November 02, 2013

A Different Methodology for Big Data
MVI basically considers the minimum hurdle that validates a new approach to problem solving by delivering insight that hasn’t been possible before. MVI works by taking a flexible and agile-based approach to validating a methodology for solving problems that provides an “aha” moment of insight. The insight has to be intuitively valuable for MVI to work, so it helps organize a focus on real problems to be solved.


Computer-Controlled Anesthesia Could Be Safer for Patients
Brown’s group has been studying the anesthetized brain both to further scientific understanding of consciousness and to make anesthesia safer and more effective (see “The Mystery Behind Anesthesia”). The pattern of brain activity that doctors monitor to control sedation is well defined and can be recognized by a computer, says Brown.


Start your journey to cloud, take a 360 degree view (part 3)
One of the key elements enterprises should setup is an appropriate governance ensuring business and IT get aligned on what services are required and how those are delivered. And I use the term here in its widest sense. All parties need to be aligned. Now, there are two aspects of governance to be addressed. The first one is related to the journey to cloud itself. The objective is to ensure decisions taken in one of the four areas are properly taken into account in the others.


IT Security Considerations for Departing Employees
If current employees are a potential security risk (purposely or naively), consider the larger risk that a departing, potentially disgruntled, employee might be. Whatever company loyalty an existing employee might have had (perhaps out of the concern of losing a job) soon disappears when the employee is gone. Especially in this time of ever increasing security risks, continued company layoffs, and economic turmoil, it is important to make sure you have your IT backs covered against the mischief a departing employee might cause.


FAA allows passengers to keep electronic devices turned on
There is one big exception to this, however. Passengers still cannot use their cell phones to make voice calls during the flight, based on Federal Communications Commission rules prohibiting their use. The FAA is asking the FCC to reconsider those rules. The concern is that long-range cellular communication could interfere with the airplanes avionics, so no mobile devices can use cellular communications during flight, the FAA explained.


Cisco Making A Business Out of the Internet of Things
When networking giant Cisco looks at the Internet of Things, what it sees is an opportunity. This week, Cisco officially launched its Internet of Things business unit in a bid to consolidate its efforts and fully capitalize on the opportunity. Guido Jouret, general manager of the Internet of Things Group at Cisco, explained to Enterprise Networking Planet that new network connections are a good thing for Cisco. He noted that 25 years ago, most connectivity was very heterogeneous, but that that evolved as IP became dominant in the enterprise and for the Internet.


Herding Clouds: IT Faces Its Hybrid Future
Integrating cloud services isn't an easy task, which explains why one-third of respondents to our Cloud Computing Survey don't even try. Another 41% take the laborious, costly and error-prone path of custom-coding scripts or application stubs around each vendor's API to bridge internal and external systems. Manual coding is an obvious nightmare for application developers, but don't underestimate the challenge it creates for IT operations teams trying to manage a hybrid infrastructure and deploy applications across multiple clouds while guaranteeing service levels.


Is Thought Leadership the Same as Change Leadership?
We all toss our opinions on the table, but the thought leader does more than that. Thought leaders put ideas and opinions out that have underlying rationales capable of being tested, adapted and evolved. More importantly, the thought leader “leads” by doing the thinking that others won’t, don’t or can’t. Thought leaders stand by their ideas and in doing so, reframe and shift discussions in the direction that allows the solution to present itself. Thought leaders don’t take the debate on their ideas personally; they accept “wins” and “defeats” gracefully


Master Data Services (MDS) Operations Guide
SQL Server Master Data Services (MDS) provides a central data hub that ensures the integrity of information and consistency of data is constant across different applications. With MDS, you can implement a master data management (MDM) hub to manage the master data that is stored in an enterprise database. This article provides guidance about how to install, configure and manage SQL Server 2012 Master Data Services. You also learn how to deploy a Master Data Services model and create a SQL Server Integration Services (SSIS) solution to monitor MDS.


Brazil to insist on local Internet data storage after U.S. spying
If passed, the new law could impact the way Google, Facebook, Twitter and other Internet giants operate in Latin America's biggest country and one of the largest telecommunications markets in the world. A draft of the law says "the government can oblige Internet service companies ... to install and use centers for the storage, management and dissemination of data within the national territory." The government would evaluate the requirement for each company, the draft says, "taking into consideration their size, their revenues in Brazil and the breadth of services they offer the Brazilian public."



Quote for the day:

"I don't believe in taking foolish chances. But nothing can be accomplished without taking any chances at all." -- Charles Lindbergh

November 01, 2013

With big data, the DNC turns politics into political science
To learn more about how the DNC pulled vast amounts of data together to predict and understand voter preferences and positions on the issues, join Chris Wegrzyn, Director of Data Architecture at the DNC, based in Washington, DC. The discussion, which took place at the recent HP Vertica Big Data Conference in Boston, is moderated by Dana Gardner, Principal Analyst at Interarbor Solutions.


The workplace holy grail: Successful collaboration
Collaboration at its core is harnessing the differences that each person brings and leveraging the contributions of individuals to create a greater sum. This is the fastest, most efficient way for organizations to accelerate growth. The greater sum is an exponential factor that moves companies forward at a rate that can never be achieved by singular individuals.


