March 25, 2014

IT is Growing Up: What the IT organization needs to do to be sustainable and valuable
Inspired by strategically minded CIOs and best practice competition winners, respected industry thought leader Jill Dyché is writing a new book about how IT is changing and, when in synch with organizational culture and strategy, its potential to transform how companies function. Trends like digital, analytics and big data are pushing the envelope for technology expectations within lines of business, and with business users often acting independently the traditional IT group simply can’t stand on its own. “The New IT” is about collaboration, working together to make IT effective and enculturating that to provide lasting business value.


Smartphone innovation is slowing, so what's next?
With smartphone innovation flattening, the next direction seems to be making the smartphone the hub -- connected via Bluetooth, primarily -- to emerging technologies. These systems include smartwatches, other wearable devices and everything in the much larger ecosystem of home appliances, cars and other products that, when connected, would comprise what's being called the Internet of Things. While this slowdown in innovation has been widely recognized, marketers for smartphone vendors still trumpet their devices' new features at large-scale events where the latest products are unveiled amid hype that overstates the new capabilities.


Finally, IPv6’s killer app: The Internet of Things
And the plan was so simple too: ISPs would start migrating to IPv6 well in advance of any address crisis. Everyone would run dual-stack for a few years and then when the IPv4 addresses started to run out, ISPs would turn their IPv4 networks off and we would all be running IPv6. Neat and orderly. Theoretically perfect. Well engineered. But not well financed. While the engineers thought this was a logical and great idea, the finance people, well… not so much. So while slipping down the first and steepest slope of the IPv6 hype cycle, the board decided we needed a plan B.


Microsoft Using Machine Learning, AI Across Product Lines
"Large amounts of that system are all done by machine learning because that's how you can do scale," Platt said. "The only way you can answer the billions of questions Bing answers is to have something that operates autonomously. In Xbox, the Kinect was also trained with machine learning. The fact that it can see you in the room even though it's poor lighting and you can wave your arms and it can track you—that's all done with a piece of software that was trained with machine learning."


How Enterprises Are Capitalizing On The Consumerization Of IT
Enterprises are capitalizing on the consumerization of IT and proliferation of mobile devices by developing applications aimed at improving employee productivity and customer satisfaction. These and many other findings are available in the IDG Enterprise Consumerization of IT in the Enterprise Study 2014 published today. The study shows that 83% of organizations are planning to invest in mobile technology in the next 12 months, with the majority of spending being for tablets and training (49%). A summary of the study and sample slides can be found here.


Obama to Call for End to N.S.A.’s Bulk Data Collection
As part of the proposal, the administration has decided to ask the Foreign Intelligence Surveillance Court to renew the program as it exists for at least one more 90-day cycle, senior administration officials said. But under the plan the administration has developed and now advocates, the officials said, it would later undergo major changes. The new type of surveillance court orders envisioned by the administration would require phone companies to swiftly provide records in a technologically compatible data format, including making available, on a continuing basis, data about any new calls placed or received after the order is received, the officials said.


Security black market as mature as any other free market: Juniper
"I don't think people expect to see it so mature," Greg Bunt, Juniper director of APAC security sales, told ZDNet. "Rather than it being described as a black market, I think it needs to be described as a pretty fully-featured, and fully-rich economy with payment systems, policing — all the sorts of things that you would see in a traditional economy, we see that permeate through this as well." Mirroring aspects of a traditional economy, the survey found that products sold by exploit vendors, often arrived complete with usage terms, tracking functionality, and enforcement functionality.


Oracle Has Sunny Forecast for Cloud Computing
These three cloud approaches have in common the Oracle database, running as a database as a service. Supporting it is the Oracle Fusion Middleware as a service that operates its business applications and is the basis to build custom applications by providing user, process, documents, information and identity services. Middleware is also where Oracle is advancing its support of mobile computing and big data as well as batch-to-real-time integration to applications and data across the enterprise and cloud along with Web services support through the REST and SOAP interfaces. Our research shows that integrating data from cloud applications is important to 80 percent of organizations.


ATM malware, controlled by a text message, spews cash
The malware is engineered to plunder a certain type of standalone ATM, which Symantec has not identified. The company obtained one of the ATMs to carry out a test of how Ploutus works, but it doesn't show a brand name. Ploutus isn't the easiest piece of malware to install, as cybercriminals need to have access to the machine. That's probably why cybercriminals are targeting standalone ATMs, as it is easy to get access to all parts of the machine. Early versions of Ploutus allowed it to be controlled via the numerical interface on an ATM or by an attached keyboard.


Fourteen Interview Questions to Help You Hire Your Next Innovator
The potential for innovation in your company increases when you have employees who demonstrate unrestrained thinking and the ability to connect seemingly disparate ideas. Is it possible to identify the people with these capabilities during a first interview? Absolutely—if you know what you look for and if you’re armed with the right questions. When searching for the next innovator to add to your team, start by looking for these five critical innovation skills and asking the relevant questions to find candidates who have them.



Quote for the day:

"There is only one thing more painful than learning from experience and that is not learning from experience." -- Archibald McLeish

March 24, 2014

Outdated mainframes putting businesses in debt
"The challenge for CIOs is keeping up with the accelerating pace of business and so they do need to actually introduce a lot more capabilities into the core system," he said. "For example, places like Korea uses mobiles to make touch payments via credit cards without any pin and in order for that to happen, core systems had to be changed. The modernisation of these things is more important at this point than just looking at the pure cost." Another key research finding was that 31 percent of current mainframe applications are accessible via the cloud, with this figure expected to rise to 41 percent in two years.


WebRTC standard is unfinished but enterprises are ready to adopt
Testing out the more recent browser-based communication technology gave McFarlane and his team the confidence that WebRTC was a viable option, and Twilio helped LiveOps achieve browser-based telephony quickly. "As of 2013, we were completely enabled for WebRTC," he said. The best part about the WebRTC standard lies in the fact that it's not a proprietary technology, he said. While Twilio is currently the sole provider of WebRTC for LiveOps, that doesn't always have to be the case down the road. "It's really big on the hype cycle, but I think the hype is worthwhile at this point," he said.


