Juy 14, 2014

Revamping your insider threat program
"A crescendo of discussions is happening in boardrooms everywhere about the impact an insider could have on corporate assets," says Tom Mahlik, deputy chief security officer and director of Global Security Services at The MITRE Corporation, a government contractor that operates federally funded research and development centers. The Washington Navy Yard incident cost 12 people their lives; the full impact of the WikiLeaks and Snowden data releases cannot yet be quantified.


Red Hat CEO Whitehurst on VMware, OpenStack and CentOS
Whitehurst chafed when I asked whether Red Hat should be seen as a Linux or cloud company. Red Hat is an open source company and that's the compass that leads every move it makes. "The way our DNA works is that we look at the most innovative open source projects that are applicable to the enterprise," he said. That DNA has led Red Hat to the cloud, but it has led to Linux as an OS to middleware to platform as a service and virtualization. In the future, open source will lead Red Hat to networking. "Open source gives us brand permission to enter a ton of categories," said Whitehurst.


Database startup TempoDB becomes TempoIQ, refocuses on sensor analytics
Andrew Cronk, TempoIQ’s co-founder and CEO, says the company started with capturing time-series data for things like sensors and connected devices because it was the hardest problem to solve in those spaces, where companies were historically trying to contort that data into relational databases or other database systems not designed for that use case. And although it was reasonably easy to attract individual developers with the notion of a time-series database service (TempoIQ is a cloud service), demands began to change as the company tried scoring bigger deals such as Silver Spring Networks.


Are You Ready For the Coming Decade of Change and Innovation?
Friedman pointed out in his keynote that the biggest change of the 21st century was the merging of IT and globalization – how the world is now so completely hyper-connected (actually hyperactively connected) and has nearly the same computing power and technology tools, and Internet access available to individuals that used to only be accessible to private enterprise and governments. He called this a “Gutenberg-scale” moment — really, really big. The world’s individuals can now compete, connect and collaborate with one another like never before. But imagine that you have billions of competitors, regardless of your status or profession, because that’s where it’s headed (if not already there)


Why Your Culture Problem Is About To Get Much Worse
The evidence of culture erosion in the workplace is substantial. According to a Gallup report on The State of the American Workplace, a full 70% of employees (mostly white collar) are “not engaged” or “seriously disengaged” from their job. The results speak to culture—or the lack of one—because Gallup measures engagement based on participants who rate their boss and their workplace on the following types of statements: ... It doesn’t take a genius to realize that good communication can result in higher levels of engagement on each of these elements.


Rethinking Thinking About Strategy
What Christensen, and others before him, have seen is that industry change is continuous, not episodic. This is critical to innovative strategy thinking. Embracing change before it is required has been a message my IMD colleague Peter Killing has advocated: initiate change when resources are abundant and people feel good, rather than when resources are scarce and people are afraid. Industry evolution can be better portrayed as a recurring series of punctuated equilibriums, where ideas take hold, a new industry is born, incumbent champions evolve and prosper, and then they – almost all at the same time – are "disrupted" by outsiders who have no legacy to protect and who are more agile in addressing nascent customer desires.


The Business Designer and the Architecture
Consultants do adopt to a degree the language of their client to smooth communications. But that does not mean that they can do that for terms that denote new disciplines such as Business and Enterprise Architecture. Or take advantage of the appeal of such terms to rebrand their good old occupations. Moreover, the term architecture sits well with the business because we all relate to the construction and urban architecture while, at the same time, Enterprise Architecture is well known today to the business even if does not inspire confidence.  And while "Enterprise Architecture" may have IT connotations, the term "architecture" does not.


Open Group goes into mining
Has Open Group absorbed this "reference model" whole, undigested, as it has done with Archimate? To me, Open Group looks now more like an anaconda that swallows whole its prey only to digest it later, if at all. And the EM looks like a quick add-on aimed to quell the unrest on the business oriented approach TOGAF promised for some time now. The problem is that the EM model cannot be generalised. The EM model is too specific to be of use to any other industries. What would "Discover", "Rehabilitate", "Brown", "Green fields"... mean to other industries? And, as an observation, the few horizontal process bands, that is Control, Measure... seem to have no relationship to the entities (read boxes) on the horizontal.


There's still a security disconnect on BYOD
More than half of the employees surveyed feared that the company would gain access to their personal data via corporate security tools. Some 46% of workers said they feared personal data would be lost if they left the company. The same number feared a company-mandated security app installed on personal devices would let managers track their location.Nearly half of worker said they would stop using personal devices at work if they were required to install a company-mandated security application. The surveys show the need for better communication between IT organizations and workers on BYOD security, Malloy said.


Chief digital officers are a blessing and a curse for CIOs
Adding a CDO to the mix could be a blessing for CIOs. According to the speakers at the conference, CDOs tend to know code, understand the importance of clean data and get technology. Because CDOs want to create a seamless, user-friendly customer experience, they're natural partners for CMOs. They're also a natural ally for CIOs. They understand, for example, that CMOs are powerful, necessary and "don't understand the first thing about technology," said Jonathan Sackett, CEO of the marketing and advertisement firm MashburnSackett in Chicago. But CDOs could also be a curse for the CIO: CDOs may know IT but their work isn't about keeping the lights on, obsessing over data governance or finding ways to cut costs. Chivers said he'll spend 2014 focused on mobile commerce and mobilizing the digital customer experience.



