February 17, 2014

App delivery techniques: Virtualization and Web-based apps
Browsers are also delivering more native-like capabilities within their interfaces. In the iOS version of Safari, for example, you can make interface elements disappear as you scroll through the page content. But Web-based apps still pose many hurdles for IT. For instance, whenever application-state data -- the data stored in memory during a session -- must be updated, a screen refresh is required. If the user's connection is less than optimal, this refresh can affect performance.


Collect Your SQL Server Auditing and Troubleshooting Information Automatically
The idea is that since we do not know how often the default trace files are changing for each server, and since the files have a maximum size of 20Mb each (but they may be much smaller), it is actually more efficient to import them and merge them than to write custom logic to check which file was imported and which has not. (The performance overhead of importing 20Mb trace files and using the MERGE script is minimal. I performed a test by populating 1 million rows in each table by using Redgate’s Data Generator and even in such case the import was fast.)


Update: Third of Internet Explorer users at risk from attacks
The extension of the vulnerability to IE9 followed confirmation earlier yesterday that active attacks are compromising the newer IE10 and hijacking PCs running the browser. "Microsoft is aware of limited, targeted attacks against Internet Explorer 10. Our initial investigation has revealed that Internet Explorer 9 and Internet Explorer 10 are affected," a Microsoft spokesperson said via email today. With both IE9 and IE10 vulnerable, it means that about a third of all those using Internet Explorer are at risk.


Report: EU to push to reduce US role in Internet governance
The European policy paper seems to reject a U.N. takeover of Internet governance functions, by rejecting calls for a new international legal regime. The paper calls for a multistakeholder process that ICANN trumpets as its current model. An ICANN spokesman didn't have an immediate comment on the proposal. "The Internet should remain a single, open, free, unfragmented network of networks, subject to the same laws and norms that apply in other areas of our day-to-day lives," the E.U. document said, according to the Journal.


An Introduction to UX Design
UX is considered a discipline these days, which incorporates many aspects and will always include good UI design. The problem that many have wrapping their heads around UX is that there is a lot of conflicting information online and even many designers will give you a different definition than their peer might. It’s a little ‘fractured’ as a discipline because of this and simply because at its heart, UX incorporates a lot of ideas, research and theory, as well as practical application in the real world.


Linux Deepin is a fringe Linux distribution that could steal your heart
With a new desktop (DDE – Deepin Desktop Environment), Linux Deepin takes nods from nearly every desktop environment available and rolls it into one, elegant solution. Part Windows 7, part Ubuntu Unity, part KDE, part GNOME 3 (which DDE gets its base), this desktop brings to mind exactly what Microsoft should have done for Windows 8. You take a deeply embedded desktop metaphor and give it a modern twist, a flush app store, and make it scream on nearly any hardware. That’s what Linux Deepin did.


Is it Really Possible to Achieve a Single Version of Truth?
The road to SVOT is paved with very good intentions. SVOT has provided the major justification over the past 20 years for building enterprise data warehouses, and billions of dollars have been spent on relational databases, ETL tools and BI technologies. Millions of resource hours have been expended in construction and maintenance of these platforms, yet no organization is able to achieve SVOT on a sustained basis. Why? Because new data sources, either sanctioned or rogue, are continually being introduced, and existing data is subject to decay of quality over time.


Understanding atomic and composite patterns for big data solutions
Atomic patterns help identify the how the data is consumed, processed, stored, and accessed for recurring problems in a big data context. They can also help identify the required components. Accessing, storing, and processing a variety of data from different data sources requires different approaches. Each pattern addresses specific requirements — visualization, historical data analysis, social media data, and unstructured data storage, for example. Atomic patterns can work together to form a composite pattern. There is no layering or sequence to these atomic patterns.


Exploring the complexity of modern cyber attacks
Justifying ROI for information security can be a challenge. Information security is, in fact, a business problem, not an IT problem. The information security team should develop an information security strategy aligned with the company’s business imperatives and the various IT programs designed to support those business imperatives. A well-executed information security program should also deploy a security architecture that enables business focused outcomes (i.e. enabling the company to research and develop new products, to expand in existing markets or enter new ones, or to attract new customers) in secure ways.


Taking the first step towards better enterprise information management
Banks are under increasing pressure to meet regulatory demands and manage their business challenges. This could potentially create another wave of siloed data projects, if not carefully ‘governed’. While addressing tactical urgencies are important, there must be a strategic focus on having a coherent strategy for banks to leverage ‘data’ for growing, saving costs and staying compliant. The intent of this article is to convey the importance of having a good framework and the right guidelines to help banks make the right choices to be effective and efficient.



Quote for the day:

"I am reminded how hollow the label of leadership sometimes is and how heroic followership can be." -- Warren Bennis

February 16, 2014

NIST Framework Released to Widespread Praise, But What Happens Next?
The framework was widely praised at a high-profile release event in Washington, preceded by a statement from President Obama. The framework "is a great example of how the private sector and government can, and should, work together to meet this shared challenge," Obama said, adding that much more work needs to be done on cybersecurity, particularly the need for Congress to pass legislation that provides greater legal protection to spur greater cybersecurity information sharing.


The Case Against Wearables, Or Why We Won't All Look Like The Borg This Year
The problem: The hype is years ahead of the market. Big and unresolved questions remain about pricing (too high), battery life (too short), utility (too limited), looks (too ugly) and privacy (too scary). “We’re a ways away from the Borgification of the consumer,” says Bill Briggs, chief technology officer of Deloitte Consulting, which is predicting that 10 million wearable devices will be sold this year in a market valued at about $3 billion. (Compare that with 1 billion smartphones sold in 2013.) “We’re going to need to see new categories emerge and existing categories evolve.”


