May 15, 2014

RHEL 7 and Fedora 19 updates for simpler configuration and management
The firewalld daemon introduces a level of abstraction that makes setting up a Linux firewall simpler and more intuitive. Instead of writing firewall rules as iptables, firewalld uses firewall-config [graphical user interface] or firewall-cmd [command-line interface] to set up a firewall.  D-bus is an interprocess communication system -- also called a message bus system -- that allows applications and processes to communicate and request services over a bus. The d-bus service, which runs dbus-daemon, notifies processes of events, [such as] when a new device is added or when a user logs in.


Microsoft continues RC4 encryption phase-out plan with .NET security updates
"The use of RC4 in TLS could allow an attacker to perform man-in-the-middle attacks and recover plaintext from encrypted sessions," Microsoft said in " a security advisory Tuesday. "A man-in-the-middle attack occurs when an attacker reroutes communication between two users through the attacker's computer without the knowledge of the two communicating users. Each user in the communication unknowingly sends traffic to and receives traffic from the attacker, all the while thinking they are communicating only with the intended user." While blocking RC4 is recommended, the company said that customers should plan and test the new settings prior to making this change in their environments.


Hybrid IT services in the cloud age: What CISOs should do now
With the convergence of symptoms and causes and independent of the intermingling of in-house and cloud resources, it is clear that triage is triage and initial problem identification is common across domains. To have consistent and robust security in a hybrid IT service environment, problems with externally sourced services have to be treated like problems with internally sourced ones during triage and identification. Ideally, then, there will be a converged operations staff with one team doing all initial diagnosis (and limited resolution) during the most mercurial phase of event response. The triage team will have broad, basic skills across all three domains: networks, applications and security.


How to Use OpenStack in Your Small Business
While all cloud services offer a service level agreement (SLA), it tends to be the same for all customers. In some instances, it's inadequate. In contrast, an abundance of OpenStack service providers theoretically makes it easier to find a suitable provider that offers adequate response time or predictability. A quick look at various cloud outages makes it clear that businesses can't control when they take place — and often remain in the dark as to the severity and exact status of restoration work. The final OpenStack advantage may be most intractable of all: Data privacy. Depending on the services offered, or the type of organization, certain data may be prohibited by law to be stored in public cloud infrastructure.


CloudBolt Software administers your IT, no matter where it runs
“We take an agnostic approach to customers’ IT infrastructure,” Justin Nemmers, CloudBolt’s EVP of marketing, said in an interview. The product works via connectors with popular configuration management tools including Puppet (see disclosure) and Chef, as well as management products from Hewlett Packard (HP Server Automation and Operations Orchestration) and VMware ( VMware vCenter Orchestrator.). The company, which is based in Rockville, Maryland and has a development office in Portland, Oregon, has 11 employees — several of whom come from Red Hat and Hewlett-Packard via Loudcloud/Opsware.


Female Directors and Their Impact on Strategic Change
The findings are consistent with the theory that to have a genuine influence in the business world, women must be granted real power, and simply appointing female directors when times are bad and choices are limited might not matter if they don’t have the capacity to induce change. When companies flounder, demographic differences might stand out most and simple disagreements might become exacerbated. On the other hand, the benefits of a fresh perspective can be more easily applied when firms are doing well and facing few threats.  Furthermore, the role of female directors may help explain why one company gains clear benefits from its gender-diverse boardroom while another treads water, depending on its performance record.


Reining in out-of-control security alerts
Software or appliances that fall under the product category of security information and event management (SIEM) generate most of the alerts triggered by anomalies detected in hardware and software on the corporate network. To contend with the alert flood, enterprises have the option of moving to a different model for detecting malware or learning to make better use of the SIEM systems they have, experts said Wednesday. Matthew Neeley, director of strategy initiatives for consulting firm SecureState, advises companies to do the latter to avoid the expense of ripping and replacing technology.


Hadoop security: Hortonworks buys XA Secure – and plans to turn it open source
The Hadoop software and services firm has acquired XA Secure, founded in January 2013, for an undisclosed sum and will open-source the Fremont CA-based company's Hadoop security layer, which offers role-based authorisation, auditing and governance. Hortonworks said the acquisition provides it with key technology and engineering expertise to deliver a single way to administer security across all Hadoop workloads. Ever since the introduction of the YARN resource-management tier last October, which allows multiple workloads to run on the Hadoop distributed big data platform, there has been an increased need for central security, according to Hortonworks VP product management Tim Hall.


An Internet of Things prediction for 2025 -- with caveats
Bob Briscoe, chief researcher in networking and infrastructure for British Telecom believed industrial and health IoT applications, not consumer ones, are the most likely to take off. "The most likely areas where the IoT will be realized will be in supply chain logistics and automating workforce administration -- i.e., dispensing healthcare, logging materials used in fitting and service of goods, vehicles, etc., as well as the administration of cleaning, catering, and hospitality tasks. Industrial and commercial applications are much more likely to have taken hold than these attention-grabbing consumer widgets, which have only superficial economic effect," wrote Briscoe.


Agile Research
Both academic research and the software development produce information-focused artifacts – either the logics captured in the computer code or the knowledge captured in the research publications, so similar principles may be applied to both endeavors. In this article, we have applied the Agile Principles to the field of the academic research, generating the first draft of the “Agile Research” principles; we have also presented practical guidelines for the application of these principles to the Grounded Theory qualitative research methodology, utilizing tools that are similar to those that are used in Agile.



Quote for the day:

"An idealist is a person who helps other people to be prosperous" -- Henry Ford

May 14, 2014

MySQL Backup Solution for C#, VB.NET, ASP.NET
The most common way to backup a MySQL Database is by using MySqlDump.exe and MySQL Workbench. MySQL Workbench is good for developers, but, when comes to client or end-user, the recommended way is to get every parameter preset and all they need to know is press the big button "Backup" and everything is done. UsingMySQL Workbench as a backup tool is not a suitable solution for client or end-user. On the other hand, MySqlDump.exe cannot be used for Web applications. As most web hosting providers forbid that, MySqlBackup.NET will be helpful in building a web-based (ASP.NET/Web-Services) backup tool.


What is holding Berlin back from becoming a European centre for startups?
“Germany is renowned for its bureaucracy and process,” says Kevin McDonagh, CEO of the Android consultancy startup Novoda. “The first few months were very difficult to get anything done. Doing it in a foreign language with foreign laws is difficult.” McDonagh, who launched his business in the UK and now has an office in Berlin and New York, says changing simple details on business bank accounts in Germany is difficult enough, with banks wanting specific documents to bring into branch in order to set up a further meeting. “This is a barrier for a company,” he says. He also says companies need a large amount of capital to set up company bank accounts, which is unfeasible for most startups.


