January 17, 2014

Cooling Strategies for Ultra-High Density Racks
The simple answer to this problem would be to provision a data center so that it is capable of providing 20kW of redundant power and cooling to every enclosure. Unfortunately, this is simply not technically feasible or economically practical in almost any case. Making the wrong choices when specifying a data center for high density operation can needlessly increase the lifetime cost of the physical infrastructure by many times. The purpose of this paper is to outline practical and effective strategies for deployment of high density enclosures and blade servers.


Google unveils 'smart contact lens' to measure glucose levels
It uses a "tiny" wireless chip and a "miniaturised" glucose sensor embedded between two layers of lens material. The firm said it is also working on integrating tiny LED lights that could light up to indicate that glucose levels have crossed certain thresholds. But it added that "a lot more work" needed to be done to get the technology ready for everyday use. "It's still early days for this technology, but we've completed multiple clinical research studies which are helping to refine our prototype," the firm said in a blogpost.


How Natural Language Processing Makes Our Lives Easier and Improves Your Business
Talking to computers still requires programming languages but the ultimate goal of NLP is “to do away with computer programming languages altogether. Instead of specialized languages such as Java or Ruby or C, there would only be “human.”” The better a computer is capable of understanding natural language, the more applications there will be, but already NLP offers a lot of possibilities to help grow your business, save money and stay ahead of your peers.


The Year Ahead According to Rackspace
There’s a tacit agreement that many traditional security solutions just aren’t cutting it in our ever changing world of technology innovation. The NSA revelations and general scaremongering does not drive the market away from outsourcing, or from US companies, it drives them into wanting to do more on security, demanding more for their providers. 2014 will see continued investment in new security technologies especially around encryption. This will undoubtedly result in better security in the cloud and address some of those lingering doubts around the security of cloud-based platforms and systems.


Predictive Analytics Can Boost Enterprise Performance
"Using historical measures to gauge business and process performance is a thing of the past," said Samantha Searle, research analyst at Gartner. "To prevail in challenging market conditions, businesses need predictive metrics — also known as "leading indicators" — rather than just historical metrics (aka "lagging indicators")." Predictive risk metrics are particularly important for mitigating and even preventing the impact of disruptive events on profitability.


What makes innovation go wrong
Stephen Di Biase says innovation is "in our DNA. We evolved to get here." Di Biase, a longtime R&D executive, is now president of Premier Insights LLC, which provides consulting services about innovation to science-and-technology-based companies. He is on the advisory board of Clean Energy Trust, and he convenes a Chicago-area network of chief technology officers from companies that range from family-held firms to Fortune 500 companies. He spoke with Blue Sky Innovation about leadership, innovation in larger companies and thoughts for managers to consider when looking for new solutions.


IT mobility trend continues in 2014
It's pretty easy to conceptualize any software component as a resource, an element that does something for us. The problem with that very general approach is that it can lead to over-specifying. If you want to expose the functions of a programmable light switch, it's tempting to have verbs like On and Off and maybe status verbs like ReadState. These are nice, but they force an API into being not only functionally specific, but also limited in terms of what technologies can be used to implement it.


Web steps closer to baking-in support for NFC payments and data swapping
When implemented the spec would allow web pages and apps to read and write to NFC tags; to send and receive messages between NFC-enabled devices and provide a way to initiate a wireless connection via wifi or Bluetooth. The API would enable a range of capabilities for web sites and apps such as tapping two devices together to initiate a two player game; tapping devices to share data such as coupons or contacts; and tapping a device to read a message from an NFC tag.


Better software testing and improved quality starts with the culture
A testing expert who really knows his stuff adds enormous value to the project for the customer—and for the whole team by making their job easier rather than harder. Sadly, too many companies still view testing as more of a necessary evil than an opportunity. That's an attitude that Jim Holmes, Director of Engineering for Test Studio at Telerik, is doing everything he can to change.


Spy agencies around the world use radio signals to tap data from targeted systems
The technology, which has to be physically installed in most cases, has been available since at least 2008. It "relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers," according to the Times report. Data captured by the devices are sent to small briefcase-sized relay stations often set up miles away from the target system. The software has apparently allowed the NSA to do an end-run around whatever cybersecurity controls are installed on the compromised systems.



Quote for the day:

"Success is determined by those whom prove the impossible, possible." -- James W. Pence

January 16, 2014

How to make an HTML5 developer smile: A Google Web Designer wish list
Of course, exactly what Google Web Designer will be when it is released is still a mystery. At it's core, Google is a company that is interested in advertising dollars, and every project they promote has padding the bottom lineas the primary, if not sometimes obfuscated, directive. Despite what the development community might be wishing for in a new web design studio from Mountain View, Google Web Designer may be nothing more than a cross-platform plugin that simply makes it easier to drop DoubleClick ads into Android and iPhone applications


The 26 UX Axioms
The set of UX axioms has gone through an evolution over the last year as we iterated through the concepts, refined and combined ideas. We started with 150 concepts and ideas that were combined and synthesized into an initial set of 50 axioms presented to IxDA Grand Rapids in Nov 2012. Over the course of 2013, Erik presented the UX Axioms several times and further synthesized the set down to 21 Axioms. We recently added a few more axioms to the set we felt were missing. The current set stands at 26 UX axioms.


When did Passion for Your Work Become Passé?
Is it out of style to be vocal about your passion for your work, your profession or your firm? Perhaps. At least when it comes to articulating how excited you are to be doing what you are doing, it’s better to show than tell. And while the use of the term may generate a bit of a cringe factor for a variety of reasons, including the suspicion that someone is making it up, showcasing your passion for your work never goes out of style!


