March 12, 2014

AI researcher says amoral robots pose a danger to humanity
Robots are only now beginning to act autonomously. A DARPA robotics challenge late last year showed just how much human control robots -- especially, humanoid robots -- still need. The same is true with weaponized autonomous robots, which the U.S. military has said need human controllers for big, and potentially lethal, decisions. But what happens in 10 or 20 years when robots have advanced exponentially and are working in homes as human aides and care givers? What happens when robots are fully at work in the military or law enforcement, or have control of a nation's missile defense system?


UK to help lead world fight against cyber crime
“To get access to those skills we have to look at how we can engage with industry through programmes which allow people to work with law enforcement on a part-time voluntary basis,” he said. Looking to the future, Archibald said the NCCU is investing a “considerable amount of money” in developing law enforcement officers from officers on the beat all the way up to the high-end skills. Finally, he admitted that in the past, engagement with industry had tended to be on the terms of law enforcement, which had made decisions on things like media coverage with little regard to reputational damage to the businesses involved.


Do-it-yourself corporate cloud with ownCloud 6 Enterprise Edition
The Enterprise Edition is designed to seamlessly integrate with your existing infrastructure. Designed from the ground up to be fully deployed on premises, it enables integration into existing user management tools, governance processes, and security, monitoring, and back-up tools. ... As you would expect, ownCloud Enterprise Edition is based on ownCloud Community Edition. With more than 1.3 million users, the Community Edition is one of the world’s most popular open source file sync and share software programs.


Aruba Announces 5 Software Tools for Optimizing Wi-Fi Networks
Several of the software improvements -- all free to existing customers -- are designed to help IT managers optimize their oversight of Wi-Fi networks, which can lower help desk complaints and improve worker efficiency. One of the new tools, Auto Sign-On, is focused on helping end users. Instead of signing in to each enterprise application, such as SalesForce.com, with a lengthy password that's hard to input on a small smartphone keyboard, the tool uses a worker's Wi-Fi login to automatically authenticate an employee with single sign-on.


25 years of the World Wide Web
The Web has changed the way we work, share our lives with family and friends and even play games. This one innovation has brought an astonishing level of change in a short amount of time. Today, the Web is marking its 25th anniversary. On March 12, 1989, Tim Berners-Lee, a British computer scientist, introduced the idea of the World Wide Web in a proposal for an information system. Here, technology leaders, including Vint Cerf, and executives from Intel and AOL, reflect on how the Web has affected the world we live in.


Twitter's Biz Stone is a humble 'Hallucinogenic optimist'
Biz Stone is way too humble. What’s the point in hitting the jackpot when you are too self conscious to use the money in a way that you weren’t able? Time to grow up and grow into your money. You are forty years old. You can live well and do well too. Money is more than philanthropy it is also a means of actively creating the future. Techno-optimists must also become techno-activists — to make sure we get the right future. It won’t come about by itself. We could easily end up in some nightmarish version of a tech-enabled North Korea.


Internet of things cannot be about products alone, warn experts
While they agree that the government funding is a huge opportunity for the UK technology industry, they believe that ongoing success is dependent on companies ensuring they can keep both personal and commercial data safe, and building security and privacy into products from the start. “The benefits that these intelligent, connected devices bring to our lives are almost too numerous to count. However, when we gift these things with intelligence and senses, we also fundamentally change their very nature,” said Marc Rogers, principal security researcher at Lookout.


eBook: The practical approach to Windows Phone 8 development.
The Windows Phone 8 operating system is closely tied to the hardware of Windows Phones, enabling the development of high-performance apps that provide excellent user experiences. With Windows Phone 8 Development Succinctly by Matteo Pagani, you’ll go from creating a “Hello World” app to managing network data usage, enabling users to talk to your application through speech APIs, and earning money through in-app purchases. Dozens of additional features are covered in the book, including launchers, choosers, and geolocation services, so you’ll have a place to start no matter what you want your app to do.


GPS tech built to find missing aircraft not always used
Aviation authorities around the world are starting to implement plans to supplement radar with GPS technologies, but that won't happen everywhere for another 10 years or so, he said. Eventually, all position data will come from the plane. "We're not there yet," Graham said. The major aircraft tracking technologies include Automatic Dependent Surveillance-Broadcast (ADS-B), said Ric Peri, vice president of government and industry affairs at the Aircraft Electronics Association. Rather than relying on a radar ping, ADS-B uses a GPS signal and an aircraft's navigation system to determine the position of a flight and then broadcast that information, he said.


Is Office 365 worth spending 3x more than on Google Apps?
Microsoft's messaging products (Exchange, Outlook) are ubiquitous. Microsoft and Google both know how to operate secure, cloud-scale operations. Office Web Apps and Google Docs are feature-equivalent. The advantage Microsoft has is the enormous, and universal capabilities of full, installed Office. The curious thing is that although you probably don't really need it, and by extension don't need to pay for it, it's sufficiently cheap that you might as well operate on the old maxim that it's easier just to pay for it, and forget about thinking about it.



Quote for the day:

"We must walk consciously only part way toward our goal and then leap in the dark to our success." -- Henry David Thoreau

March 11, 2014

User Experience Design Guidelines for Tablets running Android
While the mobile devices we have today and incredibly powerful compared to computers of just a few years back, they don’t compare to the memory and processor power your desktop computer has. Because your users are mobile and using your application as they move about, you need to keep your application fast and responsive. Your users could be on a bus or train in a moving environment and need to be able to reliably use the UI (can they press a small button when the screen is moving around?). Additionally you need to account for the possibility of drops in network coverage.


Embracing SOA and the cloud: Hybrid integration paradigms offer choices
"It was a multi-enterprise business integration play," said Stamas. "We don't look at it as application integration, but business integration. We are connecting the applications and systems of business partners and service providers. We wanted to embrace SOA and the cloud. SOA provides the abstraction for the applications. The cloud providers provide the abstractions for the hardware and scalability." This hybrid approach allowed them to focus on managing the business process rather than the technology.