Infonomics treats data as a business asset
While few companies are recording data as an asset on their balance sheets, the marketplace does put a premium on "information-centric" companies, according to Laney. As defined by Laney, these are companies that have invested in their data by hiring data scientists or a chief data officer, or by building a data science organization or a data governance function. Companies that meet these criteria, including Netflix, GlaxoSmithKline, Nokia, Apple, American Express and Ford, enjoy a market value to tangible asset or book ratio that's two to three times higher than the norm. "I'm not going to say there's a causal relationship, but it certainly is an interesting correlation," Laney said.


Pro tip: Send faxes with your Android device
Thanks to a free app called FaxFile, you can now send either PDF or doc/docx files to any fax number in the US or Canada (and some international numbers). With FaxFile, you can fax to contact numbers or enter a fax phone number. There isn't a monthly subscription cost, but each fax will cost you fax credits (which are bought through an in-app purchase within the Google Play Store). Fifty credits is $2.49, and each fax to US and Canada costs 10 credits. That's pretty easy math and well worth the cost, considering how easy faxing becomes while on-the-go.


Are Your Partners Protecting Your Data?
For the highest-risk relationships, consider deploying security staff to the business partner’s site and comprehensively assessing and verifying their exposed areas of concern. Think hosted application vendors and cloud computing vendors with data centers in multiple states or countries. An onsite assessment should include staff interviews, physical inspection of the facilities and document reviews as well as technical vulnerability testing. This approach provides much greater assurance of contract, policy and regulatory compliance and gives insight into how data is actually being protected. Interviews should be based on the business associates’ response to the questionnaire. The interviews’ purpose is to validate the responses provided on the questionnaire and spot-checking specific controls.


Why Employers Must Learn That Creativity Is Not Just For the Young
There is enough research to indicate that there are several factors that make a worker more likely to be creative. Along these lines, the “Componential Theory of Creativity”, originated by Teresa Amabile of the Harvard Business School, proposes that there are four factors necessary for a creative worker regardless of age: 1) intrinsic motivation 2) expertise in his/her area 3) skill at creative thinking and 4) employment in an environment that supports creativity.  An older worker likely has the first two factors necessary for creativity. Older employees are likely to be internally motivated to take pride in their work, and because of their maturity, more likely to be highly experienced in their field.


Microsoft: We're serious this time; XP's dead to us
"With today's Update Tuesday, if you are still on Windows XP you will not receive any security or non-security updates through Windows Update or Microsoft Update," said Microsoft spokesman Brandon LeBlanc on a company blog. "Because support has ended for Windows XP, we are no longer releasing updates to the general public for Windows XP going forward." LeBlanc's missive was little more than a reminder that Microsoft has absolutely, positively, no-ifs-ands-or-buts retired Windows XP. The firm has been pounding the XP-is-dead drum for years at varying beats. Microsoft served XP with its last Patch Tuesday collection on April 8, making today's set the first sans security updates for the 13-year-old operating system.


Internet of things weakest link: Residential broadband
Even cable providers such as Comcast XFINITY and Cablevision's Optimum Online that used to separate modem, VOIP and router functionality into two or more separate devices installed on premises are going the integrated residential gateway route.  Not all residential broadband problems can be attributed to malfunctioning residential gateways. Sometimes the local fiber node for the neighborhood goes down, sometimes you have network issues. Sometimes "acts of God" knock out coax or fiber cables. Unpredictable, widespread outages happen.


How to Execute External Uncompiled C# Code
From time to time, I have had need to extend a program I wrote by having it execute a script, but wanted the script to use data from within the application, logging, etc. This approach allows me to use the power of C#. In production code, I would use checksums on the C# code files to make sure only authorized scripts could be compiled and run. ... Obviously, the code you want to execute hast be as compilable as the code you would have in your project.


IT sourcing strategy guide for enterprise CIOs
There are several queries CIOs must consider in crafting an appropriate IT sourcing strategy for the enterprise. What are your primary objectives for outsourcing? Do you wish to contract with foreign and/or domestic providers? What services do you require to relieve stretched-thin IT departments? In this CIO Briefing, learn how to create an IT sourcing strategy that fits your organization, and get advice from CIOs who have been there, done that. This Essential Guide on IT sourcing strategy in the enterprise is part of the CIO Briefings series, which is designed to give IT leaders strategic management and decision-making advice on timely topics.



Quote for the day:

"Meetings are a symptom of bad organization. The fewer meetings the better." -- Peter F. Drucker

May 13, 2014

What are the best practices for data center cleaning?
The real key to keeping a data center clean: Control what comes in from outside. Never unpack or uncrate equipment -- and certainly don't store cartons -- inside the data center. You should have a place outside, preferably with a negative pressure environment, where you can unpack and clean all hardware before it comes inside. Create a "clean zone" outside your data center, such as a vestibule or corridor that is not regularly trafficked and is cleaned daily. When mechanics or electricians work inside the data center, insist that they wear clean clothing or clean cover-ups. Anything needed from the outside should be brought from the warehouse, unpacked, and handed off at the door.


The core components of the new generation of records management/information governance tools
When implementing such EDRM systems the records managers drew a 'line in the sand'. They aimed to implement a system that would manage records going forward in time. They did not attempt to deal with legacy content that had already accumulated on shared drives and in email. The weakness of EDRM systems was that end users did not move all or most significant content into the records system. Shared drives and e-mails continued to grow and continued to contain important content not captured into the records system.


As Patch Tuesday looms, Microsoft gives Windows 8.1 users a reprieve
On Monday -- and just a day before its May Patch Tuesday slate of security fixes -- Microsoft said consumers have four more weeks to move from Windows 8.1 to Windows 8.1 Update before their devices would be barred from receiving further patches. The deadline change was the third in the past month, following an earlier Windows 8.1 Update extension for business users and a surprise update on May 1 for Windows XP after Microsoft had officially retired the aged OS. "We've decided to extend the requirement for our consumer customers to update their devices to the Windows 8.1 Update in order to receive security updates another 30 days to June 10," said Microsoft spokesman Brandon LeBlanc in a Monday blog.


HP pivots, says open sourcing SDNs is right
What’s interesting is that just last fall, HP dismissed open sourcing SDNs, and OpenDaylight. Ex-HPer Mike Banic had said when he was vice president of global marketing for HP Networking that open sourcing SDNs was “wrong” because it means passing the burden and investment of ensuring enterprise-class functionality, reliability and performance onto the customer. And Bethany Mayer, formerly senior vice president and general manager of HP Networking (who has transitioned to a new role at the company), said at that time she didn’t know why customers would use an OpenDaylight controller. “Using an open source controller in the enterprise can be tricky and dangerous,” Mayer said at last fall’s Interop New York conference.


RecruitiFi uses gamification to enhance the recruiting process
"It's like going fishing, eating one, and throwing the bucket of fish -- half a dozen -- away every time," he said. With RecruitiFi, the idea is that a recruiter could submit up to four of those candidates to an employer looking to fill a relevant position. For employers, McCagg said it's a better option than a job board, for example, because they can chose to work with recruiters based on location, expertise, or what level they focus on - the candidates are more likely to be on target for the job. "It's like yelling out across a city like New York, 'Hey I'm looking for this exact person,' but the only people that hear you are relevant recruiters," McCagg said.