World’s Deadliest DDoS Attack Against A Company Which Was Fighting It
The new attack used the NTP reflection technique, involving the sending requests with spoofed source IP addresses to NTP servers with the intention of forcing those servers to return large responses to the spoofed addresses instead of those of the real senders. ... CloudFlare wrote in the blogpost that this had two effects: the actual source of the attack is hidden and is very hard to trace, and, if many Internet servers are used, an attack can consist of an overwhelming number of packets hitting a victim from all over the world.


New Data Center Design Drives Efficiency Gains for Dupont Fabros
“We recognize that in this industry, things change and evolve,” said Scott Davis, Senior Vice President of Operations for DuPont Fabros Technology (DFT). “We sat down with the design group and looked at the trends (n data center design). We took all those trends and came up with goals. The end result is (a data center that’s ) cheaper to build, requires lower maintenance, and has an industry leading PUE. We never save at the cost of reliability or resiliency.” The company expects annualized Power Usage Efficiency (PUE) UE to be below 1.14 at 75 percent capacity, and below 1.13 at 100 percent utilization.


Innovation is Inspiration: Lead in your Surroundings
Think “Smaller.” Not every innovation will produce a world of change today. A happy life, a well-done project, or a successful business is just the sum of their parts. Break down any problem into workable smaller parts. Take some simple action to quantify or identify just one part of a problem or activity, no matter how small or seemingly unimportant, and innovate a small change to that portion. You will see–it will move the process forward.


DataKind: Data Science for the Common Good
DataKind’s goal is to connect expert data scientists with social change organizations who are seeking to better manage, visualize and understand their data. Porway was most recently the data scientist in the New York Times R&D lab and remains an active member of the data science community. Scott Laningham, IBM Digital Journalist, spoke with him at the IBM Information on Demand 2013 conference in Las Vegas.


Modern Enterprise Performance Analysis Antipatterns
The specific examples that led to the distillates below are drawn from the Java ecosystem, but similar remarks apply to many other types of enterprise system. Each basic cause corresponds to some common cognitive bias. For example, Boredom andResume Padding both stem from a desire to escape the existing tech that a developer uses in his or her day job, and their aspirational desire for a better tomorrow. The antipatterns are presented below, in a style and format that should be reminiscent of the Gang of Four, as well, of course, as the antipattern format pioneered by Brown et al.


Secure Networks: How To Develop An Information Security Policy
While security methods provide protection for access and infrastructure, these methods should be the result of a carefully defined security policy. An effective security policy integrates well-known protection methods into a network in a way that meets both security standards and the goals of the entity being secured. An information security policy builds the foundation for a secure network, but it must be seen as valuable to an entity.


Australian standard published for IT governance
“The standard has been prepared to set out how significant IT projects can benefit through the use of appropriate governance frameworks and principles,” said Bronwyn Evans, Chief Executive Officer, Standards Australia, in a statement (PDF). “As the world we live in continues to change rapidly, organisations need to consider how they can deliver effectively today, while investing in technology for the future.” Evans said guiding successful projects, driving change within organisations, and achieving desired business outcomes, requires clear engagement between governing bodies and their senior executive.


Ramp Up Your IT Governance Model for IoT
Effective IT governance help converting the enterprise goals to IT goals and selection of appropriate enablers like policies, frameworks, organization structure, services, infrastructure etc. It will also help in selecting the rights processes that help in achieving the IT goals thereby helping achieving the enterprise goals and meeting governance objectives of meeting stakeholders needs and expectations.



Quote for the day:

"The best strategy for building a competitive organization is to help individuals become more of who they are." -- Marcus Buckingham

February 15, 2014

SD Elements--A Solution To The Web App Security Conundrum
It’s an interesting approach – instead of using either a pre-configured software security requirement list, or an after-the-fact automated scanning tool, SD Elements works alongside and at the same time as the development process, it’s also a dynamic tool, taking into account new found vulnerabilities and approaches to security. It’s also compatible with existing scanning products so sits nicely in the web app security lifecycle process.


Study Shows Those Responsible for Security Face Mounting Pressures
"When we speak to CIOs, CISOs, IT Managers/Directors, we almost always hear that their Board of Directors has asked them what they are doing to protect the companys valuable information. When the Board asks questions, there is more pressure. However, security has been a board-level issue for some time," Cole explained. Today, the difference is in the type of questions being asked by the board. It used to be a matter of answering the question, 'what are we doing to prevent data loss?"


US seeks information on industry ability to hold bulk phone data
The RFI has been posted to the Federal Business Opportunities site that lists federal government procurement opportunities. The government is looking for information on whether commercially available services can, among other things, provide secure storage and high availability to U.S. telephone metadata records for a sufficient period of time, and ensure that there are no unauthorized queries of the database and no data is provided to the government without proper authorization.


10 Scientific Insights That Could Make You A Better Designe
As designers, we can take advantage of findings from fields like behavioral economics and cognitive psychology, and become more mindful about exactly how we’re influencing people through our designs. Insights from these fields can help us better understand why people behave the way they do, design more effective products and services that positively influence behavior, and make more informed predictions about how our designs will ultimately impact people when we let them loose in the real world.


Intel wants to be the 'operating system' for big data
Fedder declined to share how many customers Intel has for its Hadoop distribution. A lot of the work for it began as a lab project in China. To date, most customers are in China although there are users in Europe and the U.S. as well, he said. Those looking to pinpoint Intel's intentions for Hadoop should know one thing, according to Fedder. "Where we differ from other players is we're not trying to build an end-to-end solution," he said. Instead, Intel wants to be the "operating system" for big data, letting third-party vendors and customers themselves create the application layer on top, he added.