Intel's fastest connector lights up data transfers
The cables are smaller, more durable and have a range of up to 300 meters, compared to copper, which can cover only a limited distance, Paniccia said. Ethernet is slower per lane and signals could degrade on cables that are longer than tens of meters, Paniccia said. "It really drives the ability for bandwidth and distance separation," Paniccia said. "We believe the transition's happening to move to fiber." Pricing for the cables was not provided by Corning, which said it would start making cables for end customers in the third quarter.


This Is Why It Feels Like Apple Stopped Innovating Three Years Ago
"If not, chances are your customer will recall the negatives of the feature far more than the positives." Can you imagine how frustrating it would be if the touchscreen only worked 79% of the time? Very few people would have ever bought an iPhone. The reason it feels like Apple has stopped innovating to so many people is that the last time it tried to do what it does best - perfect a technology that allows humans to interact with computers - it failed. And that was two and a half years ago. The last time it succeed was 2006 - eight years ago.


The secrets to executive presence
Why is dress so important? Well, the clothes still don’t make the wo/man, but often they do help you feel like you’re ready for that big step. And it’s that feeling — of confidence and readiness — that communicates most powerfully about your ability in the moments after the person across the meeting table notices your new outfit. What’s with that “feeling”? Isn’t that a bit squishy? People know “boardroom presence” when they see it, but how can you develop it if you’ve never been in the boardroom hot seat? It seems like a chicken-and-egg problem, doesn’t it?


Is privacy undermining trade in digital services?
“Any protectionist measure is a bad thing, particularly in the cloud industry which is essentially global. There’s no harm in selling to customers in the EU on the basis it will keep data within the EU if it’s what they want; but for data protection law it should be kept secure no matter where in world.” A similar warning comes from Thomas BouĂ© ... He says there are proposals going around Brussels with elements of digital protectionism, and cites a European Parliament report calling for the suspension of the Safe Harbour mechanism with the US and to keep European data within Europe.


Design Patterns in ASP.NET
Design patterns are the most powerful tool for software developer. It is important to understand design patterns rather than memorizing its classes, methods and properties. It is also important to learn how to apply pattern to specific problem to get the desired result. This will be required continuous practice of using and applying design patterns in day to day software development. First, identify the software design problem, then see how to address these problems using design patterns and find out the best suited design problem to solve the problem.


Snowden at SXSW: We need better encryption to save us from the surveillance state
Building better end-to-end encryption is the proposed solution to save us from the surveillance state; encryption that happens “automatically and seamlessly” so that average users can use it. If we can make it so that encryption is so easy that even non-techies can use it, then mass surveillance will be ineffective. Then the NSA “cannot spy on innocent people” simply “because they can.” Encryption will make it “too expensive to spy on everyone.” Granted, if the NSA targets you, then they will just hack into your devices, but "hacking doesn't scale."


Enterprise considerations for cloud firewall management and automation
While host-based cloud firewall management seems to be maturing, most enterprises still struggle with developing and maintaining network-based firewall rule sets in the cloud. Some of those difficulties are due to the lack of granularity and capability in many cloud providers' own firewalls, but other challenges often arise from building an automation strategy that can easily keep up with wire-speed firewalls and their complex rule sets in IaaS environments.


Big Data Makes CFOs More Effective
"In our discussions with CFOs over the past decade, the significance of technology and analytical tools in transforming the finance function and broader enterprise has continuously risen," said Bill Fuessler ... "Data has always sat in the center of a CFO's job responsibilities, and CFOs now recognize how insights from big data are helping their company become more competitive. CFOs are being asked to anticipate the future and discover new areas of revenue growth—we anticipate this will spur a new strategic alliance between the CFO and CMO as they partner to drive the corporate growth agenda."



Quote for the day:

"What is not started today is never finished tomorrow." -- Johann Wolfgang von

March 10, 2014

CIOs hold fire over datacentre decisions
The research identified four main forces impeding CIOs’ ability to plan effectively for future datacentre needs: uncertainty over where to locate data; the challenges of risk and compliance; ongoing business transformation; and the need to better manage energy consumption. The Four Forces of Data Centre Disruptionreport said: “In short, this combination of business issues serves to slow down datacentre strategy and responsiveness. This comes at a crucial time when data strategy needs to be as agile and dynamic as possible.”


Antifragile Systems: Designing for Agility vs. Stability
In recent years, IT has been focusing more on agility to keep up with the speed of business. Agile methodologies have been embraced in an effort to release software more frequently. Often, the shift to agile methodologies came at the expense of stabile systems. Many steps that ensured stability were skipped or not fully vetted causing various “cracks in the armor” of systems. The emergence of the DevOps movement is the intersection between agility and stability, where we aim to deliver software faster but with a high degree of automation, measurement, and quality.


5 Reasons Netflix Is Spearheading The HR Revolution
When Patty McCord, former chief talent officer at Netflix, drafted a simple PowerPoint presentation explaining some of the unconventional changes the company had made in its HR policy, she had no idea it would go viral. Since the presentation started circulating, it has been viewed over 5 million times and has been described by Sheryl Sandberg as one of the most important documents to emerge from Silicon Valley. ... In a Harvard Business Review article, McCord lays out five principles that drove her wide-scale transformation of Netflix’s HR strategy:


The Legacy IT Conundrum: Money Pit or Value-Add?
An analysis of IBM's new BlueMix project, which puts most of IBM's software in the cloud, reveals that 80 percent of IT spending goes to legacy systems. As organizations finally learn to stop worrying and love the cloud, IT departments will have to decide if they will continue to be a money pit or can find a way to add value to new cloud systems. ... However, it leaves undisturbed that 80% of IT budgets devoted to "legacy." Therein poses the danger to IT organizations.


Skype-based malware shows how 'peculiar' malicious code can be
This malicious software had accomplished what some had predicted about eight years ago could be done to exploit Skype when “researchers discovered the ability to use Skype as a remote-control procedure,” says Butterworth, executive director of commercial services at ManTech. The malware had been designed using a modified version of the old “SkypeKit” SDK which existed before Microsoft acquired Skype, and it appeared to include a backdoor functionality.