It's good business to let your business go social
Technology is the enabler of a social enterprise, but culture is its core. IBM uses the term “work-life integration” rather than “work-life balance” because the reality is for our people – and specifically people entering our work force – the lines between “work” and “non-work” are blurry. Team members are accustomed to continuous sharing of ideas on social platforms and often those ideas are related to a work project or a work relationship. If someone needs flexibility during traditional working hours to attend to a personal matter, as a leader you have to trust that that person will provide full value at other times during the day.


Microsoft to review policies after admitting it searched customer email
Court filings revealed that Microsoft's internal investigation involved searching through the French blogger's Hotmail account where it found emails from Kibkalo. Hotmail has since been rebranded as Outlook.com. ... Microsoft also searched through Kibkalo's instant messaging conversations and his account with SkyDrive, the company's cloud file hosting service that's now called OneDrive. While it appears that the terms of service for Microsoft's online services allows the company to access users' content "to protect the rights and property of Microsoft," among other things, the incident drew criticism from privacy advocates and other users on social media.


NSA hacked into servers at Huawei headquarters, reports say
The NSA "pried its way" into Huawei servers at the company's headquarters in Shenzhen, China, according to an online report in The New York Times Saturday. The operation, code-named "Shotgiant," was to try to establish long-suspected links between Huawei and the PLA, and also to plant backdoors on Huawei equipment sold worldwide, according to the Times. Among the information cited by newspaper was a 2010 document detailing Shotgiant operations. However, covert operations against Huawei go as far back as 2007, The New York Times report said. The NSA also monitored communications of Huawei executives, the report said.


IBM's Anti-Fraud Push Strikes a Chord with Banks
Banks are said to need such products to sift through vast repositories of data and get the left hand of their large operations, say the anti-fraud group, to compare notes about suspicious activity with the right hand, perhaps the anti-money-laundering team, in order to catch the bad guys. In the same way, IBM executives have to make sure their products do a good job of talking with each other to be effective. If such anti-fraud technologies "aren't connected and in sync with each other, that creates gaps for the fraudsters to cut through," says Richard Hoehne, global counterfraud and financial crimes leader at IBM.


Dell Acquires StatSoft
The acquisition of StatSoft bolsters Dell Software’s growing portfolio of information management solutions, while further enhancing the company’s open approach to data management. StatSoft adds advanced analytics to a robust set of software capabilities that includes database management and optimization, application and data integration, and big data analytics, all underpinned by Dell’s myriad software, storage, server and services offerings and industry relationships.


How a digital Cold War with Russia could threaten the IT industry
While the European Union has imposed similar travel bans and asset freezes of key Russian individuals, political realities will likely stop them from imposing wider-range sanctions like those the US is threatening, due to their heavy reliance on Russian natural gas. While the United States, unlike Europe, is not a major consumer of Russian gas exports, it would be simplistic to say that Russia has no impact on US business at all. A full-on Cold War with Russia and imposition of the kind of wide-ranging sanctions that we currently impose on Iran and other hostile states would actually have a real and costly impact on the technology industry, should the situation degrade further.


Government open data proves a treasure trove for savvy businesses
Hoping to capitalize on this open data revolution, IT leaders are taking the lead in discovering the value of converting terabytes of data into new revenue streams. Forget about the open-source movement's clarion call for free software, greater collaboration and anti-establishment bootstrapping. Today's open data trend is driven by a desire for both greater government transparency and a fatter bottom line. And as more and more techies clamor for a seat at the table, they're finding that the era of open data represents a prime opportunity to prove that they're indispensable revenue-generators, not just server-room sages.


Career Watch: The rise of people architecture
For employers, people architecture can mean improved individual and team performance and more predictable execution, more consistent availability and quality of skills and workers, higher utilization rates, and optimized resource supply/demand management. For IT professionals, it can mean more tangible career paths, more useful feedback on how they fit into the overall IT and business mission, and less confusion about job options. And we hear stories about better morale.



Quote for the day:

"Many of life's failures are people who did not realise how close they were to success when they gave up." -- Thomas Edison

March 23, 2014

Hosted Desktop Services – Take Advantage of BYOD
“There’s a big demand for cloud services to cover enterprise mobility management,” said Absalom. He added that most mobility management vendors provide a mixture of both cloud and on premise services, depending on the demands of the business. Many entrepreneurial ISV’s have started to offer cloud based BYOD management tools including Armor5, MobileSafe, and Cisco-acquired Meraki. Absalom added there is much scope for further innovation, even when the addition of major vendors to the market – IBM, HP, Dell, Microsoft –is considered.


What Makes a Perfect Business Requirements Document?
A Business Requirements Document is an essential part of any major project. It is often written based on a company template especially in large corporations, which can vary from industry to industry, and which may have been in use for many years. But businesses change rapidly so the template you are using may not be perfect and if you work for a start up business then you may not even have a template to work from. So here are some top tips for what to include in a Business Requirements Document; getting the BRD right is a major factor in successful projects. But just what makes a perfect business requirements document?


4 Ways to Cure Your Technological "Distraction Addiction"
It’s easy with social media to forget that there are real, live people behind those goofy Twitter avatars. “The fact that you’re interacting through technical intermediaries should not distract you from their humanity,” Pang notes. To make sure you’re reminded of the humans behind Twitter and Facebook’s cheerful blue design schemes, Pang suggests “mindful” engagement with social media. Pang writes, “Tweeting mindfully means knowing your intentions, knowing why you’re online right now and asking yourself if you’re on for the right reasons … As a practical matter, this means that if you read something and your first impulse is to post a sarcastic comment or to blather on, stop and consider why this is the case.”


Embracing the cloud: How Microsoft is radically changing its vision
As it enters its fourth decade, Microsoft is on a tear. The company’s stock price, hovering around the $40 (U.S.) mark, is higher than it has been at any time since the dot-com boom. In its most recent quarterly earnings report this January, Microsoft posted revenue of $24.52-billion and profit of $6.56-billion – beating analysts’ expectations. Yet the company still finds itself in the unfamiliar role of underdog, struggling to keep up with younger foes such as Facebook, Google and Amazon for dominance in the tech industry’s triple crown of social networking, mobile devices and cloud computing.


10 Best Cloud Tools For SMEs
Though many companies are confident that their networks are protected, this confidence might be misplaced as the recent events in which the networks of even large companies were hacked means that the CIOs (Chief Information Officers) and the system administrators cannot take things easy. It is in this context that the provision of “security as a service” or a cloud based network protection tool would come in handy for the systems staff in SMEs. The following list of ten best cloud tools for SMEs should provide the information necessary for the SMEs to protect their networks.


