November 10, 2013

Gamification – don’t attempt to wear too many hats, (and avoid people who do)
One mistake is to take on people who claim to be expert across a number of areas but in the end are forsaking quality outcomes for a grab at revenue beyond their core skills. Equally, organisations who assume that internal capabilities will suffice are often left with off-the-shelf solutions that look and feel like generic attempts to win the audience over as they lack creative or technical spark.


Cisco Takes Fight to SDNs with Bold Insieme Launch
The Nexus 9000 switches can run in either standalone mode with merchant silicon, or ACI mode, with a combination of merchant and custom Cisco silicon. Merchant silicon on the Insieme Nexus 9000 switches will get you open source, OpenFlow and OpenDaylight controllers, and Cisco's onePK programmability, and other industry understood SDN-friendly hooks like decoupled control and data planes.


XBRL: How to Save a Good Idea from a Bad Implementation
However, the SEC’s XBRL adoption has been marred by the fact that the XBRL filings are not audited like the plain-text filings. As a result, investors and analysts consider the XBRL data to be more error-prone and less reliable than plain-text filings and so they still rely on the ordinary filings. Moreover, some users, such as investors and analysts, are hesitant to switch to XBRL because they lack easy-to-use analysis tools for the data, and they do not want to incur the costs of developing ad-hoc technical solutions


Linking business processes to cloud services and mobile enable them
In the new style of IT I talked about several times already, cloud is only one component of the current IT revolution. The use of mobile devices is another. Increasingly users want to address their information from a tablet or mobile phone. They download applications for that purpose and expect them to deliver all required functions. So, the real question is how we get mobile applications interacting with cloud based services. Rather than talking theory here, let me use an example to illustrate what that means and how it works.


Demand for data experts to double by 2017, say analysts SAS
“The challenge that we are facing is that six out of 10 companies last year had problems hiring the technical skills they needed,” said Karen Price, CEO of e-skills UK. As part of the study, E-skills UK analysed data from IT Jobs Watch to identify the top big data roles and skills that were in demand, splitting them into IT-focused roles and data-focused roles. It found that the top five IT roles in demand were developer, architect, consultant, analyst and administrator.


SQL to Hadoop and back again, Part 1: Basic data interchange techniques
In this series of articles, we'll look at a range of different methods for integration between Apache Hadoop and traditional SQL databases, including simple data exchange methods, live data sharing and exchange between the two systems, and the use of SQL-based layers on top of Apache Hadoop, including HBase and Hive, to act as the method of integration. Here in Part 1, we examine some of the basic architectural aspects of exchanging information and the basic techniques for performing data interchange.


Application Services Meet Up with SDN in the Cloud
F5 Networks, a major vendor of application delivery systems, has created a new architecture to make it easier to provide those services in the age of virtualization and clouds. The Synthesis architecture is based on F5's already shipping BIG-IP hardware and software and its BIG-IQ management system. It makes them easier to license and deploy for applications that may run in an enterprise data center, a public cloud, or both.


What’s the Problem with Mobile HTML5?
Many developers consider performance as HTML5’s main problem, but interviewing a number experts in the field the authors of the report consider it as a false target because performance is automatically improving by new generations of hardware, better JavaScript compilers, the option of using Asm.js, etc.. The main culprit in their opinion has to do with politics, more exactly the fact that the major browser vendors are also mobile OS vendors, interested in channeling applications through their respective app stores.


Why IT Project Governance Is Flawed - And How to Fix It
Enterprise IT projects are massive undertakings for a company, and with every large-scale project, there is inherent risk at many stages. In the current recession, many companies are reluctant to incur risk, which could cost the enterprise millions, even if the successful end-goal is a better, more integrated enterprise system. However, avoiding the enterprise IT project doesn’t eliminate risk; in fact, a well-managed IT project can save companies millions in costs and generate millions in revenues.


Testing professionals: Soft skills are key to success
Competence is the ability to do the right things. Confidence is the belief that the things one does are right. In some jobs, competence may be enough. But when it comes to software quality, Hoffman said, test professionals also need to be confident about the decisions they make. Unfortunately, people usually can't build their own confidence. "I can't see my work with my own eyes," Hoffman pointed out, "because I'm always stuck behind them."



Quote for the day:

"The most successful business people hold onto the old just as long as it's good & grab the new just as soon as it's better" -- Lee Iacocca

November 09, 2013

Saving enterprise-architecture from itself – 2: Personal background
In short, it’s a mess. I’ve written about it extensively, here on this blog and elsewhere, and I won’t bother to go into old ground here: suffice it to say that, in my opinion, the only useful we can do now with all of this IT-centric so-called-’EA’ junk is to strip it right back to the roots, and start again from scratch – it really is that bad. If we don’t do that, they will, increasingly, become far more of a hindrance than a help, for any form of EA – even more of a hindrance than they are already


Webservice Security Standards
SOA adoption is on the rise and Webservices is predominantly used for its implementation. Webservice messages are sent across the network in an XML format defined by the W3C SOAP specification. Webservices have come a long way and has sufficiently matured to offer the required tenets especially on the security domain. In this blog let us have a quick look at the available standards with respect to the security dimensions and look at how the related security requirements are addressed.