Quote for the day:

"Everyone needs to be valued. Everyone has the potential to give something back." -- Princess Diana

July 13, 2014

Random Thoughts..
Sometimes you have to chuck it all, and start all over again, (sigh). So I did, and if you've visited this article before, you will notice that all the methods I tested previously to create random data have vanished.. but trust me, that's a good thing. So, I spent last night racking my brain, trying to figure out how to make this stronger, that is, fortify it against any attempts at reversal, and at the same time, perhaps produce even better random from an algorithm. What follows, is the best ideas I've had to date, combined in a way that I believe creates a better random generator, better then anything I have come across thus far in my research. For lack of a better name, I'll call it LOKI, because it is a tricky and unpredictable little fellow.


Can Enterprise Architecture Reinvent Itself for the Agile Movement?
Clearly, we need to re-invent Enterprise Architecture to retain its best features and avoid technical debt while adapting to the new realities of agility and the cloud. How on earth do we do that? ... Please note that I’m not advocating any abdication of EA responsibility. We need a clear central vision of what we’re building to avoid technical debt and ensure that systems mesh together well. However, the way we accomplish this must change with the times. We need to be able to clearly and quickly communicate our vision and become active evangelists for it, contributing to real work as we encourage our team members to do the right things.


“Governance Now” for Financial Reference Data Governance
Reporting and analytic functions are often hostage to the integrity and long-term quality of reference data. The consistent use of valid, accurate reference data values is critical to reporting because these values often drive reporting dimensions for sorting, grouping sub-totaling and other calculations. Long-term consistency is critical for basic trending and period over period comparisons. Multi-dimensional and new forms of analytics rely on consistent accurate values to produce fully populated, sorted and calculated views of enterprise performance. Gaps in dimensional stability related to reference data quality impairments have driven major product categories in the software business to support multiple dimensional analysis (anyone here remember Razza?).


Quantifying the Impact of Agile Software Development Practices
The flexibility designed into the tool permits integration into a variety of workflows – rather than forcing the user to conform their workflow to the tool design. This flexibility turns out to be a significant source of variation for a research effort like ours because it limits the number of assumptions we can make about the workflow generating the data. As a result, the level of variation present in the data was an obstacle – one that cannot be overcome without information on patterns of practice (workflow design) that allow us to make valid inferences about patterns of team behavior that correspond to patterns of performance in the data.


The Value of Information Governance: Finding the ROI
Information governance is the set of multi-disciplinary structures, policies, processes and controls implemented to manage information. Gartner states that "the goal of information governance is to ensure compliance with laws and regulations, mitigate risks and protect the confidentiality of sensitive company and customer data." More than another word for "records management," information governance aims to support an organization's regulatory, legal, risk, environmental and operational requirements.


Out-of-band Initial Replication (OOB IR) and Deduplication
Ah… so if you were expecting that the VHD data would arrive into the volume in deduplicated form, this is going to be a bit of a surprise. At the first go, the VHD data will be present in the volume in its original size. Deduplication happens as post-facto as a job that crunches the data and reduces the size of the VHD after it has been fully copied as a part of the OOB IR process. This is because deduplication needs an exclusive handle on the file in order to go about doing its work. The good part is that you can trigger the job on-demand and start the deduplication as soon as the first VHD is copied. You can do that by using the PowerShell commandlet provided:


The Difference Between Tools and Solutions for Data Governance
The point is, any tool can take on a job and do as it’s told to do – but who sets the policy and strategic planning to instruct those tools? Data governance is a journey, which not only requires tools, but also an intuitive master plan that incorporates process, objectives and measurable results. It follows a path that should be guided by best practices. Solutions developed and lessons learned should be reusable and applied to reduce rework and maintain consistency in future projects. Because data governance is data-intensive, attention should be paid to assessing which data is or is not valuable to the business. This can be defined as “field value” versus “context value.”


Big Data Governance Software: Sensitive Data
The pivotal advantage to employing Dataguise’s Big Data Governance software (which is effective on traditional data as well) is that it expedites and automates the process of implementing governance rules for sensitive data that is potentially discoverable. The traditional manual process involves creating governance policies and employing IT to modify and search through information systems to find and appropriately tag sensitive data. When such information involves Big Data (with their rapid velocity and myriad forms) found in time-sensitive financial and health care industries, such a process swiftly becomes outdated.


Cindy Walker on Data Management Best Practices and Data Analytics Center of Excellence
There are several trends taking place in the field of semantics. One trend is the industry-focused collaboration efforts to develop and link domain-specific standard ontologies, such as the Financial Industry Business Ontology (FIBO), to facilitate information sharing and regulatory reporting. Use of standard ontologies can help organizations connect disparate data sets and can enable semantic queries across the web and data sharing with internal and external stakeholders easily (without restructuring the data or developing point to point interfaces.) FIBO is being developed in phases by volunteer contributors in the financial services industry (with some financial regulator participation) unbestyder the authority of the Object Management Group.


Implement Observer Pattern in .NET (3 techniques)
The Observer Pattern a.k.a. Publisher-Subscriber Pattern. You'll find various articles on how to implement the observer pattern in .NET framework using the assemblies provided in the framework. BUT, .NET framework has evolved over the years and along with that it has also been providing new libraries for creating the Observer Pattern. To give you all a brief idea of the Observer Pattern, it defines a one-to-many dependency between objects (Publisher and multiple Subscribers) so that when one object (Publisher) changes state, all the dependents (Subscriber) are notified and updated automatically.



Quote for the day:

"The most rewarding things you do in life are often the ones that look like they cannot be done. " -- Arnold Palmer

July 12, 2014

Virtual Panel: Real-world JavaScript MVC Frameworks
The Web Platform has gone a long way since HTML5 was first made popular and people started looking into JavaScript as a language that could do build complex apps. Many APIs have emerged and there is an abundance of content out there about how the browser can leverage all this. This specific article series will go a step further and focus on how these powerful technologies can be leveraged in practise, not to building cool demos and prototypes, but how real practitioners use them in the trenches. ...We'll also talk about technologies (like AngularJS) that go a step further, and define the future of how the standards and web development will evolve.