IT Champs Badly Needed in Business
The question therefore is how do you achieve this IT agility and how do you achieve it through IT governance? Governance, as defined by ISACA, comprises three parameters – benefit realisation, risk optimization, and resource optimization. Governance has to consider these three aspects and come out with very clear directions for the management to follow, achieve the objectives, and secure the results. Essentially, governance entails understanding what is required by business, prioritizing these needs and setting the right direction. To me, there is no other alternative but to use IT governance in a very judicious and convincing manner to achieve agility and the end objective of benefit realisation.


UK more than doubles funds to build internet of things
"I see the internet of things as a huge transformative development - a way of boosting productivity, of keeping us healthier, making transport more efficient, reducing energy needs, tackling climate change," said Cameron. He said the UK and Germany could find themselves at the forefront of a new industrial revolution by working in partnership. "We are on the brink of a new industrial revolution and I want us – the UK and Germany – to lead it,” said Cameron.


BYOD and security: Five tips to keep boundaries between work and home
The end result of BYOD is that employees are now using their personal mobile devices to manage their personal livesand their work lives. While it is easy to see the huge cost savings to corporations with a BYOD policy, this merging of work apps onto employees' personal mobile devices can have a negative impact on their work productivity and time off. In this article, I offer five quick tips to help managers assist employees to establish healthy boundaries between their work life and personal life so that both companies and employees can receive the full benefits of BYOD.


Don’t Panic: But Are We Ready for Bring Your Own Everything?
Looking at it in the cold sober light of day, BYOX sounds like one cheesy industry-speak too far, but let’s thing about it for a second. BYOX could mean BYOK i.e. Bring Your Own Keyboard and the keyboard in question (wireless or Bluetooth or whatever) could be transferring drivers, log files and all manner of other unnecessary (and perhaps harmful) data into the corporate network. Are keyboards dangerous? Well yes, in the BYOK Bring Your Own Keyboard world they are.


How to Be Agile in a Waterfall Company
Dror is a senior consultant at CodeValue. His first encounter with agile happened a few years ago while working for a software vendor specializing in unit testing tools, since then he has been evangelizing Agile wherever he went – at his work, speaking at conferences and today as a consultant. He shares from his experience implementing Agile practices in his team, outlining the do and don'ts that can make all the difference. He addresses teams working in a non-agile environment.



Quote for the day:

"There are no great people in this world, only great challenges which ordinary people rise to meet." -- William Frederick Halsey, Jr.

March 09, 2014

Sustainable Architectural Design Decisions
Software architects must create designs that can endure throughout software evolution. Today, software architecture comprises not only a system’s core structure but also essential design decisions.1,2 So, to achieve sustainable architectures, we need sustainable design decisions. In correspondence with Heiko Koziolek’s definition of architecture sustainability,3 we argue that architectural design decision sustainability involves: the time period when the right and relevant decisions remain unchanged; and the cost efficiency of required changes to those decisions.


Self-service analytics tools have value, carry risks
Speaking at the 2014 TDWI BI Executive Summit in Las Vegas, Peter Mueller, head of the global business analytics program at Lonza Pharma & Biotech, said people often refer to data as a corporate asset. But that view of information's business value can be jeopardized by out-of-control BI and analytics applications, particularly when the analysis is done by workers with little training. If a company isn't careful, the analysis process can be mismanaged or misinterpreted, leading to potentially damaging data inconsistencies and faulty findings.


The Principles of Agile Enterprise Architecture Management
The Agile Enterprise Architecture is all about letting changes happen and thus keep the Architectural Principles continuously evolving. This will also call for having an appropriate lifecycle that facilitates the evolution, development and adaption of the current and the target reference architecture continuously. This will keep the maturity levels of various IT management functions also changing over time. In this blog, let us focus on the key principles that enables an Agile Enterprise Architecture Management


Eight Eye-openers From Salesforce.com's Annual Report
Last week, Salesforce.com reported its fourth-quarter and year-end fiscal 2014 results, announcing a major bump in revenue and even raising its guidance significantly. But the fast-growing cloud vendor is also continuing to post significant losses as it spends big on sales, marketing and acquisitions. Salesforce.com's annual report, which was released this week, paints a fuller picture of the vendor's opportunities and challenges, while also revealing a series of eyebrow-raising facts. Here's a look at some of the highlights.



Information Management: A Love Triangle
Let’s take a closer look at the interplay among these three categories. We have all heard the expression “time is money.” How many of us have stopped to consider that in the realm of resource management, information is money? Literally! For many, the information resource is literally, a financial resource. How many people receive a paycheck anymore? In 2008, according to the U.S. Treasury Department, 66 percent of Americans used direct deposit where, in essence, information representing money is transferred from one entity such as an employer to another entity such as a bank, credit union or savings and loan.


Health IT benefits outweigh the negative, report shows
The report underscored quality as the metric most improved by implementing health information technology, as the lion's share of studies, 58 percent, saw positive outcomes, and another 24 percent saw mixed-positive results. When officials drilled down further into the data, they also found clinical decision support, computerized provider order entry and meaningful use all produced the most beneficial outcomes, at 66 percent, 64 percent and 63 percent positive respectively. Contrastingly, electronic prescribing was the least able to prove its worth, as more than one-fourth of all studies reported negative outcomes.


Coaching the CxO
To most managers, regardless of the level, change is considered a threat. This is particularly the case when changes imply that their own role will change, which is quite often the case for managers in agile transformations. The human brain responds to this threat in the same way as when you would encounter the growling bear. To the brain, a threat is a threat no matter if it is a life-threatening situation or if someone feels threatened in his or her organizational position.