Reaping The Benefits Of Diversity For Modern Business Innovation
Diversity is critical for organization’s ability to innovate and adapt in a fast-changing environment. Some of the most successful entrepreneurs and most admired leaders will tell you the same thing. Diversity is essential to growth and prosperity of any company: diversity of perspectives, experiences, cultures, genders, and age. Why? Because diversity breeds innovation. And innovation breeds business success. Don’t believe me? Take a look:


Google stages coup against Windows 8 with Chrome OS-like update for 'Metro'
Google has made no secret of its push to subvert devices running rivals' operating systems and turn them into pseudo Chromebooks by shifting features from Chrome OS to Chrome the browser. A year ago, for example, Google started baking parts of QuickOffice, a popular iOS and Android app substitute for Microsoft Office, into both Chrome OS and the Chrome browser. Analysts have viewed the strategy as part and parcel of Google's desire to insert itself and its core services -- search, mapping, email and others -- onto as many systems, both PCs and mobile devices, as possible to optimize traffic and associated ad revenue.


Our CIO Is Leaving — Now What?
Confronting CIO succession in this competitive environment is rarely easy. Approaching the problem strategically and systematically helps identify priorities, issues to be mitigated and options that may not have been readily apparent at the outset. Furthermore, such an approach maximizes the chances that the widest pool of appropriate candidates will be considered and that once a candidate is chosen, he or she will be able to meet and surpass the expectations of the CEO and the board.


Data visualization tools may be glamorous, but focus on business value
Data visualizations are about more than just how pretty the information looks, according to Cindi Howson, founder of BI Scorecard. At their best, visualizations help users retain information and make better-informed decisions. Graphic displays can be understood much more quickly than simple data dumps, and well-designed visualizations do this even better, enabling collaborative data discovery.


Massive denial-of-service attacks pick up steam, new nefarious techniques
Today, Prolexic issued its quarterly global DDoS attack report, noting that even Android-based mobile devices are being spotted as instruments to launch DDoS attacks. In the report, Prolexic says its response team “uncovered evidence of the use of mobile applications launching DDoS attacks against enterprise clients, including one of the world’s largest financial firms.” Prolexic says signatures matching AnDOSid, a DDoS attack tool for Android devices, were observed in DDoS attack campaigns.


18 great uses for an old Android device
As we move multiple generations into mobile technology, more and more of us are building up collections of old, dated devices. And more often than not, those devices do little more than take up space and gather dust. Here's a little secret, though: Your abandoned Android gadgets are actually virtual gold mines. You just have to find the right way to tap into their potential and give them new life. So grab the nearest DustBuster and get ready: Here are 18 ways to make your old phone or tablet useful again.


Discover and Diagnose Java Concurrency Problems Using Contemplate's ThreadSafe
Contemplate's ThreadSafe Solo is a commercial static analysis plugin for Eclipse, designed specifically to discover and help diagnose difficult concurrency bugs lurking within Java programs. By being focussed on concurrency bugs, ThreadSafe can find bugs that other static analysis tools, both commercial and freely available, often miss or are not designed to look for. As far as we have been able to determine, none of the defects in the examples below are caught by any other Java static analysis tool.



Quote for the day:

"Education is more than a luxury; it is a responsibility that society owes to itself." -- Robin Cook

January 15, 2014

Continuous security monitoring: What enterprises can learn from CDM
With the CDM program, DHS is focusing on getting agencies to implement a six-step CSM process: installing and updating network scanning sensors, automating the search for known system flaws, collecting the scanning results, triaging and analyzing the results, initiating mitigation of the biggest or worst flaws, and reporting progress. The objective is to enable civilian agencies to fully diagnose their networks within 72 hours of sensor deployment.


Computer science: The learning machines
With triumphs in hand for image and speech recognition, there is now increasing interest in applying deep learning to natural-language understanding — comprehending human discourse well enough to rephrase or answer questions, for example — and to translation from one language to another. Again, these are currently done using hand-coded rules and statistical analysis of known text. The state-of-the-art of such techniques can be seen in software such as Google Translate, which can produce results that are comprehensible (if sometimes comical) but nowhere near as good as a smooth human translation.


Why Cognition-as-a-Service is the next operating system battlefield
CaaS will enable every app to become as smart as Siri in its own niche. CaaS powered apps will be able to think and interact with consumers like intelligent virtual assistants — they will be “cognitive apps.” You will be able to converse with cognitive apps, ask them questions, give them commands — and they will be able to help you complete tasks and manage your work more efficiently. For example your calendar will become a cognitive app — it will be able to intelligently interact with you to help you manage your time and scheduling like a personal assistant would — but the actual artificial intelligence that powers it will come from a third-party cloud based cognitive platform.


Geraldine Hamilton: Body parts on a chip
It's relatively easy to imagine a new medicine, a better cure for some disease. The hard part, though, is testing it, and that can delay promising new cures for years. In this well-explained talk, Geraldine Hamilton shows how her lab creates organs and body parts on a chip, simple structures with all the pieces essential to testing new medications -- even custom cures for one specific person. TEDTalks is a daily video podcast of the best talks and performances from the TED Conference, where the world's leading thinkers and doers give the talk of their lives in 18 minutes (or less)


Why you should care about Net neutrality (FAQ)
The basis for the Net neutrality regulation that the FCC implemented is predicated on a centuries-old legal concept known as "common carriage." This concept of "common carriage" has been used not just to regulate telecommunications but other industries as well. It was developed to ensure that the public retained access to fundamental services that use public rights of way. In the case of the Internet, it means that the infrastructure used to deliver Web pages, video, and audio-streaming services, and all kinds of other Internet content, should be open to anyone accessing or delivering that content.