6 dirty secrets of the IT industry
"There are no secrets for IT," says Pierluigi Stella, CTO for managed security service provider Network Box USA. "I can run a sniffer on my firewall and see every single packet that comes in and out of a specific computer. I can see what people write in their messages, where they go to on the Internet, what they post on Facebook. In fact, only ethics keep IT people from misusing and abusing this power. Think of it as having a mini-NSA in your office."


Challenges facing the CIO in 2014
With factors like the cloud, BYOD, and big data making waves in a big way, the CIO needs to start reevaluating his or her role. What can you do to make yourself valuable in this changing environment? Here are some considerations to keep in mind as you step into 2014 and encounter some big changes.


Gartner: Cloud-based security as a service set to take off
According to its “Market Trends: Cloud-based Security Services Market, Worldwide, 2014,” Gartner is predicting growth is likely to come because of the adoption of these cloud-based security services by small- to-mid-sized business (SMB) in particular. Certain market segments mentioned in the report will see higher overall sales and year-over-year growth.


To Build a Great UI, Test the Experience, Not the Code
Because usability testing involves end users, it can be confused with "end-user testing." You should use end-user testing to test your code because users are cheap and available, and because users have some understanding of the business, so they're easier to train to do the tests (and their feedback makes more sense than what you'd get from strangers off the street).


Red Hat Targets OpenShift PaaS Tools for Enterprise App Development
The tooling is aimed at helping JBoss developers build apps for PaaS clouds without having to learn new development techniques, Cormier said, describing xPaaS as "a developer interface to the operating system of the cloud." He added, "There is a real, real gap between low-level services provided by existing PaaSes and what is needed for composite enterprise apps of today."


The CIO as technologist, strategist, business executive — and diplomat
When CIOs approach challenges, a practical approach is advisable, he adds: "It starts with some humility, some under-promising and over-delivery. It starts with some consistency in that regard. It also starts with developing a vision, strategy and roadmap that you follow and execute over a period of time." Strategy counts for a lot, says Carter, and not only in IT but in the business you serve.


Game over: Microsoft Office is killing Google Apps and anemic iWorks
That Computerworld article mirrors what analyst research is finding: Office dominates, especially in the enterprise. A recent Forrester Research study found that Microsoft Office 2010 is used in 85% of companies surveyed, Office 2007 by 51%, and Office 2003 by 28%. (Many companies use multiple versions of Office.) The survey found that Google Docs is used by only 13% of companies.


Applying the scientific method to software testing
The scientific method is based on observation and experimentation. Testing is the same thing. We set up tests that are very much like experiments, and then we run them and observe what happens. That's the same way scientists test their hypotheses. We run experiments, measure the results and analyze the data to figure out what's really happening.



Quote for the day:

"Developing a passion for learning something new every day expands your capacity to become exceptional at everything you do" -- A. Bellemare

October 31, 2013

Silent Circle, Lavabit unite for 'Dark Mail' encrypted email project
"The issue we are trying to deal with is that email was created 40 years ago," Jon Callas, CTO and founder of Silent Circle, in a phone interview. "It wasn't created to handle any of the security problems we have today." Silent Circle, Lavabit and at least one VPN provider, CryptoSeal, shut down their services fearing a court order forcing the turnover of a private SSL (Secure Sockets Layer) key, which could be used to decrypt communications.


Massachusetts grills Deloitte over large IT failures
It is striking to note that most personnel testifying were not present when the projects were begun, due to the long time frames. Therefore, the business case and underlying rationale were handed down, almost like folklore, from one administrator to the next, and metrics were ill-defined or non-existent. The lack of clear metrics governing expected outcomes helped Deloitte argue that these projects were a success.


Availability Group Listeners, Client Connectivity, and Application Failover (SQL Server)
If read-only routing is configured for one or more readable secondary replicas, read-intent client connections to the primary replica are redirected to a readable secondary replica. Also, if the primary replica goes offline on one instance of SQL Server, and a new primary replica comes online on another instance of SQL Server, the availability group listener enables clients to connect to the new primary replica.


Rise in Data Breaches Drives Interest in Cyber Insurance
"With no standard set of actuarial tables, insurance carriers are often left to their own underwriting standards and creativity when offering cyber insurance policies," they wrote. "A lack of actuarial data also makes cyber insurance less desirable to companies, while increasing the price." Insurers, though, have gotten better at quantifying certain kinds of cyber risks. "Where cyber insurance has gained some traction is in an area that's more quantifiable -- the data breach area," Andrew Braunberg said in an interview.


Talk networking strategy over technology
"Each of us carries two, three, or even four Wi-Fi-enabled devices. The heavy load of BYOD [bring your own device] and application volume is crushing conventional wireless networks, which is why we developed an architecture to deliver wired-like performance over Wi-Fi. Resellers must understand that application and device adoption is changing the rationale and choices IT managers make in implementing wireless,” Armstrong says.


Improve security through shared intelligence
While the value of sharing may be straightforward, security data itself is complex. Once an organization has made a strategic decision to join forces with other good guys, the difficulty lies in knowing what data to share and how to share it without introducing risk. ... Maximizing the benefits of shared intelligence requires more than simply feeding data into a system. Back-end analytics can help find needles in the haystack, and participants can collaborate when they spot anomalous activity.