A new kind of network.
The challenge of building a network that allows us to connect based on who we “are” rather than other, more traditional, social constructs is that personal identity is much more complicated than concepts like “your friends” or “who you worked with”. Personal identity is hard enough for us to come to terms with ourselves, much less design a service around. However, there does seem to be potential here. It just doesn’t make sense that we should construct our social networks in the future based on physical categories like “where you happened to be born”, or “where you went to school”, or “where you worked’, when we are connected through digital means to every person on the planet.


The Efficiency CIO vs the Agility CIO
First with my EA hat on. For those who have talked to me about Enterprise Architecture you may have heard me espouse the view that it is frequently focused on efficiency. EA is a great tool for mapping out current state and understanding change. Two of the key outcomes of EA are highlighting gaps in change, infrastructure, applications and the organization as well as highlighting duplication. Duplication obviously yields opportunities for rationalisation and efficiency with what is typically an easy business case to assemble. As an EA it can be easy to become focused on making investments in IT highly efficient, keeping a simpler applications architecture and making the right large investments in IT.


Data Security And What Keeps CISOs Up At Night
Security personnel are increasingly having to think about the location of their data in a world where data is becoming ever-more distributed. That and the concerns that organizations have about governmental and private surveillance are yet another burden these overworked folks need to shoulder. Data security looks fundamentally different to how it looked in the past. There truly are no hard parameters for data: it exists within organizational premises, in the cloud, on all manner of social media, on mobile devices of every flavor and, increasingly as we move towards the Internet of Things, on distributed sensors. A recent survey aims to expose the biggest issues that data security staff have to face.


Big Data: No Hoarding Allowed
"We would highly discourage storing it in a fashion that's sort of the definition of big data -- where you have it in some SSD environment on Amazon, or on a rack of servers that are costing you a fortune -- because you're not getting value out of it," he said. "You're not asking questions because it's just too big." Still, companies often become data hoarders. "They're living in the hoarder's environment," said Atkinson. "They're taking in all the data and putting it into a repository." One alternative: Rather than saving every bit, companies should determine the questions they want to ask of their data, and then store the indexes they really need, a move that "will take your data down by many factors," he claimed.


Cloud computing: Sky is the limit for IT firms
"We see flavours of cloud computing in most of our large outsourcing contracts," said Anand Sankaran, president and global head of infrastructure and cloud computing at Dell. "Though the cloud component in large contracts could be only 20-25 per cent of the total order, it has 80 per cent of the weight in the final decision." Sankaran added if any Indian infotech services provider was not making serious investments into creating capabilities around cloud computing, it was making a big mistake.


Dataguise Offers Data Governance Solution For RDBMS And Apache Hadoop
Dataguise for Data Governance enables organizations to easily declare policies, discover sensitive data, view and track entitlements, and audit access to sensitive data – automated across transactional databases, data warehouses, file shares, Apache Hadoop, and other Big Data sources. Initial supported platforms include Oracle, IBM DB2, SQL Server, Teradata, Cloudera, Hortonworks, MapR and Pivotal HD. Dataguise for Data Governance is fully compatible with DgSecure, Dataguise’s flagship platform for data privacy, protection and security for sensitive data across the enterprise.


The true impact of Heartbleed on the enterprise
As the Heartbleed OpenSSL incident became more widely known, the digital certificate-issuing authorities around the world also found themselves challenged to support the massive and sudden demand that literally appeared overnight at their collective doorstep. Although not a lot has been written about what is essentially a supply chain issue having to do with equipping the relevant parties with enough new digital certificates in time, industry experts agree that this delay points to broader fundamental issues that are worthy of being addressed in the near future from a supply chain and infrastructure viewpoint.


IT pros shouldn't expect a real vacation
Digital transformation efforts are ramping up from start-up mode to active enterprise deployment, according to a new survey from McKinsey & Company. In a report entitled "The Digital Tipping Point," the research firm notes that a majority of CIOs, CEOs and CMOs are now involved in digital projects. "And a significant number of executives feel that digital will play a prime role in driving organizational growth for the next several years," says an article at CIO Insight. Despite the increased activity, however, there remain a number of obstacles to successful digital transformation at many organizations.


How cloud computing can strengthen IT's control
Ironically, as organizations use more and more cloud resources, IT has a new way to reassert itself, even if users continue to get their own services. That way is the service catalog, a collection of public cloud and local services stored in a huge registry, much like in the days of SOA. These services are tracked in terms of who can use them and how they use them, and the service catalogs become the single jumping-off point for building and deploying applications that use public cloud services, as well as traditional systems. IT can bring order to chaos, while still providing the benefits of flexibility and immediacy that got users to go to the cloud in the first place.



Quote for the day:

"You can't talk yourself out of problems that you behave yourself into" -- Steven Covey

July 11, 2014

6 Crucial Data Security Lessons the U.S. Can Learn from Other Countries
Silicon Valley may have led the digital revolution, but Washington shows few signs of adapting to the times. As a result, not only is it easier to vote for a YouTube video than for a politician, but countries like Estonia are focusing their resources and building their infrastructures to better manage a digital society. Estonia is already more advanced than the U.S. in terms of digital consciousness. Other nations like Indonesia are rapidly becoming more connected without the legacy infrastructure package present in more established countries. Soon, Indonesia will be entirely mobile. The U.S. needs to make major changes to its data infrastructure to keep up, and the first step is to mimic these innovations already in place around the world.


