts might be useful to read again. Microsoft's recent announcement that they would focus more on ODBC and deprecate OLE DB has raised a lot of questions. Amina Saify at Microsoft recently posted some questions and answers. Some interesting points were:


Is application virtualization the answer for users of XP?
Suppliers of application virtualization technology, such as AppZero, Citrix, Moka5, Spoon, VMware, and even Microsoft, have long been talking about the day that Windows XP would die and suggesting that their application virtualization products could make the transition easier. To a company, they suggest that Windows XP applications can be easily and smoothly moved over to a new operating environment without requiring changes to the applications themselves.


How the Walking Dead Uses Big Data to Make Life-Or-Death Decisions
The game operates as a type of choose-your-own-adventure story, asking the player to make quick decisions about what to say from the provided dialogue options. One of The Walking Dead’s greatest successes is that every choice is a new dilemma, eschewing “good” and “bad” options in favor of choices that are all a matter of perspective. Early on in the game, you have to choose between saving one character over another, and there’s no right answer.


15 Inspiring Videos for Web Designers
We believe it is absolutely fundamental to dedicate time to listening to the great visionaries of your chosen field who can help you see things from a different, innovative, and enriching viewpoint. These forward thinkers can help you attack projects with a renewed determination and encourage you to step out of your comfort zone - dive in head first to an unfamiliar sector, or experiment with the latest technology or programing language!


The 5 Common Characteristics of Ideas That Spread
Your success as a creative depends not only on coming up with great ideas and making them happen, but also with getting those ideas adopted by your target audience. Whether it’s the buying public, an art dealer, or just your direct supervisor, getting your work off of your hard drive and into the world is perhaps the most important (and scariest) part of creative work.


NuoDB Takes the Wraps Off Blackbirds Database
If version 1.0 was about getting the database off the ground, version 2.0 is about making it fly farther and faster. NuoDB CTO Seth Proctor recently explained the significance of Blackbirds in a telephone interview with Datanami. “We've worked very hard in this release to make it be something that feel like something very familiar, that has increased number of data types, functions, language features, and management capabilities… to really get the type of maturity that people want from a relational database,” he says.


Jokes aside, some IT managers say there's no option other than BlackBerry for security
"As for alternatives to BlackBerry, there aren't any," wrote Sandra Smith, an enterprise IT manager, in an email to Computerworld, although she didn't identify her organization. "Due to the Snowden revelations, we now realize that if you are running Microsoft/Google/Apple, you need to protect yourself from your OS and not use your OS to protect you." IT managers and analysts note that the strength of BlackBerry's security comes from the BlackBerry Enterprise Service (BES) server software that is still used by thousands of government and enterprise customers globally.


Security: The genesis of SDN
The problem with all this rampant implicit trusting now is that "hackers take advantage of it routinely. SDN allows you to do trust consolidation and have a few trusted entities; everything else is untrusted," said Casado. SDN provides more control of the architecture and the distribution model of the control plane, which makes it possible to consolidate trust into fewer elements.


An Innovation Disconnect
So when a senior leader proudly proclaims, “We will achieve high performance through innovation … ” most of us, at least momentarily, suspend our disbelief. We let our enthusiasm for change overpower any cynicism left over from previous efforts to change the world. (“Reengineering,” anyone?) With our platitude filters temporarily disabled, we follow leadership’s directives down a path that is likely to fail.



Quote for the day:

"If you don't like something, change it. If you can't change it, change your attitude." -- M. Angelou

October 17, 2013

Pushing the Boundaries of In-Memory Performance
Challenging those assumptions, Microsoft engineered for dramatically changing latencies and throughput for so-called “hot” transactional tables in the database. Lock-free, row-versioning data structures and compiling T-SQL and queries into native code, combined with making the programming semantics consistent with SQL Server means our customers can apply the performance benefits of extreme transaction processing without application rewrites or the adoption of entirely new products.