Erik Bussé: “TV will become the portal to the digital home”
I expect the average new house will have sensors connected to doors and windows, a doorbell with a camera, wireless light switches smoothly integrated in a smartphone app. Apart from the smart phone, the TV screen will become the portal to all digital home solutions. I expect even that appliances like refrigerators and washing machines will become connected. This will enable preventive maintenance but also will allow customers to be informed that it is time to empty the dishwasher or to warn them that the temperature in the fridge is getting to high because someone left the door open. This way, there will always be a nice cold beer waiting for you!


When is software patentable? The Supreme Court is about to weigh in
Software patents have always been controversial, in large part because the dividing line between a patentable software-based invention and one that is not has never been clearly defined. But the often hazy body of law that determines software patentability could be about to change. On March 31, the U.S. Supreme Court will hear oral arguments in Alice Corp. Pty. Ltd. v. CLS Bank Int’l., No. 13-298, a case that could have wide consequences in the tech community and beyond. At stake is when and how a particular software-based invention—that is, an invention that incorporates the performance of a computer and software—is entitled to a patent.


The Green Grid Unveils Energy Productivity Metric for Data Centers
DCeP is an equation that quantifies useful work that a data center produces based on the amount of energy it consumes. The Green Grid is no stranger to attempting to quantify data center efficiency, coming up with many of the standards used today, such as Power Usage Effectiveness (PUE), which compares a facility’s total power usage to the amount of power used by the IT equipment, revealing how much is lost in distribution and conversion. DCeP allows an organization to define “useful work” as it applies to its business. For example, a retail business may use number of sales as the measure for useful work, while an online search company may use the number of searches completed.


How David Rockwell Reinvented The Theater For The TED Era
Rockwell traveled to Vancouver to look at the space with the TED team, sketching the first plans on a restaurant napkin. "Like most great things, it was slightly terrifying, but kind of the perfect intersection of what I’ve been thinking about for 30 years," he says. Rockwell is interested in exploring why, in an age when we can be connected through technology anywhere and at any time, we still crave a live experience. Harnessing the idea that the experience of TED is as much about the audience as it is the speaker, he designed a 20,000-square-foot temporary theater that can be assembled within the convention center's 40,000-square-foot ballroom, one that he says is "very much bespoke around [TED's] DNA.”


Virtual Panel on Immutable Infrastructure
“Immutable Infrastructure” is a term that has been increasingly talked about lately among the Ops community. InfoQ reached out to experienced ops engineers to ask them what is the definition and borders of immutable infrastructure as well as its benefits and drawbacks, in particular when compared to current widespread “desired state” configuration management solutions. Is it a step forward or backwards in effective infrastructure management?



Quote for the day:

"This one step, choosing a goal and sticking to it, changes everything. " -- Scott Reed

March 22, 2014

Emergency response vehicle puts IoT on wheels
“The internet of everything brings together people, process, data and things to make networked connections more relevant and valuable than ever before,” said Ken Boal, vice president of Cisco Australia and New Zealand. “The National Safety Agency’s Emergency Services Integrated Communications vehicle is a phenomenal showcase of how public safety can significantly improve the real-time flow of information through a mobile command and communications center to allow better informed decisions to be made more quickly and ultimately lead to safer Australian communities.”


Court approves first-of-its-kind data breach settlement
A federal court in Florida broke the mold by approving a $3 million settlement for victims of a data breach in which personal health information was exposed when multiple laptops containing the unencrypted data were stolen. The Dec. 2009 theft of laptops belonging to AvMed, a Florida-based health insurer, exposed the patient records of tens of thousands of its customers. Several victimes later filed a putative class action lawsuit against AvMed. The plaintiffs suffered no direct losses or identity theft from the breach but nevertheless accused AvMed of negligence, breach of contract, breach of fiduciary duty and unjust enrichment


“Modernizing” Your Data Warehouse with Microsoft
Modernizing your data warehouse with new technologies can help you meet the needs of today’s enterprise to connect all volumes of any data with agile and familiar BI to business decision makers. This was validated by The Data Warehousing Institute (TDWI) who published a checklist to enable the modern data warehouse. ... Microsoft has a comprehensive solution to modernize your data warehouse across software, appliance, and cloud for this new world of data.


Hadoop and NoSQL Now Data Warehouse-Worthy: Gartner
The shift to include non-relational data warehouse products opens Gartner’s report to three new vendors, including Cloudera, MarkLogic, and Amazon Web Services, the first two of which are in the lower left “Niche Players” quadrant, while AWS is in the upper left “Challegers” quadrant. Teradata, by the way, remained the king of the data warehouse hill, with the best rating in the upper right “Leaders” quadrant, along with other established giants like Oracle, IBM, Microsoft, SAP, and HP, which crawled up from the “Visionaries” quadrant to sit with the big dogs.


Hybrid Cloud: Creating a Roadmap for a Cloud-enabled Enterprise
Hybrid cloud, which draws from multiple in-house and external resources, is the hot trend in 2104. To date, organizations have taken a “lite” approach for in-house private cloud using commodity hardware, virtualization and dynamic provisioning technology. However, the increased availability of ‘cloud operating systems’ such as OpenStack make it easier to replicate public cloud capabilities in-house. Thus, the concept of a hybrid cloud infrastructure really became popular.


Beware this big iOS flaw -- and it's not alone
Apple, he explained, recognized that the method of generating random numbers in iOS 6 could be improved on. Its security engineers leveraged the phone's CPU clock counter on earlier version of iOS, Mandt said. "That's not very good, but still somewhat unpredictable," he said. The problem with the new generator in iOS 7 is that it uses a linear recursion algorithm, Mandt said, which has "more correlation" between the values it generates. That makes them easier to extrapolate and guess, he said. "Normally, you shouldn't be able to get any of these values in the first place," Mandt said.


The Right-Time Enterprise: Time to Take Advantage
In the past, bringing data from these disparate islands of technology in a single data store would have been unaffordable and working on them separately was too laborious to be worthwhile. Today, cheaper and better storage and big data solutions make that possible, and applying analytics tools to the data generates valuable and actionable insights for the business far more quickly. One practical application lies in production management, where streaming data enables the company to exercise opportunities to reduce the risk to supply and save costs of operations by responding to the performance of its production systems in near real time.