Big GRC: Turning Data into Actionable GRC Intelligence
GRC big data clearly allows the organization access to and management over a huge amount of often very sensitive information that although can help create a more risk intelligent organization, also presents numerous data governance challenges, including regulatory compliance and information security. In addition to client and regulatory demands over better information security and data protection the sheer amount of information organizations deal with the need to quickly access, classify, protect and manage that information can quickly become a key issue from a legal, as well as technical or operational standpoint.


Why Converged Communications?
From a business perspective, streamlining is also a benefit, however it is often viewed more in terms of reduced costs (due to the integration of support services) rather than the greater convenience of the support team. The cost savings go much further. Converged communications encourage a greater degree of efficiency which translates into time savings and also resource savings.


Payment card industry gets updated security standard with new requirements
The PCI Security Standards Council released version 3.0 of the PCI Data Security Standard (PCI DSS) and corresponding Payment Application Data Security Standard (PA-DSS), adding new security requirements and guidance for payment-card industry organizations, including merchants, payment processors, financial institutions and service providers. The new version will go into effect on Jan. 1, but organizations will have until Dec. 31, 2014, to make the transition from PCI DSS 2.0.


How to solve operational BI problems with SOA middleware
In traditional BI, the focus is often on setting up a big data warehouse to answer any question. Operational BI, however, is about finding an answer to a specific business problem, usually for a nontechnical user. This means you don't give an analyst a tool to try out. You have to think about giving the nontechnical worker an answer, and make sure that answer is relevant and worth giving as a response on a regular basis.


MDM, MAM in the Top Enterprise Mobility Priorities among ITDMs
Of the organizations surveyed, approximately half have implemented technologies to support mobile devices, with 48 per cent using mobile device management (MDM) and 47 per cent using mobile application management (MAM). Organizations are also recognizing the need to provide Windows apps and desktop to mobile workers, with 41 per cent of businesses using or planning to use application virtualization and 40 per cent leveraging desktop virtualization.


Career advice: Where to focus? Data, data, data
While much energy and focus is put on systems development, if the systems don't operate and run effectively, they will ultimately not deliver the value needed. Since IT systems are now very integral to the core operations of many businesses, the importance of having skilled operators has grown. The best way to stay up to date on regulations that affect IT operations is to meet with other people in your company who are involved with these regulations -- representatives from legal, human resources, internal audit and risk management.


The State of Location Analytics: Ventana Research
Ventana Research’s benchmark research on trends in location analytics show growing enterprise needs for location services and a signification challenge in analyzing information in location context. Mark Smith, CEO and chief research officer of Ventana Research, shares insights from the report, “Ventana Research Business Trends in Location Analytics Benchmark Research – September 2013.”

JavaFX beats Swing: Changing RIA development platform
The change agent was Rob Terpilowski, Lynden applications architect, who chose JavaFX for its more advanced graphical user interface tools. In this SearchSOA video interview, Terpilowski described the selection process and the challenges, including a steep learning curve that came up during the Swing-to-Java migration. Terpilowski spoke about the pros and cons of JavaFX in a session at JavaOne 2013 in San Francisco.



Quote for the day:

“If we did all the things we were capable of, we would literally astound ourselves.” -- Thomas A. Edison

November 08, 2013

A macro-pattern for public sector systems architecture
The pattern is able to serve shared business and technical services to a set of cooperating agencies or departments that already run the same category of services locally. This is increasingly important in public sector and a growing body of thinking emphasizes shared services. Examples are the FICAM (Federal Identity Credentialing and Access Management) standard, which uses SAML2 to federate across different department websites and determines how users are identified and authenticated for online services;


Facebook goes open source with query engine for big data
Standard data warehouses would be hard-pressed to offer the responsiveness of Presto given the amount of data Facebook collects, according to engineers at the company. Facebook's data warehouse has over 300 petabytes worth of material from its users, stored on Hadoop clusters. Presto interacts with this data through interactive analysis, as well as through machine-learning algorithms and standard batch processing.


CIOs Bullish on Cloud Benefits, But Worry About SaaS Data Silos
“Attitudes about using the cloud for business benefits are largely positive. Their biggest worry is the need to integrate their data between their different apps. SaaS solutions are just so easy to bring in, companies worry they might be creating silos of data,” Host Analytics’ CIO, Richard Broome, told IDN. The survey quantifies these concerns by noting areas where respondents said SaaS and other cloud solutions can be improved, according to Dimensional's senior research analyst and study author Diane Hagglund.


Looking Critically at the “Big Data” Revolution: Deloitte Consultants Weigh In
Biel said that “It’s interesting to see it happen,” he said. “Some of it is regulatory-driven, with the accountable care push happening. We see a lot of providers getting into accountable care,” he noted. “And we’re certainly seeing a large number of payers buying up providers, so they’ll have a certain amount of a captive audience, if you will, and from a data perspective, that’s driving the need to pull together financial and clinical data, so that you can really examine a cohort of a population and get to analytics that are meaningful.”