NSA backdoors US hardware headed overseas: Greenwald
Greenwald wrote that the NSA puts backdoors onto devices and repackages them with a factory seal before sending the hardware onto its original destination. "A June 2010 report from the head of the NSA's Access and Target Development department is shockingly explicit," Greenwald said. "The NSA routinely receives — or intercepts — routers, servers and other computer network devices being exported from the US before they are delivered to the international customers." He said that part of the reason for the US banning Chinese hardware was to prevent the replacement of NSA-backdoored hardware. "Chinese routers and servers represent not only economic competition but also surveillance competition."


Cloud security policy exceptions thwart rogue usage controls
"Enterprises are blind to cloud usage," said Netskope CEO Sanjay Beri. "People will go off and work in silos, not because they're bad or malicious, but because swiping a credit card is easier than waiting three months to get everyone on the same page. … They don't even necessarily understand the risk, and the number of apps flying under the radar is growing." Beri said the cloud app sprawl plaguing large organizations is largely the result of a lack of coordination among different business units. He said the report shows that many of the apps present in enterprise environments are redundant, with marketing and human resources apps the most frequent culprits.


USB SuperSpeed will relegate Thunderbolt to a niche
Both USB SuperSpeed and Thunderbolt have recently undergone version upgrades - USB moved to v3.1 (SuperSpeed+) and Thunderbolt to v2. And both upgrades double the maximum throughput speed -- USB 3.1 to 10Gbps and Thunderbolt 2 to 20Gbps. But, the USB SuperSpeed specification has a lot of elasticity built into it. "This tech will scale well beyond 10Gbps," said Rahman Ismail, a USB 3.0 senior architect at Intel. "We believe we already have a protocol that will scale well past 40Gbps." Other than speed, Thunderbolt 2 has another advantage over USB 3.1 - 10 watts of power compared with USB SuperSpeed's 4.5 watts.


Want to Solve Problems More Efficiently? Do This.
Programmers always see the big picture and have to think abstractly. In an interview, Gates said that the most difficult thing about programming was “[simulating] in your mind how the program is going to work” and “[having] a complete grasp of how the various pieces of the program work together.” In a way, you need to think as a computer. Identify the input (requirements) and the output (problem). Then find a way to compute (connect) the two. This computation is broken down even further into smaller iterations, getting you closer to the output. As programmers do, you can break down projects into smaller, digestible chunks. Even if you’re not dealing with thousands of lines of code, compartmentalizing the process makes it easier to manage.


How Functional is Java 8?
Whether a language is functional or not is not a binary condition - instead, languages exist on a spectrum. At the extreme end are languages that basically enforce functional programming, often by prohibiting mutable data structures. Clojure is one example of a language that does not permit mutable data in the accepted sense. However, there are other languages in which it is common to write programs in a functional style, despite the language not enforcing this. An example would be Scala, which is a blend of object-oriented and functional languages. It permits functions as values, such as:



Quote for the day:

"The business schools reward difficult complex behavior more than simple behavior, but simple behavior is more effective." -- Warren Buffett

May 12, 2014

Thoughts from SFD5 – Using Flash DIMMs for Server-Side Storage
Loading up servers with RAM and letting workloads chew up large quantities for a RAM-cache feels very legacy. Unless you’re working with an application that just absolutely must entertain near-zero latency for all transactions, there’s usually little need to load all of the working set into memory, right? We’re talking niche stuff, indeed. Thus, I would imagine that databases and highly transactional workloads would be the initial target, with more mainstream folks who just want to “cram a bunch of VMs on a server” following after the price point is a little less insane. After all, the idea of having ESXi hosts that are CPU bound as a general rule sounds cool to me; we’re almost always RAM bound in today’s world.


5 Business Benefits of Open Source Software
Built on the principles of openness, collaboration and technology contribution that define the open source development model, Red Hat came to the realization that there is a massive economic benefit as customers are more fully able to take advantage of modernizing an infrastructure around open source. "We always say we want millions of users and hundreds of thousands of customers. If you can adapt to that model where it is not monetized 100%, there are massive opportunities out there with customers that need a partnership. It's a win-win model," says Stevens.


Unplug ghost servers, save a bundle
When business units add new applications, IT operations will buy and install servers to meet the need based on capacity projections. With time, application use may migrate or diminish, leaving the servers behind, said Killian. A business unit might trigger the expansion, but it takes "a real push from IT operations to force the issue" once hardware has outlived its usefulness or is under-utilized, said Killian. "We're at the point where you are essentially monopolizing valuable data center space and raised floor space and power," he said. Killian said decommissioning can be a lengthy process involving both IT and the business interests, which may be focused on developing new products -- not on getting rid of old equipment.


Algorithmic culture. “Culture now has two audiences: people and machines”
Technology and culture can “shape” or “influence” each another if and only if one proceeds from the assumption that they are separable, conceptually or semantically. For most of the past two centuries this has effectively been the case, but it is has not always been so. Until about 1800, the word “culture” in English referred to husbandry—that is, to techniques for tending crops and domesticated animals, including selective breeding. Sometimes it was used interchangeably with the world “coulter,” which is a part of a plough. Technology and culture used to be very closely aligned, so much so that it was difficult to imagine the one apart from the other.


Running IT as Business
Let revenue generation/increase become the focus vs. cost savings/ optimization. That's not to say ignore the cost completely. Basically, start showing small wins in helping revenue increase and IT will get opportunities to transform from mere enabler to accelerator of business. From culture perspective, IT needs to break out of the service provider mindset and see itself as a center of value creation, not just service provision. If you don't have that mind-set, how can you expect the rest of the business to think differently. if you want to add value, you must be part of the business, understand it, help set its strategy, and innovate its products and processes, not just be an order-taker.


Principle #1 of Capacity Planning: The Team as a Resource Unit
Unfortunately, most portfolio managers are ill-equipped to reap the benefits of their Agile delivery groups. The thinking must evolve from, “Which roles do I select for the virtual team I will assign to a project, and when do those roles free up to work on the next project?” to, “Which teams are the best fit to work on strategic initiatives, and how do I balance my teams to be more innovative while sustaining current applications and products in the market?” We’ve known for a while now that stable teams perform better; dismantling and re-forming teams for specific projects takes a toll on both quality and productivity.


Glue Networks brings orchestration to Cisco SDN WAN
"Our largest apprehension was around performance of Internet-based services coming into the office against hig-speed going out," explained Taylor. "A couple of T-1 lines weren't going to cut it." There was also concern about connections between branch offices since at times communication is heavier between two remote sites -- for example, Phoenix and Southern California -- than between a branch and the St. Louis headquarters, Taylor said. Glue offers dynamic WAN provisioning to solve that problem. WWT had an MPLS network to connect its international sites, but opted for more flexible and less-expensive broadband Internet-based VPN links within domestic regions.


