March 09, 2014

Sustainable Architectural Design Decisions
Software architects must create designs that can endure throughout software evolution. Today, software architecture comprises not only a system’s core structure but also essential design decisions.1,2 So, to achieve sustainable architectures, we need sustainable design decisions. In correspondence with Heiko Koziolek’s definition of architecture sustainability,3 we argue that architectural design decision sustainability involves: the time period when the right and relevant decisions remain unchanged; and the cost efficiency of required changes to those decisions.


Self-service analytics tools have value, carry risks
Speaking at the 2014 TDWI BI Executive Summit in Las Vegas, Peter Mueller, head of the global business analytics program at Lonza Pharma & Biotech, said people often refer to data as a corporate asset. But that view of information's business value can be jeopardized by out-of-control BI and analytics applications, particularly when the analysis is done by workers with little training. If a company isn't careful, the analysis process can be mismanaged or misinterpreted, leading to potentially damaging data inconsistencies and faulty findings.


The Principles of Agile Enterprise Architecture Management
The Agile Enterprise Architecture is all about letting changes happen and thus keep the Architectural Principles continuously evolving. This will also call for having an appropriate lifecycle that facilitates the evolution, development and adaption of the current and the target reference architecture continuously. This will keep the maturity levels of various IT management functions also changing over time. In this blog, let us focus on the key principles that enables an Agile Enterprise Architecture Management


Eight Eye-openers From Salesforce.com's Annual Report
Last week, Salesforce.com reported its fourth-quarter and year-end fiscal 2014 results, announcing a major bump in revenue and even raising its guidance significantly. But the fast-growing cloud vendor is also continuing to post significant losses as it spends big on sales, marketing and acquisitions. Salesforce.com's annual report, which was released this week, paints a fuller picture of the vendor's opportunities and challenges, while also revealing a series of eyebrow-raising facts. Here's a look at some of the highlights.



Information Management: A Love Triangle
Let’s take a closer look at the interplay among these three categories. We have all heard the expression “time is money.” How many of us have stopped to consider that in the realm of resource management, information is money? Literally! For many, the information resource is literally, a financial resource. How many people receive a paycheck anymore? In 2008, according to the U.S. Treasury Department, 66 percent of Americans used direct deposit where, in essence, information representing money is transferred from one entity such as an employer to another entity such as a bank, credit union or savings and loan.


Health IT benefits outweigh the negative, report shows
The report underscored quality as the metric most improved by implementing health information technology, as the lion's share of studies, 58 percent, saw positive outcomes, and another 24 percent saw mixed-positive results. When officials drilled down further into the data, they also found clinical decision support, computerized provider order entry and meaningful use all produced the most beneficial outcomes, at 66 percent, 64 percent and 63 percent positive respectively. Contrastingly, electronic prescribing was the least able to prove its worth, as more than one-fourth of all studies reported negative outcomes.


Coaching the CxO
To most managers, regardless of the level, change is considered a threat. This is particularly the case when changes imply that their own role will change, which is quite often the case for managers in agile transformations. The human brain responds to this threat in the same way as when you would encounter the growling bear. To the brain, a threat is a threat no matter if it is a life-threatening situation or if someone feels threatened in his or her organizational position.


Enterprise architecture best practices for Agile development
"There seems to be a correlation of success for enterprise architecture teams working in a collaborative, lightweight manner. Teams that are not working like that have a much higher failure rate," said Scott Ambler, senior consulting partner of Toronto-based Scott Ambler + Associates. What does it mean to work in a lightweight manner? "They're not producing a lot of documents or models because detailed artifacts tend to be ignored by development teams, if they are read at all. They are helping teams to understand what the architectural vision is and [are] actively helping to build it out," Ambler said.


Big data: Handle with care
There are two fears – coming across as ‘big brother’ and data leaks and misuses that become public, such as the OfficeMax story. Both can have a serious effect on customer retention and loyalty. In fact, studies indicate that 66 percent of your customers would leave if you lost or mistreated their data. It turns out that the mysterious asset of ‘brand loyalty’ can be quantified after all. Fearing the negative consequences of big data is a healthy exercise, but abstaining from big data projects is not. For organizations sitting on the sidelines and waiting until all the unknowns are known, you picking the wrong strategy.


Knowing the Value within your Business Model is Vital
Although much of the architecture of any business model is not seen, it is the ‘heart’ of what delivers the value. We can’t ignore or gloss over the value architecture, we must address it fully. Fluidminds business model approach devotes much of its ‘canvas’ to this part. The initial questions of clarifying the offer, the value chain, the need for identifying core capabilities, for explaining the distribution and communication channels and who the (potential) partners are, all are initially raised specifically within the canvas to be addressed.



Quote for the day:

"It takes time to succeed because success is merely the natural reward of taking time to do anything well." -- Joseph Ross

March 08, 2014

Getting The Right Confidence With “Go Cloud” Strategy
Of course, no technology is without risks, and cloud for one does have its fair share of risks, but the trick is the see how much cloud and how to manage the risks around what is put on the cloud. Amongst the several risks include issues surrounding service provider continuity, contracting and SLAs, data protection, regulatory compliance, audit and assurances etc. In ensuring that the organization’s cloud strategy will deliver the promised value in the long run, what is required is a governance based approach that aligns the management and operational requirements underlying cloud operations with the enterprise cloud strategy.


Video: Introducing the Wolfram Language – Knowledge-based Functional Programming
In this video, Stephen Wolfram introduces the Wolfram Language, a “knowledge based” symbolic programming language that enables powerful functional programming, querying of large databases, flexible interactivity, and easy deployment. The Wolfram Language provides seamless access to the curated and continuously updated Wolfram Knowledgebase used in Wolfram|Alpha—which includes a wide range of types of data for physics and chemistry. Free-form linguistics provide a convenient mechanism for accessing all available data; more common categories also have specific associated Wolfram Language functions.


