June 14, 2014

Sugata Mitra: What the Slumdog Guru Did Next
Sugata Mitra is the Indian academic and polymath who became known for his Hole in the Wall computer-based education scheme where he left internet-connected PCs in rural Indian villages and observed the amazing ways in which children with no English skills or previous exposure to computers teamed up to find information and solve puzzles. ... The banks put ATMs everywhere so I built myself a DIY [kiosk] in the wall of the slum with a glass pane and a touchpad running Microsoft Windows and it had a broadband internet connection and I left it there. It was three feet off the ground and the first people who came there were children and they said ‘What is this?’


The five minute CIO: Mick Callan
IT architecture should cross over between IT and certainly enterprise architecture is more about the business than it is about IT, being able to communicate and articulate what the business needs. Sometimes IT is working well if it's innocuous. It's about meeting the business needs and streamlining IT to fit around those in as unconvoluted a way as possible. The five pillars of IT architecture are business technology strategy, human dynamics, quality attributes, the IT environment, and design. People sometimes put it all in IT environment or design, but human dynamics is a huge part that's often missed. If you talk to people in the IVI around capability models, they are all tuned around the business needs.


My Digital Banking Nirvana
One potential solution is to integrate Capital One’s new SureSwipe login feature into a new mobile banking relationship. With SureSwipe, all a customer needs to do is remember a pattern as opposed to passwords, making login easier.Digital consumers also do not want to go through a series of authentication steps just to see the balance in their account. In the U.S., GoBank provides the opportunity to see balances with a simple swipe of the finger. GoBank is still one of the few banks in the U.S. to provide this instant balance feature, even though Mapa Research found close to 20% of major banks worldwide offing this functionality.


Aruba Networks: the network-aware application & the (mobile) application-aware network
Jon Green says that facilitating the new #GenMobile network will demand open interfaces. This is open interfaces as opposed to a proprietary protocol for networked routers. Mobility-Defined Networks operate such that the networks should be “defined and shaped” by the needs and demands of mobile users. The technology here should be capable of constantly capturing and correlating real-time state information – it will then be able to automate network security actions based upon that data. Aruba says that the focus for us here is on the middle control layer of software that can automate  manual tasks and processes.


Need for Proactive Enterprise IT Innovation
While the robot and high-powered computer disruption outlined by Brynjolfsson is not quite upon us yet, disruption was the common topic among the CIOs and other C-level execs at the conference. Digital business transformation means "using technology to radically improve performance or the reach of your business," said MIT research scientist George Westerman during a panel on digital transformation. Those transformations can include putting the customer first in every process as advocated by Dell CIO Adriana Karaboutis or having a goal where 80 percent of all business transactions are digital by 2020 as outlined by AT&T CIO Thaddeus Arroyo.


Tech worker groups boycott IBM, Infosys, Manpower
The main goals of the boycott are "attention getting" and putting pressure on the IT staffing firms to change their practices, Conroy said. With IT staffing agencies competing to fill U.S. positions, the companies contracting for their services may want to consider if the staffing firm "has a good reputation," she said. The boycott should also raise concerns about staffing firms violating equal employment laws, said Les French, president of WashTech. "In addition to calling attention to an illegal practice, we want to show there are valid challenges to the 'labor shortage' of STEM workers," French said in an email.


Hong Kong: Silicon Harbour or Silicon Failure?\
The government has issued no fewer than five Digital 21 Strategy documents since the handover, detailing its blueprint for ICT in the SAR. It has tried to encourage the local startup scene to flourish by building facilities including Cyberport, the Hong Kong Science and Technology Park, and more recently hot-desk spaces like The Hive and Cocoon. It’s also been trying to get foreign businesses to move in by offering up disused factories as datacentres and waiving the fees usually levied on firms wanting to convert such buildings to tier-one and -two bit barns.


The depressing truth about e-waste: 10 things to know
In 2012, the United Nations reported that in five years, the world's electronic waste would grow by 33% from 49.7 million tons to 65.4 million tons. That's the weight of 200 Empire State Buildings or 11 Great Pyramids of Giza. Considering the lifespan of a cell phone is now only 18 months and a laptop's life span is only around two years, that rapid growth rate isn't surprising. What is surprising, however, is how little the public knows about e-waste and how to properly dispose of electronics. Here are 10 things to know about the e-waste life cycle.


Troubleshoot and Resolve Routing Issues—BGP
We can use BGP in the following conditions: Customer connected to multiple Internet service providers (ISPs); Service provider networks (transit autonomous system) and In very large enterprise networks, where we can use BGP at core layer as a redundant routing protocol. Common Neighbor Stability Problems of BGP: Misconfigured neighbor’s IP address and AS number; Reachability issues when interfaces other than directly connected interfaces are used while peering (update-source issue); Authentication must be properly implemented (if configured) and Router ID must be unique. BGP often stuck in idle or active state


The Agile Organisation: Are You Ready for Revolution?
Anyone who has been in an Agile team can tell you stories about people who follow the letter but not the spirit of Agile. While it’s true that positive behaviours can lead to a virtuous circle that eventually changes mindset, it’s equally true that a team can normally carry only one or two such people, before the effort breaks down. If this is the case with a small team, imagine how much harder it is for a whole company, where the existing structure actively discourages transparency, inspection and adaptation.



Quote for the day:

“No man will make a great leader who wants to do it all himself, or to get all the credit for doing it.” -- Andrew Carnegie

June 13, 2014

Why Open Source Software Isn't as Secure as You Think
One problem facing many open source projects - and the reason it's hard to blame Seggelemann or the rest of the OpenSSL team - is that carrying out a rigorous code security review is immensely time consuming and requires a high level of skill. That means it's very expensive. This is illustrated by another open source project: The TrueCrypt encryption program. The code has been open to anyone who cares to look at it since the project started 10 years ago - but it's only very recently, following fundraising campaigns on Indiegogo and Fundfill that yielded $60,000, that the code has undergone a proper security audit.


Three best practices for reducing the risk of SQL injection attacks
Structured Query Language is flawed because of the way it was architected. It can be fooled into trying to interpret data as an instruction. On the other hand, there’s a lot of capability in SQL that makes it attractive to developers, especially for web applications. Since the consequences of SQL injection attacks can be so damaging, I asked Michael Sabo of DB Networks about best practices that companies can follow in order to reduce their risk of this threat. Sabo says there’s no silver bullet, but he does have some advice. “Often you will hear, ‘if you just do this, or just do that, the problem will go away’,” says Sabo.


9 Mobile Apps To Get You Fit
"Mobile technology is truly revolutionizing the future of healthcare, and mobile apps in particular have played an important role in improving communication between physicians and patients, increasing adherence to medical prescriptions, helping patients locate good doctors and pharmacies, and encouraging preventative measures," says Jeff Holleran, senior director of Enterprise Product Strategy at BlackBerry. "Both doctors and patients are finding that mobile apps can provide a fast and efficient way to stay in touch and exchange information. Providers are leveraging apps so that they can respond quicker and share data faster. On the consumer side, mobile apps are growing in popularity as people become increasingly more conscious about their health and well-being."