The Many Rooms of the Business Analytics Mansion
Business schools tend to divide their curriculum between hard quantitative-oriented courses, such as operations management and finance, and soft behavioral courses, such as change management, ethics and leadership. The former relies on a run-it-by-the-numbers management approach. The latter recognizes that people and human behavior play a substantial role. This separation of the curriculum is like the rooms in a palatial mansion.


Nasty new malware locks your files forever, unless you pay ransom
“It systematically hunts down every one of your personal files – documents, databases, spreadsheets, photos, videos and music collections – and encrypts them with military-grade encryption and only the crooks can open it,” said Chester Wisniewski, a senior security advisor at Sophos. Even though it’s infected, your computer keeps working normally; you just can’t access any of your personal files. It’s scary, especially if you haven’t backed-up your data.


Understanding servers' Power-On Self-Test codes
The first few steps of a POST are critical. The POST finishes initializing the first CPU and processor cache and then performs a basic initialization of the core chipset. This includes the Northbridge chip handling CPU and memory, and the Southbridge chip for interfaces like Serial Advanced Technology Advancement (SATA) for storage and PCI Express(PCIe) for external devices.


Preventing vs. Responding to Computer Fraud
It's no secret that the increase in information technology has facilitated the perpetration of fraud in organizations. Companies who are most vulnerable include those who do not know how to identify IT-related fraud, do not have policies to prevent such fraud and do not have policies to prevent management override opportunities within financial related systems. If fraud does occur, these organizations may not have an appropriate plan in place to respond.


Security expert seeks to make surveillance costly again
"Fundamentally, this is a debate about data sharing, about surveillance as a business model, about the dichotomy of the societal benefits of big data versus the individual risks of personal data," Schneier told attendees of the Usenix LISA (Large Installation System Administration Conference), being held in Washington this week. "We might not buy [it], but the basic NSA argument is 'You must give us your data because it is keeping you safe.'"


Integrators jump on Cloudera's big data bandwagon
"Together with Cloudera, we help organizations optimize their current technology investments, exploit massive data volumes and new data types, achieving true insight and forward vision to improve operational efficiency," said Scott Schlesinger, senior vice president of Business Information Management, North America, for Cap Gemini. Specifically, Cloudera will be part of Cap Gemini's Big Data Service Center, responsible for designing, delivering and supporting Big Data solutions.



Quote for the day:

"To have long term success as a coach or in any position of leadership, you have to be obsessed in some way." -- Pat Riley

November 07, 2013

Is tiered storage obsolete? Yes and no!
While the economic angle for SDS is interesting, when I listen to enterprise customers and service providers talk about software defined storage, what I mostly hear is a desire to eliminate storage-specific management from application workflows. At a recent industry event, I heard from application and virtual infrastructure admins who want to provision, manage and protect appsusing terms they understand, without requiring intervention by storage professionals.


Putting the ‘Service’ Back Into IT Service Management
When it comes to ITSM, it is extremely important that you understand who your customers and suppliers are. It is equally important that you understand that in your daily job, you can be both a supplier and customer. Every interaction between a customer and a supplier is a “Moment of Truth”. In that moment, you have the opportunity to alter your customer’s entire perception of you, your company and the service you provide. So it’s important that expectations are properly set, service is delivered in a consistent manner, and that you demonstrate empathy for the client.


Different paths to cloud and SaaS enablement yield similar major benefits
The next VMworld innovator panel discussion focuses on how two companies are using aggressive cloud-computing strategies to deliver applications better to their end users. We'll hear how healthcare patient-experience improvement provider Press Ganey and project and portfolio management provider Planview are both exploiting cloud efficiencies and agility. Their paths to the efficiency of cloud have been different, but the outcomes speak volumes for how cloud transforms businesses.


How to analyze hedge fund risk with sparse data
To get around the lack of data or the short data sets, we can use factor models, exposure data or some other type of proxy mechanism. We can also support our decision making by building factor benchmarks or style factors for regression analysis using data that’s available on a daily basis – such as stock and market index data. This helps us understand equity, credit, currency and volatility exposures, as well as some style exposures such as momentum or value versus growth.


SanDisk’s wireless flash drive: A simple storage boost for your iOS or Android phone
SanDisk also makes a Wireless Flash Drive app you can download to use the drive with your phone or tablet. Once you’ve downloaded the app, simply press the lone button on the drive that looks like a Wi-Fi signal to turn it on, then connect to it as you would with any other Wi-Fi connection (it will show automatically show up in your available networks once you turn it on – the drive uses 801.11 b/g/n).


Insight-Driven Innovation
Indeed, innovation will always require risks, some that can’t be quantified, and some that will demand imagination and insight on a very human level. Data will help shape and guide risk-taking, giving direction and clarity to innovative thinking. It provides a basis for the confidence that business leaders need in order to assess viable options, select the ones with the highest probability of success, and put them into action – quickly.


OLTP Clearly in Hadoop's Future, Cutting Says
Cutting didn't don a wig or fancy robe when he made his predictions about the future of Hadoop during a speech at the Strata + Hadoop World conference last week. He didn't wave a magic wand or use a crystal ball. Instead, the plain-speaking technophile made his points by tapping into his own vast repository of knowledge on the topic. Oh, and PowerPoints. "I don't have a time machine. I can't see the future any better than you can," Cutting said. "I'm a guy who, in the past, looked at the present, looked at facts, and decided what to do next. I'm not attempting to look too far down the road."