Is Artificial Intelligence About to Change Doing Business Forever?
So there are many different benefits to be achieved with Artificial Intelligence, but it is not all hallelujah. Artificial Intelligence has already made promises for decades and only recently we are seeing some, significant, results. There are many challenges involved in creating truly intelligent software and machines. We are still very far away and currently the best AI, the ConceptNet 4 Artificial Intelligence, is said to be as smart as a four-year-old. Big Data startups working on AI solutions therefore require a lot of time to improve the applications.


Networked World: What It means To People Processes?
A simple enough example, but what it clearly highlights is that people processes are no longer predominantly uni dimensional. That in many ways actually implies that no processes are uni dimensional anymore and that leads us to a very radical conclusion which is – “ prefixes defining what kind of processes they might are slowly becoming obsolete for if not all, most processes“. For the HR professional – the implication is far reaching; the rules defining how we work with our associates have changed dramatically.


Sorry, phone number, but it’s time for you to die
It doesn’t take an argonaut to understand the benefits of using a different identifier and an internet-based calling platform. Today, a U.S. citizen that travels to England can buy a SIM card in a vending machine upon landing, load it up with data, and effectively use their smartphone exactly as they would in the United States… save for the whole “calling and texting” thing. When you swap the SIM out, your phone number goes dead for the duration of your trip. But why? That new SIM is fully capable of channeling voice calls to your phone via data networks—the only thing we need is implementation.


Use the Codename: BlueMix DataCache service in a Node.js app
This article explains how to use the DataCache service in a Node.js application hosted byCodename: BlueMix. DataCache is a distributed cache (powered by WebSphere® eXtreme Scale technology) that you can use as an efficient and reliable key-value data store. I provide a client Node.js module that you can extend and use in applications that you choose to host on BlueMix. You use the DataCache service over the network through its REST API. The client module abstracts the REST bits, providing higher-level methods for managing key-value objects.


Virtual Reality Startups Look Back to the Future
“There’s an extremely intense enthusiast community that loves VR,” Lanier says. “But it can create an illusion that interest is perhaps larger than it really is. I believe Oculus Rift could launch tomorrow and comfortably sell a few hundred thousand units. But the real challenge is how to sell 200 million units. The enthusiast community is loud and adorable, but no matter how much you please them, you won’t necessarily reach beyond them.” Luckey is, understandably, a great deal more positive. “People have wanted virtual reality for decades,” he says.


Mobile Tech Extends Hospitals' Reach Into The Home
The evolution of devices like Fitbits is "incredibly exciting," agreed Marc Probts, CIO of InterMountain Healthcare in Salt Lake City. Home monitoring has "tremendous" potential, he added. Doctors don't need to analyze every byte patients produce, said Weschler. Rather, clinicians can quickly check if patients' measurements lie within baselines, perhaps via a red light/green light dashboard icon. Real-time monitoring would also alert emergency services if a patient appears to need immediate medical assistance, he said.


CFOs say companies will hire more techies in 2014, but not in IT
Another facet of the overall picture, which might explain CFOs' optimism, is how IT positions can be redefined or shuttled about within a company. As InfoWorld's Bill Snyder put it in the above link, "Many IT jobs within enterprises have moved out of the traditional IT ghetto and into various business-related departments." In other words, the jobs traditionally labeled "IT" might well be migrating out from under those umbrellas -- although that in turn depends on who's applying the labels and to what end.


Breaking The Cycle Of Legacy IT Investment
While the cost of maintaining legacy software can be a hidden parasite draining the lifeblood of the IT department, it can be eradicated through a careful and thoughtful modernization project. Whereas the high costs of legacy application upkeep deprives the IT department of resources, the time and funds saved from a systems upgrade can be used to promote faster, more aggressive innovation throughout an organization.



Quote for the day:

"Don't let what you cannot do interfere with what you can do." -- John Wooden

March 07, 2014

The dashboard is due for disruption
In-vehicle systems also have long qualification cycles because carmakers have to worry about safety, reliability and heavy regulations. As a result, they are risk averse, and once they approve a set of hardware and software, they don’t make changes for a long time. That’s why Nvidia has announced that it plans to keep the Tegra 2 and 3 in production for a decade. Finally cars have long lifecycles. Smartphone lifecycles are measured in months while the average age of a car on the road in the U.S. is more than 11 years--a lifetime in the tech industry.


Europol issues public Wi-Fi security warning
Typically, attackers set up rogue Wi-Fi hotspots to dupe victims into mistaking them for official public Wi-Fi hotspots and connecting to them. This means attackers are able to monitor all communications through the rogue Wi-Fi access points and steal data exchanged with banks, retailers and other online service providers. "Everything that you send through the Wi-Fi is potentially at risk, and this is something that we need to be very concerned about,” said Oerting.


Toshiba's OCZ cranks up speed on new 3.2TB solid state drives
At 3.2TB, OCZ is offering the highest storage available in SSDs. SSDs are catching up fast to hard-drives, which have reached a maximum capacity of 6TB. However, SSDs remain more expensive than hard drives. OCZ will continue to offer its own line of SSDs, and nothing is affected by Toshiba's acquisition, said Scott Harlin, director of marketing communications for enterprise at OCZ. "Toshiba will continue to develop, produce, and market their own line of Toshiba-branded SSDs while we will focus on developing, producing and marketing OCZ-branded SSDs that leverage our in-house technology," Harlin said in an email.