How M2M Network Connectivity Is Driving the Growth of Industries
The advantages of the Internet of Things are obvious of course; smart connected devices that share data and make information always available to make informed decisions. M2M connectivity can best be described as devices that are capable of communicating with each other, without the need for human interaction. Global M2M applications include smart CCTV cameras, vehicle tracking, self-driving cars, secure ATM’s, smart energy metering, patient monitoring and many more possible applications. This infographic shows a few of these applications from telematics to utilities monitoring thanks to sensors.


Quality Is Not An Accident!
As quality continues to evolve, the question becomes, “how do we shift the ‘definition’ of quality to reflect quality leadership?” If we refer to Deming’s quality methods, there are some clear indicators as to how we can connect quality principles to leadership principles. ... Just as TQM is timeless and applicable to all organizations, so is quality in leadership. Bear in mind, true quality of any sort takes time, commitment, focus and work - Quality Is Not An Accident! Despite the commitment, if you do the hard work, the results are huge, and multiply exponentially over time. Quality (as a whole) works – like a secret weapon – increasing your odds of achieving sustainable success.


Google Wants To Collect Your Health Data With 'Google Fit'
Google Fit will aggregate data through open APIs, instruction sets that allow apps to share information, and will also announce partnerships with wearable device makers at its I/O conference,Forbes understands. One source with knowledge of Google’s plans said Google Fit would allow a wearable device that measures data like steps or heart rate to interface with Google’s cloud-based services, and become part of the Google Fit ecosystem. Google could not be reached for comment at the time of writing. It’s unclear if Google Fit will be a service build into the next version of Android, or a standalone app that Android users will be able to download independently.


Scaling the data mountain
Faced with ever increasing volumes of data and demand for storage, it’s simple for an organisation to spin up yet another virtual machine, and add or expand a disk to store even more data. Ultimately, however with data growth outstripping IT budget growth, a reactive approach isn’t sustainable and at some point financial considerations will force a more sophisticated response. It’s therefore essential that IT teams take a holistic view, considering solutions that will enable them to gain greater value from their information, and in parallel, avoid risks arising from regulatory compliance and legal claims


FCC to push network providers on cybersecurity
"The FCC cannot abdicate its responsibilities simply because the threats to national security and life and safety have begun to arrive via new technologies," he said. "If a call for help doesn't go through, if an emergency alert is hijacked, if our core network infrastructure goes down, are we really going to say, 'Well, that threat came through packet-switched IP-based networks, not circuit-switched telephony, so it's not our job?'" The FCC will push operators of U.S. communications networks to adopt cybersecurity best practices developed by the FCC's advisory committee, the Communications, Security, Reliability and Interoperability Council [CSRIC], Wheeler said.


Threat intelligence versus risk: How much cybersecurity is enough?
While threat intelligence is the foundational piece of risk assessment at Equinix, the use of intelligence data in the security industry is often ad hoc. "It has either plateaued or actually decreased," said Do. "There are always two sides of the spectrum," he continued. "The companies that are very good at doing SIEM [security information and event management] and all of these intelligence pieces so that the more intelligence or data points that they've added to their infrastructure, the smarter they become." But the majority of the security teams don't do that. "They are either mired in compliance checkboxes or chasing down shadow IT services.


The Risks and Responsibilities of Tech Innovation
Companies cannot proudly take ownership for the positive impacts of their products while distancing themselves from harms. Companies should acknowledge that there may be risks to using their products in plain English (and Spanish, French, German, Arabic, Mandarin, and any other language necessary) — while making it clear that they will be proactive in assessing and mitigating those risks. ... Companies should allow for the ability to push out software updates to make their products safer once the risks become clearer. There are plenty of safe driving apps for cell phones, which might offer a precedent for Google to follow.



Quote for the day:

"Making the simple complicated is commonplace; making the complicated simple, awesomely simple, that's creative." -- Charles Mingus

June 12, 2014

Russian mobile banking Trojan gets ransomware features, starts targeting US users
That ransomware function was further improved and at the beginning of June a new variant of Svpeng was identified on mobile phones outside of Russia. Ninety-one percent of users affected by the new version were based in the U.S., but the malware also infected devices in the U.K., Switzerland, Germany, India and Russia, Unuchek said. Upon installation, the new Svpeng modification claims to perform a device scan and displays a fake notification from the FBI warning the user that the device was used to visit porn websites and has downloaded "prohibited content."


Purely Functional Configuration Management with Nix and NixOS
Many of Nix’s advantages flow from the use of these hashes. For instance, let’s look at what happens if we upgrade a package. Nix installs packages from sets of package descriptions calledNix expressions. One such set is the Nix Packages collection (Nixpkgs), which provides thousands of packages. You can get it by cloning its Git repository, but most users get it through a so-called Nix channel. ... In Nix, whenever you install, upgrade or uninstall a package via nix-env, Nix builds a tree of symbolic links (called a user environment) pointing to the installed packages. The current user environment is reachable from the user’s PATH environment variable, through some indirections.


CEOs of Microsoft, HP, Intel talk future of computing
HP's Whitman said the "explosion of data" is going to happen in two or three years -- not 10. "Because of the explosion of data, the existing way we do compute is not going to scale," she said. "Maybe even two years from now or three years from now. People think, well, we don't have to worry about this too much because it will be 10 years from now. But this is happening much faster." The Machine, a brand-new computing architecture HP described earlier in the day, is designed to deal with this data explosion, Whitman explained. It will move and process massive amounts of data much faster than today's computer architectures, she promised.


Google engineer: We need more Web programming languages
"The Web is always available, except when it is not," Bracha said. "It isn't always available in a way that you can always rely on it. You may have a network that is slow or flaky or someone may want to charge you." Therefore any Web programming language, and its associated ecosystem, must have some way of storing a program for offline use, Bracha said. The Web programming language in the future must also make it easier for the programmer to build and test applications. The chief language used today for the Web is JavaScript, which is deficient in a number of ways, such as support for offline usage of apps. And this may remain the case for a while: JavaScript is based on the ECMAScript standard, which can take years to be updated. "It should be easier to do these things," Bracha said.


New OpenSSL vulnerability puts encrypted communications at risk of spying
The man-in-the-middle attack is possible because OpenSSL accepts ChangeCipherSpec (CCS) messages inappropriately during a TLS handshake, Kikuchi said in a blog post. These messages, which mark the change from unencrypted to encrypted traffic, must be sent at specific times during the TLS handshake, but OpenSSL accepts CCS messages at other times as well, Kikuchi said. The problematic code has existed since at least OpenSSL 0.9.1c, which was released in December 1998, so the bug is over 15 years old, Adam Langley, a senior software engineer at Google, said in an analysis of the issue posted on his personal blog.


SQL-on-Hadoop brings open source framework into mainstream
Williams said a lot of the time required to develop SQL software goes to "pure SQL wizardry." What he describes as SQL overhead includes studying data, conceiving a schema, normalization, index creation and query creation. The time required to rework established programs may be the bigger issue, he insisted. "If anything in the application changes, you have to redo all that work," he said, suggesting that development techniques centered more on Java or Python languages be used where possible for unstructured data. Still, TrueCar is working with Hive, Tez and other SQL-on-Hadoop technologies as well, he admitted.