SDN Adoption Puts DevOps Pros in High Demand
This push toward automation is a crucial element of SDN technology and one of the main reasons DevOps experience will be in high demand, says Shah. "The kind of expertise you'll look for is no longer a hard-core, specialized programmer who focuses on individual devices and pieces of the network, but someone who can write code or scripts to automate processes and actions," Shah says.


Hackers attack PR Newswire, get user data
PR Newswire, a company owned by marketing and communications services firm UBM, confirmed the breach Wednesday. "We recently learned that a database, which primarily houses access credentials and business contact information for some of our customers in Europe, the Middle East, Africa and India, was compromised," Ninan Chacko, PR Newswire's CEO, said in a blog post.


An iPad wish list for the enterprise
While new iPads would definitely focus on consumer features, Apple could also continue its efforts in the business and enterprise sectors with new features for business users and enterprise IT. With that thought in mind, here's my next generation iPad enterprise wish list. While some of these features are all but certain, there are some that are also a bit unlikely.


Does SSL decryption deserve a place in the enterprise data center?
While this practice might seem underhanded at first glance, there are valid reasons why SSL decryption has been implemented in numerous enterprise networks. The first reason pertains to protecting proprietary or sensitive information from being stolen from an enterprise network. However, a report by analyst and research firm NSS Labs Inc. states that the primary reason for implementing SSL decryption has to do with SSL-encrypted malware.


Oracle plugs critical security holes that are putting systems at risk
Out of 51 vulnerabilities patched in this Java security update, 40 affect only client deployments which include the frequently targeted Java Web browser plug-in and 8 affect both client and server deployments. These vulnerabilities can be exploited through Java Web Start applications or Java applets, and, in the case of flaws that also affect server deployments, by sending data to application program interfaces (APIs) in the vulnerable components.


Best practices for combatting integration problems
"When you go to IBM, you get an integrated IBM solution. When you go to HP, they lead with an HP solution. But when you say, 'I already have Dell servers, and I'd like to add HP storage,' that can become problematic, and that's where the integration challenge comes from," said Roger Channing, chief technology officer at MicroTech. "That's where customers are coming from. They don't want to buy bits and pieces and integrate it themselves. They want one belly button they can press to say, 'Here is the solution.' It's our job to make sure the integration is done correctly."


5 ‘Unsolved Problems’ That Have Now Been Solved and the Stories Behind Them
What connects being late to class, computer games, and being a recluse in your mum’s house? No, it’s not the latest Grand Theft Auto game. These are, in fact, the approaches to successfully solving some of the longest standing ‘unsolved problems’ – those which have puzzled the world’s brightest for centuries, until a new approach sparked a breakthrough. Each has its own interesting story behind it…


An API for Simple HTTP Requests
URLDownloadToCacheFile is one such API and comes courtesy of Internet Explorer. This function is ideally suited to console applications because it doesn't imply any particular threading model. It blocks while the file is downloaded and provides progress reporting using a callback. I'm going to show you how to use it to write a console application to download a given HTTP resource, present progress and download the file.


Snapping out of your leadership struggle
There are plenty of reasons for this struggle. It might mean that you’re unhappy in your job, frustrated with all of the things that are out of your control or that you’re lacking a skill set that will help you lead at your best. No matter the reason, there are some things you can do to ease the struggle, clearing your heart and your mind for making decisions and taking action that will send you on your way to greatness



Quote for the day:

"Start by doing what is necessary, then do what is possible, and suddenly you are doing the impossible." -- St. Francis of Assisi

October 16, 2013

The New HIPAA/HITECH Rules: Compliance vs. Cybersecurity
Whether you are a covered entity or BA, it is imperative you understand the difference between being secure and being compliant. The two are not mutually exclusive. The law requires you to be compliant, and with privacy a huge issue in the news, your customers and your reputation require you be secure. Complying with the HIPAA/HITECH rules does not mean you will be secure. In fact, it’s important to remember that 100% security is nearly impossible.