Controller-less WLAN solution helps Swansea pick Aerohive for schools
The overall manageability of the new WLAN was a critical factor in Swansea council’s decision, said senior ICT programme delivery manager Ricky Holdsworth. “We provide a managed service for schools in Swansea,” he said, “and they buy in through SLAs [service-level agreements] with the local authority. So, as part of that, it was even more critical that we had manageability because ultimately it is us supporting it; it’s not delegated out to schools.” For this reason, Aerohive’s HiveManager platform and controller-less APs came up trumps in the procurement process, said Holdsworth.


CIO Discovers the 'Terrifying' Reality of Cloud Apps Running Wild
Rogue cloud services have ripped open gaping holes in the security fabric of a company, putting both the firm at grave risk and the CIO in a tough spot. However, rogue cloud services also show the critical need for a tech-savvy consultant -- or cloud services broker-- to patch holes, maintain compliance, negotiate cloud contracts and enforce service level agreements, since many cloud service providers deliver shoddy service, reports Research in Action. Faced with a massive amount of rogue cloud services, Keithley's first instinct was to block them -- but that would solve nothing. After all, IT's history of blocking unfamiliar technology most likely spawned these rogue cloud services in the first place.


Chocolatey brings Linux-style package management to Windows
The many options for Windows package or software management can be confusing. NuGet is a package management system for developers -- that is, it handles packages and references for projects, thus allowing the developer to concentrate on code. While NuGet handles packages, Chocolatey handles applications at a system level. So, you would use Chocolatey to install an application such as Puppet on your development machine. It appears Chocolatey is becoming the de facto standard for Windows package and dependency management, but it still is not a standard Windows component.



Quote for the day:

"To succeed in business it is necessary to make others see things as you see them." -- Aristotle Onassis

May 11, 2014

Are CIOs Losing Control Over IT?
We call this phenomenon IT without boundaries, and it’s creating a real tension in organizations between IT and business leaders. We recently surveyed 1,000+ C-level executives, business unit and IT leaders globally to explore changing perceptions on IT spending. Our IT Without Boundaries research shows how significant this tension is. Thirty-seven percent of technology spending is now happening outside of the CIO organization. And 79 percent of C-level executives believe they can make better and faster decisions without the involvement of IT.


Wearable Technology: The Coming Revolution in Healthcare
To successfully employ wearable health technologies, the industry must find a way to develop networks that allow information access and provide support on the back end. This is already being done on a small scale: think about users of Fitbit ® and similar health and wellness tracking gear who view their personal data and compare it against data from other users. Having a network or backbone that a much broader population base can seamlessly connect to will fuel more meaningful data comparisons and analysis and distill useful information.


Top five external hard drives: Backup is like insurance
Backup to digital storage is like insurance to driving, you need it even though you hope that you'll never have to resort to it. Unfortunately, backing up is not required by law and I've seen a lot of accidents when folks lose their precious data. You can buy a new car but you just can't buy back your lost memories, no matter how much money you have. In short, I just can't stress enough how important backing up is. The good news is it's very easy, and cheap, to have a backup drive for your computer. Following is the top five external hard drive that I've reviewed recently that will make excellent home backup solutions.


Internet of Things will stump IT until cloud, big data come aboard, EMC says
"If I designed something to be perfect for the federation, where everybody contributes, it would be the Internet of Things," Tucci said. IoT calls for enterprises to collect far more data from many more devices and keep it all in EMC storage, such as the Elastic Cloud Storage Appliance the company announced on Monday. Pivotal's big-data platforms can quickly ingest and analyze that data for the enterprise to act on. In the middle of that can be data-center and cloud infrastructure based on VMware's virtual computing and networking technology, Tucci said.


This Shirt Is (Really) Sensitive
OMsignal’s shirts are compression garments—already popular among some athletes and patients recovering from certain surgeries to help improve circulation—which Marceau says is helpful because it keeps the electrodes that are embedded in the fabric close to the skin. While the shirts are primarily aimed at athletes, the Montreal-based company envisions them being used for monitoring medical conditions and, potentially, in everyday life. For instance, your shirt might eventually be able to automatically adjust your Internet-connected thermostat based on your vital signs.


Integrated PaaS/IaaS Technology Complements Your Enterprise Cloud Strategy
While IaaS is growing quickly, for an enterprise looking to provide its architects and developers with control of their development environment and the ability to build and deploy applications rapidly, Platform-as-a-Service goes a step further. PaaS provides self-management for DevOps and developers, providing the ability to build scalable, load balanced and highly available application environments without worrying about app server configuration, load balancers or tools. PaaS, however, has not grown as quickly as IaaS even though some might argue that PaaS is a key technology for enterprises looking to become more agile and utilize the cloud.


The Emerging Cybersecurity Software Architecture
While the concept of software architecture is somewhat new in the cybersecurity world, we’ve seen this movie before within the broader IT spectrum. In the 1990s departmental applications were supplanted by ERP systems. This introduced an architecture for data exchange, transactional systems, and business intelligence that had a profound impact on business processes. The infosec software architecture train has already left the station. Large enterprises will replace individual piece parts over the next few years and phase in an enterprise security architecture in the process.


Don’t Create A Data Governance Hairball
While the integration hairball and application sprawl have been with us for years, there is a new and growing threat, the data governance hairball. IT staffers, and data management professionals in particular, have long been pushing for data governance programs, but all of a sudden top-level business executives are very interested. Maybe because of regulatory pressures, or maybe because of data security or privacy concerns, or maybe because of clear opportunities to grow revenue by leveraging and consolidating data assets. Regardless of the reason, there is a growing wave of demand for data governance.


Ten Key Take-Aways From the White House Big Data Report
On Thursday, the White House Big Data Working Group, led by senior presidential advisor John Podesta, released a 79-page report that outlines a number of key observations and recommendations for privacy in both the private sector and government. Although the report does not create binding law, it provides insight into the administration’s priorities on a wide range of privacy and data security issues, from government surveillance to data breaches. Below are some of the most important themes to emerge from this report.


SOA vs. APIs to deliver IT services: Is there a difference, and does it matter?
While fundamentally and technically similar, the open nature of APIs is intriguing, precisely since IT relinquishes some control over how its services are used. It would be foolhardy to suggest every company release open APIs to all comers, but creating a suite of basic APIs internal to your company frees developers and savvy business users to concoct new and interesting applications using IT assets you already own. In some ways, this is an evolved and formalized version of what end users have been doing for years, dumping data from enterprise applications into spreadsheet "applications" that perform some niche function.


Three Metrics of Disruptive Innovation
Disruptive innovation, on the other hand, is much more difficult for the corporate machinery. Here, new product categories are created, new markets are addressed and new value chains are established. There is no known baseline to refer to. Disruption implies that someone is losing -- being disrupted. So clearly you won’t find a product roadmap for it in the company catalog. And it’s not even necessarily solving the problems of the current customer base. This is an area where, with the right passion, permissions and charter, a specialized innovation team can take a lead role and create significant growth for the company.