MasterCard expects big growth from 'big data' insights
While MasterCard expands in "big data", Cairns sees no slowdown in its traditional business of processing payments, with plenty of potential for growth as 85 percent of consumer transactions are still made by cash or cheque. "Moving money and doing it safely and securely is so deeply cared about by so many people around the world that it will be a business that has fantastic value now and for years to come," said Cairns, who previously worked at Citigroup and ABN Amro. London-based Cairns, whose division accounts for 60 percent of MasterCard's business, said the expansion of e-commerce and emerging markets is driving growth, noting that 2.5 billion people are still without access to financial services.


Transactional NoSQL Database
NoSQL databases have come along, in many cases providing a more natural fit from a modeling perspective. In particular, document-oriented databases, with their rich JSON and/or XML persistence models have effectively eliminated this impedance mismatch. And while this has been a boon to developers and productivity, in some cases developers have come to believe that they’d need to sacrifice other features to which they have become accustomed, such as ACID transaction support. The reason is that many NoSQL databases do not provide such capabilities, citing a trade-off to allow for greater agility and scalability not available in traditional relational databases. For many, the rationale for such a tradeoff is rooted in what is known as the CAP theorem.


High Performance search using MongoDB and ASP.NET MVC
MongoDB is an implementation of an object-oriented document database which is a flavor of NoSQL databases. NoSQL is an alternative to the traditional relational DMBS that solves several limitations of relational databases although usually at the cost of normalization or referential integrity at the DBMS level. Document databases are a type of NoSQL databases that pair a key with a complex data structure known as a document. A document can contain one or more key-value pairs. Because NoSQL database have simpler structures and do not have the overhead of enforcing referential integrity, they are more scalable than relational databases and provide superior performance, particularly for searching.


How to pitch enterprise architecture in one long breath
EA is the integrated, consistent and navigable description of the enterprise as well as the governance principles that guide the coherent enterprise change and strategic transformation. Your credibility has risen here. The Director should smile meekly now. But there is still work to do, you utter before long. Because you have to come up with the why and with an one page next steps that show how the planned deliverables concur to shape your EA and deliver benefits to your Director, specifically, beside those to the entrprise as a whole.



Quote for the day:

"Coolly observe,calmly deal with things,hold your position,hide your capacities,bide your time,accomplish things where possible." -- Deng

June 11, 2014

Traits of a DBA - Part One – The Technical Side
In this article I will discuss the technical traits a DBA should have, and in my next article I will discuss the valuable personal traits that make a person an excellent DBA. Technical traits are those skills a person uses to perform a particular task that is technical in nature. These technical tasks fall into a wide range of categories related to managing and maintaining a SQL Server environment. Below is a list of those technical traits or skills that would be beneficial for a SQL Server DBA to understand. This list is in no particular order.


Hybrid IT: The Best of All Worlds
“In this fiercely competitive landscape, many companies don’t even have time to put together detailed business cases before they respond to competitive changes. If you don’t take advantage of the right technologies to move quickly, you will get left behind,” says Elizabeth Shumacker, Vice President, Global Products & Solutions Marketing at CenturyLink Technology Solutions, a global provider of managed services on virtual, dedicated and colocation platforms. In this white paper from CenturyLink, we learn how the drive to maximize IT agility in support of new business needs (e.g., digital customer experience; big data analysis) while holding down cost is leading many CIOs to re-imagine their core IT infrastructure.


Snapchat Must Either Grow Up or Risk Disappearing
"If a company markets privacy and security as key selling points in pitching its service to consumers, it is critical that it keep those promises," FTC Chairwoman Edith Ramirez writes in the agency's announcement. "Any company that makes misrepresentations to consumers about its privacy and security practices risks FTC action." Before the ink even dried on its settlement with the FTC, Snapchat was in hot water again, this time with the Electronic Frontier Foundation (EFF). The non-profit committed to defending civil liberties in the digital age scored Snapchat at the bottom of the pack in its annual review of technology and communications firms titled "Who Has Your Back?


Google Open Sources Its Secret Weapon in Cloud Computing
Google is now sharing this technology with the rest of the world because its business has evolved. In addition to creating its own web applications, it now offers cloud computing services–services that let outside companies build and run software without setting up their own machines. Releasing Kubernetes as a way of encouraging people to use these cloud computing services, known as Google Compute Engine and Google App Engine. But the new tool isn’t limited to the Google universe. It also lets you oversee machines running on competing cloud services–from Amazon, say, or Rackspace–as well as inside private data centers. Yes, today’s cloud services already give you quick access to large numbers of virtual machines,


Threats in the Cloud – Part 1: DNS Attacks
Attackers use malicious IFrames (the size of a pixel) or malicious Jscript to expose the unsuspecting user’s system to a variety of exploits. If all the software on the user’s system has not been kept up-to-date with security updates, one or more of these exploits could allow attackers to successfully compromise the system and allow attackers to download malware onto the system. Attackers will then have remote access to the system and potentially control it remotely. The user’s system can then be used for a wide range of illicit activities without the user’s knowledge or consent, such as DDoS attacks, spam projects, hosting stolen and pirated content and software, stealing data and software keys from the compromised system, potentially stealing the compromised computer’s users’ identities, etc.


HP Cloud Chief: OpenStack and Cloud Foundry a Match Made in Heaven
Open platforms are popular with these people because they enable development of applications. “Applications are great because that’s where the touch-point with the broader organization happens,” Mishra said. When applications are easy to build and deploy, IT shops can deliver the innovation that is expected from them. There are many parallels that can be drawn between OpenStack and Cloud Foundry, but the main one is in the way both open source technologies have given big IT vendors, such as HP and IBM, an on-ramp into the cloud services business.


Stretchable electronics could lead to robotic skin, computerized clothes
Researchers at Purdue University have made an advance in stretchable electronics that could lead to computerized clothing and robots with humanlike skin that can "feel." The issue has been how to create stretchable electronics, but the Purdue scientists have found a simple answer -- a sewing machine. The same sewing machine that you use to make your child's Halloween costume or to stitch together a pair of curtains is the same machine that can make what scientists call ultra-stretchable interconnects out of conventional wire.


Model-Driven Architectures + BI: The Perfect Pairing
One byproduct of MDA is a dashboard that is conceptualized by business-users from various disciplines rather than one that exclusively reflects IT capability. This is because MDA, at its very essence, is a development approach that starts by asking the question "Why?" What is the purpose of the application we're building? What business problem are we trying to solve? Once the answers to these questions become apparent, MDA developers work backwards in collaboration with the end users they are assisting. This requires visualization and cross-functional consensus about what data is relevant and what insights are desired.