The future of shopping: When psychology and emotion meet analytics
Welcome to the future of retail, which is quickly moving beyond somewhat silly questions about whether tablets will run on Android, iOS, or Windows, and becoming much more focused on actual applications and sales. The best part about the retail sector is that it combines four fun areas: Business, technology, and human behavior and psychology. Here's a brief tour of technologies that range in maturity from those that are implemented today to ones that'll take awhile to be adopted.


Financial malware focuses on hiding malicious traffic, localization
The battle between security professionals and cybercriminals has become a cat-and-mouse game in recent years, Baylor said, as Microsoft and other botnet trackers have had success taking down malware by targeting the command-and-control (C&C) infrastructure used to relay instructions to infected machines. Microsoft led a major operation against the Citadel malware in June 2013, and reportedly took down up to 88% of the Citadel botnets, though it has since rebounded.


Of Internet-connected Crock-pots, cars, smartwatches
The Crock-pot uses Belkin's WeMo technology to connect the slow cooker's IP address to the Internet through a home Wi-Fi router. The company also showed a Wi-Fi-ready Mr. Coffee automatic coffee maker. ... Users can control both devices over the Internet, to turn on the coffee or heat up Irish stew from pretty much anywhere in the world, just as can already be done with a Nest thermostat and other devices. The Wi-Fi capability allows an office manager to turn on the morning coffee pot in the break room before arriving or a catering firm to fire up the cooker at a remote location.


Fifth of enterprise BYOD projects doomed to fail by 2016, claims Gartner
“Whether via a formal BYOD programme, or just via devices coming in the back door and being configured to access corporate systems, the use of consumer technologies in the work environment presents a threat to IT control of endpoint computing resources,” said Dulaney. “Given the control that IT has exercised over personal computers by developing and deploying images to company-managed PCs, many IT organisations will implement strong controls for mobile devices.”


R, the Integration Language?
Integration with R now appears to be a sine qua non strategy for analytics tool vendors. I’m currently investigating KNIME, an open source “user-friendly graphical workbench for the cradle-to-grave analysis process: data access, data transformation, initial investigation, powerful predictive analytics, visualisation and reporting.” KNIME is architected as a visual workflow metaphor and has much the look of a data integration tool, with drag-and-drop node folders such as IO, Database, Data Manipulation, Mining, Reporting, Statistics, etc. An R node is easily added.



Quote for the day:

"Leadership is the wise use of power. Power is the capacity to translate intention into reality and sustain it." -- Warren G. Bennis

January 14, 2014

Enterprise master data management and big data: A well-matched pair?
"Applying MDM against raw, unstructured content is of questionable value," said Evan Levy, vice president of business consulting at analytics and data management software vendor SAS Institute Inc. "But distilling that content down to have some sort of meaning and then linking it to a specific customer -- that's where MDM can come into play." Companies are starting to see -- or picture, at least -- a connection between enterprise MDM and big data, according to survey results published in November 2012 by The Information Difference Ltd.


C++ String Toolkit (StrTk) Tokenizer
Tokenization in the context of string processing, is the method by which a sequence of elements are broken up or fragmented into sub-sequences called tokens. The indices in the original sequence that determine such breaks in the sequence are known as delimiters. There are two types of delimiters, normal or thin delimiters which are of length one element and thick delimiters which are of length two or more elements. Even though tokenization is primarily used in conjunction with strings, any sequence of types that can be iterated in a linear fashion can be tokenized, examples may be list of integers, a vector of person classes or a map of strings.


Scaling Storage Is Hard To Do
How do you add capacity and performance without drastically re-architecting storage systems? For the last decade, enterprise storage vendors have relied on clustering as a means to scale. Each clustered controller is locked in a “mind meld” with every other, sharing precious data maps and caches in real time, enabling customers to add whole arrays for greater capacity and performance.


Bridging Big Data and the Personal Data Ecosystem Through Privacy by Design
In order to make the interactions between Big Data and individuals more sustainable—in other words, to effectively transform this “new oil” into a renewable resource—the concept of the personal data ecosystem (PDE) has been proposed.4 The PDE is the emerging landscape of companies and organizations that believe individuals should be in control of their personal information and directly benefit from its use, making available a growing number of tools and technologies to enable such control.


Intel Announces Death of McAfee Brand. Will it be That Simple?
The decision is not entirely unexpected despite the fact that it has taken Intel longer than normal after the acquisition to resolve to drop what remains one of the two or three most famous security brands in existence. Intel is banking that attaching its own brand to the word 'security' will more than offset any loss in recognition. McAfee cost Intel $7.68 billion (at the time around APS5 billion) in August 2010, still a record price for a pure security firm so it might feel it has the right to impose its own identity.


Defining Responsiveness
When people say that something is responsive, what do they mean? I’m not being facetious. I think many of us think we know what is meant, but when you dig deeper, there is disagreement about what it means for something to be responsive. ... So by definition, Google Plus is not a responsive web design. It may look like one, but it doesn’t contain the three technical pieces necessary to be a responsive web design.


Considerations for Data Center Owners When Partnering With Modular Builders
Modular data center companies appear in all forms, from modularity at rack levels to modularity at building levels to modularity at infrastructure levels. A data center owner needs first to decide at what level they would like to engage in modular deployment. If the path chosen is a fully modular data center, it becomes significantly more important to engage your potential partner at the very early stages of concept and design.


Don't panic: The Internet is not collapsing, despite a spike in global 'attack' traffic
The Internet isn't about to collapse or crumble, despite two long threads on popular technology site Hacker News and news-sharing site Reddit suggesting (in some cases) that it might. Pointing to Akamai's Real-time Web Monitor, which tracks "global Internet conditions around the clock," many drew concern from the meter showing that attacks were — at the time — up as much as 98 percent. At the time of writing, the meter showed attacks were up by close to 107 percent above normal.