Quote for the day:

"How things look on the outside of us depends on how things are on the inside of us." -- Parks Cousins

May 10, 2014

SPL Tumbling Windows Explained
SPL supports the concept of windows, the ability to perform some processing on a window of data. A stream is an infinite sequence of data (as tuples), so to perform certain operations, a subset of the data must be used. For example, calculating the maximum value of or sorting an infinite stream would have to wait an infinite amount of time to see all the data. SPL provides the ability to process subsets of streams though windows. Operators perform processing against the set of tuples in its window, such as sorting all the tuples in the window and then emitting the tuples in the sort order. SPL has powerful definitions for defining a window’s characteristics.


Oracle v Google could drive a new era of open-source APIs
The “open API” movement has thus far been rather amorphous in terms of structure and definition. But generally, open APIs are perceived to use open protocols and formats including REST, JSON, and (less popular these days) XML. In other words, it’s open in terms of the standards used, and not necessarily open in terms of anyone’s ability to register for it. This ruling creates an opportunity for API providers to put their APIs under open-source licenses, be it permissive or copyleft. This can apply, particularly with permissive licenses, even if the non-API components of the source code are proprietary.


As Mobile Roars Ahead, It’s Time To Finally Admit The Web Is Dying
The Web has tried to compete with the “mobile web” concept, but like so many responses to technology disruption, this one seems too little, too late. Building an engaging application with HTML5 on mobile is unbelievably challenging, even with a host of libraries downloaded from GitHub to simplify the process. Mozilla’s expansion into the space through FirefoxOS and Open Web Apps is a decent start, but with Americans already spending more time on their smartphones than on the Web through a PC, such efforts are becoming moot. Even if you get a mobile web application running, its performance will pale in comparison to natively run, compiled code.


Mozilla: We have a fix for Net neutrality
Mozilla is proposing the FCC create a new definition for these relationships by calling them "remote delivery services." As such, Mozilla says this should be regulated like a Title II communication service under the Communications Act. "Our petition asks the FCC to adopt a modern understanding of the Internet in a way to reach Title II directly and quickly," said Chris Riley, senior policy engineer at Mozilla. "This will also ensure that the FCC can adopt meaningful Net neutrality rules with no blocking and no paid prioritization that will stand up in court." Mozilla's proposal is a new twist on an old idea. Other Net neutrality supporters have also called on the FCC to "reclassify" broadband traffic under Title II of the Communications Act.


The Future Of Digital Marketing
The biggest myth about content marketing is that content marketing is just a buzzword. Or the latest “shiny object” people are chasing in marketing. Content marketing is the hottest thing in marketing because it is the biggest gap between what brands produce and what our customers are looking for. Content marketing is a business imperative and a cultural shift that businesses need to take in order to stay in touch with their audience. Content marketing is a mindset that puts the customer first because they are ignoring promotions and adverts and self-serving content. So if a brand wants to stay relevant to its customers, then it needs to embrace content marketing.


Tails 1.0: A bootable Linux distro that protects your privacy
Tails runs like any other live Linux OS -- with an added safety feature: It erases your session from your computer's memory at shutdown so there are no leftover traces. It runs on most Windows, Linux and Mac computers, with some exceptions (see below). Sometimes a 1.0 software release is a major milestone. In this case, though, there are no dramatic changes from previous releases; Tails development has been steady -- it has been releasing new (and stable) versions every 12 weeks.


Innovation might be alive and well, but who really benefits anymore?
Some of the most renowned innovators in business and technology gathered for a debate in tech mecca San Francisco on Friday morning to debate whether or not entrepreneurs have “lost the will to innovate.” The general consensus was that innovation is still very much alive and well, but who benefits is questionable. "Entrepreneurs haven’t lost the will to innovate at all,” remarked Virgin Group founder Sir Richard Branson, "I’ve never known a more exciting time for innovation.” But Branson was the first to point far beyond the mental bubble of Silicon Valley, positing that there is "help needed in many countries to help entrepreneurs get on their feet.”


5 Resolutions for IT Security Pros
"Understand where that private information is being used," says Stroud, a member of ISACA's strategic advisory council. "I'm not telling you not to [use] it. I'm telling you to be aware. And in being aware, you can make good decisions about whether you're going to allow [the information] to be available or not." Among the other areas of focus in 2014: What ISACA calls the "slimming down of big data," heightened competition for cybersecurity and data analytics experts, and how to manage the dramatic growth in connected devices - "the Internet of more things." "You need to be aware of the fact the 'Internet of things' is coming," Stroud says.


Teaching employees to be IT security stewards
Corporate security should start with employees. Training employees is a key to protecting company infrastructure and data. The best way to train them is via a combination of historical lessons, real-world examples and even ongoing internal incidents of security breaches discovered through the monitoring of daily activities (also known as "user activity monitoring" and "insider threat detection"). In the same way the swing coach uses video recording to analyze frame-by-frame, those in charge of IT security or incident response would use recordings of employee online behavior to further educate the staff. In a group training setting, this behavior could be discussed anonymously so as not to embarrass anyone.


Improving Your Asynchronous Code Using Tasks, Async and Await
Prior to the .NET 4 release, two paradigms existed for implementing asynchronous operations in applications. The Event-based Asynchronous Model (EAM) which employs a combination of methods and event handlers to model the asynchronous operation, and the Asynchronous Programming Model (APM), characterized by Begin and End methods demarking the start and finish of an asynchronous operation and an object structure (IAsyncResult) that represents the state of the operation. Of the two patterns, the APM model was recommended for most scenarios and the framework has widespread support built in for using this model.



Quote for the day:

"Concentration comes out of a combination of confidence and hunger."-- Arnold Palmer

May 09, 2014

Talk of an Internet Fast Lane Is Already Hurting Some Startups
Burnham says his firm will now “stay away from” startups working on video and media businesses. It will also avoid investing in payment systems or in mobile wallets, which require ultrafast transaction times to make sense. “This is a bad scene for innovation in those areas,” Burnham says of the FCC proposal. This will be the third time the FCC has tried to impose regulations on discrimination in data delivery, following two losses on earlier versions in federal court (see “Net Neutrality Quashed: New Pricing, Throttling, and Business Models to Follow”). The latest proposal has been interpreted as a reversal, in that it would allow carriers to charge extra for certain services.


How to banish shadow IT: Deliver enterprise apps and services that users want
"Business users can go out and buy SaaS without involving the sourcing professionals at their organisations - and many of them do because it is quick and easy and meets their needs at a point in time," said analyst group Forrester Research in a January 2014 report, which references a single organisation with "hundreds of instances of self-provisioned SaaS". Where there's a crossover between tools that are useful both inside and outside of work, targeting consumers is sometimes seen as an effective way of getting that service into the workplace, according to Richard Absalom, senior analyst for enterprise mobility at Ovum.