What the Internet of Things Means for Security
Experts say the security threats of the Internet of Things are broad and potentially even crippling to systems. Since the IoT will have critical infrastructure components, it presents a good target for national and industrial espionage, as well as denial of service and other attacks. Another major area of concern is the personal information that will potentially reside on networks, also a likely target for cyber criminals. One thing to keep in mind when evaluating security needs is that the IoT is still very much a work in progress.


Webservices Security: Potential Threats to Combat
Securing webservices is more complicated than any other end user systems, as the webservices are built as the conduit between systems rather than human users. Most of us are very familiar with the first line of defense, namely authentication, data integrity, confidentiality and non repudiation. These are certainly critical security concerns, but there are well established tools and practices that help address these security issues. But, this it not just be enough to be contempt with solving these concerns, as the services are no longer constrained within the trust boundaries.


Is Radical Business Transformation the Only Way?
In its annual Predicts research on industry trends titled "Top Industries Predicts 2014, it has featured 12 strategic planning assumptions that CIOs, senior business executives and IT leaders should factor into their enterprise planning and strategy-setting initiatives. Harris-Ferrante, vice president and distinguished analyst at Gartner says, “Transformation remains a critically important phenomenon across all industries. Many industries will face intense challenges in 2014 and beyond, and will have no choice but to radically change their established business models.”


How the Internet of Things will transform our lives forever!
In an interview to Govindraj Ethiraj, Karthikeyan Natrajan, Global head, Integrated Engineering Solutions at Tech Mahindra says, "If you look at what has happened to the products in the last 20 years, it became smart and the real piece of things that is likely to happen in the next 20 years is that there is going to be lot more intelligence and they are going to be helping you lot more than you're supposed to"


Oracle says open source has no place in military apps
It also warns that open source software may not scale. “Commercial software companies have developed highly refined methodologies to perform these tasks,” the document suggests. “Don’t underestimate the difficulties associated with testing open source software and incorporating required changes into the main development stream, especially when it comes to testing for robustness and reliability under load”.


Webcast: Security controls to help confront modern cyberthreats
In this four-part SearchCompliance webcast, Ross joins Theresa M. Grafenstine, inspector general of the U.S. House of Representatives, to discuss cyber-risk and effective security controls companies can implement to protect corporate data. Here in part one, they discuss common cybersecurity threats facing modern organizations.


The next server operating system you buy will be a virtual machine
If you visit VMware's Virtual Appliance Marketplace, you'll get an idea of what you're in for in days to come. There are hundreds of virtual appliances ready for you to download and run in your virtual environments. True, due to licensing, most of them are Linux-based, but it won't be long until you're able to purchase and download Windows-based VMs — VMs tailored and tuned for a variety of purposes and applications. In fact, it wouldn't surprise me if application vendors started delivering their applications on VMs too.


Ethernet's 400-Gigabit challenge is a good problem to have
The complexity of the task has only grown since the last standard-setting process, which produced the 802.3ba standard that covers both 40-Gigabit and 100-Gigabit Ethernet, D'Ambrosia and others at the event said. That project started out focused solely on a 100Gbps standard, which service providers wanted, but expanded to include 40Gbps because enterprise servers weren't ready for the higher speed. If the 802.3ba experience is any guide, the next standard -- to be called 802.3bs -- will probably not be ratified until the first half of 2017, D'Ambrosia said.


A lot of data could be stored here one day
It’s not just the power generation features that make Niobrara a good site for a data center: There is also massive network infrastructure already at the site. The Denver area serves as a hub for traffic flowing across the country so the site has 6 long-haul fiber carrier connections nearby, and another 21 fiber connections in close proximity. Sprint, CenturyLink, AT&T, Verizon and Level 3 all run fiber connections by the location. Whoever builds out this data center has plug-and-play network connections that can send data out to the entire world at high speeds.



Quote for the day:

"You are the only one who can use your ability. It is an awesome responsibility." -- Zig Ziglar

October 15, 2013

A 160 TB disk drive?
Regular readers of Storage Bits know that there are two promising technologies to overcome the current limitation: Heat Assisted Magnetic Recording (HAMR) and Bit Patterned Media (BPM). Magnetic bits written at higher temperatures are more stable when they cool and bit patterned media enables higher densities by enabling the use of the entire volume of the magnetic pit. But even these heroic and not yet proven feasible for mass production technologies will only take hard drives up to about 20 TB capacity. That's where 3-D magnetic recording could save the day.