All About TransactionScope
In the real world any one you will find exceptional scenarios, exceptional issues where only a knowledge of how to useTransactionScope is not good enough. To resolve transactional issues like deadlocks, timeouts, etc., you must know each and every concept directly/indirectly related to a transaction. There is no alternative. So the concepts of a transaction and its related components need to be clear.


Intelligent Evolution: Making Change Work
When these organizations try to change, they frequently fail because we forget that they are complete creatures and need to be changed in depth. Trying to improve the practices of the engineering department without paying attention to the rest of the organization is similar to trying to change an organ within a body without understanding the impact on the rest of the body. Imagine that a surgeon performs a liver transplant without considering whether there is a potential difference between the livers of different people. We would have a high probability of organ rejection and potentially death of the patient.



Quote for the day:

"Everything I've ever done was out of fear of being mediocre." -- Chet Atkins

January 13, 2014

MDM program needs business sense to be successful
Companies pursue MDM as a technology-driven affair. "There are far too many efforts where the IT team is pushing the MDM idea, and there isn't enough pull from the business side because there isn't a clear articulation of what the business outcomewill be," said Gartner analyst Ted Friedman. "Somewhere along the way, the project fizzles out." Aaron Zornes, chief research officer at The MDM Institute, a consultancy in Burlingame, Calif., made the same point.


5 Methods for Visualizing Unstructured Data
What can anyone possibly do with so much data? It's not even a question of quantity anymore - it's more a question of feasibility. One can put up a thousand powerful computers in parallel and crunch huge data sets to derive results. But what if the data is also unstructured? What if the problem is not in finding the solution but in finding the correct questions to be asked in the first place? Everybody can obtain a huge data set, and almost anybody can acquire the right set of tools to analyze that data, but very few “somebodies” possess the right mindset to use the data to begin solving business problems.


Hyping Artificial Intelligence, Yet Again
A.I. is, to be sure, in much better shape now than it was then. Google, Apple, I.B.M., Facebook, and Microsoft have all made large commercial investments. There have been real innovations, like driverless cars, that may soon become commercially available. Neuromorphic engineering and deep learning are genuinely exciting, but whether they will really produce human-level A.I. is unclear—especially, as I have written before, when it comes to challenging problems like understanding natural language.


Agile Database Development
Agile database development is particularly hard because databases contain state and must ensure data integrity. They are harder to upgrade or roll back than the front end of a website and so are more amenable to up-front design than continual refinement. Lastly, database developers and DBAs tend to have less experience in Agile practices, leading to additional struggle in the early stages. This article will explore the history and principles of Agile development with an emphasis on how we can apply Agile practices successfully to databases.


Demand For Fully Automated Static Analysis Solutions To Grow In 2014 Says Asaph Schulman
Application Security has become a key aspect for all organizations assessing their overall risk exposure. The reality is that due to significant historical investments made by enterprises to bolster their network security, the easier way for attackers to hack these days is through the "main door" – the application layer. By pretending to be regular users of the attacked web or mobile application, hackers abuse insecure application coding to gain unauthorized information such as the administrator's or user's credentials. This can lead to some disastrous results, including the hacking of entire networks.


Brainlike Computers, Learning From Experience
Designers say the computing style can clear the way for robots that can safely walk and drive in the physical world, though a thinking or conscious computer, a staple of science fiction, is still far off on the digital horizon. “We’re moving from engineering computing systems to something that has many of the characteristics of biological computing,” said Larry Smarr, an astrophysicist who directs the California Institute for Telecommunications and Information Technology, one of many research centers devoted to developing these new kinds of computer circuits.


What the Heck Is a RAM Scraper?
First it’s helpful to remember that payment systems — the cash registers and credit card terminals you see in stores and restaurants every day — have a lot of strong requirements for encrypting data, pretty much end-to-end during the transaction process, as well as any records that are stored afterward. But there’s one particular moment when that data is vulnerable, and it occurs during the milliseconds that it is stored in the system memory — a.k.a. random access memory, or RAM — of the back-end server that processes the transaction.


Android vs Windows: Now the battle for the desktop really begins
As ZDNet's Larry Dignan points out, Android could break through on the desktop as it has on mobile if the cost is right and security improves. There are plenty of hurdles in the way of Android becoming a real threat to Windows on the desktop, but it's still a headache for Microsoft. If people don't buy Windows, they probably won't buy Office either, and they're less likely to buy into the whole ecosystem from Windows Phone to Azure. And the desktop is Windows' redoubt: that Android dares to advance upon it is reflection of how the battle of the tech ecosystems has gone so far.


Why innovators need a word other than failure
An experiment is an attempt to test a hypothesis, and gain new learning. The problem with the word "experiment" is that experiments are not meant to be permanent solutions, but rather short trials in which we test a solution, hopefully with a hypothesis, and then compare the results to expected or anticipated results. But what we are often talking about when we talk about "failure" is more akin to experimenting - testing, learning, reworking, testing again and finally implementing.


Emergent Change: Shifting to a complexity paradigm
The traditional approach to organizational change has been a tightly planned process with objectives established by top management. This planned approach to organizational change is reinforced with the publication of numerous best practice case studies for change, detailed guides for leading the neophyte through the change wilderness, and studies of what is needed to remove barriers (mainly employee resistance) to proposed change. Yet the majority of these change efforts fall far short of the objectives that were set by the proponents of the change



Quote for the day:

"A healthy attitude is contagious but don't wait to catch it from others. Be a carrier." -- Tom Stoppard

January 12, 2014

The Ever-Increasing Importance of Predictive Analytics
Pretty much anywhere you look, you can find countless examples of how this trend is manifesting itself. As just one, Forbes recently reported that Google is making numerous changes to its Google Analytics platform and a number of other search guidelines and algorithms, which will have a colossal impact on the operations of content creators in 2014. However, few things in the big data and analytics space are likely to have the overall weight that predictive analytics are expected, by many experts, to possess.