10 hard-earned lessons from a lifetime in IT
Much of today's talk is about youth ruling development and IT. Sure, there are a lot of eager, bright young people in tech, and most of them like to think that they "rule," but the truth is we oldsters still run the show. Why? Because hard-earned lessons provide the wisdom to distinguish fantasy from reality, and the determination to do what's necessary, not just what's fun or cool. As a green programmer, I thought that coding was everything, that people were annoying and clueless, and that all my bosses had my back and would take care of me so I could just focus on the bits and be happy.


Juniper Launches MetaFabric Network Architecture, Switches
The capabilities found in the new MetaFabric offering are increasingly important to cloud providers and other companies that run multiple data centers in disparate locations and want to move their applications and network resources between them, according to Jonathan Davidson, senior vice president and general manager of Juniper's Data Center Business Unit. "Businesses have the need to move to an on-demand architecture," Davidson told eWEEK


New Algorithms May Give Keys to Predicting the Future
“The key insight,” explained Dr. Lionel Barnett in a statement, “is that the dynamics of complex systems – like the brain and the economy – depend on how their elements causally influence each other; in other words, how information flows between them. And that this information flow needs to be measured for the system as a whole, and not just locally between its various parts.”


How Organizations Are Improving Business Resiliency With Continuous IT Availability
As business demands for availability are increasing, so too are the risks. Every week there is news of another organization experiencing a major disruption. A company’s eCommerce website may be down for a few hours because of human error or a botched upgrade, or extreme weather like hurricane Sandy or even a severe winter storm can throw an organization into chaos. Why are there so many frequent disruptions and outages?


Quote for the day:

"The trouble with most of us is that we would rather be ruined by praise than saved by criticism." -- Norman Peale

October 30, 2013

Why is Twitter spending so much on R&D?
There is no sign that Twitter is working on anything that cool. Twitter actually gives very little detail about what it spends its R&D budget on in the offering documents for its IPO. It says that R&D expenses are to "improve our products and services." And it doesn't appear that Twitter is building some kind of high-tech lab or supercomputer. In fact, the bulk of Twitter's R&D expenses go toward personnel-related expenses.


Three strategies to align organizational compliance and security goals
Compliance teams sometimes feel that their concerns go unheeded, for example, when a requirement remains unaddressed despite investment in other areas. By contrast, technical or security personnel may look at compliance activities as siphoning budget from investments that reduce technical risk. This can be a challenging situation, but there are strategies to help overcome these hurdles or even ensure that they don't arise in the first place.


A Hybrid Cloud May Be the Answer for Midsize Businesses
The hybrid cloud is essentially a mixture of two cloud computing solutions, most often one contained within the data center and one hosted through a public cloud provider. The mixture of these two types of solutions can vary, but it is most powerful when the private cloud is used for types of data that simply cannot be stored or processed through a third party. The public cloud is used for noncritical data storage and cloudbursting, in which the public solution is tapped if internal resources become stressed due to a spike in demand.


Do software engineers need adult day care?
So if work perks aren’t necessary why do so many companies insist on providing them? Surely, that’s a distraction from their business? And it’s not good for the surrounding community because they are competing with local small businesses trying to make a living providing basic services such as dry cleaning, etc. This is especially worrisome when a large company such as Google continues to expand its footprint in the middle of Silicon Valley, and its free food and services are pushing local business into bankruptcy.


Dell to show its first 64-bit ARM server this week
"This is a key milestone for customers seeking to run real-world workloads on 64-bit ARM technology," Dell executive Robert Hormuth will announce in a blog post this week, according to a copy of the post sent to the IDG News Service. Hewlett-Packard, meanwhile, is moving forward with its own low-power server plans.


The art of strategy
Good strategy isn’t easy. Yet we know vastly more today than we did even a year ago about how corporate strategies should be crafted and implemented. In this video, McKinsey principal Chris Bradley and director Angus Dawson trace the evolution of strategic thinking in recent years; outline a thorough, action-oriented approach executives can adopt; and discuss strategy’s next frontiers.


IT Spending to Grow More in Digitalisation
“What many traditional IT vendors sold you in the past is often not what you need for the digital future. Their channel strategy, sales force, partner ecosystem is challenged by different competitors, new buying centers, and changed customer business model,” Sondergaard said. “Digitalization creates an accelerated technology-driven start up environment across the globe. Many of the vendors who are on top today, such as Cisco, Oracle, and Microsoft, may not be leaders in the Digital Industrial Economy.”


Java under attack — the evolution of exploits in 2012-2013
Exploits still pose a threat even when the user knows they exist, is well versed in IT security and keeps track of software updates. That’s because when a vulnerability is detected it can take weeks until a patch is released to fix it. During that time exploits are able to function freely and threaten the security of Internet users. That risk can be reduced significantly if users have high-quality security solutions installed on their computers, including technology capable of blocking attacks initiated by exploits.