The End of the Cloud Experiment – What’s Next for Business?
One of the most disruptive aspects of this is now emerging, in what many are calling the “API economy,” wherein developers, ISVs, and enterprises increasingly build and share interfaces to their applications’ functionality that enable more flexible consumption of solutions across a variety loosely-coupled IT and business environments. The accelerating adoption of API-driven development strategies is causing significant shifts in software architecture, software security, and partner relationships, which in turn pose new challenges for ISV business models and Cloud services providers.


IT's hottest jobs: IT technician
IT technicians can be found working in a variety of industries, as IT technicians and support personnel are among the most in-demand positions companies are seeking to fill. Some of the most common scenarios include working in a retail electronics store that repairs hardware or software; as a member of an internal IT team within large and medium sized companies; and as a technical support advisor who helps customers over the phone with tech issues.


Is Cloud Computing Secure for Financial Services Industry?
This is a typical argument we hear from old school IT or legacy vendors such as Oracle. They tell you multitenancy is bad for you, either because they haven’t upgraded their skills (and are fighting to save their jobs) or because they want to sell you dedicated hardware. CPU power is commoditized and getting cheaper every day, so the “non-trivial CPU usage” claim doesn’t hold water. In fact, I realized that the case against cloud security now rests heavily on the recent hacking incidents, as some of these comments suggest:



Quote for the day:

"The value of a company is the sum of the problems you solve." -- Daniel

March 21, 2014

Google tightens HTTPS protections in Gmail in light of government snooping
"Starting today, Gmail will always use an encrypted HTTPS connection when you check or send email," Nicolas Lidzborski, Gmail Security Engineering Lead, wrote in a blog post Thursday. He highlighted the security benefits of having HTTPS permanently on. "Today's change means that no one can listen in on your messages as they go back and forth between you and Gmail's servers -- no matter if you're using public WiFi or logging in from your computer, phone or tablet," Lidzborski wrote


Technology focus in securing BYOD is a mistake, say experts
“Any enterprise cannot apply appropriate controls before it understands how employees are using mobile technology and it does a risk assessment to ascertain if there are any privacy issues,” he said. Many organisations fail to define what they are trying to protect, said Paul Swarbrick, global CISO at legal firm Norton Rose Fulbright. “The biggest danger of BYOD is not understanding the risks,” he said. “Security should not be about the technology; it should be about the data and protecting that data wherever it is used, and about educating employees to access data securely," said Swarbrick.


On Handling Dates in SQL
The date fields contain non-negative integer values, constrained by the natural rules for dates using the Common Era calendar. Please note a few things you might not think about if you are not a “data junkie” who stayed up to watch the leap-second one night. There is no year zero. There are no negative years, either. The correct postfix is “CE”, and “BCE” for “Common Era” and “Before Common Era” dates, replacing AD (“Anno Domini ') and BC (“Before Christ). Standard SQL also has an INTERVAL data type. This is a “mixed measurement”, made up of temporal fields, just as we Americans mix feet and inches.


Logitech ConferenceCam CC3000e review: Room-based HD video conferencing
Logitech has maximised layout flexibility by connecting everything via a small (9.5cm by 7.4cm by 3.4cm, 50g) powered USB 2.0 hub. You get 5-metre (16-foot) Mini-DIN cables for attaching the camera and the speakerphone, and a 3m (10ft) USB 2.0 cable for connecting to the PC or Mac that's hosting the video conference. If you want to keep the hub and wiring out of the way, you can use the provided mounting kit to attach it to the underside of a desk or table. The CC3000e is officially compatible with a range of UC platforms, including Microsoft's Lync and Skype, Cisco's WebEx and Jabber, Vidyo and the Logitech-owned LifeSize ClearSea.


OneNote vs. Evernote: A personal take on two great note-taking apps
With Microsoft's release of OneNote for the Mac and iOS , and its announcement that the Windows application is now free as well, the company has taken dead aim at the popular program Evernote. The two applications now both work on the same platforms (including mobile OSes such as Android, iOS and Windows Phone), sync your notes to your devices and include Web-based versions. But they also have some very distinct differences. So which is better?


Unleashing Creativity
The authors of this paper examined eight managerial competencies that have been recognized as promoting creativity and innovation, and measured whether supervisors’ success or failure at implementing these competencies corresponded to organizational outcomes. After providing their demographic information, employment history, and record of management training, a diverse group of 1,337 supervisors from 19 countries took an Internet-based test designed to gauge their abilities to elicit creativity.


The world's unlikely leader in mobile payments: Kenya
"The idea of mobile banking was born in Kenya," said Calestous Juma, the director of the science, technology, and globalization department at Harvard and a recognized authority on technology and development in Africa. "Africans did not invent mobile phones, but they invented a new way of using mobile phones, which is for money transfer." If Africans had waited to invent their own phones, Juma said, they wouldn't have been able to take advantage of this opportunity and create a new market.


Shortage of Project Managers Sends Businesses Scrambling
The problem isn't a lack of project management professionals overall, says Bashrum, but rather it's finding experienced, senior talent. Add to that the larger issues of shortsighted hiring practices, a lack of competency planning, and a reduced focus on training and development, and many companies' business objectives are at risk, according to the study. "Finding and retaining junior project managers is not so much the problem; it is really the mid-level and senior PMs who are so difficult to find," says Bashrum.


Why HR Pros will Turn to Video Conferencing in 2016
The survey also showed that video is becoming more pervasive for Human Resources teams across the globe. When asked to choose their preferred methods of business communication today, HR respondents ranked video conferencing as a top-three tool for communications, placing third (46 per cent) after email (88 per cent) and voice/conference calls (62 per cent). Other methods of business communications these HR executives said they use included Web conferencing, instant messaging and social media.


Offloading Work from Your Application with a Queue
You can always improve your application's response time by doing less. One way of doing less is to move tasks offline for processing later. "Later" in this case might mean "this evening" or even "five seconds later on another computer." The easiest way to do that is to have your application write the necessary information to a Microsoft Message Queue (MSMQ) and have another application read it and process the information. The queue can even be transactional; should you roll back the transaction, your MSMQ entries will also be backed out.