Enterprise architecture best practices for Agile development
"There seems to be a correlation of success for enterprise architecture teams working in a collaborative, lightweight manner. Teams that are not working like that have a much higher failure rate," said Scott Ambler, senior consulting partner of Toronto-based Scott Ambler + Associates. What does it mean to work in a lightweight manner? "They're not producing a lot of documents or models because detailed artifacts tend to be ignored by development teams, if they are read at all. They are helping teams to understand what the architectural vision is and [are] actively helping to build it out," Ambler said.


Big data: Handle with care
There are two fears – coming across as ‘big brother’ and data leaks and misuses that become public, such as the OfficeMax story. Both can have a serious effect on customer retention and loyalty. In fact, studies indicate that 66 percent of your customers would leave if you lost or mistreated their data. It turns out that the mysterious asset of ‘brand loyalty’ can be quantified after all. Fearing the negative consequences of big data is a healthy exercise, but abstaining from big data projects is not. For organizations sitting on the sidelines and waiting until all the unknowns are known, you picking the wrong strategy.


Knowing the Value within your Business Model is Vital
Although much of the architecture of any business model is not seen, it is the ‘heart’ of what delivers the value. We can’t ignore or gloss over the value architecture, we must address it fully. Fluidminds business model approach devotes much of its ‘canvas’ to this part. The initial questions of clarifying the offer, the value chain, the need for identifying core capabilities, for explaining the distribution and communication channels and who the (potential) partners are, all are initially raised specifically within the canvas to be addressed.



Quote for the day:

"It takes time to succeed because success is merely the natural reward of taking time to do anything well." -- Joseph Ross

March 08, 2014

Getting The Right Confidence With “Go Cloud” Strategy
Of course, no technology is without risks, and cloud for one does have its fair share of risks, but the trick is the see how much cloud and how to manage the risks around what is put on the cloud. Amongst the several risks include issues surrounding service provider continuity, contracting and SLAs, data protection, regulatory compliance, audit and assurances etc. In ensuring that the organization’s cloud strategy will deliver the promised value in the long run, what is required is a governance based approach that aligns the management and operational requirements underlying cloud operations with the enterprise cloud strategy.


Video: Introducing the Wolfram Language – Knowledge-based Functional Programming
In this video, Stephen Wolfram introduces the Wolfram Language, a “knowledge based” symbolic programming language that enables powerful functional programming, querying of large databases, flexible interactivity, and easy deployment. The Wolfram Language provides seamless access to the curated and continuously updated Wolfram Knowledgebase used in Wolfram|Alpha—which includes a wide range of types of data for physics and chemistry. Free-form linguistics provide a convenient mechanism for accessing all available data; more common categories also have specific associated Wolfram Language functions.


Is Artificial Intelligence About to Change Doing Business Forever?
So there are many different benefits to be achieved with Artificial Intelligence, but it is not all hallelujah. Artificial Intelligence has already made promises for decades and only recently we are seeing some, significant, results. There are many challenges involved in creating truly intelligent software and machines. We are still very far away and currently the best AI, the ConceptNet 4 Artificial Intelligence, is said to be as smart as a four-year-old. Big Data startups working on AI solutions therefore require a lot of time to improve the applications.


Networked World: What It means To People Processes?
A simple enough example, but what it clearly highlights is that people processes are no longer predominantly uni dimensional. That in many ways actually implies that no processes are uni dimensional anymore and that leads us to a very radical conclusion which is – “ prefixes defining what kind of processes they might are slowly becoming obsolete for if not all, most processes“. For the HR professional – the implication is far reaching; the rules defining how we work with our associates have changed dramatically.


Sorry, phone number, but it’s time for you to die
It doesn’t take an argonaut to understand the benefits of using a different identifier and an internet-based calling platform. Today, a U.S. citizen that travels to England can buy a SIM card in a vending machine upon landing, load it up with data, and effectively use their smartphone exactly as they would in the United States… save for the whole “calling and texting” thing. When you swap the SIM out, your phone number goes dead for the duration of your trip. But why? That new SIM is fully capable of channeling voice calls to your phone via data networks—the only thing we need is implementation.


Use the Codename: BlueMix DataCache service in a Node.js app
This article explains how to use the DataCache service in a Node.js application hosted byCodename: BlueMix. DataCache is a distributed cache (powered by WebSphere® eXtreme Scale technology) that you can use as an efficient and reliable key-value data store. I provide a client Node.js module that you can extend and use in applications that you choose to host on BlueMix. You use the DataCache service over the network through its REST API. The client module abstracts the REST bits, providing higher-level methods for managing key-value objects.


Virtual Reality Startups Look Back to the Future
“There’s an extremely intense enthusiast community that loves VR,” Lanier says. “But it can create an illusion that interest is perhaps larger than it really is. I believe Oculus Rift could launch tomorrow and comfortably sell a few hundred thousand units. But the real challenge is how to sell 200 million units. The enthusiast community is loud and adorable, but no matter how much you please them, you won’t necessarily reach beyond them.” Luckey is, understandably, a great deal more positive. “People have wanted virtual reality for decades,” he says.


Mobile Tech Extends Hospitals' Reach Into The Home
The evolution of devices like Fitbits is "incredibly exciting," agreed Marc Probts, CIO of InterMountain Healthcare in Salt Lake City. Home monitoring has "tremendous" potential, he added. Doctors don't need to analyze every byte patients produce, said Weschler. Rather, clinicians can quickly check if patients' measurements lie within baselines, perhaps via a red light/green light dashboard icon. Real-time monitoring would also alert emergency services if a patient appears to need immediate medical assistance, he said.


CFOs say companies will hire more techies in 2014, but not in IT
Another facet of the overall picture, which might explain CFOs' optimism, is how IT positions can be redefined or shuttled about within a company. As InfoWorld's Bill Snyder put it in the above link, "Many IT jobs within enterprises have moved out of the traditional IT ghetto and into various business-related departments." In other words, the jobs traditionally labeled "IT" might well be migrating out from under those umbrellas -- although that in turn depends on who's applying the labels and to what end.