Crazy theories and global manhunts for Bitcoin's creator Satoshi Nakamoto
Many have looked at the name "Satoshi Nakamoto" as a puzzle itself, meant to hide the identity of the people or groups behind Bitcoin.The most popular of these is the idea of an invisible hand controlled by a corporate consortium. The name Satoshi Nakamoto, in this theory, derives from these four names: Samsung, Toshiba, Nakamichi Motorola. Others have translated the name to try to find clues. One such theory alleges that the name "Satoshi Nakamoto" shows ties to the CIA. From a Bitcoin forum post just weeks ago:


How To Use Analytics To Build A Smarter Mobile Website
Frequently, design and development teams will be asked to redesign a dated website to be responsive. Looking at existing data would provide crucial insight into how best to present information to mobile users. Google Analytics offers a number of free features for incredibly detailed analysis of mobile activity, with the ability to easily compare to desktop activity. If you haven’t yet installed Google Analytics, setting it up is easy. Just create a free account, and then Google will walk you through the process. You’ll need to place a tracking code in your page before you can start to collect the sort of data that we’ll review in this article.


Security by design still not a reality, says security veteran
Apart from research, Limnell sees security training as a key element to tackling threats. “Companies spend millions on technological controls, but few spend anything on education, which is stupid,” he said. There also has to be a shift to a new security paradigm that aims at achieving cyber resilience. “This approaches starts with the assumption that a network can and will be breached,” said Limnell. “It cannot only be about keeping the bad guys out, you have got to have a plan for dealing with attackers when they breach your defences; identifying the intrusion and containing it,” he said.


Security Manager's Journal: Security flaw shakes faith in Apple mobile devices
Last week, Apple released an update known as iOS Version 7.0.6 to repair a security flaw in the SSL encryption implementation that could allow encrypted traffic to be intercepted and decrypted, thus compromising private data. My company's private data, to be precise. Updates such as this present several challenges to organizations like mine. First, we now need to have a process in place for getting critical security patches on phones, as we do for computers. And that's not easy to do. For computers, we have software that manages patches and can deploy an emergency security fix very quickly, with minimal intervention by system administrators or end users. On phones, we don't.


5 reasons to re-examine how leaders communicate
Here’s the problem with this masking approach, according to Mitchiner: “Employees have a sensitive BS detector and can smell when they aren’t hearing the whole story. They don’t voice this concern; they just walk out, thinking, ‘Management is not leveling with us.’ When employees don’t have the whole story, they themselves fill in the missing pieces. The resulting rumors can be far more damaging than if management had simply told the unvarnished truth in the first place.”


Surface tablets with digitized pens gain a toehold in healthcare
"Microsoft…is realizing that verticals can sort of 'surface' these opportunities where the platform offers benefits you couldn't get in desktop PCs," said Wes Miller, research vice president, Directions on Microsoft, an IT consulting organization based in Kirkland, Wash. Healthcare often uses Windows devices that miss the benefits of using a stylus or touch, he added. The big void is guidance from Microsoft on how corporations can build unique applications for their business, instead of just marketing Surface Pro as a desktop PC replacement, Miller said.


How Women Leaders Have Transformed Management
The emergent leadership Bock is talking about seems to be both non-positional (based on personal qualities rather than one’s title or formal power) and nonhierarchical (when people are comfortable acting from the center of a collaborative web). This model has, of course, been developing for some time—and I believe this shift has occurred at least partly because women have become profoundly interwoven into the fabric of most organizations



Quote for the day:

“The growth and development of people is the highest calling of leadership.” -- Harvey S. Firestone

March 06, 2014

IBM 'as a service' cloud pieces fall into place
IBM in recent days has bought its way to a near complete cloud computing stack. After a bit of integration work, IBM's cloud plans will become clear as it battles everyone from Oracle to HP to Amazon Web Services in a race to offset slowing hardware sales. Add it up and you could say all of IBM's as a services (aaSes) are coming together. ... That take may be a bit gushy, but IBM clearly has more cloud parts in place than it had just a few quarters ago. Here's a look at IBM's relatively new stack and where Watson is likely to f it into the mix.


New CTO previews VMware hybrid cloud strategy beyond DRaaS
The real issue with DR is that when you get into the SMB [small and medium-sized businesses] sector, most medium-sized enterprises don't have a budget for disaster recovery. They have a budget for backup, but not necessarily for DR as well. Where I see that whole DR as a Service market moving eventually is where providers will offer Backup as a Service but provide disaster recovery as a feature. Just about every organization understands that they need backup and that they need to recover files, so that's fine, just make it a feature of a Backup as a Service.


Google Cloud Performance Stability: A Closer Look
The claim that Google provides more consistent performance will have to be tested by each enterprise that moves applications and data to its cloud. I would recommend that they create a series of tests, using different loading profiles, such as simulating end-of-year processing using increasing loads on compute and storage, and then sustained loads for several days. This type of testing will tell you a lot. As most of us who have migrated applications to the cloud know, the characteristics and profile of each application are more of a determination of performance than the platform.


FACE Software Effort Builds Momentum
“We’re really trying to break that pattern by standardizing software and putting the business incentives in place to really change the way the government procures software and the way the vendors provide it.” More than ever, software drives the cost of avionics functionality, Howington says. The FACE initiative is addressing the cost and schedule-drivers behind avionics software development and deployment. “Done right, [FACE] will directly impact the conversation on how to meet military avionics needs in the current fiscal environment,” he says.


7 historical decisions that continue to pain programmers
Software developers make decisions all day long about how to best implement functionality, fix bugs, improve application performance, etc. But they also live with the consequences of decisions made by others in the past in the design of the languages, systems and tools they use to do their jobs. Some of those choices, which may have made sense or seemed inconsequential at the time, have turned out to have unintended, long lasting and painful effects on those who write code every day. Here are 7 choices made in the development of languages or operating systems that continue to give developers headaches to this day.


Red Hat polishes business process management suite
JBoss BRMS provides a platform for defining business rules so computers can make decisions based on these roles. For instance, an automobile insurance company may have a set of rules for guiding how much to charge customers, based on their age and type of vehicle. BRMS, and other business rules management software, minimizes the need to encode business rules directly into an application, which can be cumbersome to update should the rules change over time.