Managers: Beware Becoming Part of the Drama
Let’s face it, some people thrive on bringing their personal challenges into the workplace and baring them all for the world to see. These drama kings and queens seem to revel in sharing their own misery with us in a seemingly never-ending series of scenes from the worst tragic Broadway or faux-Shakesperian play ever. As distracting and annoying as these people and their gray clouds of doom and dust become, it’s all too easy for the manager to get caught up in these serial soap operas, excusing poor performance or spotty attendance due to the nightmarish circumstances of the latest tragedy, illness, divorce, break-up, melt-down or (insert one you’ve heard before).


Most valuable storage metrics describe performance, capacity
Storage metrics cover a lot of ground. Administrators can get information on everything ranging from storage performance to bandwidth and cost. Whether you're working with object, block or file storage, StorageIO founder Greg Schulz said the metrics that matter most depend on how your storage is being used. In this video, Greg helps users nail down which storage metrics are most valuable by grouping them into one of four categories using an easy-to-remember acronym: PACE.


Understanding SQL Server Concurrency
When you can't get to your data because another application has it locked, a thorough knowledge of SQL Server concurrency will give you the confidence to decide what to do. Download your free copy of SQL Server Concurrency: Locking, Blocking and Row Versioning, the new eBook by world-renowned SQL Server trainer Kalen Delaney, dive into SQL Server's models for concurrent access, and learn how to troubleshoot blocking, deadlocking, and update conflicts. The simplest way to catch these problems on your servers is with SQL Monitor, so grab a free trial and see how quickly you can put Kalen's tips into practice.



Quote for the day:

“You can change only what people know, not what they do.” -- Scott Adams, God's Debris

June 10, 2014

“It Depends” and “I Don’t Know”
Just like Croesus, contemporary decision makers crave certainty. Executives are frequently called upon to synthesize multiple viewpoints, many of which may be outside their area of expertise, into a coherent decision. An expert’s opinion of what’s “right” can be a seductive thing. Likewise, technologists are often uncomfortable with ambiguity, and rightly so. Implementing contradictory requirements is difficult, to say the least. Uncertainty, however, is a fact of life. Pretending that it does not exist is neither honest, nor effective. Picking a number without any basis in reality does not serve to eliminate it. In fact, elimination of uncertainty is a fool’s errand. As Tom Graves stated in “Who will lead us out of our uncertainty”:


Salesforce.com: Let's Build Apps For Wearables
The heart of Salesforce Wear is a collection of open-source reference apps -- called the "Salesforce Wear Developer Pack" -- that helps developers build wearable apps that connect to the company's Salesforce1 mobile app platform. The "reference apps" provide examples of how Salesforce built apps for the aforementioned wearable device types. The company makes the code open source for developers to learn from and then use to build their own enterprise apps. It's no secret at this point that wearable devices are popping up quickly and creating new ways for businesses to connect with customers and employees. Research firm IHS predicts that roughly 50 million wearable units will be sold in 2014, and more than 180 million are predicted to sell in 2018.


Facebook Adds Another 9 to HBase Availability
To improve HBase’s availability, Facebook developed HydraBase, which offers a fairly thorough re-architecting of a typical HBase topology. As the Facebook engineering team explains in a recent blog post, HydraBase provides higher availability (from 99.99 percent to 99.999 percent), greater data consistency, and faster failover times than the master-slave replicated setup. The technology is able to do this, without expanding the storage footprint, by effectively “decoupling” the logical and physical replication in HBase, Facebook says. “Instead of having each region being served by a single region server,” the Facebook engineering team writes, “in HydraBase, each region is hosted by a set of region servers.


Ten Technology Opponents You Can Beat
The Wild West is upon us again. We live in a world where new threats pose to cause harm in ways most of us never dreamed possible. Most of us know to look before crossing the street, beware of parking lot sales people, and watch out for bait-and-switch tactics. However, it's time for our society to adopt a new set of street smarts - technology skepticism. Blindly trusting electronic resources, connectivity, or services puts our identities, finances, and privacy at risk. It's time to pay attention and take precautions, and we're going to show you what you're up against and what you can do about it.


Designing Connections
No one disputes that new technologies, including the ubiquitous Internet and World Wide Web along with social media, have changed our lives and how we work and play. Most people who use these technologies can point to many positive things that have resulted. What we tend not to focus on, though, is the primary downside of our digital connectivity. While we’re all busy using our various devices, doing everything from finding a restaurant nearby to sharing an experience we’ve had with acquaintances to working from home and thus avoiding contributing to a clogged highway, we may also be separating ourselves from direct human contact. And that may exact a severe price on society.


Data Analytics: Reaping the Data Dividend
To be sure, realizing the full potential of this data dividend will require that financial institutions no longer settle for status quo. Instead, they can look to cloud-based, big data analytics as a viable solution. Rather than deploying costly, on-premise compute grids that are left unused much of the time, cloud-based computing resources offer flexible, high-performance computing capabilities that give financial institutions the context they need to deal with emerging risks appropriately. These same solutions can be used to harness new streams of data and the capabilities of machine learning and cloud-based analytics tools, ensuring banks that their "single source of truth" is informed by all of the data available within the organization, rather than merely relying on data within a particular line of business.


Are You Measuring Your Security Program’s Effectiveness?
Although measuring different security processes and activities in isolation can be useful, a more important aspect of performance is measuring the relationships between different processes and recognizing how they align with your overall security strategy to form a defense-in-depth. As your security metrics mature, key risk indicators (KRIs) and key performance indicators (KPIs) should be established by leveraging data gathered from various sources and then represented in spreadsheets, dashboards and custom tools built on industry recognized frameworks.


Confronting an Employee Over Email? 5 Tips for Doing it Right
Confrontation (especially work confrontation) is never fun for anyone. But even more uncomfortable than trying to say something unpleasant to someone’s face is trying to express those feelings over email. As the co-founder of a completely virtual organization that has more than 120 contributors all over the world, I’ve had my fair share of awkward confrontation emails. So, what should you do if you find yourself in an emailing predicament? Here are a few tips.


Continuous monitoring key to retail cyber security, says Ponemon
Failure to scan for databases, said Sabo, could also result in failure to identify improper segmentation of networks in contravention of PCI DSS. “Continuous monitoring at the database tier is essential because the perimeter can no longer be trusted and organisations need to know what is going on in their core networks,” he said. Database encryption was recommended by 49% of respondents, while chip and pin technology for payment cards was supported by 45% and data leak prevention technology by 39%, only 18% mentioned IT staff education. Despite these insights and changes in technology and threats, organisations continue to allocate the bulk of their budget (40%) to network security.


Video Lesson Introducing Scrum and Agile
The video lesson Scrum fundamentals by Tommy Norman is a downloadable training which gives an introduction to agile software development using Scrum. In the lesson Tommy explains all the basics from Scrum like the roles, artifacts, and events, and explains how they can be used by teams. He also provides insight into the history of agile and the agile values and principles. InfoQ interviewed Tommy about why he made this introduction training, the roles, artifacts and events of Scrum, User Stories and collaboration in teams, and on-line resources where people can learn more about agile.