Can You Keep a Secret, App?
That’s where Secret comes in. Like a more established app called Whisper, Secret is free and lets users post an image along with several lines of text. Yet while Whisper posts can be seen, searched for, and commented on by all users, Secret shows you posts from your contacts who are also using the app, and, under certain conditions, secrets from friends of those contacts and beyond. If your contacts tap a heart icon to indicate they love one of your secrets, it’s sent on to their contacts, and continuous “loving” spreads secrets throughout the app’s user group. While this means you will see secrets from beyond your initial group of contacts, you can only comment on secrets posted by your friends and friends of friends.


'The Moon' worm infects Linksys routers
The worm, which has been dubbed TheMoon because it contains the logo of Lunar Industries, a fictitious company from the 2009 movie "The Moon," begins by requesting a /HNAP1/ URL from devices behind the scanned IP addresses. HNAP -- the Home Network Administration Protocol -- was developed by Cisco and allows identification, configuration and management of networking devices. The worm sends the HNAP request in order to identify the router's model and firmware version. If it determines that a device is vulnerable, it sends another request to a particular CGI script that allows the execution of local commands on the device.


The Problems measuring Innovation
There are several difficulties when measuring innovation. The first is in the definition of innovation. After all, innovation is a relatively generic umbrella term that contains a lot of different activities and outcomes. Incremental product innovation is more definable and predictable than disruptive business model innovation, more familiar and probably easier to measure. Given the range of activities, processes, definitions and outcomes, talking about measuring innovation is a bit difficult, especially when the range of outcomes is so broad.


Big Data Analytics: Descriptive Vs. Predictive Vs. Prescriptive
With data in hand, you can begin doing analytics. But where do you begin? And which type of analytics is most appropriate for your big data environment? In a phone interview with InformationWeek, Wu explained how descriptive, predictive, and prescriptive analytics differ, and how they provide value to organizations. "Once you have enough data, you start to see patterns," he said. "You can build a model of how these data work. Once you build a model, you can predict."


No More Technical Debt - Invest in Quality
But if you neglect the Technical Debt of the project, that might backfire at one point: If you need to change code with a lot of Technical Debt, the changes might be prohibitively expensive and therefore not feasible. Developers usually know and fear these kinds of situations - working with code that has a lot of Technical Debt is not just little fun - it is also very risky because bugs might sneak in and estimates might be easily proven wrong. So while software quality might be very important for the success of a software project, the Technical Debt metaphor is just not enough.



Quote for the day:

"Take your life in your own hands, and what happens? A terrible thing: no one to blame." -- Erica Jong

February 14, 2014

Erasing SSDs: Security is an issue
The bright spot was encrypted SSDs, effectively deleting the encryption key makes the stored data useless. The one concern forwarded by the researchers is that there is no way to verify that the memory locations storing the encryption key data were sufficiently sanitized. The research team did not come out and say it, but reading between the lines has one believing there is no reliable way to sanitize SSDs other than physically destroying the device.


How to Optimize Your Enterprise Storage Solution
For enterprises that want their own internal data storage, it is best to start with network attached storage (NAS). A NAS filer is basically an extra server that connects to a network and rapidly adds extra storage to that network. However, at a certain point, too many NAS filers can overwork the local area network (LAN), affecting performance. When a NAS starts becoming too slow, creating a storage area network (SAN) is the next best step. A SAN is a collection of connected computers that are used solely for storing data.


Dozens of rogue self-signed SSL certificates used to impersonate high-profile sites
Such attacks involve intercepting the connections between targeted users and SSL-enabled services and re-encrypting the traffic with fake or forged certificates. Unless victims manually check the certificate details, which is not easy to do in mobile apps, they would have no idea that they're not communicating directly with the intended site. In order to pull-off man-in-the-middle attacks, hackers need to gain a position that would allow them to intercept traffic.


Cyberthreats: Know thy enemy in 2014
Defending a large network has never been harder. Expensive perimeter protection systems, complex host-based malware detection and even whitelisting systems have crumbled as attackers perfect an almost unbeatable pair of attacks: spear phishing and watering holes. Both attacks apply an age-old strategy: If a defense is too complex to beat head-on, bypass it. At the same time, social engineering, the Internet of Thingsand the combination of traditional Web applications, embedded applications and networked devices often with "versions" of Microsoft or Linux operating systems, present untold security challenges.


The Rise and Fall of Western Innovation
The main cause of this decline, according to Phelps, is corporatism—the inevitable tendency of businesses, workers, and other interests to band together to protect what they have. In modern economies, he says, corporations, unions, and other interests turn government into an agency for forestalling change and preserving the status quo. This problem has been worse in Europe than in the U.S., which is why productivity and per capita incomes in Europe have persistently lagged.


Workday: Linking technology design and user experience
We can hardly overstate the importance of software that users can easily adapt over time to changing business needs. Historically, it was difficult for users to change software rules and functionality in response to conditions such as a merger or new regulations. The software was inflexible, so these changes often required programmers to code customizations so the software could meet specific business requirements. A recent Gartner report explains the negative long-term impact of these customizations:


Mid-Level Leaders: Key Stakeholders, Agents of Change or Both?
It has come to my attention that a heightened focus on mid-level, or emerging, leaders has taken the industry by storm. However, I’m not just talking about the leadership development industry. This focus is being seen across many industries, pharmaceuticals and energy, in particular. Upon further reflection, it became clear why this is the case: both industries are facing major change initiatives, and mid-level leaders have been proven to be the most effective at managing change and ambiguity in the workplace.


Measuring the effectiveness of your security awareness program
Granted, measuring security effectiveness is not as straightforward as measuring a manufacturing process. There are many variables that are simply outside of one's direct control. In fact, a recent ISACA report conceded, "...security is contextual and not an isolated discipline; it depends on the organization and its operations. Furthermore, effective security must take into account the dynamically changing risk environment within which most organizations are expected to survive and thrive." All the more reason that improvements be addressed wherever possible!