CIO vs CDO: There can be only one
"In government, as well as other industries, roles like chief data officer or chief digital officer are emerging in response to the increasing importance of enterprise digital assets," Gartner managing vice president Andrea Di Maio said. The chief data officer role is focused on ensuring that heavily-regulated industries handle data in a way that complies with the rules. Before these CDO and CIO roles swallow each other, existing CIOs and CTOs should form a close working relationship with both flavours of CDO, Gartner said, particularly if they don't want their roles to collide in the near future.


Bigger Data? Or Better Models? Or…..
If you work in the analytics world, you’ve probably either read or at least heard of the seminal book "Big Data: A Revolution That Will Transform How We Live, Work and Think," published earlier this year. Authors Viktor Mayer-Schonberger and Kenneth Cukier’s provocative point of departure is that the new data norm of N=all and a tolerance for simple correlation over causation is changing the analytics landscape, obviating the need for much of traditional statistical analyses.



Quote for the day:

"I think any man would be nervous if his liberty is at stake." -- Wesley Snipes

October 29, 2013

Stop chasing the rats, and protect the cheese
From our perspective we've seen many different threats to data, many different factors to it. I think the one that is being skipped over and over again is the insider, because it usually comes down to a question of trust. But it's not so much trust of the individual, but trust of the architecture that you have built. Do you trust how your users interact with your data, how they manage the data, and can those become compromised and used against you?


Taming Unrestrained Data Growth in the Big Data Era
Many organizations today are fully aware going in that the volume, variety, and velocity of data continue to grow at a nearly unprecedented rate. And yet they often attempt to handle this rising tide of data without a plan. Moreover, legacy, manual methods of discovering, governing, and correcting data are no longer practical for this tremendous growth of big data.


You Can’t Be a Wimp—Make the Tough Calls
Good executives don’t let concerns about the consequences make them indecisive, however. One midwestern CEO was outperforming by a mile in the late 1990s, when the top brass at Home Depot said they wanted his company to supply theirs. Volume would obviously go up, but selling to the retail powerhouse would have several negative consequences for the brand in the long run. The CEO didn’t think it was the right thing for his company and said so.


How to more easily upgrade your network to 40/100G Ethernet
“You see a lot more in-rack virtual switching, VM-based switching that is very application specific,” Walsh says. “New line cards in new backplane architectures mean different levels of oversubscription. There’ll be generational tweaks, configuration ‘worrying’ that has to occur. The biggest thing (testers) are running into is making sure you get the 40G you are paying for (with regard to) latency issues, hops, and congestion visibility.”


Enterprises Encourage Open Source Culture
Open source culture is ultimately collaborative, and expertise-driven. Developing a successful open source culture inside an organisation also means developing the skills and abilities of technical employees, so that they can produce high-value, reusable work, rather than be constrained to simple operational tasks. Ideally, organisations want IT administrators to automate tasks and control them via policy, rather than requiring manual intervention for every activity.


Smartphones: Business Risk or Opportunity?
Smartphones and tablets are the most popular and pervasive devices used by business professionals today. Their simplicity, flexibility and convenience make them as compelling for executives working on the road as they are for consumers playing and socializing at home. But now that the smartphone genie is out of the bottle, business owners, CIOs and IT leaders must work together to harness the efficiencies these powerful tools afford, while defusing the security threats they pose.


JSIL: Challenges Met Compiling CIL into JavaScript
One of the major challenges involved is actually somewhat counter-intuitive - generating good JavaScript from IL not only requires decompiling the IL, but reversing some optimizations performed by the compiler and then applying new optimizations of my own. Doing this correctly without manual guidance from a developer requires a very, very robust knowledge of static analysis and other related topics, as without that you cannot implement optimizations without introducing significant bugs into user code.


Public Cloud, Private Cloud, and Fuzzy Cloud Demarcation
Public, private, or community attributes specify how widely the cloud service is shared; a sharing dimension. Internal or external denote the consumer’s view of the Cloud’s service interface. The view is associated with a consumer’s responsibility for service development, operations, and management; a responsibility dimension. A third dimension, on-premise or outsourced, describes where the service assets are located; a location dimension. Many architects conflate the three dimensions.


Promote Your HR Leader, Reap Profits?
“We think what that says, based on this analysis and some other studies we’ve done, is that a chief human resources officer can drive an agenda within the executive board about aligning people to goals, and they can insure that performance appraisals are done,” says Karie Willyerd, vice president of learning and social adoption for SuccessFactors.


Exclusive Documents: State Department Lacks Basic Cybersecurity
These newly obtained documents add to the picture, revealing that the department lacks even a basic monitoring system to determine unauthorized access or modification of files. Security on the unclassified systems appears problematic, as there is potential access to classified information, even inadvertently, and back-door access to servers.



Quote for the day:

"All adventures, especially into new territory, are scary." -- Sally Ride

October 28, 2013

The three waves of disruptive trends
... there’s three waves you can catch around the same trend: the emerging wave, the differentiating wave, and the business value wave as shown below. That is, not only riding the wave around each disruptive trend, but riding the same wave of a particular trend multiple times during its journey to the shoreline. These three waves follow the adoption of the technology as it progresses from pioneers to mainstream adoption.