How to Build a Software Developer Talent Pipeline
Building a sales pipeline of potential customers can help ensure greater success in closing deals and driving new business, and the same goes when you're looking to hire elite software developers and programmers, says Vivek Ravisankar, founder and CEO of HackerRank. "Hiring developers is a lot like sales in that you have to build a pipeline to close 'deals,'" Ravisankar says. "Sure, you can go to a recruiter right now and have them do 'cold calls' to developers, but what you don't know is are they decent? Do their values and talent align with your company? Are they invested in your company's success as well as their own? That's hard to discern," he says.


Hyperscale Invades the Enterprise Data Center
Everyone is talking about the software defined data center, but they are ignoring the physical data center itself. Amazon doesn’t even want to build new data centers – as Wikibon CTO David Floyer describes, Mega Data Centers are the Future. Building a data center is typically a 25+ year commitment that typically has inefficiencies in power/cooling, no flexibility in cabling and no mobility within or between data centers. The software of the data center must go beyond the infrastructure stacks and include the surrounding support systems. Through the use of hybrid clouds and PODS, the data center can be managed independent of physical location.


Why Organizations Need to Grow Capacity and Performance Management Skills
"To take advantage of Web-scale IT approaches to capacity and performance management, IT architects need to fully embrace stateless application architectures and horizontally scaling infrastructure architectures," said Ian Head. Adding additional central processing units (CPUs), memory and storage to a monolithic server has been the traditional, vertical way of scaling up applications while capacity planning has traditionally been developed with the goal of forecasting the requirements for this vertical scaling approach. However, vertical architectures and approaches have limited scalability, making vertical architectures unsuitable for hyperscaling. For service capacity to expand seamlessly to extremely large scales, different approaches are required.


AIG's Chief Science Officer: 'It's Not All About the Numbers'
“It isn’t about what you know, it’s about how you learn,” Buluswar said. “The vision behind the creation of the science team was: As the world around us changes exponentially, the winners will win big, but they will be removed from their perches faster. So it requires a fair bit of agility.” Agility, in the context of the discussion relates to not only the creation of new problem solving abilities, but the requirement that those abilities are then brought to bear on the actual problems insurers are confronted with. “The thinking that created the problem can’t be the same as for the solutions, Buluswar said, paraphrasing Albert Einstein. Data driven decision making, he said, can be simultaneously incremental, transformative and disruptive.


Why Some Doctors Like Google Glass So Much
Like people in the wider population, some doctors doubt Glass’s usefulness. Emergency physicians in general are very technology savvy, Horng says, but they vary in their enthusiasm for the pilot project. “You’ve got the really early adopters that will try anything and just like new technology, and then you’ve got the other side that just refuses to get away from their clipboard, and so they are never going to use it,” he says. But plenty of doctors seem excited, and they do not see Glass as a barrier to patient-doctor interaction. “The advent of electronic health records has significantly changed that [doctor-patient] relationship,” he told the audience at Google’s Cambridge event.


Windows 8.1 users face patch ban as Microsoft sets next week's updates
"Microsoft will include the 'out-of-band' from last week in this month's IE update," said Storms, using the term for the emergency patch Microsoft shipped May 1. "But it wouldn't hurt to double-check." The other critical update, named "Bulletin 2" in the advanced notice, will apply to SharePoint Server 2007, 2010 and 2013. SharePoint Server has been patched twice already this year -- in both January and April -- as well as in December 2013. "SharePoint is one of those critical back-end office servers, in the same bucket as Exchange and SQL Server," said Storms. "So it will be important to move gingerly and important to test properly before deploying it."


Testing Ubuntu, Debian and LMDE on my new notebook
There is one thing concerning UEFI boot configuration that I would like to mention. Ubuntu was one of the first Linux distributions that could be installed with UEFI boot, which was commendable — but they accomplished that with a rather complicated procedure after installation which used a "Boot Repair" utility to rewrite parts of the configuration.  I have to admit that I have never used that procedure, or that utility — and that is exactly the point I want to make. It is not necessary to follow that procedure any more, the UEFI boot configuration can be set up to dual-boot (or multi-boot) Ubuntu and Windows 8 using nothing more than the system BIOS configuration and the standard Linux efibootmgr utility. I did just that for this installation, and it worked perfectly.


Database Continuous Delivery
Continuous Integration, Continuous Delivery and Continuous Deployment are the common principles and practices to structurally handle the process of automation and set ground rules for the many participants in the development, build, test, and release of the software process. These principles are not new, but they are gaining traction and adoption as they prove their benefits, just like Agile development did some years ago. As a set of principles and practices, Continuous Integration, Continuous Delivery and Continuous Deployment are not a case of 'one size fits all.' It is important to understand that every company might have its own unique challenges and these practices should be tuned to fit organizational structure and culture processes.



Quote for the day:

"Nothing is so wearing as the possession or abuse of liberty." -- Emile M. Cioran

May 08, 2014

Apple and wearable computing: it's the software, stupid
Apple will play the long game to deliver the right combination. It already is. We know Nike sees it as a partner. We see Apple's recruitment of renowned experts from the medical, fashion and wearables fields. Great so far, but the products will need to have finesse. "These wearable devices will fail to be effective and people will toss them aside if there isn’t a good service layer that goes with them,” Ms. Ask told the NY Times. “The devices have to be able to walk a fine line between being invisible enough that you want to wear them all the time, but also being effective enough that you engage with them.”


SAP Shakeup: McDermott Speaks Out
Does the surprise resignation of SAP Executive Board member and tech leader Vishal Sikka portend a diminished role for the Hana in-memory platform? "Absolutely not," says SAP co-CEO Bill McDermott. Despite the appointment of an applications-development veteran, Bernd Leukert, to the top technology post and a recent change whereby Hana financial figures are no longer reported, McDermott tells us the in-memory platform remains at the heart of the company's long-range plans.


Apple details what can be recovered from locked iPhones
The document, entitled "Legal Process Guidelines for U.S. Law Enforcement," was posted on Apple's website yesterday and acts as a FAQ and instruction manual for law enforcement agencies and other government entities "when seeking information from Apple Inc. about users of Apple's products and services, or from Apple devices." Among other things, Apple details when it requires a subpoena for user information and when it requires a signed search warrant, a higher legal process with a greater burden of proof for law enforcement agencies. The document lays out, in some specificity, what information is available from Apple, including what data the company's technicians can recover from a locked iOS device.


The Biggest Impact on IT Firefighting & Business Agility – Data Centers
It’s well documented that humans are almost always the biggest single risk factor to the availability of systems. The more humans need to be involved, the more likely a mistake will get made and a failure will occur. We all talk about hardware failure and power failures, even viruses and software bugs, but if you want to reduce risk, you reduce the human touch factor. The simple answer is that you need a combination of three things: good leadership, excellent process/automation, and solid training. When it comes to owning and operating a data center as a system, it begins to get a little more complex. Most organizations fail to treat the data center as a system and are constantly dealing with components or services independent of the DCaaP.