Solving the Gordian Knot of Chronic Overcommittment in Development Organizations
There is no debate that the end result of these changes will be good for MegaRetail, but Claes already has hundreds of projects in various states of progress and the question remains whether there are enough people to staff these additional projects? There was no understanding or acceptance in the meeting that the IT department teams are already busy. In addition, the Marketing Director somewhat heavy handedly reminded Claes that business drives the company forward and IT is to be a supporting function and not a roadblock.


CEO Need-to-Know: Enterprise Cloud needs the SDDC
The vast majority of global enterprises today have in one way or another raised the prospect of a move to the Cloud. Yet fewer than 29 percent expect to be running the majority of their IT operations in the Cloud within the next 5 years[1]. Fact is that everyone’s talking about the Cloud, but few have defined it, much less created a strategy around it . Why? Because you can’t very well migrate well if you don’t know what to pack. Yet the promise of the Cloud is very real; the opportunities that a Cloud model presents can be significant for the enterprise that gets it right.



Quote for the day:

"I am not discouraged, because every wrong attempt discarded is another step forward." -- Thomas A. Edison

February 13, 2014

Review: 4 NAS appliances deliver big storage cheap
The four contenders in this roundup -- the LenovoEMC PX12-450r, the Infortrend EonNAS 1510, the Netgear ReadyNAS 4200, and the QNAP TS-1279U-RP -- are all 12-bay rack-mount systems that provide as much as 48TB of SATA storage. They can serve as iSCSI SAN targets, handle light server and database workloads, and support file sharing among Windows (SMB/CIFS), Apple (AFP), and Linux (NFS) clients. Naturally, they're also ideal targets for network backups, and they can easily replicate those backups off-site.


Agile Retrospectives: Why They Matter
Working with external entities and their different operating models can often prove challenging for organizations. Thus, "Customer collaboration over contract negotiation" (Agile Manifesto) proves to be an integral principle in the region of Influence, as it encourages organizations and individuals to involve the end-user/customer/external entities earlier in the process of strategy and implementation to avoid surprises down the road, minimize technical debt and sunk costs over time, and deliver on a consistent cadence.


What Ever Happened to the 'FIDO Alliance' That Was Going to Revolutionize Authentication?
The Fast IDentity Online Alliance, as it's officially known started with six founding members, including PayPal chief information security officer Michael Barrett and the start-up Nok Nok Labs, founded by Ramesh Kesanupalli, as a core technology provider. Nok Nok Labs is building prototype code to support the new authentication specification called the Online Security Transaction Protocol (OSTP).


Answering Common Cloud Security Questions from CIOs
With the news stories of possible data breaches at enterprises like Target, and the current trend of companies migrating to cloud environments for the flexibility, scalability, agility, and cost-effectiveness they offer, CIOs have been asking hard questions about cloud security. As CIO, protecting your data (and your users) is one of your key responsibilities. Whether you already have some cloud projects running or are starting your first cloud project, these questions and answers may provide you with solutions and introduce some new techniques.


The Business Technology Challenge of 2014: Information Optimization
Information optimization is a new focus in the enterprise software market. It builds on existing investments in business applications, business intelligence and information management and also benefits from recent advances in business analytics and big data, lifting information to higher levels of use and greater value in organizations. Information optimization also builds on information management and information applications, areas Ventana Research has previously researched. For more on the background and definition of information optimization, please see my colleague Mark Smith’s foundational analysis.


Brace yourself for a virtual sea change in storage
IT pros usually feel passionate about storage and have specific interests in the topic. In many cases, storage constitutes one of the largest investments (if not the largest investment) in the data center. That said, it's very much our responsibility to give a serious look at all of the new storage technologies that are available. There has been quite a lot of noise made about one upcoming technology: VMware Virtual SAN. It will soon exit beta and is quite popular with many virtualization professionals in the industry.


3 Ways To Steady Your Leadership in a Changing World
Why, we often wonder, does someone fall away in their leadership role? What happened within these individuals that allowed them to drift from promise to demise? And how do we not only spot the signs, but keep ourselves from meeting the same fate? Like a taproot that anchors a tree in order to weather the storms it’s exposed to, we as leaders need to keep ourselves steady. It’s a slow fade from having character to having no credibility, so we must put certain practices into our daily lives if we’re to remain relevant and continue to make a positive impact in our worlds.


Big data on wheels
The bottom line: data automatically generated by cars provides a fantastic “fuel source” for big data and analytics. In fact, the McKinsey Global Institute estimates that the automotive industry will be the second largest generator of data by 2015. This estimate is not surprising, since some plug-in hybrid vehicles generate as much 25 GB of data in just one hour. Fun fact: the McKinsey Global Institute estimates that the leader in machine data is the utilities industry, with its bevy of smart meters, usage trackers, geographic sensors and other monitoring technologies.


Microsoft Loses a Number to Try to Gain a Future
Power BI offers ways to move all kinds of data into and out of Excel’s rows and columns, both from corporate databases and from other data sources that Microsoft has gathered by crawling the web, and ways to clean it up so the numbers can work reliably. Public data is stored in Azure, which also serves as a link to proprietary data that corporate customers can look up from the field. The “BI” stands for “business intelligence,” the kind of comparative data analysis that is done both by stalwarts like SAP and by younger companies like Tableau Software.


Banks push for tokenization standard to secure credit card payments
Debit and credit cards based on the EMV technology use an embedded microchip, instead of a magnetic stripe, to store data and are considered almost impossible to clone for fraudulent purposes. Though the rest of the world moved to the technology years ago, the U.S. has lagged behind for a variety of reasons. However, after the recent Target breach that exposed data on 40 million debit and credit cards, calls to adopt the standard in the U.S. have become more strident. MasterCard and Visa have said they want merchants and banks to be ready to start accepting EMV cards by October 2015.