ODB: C++ Object-Relational Mapping (ORM)
ODB is an open-source, cross-platform, and cross-database object-relational mapping (ORM) system for C++. It allows you to persist C++ objects to a relational database without having to deal with tables, columns, or SQL and without manually writing any mapping code. ODB supports MySQL, SQLite, PostgreSQL, Oracle, and Microsoft SQL Server relational databases as well as C++98/03 and C++11 language standards.


Defining Business Architecture
Business Architecture on it’s own only provides a small subset of a complete solution. For example, only understanding a business model doesn’t get your stakeholders any closer to defining a solution to a problem or opportunity. It’s when you bring in the macro level EA methods combined with the other domains of architecture where you really see the power behind business architecture. From an industry perspective, there is a tendency to try to make business architecture an independent framework.


Ten Predictions for Business Architecture in 2020
Architects of all types like to peer into the future and I am no different. When my Forrester colleague, Gordon Barnett, mentioned he was working on a new report on the state of business architecture in 2020, I thought it was time for me to look into my business architecture crystal ball. For the record, I haven’t read Gordon’s article so I have no idea how we align or misalign. Even though business architecture was born out of enterprise architecture, big changes are coming. The children are leaving home, off to greater success than their parents.


Flossie, the 50-year-old computer, to be resurrected
The National Museum of Computing has taken delivery of what it believes is the last ICT 1301 computer to ever have a chance of working again. The machine - known as Flossie - had originally been used to produce exam results for students at the University of London. The museum hopes to put it on display by 2016. One of its trustees said Flossie was one of the first computers specifically designed for use by UK businesses rather than scientific institutions.


Why Precious Leaders Fail
Precious leaders have precious problems. Simple solutions won’t work. Small steps aren’t sufficient. Nothing helps because no one understands. Precious leaders create their own prisons. Precious leaders grow discouraged and isolated, then defeated. Eventually, they run. You’re frustrated and stuck because you’re precious. You can’t take actions that work for “average” people.


Salesforce launches identity service, eyes Okta
Salesforce.com on Tuesday launched an identity service, Salesforce Identity, in a bid to be the central hub to connect Web, mobile and on-premise applications with things like single sign-on, directory integration and authentication. With the move, Salesforce aims to be the keeper of identity for customers, employees and partners. The service is built on Salesforce's Force.com platform and on the surface looks like it competes with Okta on many fronts.


Researchers create indelible record on mankind for aliens to someday find
The nearly indestructible disks were created by the MESA Institute for Nanotechnology at the University of Twente in The Netherlands and The Freiburg Institute for Advanced Studies in Freiburg, Germany. The disk consists of a 338-nanometer (nm) thick layer of silicon nitride on top of a silicon wafer. A 50 nm layer of tungsten is patterned into QR (Quick Response) codes using optical etching lithography on top of the silicon nitride wafer.


Five Key Principles of a BI Program
The partner to the data warehouse in most cases is business intelligence. The proper foundation for data storage is critical, but enabling the business to drive value and make good decisions will take your organization to the next level. To achieve this, a business intelligence program has to be put in place. To get started, here are five fundamental principles of an effective business intelligence program.


Culture Hacking: The Prospect of Magnificence
While leading projects at Bell Laboratories, The Whitewater Group, and Microsoft Jim McCarthy saw there was a better way to build products by focusing on the team. He discusses culture hacking, a distinct kind of culture engineering, expressing a particular hacker ethos, an ethos originating in the world of software hacking, promoting freedom, openness, and embodying rationality and design elegance.