Broad Data - How to Use it and Where to Find it
Logically, we should expect competition to drive more adoption of broad data, barring regulatory or cultural barriers. A good case in point is in motor insurance, where insurance companies will try to gather more and more data about drivers, to help them form a more accurate view of the risk, and hence a more accurate premium. Where that accurate premium is lower than competitors’ premiums it will gain profitable business. Where it is higher than competitors’ it will lose unprofitable business.


Is Your DNS Server A Weapon?
DNS requests are an ideal mechanism by which attackers can increase the amount of traffic thrown at their victims, while hiding the origin of the attack. Many DNS servers on the Internet are configured as "open resolvers" that accept and respond to DNS queries from anywhere on the Internet. Sending very small requests to these servers can result in large replies that can be directed toward a victim's systems


ERP Comes to the Cloud and (Finally) Smaller Businesses
"In the midmarket, one of the big hurdles to greater ERP adoption has been the infrastructure. These businesses don't always have the funds or the technical ability to build their own data center, to have the infrastructure that can support a full-scale ERP solution," Stangeland says. But that requirement's going to evaporate with the cloud, he says. In addition, a per-user, per-transaction pricing model makes ERP affordable for any sized business, and those cost savings can be reinvested in the business to spur growth, Stangeland says.


Lean Enterprise Anti-Pattern: The Lean Waterfall
More and more enterprise scale companies are drinking the lean Kool Aid and starting to implement Lean Startup methodology. In doing so, they are failing at the most basic level. Lean methodology is not lean startup. An MVP is not learning. A Business Model Canvas is not business model innovation. These things are just artifacts. They are workarounds. These workarounds, applied poorly and/or inappropriately, can result in some wonderful anti-patterns.


Seagate announces Ethernet-enabled storage platform
Using a series of open application programming interfaces (APIs,) developers gain the ability to share data between drives, direct drive-to-drive transit of data without the need for an intermediate controller system, and built-in data integrity checks which the company claims will do away with silent data corruption once and for all. To the operating system, it's all transparent: applications make direct key-based requests to the storage platform, bypassing file system drivers and other overheads.


Cisco Dives Into Data Virtualization
We never thought of Cisco as having a focus on data, even though, if you think about it, most of what its technology does is transport data from device to device. However, there is a beguiling rationale for what Cisco may be planning in combining data virtualization with network virtualization. When you consider it, you quickly realize that a good deal of what happens in BI applications involves moving data around a network, from a database to the BI applications.


What is protocol spoofing as it relates to WAN optimization?
"Protocol spoofing" is actually a homonym, expert Ed Tittel explains: In the information security world, protocol spoofing masks a TCP packet to look like something legitimate. In the world of application delivery optimization, it is not malicious -- but rather helpful in optimizing traffic across a wide area network. Protocol spoofing is a WAN optimization technique that is synonymous with the term "protocol substitution."


Tearing down IT silos
Today’s IT infrastructures are more complex and interdependent than ever before. Hiccups in the infrastructure inevitably put business operations at risk. We’ve all seen the headlines of IT related outages that have real business consequences such as lost revenue and damage to a company’s reputation. These factors are driving IT organizations to rethink how they work.


Supercomputers Invade Corporate Datacenters
Other than the rapid spread of supercomputer architecture built on ranks of processors paired with GPUs that act as accelerators, the biggest surprise in the 2013 study was “the large proportion of sites that are applying big data technologies and methods to their problems and the steady growth in cloud computing for HPC,” according to Earl Joseph, IDC technical computing analyst, in a statement announcing the study.



Quote for the day:

"The only real mistake is the one from which we learn nothing." -- John Powell

October 27, 2013

Five reasons for master data management failures
When companies forge ahead with an MDM implementation without proper planning, the MDM program ends up not meeting business needs and not being used, and often needs to be re-implemented or modified, costing additional time and money. To help MDM program sponsors and leaders that are beginning their MDM journey, here’s five of the most common pitfalls of MDM programs—and solutions for how to avoid them.


Why Green IT Is Good for Business
Because the hype and excitement over green IT has diminished over the past few years, and the specter of carbon taxes has faded, organizations have begun to put sustainable IT initiatives on the back burner, or even dismiss them entirely. But successful green IT projects usually go hand in hand with operational efficiency initiatives, where benefits drop down to the bottom line while meeting corporate sustainability goals. "Did we make any trade-offs with efficiency versus cost? There were very few," Humphries says.


Global Trends in Financial Services - Strategy
... the need to innovate and compete effectively while reducing costs and meeting regulatory requirements will create job opportunities in the compliance, project and change as well as IT areas within the financial services sector. Big data, faster computers and more powerful analytics software will also offer new opportunities for financial services organisations to improve operational effectiveness, know their customers better and unlock new sources of value both independently and in collaboration with companies in commerce and industry sectors such as retail and telco.


You Can’t Avoid A Software Audit, So Make Yourself Less Of A Target
Organizations struggle to keep control of licensing issues related to technology changes such as virtualization, cloud, bring-your-own-device, and the increasing demand for anywhere, anytime mobile access. There’s a simple truth behind the auditing issues that we see: If you don’t monitor and manage your software ecosystem, audits can quickly become financial embarrassments. To make yourself less of a target,my colleague and I maintain in new research that firms must do the following:


Physical Identity and Access Management Software Can Address Many Challenges
Because of the intricacies involved – and also because of the inherent security concerns – many campuses are looking for a better way to manage these increasingly complex procedures using policy-based automation tools. In today’s education and healthcare environments these tools can increase consistency, reduce manpower related costs, provide better assurance of compliance and ultimately provide a more streamlined process along with an enhanced security environment.