Not Another Framework? Part 2
In business architecture the capability model has become ubiquitous. And in thinking organizations I observe delivery of highly independent service and solution components that reduce dependencies and the impact of change, as well as mirroring the IT architecture on the business organization. Why wouldn't we use the same approach in defining a set of activities to deliver services and solutions? If you are uncertain about the capability concept, it’s important to appreciate that the optimum business capability is one that enables: maximum cohesion of internal functional capability, plus consistency of life cycle, strategic class, business partition, standardization, customizability, stability, metrics and drivers; and defined, stable dependencies that are implemented as services


Countering security threats outlined in latest Microsoft report
"The report continues to reinforce that it's critical to deploy advanced tools at the endpoint that can detect anomalies, such as malware that evades signature-based tools like anti-virus," Thompson said. Microsoft also found that criminals were getting better at using "deceptive downloads" to infect computers. Such tactics included bundling malware with free programs and software packages that can be downloaded online. Given criminals' skills in evading malware detection technologies, CSOs should focus "on building cohesive security controls across their complete environment, filling in the gaps between defensive technologies," Conan Dooley, security analyst for consultancy Bishop Fox, said. "This increases the chances of detecting new attacks, as well as those using previous methods," Dooley said.


Warning: Failure to comply with data center maintenance is reckless
Complying with modern data center best practices for design and operations is challenging enough, but facilities must be properly maintained to keep up a reliable level of service. A good program for operational practices and data center maintenance brings out the full value of investments, especially if the data center is certified by organizations such as the Uptime Institute or TIA. The data center is a potentially dangerous place for people and equipment. Good maintenance, written operating practices, regular training and rules enforcement will avoid injuries and outages and prolong equipment service life and reliability.


HP looks to ease enterprise IT cloud fears
HP is targeting Amazon, Google, IBM and Microsoft -- companies that are already strong cloud players. The company says its focus on private clouds, and thus on security for large enterprises that want to take advantage of the cloud's scalability and other features, and be able to touch and look after their own data, will provide a competitive edge. At this point, there are plenty of vendors that can help enterprises build their own cloud systems, but most are small, new businesses. HP believes it has an advantage as a tech industry giant, but it's a big player in a relatively small pond. "Server huggers will be interested in this," said Gartner analyst Lydia Leong, referring to "those organizations that want to build and run things themselves.


How to manage contractual risks in cloud computing
"If it doesn't, it must be challenged and any inadequacies should be dealt with. If this isn't done, the risk is that the service contract for cloud services that may prove to be lacking later down the line. The same goes for pricing, service levels and service credits, rights to exit, rights to change the services, security plans and standards, disaster recovery arrangements and governance arrangements," added Bratby. At this stage, subject matter experts, commercial leaders and lawyers should be roped in to help with the review, he advised. Second, the service contract must enable the business to comply with its own obligations, be they contractual, regulatory and legal, according to the lawyer.


Type Annotations in Java 8: Tools and Opportunities
Annotations have also played a central role in making developers more productive through techniques such as metaprogramming. The idea is that annotations can tell tools how to generate new code, transform code, or behave at run-time. For example, the Java Persistence API (JPA), also introduced in Java 1.5, allows developers to declaratively specify the correspondence between Java objects and database entities using annotations on declarations such as @Entity. Tools such as Hibernate use these annotations to generate mapping files and SQL queries at run-time.



Quote for the day:

"Education is not the filling of a pail, but the lighting of a fire." -- W. B. Yeats

May 07, 2014

Data Engineering Is The Bottleneck For The Internet Of Things
The numbers thrown out by analysts such as Gartner about savings achieved by the Internet of Things are staggering. Vendors will garner $309 billion by 2020. Positive economic impact is estimated at $1.9 trillion. But the path to creating that value is not what most people think it is. The bounding condition in deploying the Internet of Things (IoT) is not going to be the deployment of devices but rather the management and analysis of the data coming off those devices. If you are interested in making use of the IoT, that’s what you need to be working on: Data Engineering.


We Need New Templates for Cyber Risk Management
Now it is time for CIOs to make sure their role expands, and take with them their board members — many of whom may be as complacent about cyber risk as I once was. Board members need to know what CIOs already do: the finest technical capabilities in the world — the best programmers, the most effective cyber defenses, the most detailed risk management — is not enough to protect against cyber risk. We need to find new tools. Insurance company CIOs are wonderfully positioned to lead this transition. Not only are insurers on the front lines in the cyber risk fight themselves, they can also help clients discover and leverage best practices across industries.


Should CIOs Use a Carrot or a Stick to Rein In BYOD Workers?
At the heart of the partnership, a provision blocks factory reset capabilities and makes stolen devices useless after a certain number of failed password attempts. Many BYOD policies grant CIOs similar powers, such as locking devices and remotely wiping apps and data. BYOD employees often mindlessly hand over these rights. The security policy usually shows up as a wordy single page in small print with a "click to accept terms" button at the bottom, which online employees are accustomed to scroll down and click.


The New Mobile Enterprise: A Smorgasbord Of Choices
Today’s WLAN systems might be cloud-managed with only access points to install, or could be controller-based with a rack full of management servers of various types riding shotgun. 802.11ac is the hot story right now, but even here the nuance of Wave 1 versus Wave 2 creates a need to weigh your options. Then there is small cell technology, with which your WLAN system or dedicated hardware might help spread mobile networks deeper into your corporate premises if you have the demand. Increased mobility means more and newer devices on ceilings, walls, rooftops and poles. We all have common needs, but our final topologies might be quite varied.


Identity-based network services versus mobile device management
In a mobile enterprise, network services should enable a workflow-based approach to providing a user with the required connectivity and resource access. Platforms like Cisco Identity Services Engine (ISE) and Aruba ClearPass control network access with security features like device profiling, endpoint posture assessment and advanced policy management and enforcement. They also allow users to securely onboard and provision their own devices, while automatically protecting the network through the application of role-based policies.


Internet of Things may make owning less appealing
Peter Coffee, vice president for strategic research at Salesforce, also believes that the IoT will help move businesses away from an equipment ownership model as device vendors develop the means to better monitor and control what they sell. Every business, "wishes it could avoid having things on its balance sheet that aren't generating value all the time," Coffee said. Many businesses rent equipment, but what the IoT may do is expand the idea and provide more reason not to own, he said. Many of the businesses adopting IoT technologies are in the medical device area, where any downtime can translate into a real patient issues.


Big Data, the Future, Definitely
The driving factor is always the bottom-line usage. People are looking at customer retention and increasing profitability. Post GFC (Global Financial Crisis), all the industries are definitely in the innovation cycle irrespective of which industry the CIO belongs to. CIOs also focus on the cost cycle as the there is a massive pressure on CIOs to reduce costs and provide standardized services. The innovation in Big Data deals with all the three Vs – Volume, Velocity and Variety. But Big Data is mostly leveraged in increasing volume and the ones looking at the volume would be the ones that have large customer bases like eCommerce, retail, telecommunications and so on because the specific targeted marketing takes place there.