Quote for the day:

"Those who hate you don't win unless you hate them, and then you destroy yourself." -- Richard M. Nixon

March 20, 2014

A Retrospective on User Interface Development Technology
It seems so simple and so obvious, but a lot of work—and a lot of changes—have shaped how we interact with our devices since the dawn of the computer age. In this brief survey of UI history, we look back to when desktop computers became ubiquitous (early 1990s) and give a short retrospective on UI development technology all the way up to the modern era. To set the ground for novel, state-of-the-art UI API, we were eager to find out how the API for building UIs evolved and what it looks like today.


Measuring Architecture Sustainability
The measures for architecture sustainability we’ve described so far primarily refer to requirements, architecture design, and source code. Additional indirect measures for architecture sustainability include documentation quality and development process maturity. Another important factor is the development organization, after which a software architecture is often modeled. Organizational changes could compromise architecture sustainability if, for example, teams working on specific modules are restructured. However, these indirect and organizational measures for architecture sustainability are out of this article’s scope.


Ex-Microsoft employee arrested, accused of stealing Windows RT, product activation secrets
Email from Kibkalo's own Hotmail account was discovered in the blogger's inbox. Further digging, presumably on Microsoft instant chat service, found messages between Kibkalo and the blogger. "The sample code in Kibkalo's accounts was the same sample code that the Microsoft source received from the blogger, prompting Microsoft's investigation," Ramirez told the court. ... when he allegedly admitted that he "leaked confidential and proprietary Microsoft information, products and product-related information to the blogger," the charge sheet stated.


ERP contradictions in 2014: Smaller projects, more delays
The report states that "organizational issues" were the primary contributor to time overruns, with more than half of respondents spending between 0-25 percent of their budget on change management. While this explanation makes sense, it does not fully explain why less costly projects in 2013 took longer to run, and delivered lower benefit, than those in prior years. The research attributes lower project budgets to smaller companies implementing ERP:


Threat Landscape in the Middle East and Southwest Asia – Part 5: Socio-economic Factors and Regional Malware Infection Rates
This research revealed that there were correlations between 34 socio-economic factors and regional malware infection rates, among the 80 factors studied. A full list of these factors and the sources of data for each are available in the study. Figure 1 contains some samples of the factors and their correlation with regional malware infection rates (Computers Cleaned per Mille or CCM). Most of the factors identified were negatively correlated with CCM; as the indicator value rises, CCM will decrease. For example, as gross income per capita increases, CCM decreases. It is important to keep in mind that correlation does not mean causation.


Digital reality: When IT meets the business
"Enterprise IT departments face increasing pressure to emulate the success of consumer mobile applications as businesses become convinced this is the way to offer technology that is attractive to consumers, and business users demand mobile access to corporate IT and data via consumer devices, and expect these to be quickly developed and delivered." But given the wider social and commercial acceptance of mobile web, she says there is a growing feeling that this could be the right time to start offering apps as a way to help the business and reinvigorate the IT function.


Advanced Technologies Park: An ecosystem of tech innovation in southern Israel
For the Advanced Technologies Park (ATP) at Ben-Gurion University (BGU) of the Negev, located in the Israeli city of Beer-Sheva, the ultimate vision is as high as the desert sun. Inaugurated in September 2013, the park is the brainchild of former BGU president Prof. Avishay Braverman. "My dream that Ben-Gurion University will do for Beer-Sheva what Stanford University did for Silicon Valley begins," said Braverman in a message pre-recorded for the inauguration (PDF). Also present at the ceremony were Prime Minister Benjamin Netanyahu, current BGU president Rivka Carmi, and several Israeli government ministers.


Surfacing elephants and new ideas
When loud leaders and quiet leaders learn to moderate their natural tendencies while remaining true to who they are, modeling and setting expectations that others will do the same, the organization can enjoy a collective wisdom that was kept dormant. Can you imagine what might happen when that occurs? I can, and it’s a compelling vision of fully functional companies that actually listen and hear what’s being said. Creativity is no longer an issue. Collaboration rides on the coattails of this imagined company ripe with rich, deep listening and all voices being heard — with bottom-line results.


Leveraging Big Data Analytics to Reduce Healthcare Costs
The healthcare sector deals with large volumes of electronic data related to patient services. This article describes two novel applications that leverage big data to detect fraud, abuse, waste, and errors in health insurance claims, thus reducing recurrent losses and facilitating enhanced patient care. The results indicate that claim anomalies detected using these applications help private health insurance funds recover hidden cost overruns that aren't detectable using transaction processing systems. This article is part of a special issue on leveraging big data and business analytics.


Protecting your MSP practice against security risks
Besides the cost, MSPs and customers both suffer loss of customer confidence and uncertainty around what was compromised following a data breach. In healthcare in particular, the HIPAA omnibus final rule summary, which was released in September 2013, specifies enforcement of breach notification requirements that began in January 2014. "People in healthcare are going to be held accountable and they're going to get hit in the pocket. When you have these kinds of laws in place, it's our responsibility to help them understand the risk if you don't do it," Gomes said.



Quote for the day:

"Your big opportunity may be right where you are now." -- Napoleon Hill

March 19, 2014

Scrum Master Allocation: The Case for a Dedicated Scrum Master
Why cut back on scrum masters? Managers have limited headcount, and are looking for ways to stretch their budgets. Scrum masters are often not actually writing code. The functions of the scrum master are seen as supplementary, non-essential, and therefore fungible. Many organizations spread scrum masters across two, three, or even more teams. Teams are able to function without a full time scrum master, once they understand the basic agile process. The question is, what are those teams missing out on, that they could have had with a full time scrum master available to them?


Crafting cloud security controls amid a changing sphere of influence
End-to-end cloud protection is not linear in nature or execution; rather, it is globular, with overlapping segments of controls due to the elasticity of globalized business models, disruptive computing technology and a dynamic threat landscape. Regardless of the possible threat vector, tiered protection ideally will stop an attack, or at the minimum, alert an organization's security team of an incident. There is an acute need for such measures as the cloud continues to stretch the boundaries of enterprise networks, making them practically nonexistent in their traditional form.


Facebook holds back on end-to-end encryption
"If you use end-to-end encryption on email, you realize how hard it can be," Sullivan said during a talk with the press at Facebook's headquarters in Menlo Park, California. End-to-end encryption can be hard for people to use and understand because it typically requires a manual process of exchanging public keys between the sender and receiver whenever they send an email or any other type of message. If Facebook users want that type of security, there are some third-party apps they can use to add end-to-end encryption to Facebook's services, Sullivan said.