Cloud Security Brokers Play a Key Role
As enterprises large and small embrace cloud computing, including SaaS, a need arises for someone to sit in the middle and manage the connection between SaaS service provider and user. Enter the cloud access security broker, or CASB. The research firm Gartner placed the cloud access security broker at the top of a list of the 10 most important technologies for information security that it unveiled at the Gartner Security & Risk Management Summit held in late June, in National Harbor, Md. Gartner defines CASBs as "security policy enforcement points placed between cloud services consumers and cloud services providers to interject enterprise security policies as the cloud-based resources are accessed."


Microsoft CEO Nadella: Windows is over, the future is mobile and the cloud
"More recently, we have described ourselves as a 'devices and services' company. While the devices and services description was helpful in starting our transformation, we now need to hone in on our unique strategy." So what is the new direction? It's a bit vague and hazy, but it's clearly not tied to Windows. In fact, he doesn't even get to mentioning desktop Windows until the 21st paragraph. Even then, he gives Android and iOS equal play with Windows, because he talks about the company's Enterprise Mobility Suite, which in his words enables "IT organizations to manage and secure the Windows, iOS and Android devices that their employees use, while keeping their companies secure."


The dentist will scan you now: The next generation of digital dentistry
The best integrated technology in the dental practice may have been the most humble: scheduling software on the computer in the exam room that enabled the hygienist to book my next appointment so it would coincide with the dentist's schedule and her schedule, and to provide me with the dentist's email address so I could follow up if I had any questions. Despite the promise of robotic dentistry, there's still no replacement for a professional, kind human on the horizon any time soon.


The Amazing Big Data World of Kaggle and the Crowd-Sourced Data Scientist
Although it is frequently reported that they have “over 100,000 data scientists”, these are actually registered users and competitors rather than employees. There are no qualification or experience barriers to registering as a Kaggle data scientist, previous winners have ranged from data science academics and professionals to enthusiastic, knowledgeable amateurs. However certain competitions are occasionally reserved for “masters” – those who have shown they have the right stuff through their previous work with Kaggle. The company also also recruit its own staff to work on internal projects. In fact they are advertising for recruits now – and although no requirements are listed, other than that applicants be “experienced”, two questions on the application form ask for the mean and standard deviation of two sets of numbers.


The Failure of the Modern Project and How We Fix It
A project is a relatively simple construct which has taken on gigantic proportions in IT. A project is simply a means of changing our current state to some future state using a series of tasks within an allotted timeframe. The project itself is a tool to accomplish a goal and the goal is almost never about completing the project. I do admit that certain compliance projects are time sensitive as well as certain time to market projects. But effectively, someone comes up with an idea which should accomplish a business goal. Whether the goal (performance driven) or the idea (innovation driven) comes first does not necessarily matter as long as they both end up measurable.


What is a Botnet?
Computers in a botnet, called nodes or zombies, are often ordinary computers sitting on desktops in homes and offices around the world. Typically, computers become nodes in a botnet when attackers illicitly install malware that secretly connects the computers to the botnet and they perform tasks such as sending spam, hosting or distributing malware or other illegal files, or attacking other computers. Attackers usually install bots by exploiting vulnerabilities in software or by using social engineering tactics to trick users into installing the malware. Users are often unaware that their computers are being used for malicious purposes.


Is Enterprise Architecture Completely Broken?
In fact, the notion that the practice of EA has become all about documentation rather than effecting business change is a common theme across many boardrooms and IT shops. EA generally centers on the use of a framework like The Open Group Architecture Framework (TOGAF), the Zachman Framework™, or one of a handful of others. Yet while the use of such frameworks can successfully lead to business value, frameworks like TOGAF and Zachman “tend to become self-referential,” according to Andreetto, where EAs spend all their effort working with the framework instead of solving real problems. “Frameworks are cocaine for executives – they give them a huge rush and then they move to the next framework,” he adds.


eBook: Entity Framework Code First Succinctly
Follow author Ricardo Peres as he introduces the newest development mode for Entity Framework, Code First. With Entity Framework Code First Succinctly, you will learn the ins and outs of developing code by hand in Code First. With this knowledge, you will be able to have finer control over your output than ever before.


Navigating Innovation’s Perilous First Mile
“Either end of the spectrum is dangerous. At one extreme is ‘paralysis by analysis.’ Too many innovators create elegant pieces of Microsoft fiction. The Excel spreadsheet features ‘what if’ analyses and pivot tables that would rival those created by a seasoned investment banker. The PowerPoint document is stunning, with charts and visuals comparable to Al Gore’s award-winning presentation on climate change. And the Word memo summarizing it all features prose that is so lucid that somewhere Malcolm Gladwell is shedding a tear. The plan looks airtight on paper, but in reality, it is incredibly brittle. As Intuit’s Scott Cook once quipped, ‘For every one of our failures, we had spreadsheets that looked awesome.’



Quote for the day:

"Chance has never yet satisfied the hope of a suffering people." -- Marcus Garvey

July 10, 2014

Controversial data center building and operation practices
There are many new and exciting data center building design, configuration and operation choices, but many of them involve trade-offs. These newer standards and best practices have adherents and detractors, and potential detrimental effects or poor return on investment won't always be immediately obvious. Even some standards required by building codes are nonetheless controversial. The specific concerns surrounding hot-aisle containment designs and safety warrant their own discussion.


The Impact of Big Data on Linguistics
Linguistics is an area that is constantly changing from one day to the next. There’s no stopping the evolution of language, and with the web and social media the speed at which it’s evolving has increased dramatically.There are so many contributing factors to language that impact how and when it changes that it can be extremely difficult to track and completely understand what about the language is changing and why it’s changing. Big data technology, like Hadoop Hive, is vital in assisting interested parties in gaining deeper and clearer insights into linguistics. It simplifies processes from weeks and months to seconds and minutes. It opens up possibilities that weren’t available before. Big data takes linguistics to the next level.