MongoDB chief: Why the clock's ticking for relational databases
"The first rule of a relational database is that every row in a table has to have the same set of columns as every other row, which we didn't think reflected reality," he said. "Relational databases in general — certainly all the leading products from the big vendors — don't have the capability built into the product to take a query and decide where the data is, execute the query there, bring it back and, if the data is in multiple places, aggregate it. "If the data on one of the servers is more than it can handle, move some of that data to another server that's less heavily loaded. The leading vendors still have to build those capabilities."


What do SaaS implementations mean for IT?
Indeed, organizations that adopt SaaS software are largely at the mercy of the provider when it comes to the availability of the application, Harzog said. Traditional monitoring tools are of little help with SaaS apps, since they require an agent on the application server. "Salesforce.com is not going to let you do that," he said, referring to the popular hosted customer relationship management suite. Meanwhile, application performance monitoring tools tend to monitor code, which is also a non-starter for SaaS-delivered apps.


Do You See Prison Bars or the Stars?
One way to remove organizational cultural barriers is to acknowledge a problem within organizations. Many companies suffer from an imbalance of how much emphasis to place on being smart versus than being healthy. Most organizations over-emphasize trying to be smart by hiring MBAs and management consultants with a quest to achieve a run-it-by-the-numbers management style. These organizations miss the relevance of how important is to also be healthy – assuring that employee morale is high and employee turnover is low.


Top Challenges and Roadblocks for CIOs in 2014
CIOs are today faced with lots of challenges and in this new era, the successful CIOs are those who can innovate with technology and bring a difference to the business of the organisation. Going forward, CIO can expect to face numerous roadblocks in achieving success and we at CIO&Leader thought of asking some of the CIOs what are the roadblocks do they expect in this calender year. According to Tridib Bordoloi, CIO, PTI, “We stay in a connected world where information is power and the access to information is phenomenal. In the emerging economic scenario business priorities are changing rapidly.



Quote for the day:

“Try not to become a man of success but a man of value.” -- Albert Einstein

March 05, 2014

Pre-installed malware found on new Android phones
After taking a close look at the suspicious application, Jevans said they found it wasn't the real Netflix app. "We're like, yeah, this isn't the real Netflix," Jevans said "You've got one that has been tampered with and is sending passwords and credit card information to Russia." Security experts have long warned that downloading applications from third-party marketplaces for the Android platform is risky since the applications have often not undergone a security review. Google patrols Android apps in its Play store, but malicious ones occasionally sneak in. Apple's App Store is less affected due to the company's strict reviews.


Creating cool animations and transitions in HTML5 app for Intel Android devices
One of the most exciting features of HTML5 is the <canvas> element that can be used to draw vector graphics and engender astonishing effects, interactive games, and animations. The HTML5 Canvas is picture-perfect for creating great visual material that augments UIs, diagrams, photo albums, charts, graphs, animations, and embedded drawing applications. HTML5 Canvas works with JavaScript libraries and CSS3 allowing you to create interactive web-predicated games and animations.


A .NET Developer Primer for Single-Page Applications
... a lot of .NET developers (especially in the enterprise) are dealing with an extreme amount of anxiety about JavaScript best practices, architecture, unit testing, maintainability and the recent explosion of different kinds of JavaScript libraries. Part of the trend of moving to the client side is the increasing use of single-page applications (SPAs). To say that SPA development is the future is an extreme understatement. SPAs are how some of the best applications on the Web offer fluid UX and responsiveness, while minimizing payloads (traffic) and round-trips to the server.


Treating healthcare data as an asset
One of the most challenging things any chief information officer (CIO) or chief medical information officer (CMIO) faces is getting support from across constituencies to transform the culture in IT and lines of business, not only to be more data-driven, but to recognize the value of combining data across silos to get greater insights. So, what is the catalyst to help get things started? ... when the executive leadership in an organization isn’t getting the reports and insights they need to make strategic decisions that make or break the business


Microsoft Tries to Relieve Security Fears with Office 365 Makeover
This kind of authentication was introduced to the Azure Cloud platform last September. Its introduction to Office 365 is the extension of a feature that has been available to administrators since the middle of last year, but clearly the level of risk for cloud services now is so great that Microsoft is offering it to everyone. This addition of multi-factor authentication is part of Microsoft ongoing effort to enhance security for Office 365, Andrew says, but it is not the only new step that is being introduced. The Office 365 team is already working on improving Multi-Factor Authentication for Office 365 from Office 2013 client applications.


The next wave of cars may use Ethernet
Currently, however, there are as many as nine proprietary auto networking specifications, including LIN, CAN/CAN-FD, MOST and FlexRay. FlexRay, for example, has a 10Mbps transmission rate. Ethernet could increase that 10 fold or more. The effort to create a single vehicle Ethernet standard is being lead by Open Alliance and the IEEE 802.3 working group. The groups are working to establish 100Mbps and 1Gbps Ethernet as de facto standards.


18 Things Highly Creative People Do Differently
Research has suggested that creativity involves the coming together of a multitude of traits, behaviors and social influences in a single person. "It's actually hard for creative people to know themselves because the creative self is more complex than the non-creative self," Scott Barry Kaufman, a psychologist at New York University who has spent years researching creativity, told The Huffington Post. "The things that stand out the most are the paradoxes of the creative self ... Imaginative people have messier minds."


How this one innocous tweet could hack a bank account
Based on just his name and his employer, would that be enough to steal his identity and take over his life? The bet was laid and the plan we formulated was simple enough: To gather enough intelligence about Alex to convince his call center operator at his bank that I was him. Like something out of a Mission Impossible film, I would have to bypass the automated phone system, steer through the security questions, and — armed with a fictional and empathy-driven sob story — socially engineer my way into his bank account.


Managing and Developing the Extraordinary
Let’s face it, some people are graced with an extra gear that the rest of us don’t have. Whether it’s remarkable creativity or ingenuity, or incredible technical skills, it’s exciting to manage and support extraordinary individuals. It’s also very challenging. Good managers and leaders tailor their approach for individuals, however, when presented with someone who is light-years beyond their peers in certain areas, many managers stumble and struggle when it comes to daily management and on-going support and development. Here are some suggestions for strengthening your support of these unique individuals.