NoSQL and Log Data Jump to Forefront
Although application and operating system log files still exist, the growth of the Internet of Things is starting to emerge. Everything from heart monitors for running, to brake sensors in cars to refrigerators will provide information on what a device is doing and/or doing for you. Much of this sensor information is similar to those UNIX log files from my past life. Using multi-structured formats that often don’t fit well in a relational data store, the information from sensors in machinery, GPS mapping tools and even Fitbits comes in some interesting and constantly changing formats.


BI Best Practice: Delete Most of Your Reports
The CEO was actually close to being right. By the time we were finished, we were able to delete 700 reports from the repository. The executive team went down to about 50 reports in total. This process also taught me that most companies follow a very specific pattern. The business will face a strong challenge. Executives will panic and strongly react to the challenge in front of them. They will request reports to grapple with it from many different angles. It will take about six to 12 weeks to wrap their minds around it, address it, and either resolve it, or get it under relative control.


Real Excel power users know these 11 tricks
There are two kinds of Microsoft Excel users in the world: Those who make neat little tables, and those who amaze their colleagues with sophisticated charts, data analysis, and seemingly magical formula and macro tricks. You, obviously, are one of the latter—or are you? Check our list of 11 essential Excel skills to prove it—or discreetly pick up any you might have missed.


Japan holds first broad cybersecurity drill, frets over Olympics risks
Officials have acknowledged that even though Prime Minister Shinzo Abe has passed a strict official-secrets law, the government cannot adequately protect itself from malicious internet hackers. This is a worry for America as the two allies review their decades-old defense pact to respond to new threats, including state-backed hackers. The government has also vowed to safeguard Japan's cutting-edge technology from industrial espionage. Last week, Toshiba Corp sued SK Hynix Inc, saying a former employee passed key chip technology to the South Korean rival.


SQL Server 2014: NoSQL Speeds with Relational Capabilities
Currently queries, both ad hoc and stored procedure based, are only compiled to an intermediate language. From there they are interpreted rather than JIT-compiled into machine code. This allows for a large amount of flexibility, but at the cost of performance. In the past this was acceptable, as loads increased so did the CPU’s ability to handle serial workloads. But now that is no longer an option, Microsoft has decided to build a new execution engine that relies on fully compiled machine code.


Strong CIO/CMO alliance paves way for data-driven marketing strategy
Inevitably, however, integration is needed, because, first of all, the role of marketing is to convert to a sale, so [that data] is going to be moving over to a website or to our agent system at some point. But there are a myriad of other issues marketers run into -- data security, vendor management, availability management. So there's a tendency to either have the marketing department build something themselves or to have an external provider do it, and then it goes through a cycle where it reaches some kind of road block and they need to bring it into IT. That's the methodology we need to change so that marketing includes us at the beginning and we can provide better IT service.


The Bias Against Innovation
Creative thinkers, confronted with bias, are a challenge for companies, who want to innovate. Regardless of proven creativity, innovators do badly, if not given the right environment. Creatives, who broke new ground in Bill Bernbach’s innovative advertising agency, couldn’t replicate the successes at other agencies. Steve Jobs got fired by his own company Apple, and only got hired back after the company had been driven to near bankruptcy. For the most obvious example, there is Gallilei, who was publicly made to renounce his differencing ideas after having been thrown into prison.



Quote for the day:

“The growth and development of people is the highest calling of leadership.” -- Harvey S. Firestone

March 18, 2014

Your next corporate computer might be a Chromebook
What's still missing? Skype or Lync for creating conference calls, that's what. Yes, I know about Google's Hangouts but I really like Skype. I also like Lync. At some point, I expect the two to merge into a single service, because they're both Microsoft properties now. Seriously, Chrome OS needs something other than Hangouts for making calls and conference calls. There are a few Hangout-related apps but I still want Skype. I use Skype on other devices and I really need it on my Chromebook. Lync access would also work for a lot of businesses because they've standardized on it for internal chat and audio conferencing as well.


How Stephen Wolfram plans to reinvent data science & make wearables useful (interview)
It’s a little bit generalized relative to that in the following ways. When data comes in, we have some really good technology for finding what’s interesting in the data. You can generate endless charts and graphs and tables, and things about the data. We have good ways of figuring out what is likely to be the thing where you say, “Oh, that’s an interesting feature of my data,” both because you know a lot about the world and because we have good algorithms for just dealing with the actual raw data. First step is automatic data analysis.


HIDAche - An Exercise in Hardware/Software Integration
The goal of this article is to provide information, by means of a fairly simple example, about how we can make a USB device that communicates with the computer and how we can create cool applications that utilize that communication. As this article is not meant to be an in-depth look at USB I will only cover the basics. ... So to create HIDAche we first need to know what functionality we will need from a hardware perspective. Pretty simple. We need to know the packet format for a HID mouse and keyboard so we can imitate them, USB communication to get that information to the computer, and a way to store our prank settings.


Quantum rewrites the rules of computing
Classic computers use bits -- ones and zeroes -- for processing instructions, and they work based on a series of instructions. Ask the computer a question, and it will move through the calculation in a linear, orderly way. A quantum computer combines computing with quantum mechanics, one of the most mysterious and complex branches of physics. The field was created to explain physical phenomena, like the odd actions of subatomic particles, that classical physics fails to do. One of the rules of quantum mechanics is that a quantum system can be in more than one state at once. But that concept goes against what's known of the world. Something can be green or red but it cannot be green and red at the same time.


With a carrier agnostic-SIM, a carmaker could attach your car to whatever carrier to you happen to have relationship with and change your connection whenever you switched carriers. Or it could run a managed service with multiple carriers, connecting to whomever’s network had the best capacity or coverage wherever you happened to be driving, said van der Berg, who is now with the Organisation for Economic Co-operation and Development (OECD).


Big data: Why IT departments mustn't be a drag on analytics
"Some banks have tried to do analytics on enterprise data warehouses. The tons of analytics we do, if we dared do that, you might actually stall because of the computation power that you're pulling. So we're very careful about doing that," Grogan said. "When I say we maintain our own analytics infrastructure, I mean exactly that. We maintain a pure, cerebral infrastructure that is only used for analytics and analytical processes." But that processing independence doesn't preclude Grogan for being a strong advocate of spreading access to analytics via a secure, governed, self-service portal where staff can research economic and portfolio data.