Breaking The Cycle Of Legacy IT Investment
While the cost of maintaining legacy software can be a hidden parasite draining the lifeblood of the IT department, it can be eradicated through a careful and thoughtful modernization project. Whereas the high costs of legacy application upkeep deprives the IT department of resources, the time and funds saved from a systems upgrade can be used to promote faster, more aggressive innovation throughout an organization.



Quote for the day:

"Don't let what you cannot do interfere with what you can do." -- John Wooden

March 07, 2014

The dashboard is due for disruption
In-vehicle systems also have long qualification cycles because carmakers have to worry about safety, reliability and heavy regulations. As a result, they are risk averse, and once they approve a set of hardware and software, they don’t make changes for a long time. That’s why Nvidia has announced that it plans to keep the Tegra 2 and 3 in production for a decade. Finally cars have long lifecycles. Smartphone lifecycles are measured in months while the average age of a car on the road in the U.S. is more than 11 years--a lifetime in the tech industry.


Europol issues public Wi-Fi security warning
Typically, attackers set up rogue Wi-Fi hotspots to dupe victims into mistaking them for official public Wi-Fi hotspots and connecting to them. This means attackers are able to monitor all communications through the rogue Wi-Fi access points and steal data exchanged with banks, retailers and other online service providers. "Everything that you send through the Wi-Fi is potentially at risk, and this is something that we need to be very concerned about,” said Oerting.


Toshiba's OCZ cranks up speed on new 3.2TB solid state drives
At 3.2TB, OCZ is offering the highest storage available in SSDs. SSDs are catching up fast to hard-drives, which have reached a maximum capacity of 6TB. However, SSDs remain more expensive than hard drives. OCZ will continue to offer its own line of SSDs, and nothing is affected by Toshiba's acquisition, said Scott Harlin, director of marketing communications for enterprise at OCZ. "Toshiba will continue to develop, produce, and market their own line of Toshiba-branded SSDs while we will focus on developing, producing and marketing OCZ-branded SSDs that leverage our in-house technology," Harlin said in an email.


Crazy theories and global manhunts for Bitcoin's creator Satoshi Nakamoto
Many have looked at the name "Satoshi Nakamoto" as a puzzle itself, meant to hide the identity of the people or groups behind Bitcoin.The most popular of these is the idea of an invisible hand controlled by a corporate consortium. The name Satoshi Nakamoto, in this theory, derives from these four names: Samsung, Toshiba, Nakamichi Motorola. Others have translated the name to try to find clues. One such theory alleges that the name "Satoshi Nakamoto" shows ties to the CIA. From a Bitcoin forum post just weeks ago:


How To Use Analytics To Build A Smarter Mobile Website
Frequently, design and development teams will be asked to redesign a dated website to be responsive. Looking at existing data would provide crucial insight into how best to present information to mobile users. Google Analytics offers a number of free features for incredibly detailed analysis of mobile activity, with the ability to easily compare to desktop activity. If you haven’t yet installed Google Analytics, setting it up is easy. Just create a free account, and then Google will walk you through the process. You’ll need to place a tracking code in your page before you can start to collect the sort of data that we’ll review in this article.


Security by design still not a reality, says security veteran
Apart from research, Limnell sees security training as a key element to tackling threats. “Companies spend millions on technological controls, but few spend anything on education, which is stupid,” he said. There also has to be a shift to a new security paradigm that aims at achieving cyber resilience. “This approaches starts with the assumption that a network can and will be breached,” said Limnell. “It cannot only be about keeping the bad guys out, you have got to have a plan for dealing with attackers when they breach your defences; identifying the intrusion and containing it,” he said.


Security Manager's Journal: Security flaw shakes faith in Apple mobile devices
Last week, Apple released an update known as iOS Version 7.0.6 to repair a security flaw in the SSL encryption implementation that could allow encrypted traffic to be intercepted and decrypted, thus compromising private data. My company's private data, to be precise. Updates such as this present several challenges to organizations like mine. First, we now need to have a process in place for getting critical security patches on phones, as we do for computers. And that's not easy to do. For computers, we have software that manages patches and can deploy an emergency security fix very quickly, with minimal intervention by system administrators or end users. On phones, we don't.


5 reasons to re-examine how leaders communicate
Here’s the problem with this masking approach, according to Mitchiner: “Employees have a sensitive BS detector and can smell when they aren’t hearing the whole story. They don’t voice this concern; they just walk out, thinking, ‘Management is not leveling with us.’ When employees don’t have the whole story, they themselves fill in the missing pieces. The resulting rumors can be far more damaging than if management had simply told the unvarnished truth in the first place.”


Surface tablets with digitized pens gain a toehold in healthcare
"Microsoft…is realizing that verticals can sort of 'surface' these opportunities where the platform offers benefits you couldn't get in desktop PCs," said Wes Miller, research vice president, Directions on Microsoft, an IT consulting organization based in Kirkland, Wash. Healthcare often uses Windows devices that miss the benefits of using a stylus or touch, he added. The big void is guidance from Microsoft on how corporations can build unique applications for their business, instead of just marketing Surface Pro as a desktop PC replacement, Miller said.


How Women Leaders Have Transformed Management
The emergent leadership Bock is talking about seems to be both non-positional (based on personal qualities rather than one’s title or formal power) and nonhierarchical (when people are comfortable acting from the center of a collaborative web). This model has, of course, been developing for some time—and I believe this shift has occurred at least partly because women have become profoundly interwoven into the fabric of most organizations



Quote for the day:

“The growth and development of people is the highest calling of leadership.” -- Harvey S. Firestone

March 06, 2014

IBM 'as a service' cloud pieces fall into place
IBM in recent days has bought its way to a near complete cloud computing stack. After a bit of integration work, IBM's cloud plans will become clear as it battles everyone from Oracle to HP to Amazon Web Services in a race to offset slowing hardware sales. Add it up and you could say all of IBM's as a services (aaSes) are coming together. ... That take may be a bit gushy, but IBM clearly has more cloud parts in place than it had just a few quarters ago. Here's a look at IBM's relatively new stack and where Watson is likely to f it into the mix.