Tablets Get More Sophisticated, with Bigger Screens, Dual OSes and Car Access
German car maker Audi unveiled an Android device that it plans to bundle with its cars. The Audi Smart Display connects to a car via Bluetooth and can be used to remotely access and control the vehicle's music, radio, and navigation systems. The 10-inch tablet can also become a typical Android device with access to the Google Play app store. Audi is calling the tablet a next-generation in-car entertainment device that Audi buyers can choose to purchase as an additional feature. However, the company wouldn't name a ship date, only saying the device would arrive in the near future.


The Relationships between MOOD/QMOOD Metrics and External Software Quality Attributes
Empiricalstudies have been conducted to evaluate these metrics as indicators of external software quality attributes (ESQAs). However,there has been no attempt to systematically review and report these empirical evidences. To identify the relation ofMOOD/QMOOD metrics with ESQAs, we have performed a systematic review of empirical evidences published in the literaturethat support or reject MOOD/QMOOD metrics as indicators of ESQAs. Our search strategy identified 413 papers, out of which15 papers were identified as reporting empirical evidence showing relation between CK metrics and ESQAs.


Using Scenario-Based Architecture Analysis to Inform Code Quality Measures
Scenario-based architecture analysis offers a broad understanding of how a software-reliant system evolves over time and can form a basis for assessing the amount of rework that may be necessary in the foreseeable future. Using the architectural risks identified during scenario-based architecture analysis, we clarified the level of system decomposition where code quality metrics reveal relevant information


Reasoning and Improving on Software Resilience against Unanticipated Exceptions
Exceptions are widely used in prac- tice [6]. To us, the resilience against exceptions is the ability to correctly handle exceptions that were never foreseen at specification time neither encountered during development. Our motivation is to help the developers to understand and improve the resilience of their applications. This sets a three-point research agenda: (RQ#1) What does it mean to specify anticipated exceptions? (RQ#2) How to characterize and measure resilience against unantic- ipated exceptions? (RQ#3) How to put this knowledge in action to improve the resilience?


The Internet of Things outlook for 2014: Everything connected and communicating
IoT isn't just a fancy buzzword that describes how your refrigerator can let you know when you need to replace your spoiling milk or your rotting vegetables (although it can), it is so much more. How much more is only left to your imagination and to your budget. You can do as little or as much with IoT as you want. For example, if you operate food distribution business, you could install sensors in your trucks that send temperature, humidity, and dock-to-dock travel times back to your home office for analysis.


Naming and Classifying: Text Analysis Vs. Text Analytics
Analysis is an examination of structure, composition, and meaning that provides insight to advance some purpose. Analysis may be heuristic, informal, and/or qualitative. Contrast with analytics, which is algorithmic rather than heuristic. I define analytics as the systematic application of numerical and statistical methods that derive and deliver quantitative information, whether in the form of indicators, tables, or visualizations. Analytics is formal and repeatable.


The Future of Business Intelligence: An Impending Realization
What once appeared as two opposing trends that could potentially cancel each other out has merged into a synthesis in which formal education in the field – in addition to developments in automation, Data Discovery tools, Cloud computing and Big Data – is readily used to simplify the process of leveraging BI for laymen. BI’s crossroads has become a solitary path paved by the consumerization of (and burgeoning familiarity and comfort with) IT, which Gartner describes as “how enterprises will be affected, and how they can take advantage of new technologies and models that originate and develop in the consumer space, rather than in the enterprise IT sector.”


Windows Azure Security Guidance
In cloud applications more responsibility lays on the shoulders of the application developers to design, develop, and maintain their cloud applications to high security standards to keep attackers at bay. Consider the following diagram (from J.D. Meier's Windows Azure Security Notes PDF): notice how the infrastructure part is being addressed by the cloud provider--in our case by Windows Azure--leaving more security work to the application developers:


Data Integrity, Physical Security and REST APIs Contribute to Tape's Ongoing Relevance
Other benefits which tape still holds strong are its security and reliability. Data backed up to tape is typically more secure than data stored on disk or on the cloud because, in part, tape can make data more difficult to access and then retrieve. The average hacker is more likely to spend time trying to hack data stored in a cloud or on disk than to go to the trouble of breaking into a storage facility where tape backups are stored, retrieve those tapes, load them into a tape library, and then go through them linearly to find and access the data they store.



Quote for the day:

"There is only one thing more painful than learning from experience and that is not learning from experience." -- Archibald McLeish

January 11, 2014

Watch out for these 10 common pitfalls of experienced Java developers & architects
There is a ton of information on how to get a wide perspective on a large enterprise project: scaling your architecture, message busses, database interconnections, UML diagrams and other high-level stuff is well documented. But what about those of us who are just experienced, professional Java developers? This area is lacking coverage, and programming advice for the senior developer, team leader or the junior architect is hard to find.


Intel Has Its Eyes Fixed on Networking
You know Intel’s long history of supplying the main chips that run personal computers and servers. And you probably know that it supplies some chips for mobile phones and tablets, though not quite as many. But did you know that Intel is also getting into the business of supplying chips for networking gear? The way the chip giant sees it, there’s a $16 billion business of supplying processors for gear that moves data, whether it’s in a corporate data center or on a telco carrier’s network — or anywhere in between. And it reckons that it already has about a five percent share of that business.