Quote for the day:

"Time is the scarcest resource and unless it is managed nothing else can be managed." -- Peter Drucker

June 09, 2014

IoT, IPv6 Coming To The Connected Home
The only current shortcoming to IPv6 is how slowly it's being rolled out, but I see this changing. The latest World IPv6 Launch measurements published by the Internet Society (ISOC) show an increase in network operator deployment. For example, Comcast is currently at 28%, about 10 times its rate from a year ago. As service providers bring IPv6 connectivity to the home, users need to make sure the appliances and other devices they buy are capable of using IPv6 as a transport. Your service provider might not be supplying IPv6 yet, but it will soon. Make sure that shiny new connected device won't become a paperweight when IPv6 is brought to your house.


Optimism, pessimism, and fatalism — fault-tolerance, Part 2
Finally, let’s consider fault-tolerance within a single long-running job, whether that’s a big query or some other kind of analytic task. In most systems, if there’s a failure partway through a job, they just say “Oops!” and start it over again. And in non-extreme cases, that strategy is often good enough. Still, there are a lot of extreme workloads these days, so it’s nice to absorb a partial failure without entirely starting over.Hadoop MapReduce, which stores intermediate results anyway, finds it easy to replay just the parts of the job that went awry; and Spark, which is more flexible in execution graph and data structures alike, has a similar capability.


Why I’m Betting on Julia
Normally I use one language to make something work, and a second language to make it fast, and a third language to make it scream. This pattern is fairly common. ... Julia's only drawback at this point is the relative dearth of libraries — but the language makes it unusually easy to interface with existing C libraries. Unlike with native interfaces in other languages, you can call C code without writing a single line of C, and so I anticipate that Julia's libraries will catch up quickly. From personal experience, I was able to access 5K lines of C code using about 150 lines of Julia — and no extra glue code in C.


Using Tools to Create Mobile Apps Quickly
With the shift comes a need for speed, but not so much so that security and performance requirements suffer. How to maintain the balance between rapid delivery and quality assurance falls to the testing teams. Into the fray comes cloud-based testing efficiencies. Our next innovation case study interview therefore highlights how Perfecto Mobile is using a variety of cloud-based testing tools to help its developers rapidly create the best mobile apps for both enterprises and commercial deployment. BriefingsDirect had an opportunity to learn first-hand how rapid cloud testing begets better mobile development when we interviewed Yoram Mizrachi, CTO and Founder of Perfecto Mobile, based in Woburn, Mass.


Sensitivity Analysis in Multiple Imputation for Missing Data
This paper reviews the concepts of multiple imputation and explains how you can apply the pattern-mixture
model approach in the MI procedure by using the MNAR statement, which is new in SAS/STAT® 13.1.
You can specify a subset of the observations to derive the imputation model, which is used for pattern
imputation based on control groups in clinical trials. You can also adjust imputed values by using specified
shift and scale parameters for a set of selected observations, which are used for sensitivity analysis with a
tipping-point approach.


Supercomputer passes Turing Test by posing as a teenager
The event has been labelled as "historic" by the organisers, who claim no computer has passed the test before. "Some will claim that the Test has already been passed," said Kevin Warwick, a visiting professor at the University of Reading and deputy vice-chancellor for research at Coventry University. "The words Turing test have been applied to similar competitions around the world. However, this event involved the most simultaneous comparison tests than ever before, was independently verified and, crucially, the conversations were unrestricted.


XPocalypse, not now
Fossen's thesis -- that cyber criminals would "bank" Windows XP vulnerabilities and put them to use onlyafter April 8, 2014 -- was not his alone. Microsoft believed it, too. Several times in the last 12 months, the Redmond, Wash. company warned Windows XP customers to get the lead out, ditch the creaky, leaky OS or face a certain surge in attacks. The most notable was in October 2013, when Tim Rains, director of Microsoft's Trustworthy Computing group, cited statistics from the firm's own telemetry to suggest that post-retirement Windows XP malware infection rates could jump dramatically. So far, nothing.


UK's financial services 'at risk' without greater effort on cybersecurity
According to a report published by the BBA and PwC, seen by The Telegraph, 93pc of large organisations suffered security breaches in the past year, and seven in 10 banking chief executives see cybersecurity as a key risk to growth. British financial companies spent £700m on cybersecurity last year, the document says. “Many BBA members participate in sector and cross-sector collaboration initiatives, however some do not and this needs to change,” the report says. “Though this can be in part explained by the sensitivities of some of the issues, there is also an element of lack of awareness and cultural resistance.


A new approach in luring top tech talent: a streamlined hiring process
Getting managers to hone in on a candidate's necessary background helps recruiters better understand what type of person the business needs and allows them to identify the right people up front. "There are some managers who really need to get in the thick of it and start interviewing candidates before they have that moment when they say 'I thought I need these five things, but now I only need three of those, but there's another piece I need instead," said Gaines. Defining a job's vital skills before the talent search starts can avoid looking for an IT worker who may not exist, said Gaines. For instance, finding a Windows engineer who is a technical project manager and .Net expert would prove challenging, he said.


Upsurge in hacking makes customer data a corporate time bomb
"Information has become toxic for retailers because the more they have, the bigger a target they become," said Lamar Bailey, security researcher at IT security firm Tripwire. "The ongoing rash of attacks brings into question what information an organisation should be keeping." U.S. retailer Target ousted its CEO Gregg Steinhafel in May after the firm said foreign hackers had stolen up to 70 million items of customer data including some PIN numbers late last year. Industry watchers said purchases on its website dropped noticeably in the run-up to Christmas with the breach also sparking lawsuits and official investigations.



Quote for the day:

"The businesses and creative people I'm fascinated by have something in common: failure." -- Mad Men's Matthew Weiner

June 08, 2014

How Google Could Disrupt Global Internet Delivery by Satellite
It isn’t clear what model Google and O3b might pursue. But O3b’s satellites already offer a superior and cheaper way to deliver high-speed Internet than conventional satellite services. Satellite Internet is traditionally provided by geostationary satellites that stay over a given point on Earth. These satellites orbit at 35,000 kilometers—often adding a 600 millisecond delay to the radio signals going back and forth. Such a delay is generally considered excessive for business use. O3b satellites orbit at a relatively low altitude of about 8,000 kilometers, and the company says this means a more-tolerable 150-millisecond delay coverage to latitudes up to 45 degrees north or south of the equator, a swath of territory inhabited by 70 percent of the world’s population.


The Internet of (Secure) Things – Embedding Security in the IoT
In today’s current environments, attempts to continuously monitor enterprise security are challenged to track their current assets, which for large organizations number in the hundreds of thousands. The IoT will multiply those assets by a million or more. Today those assets are built on a variety of platforms and operating systems; the software is rarely patched and their communications are not secured. We’ve already seen examples of exploits of these systems – automobile telematics, pacemakers, smart TVs, and more. Science fiction depicts the worst of these scenarios in movies like “Terminator” or “The Matrix”, with machines taking over the world.


The Brain Hacks Top Founders Use to Get the Job Done
“So much of what we feel is instinctual, and we don’t know how to identify it," Verresen says. "If you’re a founder or a manager and you really track your physical sensations, you’d realize that you probably spend most of your time in ‘fight or flight’ mode.” Humans needed this high-adrenaline setting when we were still part of the food chain. Now it surfaces in board meetings, product releases, whenever a threat is “perceived” even if there isn’t one. “The thing about ‘fight or flight’ is that it burns through our energy without us even knowing it,” she says. This is why preserving physical energy where you can is crucial.