Quote for the day:

“The growth and development of people is the highest calling of leadership.” -- Harvey S. Firestone

February 12, 2014

For international travelers, is basic business data security enough?
Lackey said travelers may encounter a greater quantity of threats abroad, but much like how most traffic accidents happen within a mile of one's home, users are more likely to be compromised by the Wi-Fi network of a local café they frequent than a connection they use in a foreign country. To protect devices while abroad, Lackey advised travelers to take as few computing devices as possible, especially to Russia and China, and to ensure that the software running on all machines is updated to the latest version available.


Technology plays greater role in relationships
"I think tech is mostly helpful to relationships," said Dan Olds, an analyst with The Gabriel Consulting Group. "It gives people the ability to communicate in more and different ways. Text messages make it easy to toss out those quick 'I'm thinking about you" or 'I'm thinking about you, and I'm still mad about last night' messages. Communication isn't only about good things, right?" Olds said he's not surprised that more people didn't complain about technology getting in the way of their relationships or at least irritating them


U.S. to offer companies broad standards to improve cybersecurity
Exactly one year after President Barack Obama issued an executive order directing a Commerce Department agency to compile voluntary minimum standards, the National Institute of Standards and Technology, or NIST, is due to issue guidelines, which companies have no obligation to adopt. Drafters of the framework had to allay concerns by many in the private sector that their voluntary standards could someday become regulations. The threat of restrictive rules has helped stall progress on passing a cybersecurity law in Congress.


CRM Will Be at the Heart of Digital Initiatives for Years to Come
"CRM will be at the heart of digital initiatives in coming years. This is one technology area that will definitely get funding as digital business is crucial to remaining competitive," said Joanne Correia, research vice president at Gartner. "Hot areas for CRM investment include mobility, social media and technologies, Web analytics and e-commerce." Gartner expects CRM market growth to stay moderate in 2014, following three strong years of investment. CRM software revenue is forecast to reach $23.9 million in 2014, with cloud revenue accounting for 49 percent.


Regulation leads list of top ten risks for 2014
Regulatory changes and scrutiny are the risks business leaders are most concerned about for 2014, according to a new survey conducted by North Carolina State University’s Enterprise Risk Management Initiative and consultant Protiviti. “It’s a message for policymakers,” said Jim DeLoach, CPA, a Protiviti managing director. “… The bottom line is, it does have a cost in that it does affect business and it does affect decision-making around hiring and investing.”


FATCA tax deal with U.S. takes some heat off Canadian banks
Canada has finalized a deal with the U.S. government that takes a lot of heat off of Canadian banks — but could spell big problems for thousands of their customers. Finance Minister Jim Flaherty and National Revenue Minister Kerry-Lynne Findlay have signed the agreement to implement the U.S. Foreign Account Tax Compliance Act. Introduced in the U.S. in 2010, the law is meant to track down U.S. tax cheats living abroad.


Is user activity monitoring the only way to spot stolen credentials?
Automated security tools can only take an organization so far in this battle, Chuvakin noted, regardless of what many vendors would lead enterprises to believe. ... "A lot of things can be done by algorithms, but there is still the need for somebody to say, 'That looks pretty bad,' or 'No, based on what I know, this is not a compromise.'" Chuvakin said. "That's just the context that a machine may not have, but the human analyst can figure it out."


Attackers use NTP reflection in huge DDoS attack
The attack could be larger than the one last March against Spamhaus, a spam-fighting organization and CloudFlare customer whose website was hit by a 300Gbps DDoS attack, which was considered to be the largest in history at the time. CloudFlare reported then that it caused congestion at critical Internet exchange nodes in Europe. However, other companies later challenged the reported impact.


5 Ways We Neglect Our Own Creativity - And How To Bring It Back
Building things with our hands, words, and minds can be a bit terrifying. Our subconscious is at work during the creative process and sometimes what lives there can be scary. But while your mind might be telling you to run the other way, resist the urge. As Rainer Maria Rilke put it in his Letters to a Young Poet: "Why would you want to exclude from your life any uneasiness, any pain, any depression, since you don't know what work they are accomplishing within you?” In other words: It pays to be a little tortured.


Big Data Analytics for Security
Big data analytics—the largescale analysis and processing of information—is in active use in several fields and, in recent years, has attracted the interest of the security community for its promised ability to analyze and correlate security-related data efficiently and at unprecedented scale. Differentiating between traditional data analysis and big data analytics for security is, however, not straightforward. After all, the information security community has been leveraging the analysis of network traffic, system logs, and other information sources to identify threats and detect malicious activities for more than a decade, and it’s not clear how these conventional approaches differ from big data.



Quote for the day:

"Success is less a function of grandiose predictions than it is a result of being able to respond rapidly to changes as they occur" -- Jack Welch

February 11, 2014

Microsoft staffs up its evolving Internet of Things team
Microsoft is staffing up its Internet of Things (IoT) team that is part of its unified Windows division and may be expanding its charter, as well. The IoT team, at least originally, was the renamed Microsoft Embedded team, according to a couple of sources of mine. Microsoft management moved the Embedded team from under the Windows Server group to the unified Windows org under Microsoft Executive Vice President Terry Myerson last fall.


RenewIT: The EU Project Focusing On Green Energy
The project will be led by the energy research center at the Catalonia Institute for Energy Research (IREC) and will use experts on renewable energy systems (from Aiguasol in Barcelona) and energy storage (at the Technische Universität Chemnitz in Germany), data center monitoring (Loccioni in Italy), workload and application energy management (BSC) and energy efficient data center design (Deerns in Amsterdam).