How to Cultivate Senior Management Skills
Edward T. Reilly, chief executive officer of American Management Association International, assembled a book for new and experienced leaders titled AMA Business Boot Camp. Let me share with you some of the helpful advice to be found in the book. Here are some “Action Items” assembled to help managers cultivate senior management skills, like:


No Brain Drain in Bulgaria as IT Experts Stay Put
Kiril Karaatanasov is typical of the experienced developers and their success. He owns a house and a flat, and is about to buy his third property, something unthinkable among his foreign contacts. “A friend of mine in Silicon Valley can hardly afford to pay the rent for a house smaller than my flat,” Karaatanasov says. “Silicon Valley is better than most of the older EU countries and most of my German friends and French friends move there for money.”


The 7 best habits of effective security pros
The role of the security professional has evolved beyond that of mere technical savvy, and now includes consultant, educator, investigator, and defender of the data. To understand the traits and habits that matter the most, we reached out to a number of security professionals by phone, email, and social media, who are successful in their respective areas in the field. If there's one thing that screamed out from the interviews it was this: security knowledge alone is only the beginning of the skills and habits one needs to succeed.


Big Data Strategy: s+b’s Strategy of the Year
Big data strategy is the latest example of how a particular something-strategy can suddenly win rapt attention on the runways of corporate fashion. Businesses are drowning in an explosion of data unleashed by the convergence of low-cost, high-volume computing; ubiquitous wireless telecommunication; and the Internet’s continued penetration into more and more aspects of our daily lives.


IBM’s Watson to Help Rich DBS Clients With ‘Jeopardy’ Smarts
The Singapore-based bank plans to begin using the tool, which can answer questions in conversational language and learn from responses, to aid financial planners in guiding its wealth-management unit’s affluent customers, IBM said today. Watson will analyze large volumes of financial data to help DBS, Southeast Asia’s largest lender, offer more customized service. The agreement gives IBM a proving ground as it tries to show clients the value of its Watson technology.


Just Say No to Tech Purchases That Won’t Yield ROI
Paying for that new computer, software, mobile device, or peripheral is only the first expense you’ll incur with most technologies. Smartphones have voice and data plans. Laser printers tend to eat up expensive ink and toner. And pretty much everything you buy for your employees needs tech support. That support could be as simple as having your resident geek run a virus scan or as complicated as bringing in a technician to troubleshoot your network.


The Sustainability Agenda in Kanban
Kanban is the humane, start with what you do now approach to change. That humane side is captured in a system of nine values. These explain the motivations of the method and they provide a helpful starting point for exploring how it actually works. Each value identifies a goal of one or more of Kanban’s principles or practices and suggests some of the benefits to be derived from following them. Conversely, they suggest that the pursuit of those goals and benefits may be well served by the adoption of their respective method elements.


Beyond Piracy: Software Publishers Battle Greater Threats to Their Intellectual Property
In today’s market, it’s essential for software publishers to solidify their competitive advantage by securing their innovative and unique products against reverse-engineering, which can lead to duplication by competitors looking to fast-track their development efforts and time to market with a competitive alternative. With competitive espionage becoming more and more common, valuable software IP containing code, algorithms, application data files and trade secrets is at risk of prying eyes, reverse engineering, theft, and copycatting by competitors.



Quote for the day:

"Be careful the environment you choose for it will shape you;be careful the friends you choose for you will become like them" -- W. Clement

January 10, 2014

Security analysis of mobile banking apps reveals significant weaknesses
While banking apps generally use SSL encryption for sensitive communications, Sanchez found that 90 percent of the tested apps also initiated several non-encrypted connections during their operation. This allows attackers who can intercept that traffic -- for example on an insecure wireless network -- to inject arbitrary JavaScript or HTML code into it, for example to display fake login prompts to the app's user or to launch other social engineering attacks. In addition, even when using encryption, 40 percent of the tested apps did not validate the authenticity of digital certificates they received from the server, making them vulnerable to man-in-the-middle attacks using fake certificates.


Data visualization best practices help users envision business success
"The context of why visualization is so powerful is because as people we're really wired to process images much better than the way we've been working, which is just [with] columns and rows of numbers," said Feinberg, president and founder of DecisionViz, a consultancy in Westfield, N.J., that helps companies develop and implement data visualization strategies and processes. He said visualization tools also open the doors to analytical data to more business users in organizations, which can help improve decision making and instill a more data-driven culture internally.


Simple and fast CSV library in C#
This library allows to save a collection of objects to a CSV file. It also allows loading from CSV files with linq expressions. It is: Simple to add to your application (Single C# file); Simple to use (loading and saving can be done with a single line of code); Fast (the demo creates a million client records in 2 seconds on my laptop); and Small memory footprint (tested with over 10,0000,000 records).


Net Medical Xpress Releases HIPAA-compliant WebRTC-enabled Telemedicine Solution
RTC (real-time communications) Conference Switch is HIPAA-compliant, which means that medical providers can discuss and transmit patient information without fear of compromising HIPAA and HITECH regulations. "Our RTC Switch, which is RSA asymmetrical, includes precise audit controls, public/private key encryption and Net Medical's Safety Pilot permission software," explained CEO Dick Govatski. Safety Pilot is a security protocol that routes calls and shared files through a complex route of encryption, authorizations, permissions and auditing. Doctors and patients can communicate via telemedicine without concerns about malware or unauthorized data access.


Ways To Deal With Botnet
Botnets use multiple attack vectors; no single technology can provide protection against them. For instance, the goal of a DDoS attack is to cripple a server. The goal of a phishing attack is to lure users to a spoofed Website and get them to reveal personal data. The goal of malware can range from collecting personal data on an infected PC to showing ads on it or sending spam from it. A defense-in-depth approach is essential to detect and mitigate the effects of botnets.