How Software Defined Security Makes Compliance Auditing Easier
IT is flocking to the software-defined data center for cost-savings and agility. Software defined security offers the same benefits but is less well-known and subject to serious scrutiny. This talk will discuss the benefits of software-defined security to next-generation data center protection and compliance while noting the challenges to ITsec and auditors. Software-defined security: It's About Time (and Money)!


10 Myths about HIPAA’s Required Security Risk Analysis
With revamped HIPAA privacy and security rules now in effect that include higher emphasis on conducting a security risk analysis, the federalHealthIT.gov Web site dispels 10 pieces of misinformation about what the rules really require:


Rethink network design with next-gen network security architecture
In this video, Dave Shackleford discusses key initiatives and drivers for rethinking your current network security architecture. Some key points include traffic isolation and segmentation, sufficient security to ensure that the vast amount of data moving through channels is being protected, and software-defined networking, which could really transform network architecture and provide new ways to monitor traffic and perform isolation.


Addressing the Modern Challenges and Opportunities for Disaster Recovery
If done correctly, Disaster Recovery as a Service can decrease the time and effort it takes to store and retrieve data, and, in the event of a DR event, quickly reunite it with the systems businesses rely upon. Overall, it can often be cheaper. IT solutions and managed services provider Logicalis recently released a whitepaper (PDF) on the technologies that are making developing a DR plan “less scary.” What’s really scary, afterall, is that despite the options that exist, many businesses lack a DR plan.


Human Factors in ISMS: Goal Driven Risk Management
Driving forces are all forces that coerce for and elevate change. Senior management’s support and mandate is an evident example of driving forces (Marilynn and Bozak 2003). In contrast, the restraining forces are forces that functioning to hold back the driving forces and prevent a change from happening by creating obstacles and risks. For example, concerns over individual errors could be an obstacle in change goal ISMS strategy. Strengthening driving forces whilst the elimination of restraining forces, ensures succession of ISMS goals, which is preventing risks by providing cost effective control measures.



Quote for the day:

"Never forget to maintain stability while advancing, and never forget to advance while maintaining stability." -- Li Ka-Shing

October 26, 2013

Slash undesirable outcomes through risk-based testing
Identifying and assessing software risks that have the potential to wreak havoc on a software system, such as poor product quality and planning, is no small feat. Mitigating undesirable outcomes poses a challenge because of the breadth of risks and solutions designed to meet them. Using risk-based testing methods helps companies determine the order that features should be examined based on their risk of failure.


Cryptolocker: How to avoid getting infected and what to do if you are
Antivirus and anti-malware programs, either running on endpoints or performing inbound email message hygiene, have a particularly difficult time stopping this infection. Unless you have a blanket email filtering rule stripping out executable attachments, and that tool is intelligent enough to do so without allowing the user to request the item's return from quarantine, you will see your users getting these phishing messages attempting to introduce Cryptolocker.


Solving performance issues with self-adaptive software
While great strides have been made in the advancement of enterprise software and technology, a real gap still exists in the ability of software to be smart, self-adaptive and capable of initiating quality-control changes that can improve performance and functionality. In this discussion between Cameron McKenzie and JInspired Chief Technology Officer William Louth, we discuss the concepts behind self-adaptive software, the illusion of software control and the innovative ideas that led to Louth's JavaOne talk titled One JVM to Monitor Them All.


How Leaders Know When to be an Optimist, Realist or Pessimist
As a leader are you supposed to be an optimistic, a pessimist, an idealist, or a realist? The answer is “yes”. The key is knowing when to be which. The reality is, in some circumstances a leader must be a grim-faced pessimist, while in others it requires being a cheery-faced optimist. How do you know? Here’s a basic guideline to help you navigate this.


How the Next Generation of Databases Could Solve Your Problems
The Enterprise NoSQL is a document-centric database that structures the data in a tree-structure. Every entity is a document that can have a different tree structure and these tree-structures can support any-structured data ranging from full-text data to geospatial data and anything in between. The Enterprise NoSQL indexes what it sees meaning it is capable of indexing words, phrases, stemmed words and phrases (meaning linguistic capabilities), the structure of the document, values and collections (how the data is organised) as well as security permissions (which role has access to what data).


The HealthCare.gov Experience: Why Critical Systems Fail
“The experience on HealthCare.gov has been frustrating for many Americans,” said the Department of Health & Human Services in a blog post. “Some have had trouble creating accounts and logging in to the site, while others have received confusing error messages, or had to wait for slow page loads or forms that failed to respond in a timely fashion. Today President Barack Obama will announce steps to address the problems with HealthCare.gov, including additional phone support for enrollees and initiatives to fix the broken elements of the web application.