New CTO previews VMware hybrid cloud strategy beyond DRaaS
The real issue with DR is that when you get into the SMB [small and medium-sized businesses] sector, most medium-sized enterprises don't have a budget for disaster recovery. They have a budget for backup, but not necessarily for DR as well. Where I see that whole DR as a Service market moving eventually is where providers will offer Backup as a Service but provide disaster recovery as a feature. Just about every organization understands that they need backup and that they need to recover files, so that's fine, just make it a feature of a Backup as a Service.


Google Cloud Performance Stability: A Closer Look
The claim that Google provides more consistent performance will have to be tested by each enterprise that moves applications and data to its cloud. I would recommend that they create a series of tests, using different loading profiles, such as simulating end-of-year processing using increasing loads on compute and storage, and then sustained loads for several days. This type of testing will tell you a lot. As most of us who have migrated applications to the cloud know, the characteristics and profile of each application are more of a determination of performance than the platform.


FACE Software Effort Builds Momentum
“We’re really trying to break that pattern by standardizing software and putting the business incentives in place to really change the way the government procures software and the way the vendors provide it.” More than ever, software drives the cost of avionics functionality, Howington says. The FACE initiative is addressing the cost and schedule-drivers behind avionics software development and deployment. “Done right, [FACE] will directly impact the conversation on how to meet military avionics needs in the current fiscal environment,” he says.


7 historical decisions that continue to pain programmers
Software developers make decisions all day long about how to best implement functionality, fix bugs, improve application performance, etc. But they also live with the consequences of decisions made by others in the past in the design of the languages, systems and tools they use to do their jobs. Some of those choices, which may have made sense or seemed inconsequential at the time, have turned out to have unintended, long lasting and painful effects on those who write code every day. Here are 7 choices made in the development of languages or operating systems that continue to give developers headaches to this day.


Red Hat polishes business process management suite
JBoss BRMS provides a platform for defining business rules so computers can make decisions based on these roles. For instance, an automobile insurance company may have a set of rules for guiding how much to charge customers, based on their age and type of vehicle. BRMS, and other business rules management software, minimizes the need to encode business rules directly into an application, which can be cumbersome to update should the rules change over time.


MongoDB chief: Why the clock's ticking for relational databases
"The first rule of a relational database is that every row in a table has to have the same set of columns as every other row, which we didn't think reflected reality," he said. "Relational databases in general — certainly all the leading products from the big vendors — don't have the capability built into the product to take a query and decide where the data is, execute the query there, bring it back and, if the data is in multiple places, aggregate it. "If the data on one of the servers is more than it can handle, move some of that data to another server that's less heavily loaded. The leading vendors still have to build those capabilities."


What do SaaS implementations mean for IT?
Indeed, organizations that adopt SaaS software are largely at the mercy of the provider when it comes to the availability of the application, Harzog said. Traditional monitoring tools are of little help with SaaS apps, since they require an agent on the application server. "Salesforce.com is not going to let you do that," he said, referring to the popular hosted customer relationship management suite. Meanwhile, application performance monitoring tools tend to monitor code, which is also a non-starter for SaaS-delivered apps.


Do You See Prison Bars or the Stars?
One way to remove organizational cultural barriers is to acknowledge a problem within organizations. Many companies suffer from an imbalance of how much emphasis to place on being smart versus than being healthy. Most organizations over-emphasize trying to be smart by hiring MBAs and management consultants with a quest to achieve a run-it-by-the-numbers management style. These organizations miss the relevance of how important is to also be healthy – assuring that employee morale is high and employee turnover is low.


Top Challenges and Roadblocks for CIOs in 2014
CIOs are today faced with lots of challenges and in this new era, the successful CIOs are those who can innovate with technology and bring a difference to the business of the organisation. Going forward, CIO can expect to face numerous roadblocks in achieving success and we at CIO&Leader thought of asking some of the CIOs what are the roadblocks do they expect in this calender year. According to Tridib Bordoloi, CIO, PTI, “We stay in a connected world where information is power and the access to information is phenomenal. In the emerging economic scenario business priorities are changing rapidly.



Quote for the day:

“Try not to become a man of success but a man of value.” -- Albert Einstein

March 05, 2014

Pre-installed malware found on new Android phones
After taking a close look at the suspicious application, Jevans said they found it wasn't the real Netflix app. "We're like, yeah, this isn't the real Netflix," Jevans said "You've got one that has been tampered with and is sending passwords and credit card information to Russia." Security experts have long warned that downloading applications from third-party marketplaces for the Android platform is risky since the applications have often not undergone a security review. Google patrols Android apps in its Play store, but malicious ones occasionally sneak in. Apple's App Store is less affected due to the company's strict reviews.


Creating cool animations and transitions in HTML5 app for Intel Android devices
One of the most exciting features of HTML5 is the <canvas> element that can be used to draw vector graphics and engender astonishing effects, interactive games, and animations. The HTML5 Canvas is picture-perfect for creating great visual material that augments UIs, diagrams, photo albums, charts, graphs, animations, and embedded drawing applications. HTML5 Canvas works with JavaScript libraries and CSS3 allowing you to create interactive web-predicated games and animations.


A .NET Developer Primer for Single-Page Applications
... a lot of .NET developers (especially in the enterprise) are dealing with an extreme amount of anxiety about JavaScript best practices, architecture, unit testing, maintainability and the recent explosion of different kinds of JavaScript libraries. Part of the trend of moving to the client side is the increasing use of single-page applications (SPAs). To say that SPA development is the future is an extreme understatement. SPAs are how some of the best applications on the Web offer fluid UX and responsiveness, while minimizing payloads (traffic) and round-trips to the server.