Google security team drops F-bombs on NSA for internal Google cloud data surveillance
Even Eric Schmidt, former CEO of Google, said if it’s true that the NSA is spying on Google data centers then it’s “outrageous” and “perhaps illegal.” Schmidt told the Wall Street Journal, “The steps that the organization was willing to do without good judgment to pursue its mission and potentially violate people's privacy, it's not OK.” Then he added, “There clearly are cases where evil people exist, but you don't have to violate the privacy of every single citizen of America to find them.”


New server processors and the lower-power, more-memory IT roadmap
Processor designs now highlight efficiency over raw speed; an efficiently designed server processor handles workloads faster and with less power than a monolithic, do-everything processor -- a work-per-watt measurement rather than pure speed. Server processors will diversify in their purpose and functionality, with more emphasis on system-on-a-chip (SoC) designs. By tailoring processors for specific jobs, rather than putting every function into every model, chip makers achieve better performance even at slower clock speeds and lower power draw.


Gartner: Global companies should stick to only two data centres on each continent
Gartner analyst Rakesh Kumar said many firms had too many data centres as a result of business expansion, either organically or through acquisitions over many years. Kumar said, "Having too many data centres results in excessive capital and operational costs, an overly complex architecture and, in many cases, a lack of business-IT agility."



Quote for the day:

“The strength of the team is each individual member. The strength of each member is the team.” -- Phil Jackson

November 06, 2013

Don't Be A Hacker's Puppet
Countless servers are being converted to zombie or drone systems as part of botnets or coordinated attack machines. The risk to organizations is significant. A compromised network can result in embarrassment as you are blamed for the attacks on high-value targets and potentially massive costs from bandwidth and server utilization. Also, being blacklisted on the Internet makes it much harder to do business. Worse, if your infrastructure is used in a particularly heinous crime, it could be confiscated.


Cloud Buyers' Decision Tree
This White Paper describes a Decision Tree that could be used to help you discover where Cloud opportunities and solutions might fit in your organization. It is put forward for discussion, with the intention that this discussion, and validation in the field, will result in a practical tool for use by enterprises. In reverse mode, this Decision Tree can be used to quickly identify the types of business situations for which a particular type of Cloud offering will deliver the most value.


From EJBs to the mobile web: Re-emerging trends in enterprise Java development
If you've heard bad things about JSR 168, you'll be relieved to know that the new version of the API is much more developer-friendly. You even have a wide array of tooling options and technologies that support design and development on the server side or the client side, wherever you feel your greatest coding and scripting talents lie. It's probably a good idea to be involved in the portal development discussion starting at the architecture stage. That way, you can advocate for solutions that use more of the skills you already have...


Does technology improve employee engagement?
Given the parade of data on low worker engagement lately, commentators and analysts have come out of woodwork this year, claiming that the industrial era model of work is "broken", that that even the latest new models (such as social business, better intranets, unified communication, or fill-in-the-blank) for fixing this are "dead", and more. There's little doubt that things could be greatly improved, but what exactly is wrong is as variable as the lens being used, as is the potential range of solutions.


EMC sues startup for stealing trade secrets through staff hires
In a complaint in the U.S. District Court for the District of Massachusetts, EMC has alleged that "dozens of former EMC employees have joined Pure Storage and stolen tens of thousands of pages of proprietary, highly confidential and competitively sensitive EMC materials," in violation of their employee agreements. Many of them broke their agreements with EMC by inducing team members to join Pure Storage, it added.


The business case for information governance management and strategy
The value of governed information is measured by the confidence with which business decisions can be made when relying on that information. We have developed case studies that allow companies to measure all of the hidden costs of securing complete, authentic and validated information. Those costs become new targets that investments in information governance management can successfully attack.


Intel Is Under New Management – And It Shows
Intel saw the unattractive margins offered by ARM processors and didn’t want to commit the billions of dollars required by a fab (a chip manufacturing plant) for a product that would yield profits that were well below Wall Street expectations. The prospect of bargain basement margins undoubtedly figured in Otellini’s decision to say no to the iPhone. In 2006, no one could have predicted that it could have been made up in volume, that there would be a billion smartphone sales in 2014.


5 Signs Your Leadership Style Is Outdated
The most effective leaders know they must continually reinvent themselves. Most leaders don’t. They remain satisfied with the status quo and attempt to use the same style and approach – regardless of the individual employees and /or the organization they serve. This is why they find it difficult to create and sustain momentum in their work and careers. Rather than find ways to be proactive, they find themselves just floating along and afraid to rock the boat.


How To Develop a Big Data Strategy to Outperform Your Competitors
The challenge organisations will face in the coming years is how to become information-centric organisations that make decisions based on massive amounts of data that are collected in real time. Although the number of organisations currently taking full advantage of Big Data is still small, this will change in the future. The result will be that all companies, including the SMEs, will be able to take full advantage of the benefits of Big Data regardless of their industry or location.