Internet Of Things: What About Data Storage?
The impact on storage at first seems fairly obvious: There is more data to store. The less obvious part is that machine-generated data comes in two distinct types, creating two entirely different challenges. First, there is large-file data, such as images and videos captured from smartphones and other devices. This data type is typically accessed sequentially. The second data type is very small, for example, log-file data captured from sensors. These sensors, while small in size, can create billions of files that must be accessed randomly.



Quote for the day:

"In the business world, everyone is paid in two coins:cash and experience. Take the experience first; the cash will come later." -- Harold Geneen

March 04, 2014

SAFe – Good But Not Good Enough
SAFe distinguishes three levels, portfolio, program, and team. Activities at this level are different, and SAFe describes fairly well how to hook them together. We might prefer self-organization, but the SAFe breakdown isn’t bad and parts of it are good. The advice may not be Pure Agile but it’s Pretty Darn Good.Scrum and Agile really don’t offer much help at these levels, and large organizations have these levels or equivalents. Without guidance these levels are likely to be inefficient and to militate against Agile ideas. SAFe’s guidance is better than no guidance at all.


Six Creative Leadership Lessons From The Military In An Era of VUCA And COIN
Of course, thinking historically, military leadership is among the most ancient of leadership forms. That long view, combined with the diverse military activities across so many different societies today, means that references to “military leadership” can point to a wide range of practices. The category is, consequently, an expansive one, which can contribute to partial understanding and even the creation of a “straw man” about which selective claims can be attached. The military itself, long committed to leadership training and practice, has increasingly engaged in reflection and research on the topic.


Citrix At A Crossroads: Which Path Forward?
One interesting coincidence is that Templeton’s announced departure coincided with Microsoft’s search for a new CEO. Citrix and Microsoft have long been allies. Microsoft gave Citrix access to the OS/2 source code to build its product, and Citrix later created Microsoft’s Terminal Server technology, which is still used under the Remote Desktop Services label. Citrix has mostly been in lockstep with Microsoft from a strategy perspective. How this relationship develops under new leadership, given that Citrix’s portfolio has diversified and is no longer completely reliant on Microsoft, is another area to watch.


10 creative ways businesses are using tablets
Tablets can provide a customized user experience that businesses can use to create better ways to interact with customers. You've probably heard about businesses using mobile devices to gather analytics on the shopping or buying behaviors of their customers, but there are other tablet usage stories. We've compiled a list of 10 creative ways companies are using tablets.


A CIO who masters disasters
If Halamka had been the CIO of Target, you get the impression that the retailer's breach would have been handled differently. "Be open, be honest, be forthcoming, hide nothing and use it as a podium, a bully pulpit to move an entire industry," said Halamka. Commenting on Target's handling of its security breach, Halamka said he would have advised disclosing the severity of the incident fully, up front, instead of building up to it. "Customers would rather hear about what you experience and why it is making you stronger and what adversity you are working through," said Halamka.


Securing endpoint devices with code-execution prevention
While most organizations have antivirus software (AV) installed on employee devices, too many use it as their only means of endpoint device protection rather than relying on it as a first line of defense. Simply put, AV is not able to stop all malware. So along with regular patching to prevent known exploits from being a threat, administrators must deploy additional controls to decrease the chances of attacks against users being successful.


Open source challenges a proprietary Internet of Things
In December, the Linux Foundation, a non-profit consortium that promotes Linux adoption, created the AllSeen Alliance. It took a code stack developed by Qualcomm called the AllJoyn Framework and put it under its open-source umbrella. This C++ code supports the major operating systems, chipsets and embedded variants. Any electronics or appliance maker, or even an LED light bulb maker that uses the AllJoyn code will have a basis for connectivity with another product that also uses the code.


Intel expects Bay Trail successor in tablets by year end
The Cherry Trail chip, which will be made using the 14-nanometer process, will be even faster and more power-efficient than Bay Trail, which is made using the 22-nm process. Users can expect better battery life and performance in tablets with Cherry Trail compared to the current Bay Trail chips. The new 14-nm manufacturing process will allow Intel to make denser chips that are more power-efficient. Intel could target the new Cherry Trail chips at high-end tablets during the holiday season this year, and may push the Bay Trail tablet into the lower price ban


MIT builds self-completing programs
“When you’re trying to synthesize a larger piece of code, you’re relying on other functions, other subparts of the code,” Rishabh Singh explains. “If it just so happens that your system only depends on certain properties of the subparts, you should be able to express that somehow in a high-level language. Once you are able to specify that only certain properties are required, then you are able to successfully synthesize the larger code.” For instance, Singh explains, suppose that one of the subparts of the code is a routine for finding the square root of a number, and a higher-level function relies on the results of that computation.


Can You Measure Business Agility?
Organizations structure themselves in response to the external environment. If the external environment is predictable and relatively resistant to change (as it was during the License Raj in India), traditional means of work, which emphasize division of labour and efficiencies arising out of economies of scale, should be the way to go. But in an intense, volatile environment as we have today, companies must embrace the agile culture and structure, to compete out there.



Quote for the day:

"When I consider what tremendous consequences come from little things, I'm tempted to think there are no little things" -- Bruce Barton

March 03, 2014

Make BYOD Work: 9 Key Considerations
The benefits of BYOD are clear: The practice promotes productivity and has the potential to save on hardware costs. But the options available to manage personal devices can be confusing. IT organizations must weigh software and hardware for mobile device management, device and identity partitioning, virtual machines, wireless access points, network access control, and custom mobile applications.