How to Use Social Media to Improve Your IT Recruiting Strategy
To attract the top quality talent, businesses must engage candidates through venues like social media to sell them on the merits of the company and its mission, Berkowitz says. And one way to do that is by developing an effective social media hiring strategy. "The goal should be to both make potential applicants aware that you have jobs available and to also show what it's like to work for your company -- showcasing the company's personality and culture," Berkowitz says, but that involves more than just posting an endless stream of want ads.


Cyberspying Targets Energy Secrets
“You finally wake up one day and you’re sitting in a world where this is a serious threat to the industry as a whole.” Attacks can go unnoticed for years, or are never reported. As a result, estimates of stolen intellectual property vary “so widely as to be meaningless,” according to a 2011 report on foreign cyberspying by the U.S. Director of National Intelligence, which cited calculations of between $2 billion and $400 billion a year. Companies say they worry most about state-sponsored attacks, which tend to be “incredibly well organized, incredibly sophisticated,” according to BP’s Deasy. Some of the hackers are looking for proprietary data about oil fields, painstakingly gathered using costly seismic surveys, which underpins a business worth $3 trillion a year.


6 Business Opportunities Banks Can Tap In Using Analytics
Thirty percent of banking customers transact with more than one bank with 2.4% of churn expected among primary bank customers within one year, according to a study by IBM. Private sector banks fare slightly better in customer penetration due to a larger portfolio of account offerings and their ability to leverage process capabilities to unlock higher revenue opportunities. The study shows that 87% of customers have only one account with their primary bank and only 58% of their investments lie with them. This provides potential business opportunities for other banks to take advantage of the remaining 42% of customer investments with the help of analytics backed personalization.


Ambitious IT pros seek COO role
With technology now the cornerstone of most companies' operations, there is a growing cross-industry push to connect the oversight of IT with operations. In some cases, like at Learning Ally, the answer is a blended CIO/COO position. At other companies, the CIO is now reporting to the COO or to a hands-on CEO instead of the CFO, which had been the prevalent organizational structure in recent years due to the focus on cost cutting. ... "It used to be that IT was a support function, making sure people had phones and computers. Now IT is in charge of everything from e-commerce applications to mobility. Since those things are the business ... it makes sense to have more overlapping roles."



Quote for the day:

"The most rewarding things you do in life are often the ones that look like they cannot be done. " -- Arnold Palmer

March 17, 2014

New Programming Language Jeeves Allows Building Of Privacy Controls Into Apps
Jeeves makes it easier for a programmer to enforce privacy policies by making the runtime responsible for producing the appropriate outputs. The programmer implements information flow policies separately from the other functionality, and the runtime system becomes responsible for enforcing the policies. To allow for policy-agnostic programming, Jeeves asks the programmer to provide multiple views of sensitive values: a high-confidentiality value corresponding to the secret view and a low-confidentiality value corresponding to the public view.


The business transformation big bang battle zone
What is even harder about overcoming the transformation process that we need to undertake here is finding the borders between these silo-separated business departments themselves. We could call them vestigial business boundaries if you wish. These sometimes quite intangible divisions have little worth and not very much meaning. But what is most important of all is that we recognise these partitions as separations that were put in place before digitisation, automation and internetworked web-based connectivity.


Australia endorses US withdrawal from internet control
Turnbull said in a blog post that he had been discussing the move with the US Department of Commerce, and said that there were clear conditions that the transition must be to a multi-stakeholder model that does not replace the US government with another government or multi-government organisation like the ITU or the UN. Turnbull said the Australian government supports this approach. "The internet is the most remarkable invention of our times and while it had its origins in research contracts with the US government its growth, its dynamism, its resilience have all been the result of collaborative efforts by the wide internet community not government regulation or fiat," he said.


Gates sees software replacing people; Greenspan calls for more H-1Bs
"We cannot manage our very complex, highly sophisticated capital structure with what's coming out of our high schools," said Greenspan, former chairman of the Federal Reserve. The impact of automation on the labor market, whether it's for drivers, waiters or nurses, is progressing, said Gates. "It's the low income jobs that are really being eliminated by globalization," said Gates in a separate interview at The Atlantic. "Now the quality of automation, software artificial intelligence, is improving fast enough that you can start to worry about middle class jobs. But mostly it has not been information work or middle class jobs," he said.


Do you have “half dead” processes haunting your company?
The lifeblood of processes are the actors of it – whether it’s somebody who processes payroll or the guy who writes the computer code for a robot in a car factory. It’s your people who have the potential to truly bring your processes to life. So are your processes zombies, executing brainless tasks, or are they living and making this a place better to live and work for all of us? Don’t worry; I won’t be going into any new age stuff or founding a new BPM religion. But here are a few thoughts on how to evaluate how alive your processes are. To see whether the processes are alive, we need to break them apart into their main components and see how they’re doing.


Design Patterns for Data Persistence: Unit-of-Work Pattern And Repository Pattern
Microsoft really likes the Unit-of-Work Pattern, so most every sample you see coming out of their shops will include this pattern. The general theory is you have a reference to a stateful link to your data store — a Data Context — that will queue up your queries and then execute all the steps at once within a transaction. They’ll either all succeed or they’ll all fail. For example you’re placing an order in an Order Entry system. You may insert or update the Customer record, insert an Order header, insert one or more Order detail lines, perhaps update the product’s available count.


Key Questions to Ask during Master Data Consolidation
Typical master data consolidation starts with combining the operational master records from all the data silos where they exist. The key aspect being, creation of master data indexes to support single view; knowing and asking right questions during this phase can save lot of time and rework. In an earlier post on this blog, I examined the ways in which we can identify the right sources of Master Data. Once these data sources are identified, next step is to select the right data elements from them, which confront to the definition of master data.


Object-orientation in C — Part 3
For non-trivial class hierarchies the method proposed in Part2 is probably not optimal. The main reason is that there is only one C struct which is used by base and subclasses. Consequently, the hierarchical tree is only implicitlycontained in the data structures and therefor, in this last part of the series, we introduce a more explicit technique that closely resembles “C++ in C”. Let us start with main() just to show where we’re heading for. The UML diagram of the code can be found in Part2 except that we have changed ‘id’ to ‘label’.