Shape the Culture You Want through the Stories You Tell
One of the values that Johnson believed in and that he wanted to instill in his team at Facebook was rewarding the people who fixed stuff. The natural tendency for many engineers is to gravitate toward working on new and innovative systems, but the unsung heroes tend to be the people who helped make an existing system much faster or who systematically reduced a system’s error rate to make it more reliable. They’re the ones who worked on the less glorious tasks but were instrumental in getting things to work.


The Modern CMO's New Best Friend
Many CMOs have had to learn about data—and social, and analytics, and more—on the job. Trial by fire is fine, as long as that doesn’t turn into a full-time job as a fire fighter. However, without a strong analytics background, CMOs often feel they have the right strategies—yet no defensible or go-to strategies for repeating the solutions. The fact is, many shunned data as cold and out of touch with the emotional drivers of consumer behavior. The opposite is true today, with the volume of data on customer sentiment at an all-time high.


Creating Cloud Optimization with Network Intelligence
The direct proliferation of cloud computing has resulted in a huge boom in traffic over the WAN. There are more users connecting, a lot more data points, and the modern data center sits right in the middle. Throughout this entire cloud evolution – the infrastructure was forced to change as well. Edge and core routing needed to evolve to handle this influx of traffic and new content. Service providers as well as enterprises deploying demanding, mission-critical applications are facing unique networking challenges.


Handling Open Source Licensing
Arun Kumar, GM, Red Hat India says, “In an industry where there are changes and developments every single day, we have engineering teams that track every single change--a bug fix, security enhancement, or others, and ensure our customers’ mission-critical systems remain up-to-date and stable. It is not easy to do this, but with a team that is constantly on its toes and tapping into every single development, we have managed to provide the best services to our clients time and again.


Researchers uncover cyber spying campaign dubbed 'The Mask'
Raiu said The Mask hit government institutions, oil and gas companies and activists, using malware that was designed to steal documents, encryption keys and other sensitive files, as well as take full control of infected computers. The operation infected computers running Microsoft Corp's Windows and Apple Inc's Mac software, and likely mobile devices running Apple's iOS and Google Inc's Android software, according to Kaspersky Lab.


Nesting Levels in SQL
In SQL there is a hierarchy of data in which the outer level is the schema or database. The database is made up of tables (which can be base or virtual tables). Each table is made up of a set of rows. These rows have no ordering, but all have the same structure, so it is proper set. Each row is made up of columns. The columns are scalar values drawn from a domain; a domain is set of values of one data type that has rules of its own. These rules include the type of scale upon which it is built and reasonable operations with it.


CIO interview: The Met's Richard Thwaite on its Total Technology IT strategy
The main challenge in delivering the strategy is in getting the business to think through the implications of the technology, he says. The IT team needed to translate how technology could help achieve those goals. “Fundamentally, the tech is pretty old,” he says. “It’s had a long life and we’re at the state where it needed a lot doing in terms applications and infrastructure – it needed a complete refresh.” But reductions in budgets, combined with increased performance expectations, will have an effect on how the Met goes forward with its latest approach to IT.


Learning to Embrace Changing Requirements
The principles of agile software development were first proposed thirteen years ago. Unfortunately today there is a lot of confusion around what it is and how it should be used. I attribute this in large part to the fact that it became an industry buzz-word where “agile” became synonymous with “good” and the ubiquitous two-day training on scrum processes watered down the original intent of the agile software development manifesto.



Quote for the day:

"Don't let your ego get too close to your position, so that if your position gets shot down, your ego doesn't go with it." -- Colin Powell

February 10, 2014

This smartphone will self-destruct in 5 seconds
DARPA said on its website that it's looking for devices, such as sensors, radios and phones, that work as well as off-the-shelf commercial options but can be remotely triggered to break apart. IBM has been tasked with developing materials, components and manufacturing capabilities. The company, according to DARPA, is working on a "strained glass substrate" that will shatter. A trigger, such as a fuse, will be used in at least one, if not multiple, areas on the device.


Shouldn't there be a better way to curate global threat intelligence?
Curating threat intelligence has become one of the hottest topics in security. Gathering information regarding the threat landscape isn't a new concept, but determining what actually constitutes threat intelligence is still fuzzy, and its current buzzword status in the industry isn't helping. Indeed, vendor marketing teams use the term liberally when promoting their products, replacing the "next-gen" hype with this new version of security secret sauce.


Black Day at I/O Gulch
Not long ago, a crack team of SQL Server experts was flamed for a crime against database normalization they didn't commit. These men promptly escaped from the taunts of academic relational theorists. Today, they survive as Website editors and software evangelists. If you have a problem, if no one else can help, and if you can find them, maybe you can hire the DBA-Team.


The Principles of Effective Risk Management
Enterprise Risk Management is one of the core domain of Governance. In some business sectors, the success depends on an intelligent and effective risk management principles, framework and practices. The advancement in technology, like big data and analytics also plays a key role in making the risk management effective and adding value to the business. Other factors that necessitate a well architected ERM in an organization include, regulatory & compliance needs, security and privacy expectations, disasters and business continuity needs, etc.


To Succeed with Big Data, Begin with the Decision in Mind
BWTDIM means identifying the decisions that matter to your organization, the decisions that make the difference between hitting your targets and missing them, the decisions that “move the dial.” These decisions may be strategic or tactical decisions but are also often operational, day-to-day decisions that must be made at the front lines of your organization like the call center, the branch or the warehouse. BWTDIM means understanding how you must make these decisions, and how you might make those decisions to more effectively hit those objectives.