Serious vulnerabilities in the Linux kernel, upgrade it now!
A new series of vulnerabilities in Linux Kernel allows an attacker to lead DoS and privilege escalation attack, Debian urges upgrades for Linux users. Numerous security flaws have been discovered and fixed in the Linux kernel, patch management for these vulnerabilities is critical to avoid that attackers could have led to a denial of service or privilege escalation. Debian yesterday issued a new security update to warn its Linux users about the presence of new vulnerabilities that could be exploited for the above reasons. The vulnerabilities are: CVE-2014-3144 ; CVE-2014-3145 ; and CVE-2014-3153


Internet of Things: it's all coming together for a tech revolution
Already tech giants are getting involved, viewing this as a logical progression from the personal computer and smartphone races of previous decades. At its Worldwide Developers conference (WWDC)event last Monday, Apple introduced Homekit, an Internet of Things platform that will co-ordinate various third-party home automation accessories, allowing you to unlock your doors or turn on and off your lights via your iPhone. Google, too, demonstrated its interest by paying $3.2bn (£1.9bn) earlier this year to buy Nest Labs, a home automation company co-founded by the creator of the iPod. Already well known for its connected thermostats and smoke detectors, Nest is currently investigating a slew of other applications related to the home – everything from health tracking to security systems.


Microsoft’s “3-D Audio” Gives Virtual Objects a Voice
In a demonstration of the technology at Microsoft’s Silicon Valley lab, I put on a pair of wireless headphones that made nearby objects suddenly burst into life. A voice appeared to emanate from a cardboard model of a portable radio. Higher quality music seemed to come from a fake hi-fi speaker. And a stuffed bird high off the ground produced realistic chirps. As I walked around, the sounds changed so that the illusion never slipped as their position relative to my ears changed. That somewhat eerie experience was made possible because less than a minute earlier I had sat down in front of a Kinect 3-D sensor and been turned briefly to the left and right.


Colorado Rolls Out the Welcome Mat for Ride-Sharing Apps, Virginia Says No
Ride-sharing companies like Uber and Lyft typically take a rogue approach to launching in new cities by rolling out service first and asking permission later, or not at all. But regulators are asking the companies tons of questions. This week, officials in Colorado decided they were satisfied with the answers and legislatively authorized the operation of so-called Transportation Network Companies (a term first coined in California). But Virginia has decided that Uber and Lyft have no right to operate there, with the state Department of Motor Vehicles issuing both companies cease-and-desist letters.


The Original Sin of Software Metrics
"I wrote this article mainly to point out the original sin of software metrics and to break people away from the conception that “the metrics are good, people are doing it wrong, so more processes should be set up to make people comply with the metrics.” The end of the article has a feeble attempt to offer some solutions, but at the end of the day, it is about building a culture that taps into and nurtures intrinsic motivations, which is a topic I do not have enough experience to talk about. I hope this article has provided some basis for a discussion about management approaches in a creative industry such as software."


Google's secretive 3D-mapping project now has a tablet: here it is
This 3D-mapping technology is still considered bleeding-edge, but Lee envisions a day in which the enhanced sensing capabilities are expected in a device, much like Bluetooth is a fundamental feature in phones today. To get Project Tango where it is today, ATAP collaborated with a number of manufacturers and component suppliers to produce the necessary hardware, while universities and research labs contributed much of the software. Work in the 3D-mapping space has been ongoing for the last 20 years, but the challenge Tango tackles is condensing all that technology into a small enough device that consumers will want to carry around.


Robert Benefield on Business and Operations Collaboration
The biggest strategy I follow is I go through and say “what is the business value of these operational things?” So, say you want to improve monitoring, well, why do you want to improve monitoring, you usually want to improve monitoring so you can understand what’s going on and be able to respond more quickly to stuff. Well, why do you want to respond more quickly and know what’s going on? ... Well, because the customer might be impacted. A-ha! That’s something the business might be interested in and if you’re able to go through and say “look, today we missed things, it takes us longer to be able to respond to outages and problems that we have, it takes us longer to troubleshoot and if we get this we should see an improvement of x% or we should see our times improve in this following way.



Quote for the day:

"Do not let what you cannot do interfere with what you can do" -- John Wooden

June 07, 2014

Even Data-Driven Businesses Should Cultivate Intuition
The study found that 42 percent of respondents said they collect and analyze data as much as possible before making a decision, while an additional 17 percent said they approach decisions empirically by developing hypotheses and performing tests to prove or disprove them. In other words, 59 percent rely on data to help them make decisions. Of the remainder of respondents, 32 percent said they seek to collaborate on decisions as much as possible, while only 10 percent said they primarily rely on intuition to make decisions. "Despite the apparent popularity of data-driven decision-making, however, intuition is in fact valued highly," says Jane Bird, author of the EIU report.


Data Brokers Coming Under Scrutiny
“You may not know them, but data brokers know you,” warned FTC chairwoman Edith Ramirez. The FTC studied nine data brokers who collect personal information about consumers from a variety of sources. The data is then sold for a variety of purposes, including identity verification and product marketing. Five of the brokers examined sold marketing data while four others sold “risk mitigation products” used by clients to verify a customer’s identity or to detect fraud. Three brokers scrutinized by the agency operated “people search” websites. One concern, the FTC stressed, is that data brokers seldom interact with consumers and individuals are often unaware that personal data is being collected much less the details of industry practices.


Welcome to the era of big, bad open information. Context needed.
While it is true that we have access to more information than ever before, we are not experts on every subject. Thus, it is very difficult to digest it. My concern is that over-information the new way of hiding information. The best way to combat disinformation is to demand context for all data, the “fact-checking journalism” promoted by sites like Gapminder or Open Knowledge. Visualizing.org strives to make sense of issues through data and design with a collection site where designers and all sorts of organizations can upload and share open data sets. If we demand context and facts instead of dumb numbers, the biggest legacy of the internet of things will be a world that is more transparent and democratic.


New Colorado law seeks to protect patient record privacy
“We thought the statute was pretty clear—all prescription drugs and prostheses are tax exempt and the Department of Revenue doesn’t get to make a distinction,” McGihon said, adding that Botox has 19 therapeutic uses, including treatment for Bell’s palsy and migraines.  “We then became aware that there are so many ways that the state accesses people’s medical records as multiple departments said ‘We need it for this, we need it for that,’” she said. “What the hell does a revenue officer know about a person’s medical history and what they need?” McGihon added that bill supporters worked with the Department of Revenue to “make sure the language of the bill was something they could live with.”