Knowledge Banking for a Hyperconnected Society
Technology enables us to build new content based on the knowledge generated from the available data. It also offers the customer an improved experience. The bank no longer needs to wait for the customer to request a given service; it can anticipate the customer’s decision-making process, offering what he or she needs at the right time and in the most convenient format. To achieve this banks must take their place at the forefront of Big Data analysis and make use of all the information they have amassed about their customers, as well as the wealth of available external data, particularly sourced from social media.


Threats in the Cloud – Part 2: Distributed Denial of Service Attacks
On a daily basis, Microsoft’s DDoS protective measures apply mitigations to prevent impact from DoS and DDoS attacks to ensure uptime and availability for services and customers. Common types of attacks include SYN floods, DNS amplification, malformed TCP and UDP packets, and application layer abuses specific to HTTP and DNS. One common attack technique used by a number of freely available DDoS toolkits involves using fragmented IP packets with a fixed payload.


How Open Data Portals Will Stimulate Innovation and Economic Growth
According to Neelie Kroes, VP of the European Commission, opening up public datasets could double the value of it to around € 70 billion. Subsequently, such data portals can be used to create applications that can help improve society, tackle economical problems and drive economic growth. There are ample benefits for both governments and businesses. According to the Capgemini report, Open Data Portals can drive revenue, cut costs and improve efficiency and generate employment for future generations. Governments for example can increase their tax revenues though increased economic activity or make money through selling high value added information for a price.


Managing Data Center Operating Expenses: “The Property Tax”
The reality is that the assessor may only have one or two such properties in their jurisdiction, he/she may have never seen one sale in that area, and they aren’t likely exposed to the larger “world” of the national data center market. So to that end, we’d like to address a few items that you should be sure to explore in considering whether your tax assessment valuation has been thoroughly and properly considered by the assessor:


Speaking Intelligently On Business Intelligence
The real value of intelligence, both inside and outside of government, comes from the ultimate understanding of human intention, and from a nuanced perception of the context in which decisions are made. For governments, that critical element tends to come from human intelligence – or “HUMINT,” in insider parlance. The same holds true for the investigative journalist, though you’d be hard-pressed to find one who would readily admit his source work and techniques are so closely aligned with the practices of the intelligence community.


In-Memory Databases: Do You Need The Speed?
First, databases that take advantage of in-memory processing really do deliver the fastest data-retrieval speeds available today, which is enticing to companies struggling with high-scale online transactions or timely forecasting and planning. Second, though disk-based storage is still the enterprise standard, the price of RAM has been declining steadily, so memory-intensive architectures will eventually replace slow, mechanical spinning disks.


Up-and-Coming IT Leaders Focus on Business Customers
"The distance between us and the customer is traditionally far too big. It's immense. You might have a guy doing coding or testing who will take his requirements or direction from a project manager who might work with a business analyst who works with a product person who works with a salesperson who talks to the customer. There are five or six steps between the person providing us with the real need and the person actually delivering that. My view is, you have to cut all those steps out and have as much direct contact with the customer as possible," Sewell says.


When Start-Ups Don’t Lock the Doors
Many of the companies, including Kickstarter and Tinder, have rushed to improve their overall security after they were breached. Snapchat, the ephemeral messaging service that repeatedly ignored warnings about a data breach that exposed millions of user names and phone numbers, eventually acknowledged the loophole and hired Peter Magnusson, a head of engineering at Google, to help improve the company’s security efforts. Even so, as Snapchat has gained more users, it has also lured spammers, who have taken to sending malicious ads and links using the service.


Don't let governance methods die after a cloud migration
"Cloudifying" your governance practices means finding out what your proposed provider and other viable competitors offer. It's critical to know whether you have governance practices that are "fragile," or might fall short of regulations in case you switch providers. There are companies that specialize in tracking global compliance requirements, which are a good resource for companies considering all areas in which they may be at risk.



Quote for the day:

"A brand is no longer what we tell the consumer it is - it is what consumers tell each other it is." -- Scott Cook

March 02, 2014

Kanban at Scale – A Siemens Success Story
Continuous and evolutionary improvement would occur only once the redesign had been implemented. Once the new system was in place, Kanban would act as a catalyst for process improvement through visualization of the work-units and the associated metrics, which would identify waste, variability and, bottle-necks. However, this type of continuous improvement could only occur once we achieved much higher levels of predictability, and this could only happen once the Kanban method including WIP limits had been fully implemented


App Listens for Danger When You’re Not Paying Attention
The crux of One Llama’s technology is what the company calls its “artificial ear.” When sound enters your ear, it travels through the spiral-shaped cochlea, which is lined with tiny hair cells that vibrate like tuning forks when hit by certain frequencies. One Llama’s artificial ear is a software version of this—essentially, a bank of digital tuning forks that measure sounds. It’s based on work that cofounder David Tcheng and others conducted at the University of Illinois, where he is a research scientist. The company claims this method can be speedier and more flexible than other common methods for analyzing the different frequencies of the vibrations that we hear as sounds.


The Magick Behind ImageMagick
ImageMagick consists of nearly a half million lines of C code and optionally depends on several million lines of code in dependent libraries (e.g. JPEG, PNG, TIFF libraries). Given that, one might expect a huge architecture document. However, a great majority of image processing is simply accessing pixels and its metadata and our simple, elegant, and efficient implementation makes this easy for the ImageMagick developer. We discuss the implementation of the pixel cache and getting and setting image properties and profiles in the next few sections.


5 Ways to Improve Your PCI Compliance Program
While PCI is no guarantee that you won't experience a data breach, Simonetti says organizations should think of PCI compliance like a seatbelt: It won't prevent you from crashing, but it may well save you if you do. PCI DSS is a set of international security standards created and maintained by the PCI Security Standards Council (SSC) in an effort to ensure that merchants and service providers appropriately protect CHD, whether from a debit card, credit card, store card or company purchasing card.