Microsoft Surface 2 And Windows 8 Slates Poised To Take Android Market Share In Q4
When you pick up a Windows 8.1 tablet for the first time, regardless of whether it’s Windows 8.1 RT or full Windows 8 Pro, it’s a very responsive, intuitive experience. Even unfamiliar users will get the gist pretty quickly once a few gestures are understood. From their it’s all about brand equity and the platform. You’ve got a Windows device that works with one of the most popular business software suites in the world – Microsoft Office.


Biggest myth - “Enterprise Architecture is a discipline aimed at creating models”
Guess what, it takes few months to create meaningful enterprise x-rays as a result; the architects are not able to spend time in diagnosis and treatment of enterprise problems. Is it because the "enterprise x-ray" a very time consuming work or is it that current architects not skilled at do diagnosis and treatment? The fact is that there is growing disenchantment with the current generation of practitioners.


Agile Information Governance for the new Data Economy
It is becoming an economic problem for organisations who already have more data than they can manage and are struggling with the cost of trying to manage an order of magnitude more. Agile Governance is knowing when and how to spend money on data. What happens if you clean, gut and cook a fish and then after the first bite realise it tastes terrible? If Big Data is like truck loads of fish being dumped on your desk every day how do you know how to find the best tasting fish?


El-Habya'a” or The Technical Debt
However technical debt must be paid back in a timely way because it has another similarity to its financial counterpart and that is: it has interest. This interest is the amount of effort we need to pay each time we maintain the system because of tight coupling, too large classes, untested code or any other form of technical debt which makes code and/or design maintenance especially difficult. From my observations, the interest amount on technical debt is not fixed but it rather increases with time.



Quote for the day:

"Nothing will ever be attempted if all possible objections must first be overcome." -- Samuel Johnson

October 25, 2013

SAN Storage Best Practices for SQL Server
The SAN admin’s been telling you everything’s fine, and that it must be a SQL Server problem, right? Well, maybe – but to find out, you’re going to have to crack open some books – or blog posts, at least. This page is my favorite resources for: How storage works; How SQL Server connects to storage (pathing); How SQL Server uses storage; Vendor-specific SAN best practices for SQL Server; and General SAN best practices for SQL Server


Should Behaviors Drive our Personas?
The Simplicity is not in completing the map. The Simplicity is in understanding the customer and delivering each and every time with relevant communication that attaches to the customer work (CLEAR), their needs (Behavioral) and with desired outcomes (Know, Feel, Do). Do not complete this from your point of view but from the point of view of the customer. Here is my attempt at a Simplicity Persona.


Security tool delivers surprise insights to Domino's Pizza
But in the course of experimentation, Turner says it was discovered that the tool could also see and analyze some business data coming into the Domino’s website that would help the marketing department. “The user gives us information for pizza delivery and now we can pull a log of how many times a coupon was used,” says Turner about what he found out experimenting a bit with Splunk. Previously, coupon usage online was a lot harder to quickly present to marketing, he points out.


Financial services IT spend to reach £265 billion in 2014
"Bankers continue to be selective with IT initiatives, focusing on those that can deliver value to their clients and the organisation, while also satisfying the mandate of reducing costs and improving efficiency,” said Karen Massey, senior analyst for banking at IDC Financial Insights. “Expect to see projects around risk and compliance, core and infrastructure modernisation, customer experience and security, which are lifting our otherwise tempered forecasts."


16 Traits of Great IT Leaders
Being an exceptional leader is about more than getting the job done. You've got to balance your team's need with your goals and objectives as well as your emotions. You've got to think about things from other people's perspective and sometimes do things that, while are in the best interest of the team, might not be great for you. While there a number of different leadership styles, the best leaders share some common traits.


Only 39 percent of IT projects successful? That's a good start
There's actually nothing new in this finding -- in fact, 39% probably is pretty optimistic compared to other studies done over the years, such as Standish Group's Chaos report, which suggests that only 30% of projects meet their goals. Still, there are many areas where IT organizations don't seem to be cutting the mustard. For example, only 43% of the sample report that their IT organizations collaborate with the business on business.


Meet one of Steve Jobs' only bosses
Nolan Bushnell, co-founder of Atari, and founder of Chuck E. Cheese along with a couple dozen other companies, is no stranger to managing people. He was one of Steve Jobs' only bosses. Reining in creative talent and retaining it is a long-nurtured skill of Bushnell's, and his new book, Finding the Next Steve Jobs, aims to teach others how to do the same. Bushnell's advice often seems counterintuitive. Who would want to "hire the obnoxious," "ignore the credentials," "celebrate failure," and "encourage ADHD?"


Getting cloud capacity planning right in the face of oncoming growth
A cloud provider's success is tied directly to its ability to properly estimate resource requirements and to successfully scale its infrastructure without overcommitting and overbuilding. Because cost is such an important element in the competitive cloud equation, as are concerns about reliability and performance, providers need to have a firm understanding of their customers' expectations for Quality of Service as they architect their cloud platforms.


Cisco fixes serious security flaws in networking, communications products
Cisco also released updates that fix a known Apache Struts vulnerability in several of its products, including ISE. Apache Struts is a popular open-source framework for developing Java-based Web applications. The vulnerability, identified as CVE-2013-2251, is located in Struts' DefaultActionMapper component and was patched by Apache in Struts version 2.3.15.1 which was released in July.