Gartner Says Smartglasses Will Bring Innovation to Workplace Efficiency
Smartglasses are expected to have the most impact on heavy industry, such as manufacturing, and oil and gas, because the AR glasses enable on-the-job training of workers in how to fix equipment and perform manufacturing tasks. The impact is likely to be medium for mixed industries, such as retail, consumer packaged goods and healthcare, where the benefits may mostly be looking for information via a visual search.



Quote for the day:

"Peace is liberty in tranquility." -- Marcus Tullius Cicero

November 05, 2013

12 Recent Technologies That Have Yet to Live Up to Their Hype
Indeed, all too often, today's "next big thing" is tomorrow's overhyped tech trend that never took off or lived up to its potential. So what recent technologies have (to date, at least) failed to live up to the hype surrounding their release? CIO.com asked dozens of IT professionals, marketing experts and business owners and managers to find out. Here are their top 12 nominees for the most overhyped technology of the last few years.


The Rise of Flash in the Datacenter
Hybrid combinations of flash drives and mechanical disks have become a viable option for organizations of all sizes. There are many ways IT can architect SSDs into the storage mix. Many are simply adding SSD drives to the PCIe slots in the servers, which also have hard disks (or configuring new server purchases with flash drives) or adding them as direct-attached storage (DAS). Companies managing storage networks are also increasingly adding flash to their storage arrays. In a growing number of shops where performance is critical, some are stepping up to pure flash-based SSD storage.


Is There An App For That? An Increasingly Mobile World Requires Expanding Skill Sets
The ability to keep in constant contact with both co-workers and friends, access data and information in a second, and respond to emails from our desk and our couch, alike. Now more than ever, as society continues the shift toward mobile technology, mobile app developers attempt to stay one step ahead of trends and introduce the newest and best software solutions to businesses and consumers.


Why Creativity Thrives In The Dark
Turns out you need not possess a Nobel Prize in Literature to appreciate the creative confines of a dark room. Psychologists Anna Steidel and Lioba Werth recently conducted a series of clever experiments designed to measure how creativity responded to various lighting schemes. In a paper published last month, Steidel and Werth reported some of the first evidence for what creative masters know by nature: when the lights switch off, something in the brain switches on.


Cybersecurity Is the Board's Business
Computer security is no longer a mere technical challenge; it is a strategic business issue. Protecting against cybercrime has become a critical responsibility of the board, alongside succession planning and setting strategic direction. There is a fiduciary duty to protect a company’s assets, particularly those that are digital, and regulators have made clear they expect corporations to address cybersecurity.


Avoiding cloud lock-in, self-service bloat and private cloud traps
Companies are building API-driven environments. So when they talk to their internal infrastructure, they are talking to it the same way they would any other environment and can use the same tools. This is very clever, because if they ever do need external capacity, they are ready for it. That desire for interoperability drives things like OpenStack. There is a huge concern about lock-in at this point. I won't name names, but having a bunch of VMs from one hypervisor vendor doesn't necessarily lock you in to that vendor, because you can still turn on VMs from another vendor.


BadBIOS: Malware whispers via mic & speakers to PCs disconnected from all networks?
As the “badBIOS” name implies, it’s a rootkit that burrows in to infect a system’s BIOS [Basic Input Output System]. Supposedly this nasty piece of malware is platform-independent -- capable of infecting Windows, Linux, OS X and Open BSD -- has self-healing capabilities, resists erasure, and uses ultrasonic high-frequency transmissions in order to talk to other infectedsystems that are completely disconnected from the Internet and all other networks — aka air gap systems.


20/20 vision of risk
Banks need a system that can use advanced methods to accurately detect risk while overcoming the challenges associated with poor data quality and ‘noise’ generated by existing control systems. A best-of-breed approach to improving risk management is a virtuous circle of data-driven detection and exploration, with a focus on enabling banks to ingest, calculate, explore and prioritize data in a timely manner.


InfoQ eMag: API Technologies
Web APIs are driving important new business and technology models. Download the API Technologies eMag where leading practitioners share their experience on making money from APIs and on API design best practices. InfoQ discover "cloud native" architectures that scale to meet global demand and get hands on building API's from contract to go-live. InfoQ look at connected devices, mashups and consider new standards for security in this free ebook.


Preparing for Recovery: Four Strategies for Disaster Proofing Data
More than ever, robust data protection is imperative to recovery in the event of data loss. In fact, failure to safeguard company data can result in business disruption, devastating losses, and in some cases, catastrophic consequences to the business. Numerous reports and studies show that businesses that go through critical data loss often never recover. Below are the four steps organizations should take to disaster proof their data.



Quote for the day:

"High achievement always takes place in the framework of high expectation." -- Charles Kettering

November 04, 2013

The Integration of Agile and the Project Management Office
It would be incorrect to claim that Agile is simply a looser, less disciplined way of running projects. In fact, on the program level, Agile teams are even more tightly controlled since the progress of one or more projects is monitored and actively communicated in real-time. Unlike the traditional approaches in which reporting is done on perhaps a monthly basis, Agile reporting is in fact continuous and runs in tandem with the six defined levels of Agile planning.