The 6 Of Best Small Business Accounting Software
As businesses come close to the midpoint of the second quarter, thoughts, actions and planning are being done by C-Level Executives as to what needs to be accomplished for the new fiscal year. Part of this involves capital expenditure planning, what kinds and types of new projects will be taken on, and how the financial budgets will shape out to be. For this latter task, having the right accounting software package in place, especially for the small to medium business. In fact, one of our previous articles examined the steps a small business owner should take in carefully selecting the right accounting software package to best fit their needs. In this article, we take out some of that hard work for you, and examine five accounting software packages which are available to the small and medium sized business today:


SAP® Best Practices for Data Migration – Hits and Misses
The migration templates are ‘programs’ or in SAP Data Services parlance ‘jobs’ that SAP Data Services executes. These jobs fall into multiple categories. One job category downloads SAP’s configuration tables into the staging area. The framework uses the downloaded configuration / lookup data to validate the data to be migrated. A second job category handles ETL of data into SAP. Tasks such as reconciliation of data loads, status checks and creation of staging area data stores are handled by other job categories. The framework also supports creation of SAP BusinessObjects™ Universes used for reporting on the progress of the data migration project.


Digital Business Is Not “Business As Usual”
The foundation of Digital Business is the Boundary-free Enterprise™, which is made possible by an array of time- and location-independent computing capabilities – Cloud, Mobile, Social and Data Analytics plus Sensors and APIs – with Integration as the glue to enable synergy and leverage business value. In becoming a Digital Business – whether a large enterprise traditionally on the buy side of technology, a software ISV in transition or a pure-play Cloud solution provider – this challenge is significant: how to implement a platform to support a Digital Business model and then keep pace with the ongoing pace of change. Saugatuck Technology research continues to indicate that too few enterprise Business and IT leaders fully understand the challenges and opportunities of Digital Business.


Finding a Home for the Chief Data Science Officer
With the CIO/CDSO reporting structure, there are two distinct disadvantages. First, a more centralized function might be too shallow to enable the CDSO to dredge deep enough into the problems, opportunities and data to surface solutions that make a meaningful difference. Moreover, the focus of the Data Science Office might end up being too technology focused and not business driven, which could discredit the initiative. The second choice is for the CDSO to report to the CFO. Concerned with the performance of different business and functional units, CFOs can be the natural owners of the data science functions. Like the CIO-CDSO reporting model, the CDSO will have access to the entire organization.


Techniques for Algorithm Animation Using JavaScript
In the early years of the web (1995-2003), Java applets were a popular option for implementing algorithm animation. To run applets, the web browser will normally utilize a plug-in that loads Java runtime. As they became more concerned with security risks, the majority of web users have become weary of using plug-ins including applets. JavaScript, on the other hand, is run directly by the browser inside a sand-boxed environment and with limited functionality so as to minimize security risks. With the advancement of client-side web technologies (HTML5 Canvas, SVG, CSS3, DOM, etc.), JavaScript has become a viable option for implementing algorithm animation.


Requirements for Becoming a Strategic Chief Risk Officer
Managing risk strategically has gained importance in financial markets as rising capital requirements and increased regulation force banks to structure their asset portfolios and manage their assets more carefully to maximize their return on equity (ROE). In most banks, optimizing risk – getting the highest return at any given level of risk – and managing risk more dynamically over a credit cycle requires a strategic CRO to lead the effort. Even so, in many organizations the office of the CRO doesn’t have the weight it needs to make such a difference. Here are the most important requirements for chief risk officers who want to transform a middle management job into something more strategic.



Quote for the day:

“You must be willing to give up what you are, to become what you want to be.” -- Orrin Woodward

June 06, 2014

Artificial Intelligence: A New Frontier in Data Center Innovation
Romonet’s modeling software allows businesses to accurately predict and manage financial risk within their data center or cloud computing environment. Its tools can work from design and engineering documents for a data center to build a simulation of how the facility will operate. Working from engineering documents allows Romonet to provide a detailed operational analysis without the need for thermal sensors, airflow monitoring or any agents – which also allows it to analyze a working facility without impacting its operations. These types of models can be used to run design simulations, allowing companies to conduct virtual test-drives of new designs and understand how they will impact the facility.


UK airports lead move to cloud services
The system, which goes live later this month, will allow the airport to refuel and restock aircraft far more rapidly, enabling the airport to increase the number of flights departing each hour by 10%. Gatwick is also using cloud technology to develop kiosks that will cut the time passengers spend dropping off a bag to just 45 seconds. The kiosks will take information from boarding passes on the passenger’s mobile phone, so passengers do not have to type in their flight details. Also, a collaboration with the website Skyscape could eventually allow passengers to book multiple connecting flights and train tickets on a single ticket from Gatwick.


Three Questions with the Man Who Designed Beats’ Headphones
If you break Beats down, I’d say there are three things that made it work. One, we redefined audio for a very important audience: a younger audience. We said, “We’re building these headphones to be tuned to your genre of music, by the people who make that music.” So we’re creating the value there. Then we redesigned the headphone. The headphone prior to that, when I looked at it, was kind of busy and mechanical and articulated, tied heavily to an audio culture instead of a fashion culture. So we completely rearchitected, made it more streamlined, more iconic; just better looking to wear.


BYOD Disasters to Avoid
A well thought-out BYOD program will take into account the many different regulations that govern privacy issues involving mobile devices. A program that fails to address these issues might be in for some trouble down the road. BYOD programs that aren’t kept up to date with current regulations may end up breaking the law. Privacy is always a serious issue with BYOD, especially since employees are using personal devices to access company information. Companies may wish to exert greater control over devices, but if policies go too far, they may end up infringing on employees’ rights, opening the company up to lawsuits.


Data science vs the hunch: What happens when the figures contradict your gut instinct?
"It's not an analysis versus intuition debate. There is a role of intuition in the process of analysis, which you might think of as sense-checking or comparing with your experience, that can help you make sense of the data," he said. ... According to Swabey, Humble has said he behaves exactly as the 57 percent does: if the data contradicts his intuition, he will reanalyse it. "That's not to say that [Humble] does not ultimately trust data generally but if it does contradict his intuition, then that is a possible sign that something has gone wrong with the collection, the analysis or the interpretation, or there needs to be more data to put that into context."


The Era of Data
When data gets free or inexpensive (as a result of commoditization), the opportunity exists to unite people over data sets to make new discoveries and build new business models. Many companies choose Hadoop because it is a cheap data storage. This entry point is the first step on the journey to the data operating system, a term that I heard three times during past five days, notably from Doug Cutting who brought to the world Hadoop the elephant and the data operating system. This year’s Hadoop Summit starts today. It brought together 3,000 people from 1,000 organizations.


Will enterprise mobile instant messaging overtake email?
So would employees of your company even use the enterprise-provided instant messaging option, or would they just use their native messaging platform or an app like Snapchat or Viber? This is the same argument as the one regarding company-offered productivity apps vs. someone’s personal productivity apps. As an enterprise, if you offer a tool that is easy to use and you provide the proper training, your employees will be more likely to use these tools. Sometimes, instant messaging does not fall under a guideline or policy, nor do users know if they are even using the company-provided tool.