Augmented Reality Gets to Work
There’s also hope that augmented reality can make things easier for workers who are away from the office or the factory. Gabriel Weiss, who oversees augmented reality projects at Mitsubishi Electric, says the company is using software from augmented reality software company Metaio on Epson’s Moverio smart glasses to test whether air conditioner service technicians benefit from a three-dimensional overlay that shows them the components of the company’s most popular residential air conditioner.


Custom Assertions in Java Tests
Having a more powerful set of assertions provided by AssertJ or Hamcrest is nice, but this is not really what we wanted in the case of our HourRange class. Another feature of matcher libraries is that they allow you to write your own assertions. These custom assertions will behave exactly as the default assertions of AssertJ do – i.e. you will be able to chain them together. And this is exactly what we will do next to improve our test. We will see a sample implementation of a custom assertion in a minute, but for now let's take a look at the final effect we are going to achieve.


How Stable are Your Unit Tests? Best Practices to Raise Test Automation Quality
Part of the above failure is that for test automation to perform within expectations, JVM instances are usually reused, at least within the same project. Therefore ideally unit tests should have no side effects on their test environment, to prevent such failures. The test environment includes various resources that can influence tests executed afterwards, such as creating files on the file system or as in the case above, altering Java system properties. For files, JUnit offers the TemporaryFolder rule to create temporary files, so we built a similar mechanism for properties.


Tackling the ongoing problem of endpoint defense
Next to perhaps only firewalls, endpoint security figures as the network world's oldest defense. But while its history is old, the basic problem of protecting the PC on the desk has never fully been solved. Rather, the difficulty has increased as the number and kinds of endpoints multiply, particularly with the rise of mobility in the majority of endpoint devices and increase in the sophistication of the attacks. In this Essential Guide, learn everything you need to know to develop or refresh your enterprise endpoint strategy.


BrightCloud Threat Intelligence Services and Endpoint Breach Protection Solution
"At Webroot, we reject the prevailing notion that organizations cannot be protected from attacks on their endpoint devices. We believe that most internet security problems can be addressed if the business can apply comprehensive security knowledge at that moment of truth when they are faced with a threat," said Mike Malloy, executive vice president of products and strategy at Webroot. "Both BrightCloud Security Services and the BreachLogic Endpoint Agent are designed to enable businesses to take action more quickly by combining our vast threat intelligence and continuous monitoring of events in their environment."


Adaptive Computing Introduces Big Workflow to Accelerate Insights
While current solutions solve big data challenges with only cloud or only HPC, Adaptive Computing utilizes all available resources—including bare metal and virtual machines, technical computing environments (e.g., HPC, Hadoop), cloud (public, private, and hybrid) and even agnostic platforms that span multiple environments, such as OpenStack—as a single ecosystem that adapts as workloads demand. Traditional IT operates in a steady state, with maximum uptime and continuous equilibrium. Big data interrupts this balance, creating a logjam to discovery.



Quote for the day:

"Only 2 words always lead to success. Yes & no. You've mastered saying yes. So start practicing saying no" -- Jack Canfield

March 01, 2014

Information Governance Can No Longer Be Confined to the IT Department
Historically, responsibility for data management is left primarily with the IT department. However, the growing complexity of information governance and the ramifications if it goes wrong mean that this narrow approach is no longer appropriate. Instead, responsibility for information governance should now be a boardroom level issue, with input from the compliance team and significant input from the legal team, whether internal or external and from other specialists.


Why “Big Data” Is a Big Deal
“The data themselves, unless they are actionable, aren’t relevant or interesting,” is Nathan Eagle’s view. “What is interesting,” he says, “is what we can now do with them to make people’s lives better.” John Quackenbush says simply: “From Copernicus using Tycho Brahe’s data to build a heliocentric model of the solar system, to the birth of statistical quantum mechanics, to Darwin’s theory of evolution, to the modern theory of the gene, every major scientific revolution has been driven by one thing, and that is data.”


Intranet Information Architecture (IA) Trends
A common pitfall with task-based IAs is difficult-to-scan category names. Organizations think that category names need to start with verbs or follow an “I need to...” pattern in order to be task based. This isn’t necessary. Sometimes trying to fit link or menu labels to a specified format makes them long and more difficult to scan, because the most meaningful words don't appear until the end of the label. Task-based IA doesn't require any particular grammatical structure for labels; it just means grouping information according to how employees use it, rather than by who creates and maintains it.


One third of Fortune 100 organisations will face an information crisis by 2017
"There is an overall lack of maturity when it comes to governing information as an enterprise asset," said Andrew White, research vice president at Gartner. "It is likely that a number of organisations, unable to organise themselves effectively for 2020, unwilling to focus on capabilities rather than tools, and not ready to revise their information strategy, will suffer the consequences." Business leaders need to manage information, rather than just maintain it. "When we say 'manage', we mean 'manage information for business advantage', as opposed to just maintaining data and its physical or virtual storage needs," said White.


Usability between information design and information architecture
A complete usability test has to consider several key criteria of a website: page identifier, transition elements, downloading time, and testing the pages on different browsers. Even all of these are taken into account, an information designer should be careful with the users’ reaction. During a usability test they might be impressed by spectacular graphic elements and their feedback is not always very relevant. Hackos and Redish describe a case when users rejected a product after the usability test.


Building a RESTful Web Service with Spring Boot to Access Data in an Aerospike Cluster
Spring Boot is a powerful jump start into Spring. It allows you to build Spring based applications with little effort on your part. Aerospike is a distributed and replicated in-memory database optimized to use both DRAM and native flash/SSDs. Aerospike also has high reliability and is ACID compliant. Developers can quickly scale their database cluster from two nodes to twenty nodes without bringing down the database service.


Big data, big business, Big Brother?
Berkman's Larry Lessig nails it when he says that we need norms, laws, technology and markets to deal with this tremendous power the '6 Memes' are giving us. Yet right now, most users are like kids toying with handguns, and BigDataCo's are acting like kids in a candy-store. Can we really trust those new data-oil companies, those behemoths of smart-data-mining to not fall prey to the temptation of instrumentalizing us, to not use their armies of servers and their powerful algorithms for the most nefarious 'monetization' purposes, and to not use that very same information to tacitly or otherwise support the creation of perfect surveillance states?