Provisioning versus Configuration
It is important to recognize the difference between these two steps in the deployment process and take into consideration the impact of configuration after provisioning on that process. Depending on the method of configuration, this step can have a serious impact on the speed and efficiency of the deployment process as a whole. It is also important to note for monitoring purposes, as virtual machine health and status is not the same as the health and status of the service, whether that be an application or a network service. Both must be monitoring and managed in a virtualized infrastructure to meet MTTD (mean time to detection) and MTTR (mean time to resolution) objectives.


Botnet aims brute-force attacks at point-of-sale systems
Micros Systems is based in Columbia, Maryland, and provides software applications, services and hardware systems, including POS terminals, to the hospitality and retail industries. If the BrutPOS malware successfully guesses the remote access credentials of an RDP-enabled system it sends the information back to a command-and-control server. Attackers then use the information to determine whether the system is a POS terminal and if it is, to install a malware program that's designed to extract payment card details from the memory of applications running on it.


Building A Security-Aware Culture
Awareness and training is one of the most effective elements to any information security program because most of the risks that organizations face are caused by user error, misconfiguration of systems or mismanagement. In fact, according to IBM’s 2014 Cyber Security Intelligence Index, 95% of all attacks in 2013 involved some type of human error, the most prevalent being an employee double clicking on an infected attachment or URL. The goal of an information security awareness and training program is to stop these errors from taking place by educating users on their responsibilities for ensuring the confidentiality, integrity and availability of information as it applies to their roles within the organization.


My “Desert Island Half-Dozen” – recommended reading for resilience
When I speak with customers, they often ask how they can successfully change the culture of their IT organization when deciding to implement a resilience engineering practice. Over the past decade I’ve collected a number of books and articles which I have found to be helpful in this regard, and I often recommend these resources to customers. I’ve included my favorites below, in no particular order, with a short explanation of why I’m recommending them.


Shift Left Performance Testing - a Different Approach
This article will explain a different approach to traditional Multi User Performance testing; using the same tools but combine them with modern data visualisation techniques to gain early insight into location specific performance and application areas that may have "sleeping" performance issues. Most programs concentrate first on functionality and second on anything else. Multi User Performance Testing, performed with tools like HP LoadRunner or Neotys Neoload, usually is one of those activities that happen late in the testing cycle. Many times this happens in parallel with User Acceptance Testing when the new system is already exposed to the end users.


Finance Analytics Requires Data Quality
A main requirement for the data used in analytics is that it be accurate because accuracy affects how well finance analytic processes work. One piece of seemingly good news from the research is that a majority of companies have accurate data with which to work in their finance analytics processes. However, only 11 percent said theirs is very accurate, and there’s a big difference between accurate enough and very accurate. The degree of accuracy is important because it correlates with, among other things, the quality of finance analytics processes and the agility with which organizations can respond to and plan for change.


Considering cloud service tiers
As enterprises move to public cloud-based resources, the use of application and data categories will play more important roles, for the same reasons listed above. For instance, there are public cloud storage services that are guaranteed to support SLAs (service level agreements) that approach 100 percent up time, but the costs are much higher per gigabyte of storage. Of course, there are public cloud services that don’t offer the same amount of up time, but charge way less. You need to match the right storage or compute services to the right use of those services by application tier, based upon cost-to-value. Again, we’ve been doing this for years with hardware and software, now we’re just extending this to the use of cloud-based services. The concepts should not be new, for most enterprises.


The Right Fit: The Enterprise Architect Selection Dilemma
With the increasing focus on mapping Enterprise Architecture value towards delivering business outcomes, it may be time to start re-evaluating the process of hiring and career development of this vital role. And there are organizations that have recognized this. Waddell and Reed’s listing on LinkedIn, if it is still up, is a good example of a well-defined EA role. IASA’s skills matrix and job descriptions for architects can also serve as a useful reference for this purpose. IASA’s EA job description lists around fifteen distinct job responsibilities, with additional sub-items around knowledge management and engagement. IASA also lists twenty separate criteria covering education, skills and experience for an Enterprise Architect.



Quote for the day:

"Leadership cannot really be taught. It can only be learned." -- Harold S. Geneen

July 09, 2014

The Agile BI Ship has Sailed — Get On Board Quickly or Risk Falling Behind
Do not use the term Agile BI synonymously with the terms intuitive and user friendly — two hugely overused and hyped terms in BI. Unfortunately, these terms are highly subjective and qualitative. Point-and-click, drag-and-drop GUIs may be intuitive to an experienced professional with a background in command line interfaces, but not so obvious to a millennial who grew up with a thumb-typing mobile phone UI. And while menu- and prompt-driven instrumented (radio buttons, dialog boxes, etc.) applications may seem user friendly to left-brained people (who think in numbers and lists), right-brained office workers (who see the world in pictures and associations) may prefer an application driven by icons, visual associations, and artistic Infographics.


Want to innovate? Become a "now-ist"
“Remember when people used to try to predict the future?” In this engaging talk, the head of the MIT Media Lab skips the future predictions and instead shares a new approach to creating in the moment: building quickly and improving constantly, without waiting for permission or for proof that you have the right idea. This kind of bottom-up innovation is seen in the most fascinating, futuristic projects emerging today, and it starts, he says, with being open and alert to what’s going on around you right now. Don’t be a futurist, he suggests: be a now-ist.


Google Tests Personal Data Market To Find Out How Much Your Personal Information Is Worth
Unsurprisingly, people value certain kinds of information more highly than others. But exactly how they value it depends on a complex set of other factors, such as the conditions under which information was gathered. The experiment involved a kind of living lab in Italy that monitored people continuously. The team recruited 60 people to take part in the study and gave them each a smart phone that recorded phone calls made and received, which applications were in use at any time and the time spent on them, the users’ locations throughout the day and the number of photographs taken.