Imposing Security
Of the three flaws, Heartbleed was by far the most significant. It is a bug in a program that implements a protocol called Secure Sockets Layer/Transport Layer Security (SSL/TLS), which is the fundamental encryption method used to protect the vast majority of the financial, medical, and personal information sent over the Internet. The original SSL protocol made Internet commerce possible back in the 1990s. OpenSSL is an open-source implementation of SSL/TLS that’s been around nearly as long. The program has steadily grown and been extended over the years.


On Adopting the Mindset of an Enterprise DBA
By adopting these four key strategies, the enterprise DBA is able to accomplish a great deal more work with far less effort, thus leaving them more time to focus on more important ,but less urgent, tasks. In many ways this becomes a virtuous cycle; by freeing up time from mundane yet laborious tasks, the DBA is able to spend more time on their toolset and automation, thereby lessening the manual labor involved in their daily work even more, which in turn leaves more time for automation: Lather, rinse, repeat. Conversely, by not adopting the enterprise mindset, we find ourselves in a vicious cycle of increasing amounts of urgent, but unimportant, work as the size of our environments increase.


Pentaho: don't get blinded with (data) science
According to Pentaho, "By slashing that time, those responsible for data analysis can devote more time to the 'value added' stuff and less time on boring (but important) administrative hygiene tasks and just get things done a lot faster." ... "Having built blueprints for the four most popular big data use cases, we know advanced and predictive analytics are core ingredients for success," said Christopher Dziekan, EVP and chief product officer at Pentaho. "The highest value of insight comes from having foresight blended with hindsight to drive insight and action. The Pentaho Data Science Pack allows organizations to apply their deep domain expertise and improve their customer analytics and predictions," he added.



Quote for the day:

“Think continally about what you want, not about the things you fear.” -- Brian Tracy

June 05, 2014

CIOs should 'leave innovation to marketing'
“Because technology and digitisation are so important, we will see more and more innovative ideas come from other parts of the business,” said CEB managing director Andrew Horne. “The idea that CIOs and chief digital officers will be the source of innovation does not make sense.” If the CEB is right, the role of the CIO will refocus on the less glamorous tasks of managing the IT infrastructure, while leaving innovation to other parts of the business. “One way of looking at it is that IT looks less exciting than it has in the past,” Horne said in an interview with Computer Weekly.


Geeks Versus Jocks: CIOs, Beware Your Culture
"Put simply, Google is not where we want to be when it comes to diversity, and it's hard to address these kinds of challenges if you're not prepared to discuss them openly, and with the facts." It isn't only about racial or gender diversity -- obviously, there are geeks of every gender and race. And it isn't that geeks are bad -- they're delightful (and I count myself among them, and I even write a weekly column dedicated to them). The issue is homogeneity. As Dougherty pointed out concerning jock culture, a single-minded culture destroys conversation, engagement, and innovation, and it sublimates the minority voices (of all types) in your company.


CISOs Look to Hire White Hat Hackers to Head Off Security Breaches
"One of the things I've noticed is the escalating need for security pros at all levels, especially in the last few years," Conrad says. "When the Web was young, security was a secondary priority, but as unscrupulous people found ways to exploit vulnerabilities, it moved quickly to the top of the list, and it has stayed there," he says. However, while the demand for highly skilled security pros hasn't lessened, the available talent pool has, especially among specialized talent like vulnerability testers, penetration testers and white-hat hackers, he says.


Turn to in-memory processing when performance matters
When an entire structured database needs to be repetitively queried -- as in many kinds of data exploration, mining and analysis -- it is beneficial to host the whole database in memory. Columnar analytical databases designed for business intelligence (BI) have optimized data storage formats, although often in some partially compressed state less suitable for high-volume transactional work. In the race to produce faster analytical insights, suitable in-memory options are evolving.


Data Discovery Is Not Business Intelligence
Data discovery is related to business intelligence but it is not the same task. Business intelligence is about a set of report templates that are standardized and repeatable. Even the ad hoc section of a business intelligence platform is run against a carefully constructed data set where users can seek answers to pre-defined questions. Data discovery is much more free form. Many times data discovery users don't actually know what questions they need to ask. Even if they did, users will often find something that will make them say, "Huh. That's interesting."  In data discovery, users can use their initial question as a springboard into further free form analysis. This free form analysis and data discovery provides an opportunity for a user to have a conversation with the data.


Big data creates storage security headaches for CISOs
As principal analyst, Brian Lowans puts it: "Businesses have traditionally managed data within structured and unstructured silos, driven by inherent requirements to deploy relational database management systems, file storage systems and unstructured file shares."  The arrival of big data and cloud storage environments is transforming the way in which data is stored, accessed and processed so chief information security officers (CISO) need to develop a data-centric security approach themselves. "Unfortunately this is not common practice today," Lowans said. Access to public cloud services and infrastructure further complicates this process due to the potential access by cloud service providers and security vendors, said Lowans.


Regaining the technology high ground – one blog post at a time
There is naivety though. People still don't really understand what it takes to keep big, complex systems going or to manage large-scale change. They are quick to point the finger of blame when things go wrong, or complain about not keeping up with the latest cool toys, but don't always appreciate what it takes to do that in the real world.  In the face of these challenges, those in charge of enterprise technology are losing influence. IT staff are not seen as the world's enablers. Their skills are becoming less valued. Their influence in their organisations is diminishing. Rebranding doesn't help. Most people don't know the difference between a CTO and a CIO.


SSL After The Heartbleed
SSL is used today for encrypting communications sessions on the Web via websites, virtual private network, email, and instant messaging sessions. But most websites today do not use SSL -- or HTTP-S -- save for high-profile ones that include financial transactions or other sensitive traffic such as banks and retailers, for example. There are an estimated 3.3 million to 4 million SSL digital certificates in circulation on the public-facing Internet, according to a University of Michigan report. Cost isn't a major hurdle for adopting SSL, experts say. Computing power isn't as expensive as it once was, and SSL isn't that much pricier than pure HTTP: it costs about $150 per year or less for an SSL certificate, says Michael Klieman, senior director of product management at Symantec.


Don't make these virtual server management mistakes
While a virtual environment seems simple, it is an incredibly complex system to install, configure and manage. In a perfect world, we never see beyond that magic curtain because nothing ever goes wrong. Last I checked, we are not in a perfect world and things do go wrong, which means someone has to fix it. The technicians have to work with consultants and the vendor to find out what happened, a process where the more you know about what is behind the scenes, the better. It does not mean you have to be able to fix the issue yourself, but the ability to properly communicate the issue can become one of the key steps in getting your systems back online.


How Will the New Indian Government Impact Tech?
India’s IT industry is valued at more than $100 billion now. It took the industry 15 years to reach this milestone. But now, with Modi leading the show, the industry is expected to reach the $200 billion milestone within the next five years. One key factor behind this is of course the improving global economic outlook. But the real fuel is going to come from within. With increased investments in infrastructure, agriculture, water management, energy generation, eGovernance, health and education, there are going to be a lot more domestic jobs for tech players of all sizes. So there’s every possibility that while businesses will be trying to get jobs from the international market, the focus is going to shift to getting domestic projects.



Quote for the day:

"The best way to find yourself, is to lose yourself in the service of others" -- Gandhi