Treating healthcare data as an asset
One of the most challenging things any chief information officer (CIO) or chief medical information officer (CMIO) faces is getting support from across constituencies to transform the culture in IT and lines of business, not only to be more data-driven, but to recognize the value of combining data across silos to get greater insights. So, what is the catalyst to help get things started? ... when the executive leadership in an organization isn’t getting the reports and insights they need to make strategic decisions that make or break the business


Microsoft Tries to Relieve Security Fears with Office 365 Makeover
This kind of authentication was introduced to the Azure Cloud platform last September. Its introduction to Office 365 is the extension of a feature that has been available to administrators since the middle of last year, but clearly the level of risk for cloud services now is so great that Microsoft is offering it to everyone. This addition of multi-factor authentication is part of Microsoft ongoing effort to enhance security for Office 365, Andrew says, but it is not the only new step that is being introduced. The Office 365 team is already working on improving Multi-Factor Authentication for Office 365 from Office 2013 client applications.


The next wave of cars may use Ethernet
Currently, however, there are as many as nine proprietary auto networking specifications, including LIN, CAN/CAN-FD, MOST and FlexRay. FlexRay, for example, has a 10Mbps transmission rate. Ethernet could increase that 10 fold or more. The effort to create a single vehicle Ethernet standard is being lead by Open Alliance and the IEEE 802.3 working group. The groups are working to establish 100Mbps and 1Gbps Ethernet as de facto standards.


18 Things Highly Creative People Do Differently
Research has suggested that creativity involves the coming together of a multitude of traits, behaviors and social influences in a single person. "It's actually hard for creative people to know themselves because the creative self is more complex than the non-creative self," Scott Barry Kaufman, a psychologist at New York University who has spent years researching creativity, told The Huffington Post. "The things that stand out the most are the paradoxes of the creative self ... Imaginative people have messier minds."


How this one innocous tweet could hack a bank account
Based on just his name and his employer, would that be enough to steal his identity and take over his life? The bet was laid and the plan we formulated was simple enough: To gather enough intelligence about Alex to convince his call center operator at his bank that I was him. Like something out of a Mission Impossible film, I would have to bypass the automated phone system, steer through the security questions, and — armed with a fictional and empathy-driven sob story — socially engineer my way into his bank account.


Managing and Developing the Extraordinary
Let’s face it, some people are graced with an extra gear that the rest of us don’t have. Whether it’s remarkable creativity or ingenuity, or incredible technical skills, it’s exciting to manage and support extraordinary individuals. It’s also very challenging. Good managers and leaders tailor their approach for individuals, however, when presented with someone who is light-years beyond their peers in certain areas, many managers stumble and struggle when it comes to daily management and on-going support and development. Here are some suggestions for strengthening your support of these unique individuals.


Internet Of Things: What About Data Storage?
The impact on storage at first seems fairly obvious: There is more data to store. The less obvious part is that machine-generated data comes in two distinct types, creating two entirely different challenges. First, there is large-file data, such as images and videos captured from smartphones and other devices. This data type is typically accessed sequentially. The second data type is very small, for example, log-file data captured from sensors. These sensors, while small in size, can create billions of files that must be accessed randomly.



Quote for the day:

"In the business world, everyone is paid in two coins:cash and experience. Take the experience first; the cash will come later." -- Harold Geneen

March 04, 2014

SAFe – Good But Not Good Enough
SAFe distinguishes three levels, portfolio, program, and team. Activities at this level are different, and SAFe describes fairly well how to hook them together. We might prefer self-organization, but the SAFe breakdown isn’t bad and parts of it are good. The advice may not be Pure Agile but it’s Pretty Darn Good.Scrum and Agile really don’t offer much help at these levels, and large organizations have these levels or equivalents. Without guidance these levels are likely to be inefficient and to militate against Agile ideas. SAFe’s guidance is better than no guidance at all.


Six Creative Leadership Lessons From The Military In An Era of VUCA And COIN
Of course, thinking historically, military leadership is among the most ancient of leadership forms. That long view, combined with the diverse military activities across so many different societies today, means that references to “military leadership” can point to a wide range of practices. The category is, consequently, an expansive one, which can contribute to partial understanding and even the creation of a “straw man” about which selective claims can be attached. The military itself, long committed to leadership training and practice, has increasingly engaged in reflection and research on the topic.


Citrix At A Crossroads: Which Path Forward?
One interesting coincidence is that Templeton’s announced departure coincided with Microsoft’s search for a new CEO. Citrix and Microsoft have long been allies. Microsoft gave Citrix access to the OS/2 source code to build its product, and Citrix later created Microsoft’s Terminal Server technology, which is still used under the Remote Desktop Services label. Citrix has mostly been in lockstep with Microsoft from a strategy perspective. How this relationship develops under new leadership, given that Citrix’s portfolio has diversified and is no longer completely reliant on Microsoft, is another area to watch.


10 creative ways businesses are using tablets
Tablets can provide a customized user experience that businesses can use to create better ways to interact with customers. You've probably heard about businesses using mobile devices to gather analytics on the shopping or buying behaviors of their customers, but there are other tablet usage stories. We've compiled a list of 10 creative ways companies are using tablets.


A CIO who masters disasters
If Halamka had been the CIO of Target, you get the impression that the retailer's breach would have been handled differently. "Be open, be honest, be forthcoming, hide nothing and use it as a podium, a bully pulpit to move an entire industry," said Halamka. Commenting on Target's handling of its security breach, Halamka said he would have advised disclosing the severity of the incident fully, up front, instead of building up to it. "Customers would rather hear about what you experience and why it is making you stronger and what adversity you are working through," said Halamka.


Securing endpoint devices with code-execution prevention
While most organizations have antivirus software (AV) installed on employee devices, too many use it as their only means of endpoint device protection rather than relying on it as a first line of defense. Simply put, AV is not able to stop all malware. So along with regular patching to prevent known exploits from being a threat, administrators must deploy additional controls to decrease the chances of attacks against users being successful.


Open source challenges a proprietary Internet of Things
In December, the Linux Foundation, a non-profit consortium that promotes Linux adoption, created the AllSeen Alliance. It took a code stack developed by Qualcomm called the AllJoyn Framework and put it under its open-source umbrella. This C++ code supports the major operating systems, chipsets and embedded variants. Any electronics or appliance maker, or even an LED light bulb maker that uses the AllJoyn code will have a basis for connectivity with another product that also uses the code.