How to dilute the value of analytics
Business Intelligence (BI) can mean many things to many people, but generally BI is associated with business reports. When you fold business analytics (BA), especially advanced analytics that are predictive or prescriptive, under the BI umbrella you inherently dilute the value proposition that analytics can provide to an organization. Why is this important? Because everyone knows analytics is hot, so everyone today is selling some kind of analytics. When we allow business analytics to be synonymous with BI, we allow everyone's claims that they can "do analytics" appear to ring true.


Free ebook: Rethinking Enterprise Storage: A Hybrid Cloud Model
Rethinking Enterprise Storage: A Hybrid Cloud Model describes a storage architecture that some experts are calling a game changer in the infrastructure industry. Called the Microsoft hybrid cloud storage (HCS) solution, it was developed as a way to integrate cloud storage services with traditional enterprise storage. The author, Marc Farley, works at Microsoft on hybrid cloud storage solutions as a senior marketing manager. The book includes a Foreword by storage industry expert and noted blogger Martin Glassborow, better known in the industry as Storagebod.


This is what the new hybrid cloud looks like
Leong says hybrid cloud management is not about bursting, instead customers should think about supporting two basic IT environments today: an old one and a new one, what she calls “bi-modal’ management. The old environment is typically a company’s system of record that is heavily customized to the organization’s specific use case and serves a core function for the business. The new IT environment is where the company pursues leading edge projects; applications and software are developed rapidly, with fast iterations and quick launches. And IT has a challenge: “You don’t want your old stuff to slow down your new stuff,” Leong says. “If you try to blend those two you’ll end up doing neither one well.”


CloudPhysics Adds Virtual Storage Troubleshooting Service
Cloud Physics is a new kind of online monitoring company that analyzes the data from many customers to see what's working where and what isn't. Then as fresh trouble brews, its analytics system consults the knowledge base and alerts customers to the remedies. Its monitoring service can spot underlying hardware issues, such as firmware bugs or device incompatibilities, as well as report on the overall operational health of a virtualized environment. Unlike other systems monitoring, however, it claims to be predictive and prescriptive, allowing customers to take actions that head off trouble before end users are inconvenienced or systems are brought to a halt.


Panel tackles how to make mobile devices as secure as they are indispensable
As smartphones have become de rigueur in the global digital economy, users want them to do more work, and businesses want them to be more productive for their employees — as well as powerful added channels to consumers. But neither businesses nor mobile-service providers have a cross-domain architecture that supports all the new requirements for a secure digital economy, one that allows safe commerce, data sharing and user privacy. So how do we blaze a better path to a secure mobile future? How do we make today’s ubiquitous mobile devices as low risk as they are indispensable? BriefingsDirect recently posed these and other questions to a panel of experts on mobile security:


Simplifying IT Pays Off With Big Savings, Better Business Success
IT organizations that support demanding business requirements often find they need to support greater levels of complexity. The business side wants better accessibility for users and easier access into customer data. Ironically, as technology gets simpler for end-users its gets more complicated behind the scenes. Complexity is a fact of life for IT professionals, but according to a new IDC study, corralling that complexity can save enterprises big-time and improve business outcomes.


Architecting for big data
The disjunction between accurate and fast will only grow as big data gets bigger. As the Internet of Things (IoT) moves in, IT departments will face ever more infrastructure bottlenecks. Jarr said the three most common points of congestion are ingesting more and new sources of data, developing processes to quickly access that data to make data-driven decisions, and producing faster analytics for the business. Removing the roadblocks will "take fast data and start making it very smart data," he said. The problem may be that IT has simply outgrown its legacy relational database management systems (RDBMS).



Quote for the day:

"I hear and I forget. I see and I remember. I do and I understand." -- Chinese Proverb

July 08, 2014

Use virtual volumes vs. SDS in the fight for storage efficiency
Freewheeling application cut and paste is just the beginning of the benefits, advocates say.Software-defined storage also means you don't need to add steps to provision new storage to the guest application when needed, or to ensure the proper services are associated with the new storage (data protection services, thin provisioning, deduplication and so on), or to change parameters and processes for managing storage with each configuration change. These things would all be enabled in the brave new world of server-attached, software-defined storage in a way they never were in legacy SAN or NAS, according to evangelists.


Comparing Cloud Compute Services
Comparing cloud compute or servers is a different story entirely. Because of the diverse deployment options and dissimilar features of different services, formulating relevant and fair comparisons is challenging to say the least. In fact, we've come to the conclusion that there is no perfect way to do it. This isn't to say that you can't - but if you do, or if you are handed a third party comparison to look over, there are some things you should keep in mind - and watch out for (we've seen some poorly constructed comparisons). The purpose of this post is to highlight some of these considerations. To do so, I'll present actual comparisons from testing we've done recently on Amazon EC2, DigitalOcean, Google Cloud Platform, Microsoft Azure and SoftLayer.


Larry Page on Google’s Many Arms
Mr. Page, who was joined in the interview by Sundar Pichai, the executive in charge of Google’s Android and Chrome software projects, did not seem overly bothered by the outbursts. “We’re in San Francisco, so we expect that,” Mr. Page said of the protests. “There’s a rich history of protest in San Francisco.” Mr. Pichai pointed out that the company had introduced initiatives to improve its relationship with city residents. This year, it gave $600,000 to the city to bring free Wi-Fi service to San Francisco parks. “I think in some ways it’s good that there’s an open debate about it and I think we needed it,” Mr. Pichai said. “There’s been a lot of growth and the area is trying to adapt to that growth and that has been a concern.”