Mavericks: The end of Macs in the enterprise?
So, what's the problem? Well, I'll tell you what the problem is. If I'm a CIO, I'm being forced by security concerns to upgrade my users' Macs to an untested operating system. Maybe my company's programs will work with it, maybe they won't. I don't know. As a CIO all I really know is that Apple is forcing me to choose between opening my Mac desktops to attacks or taking a chance that everyone in my office is going to come screaming to my door with complaints about broken programs.



Quote for the day:

"One sees great things from the valley; only small things from the peak." -- G. K. Chesterton

October 24, 2013

Reasons To Use Postgres Over SQL Server (And Vice Versa)
The difference isn’t really that much if you’ve already decided to go down the paid RDBMS route. Not being able to install SQL Server on non-Windows machines is a bit of a letdown, but again, if that’s one of your top reasons, it’s not really much of a reason for most enterprises, as they’re already using Windows servers somewhere. Regarding arrays, it’s true that SQL Server doesn’t have them. There are better and worse alternatives, but aside from parameter input, if you’re using arrays, you’re thinking procedurally and that’s doing it wrong.


IBM Begins Integration of its Cloud Portfolio with Softlayer
The IT company said in June that it had formed a new cloud services division, and after the close of the acquisition in the third quarter, the new division would combine SoftLayer with IBM SmartCloud into a global platform. SoftLayer infrastructure will be the foundation of IBM's cloud portfolio, it said. IBM's Social Learning, a cloud-based global education technology platform, is already in use at Boston Children's Hospital to teach pediatric medicine using real-time videos via a hybrid cloud computing environment.


Predictive policing gets personal
Initiatives are already well underway at the local level in areas such as Los Angeles, where the PredPol algorithm developed by UCLA has been used to analyze seven years of incident information to predict where, within 500 foot by 500 foot areas, or "predictive boxes," certain types of property-related crimes are most likely to occur during an upcoming patrol shift. And then the department can concentrate on those areas during their shifts, or can redeploy police person-power appropriately.


ICANN starts rolling out new generic top-level domains
The first four gTLD strings are the Arabic word for web or network, the Cyrillic words for online and website, and Chinese for game. "It's happening -- the biggest change to the Internet since its inception," said Atallah in a statement. ICANN cleared the four new gTLDs earlier this week. Google, Amazon.com and Microsoft are among a large number of companies who applied for new gTLDs.


Better metrics for planning and tracking data center investments
TCO, ROI, and such are fine, but they measure the status quo in a world of great and constant change. They also presume that everyone wants basically the same thing: lower cost. In fact, business and IT leaders want a lot of things -- only some of which are cost-related. They want capabilities that make them effective, not just cost-effective. ... We need to take a broader, more systematic view and be more honest about what we really need and value, then make IT decisions accordingly. Consider the following criteria


Why and How KeyBank Has Become Big Data-Driven
The impetus for making Big Data a focus for the KeyBank came from CEO Beth Mooney, Bonalle notes. A few years ago, she reassessed the bank's strategy and decided it needed better analytics and insights. "The insight Beth Mooney had was, if we're going to serve our clients well, we need to understand what their needs are and who they are," says Bonalle, executive vice president and director of marketing and insights, who spoke at American Banker's Banking Analytics Symposium in Boston on Friday.


Don't trust a company on its word, trust it on its tech
LinkedIn has not disclosed whether its Intro service would work if a user has enabled two-factor authentication on their email service. Google, for example, has a modified login challenge when logging in via the IMAP protocol (which Intro uses to fetch mail). Yahoo's two-factor system can be circumvented completely due to how it is implemented. Although LinkedIn potentially has the ability to do pretty much anything it wants with your emails, its measure to protect users comes in the form of a pledge not to.


Microsoft and Symantec push to combat key, code-signed malware
Under the auspices of the Certificate Authority/ Browser Forum, an industry group in which Microsoft and Symantec are members, the two companies next month plan to put forward what Coclin describes as proposed new "baseline requirements and audit guidelines" that certificate authorities would have to follow to verify the identity of purchasers of code-signing certificates. Microsoft is keenly interested in this effort because "Microsoft is out to protect Windows," says Coclin.


IT distribution strategy: Distributors upping investments in enablement
"The best true value-added distributors have moved from the mechanics of operations management and channel partner activation to sales and channel enablement," said Kevin Rhone, practice director for the channel acceleration practice at Enterprise Strategy Group (ESG). In their efforts to provide more core value to their partner customers, IT distributors are adding new enablement capabilities for marketing support services, such as analytics support.


Deep Focus on Your Code with CodeLens
It's a new feature in Visual Studio 2013 Ultimate that shows you information about your code directly in the code editor. Before CodeLens, you had to dig through several different windows to retrieve information such as method references, tests associated with a method, the last time a line of code was changed or how many times the code has been changed. Researching and finding this information takes you away from the code editor, and away from writing code. CodeLens changes that by putting this information literally at your fingertips within the code editor.



Quote for the day:

"Most of us have far more courage than we ever dreamed we possessed. " -- Dale Carnegie