Making The Most of Cultural Differences in Transformation Projects
There is one thing, though, that many transformation efforts I’ve been associated with tend to overlook: cultural differences. It might be ok – just possibly – to ignore this subject if you are working for a single-country organisation such as a government or public sector body or a small business. But in the main, transformation programmes have an international dimension, sometimes to a significant degree. Getting culture right is critical. And people from other cultures and countries are just so…strange. This can be infuriating – see this recent piece on the HBR blog – but it can also be a great boost to your change initiative and its operational success – as explained in a recent Economist Intelligence Unit report.


How will Cisco-Sourcefire security combo affect Cisco product roadmap?
In this interview at the 2014 RSA Conference, Roesch discusses the challenges of bringing the two companies' perimeter firewall, next-generation firewall and IPS technologies together, as well as his hopes for a centralized management product. He also explains the ways in which Sourcefire's unique technology might be applied to Cisco's broad base of existing network security customers. Finally Roesch discusses Cisco's new OpenAppID open source Snort plugin for application control, and what's ahead for Snort and Cisco's open source security product portfolio.



Quote for the day:

"Those who know how to win are much more numerous than those who know how to make proper use of their victories" -- Polybius

March 16, 2014

What the C-Suite Needs to Prepare for in the Era of BYO Technology
The convergence of this next era of computing – we call it Open Platform 3.0™ – is creating a Balkanization of the traditional IT department. IT is no longer the control center for technology resources. As we’ve been witnessing over the past few years and as industry pundits have been prognosticating, IT is changing to become more of a service-based command central than a control center from which IT decisions are made. These changes are happening within enterprises everywhere.


Why shouldn't I test private methods?
If you’re trying to test private methods, you’re doing something wrong. You can’t get to TDD nirvana from here, you’re gonna have to go back. It all started with an innocuous little class with an innocuous little method. It did one little job, had a nice little unit test to verify it did its thing correctly. All was right with the world. Then, I had to add an extra little piece of logic. I wrote a test for it, changed the class until the test passed. Happy place. Then I started refactoring. I realised my little method, with its handful of test cases was getting quite complicated, so I used the extract method refactoring and boom! I have a private method.


10 Programming Languages You Should Learn in 2014
Coding skills are in high demand, with programming jobs paying significantly more than the average position. Even beyond the tech world, an understanding of at least one programming language makes an impressive addition to any resumé. The in-vogue languages vary by employment sector. Financial and enterprise systems need to perform complicated functions and remain highly organized, requiring languages like Java and C#. Media- and design-related webpages and software will require dynamic, versatile and functional languages with minimal code, such as Ruby, PHP, JavaScript and Objective-C.


IT Governance - Implementation Obstacles
A recent empirical study by Lee uncovered factors such as ‘lack of IT principles and policies’, ‘lack of clear IT Governance processes’, ‘lack of communication’, and ‘inadequate stakeholder involvement’, as inhibitors of IT Governance implementation success. A good understanding on the barriers or obstacles that hinder the success of IT Governance implementation is important as once understood, their effect is understood and pre-emptive actions can be taken to address them. Implementing IT Governance is a long and continuous journey, where obstacles and challenges are aplenty.


The Impact of Information Governance Trends on E-Discovery Practices in 2014
While information governance (IG) may be a gigantic, broad category, GCs and CIOs were hit with a startling realization: For their organizations to significantly reduce e-discovery costs they must proactively manage electronic information at an enterprise level. This starts with information governance. In this interview, David speaks about his recent emphasis on information governance and its effects on the field of e-discovery.


NIST Guide Aims to Ease Access Control
The flexibility of the ABAC model allows the greatest breadth of subjects to access the greatest breadth of objects without specifying individual relationships between each subject and each object, according to the NIST guidance. "Access decisions can change between requests by simply changing attribute values, without the need to change the subject/object relationships defining underlying rule sets," says NIST Computer Scientist Vincent Hu, who co-wrote the guidance. "This provides a more dynamic access control management capability and limits long-term maintenance requirements of object protections."


Seven benefits of cloud from an enterprise architect point of view
Additional breakthroughs in horizontal and vertical markets as well as the birth of new ecosystems and development platforms provide the construct behind a continuum of opportunity for businesses to benefit from cloud providers’ enhancements to technology offerings. To truly appreciate and take advantage of the impact and benefits of cloud computing, I believe that you must also understand that cloud is primarily an extension of IT and your business. Even though this may be a tall order, I will take this opportunity to introduce you to the benefits of cloud from an enterprise architect perspective and show how it relates to your business.


The PaaS shakeup and what it means for OpenStack
The new OpenStack Havana release sends strong signals to the industry that Platform-as-a-Service (PaaS) vendors may suddenly have “irrelevant” stamped on their backs. No matter how elaborate or venerable your existing business may be, proving your value inside the rapidly expanding OpenStack ecosystem is no easy task. This time it is the established PaaS vendors like Cloud Foundry and OpenShift who are feeling the heat. A fun guessing game is naming the established players who are next in the stack to get crushed.


Climbing the ladder from EITA to EA
While the entire team should work on this, only a few will succeed. Good news: That’s all you need. However, it’s important that everyone makes the attempt to climb the ladder. As a manager, I have no magic “test” to determine, for certain, which member of the team will make the transition and which won’t. I once thought I did, but reality proved me wrong. So everyone makes the attempt. Those who remain EITA’s can continue in that role for the EA team, or they can transfer to a different group where their technical skills are valuable and needed. So, how is this done? How does an individual EITA climb the ladder?


Collaboration in the Cloud: The Continuity Advantage
Cloud-based collaboration services come with redundancy built into all levels of service delivery from network connectivity and power to all the hardware within the cloud facility and the application itself. Providers rely on redundant facilities so if one facility suffers a site-wide outage, delivery can be handed off to another facility to minimize downtime. The most stable cloud-based collaboration solutions employ multiple layers of physical and logical security to protect data integrity. Ultimately, the aim is to ensure that not only do users have consistent and reliable access to the tools they need to do business but the information they exchange is secure.



Quote for the day:

"Whenever you find yourself on the side of the majority, it's time to pause and reflect." -- Mark Twain