Databricks Unveils Spark as a Cloud Service
“One of the common complaints we heard from enterprise users was that Big Data is not a single analysis; a true pipeline needs to combine data storage, ETL, data exploration, dashboards and reporting, advanced analytics and creation of data products. Doing that with today’s technology is incredibly difficult,” said Databricks founder and CEO Ion Stoica. “We built Databricks Cloud to enable the creation of end-to-end pipelines out of the box while supporting the full spectrum of Spark applications for enhanced and additional functionality.” Spark provides support for interactive queries (Spark SQL), streaming data (Spark Streaming), machine learning (MLlib) and graph computation (GraphX) natively with a single API across the entire pipeline.


MapR Looks to Enhance Hadoop Accessibility with App Gallery
“Hadoop is a wonderful platform for doing large scale analytics on all different types of data, as long as you have got the right people running it that know what to do with it,” said John Webster, Senior Partner at Evaluator Group. “And sometimes those people can cost a lot of money. So there has been desire from the enterprise side to say, ‘Look, can you give us something easier to use to manipulate and get value from Hadoop other than going out and hiring the expertise?’ So this app gallery starts to fill that hole.” The app gallery also makes it easy for developers to submit their applications.


Top hardware firms join forces on IoT standards
The OIC is focused on defining a common communications framework based on industry standard technologies to connect and manage the flow of information across IoT devices. The goal is to design of products that intelligently, reliably and securely manage and exchange information under changing conditions, the group said in a statement. "Open source is about collaboration and choice,” said Jim Zemlin, executive director of The Linux Foundation. “The Open Interconnect Consortium is yet another proof point how open source helps fuel innovation," he said.


Rollback and Recovery Troubleshooting; Challenges and Strategies
Changes to the structure and code of your databases can go seriously wrong, leading to down-time and data loss. Obviously, you’ll do anything possible to prevent this happening but this will just reduce the probability of things going wrong. The chance still exists of having a failed deployment, and you need to have effective ways of recovering from an event like this as quickly and effectively as possible. Have you the best possible ways to ensure that you can smoothly recover from your deployment disasters? What are the trade-offs of these various approaches? This article will walk through the different mechanisms you can use to ensure you have at least one effective documented procedure, hopefully more, to recover from, or even undo, a failed deployment.


Auto-Autonomy: Cars Are Racing Toward Disruption
The unbundling of features of cars such as keys, personalized maps and entertainment mean that I can walk up to a car, tap in and drive off comfortably. I can also summon an equally convenient ride with precise GPS location. These benefits are extended to commercial fleets of vehicles, which suffer these same inefficiencies on a microeconomic scale. You can see shared fleets of cars using sharing technology that keeps cars in use and reduces the number of cars on the road — better for the owners, better for the roads and better all around. Needless to say, fewer cars is a massive disruption to the auto industry.


There Are No 'Kodak Moments'
Kodak was a technical treasure-chest, but the problems that it faced were more marketing than technical, and had less to do with the product(s) than they did with the role that the products played in the customers’ lives. Kodak lacked the ability to either interpret those roles or articulate them in a way that could drive innovations with a higher probability of adoption. It undoubtedly did not help that Kodak attempted to reduce the risks it was under in the imaging business by diversifying (and dispersing scarce resources and top management attention) into such unfamiliar businesses as pharmaceuticals [with its purchase of Sterling Pharmaceuticals], which further blurred the vision of what the firm stood for and what it aspired to achieve.


Understanding the Android Resource System
A large part of any Android application falls under the category of resources. In this context, resources can include things like layouts, images, audio, video, language definitions, styles and so on. The resource system in Android is quite powerful, and while it may seem odd at first, there's a method to its madness. In this article, I'll walk through the basics of how this system works, and how you can take advantage of it in your apps. When you create a new Xamarin.Android application, some resources are provided by default, and can be found in several subfolders under the main Resources folder. I'll start by taking a look at those folders and files provided in the default project.



Quote for the day:

"The best way to have a good idea is to have lots of ideas." -- Linus Pauling

July 07, 2014

A Growing Backlash Against the Relentless Advances in Technology?
Sustained innovations are improvements to existing products and services that do not create new markets, often in response to the requirements of a company’s most demanding, existing customers.  Disruptive innovations, on the other hand, generally start life as simpler, more convenient, less expensive good enoughofferings that appeal to new or less-demanding customers. What makes them so dangerous to existing products is that, if allowed to gain a market foothold, they can get on a learning curve of rapidly improving quality and capabilities, and over time end up toppling the incumbents from their leadership position. Disruptive innovation is mostly about discovering new markets for new technologies, products and services.


As the digital economy ramps up, expect a new identity management vision to leapfrog passwords
The past three years have seen a huge uptick in the number and types of mobile devices, online services, and media. Yet, we're seemingly stuck with 20-year-old authentication and identity-management mechanisms -- mostly based on passwords. The resulting chasm between what we have and what we need for access control and governance spells ongoing security lapses, privacy worries, and a detrimental lack of interoperability among cross-domain cloud services. So, while a new generation of standards and technologies has emerged, a new vision is also required to move beyond the precarious passel of passwords that each of us seems to use all the time.


The trajectories of great software companies
Software buyers are second only to teenage clothing buyers when it comes to being fickle. The best vendors are those that capture as much market and mindshare as possible while the products are still perceived to be “hot." By inference, does this mean that the fastest growing vendors are necessarily the best? The fickleness of software buyers has been known for decades and some may assume that the most successful software vendors are those that scale extremely quickly. But, is a great software company one that grows slowly, moderately or rapidly?