Intel expects Bay Trail successor in tablets by year end
The Cherry Trail chip, which will be made using the 14-nanometer process, will be even faster and more power-efficient than Bay Trail, which is made using the 22-nm process. Users can expect better battery life and performance in tablets with Cherry Trail compared to the current Bay Trail chips. The new 14-nm manufacturing process will allow Intel to make denser chips that are more power-efficient. Intel could target the new Cherry Trail chips at high-end tablets during the holiday season this year, and may push the Bay Trail tablet into the lower price ban


MIT builds self-completing programs
“When you’re trying to synthesize a larger piece of code, you’re relying on other functions, other subparts of the code,” Rishabh Singh explains. “If it just so happens that your system only depends on certain properties of the subparts, you should be able to express that somehow in a high-level language. Once you are able to specify that only certain properties are required, then you are able to successfully synthesize the larger code.” For instance, Singh explains, suppose that one of the subparts of the code is a routine for finding the square root of a number, and a higher-level function relies on the results of that computation.


Can You Measure Business Agility?
Organizations structure themselves in response to the external environment. If the external environment is predictable and relatively resistant to change (as it was during the License Raj in India), traditional means of work, which emphasize division of labour and efficiencies arising out of economies of scale, should be the way to go. But in an intense, volatile environment as we have today, companies must embrace the agile culture and structure, to compete out there.



Quote for the day:

"When I consider what tremendous consequences come from little things, I'm tempted to think there are no little things" -- Bruce Barton

March 03, 2014

Make BYOD Work: 9 Key Considerations
The benefits of BYOD are clear: The practice promotes productivity and has the potential to save on hardware costs. But the options available to manage personal devices can be confusing. IT organizations must weigh software and hardware for mobile device management, device and identity partitioning, virtual machines, wireless access points, network access control, and custom mobile applications.


Knowledge Banking for a Hyperconnected Society
Technology enables us to build new content based on the knowledge generated from the available data. It also offers the customer an improved experience. The bank no longer needs to wait for the customer to request a given service; it can anticipate the customer’s decision-making process, offering what he or she needs at the right time and in the most convenient format. To achieve this banks must take their place at the forefront of Big Data analysis and make use of all the information they have amassed about their customers, as well as the wealth of available external data, particularly sourced from social media.


Threats in the Cloud – Part 2: Distributed Denial of Service Attacks
On a daily basis, Microsoft’s DDoS protective measures apply mitigations to prevent impact from DoS and DDoS attacks to ensure uptime and availability for services and customers. Common types of attacks include SYN floods, DNS amplification, malformed TCP and UDP packets, and application layer abuses specific to HTTP and DNS. One common attack technique used by a number of freely available DDoS toolkits involves using fragmented IP packets with a fixed payload.


How Open Data Portals Will Stimulate Innovation and Economic Growth
According to Neelie Kroes, VP of the European Commission, opening up public datasets could double the value of it to around € 70 billion. Subsequently, such data portals can be used to create applications that can help improve society, tackle economical problems and drive economic growth. There are ample benefits for both governments and businesses. According to the Capgemini report, Open Data Portals can drive revenue, cut costs and improve efficiency and generate employment for future generations. Governments for example can increase their tax revenues though increased economic activity or make money through selling high value added information for a price.


Managing Data Center Operating Expenses: “The Property Tax”
The reality is that the assessor may only have one or two such properties in their jurisdiction, he/she may have never seen one sale in that area, and they aren’t likely exposed to the larger “world” of the national data center market. So to that end, we’d like to address a few items that you should be sure to explore in considering whether your tax assessment valuation has been thoroughly and properly considered by the assessor:


Speaking Intelligently On Business Intelligence
The real value of intelligence, both inside and outside of government, comes from the ultimate understanding of human intention, and from a nuanced perception of the context in which decisions are made. For governments, that critical element tends to come from human intelligence – or “HUMINT,” in insider parlance. The same holds true for the investigative journalist, though you’d be hard-pressed to find one who would readily admit his source work and techniques are so closely aligned with the practices of the intelligence community.


In-Memory Databases: Do You Need The Speed?
First, databases that take advantage of in-memory processing really do deliver the fastest data-retrieval speeds available today, which is enticing to companies struggling with high-scale online transactions or timely forecasting and planning. Second, though disk-based storage is still the enterprise standard, the price of RAM has been declining steadily, so memory-intensive architectures will eventually replace slow, mechanical spinning disks.


Up-and-Coming IT Leaders Focus on Business Customers
"The distance between us and the customer is traditionally far too big. It's immense. You might have a guy doing coding or testing who will take his requirements or direction from a project manager who might work with a business analyst who works with a product person who works with a salesperson who talks to the customer. There are five or six steps between the person providing us with the real need and the person actually delivering that. My view is, you have to cut all those steps out and have as much direct contact with the customer as possible," Sewell says.


When Start-Ups Don’t Lock the Doors
Many of the companies, including Kickstarter and Tinder, have rushed to improve their overall security after they were breached. Snapchat, the ephemeral messaging service that repeatedly ignored warnings about a data breach that exposed millions of user names and phone numbers, eventually acknowledged the loophole and hired Peter Magnusson, a head of engineering at Google, to help improve the company’s security efforts. Even so, as Snapchat has gained more users, it has also lured spammers, who have taken to sending malicious ads and links using the service.


Don't let governance methods die after a cloud migration
"Cloudifying" your governance practices means finding out what your proposed provider and other viable competitors offer. It's critical to know whether you have governance practices that are "fragile," or might fall short of regulations in case you switch providers. There are companies that specialize in tracking global compliance requirements, which are a good resource for companies considering all areas in which they may be at risk.



Quote for the day:

"A brand is no longer what we tell the consumer it is - it is what consumers tell each other it is." -- Scott Cook