Network Monitoring Best Practices: Setting a Network Performance Baseline
In the simplest terms, a network performance baseline is a set of metrics used in network performance monitoring to define the normal working conditions of an enterprise network infrastructure. Engineers use network performance baselines for comparison to catch changes in traffic that could indicate a problem. Setting a network baseline also provides early indicators that application and network demands are pushing near the available capacity, giving the networking team the opportunity to plan for upgrades.


Curb Appeal: The Tipping Point for Redesign
When you’re working with limited resources and a small team though, you have to look for inspiration across different functions. You might be surprised to find that inspiration and innovation don’t just come from specific job titles. For us, the initial idea and design for our new homepage came from one of our software engineers during a monthly hack day. An unlikely source, yes – but it turned out to be not just a radical shift from our current site — but a shift we all believed might actually work for our members.


Intel's 64-bit Android 4.4 OS for x86 smartphones ready for OEMs
64-bit Android could reach tablets first. Intel said 64-bit Android tablets powered by its Atom processor code-named Bay Trail will become available in the first half of this year. The tablets are expected to sell for as low as $150. The code completion paves the way for device makers to load 64-bit Android and their own user interfaces on devices. A full 64-bit Android is not yet available on smartphones or tablets. Intel also hopes developers will start writing 64-bit applications for Android smartphones running on Atom chips, the spokeswoman said.


Hot data storage technologies for 2014
Some of our predictions are about storage technologies that have only recently emerged from R&D labs, but they bear so much promise that we think they will weigh in immediately. That's the nature of the storage market today: Technologies that used to take years to evolve and gain a following are topping the charts in short order these days. Case in point: solid-state storage's meteoric rise. In fact, the ever-developing flash storage is featured in this year's predictions, with two solid-state techs -- Non-Volatile Memory Express (NVMe) and 3D flash -- about to spring into prominence.


Coverity Testing Platform Expands Java Web App Coverage, Revamps C# Analysis Engine
Coverity Development Testing Platform 7.0 broadens Java Web application security coverage, adds new security audit views and reports, and revamps its C# analysis engine in what the company describes as a a major rewrite. The platform combines code analysis, change-aware unit test analysis, and policy management across the three most widely used enterprise programming languages: Java, C/C++, and C#.



Quote for the day:

"How committed are you? There is a remarkable difference between a commitment of 99% and 100%." -- Vic Conant

January 09, 2014

Dealing with the data deluge, and putting the 'information' back into CIO
Dealing with data overload is an appropriate challenge for the CIO. As Gavin Megnauth, Group CIO at Impellam, pointed out: "We are called Chief Information Officers — but taking that title literally, it's worth asking ourselves whether we are spending the appropriate amount of time managing unstructured company information in particular." Megnauth said that while big data is this year's hot topic, with much focus around business intelligence, data warehousing and analytics, an overlooked area is ensuring that unstructured data can be used for business advantage.


Yahoo email encryption standard needs work
Some of Yahoo's HTTPS email servers use RC4 as the preferred cipher with most clients. "RC4 is considered weak, which is why we advise that people either don't use it, or if they feel they must, use it as a last resort," Ristic said. Other servers, like login.yahoo.com, primarily use the AES cipher, but do not have mitigations for known attacks like BEAST and CRIME, the latter targeting a feature called TLS compression that login.yahoo.com still has enabled.


Optimizing the Use of Technology for Business
In 2013 many organizations made progress in balancing technology decisions across business and IT as the lines of business continued to take leading roles in investment and prioritization. Major investments were made in business applications using software as a service, business analytics and mobile computing applications. In some other areas of innovation, particularly big data and social collaboration, deployments are just beginning to happen and a significant amount of projects are in experimental and proof of concept than enterprise use.


Set up a PC as a kiosk using Windows 8.1's Assigned Access
Windows 8.1's new Assigned Access feature allows you to configure a local user account to essentially function in kiosk mode, and it doesn't even require you to edit the registry or dedicate a PC to the task. Once you configure an Assigned Access account, a user signed on to that account only has access to the one Modern app that you specify -- the user cannot run any other application or make any changes to the operating system. Other users can sign on to the computer and have full access to Windows 8.1.


Tracking Sensors Invade the Workplace
As Big Data becomes a fixture of office life, companies are turning to tracking devices to gather real-time information on how teams of employees work and interact. Sensors, worn on lanyards or placed on office furniture, record how often staffers get up from their desks, consult other teams and hold meetings. Businesses say the data offer otherwise hard-to-glean insights about how workers do their jobs, and are using the information to make changes large and small, ranging from the timing of coffee breaks to how work groups are composed, to spur collaboration and productivity.


Why Smart Leaders Are Loosening the Reins
Happily, some smart business leaders have begun to figure out that what worked in the industrial age has no place in the ideas economy. Over the course of writing The Talent Mandate, I surveyed more than 100 senior executives about their talent practices. Only 11 percent of them believe that traditional command-and-control structures are still the best way to derive value from employees. What I have learned from these leaders and the scores of others I interviewed is that when it comes to managing talent in today’s vastly changed environment, it makes sense to loosen the reins.


The art of conversation: Using contextual data to deliver on your intent
Some companies believe real-time decisions are only nice-to-have. These companies may script conversations in advance. If so, all their conversations are like the one above. It may occasionally work, but only when they talk to customers that don't tell them anything new. How likely is that with customers continuously adding to high velocity big data? Every interaction in every channel, every tweet and post, every change in physical location can all become relevant to the current conversation.


Network security spending to surge in 2014
Spending on network security, which represented 21 percent of the total security spending pie in 2013, is expected to increase in 2014 as enterprises increasingly look to thwart breaches and attacks. According to a Forrester Research survey of more than 2,000 security pros, 46 percent of companies expect to increase network security spending in 2014. Forrester noted that companies are deploying a Zero Trust security model that requires the verification and security of all resources, limits on access and constant monitoring and logging of traffic.