Data Credibility: A New Dimension of Data Quality?
It might be argued that credibility issues can arise purely from traditional data quality concerns, and thus never get into the realm of misrepresentation. For instance, an insurance company might have really sloppy data management practices and might have assigned junior resources to develop the spreadsheets it used for regulatory submissions. Knowing these facts, the regulators would be quite right to distrust the information they were getting. Confronted with this, the insurance company might respond that there was no deliberate intent to deceive. This argument will not wash. In all aspects of data management, and especially in reporting to outside entities (be they regulators, customers, partners or whatever), there is a duty of care.


Cloud is one of the 'most disruptive forces' in business in past 20 years: KPMG
Disruptive technologies are emerging technologies that unexpectedly displace an established methodology or a traditional IT service model. Social media, the increasing use of mobile devices, the internet of things and cloud computing are all considered disruptive technologies. “Cloud computing continues to change the game,” said the KPMG research. “Banks that continue to use outdated legacy systems will find it increasingly difficult to create and launch new services, to provide access to a mobile workforce and to accommodate geographically dispersed customers and partners as well or as quickly as their competitors who are operating in the cloud,” it warned.


How software-defined IT is answering today’s experience economy
Experience has become monetised and our digital world has transformed into an ‘experience economy’ where every poor-experience second can be metered at a cost to the business. On the flipside, according to NewVoiceMedia, following a positive customer experience, 69% of customers would recommend a company to others and 70% would secure their loyalty to the brand. Managing user experience and expectations with IT is considered one of the greatest challenges for businesses today. However, businesses that are getting it right will be presented with the perfect opportunity to turn customers into brand ambassadors that help generate revenue.



Quote for the day:

"One measure of leadership is the caliber of people who choose to follow you." -- Dennis A. Peer

May 06, 2014

Techies and users are in a vicious circle of mistrust
Our lack of trust arises from the many negative perceptions we have of business people. When I ask technical people how they feel about working with "the business," they use words like "ignorant," "unrealistic," "aggressive" and "unappreciative." They say business people don't know what they want and constantly change their minds. We can recall our own bad experiences that have led us to be skeptical of anything that business people say. We have seen project sponsors shirk responsibility and shift blame, and just like the business people, we have at times been treated poorly and felt bad about it. And we make generalizations about business people based on those experiences.


Sorry State of IT Education: Readers Propose Fixes
One thing readers almost universally acknowledged was that critical thinking skills don't come from core technology curricula, but from liberal arts and humanities courses that traditionally have been required in four-year college programs but aren't a part of most two-year programs and not even mentioned in trade schools. Several people wrote that even four-year technology programs now focus more on job training than education. But it's the educational aspects of a college four-year program that are key to taking skills ostensibly learned in the humanities coursework and applying them to the knowledge obtained in the technology coursework.


Securing Big Data for the Future: Why You Need a Data Rights Management Platform
It's our modern day struggle trying to figure out how to keep our data in our own hands. In truth, it is our generation's battle to fight, not unlike the diversity or democracy battles fought by our forefathers. To give up all control or to maintain some say in the matter -- these are our choices, and in as little time as a few years, the choice will be made for us if we don't do anything about it now.  Because big data is only getting bigger, and big names want to make big money in the industry. Soon, you won’t hear about the NSA's improper collection and use of data. Soon, you won't know about Target's massive data breach.


Generating Data on What Customers Really Want
Disruptive innovation practitioners have just such a tool for reliably predicting customers’ behavior. It’s a methodology that uncovers what in disruptive innovation parlance is called a person’s “job to be done.” Briefly, the idea is this: Consumers don’t go to the store to buy products. They go to the store to buy something that will enable them to get some important job done in their lives. The classic example, attributed to HBS professor Ted Levitt, is that people don’t want to buy a quarter-inch drill; they want something that will make a quarter-inch hole. Making a quarter-inch hole is the job to be done. The product that does that job most reliably, easily, conveniently, and less expensively is the tool they will be most likely to purchase for that job.


7 Business Dashboards That Offer Striking Data Visualizations
When data gets complex, there's no better way to understand it than a business dashboard. You can cull data from your website analytics engine, an Oracle database, social media campaigns and more, all to see how they interrelate. Unfortunately, some dashboards are overly cluttered and actually make data more complicated to understand. The seven tools featured here use more color, graphs, clear delineations and white space to make data more understandable. The cost for using these dashboards varies depending on the number of sources you use, the amount of data you're analyzing and how many admin users you have involved.


How Anybody Can Measure Your Computer's Wi-Fi Fingerprint
Wireless fingerprinting has other applications too. Not only can this approach identify malicious computers attempting to access your network, it can spot fake wireless access points that are designed to collect MAC addresses to spoof other networks. However, this requires the gathering of ground truth data of the original access point in a secure environment in advance. Wireless fingerprinting is unlikely ever to be entirely foolproof but it does have the potential to be a useful addition to the armory of tools available for online security.


The ABCs of the Internet of Things
In a word: Sensors. Many IoT devices have sensors that can register changes in temperature, light, pressure, sound and motion. They are your eyes and ears to what's going on the world. Before we talk about what they do, let's describe them. These sensors are part of a device category called a microelectromechanical system (MEMS) and are manufactured in much the same way microprocessors are manufactured, through a lithography process. These sensors can be paired with an application-specific integrated circuit or an ASIC. This is a circuit with a limited degree of programming capability and is hardwired to do something specific. It can also be paired with microprocessor and will likely be attached to a wireless radio for communications.


eBook: Modern Web Essentials Using JavaScript and HTML5
Developing single page applications with JavaScript and HTML5 solves an enterprise pain point - how to reach users on various platforms without diminishing user experience. This book provides tools for a thorough understanding of three topics integral to effective enterprise-level, web SPA development: JavaScript language essentials, HTML5 specification features, and responsive design principles.


Stripping down enterprise IT to the naked cloud
Once you're in their tent, it's very hard to leave. However, a case can be made for a minimalist approach to cloud; one that takes advantage of public cloud services that don't have all of the bells and whistles -- just a few simple services, such as storage, compute or databases. In some cases, it has the ability to get down to the primitives of the platforms, without going through layers of application program interfaces (APIs) and management tools. In some circles, this is called a "naked cloud."


Symantec calls antivirus 'doomed' as security giants fight for survival
The antivirus giant said that end-point security technology isn't a "moneymaker" in any way, and highlighted that the company needs to adjust and adapt. Which isn't a surprise for Symantec, whose Norton antivirus products have barely made any new dents in the security market in years — despite it being bundled with almost every new Windows computer as premium bloatware. But what Dye was saying is that the malware market is dwindling and hackers are instead increasingly focusing on cyberattacks, like denial-of-service assaults, spearphishing, and network intrusion, rather than mass-emailing a crafted executable file randomly to millions — including to a burgeoining base of Mac users that are immune to such attacks.



Quote for the day:

"Plans are only good intentions unless they immediately degenerate into hard work" -- Peter Drucker