Why Open Government Data Makes Sense for India
Open Data Platform set up by NIC can be accessed at data.gov.in. This platform enables all government departments to contribute their datasets in open format. Thus, datasets are contributed are processed through a predefined workflow system for approval for publishing on the data portal. Citizens can access open data platform to browse, and search for the data that is relevant to their needs and can also download the datasets. Not only citizens, civil society, academia, research organizations, journalists and many others who need data for variety of purposes are the potential users of this platform.


Automakers push envelope on wearables, augmented reality despite regulatory concern
Another key area of focus for automakers going forward is creating unique augmented reality applications for use both inside and outside the car. “With wearables, that is another way of adding even more relevant user interface,” said Dominique Bonte, London-based vice president and practice director at ABI Research. “This is a way for the auto industry to bring advanced interfaces into the vehicle and bring more entertainment services into a vehicle in a non distractive way.


New network architectures and traditional components: Why both are key
To clients with questions about where to invest in their core networks, Chandler said he ultimately advises them to sit tight. "I believe we are looking at two things right now," he said. "The initial push was development of southbound APIs, so there was a lot of talk about OpenFlow and vendor-specific APIs. Now I think the second shift is over the programmatic access to the network, and now we don't care so much how we talk on the southbound API from the controller. There is much more interest in the controller and the applications the controller can run."


Maintaining PCI Compliance is a Big Challenge for Most Companies
The problem has to do with a tendency by many companies to treat PCI compliance as an annual end goal rather than treating it as part of a continuous risk management effort. "Too many companies still look at PCI as pure compliance and don't use it to mitigate risk," Simonetti said. "Often, compliance is managed as a project -- particularly as the build phase of a project." Once compliance is achieved, many companies simply stop paying attention, he said. "It is really a failure to use compliance standards and tools and a day to day basis," Simonetti said.


The Secrets of Database Change Deployment Automation
Dealing with database deployments is tricky; unlike other software components and code or compiled code, a database is not a collection of files. It is not something you can just copy from your development to testing and to production because the database is a container of our most valued asset – the business data, which must be preserved. It holds all application content, customer transactions, etc. In order to promote database changes, a transition code needs to be developed - scripts to handle database schema structure, database code, and content used by the application.



Quote for the day:

"Time is our most valuable asset, yet we tend to waste it, kill it, and spend it rather than invest it." -- Jim Rohn

February 09, 2014

Quantum Internet: First Teleportation to a Solid-State Quantum Memory
One of the building blocks of the quantum Internet will be quantum routers that can receive quantum information from location and route it on to another without destroying it. So the race is on to demonstrate this kind of technology, which has the potential to revolutionize communications. Today, Felix Bussières at the University of Geneva in Switzerland and a few pals say they’ve taken an important step towards this. But crucially they’ve done it for the first time over the kind of ordinary optical fiber that telecommunications that are in use all over the world.


Managing product binaries in virtual application pattern workloads
When you develop your virtual application pattern workload to be installed on IBM PureApplication System, IBM SmartCloud Orchestrator, or IBM Workload Deployer, you will encounter situations where your plug-in needs to manage product binaries. The product binaries may be yours or from a third party vendor such as IBM, SAP®, or Oracle®. In this article, you will see different strategies that you can follow to manage the product binaries and how your plug-in can access and install the binaries. You will also understand the relative advantages and disadvantages of these different strategies.


Interview: Ubuntu Takes on Hyperscale Using Open Source Technology
Ubuntu makes it easy to deploy and use the widest range of applications possible: from nginx to memached. We focus on making Ubuntu the best quality we can – everything should work beautifully. Not only do we deliver the widest range of applications, but we deliver them like clockwork every six months. This means that anybody who needs the most recent version of an application can get it easily. Another quality that users like is that Ubuntu is available everywhere – both on the desktop and on the server – making it an ideal OS for developers.


Why Wearable Computing is Waiting for A.I.
You could be eating in a restaurant, and Google Glass could, for example, tell you that it's the spot where your father proposed to your mother. Or that your friend will be late because of traffic, the salmon got bad reviews online, your parking meter will expire in 20 minutes, or the bathroom is through the bar and up the stairs to the right. Imagine that such knowledge could simply appear into your field of vision at the exact moment when you want to know it. That's where wearable computing is going. That's why the wearable revolution is mostly an artificial intelligence revolution.


How LinkedIn Uses Apache Samza
The most basic element of Samza is a stream. The stream definition for Samza is much more rigid and heavyweight than you would expect from other stream processing systems. Other processing systems, such as Storm, tend to have very lightweight stream definitions to reduce latency, everything from, say, UDP to a straight-up TCP connection. Samza goes the other direction. It wants its streams to be, for starters, partitions. It wants them to be ordered. If you read Message 3 and then Message 4, you are never going to get those inverted within a single partition. It also wants them to replayable, which means you should be able to go back to reread a message at a later date.


3 Ways To Be An Effective Self-Leader
As a self-leader, this is where you take the initiative to get the direction and support you need to do an activity or achieve a goal. Depending on the amount of competence and commitment you have in any one area, you need varying degrees of support and direction from others. On my fitness journey, I realized that there were some areas of fitness where I needed close supervision and direction because I was an enthusiastic beginner with very little competence.


Heat System Called Door to Target for Hackers
Over the last two years, Mr. Rios and Terry McCorkle, also of Qualys, said that they found 55,000 HVAC systems connected to the Internet. In most cases, they said, the systems contained basic security flaws that would allow hackers a way into companies’ corporate networks, or the companies installing and monitoring these systems reused the same remote access passwords across multiple clients.


Cloud computing defined: Characteristics & service levels
“Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” Although this widely-adopted description of what makes a cloud computing solution is very valuable, it is not very tangible or easy to understand. So let’s dive a little deeper into cloud computing and why it’s different than just visualization alone, which is commonly mistaken to be cloud computing as well.