Facebook’s Plan to Conquer the World — With Crappy Phones and Bad Networks
As Facebook looked out across the globe it wanted to conquer, it saw a mish-mash of unreliable networks, low resolution screens, and shitty processors. There were all manner of various flavor of Android, problems with local language support, confusion over pricing, and unreliable or non-existent power grids. There’s the question of how you make social connections between people with no address books, no email address, no university affiliation, and who are perhaps the very first person in their village to sign up for Facebook. The challenges weren’t just difficult, they were epic.


Biggest of all data, Internet of Things
Teradata, a global analytic data platform, applications and services company, revealed that customers will be able to add Java Script Object Notation data to their data warehouse. This is a significant advancement, because JSON is the primary language that powers the Internet of Things, a global collection of millions of sensors and embedded microprocessors. Current Online Transaction Processing technology allows for transactional processing of JSON data. However, the OLTP technology does not allow for scalable analytics on massive data volumes, which is provided by Teradata’s parallel processing analytic engine.


Are You Too Old to Land a New IT Job?
"You have to be current. That is key, especially in IT," Gillis says. "I find it disturbing when I speak to clients who are older and they aren't spending time studying, staying hip and up-to-date on new technology advances," he says. "If you've been looking for a job for six months, you have to realize how much has happened in that time -- learn about emerging technology. Know the terminology. Be able to show that you've added to your knowledge and your skills," Gillis says, and be able to demonstrate how that knowledge and your skills have positively impacted previous employers.



Quote for the day:

"Big jobs usually go to the men who prove their ability to outgrow small ones." -- Theodore Roosevelt

February 28, 2014

Five Essentials for Successful Information Security Training
The hype over the latest security breach in the headlines always fades away. Business executives, network users, and even IT professionals talk the talk when the topic is hot – making promises to do better. In a very predictable fashion, people get back to their old ways of doing things. They then proceed to let their guard down. And then it happens, again. Another big security breach. If there’s anything positive that comes from this common mode of operation it’s that small, incremental changes are often put in place, both through people, business processes, and technical controls.


Security researchers urge tech companies to explain their cryptographic choices
Fourteen prominent security and cryptography experts have signed an open letter to technology companies urging them to take steps to regain users' trust following reports over the past year that vendors collaborated with government agencies to undermine consumer security and facilitate mass surveillance. ... The letter was an initiative of the advocacy group Electronic Frontier Foundation and outlines 10 principles, both technical and legal, to which signatories believe technology companies should adhere.


10 public cloud security concerns you shouldn’t ignore
It’s not news that businesses are moving more of their data to the cloud. But even as cloud storage and computing have hit the mainstream, there are a lot of questions around the public cloud – ones that not everyone is asking. For Mark Russinovich, technical fellow of Microsoft Corp.’s Windows Azure cloud platform group, the public cloud has helped businesses grow, but there are still many concerns for data security and privacy. He pulled together a list of 10 concerns that security professionals should consider when putting their organization’s data into a public cloud.


ThoughtWorks Interview: Agile Principles & Global South
Many people are extremely passionate about Agile software development. It is a model which strives to be collaborative and is based on solid democratic principles of sharing expertise. The Agile Manifesto describes how: “We are uncovering better ways of developing software by doing it and helping others do it.” In fact, at over a decade old Agile still generates a bizarre mix of either excitement or fear in a lot of organisations.


China’s President Will Lead a New Effort on Cybersecurity
“Efforts should be made to build our country into a cyberpower,” Mr. Xi said in a statement released after the first meeting of the group on Thursday, according to the official Xinhua News Agency. The announcement comes as Mr. Xi is solidifying power, mounting a bold crackdown on corruption at the top of the Communist Party and pushing through overhauls aimed at strengthening and restructuring the country’s economy.


10 tips for surviving your new leadership role
Being dropped into a role of leadership is both a compliment and burden. And it can be a bit overwhelming, too. With expectations coming at you from the top and bottom, it's difficult to know where to start. Here are 10 tips garnered from colleagues and personal experience, each one vitally important in successfully managing both campaigns and staff.


Google Android chief: Android may be open, but it is not less secure
Naturally, responding in such a self-critical fashion would have raised a few eyebrows. However, Google has provided a full transcript of the executive's commentary -- one which sheds a very different light on the issue. Instead of Android not being geared towards security, Pichai actually said that the open nature of the platform gives the OS better scope in threat protection -- as many minds, developers and security experts can pitch in and both fix problems and shore up defenses.


Cloud security concerns are overblown, experts say
Today, though, security concerns are still the major inhibitor of cloud adoption at many large companies. The concerns are most significant among those IT executives considering a cloud migration. Those who have already made the leap appear mostly satisfied with cloud security, the panel agreed. An Intermap survey of 250 decision makers at medium and large companies found that 40% of those who described themselves as "cloud-wary" cited security as their biggest impediment to adoption. In contrast only about 15% of "cloud-wise" respondents felt the same way.


Four Tips for Walking Your Innovation Talk
Employees at all levels take their cues from management, which makes it essential that senior executives practice what they preach. And that means a climate of innovation must start at the top, ideally with senior leaders who are both inspiring and dedicated. Through years of innovation training for the world’s foremost companies, my firm, futurethink, has identified an effective formula for leadership role modeling.


How to be recognized as a young leader
“What are some good ways to get recognized as an emerging young leader in your organization without sounding like you’re trying to toot your own horn?” My mother always told me if you just kept your head down and did good work, you would get ahead in your career. While there is certainly some truth to that advice, there’s a lot more to it when it comes to getting noticed for your leadership potential.



Quote for the day:

"I don't think you can ever do your best. Doing your best is a process of trying to do your best." -- Townes Van Zandt