SQL Server Analysis Services (SSAS) : Part 1
SSAS uses both client and server components to provide OLAP and data mining functionality: The Server component is implemented as a Microsoft Windows service. SSAS supports multiple instances on the same computer, so each instance is implemented as a separate instance of a Windows service; Clients communicate with analysis services using XMLA (XML for Analysis), a SOAP-based protocol for issuing commands and receiving responses, exposed as a web service.


Microsoft and Apple unleash thermonuclear war on Google and Android
The lawsuit charges the companies with a number of patent infringements, the most damaging of which may be that Google infringes patents by matching search terms to relevant advertising on mobile devices. This could have a huge effect on Google because the company's game plan with Android relies on giving away the operating system in order to make money via advertising.


Top 5 tips for using IBM Security Access Manager and Federated Identity Manager
"In this article I thought I’d take the time to summarize five of the most useful and frequently used tools of my trade. These are often references to content or advice that I’ve prepared in the past, but specifically content that I am finding re-use for all the time. Hopefully these tools and ideas are useful to both experienced and novice users of our access management and federation products, and if nothing else this article can serve to remind you they exist, and help you find them again."


SaaS & Agile Development: Made for Each Other
SaaS and agile also work together to deliver software updates in a timely manner, a process called "continuous deployment." Agile development in the cloud was discussed this month at a user conference in San Jose, Calif., hosted by Electric Cloud, which offers an agile development platform that is itself cloud-delivered. In attendance were customers such as General Motors, Qualcomm, Cisco Systems, and General Electric, but also smaller, less household-name companies.


CMOs Must Expand Their Tech Skills in the Digital Marketing Era
The balance of power in the C-suite (at least as measured by dollars spent on IT) is shifting. Where once the CIO held most of the purchasing power and the decision-making capability to determine which technology investments would drive business forward, the CMO is poised to take a much more strategic role in a data-driven business climate.


Rock your data with SQL Server 2012 Parallel Data Warehouse (PDW) – POC Experiences
In this blog post we will have a more detailed look on the POC experiences I made with PDW v2 and also with PDW v1. Since these POCs are under NDA I’m not allowed to tell anything about my customer or the customer background. I will purely focus on the results, which are impressive enough ... We used a SQL Server 2012 Parallel Data Warehouse with 8 compute nodes. The ETL Server had 24 Cores, 96 GB of RAM and was connected to the PDW via Infiniband and Ethernet.


9 reasons why your security leader needs a hug
Security is difficult, and security people are unique. They have a different way of looking at things. We try to get away from ‘techno garble,’ which isn’t important to the business. The business needs it in black and white, no theoretical things. ... At the end of the day many of the reasons why working in security is so challenging are also why it’s so rewarding and why the community is so close. There is no expectation that any battle will ever be done. There will always be a thin line that must be held between us and them.


A Cautionary Tale of Data Governance
The financial cost was huge; all of the products had to be scrapped (their contents could not be repackaged without quality concerns), but it didn’t stop there. Advertising slots booked across print, television, radio and online media were cancelled, but refunds were few and far between. Retail customers were even less forgiving; failing to meet agreed trade promotion commitments resulted in extensive commercial penalties.


The Role of Gamification in the Contact Center and Back Office
Gamification is quickly becoming recognized as a strategic means to impact contact center and back office performance. While it may seem quite simple, it is, in fact, a practice that requires a significant amount of planning, so having a strategy is critical. Another important element is technology; real-time guidance and 360-degree customer views enable a wide variety of gamification scenarios. Finally, it's critical to gain employee buy-in and socialize your gamification plan internally to ensure success.



Quote for the day:

"High achievement always takes place in the framework of high expectation." -- Charles Kettering


November 03, 2013

IBM Social Business Bets on Key Application and Technologies
IBM joins up the two sides of the equation – a smarter workforce and superior customer experiences – with its platform for social business. Companies can access it through the IBM SmartCloud, a private cloud, on-premises or using a hybrid model. IBM sees SmartCloud for social business as a way to connect business users more efficiently and effectively.


HP sues seven optical drive makers over price-fixing
In a statement to Computerworld about the move, HP said it takes "price-fixing very seriously and intends to pursue its rights aggressively in this and in other price-fixing litigation." None of the companies named in the lawsuit responded to requests for comment. The lawsuit claims the conspiracy to drive up prices took place from at least Jan. 1, 2004 through Jan. 1, 2010, when "almost all forms of home entertainment and data storage were on optical discs."


Enterprise Architecture Standards
Standards can be a powerful tool to get to grips with certain aspects of our work. However, managing a standards base appears to be tricky: we see many initiatives fail, despite the best intensions of all involved. In this short recording we will discuss the necessity of standards as well as standards management, and present a simple framework for documenting and governing standards in practice. This framework was co-developed and road-tested with various customers over the last 8 years


Failure Happens. Four Rules for Doing it Well
Failure is a fact of start-up life. And sometimes, sadly, it’s the entire company that fails. As much as we don’t like to think about failure, it’s important to prepare yourself mentally for the prospect that your turn in the dunk tank may be right around the corner.Here are four crucial rules to keep in mind:


Understanding Which Investments Should Go To The Cloud
The truth is, most companies significantly underestimate the scope of change required to establish cloud services until it’s too late. In the traditional model, companies buy technology from a vendor as a capital investment, and continue to invest in maintaining and servicing it over time. With the cloud being a service, however, the financial model should be treated more like a utility, requiring the reallocation of budget from capital expenses into operating expenses.