Bitcoin’s Political Problem
Money is always political. This is obvious enough when we argue about Federal Reserve policy in the United States, or who should next chair the interest rate-setting body. But for over 1,000 years, we have argued about the nature of our monetary systems and shifted between different ways of making payments. Seen in this historical context, Bitcoin and other cryptocurrencies are just the latest in a long line of challenges to prevailing technology—and to current political arrangements.


Anonymous targets Singapore govt with second tweetstorm
Anonymous has stepped up efforts to raise awareness over ongoing criminal procedings in alleged hackers in Singapore linked to the hacktivist group. ... The arrests included those of James Raj Arokiasamy, alleged to be the hacker under the moniker "Messiah", linked to the defacement of at least one government Web site; what it dubbed the "Singapore 5", comprising 5 men accused of civil disobedience involving pro-Anonymous graffiti on a wall; and also "the plight of all the anons involved".



Quote for the day:

"Those who know how to win are much more numerous than those who know how to make proper use of their victories" -- Polybius

February 08, 2014

7 ways Big Data can help your BI solution
Big Data continues to be the buzzword du jour. And as with most popular concepts espoused by everyone from marketers and consultants to purveyors of software and infrastructure, the phrase can mean different things to different people. For us at Sullexis, we think of Big Data as a set of technologies that enable our clients to consume and process high volumes and/or diverse types of information. But our clients need ROI. Neither access to a large amount of diverse data nor possession of the most sophisticated Hadoop stack of Big Data technologies will generate ROI without the right application.


MobileFirst, API's, and PaaS - Field Perspective
Enterprise back ends have grown more complex. The larger the enterprise, the better the possibility that you have to fetch data from a shared back end. This leads developers to develop an application Domain Model that represents the business view of the application. When an application will have to access multiple back ends then a Domain Model typically referred to as a Canonical Data Model, which represents the data model for an enterprise and maintains relationships to different back end systems.


Disinformation Visualization: How to lie with datavis
When working with raw data we’re often encouraged to present it differently, to give it a form, to map it or visualize it. But all maps lie. In fact, maps have to lie, otherwise they wouldn't be useful. Some are transparent and obvious lies, such as a tree icon on a map often represents more than one tree. Others are white lies - rounding numbers and prioritising details to create a more legible representation. And then there’s the third type of lie, those lies that convey a bias, be it deliberately or subconsciously. A bias that misrepresents the data and skews it towards a certain reading.


Phones, Browsers, and Search Engines Get a Privacy Overhaul
Blackphone, a smartphone to launch next month, is perhaps the most ambitious of these projects. The Android handset will function like a regular smartphone but has a series of modifications to protect the privacy and security of its owner. Blackphone is a joint venture between Spanish smartphone manufacturer Geeksphone and Silent Circle, a company that Phil Zimmerman, inventor of the PGP encryption software (see “An App Keeps Spies Away from Your Phone”), founded to make apps that encrypt voice calls and text messages.


This iPhone-Sized Device Can Hack A Car, Researchers Plan To Demonstrate
The Spanish researchers’ work adds to a growing focus in the security industry on the vulnerability of networked automobiles to hackers’ attacks. Before the Defcon hacker conference last July, researchers Charlie Miller and Chris Valasek put me behind the wheel of a Ford Explorer and a Toyota Prius and then showed that they could plug their laptops into a dashboard port of vehicles to perform nasty tricks like slamming on the Prius’ brakes, jerking its steering wheel and even disabling the brakes of the Explorer at low speeds.


Personal History May Thrust New Microsoft CEO Into Visa Debate
Nadella earned a master's degree in computer science at the University of Wisconsin in Milwaukee, and an MBA from the University of Chicago. Neil Ruiz, a senior policy analyst at the Brookings Institution, doesn't believe that Microsoft is trying to make any policy points with the Nadella appointment. But by nature of his background, "he can add a more human touch to the Microsoft message" in the immigration debate.


How to Avoid Irrelevance, Guaranteed!
You might be an innovator, developer, organizer, maximzer, or activator. But, irrelevance looms large if you can’t apply your strengths – in relevant ways – to the people you serve. Peter Drucker said, “The purpose of a business is to create a customer.” A.G. Lafley, CEO of Procter & Gamble, was mentored by Drucker. Lafley listened to his mentor. The first core strength of P&G is a deep understanding of the customer. (Game-Changer by Lafley and Charan)


NoSQL Vs. RDBMS for Interactive Analytics: Leveraging the Right and Left Brain of Data
Limiting the structured versus unstructured debate to just operational use cases ignores three key factors for downstream analytics: the tools, domain expertise and SQL compatibility gaps in the current NoSQL ecosystem, the challenges of exporting and warehousing volumes of this changing, semi-structured data and hidden costs of leveraging operational databases for complex, ad hoc analysis. Here is what organizations must additionally consider for their analytics needs as they evaluate NoSQL and RDBMS.


Are Analytics Shifting Power from Executives to Employees?
Executives can no longer hoard decisions at the C-suite level. Savvy executives are realizing they must now delegate and distribute decision rights deeper into their organization to empower their managers and employees. This is because of the exponentially growing mountain of data, both structured (numbers) and unstructured (text) data including social media, and a sped-up and volatile world. In my imagined pyramid, the executives are at the top, just like in an organization chart. Their decision types are strategic ones.


Why effective Web app firewalls are worth the investment
Many organizations look at Web app firewalls as protection technologies that are deployed to detect and stop attacks before they can result in some sort of loss or compromise. This is certainly desirable, but, as previously discussed, actually achieving these results can be challenging and involve hidden or unplanned costs. An alternate way to look at a WAF deployment is to consider it a way to gain intelligence about the application's usage and attack patterns.



Quote for the day:

"The harder you work, the harder it is to surrender." -- Vince Lombardi