Exclusive Guide: Energy Essentials for the Modern Data Center
You’re not alone. Traditional infrastructures weren’t designed to power today’s new workloads and, as a result, IT managers have been forced to take a closer look at their data center designs. To help support your efforts, the editors at SearchDataCenter.com have compiled a comprehensive guide that outlines current energy concerns, latest techniques for improving power and cooling and tips to understanding – and reducing – consumption in the data center.


Preparing for Your First MongoDB Deployment: Backup and Security
The intention of a Defense In Depth approach is to layer your environment to ensure there are no exploitable single points of failure that could allow an intruder or untrusted party to access the data stored in a MongoDB database. The most effective way to reduce the risk of exploitation is to run MongoDB in a trusted environment, to limit access, to follow a system of least privileges, to follow a secure development lifecycle, and to follow deployment best practices.



Quote for the day:

"Don't be encumbered by history. Go off and do something wonderful" -- Robert Noyce

January 08, 2014

Machine learning, embedded analytics and big data march ahead in 2014
Will we look back on 2014 as the year that marked a new era in business? According to faculty at the International Institute for Analytics (IIA), advances in big data, along with machine learning and embedded analytics, will drive new products, reinvent old business processes, and quite possibly mean a lot more work for lawyers. The Portland, Ore.-based advisory and research analytics organization released nine official predictions for the new year...


New French surveillance law: From fear to controversy
Even though France's actions haven't been talked about anywhere near as much as the NSA scandal has, the French government says it has begun working on new ways to legitimize these widespread powers of surveillance. A new law just passed by the French Senate defines the conditions under which intelligence agencies may survey citizen’s data - including telephone conversations, email correspondence, web browsing activity, and personal location data.


Preparing for PCI-DSS Version 3.0
Among the new requirements of version 3.0 are steps to mitigate payment card risks posed by third parties, such as cloud providers and payment processors. The new version also stresses that businesses and organizations that accept and/or process cards are responsible for ensuring the third parties they rely on for outsourced solutions and services use appropriate security measures, says Leach, the council's chief technology officer. "Many of the breaches have involved the integrity of the third parties," Leach says. "Organizations need to help those types of entities understand their PCI responsibilities."


Seagate Crams 500 GB of Storage into Prototype Tablet
Of course there's plenty of reasons we don't already have hard drives in tablets. The compromise that immediately leaps to mind when you add a spinning hard drive is, of course, battery life. Seagate's solution in this prototype was to hybridize the storage with the addition of 8GB of flash memory. The vast majority of the time, the tablet is just running on flash, and the magnetic drive is powered off. If you want to play a movie, though, the drive will spin up, swap the movie onto the flash memory through a fast 6 gb/s SATA interface, and then spin down again.


Lenovo expects to benefit from CYOD trend
"For the average small business, it's not a productivity loss or big concern to them if they have to reimage one of their 10 PCs every now and then, but for a company which has a 100,000 of them, they absolutely want commonality of the image and we have the internal labs to do that," explained Beck. He added Lenovo's portfolio expansion in recent years into tablets and convertibles has made its proposition even more compelling. At CES, the company further ramped up its product range to include Android desktops.


Information technology budgets are stable or growing
Data suggests 2014 will provide another year of stability and even growth for IT departments, with 32% of respondents indicating they're fully staffed and another 39% indicating they're looking to make new hires. The relative stability and uptick of budgets and headcounts, however, doesn't mean IT leaders have left their penny-pinching ways behind. All the CIOs and IT leaders interviewed for this article, including those whose budgets and staffs increased in 2013, stressed that they continue to look for ways to cut costs without sacrificing service or innovation.


The Keys to Leadership: Your Brain and My Grandmother
If you’re stressed or facing a critical decision, get out of your office! ... Even concentrating on a photograph of nature can help. There’s wisdom in taking time for a regular stroll at lunch. In Your Brain and Business, Pillay cites studies showing that physical movement can have a profound effect on how you think: Getting into a box-like structure and then stepping out of it actually improves your ability to get creative and think “outside the box,” so don’t expect your next big idea to come during the hours you spend in a conference room.


Personalization Is Back: How to Drive Influence by Crunching Numbers
What marketers usually call a response model doesn't simply predict who will buy, per se. Rather, more specifically, it predicts, "Will the customer buy if contacted?" It is predicting the result of one treatment (contact) without any consideration for or prediction about any alternative treatment, such as not contacting or contacting with a different marketing creative. ... Therefore, a response model suffers from a sometimes-crippling, common limitation: The predicted outcome itself doesn't matter so much as whether the marketing treatment should be credited for influencing that outcome.


CIOs Must Balance Cloud Security and Customer Service
"Customer expectations are higher now," said Shawn Kingsberry, CIO of the Recovery, Accountability and Transparency Board. "Everyone's so mobile, and at home they do so many things and have access to so much information, the expectations in the office are even higher when you look at the services that have to be delivered." ... "It's that balance that you have to get," Kingsberry said. "You want to deliver the service, but there are tradeoffs."


Standards in Predictive Analytics: PMML
PMML has particular value for organizations as they move away from a batch scoring mindset to a more real-time scoring approach. When scoring was done in batch it was generally done using the same technology as was used to build the model. With real-time scoring it has become essential to be able to move models from their development environment to a more real-time, interactive scoring environment and PMML has emerged as the primary way to do this.



Quote for the day:

"I don't believe in taking foolish chances. But nothing can be accomplished without taking any chances at all." -- Charles Lindbergh