CERN: A Case Study in "Big Science" Data Management
In light of these two factors, CERN has been proactive about preserving data for future re-use, even as it remains plagued by non-standardized, ad-hoc formats, and highly complex data models. CERN was a co-founding organization in the Alliance for Permanent Access, a European data preservation working group. Internal efforts are underway as well, although these have not yet been implemented completely.


The Art of Project Management: The Siege of Portfolio Management
But project selection is only a first step. Portfolio management is more than decision-making levers and it’s more than a portfolio management tool. To create a robust portfolio management framework, process is required and governance must be established (which includes a staged approval). With this three-part equation (levers+process+governance) an organization will be able to realize the value of portfolio management.


Big Data needs Data Science but Data Science doesn’t need Big Data
What really matters in data science is the team effort and your role as a liaison. Your company has large amounts of data and you want to make sure your queries are correct. Whatever tool you use, make sure you have your data cleansed. You want to know that it’s normalized and indexed so that things run smoother. You want to be able to give insight, which requires knowledge of your audience.


Risks and Strategies: Managing Enterprise File Data Securely
Every enterprise has secret, compliance-related, or otherwise confidential data contained in the data center. The management and control of these files especially in a distributed and mobile world is fraught with hidden dangers and risks. Encryption alone cannot solve all of these problems. So join Chris Winter and fellow data center professionals for this insightful discussion on the issues involved, and discover the preventative actions and technologies needed to manage your enterprise file data securely.


Predictive Analytics 101
Predictive models typically analyze current and historical data on individuals to produce easily understood metrics such as scores. These scores rank-order individuals by likely future performance, e.g., their likelihood of making credit payments on time, or of responding to a particular offer for services. Predictive models can also detect the likelihood of a transaction being fraudulent (Risk Detection). Predictive models are frequently operationalized in mission-critical transactional systems and drive decisions and actions in near real time. A number of analytic methodologies underlie solutions in this area



Quote for the day:

"I will listen to anyone's convictions, but please keep your doubts to yourself." -- Goethe

November 02, 2013

A Different Methodology for Big Data
MVI basically considers the minimum hurdle that validates a new approach to problem solving by delivering insight that hasn’t been possible before. MVI works by taking a flexible and agile-based approach to validating a methodology for solving problems that provides an “aha” moment of insight. The insight has to be intuitively valuable for MVI to work, so it helps organize a focus on real problems to be solved.


Computer-Controlled Anesthesia Could Be Safer for Patients
Brown’s group has been studying the anesthetized brain both to further scientific understanding of consciousness and to make anesthesia safer and more effective (see “The Mystery Behind Anesthesia”). The pattern of brain activity that doctors monitor to control sedation is well defined and can be recognized by a computer, says Brown.


Start your journey to cloud, take a 360 degree view (part 3)
One of the key elements enterprises should setup is an appropriate governance ensuring business and IT get aligned on what services are required and how those are delivered. And I use the term here in its widest sense. All parties need to be aligned. Now, there are two aspects of governance to be addressed. The first one is related to the journey to cloud itself. The objective is to ensure decisions taken in one of the four areas are properly taken into account in the others.


IT Security Considerations for Departing Employees
If current employees are a potential security risk (purposely or naively), consider the larger risk that a departing, potentially disgruntled, employee might be. Whatever company loyalty an existing employee might have had (perhaps out of the concern of losing a job) soon disappears when the employee is gone. Especially in this time of ever increasing security risks, continued company layoffs, and economic turmoil, it is important to make sure you have your IT backs covered against the mischief a departing employee might cause.


FAA allows passengers to keep electronic devices turned on
There is one big exception to this, however. Passengers still cannot use their cell phones to make voice calls during the flight, based on Federal Communications Commission rules prohibiting their use. The FAA is asking the FCC to reconsider those rules. The concern is that long-range cellular communication could interfere with the airplanes avionics, so no mobile devices can use cellular communications during flight, the FAA explained.


Cisco Making A Business Out of the Internet of Things
When networking giant Cisco looks at the Internet of Things, what it sees is an opportunity. This week, Cisco officially launched its Internet of Things business unit in a bid to consolidate its efforts and fully capitalize on the opportunity. Guido Jouret, general manager of the Internet of Things Group at Cisco, explained to Enterprise Networking Planet that new network connections are a good thing for Cisco. He noted that 25 years ago, most connectivity was very heterogeneous, but that that evolved as IP became dominant in the enterprise and for the Internet.


Herding Clouds: IT Faces Its Hybrid Future
Integrating cloud services isn't an easy task, which explains why one-third of respondents to our Cloud Computing Survey don't even try. Another 41% take the laborious, costly and error-prone path of custom-coding scripts or application stubs around each vendor's API to bridge internal and external systems. Manual coding is an obvious nightmare for application developers, but don't underestimate the challenge it creates for IT operations teams trying to manage a hybrid infrastructure and deploy applications across multiple clouds while guaranteeing service levels.