Quote for the day:

"For our own success to be real, it must contribute to the success of others." -- Eleanor Roosevelt

October 14, 2013

IBM Wants to Predict Heart Disease Through Big Data Analytics
Sophisticated analysis of EHR data could reveal the unique presentation of these symptoms at earlier stages and allow doctors and patients to work together sooner to do something about it. IBM is applying advanced tools for analyzing medical data, including text, and reviewing a patient’s health records for new insight. IBM utilizes Unstructured Information Management Architecture (UIMA) to extract the known signs and symptoms to heart failure from available text.


Sketching a Roadmap for EA in the Age of Digital Disruption
EA’s Enterprise Lifecycles – illustrating the need to co-ordinate product, capability, business model and brand with the enterprise strategy and objectives. This is truly an exciting time for practitioners of enterprise architecture and business model innovation. If you’d like to learn more, please review the Hugh Evans's Webinar recording and the presentation


Don’t get fooled by the false “Open” and get locked-in once again
Today, open source is driving much of the innovation around data whether it be OpenStack for IT infrastructures or Hadoop for Big Data and analytics. This is happening to such an extent that many proprietary vendors are being forced to adopt some components of open source technology, whether they want to or not, which can lead to confusion and the risk of IT getting trapped in a “false Open” and once again locked-in situation which will constrain innovation and introduce hidden costs.


Are Entrepreneurs Born or Made?
In the past five years, multiple studies have indicated that there may be an "entrepreneur gene"--or at least that people with certain genetic characteristics and personality traits are more likely to be successful entrepreneurs than others. In his 2010 book Born Entrepreneurs, Born Leaders, Scott Shane, professor of entrepreneurial studies at Cleveland's Case Western Reserve University, suggests that genes don't just influence whether a person will start a business; they may even determine how much money a person will earn. In other words, some people are born to be alpha wolves, and the rest will work


Advent of Predictive Analytics in China
It now seems that that the concept is gaining significance among local corporations and managers. More and more companies in China are now putting into practice this idea and ramping up their predictive analytics capabilities. The reasons for such a growing interest are rather obvious:


20X Faster Hadoop Execution Now Possible With ScaleOut hServer V2
ScaleOut hServer V2 adds a full MapReduce self-contained execution engine that runs standard Hadoop MapReduce code to provide real-time performance for continuous live data analysis. It also provides blazingly fast analysis of large, static data sets. Best of all, you don't need to learn anything new – if you know Hadoop MapReduce, you can use ScaleOut hServer right away.


Applying Agile principles to Service Management
Agile teams work with the principle that plans will change; that we will understand more about the work once we near completion and that no amount of planning really prepares us for the road ahead. This is true for software development projects where Agile is accepted but of course it’s also true for IT maintenance and operational projects too. How many of your projects delivered exactly as predicted on day one? Knowing that business requirements will change frequently and that the assumptions made before work begins are normally wrong, Agile teams handle this by working in iterations.


7 Top Wishes of IT Project Managers
"If the IT project manager doesn't know what his employees are working on, he doesn't know if he can assign additional tasks or if the task is moving forward," Nielson explains. "With a cloud tool that keeps the project in one central location, the whole team can see the project details, in real time, eliminating extra emails that flood inboxes every day."


The programmable WAN: Applications are boss and networks bend
A programmable WAN with SDN allows machine-to-machine APIs to respond to autonomous capacity requests so that when an application or cloud orchestration decides it needs more bandwidth, SDN can immediately increase that bandwidth, Auster said. "Programmable WAN using SDN solves challenges by turning the bandwidth up or down on demand based on application prioritizations for transactions that are latency sensitive, so migrations can complete satisfactorily," he said.


Backdoor found in D-Link router firmware code
Craig Heffner, a vulnerability researcher with Tactical Network Solutions who specializes in wireless and embedded systems, found the vulnerability. Heffner wrote on his blog that the web interface for some D-Link routers could be accessed if a browser's user agent string is set to "xmlset_roodkcableoj28840ybtide." Curiously, if the second half of the user agent string is reversed and the number is removed, it reads "edit by joel backdoor," suggesting it was intentionally placed there.



Quote for the day:

"Data mining is the search for new, valuable, and nontrivial information in large volumes of data." -- Mehmed Kantardzic