Is Thought Leadership the Same as Change Leadership?
We all toss our opinions on the table, but the thought leader does more than that. Thought leaders put ideas and opinions out that have underlying rationales capable of being tested, adapted and evolved. More importantly, the thought leader “leads” by doing the thinking that others won’t, don’t or can’t. Thought leaders stand by their ideas and in doing so, reframe and shift discussions in the direction that allows the solution to present itself. Thought leaders don’t take the debate on their ideas personally; they accept “wins” and “defeats” gracefully


Master Data Services (MDS) Operations Guide
SQL Server Master Data Services (MDS) provides a central data hub that ensures the integrity of information and consistency of data is constant across different applications. With MDS, you can implement a master data management (MDM) hub to manage the master data that is stored in an enterprise database. This article provides guidance about how to install, configure and manage SQL Server 2012 Master Data Services. You also learn how to deploy a Master Data Services model and create a SQL Server Integration Services (SSIS) solution to monitor MDS.


Brazil to insist on local Internet data storage after U.S. spying
If passed, the new law could impact the way Google, Facebook, Twitter and other Internet giants operate in Latin America's biggest country and one of the largest telecommunications markets in the world. A draft of the law says "the government can oblige Internet service companies ... to install and use centers for the storage, management and dissemination of data within the national territory." The government would evaluate the requirement for each company, the draft says, "taking into consideration their size, their revenues in Brazil and the breadth of services they offer the Brazilian public."



Quote for the day:

"I don't believe in taking foolish chances. But nothing can be accomplished without taking any chances at all." -- Charles Lindbergh

November 01, 2013

With big data, the DNC turns politics into political science
To learn more about how the DNC pulled vast amounts of data together to predict and understand voter preferences and positions on the issues, join Chris Wegrzyn, Director of Data Architecture at the DNC, based in Washington, DC. The discussion, which took place at the recent HP Vertica Big Data Conference in Boston, is moderated by Dana Gardner, Principal Analyst at Interarbor Solutions.


The workplace holy grail: Successful collaboration
Collaboration at its core is harnessing the differences that each person brings and leveraging the contributions of individuals to create a greater sum. This is the fastest, most efficient way for organizations to accelerate growth. The greater sum is an exponential factor that moves companies forward at a rate that can never be achieved by singular individuals.


6 dirty secrets of the IT industry
"There are no secrets for IT," says Pierluigi Stella, CTO for managed security service provider Network Box USA. "I can run a sniffer on my firewall and see every single packet that comes in and out of a specific computer. I can see what people write in their messages, where they go to on the Internet, what they post on Facebook. In fact, only ethics keep IT people from misusing and abusing this power. Think of it as having a mini-NSA in your office."


Challenges facing the CIO in 2014
With factors like the cloud, BYOD, and big data making waves in a big way, the CIO needs to start reevaluating his or her role. What can you do to make yourself valuable in this changing environment? Here are some considerations to keep in mind as you step into 2014 and encounter some big changes.


Gartner: Cloud-based security as a service set to take off
According to its “Market Trends: Cloud-based Security Services Market, Worldwide, 2014,” Gartner is predicting growth is likely to come because of the adoption of these cloud-based security services by small- to-mid-sized business (SMB) in particular. Certain market segments mentioned in the report will see higher overall sales and year-over-year growth.


To Build a Great UI, Test the Experience, Not the Code
Because usability testing involves end users, it can be confused with "end-user testing." You should use end-user testing to test your code because users are cheap and available, and because users have some understanding of the business, so they're easier to train to do the tests (and their feedback makes more sense than what you'd get from strangers off the street).


Red Hat Targets OpenShift PaaS Tools for Enterprise App Development
The tooling is aimed at helping JBoss developers build apps for PaaS clouds without having to learn new development techniques, Cormier said, describing xPaaS as "a developer interface to the operating system of the cloud." He added, "There is a real, real gap between low-level services provided by existing PaaSes and what is needed for composite enterprise apps of today."


The CIO as technologist, strategist, business executive — and diplomat
When CIOs approach challenges, a practical approach is advisable, he adds: "It starts with some humility, some under-promising and over-delivery. It starts with some consistency in that regard. It also starts with developing a vision, strategy and roadmap that you follow and execute over a period of time." Strategy counts for a lot, says Carter, and not only in IT but in the business you serve.


Game over: Microsoft Office is killing Google Apps and anemic iWorks
That Computerworld article mirrors what analyst research is finding: Office dominates, especially in the enterprise. A recent Forrester Research study found that Microsoft Office 2010 is used in 85% of companies surveyed, Office 2007 by 51%, and Office 2003 by 28%. (Many companies use multiple versions of Office.) The survey found that Google Docs is used by only 13% of companies.


Applying the scientific method to software testing
The scientific method is based on observation and experimentation. Testing is the same thing. We set up tests that are very much like experiments, and then we run them and observe what happens. That's the same way scientists test their hypotheses. We run experiments, measure the results and analyze the data to figure out what's really happening.



Quote for the day:

"Developing a passion for learning something new every day expands your capacity to become exceptional at everything you do" -- A. Bellemare