With New Management On Board and Latest Release Out, CFEngine Gears Up for Growth
The new executive team has been revving up the CFEngine’s go-to-market strategy. The release of version 3.6 saw ease-of-use improvements like a visual dashboard for alerts and reporting. ... “There’s magic happening. We are quiet but confident,” said Kumar, who himself joined as part of the exec refresh in late 2013. “We now have a seasoned executive team with a track record of success. We have consistently heard that we have a technical advantage from analysts, press and customers. However, we didn’t do a good job in terms of mindshare. Now we’re about focusing on the right things – you can have great technology but you need a good go-to-market strategy.”


Getty Images Gains Visibility and Alignment with Kanban Portfolios 
Over time, the Agile transition for application development became quite successful. The next area of focus quickly became demand and portfolio management. Getty Images executives’, business owners, and technology management wanted to focus on improving the prioritization process, visibility into technology work, and predictability. ... Seeking a solution and prior to bringing in Rally Portfolio Manager, Getty Images evaluated high-end IT project portfolio management tools, but Agile and Kanban support from those products was limited or nonexistent, and enterprise IT PPM tools were too expensive for the company's budget and the product capabilities were overkill for the company's needs


Cyber Insurance: The Next Big Thing for Businesses
"The trend early on was tech, financial and health-care companies buying insurance. That still continues" said Tim Francis, who heads insurer Travelers' cyber division. "In the last couple of years you've seen more retail and manufacturing firms buying insurance and now you are seeing small- and middle-market firms buying too." While many of the headlines about cybercrime tend to be about attacks at large firms, The Ponemon Institute's "2014 Cost of Data Breach Study: United States" found a company with less than 10,000 records is more likely to be hacked than a firm with more than 100,000 records, in part because smaller firms are less likely to have robust defenses


Why is the CMO running so much IT? Big data, says Ford exec
Lenard added, "I am heavily involved in the measurement of the effectiveness of our media in the digital space, but also the technology to better target customers." When it comes to using marketing data to inform the next generation of vehicles that Ford will build, the marketing department is also playing a role in the decision-making process of customer-facing technologies -- traditionally the realm of the CTO. Lenard and her team are especially focused on what customers want (or will want) in terms of integrating connectivity and consumer tech into Ford cars and trucks. "[Then there] is the connected car arena -- absolutely something we are all looking at," said Lenard.


Cisco iWAN marries MPLS and Internet for WAN aggregation
In most cases, web and cloud traffic will be sent through the Internet connection, but not all internal traffic must be routed through the WAN. Applications that require dedicated bandwidth and QoS guarantees are often best suited to an MPLS WAN that can make those guarantees. But other applications don’t require those guarantees. Some traffic between branches and the data center can be safely routed via the Internet, further reducing the need for WAN capacity. Taking advantage of this cost savings requires accurately determining the application to which each packet belongs.


“Pivot Points” and knowing that every leader has a unique journey
If there is a secret successful leaders have, it is this: Leading is about creating the job and the leader’s value to the mission. This is a very different approach from conventional thinking that success comes with doing what worked for others. Leaders want to know how others handled similar situations and their outcomes. However, leaders take that as a creative spark and adapt it to their own goals and methods.


How CIOs can adapt to embrace developer-led innovation
Developers that work in large enterprises should be considered the internal engine of innovation to the companies they work for. However, it is regretfully the case that IT budgets remain relatively flat and more often than not the developers are being asked to quarterback new projects that deliver competitive advantage. The new era of the developerisation of IT is well underway and much like its predecessor, the consumerisation of IT, it’s all about making stakeholders’ – in this case the developers’ – lives easier by giving them more flexibility to focus on producing great apps and delivering valuable IP.



Quote for the day:

“Purpose drives the process by which we become what we are capable of being.” -- Lolly Daskal

July 06, 2014

Focussed topic: Service Oriented Architecture

Service Oriented Architecture: SOA
Services are a group of methods that contain the business logic to connect a DB or other services. Methods have clearly defined and published methods for use by the clients as a black box. So what is a black box? It's nothing but a system or an object that can be viewed in terms of its input, output and transfer characteristics without knowledge of its internal workings. Across the platforms these methods can be accessed, no matter what your client developing a UI in C# or Java or any latest technology. It decouples the business services from the technical services, in other words the service methods having the business logic is not coupled with the specific programming language, both will react independently.


Integrated Load Test Analysis
What makes the integrated approach to load testing critical to those of us who have only had access to the external, Web Load Test data in the past is that we can immediately draw correlations between events inside the datacenter and the performance effects we are capturing outside the firewall. By integrating a few key Web Load Test metrics (Average Response Time, Transactions per Minute, and Total VUs) with select PureStack metrics (Number of Confluence Requests in the last 10 seconds and CPU percentages), the team was quickly able to have in-depth information available to them throughout the load test. Finding this high load job was a bonus of the load test, which clearly pointed out that the system was undersized for the load that the Portal team was expecting.


How SMAC is empowering Business Process Management
When it comes to improving processes, visibility is one of the most important attributes of a platform. Most of the commercial BPM products now provide complete process visibility with real-time analytics to help business users quickly and easily make changes to processes. The built-in dashboards make it easier to recognize performance issues in real-time and take corrective actions when needed. In order to operationalize insights from big data, or apply contextual information from mobile engagements, business processes must be redesigned to apply those insights.


Service Oriented Architecture Quality Evaluation
This paper presents a semi-automated method for evaluating SOAs called SOAQE, correcting defects observed so far with existing methods such as lacks of pertinence and accuracy for evaluation results. SOAQE takes as a starting point the McCall model, describing software quality, which led to an international standard for the evaluation of software quality (ISO/IEC 9126-1, 2001). This model is organized around three types of quality attributes (factors, criteria and metrics). The SOAQE method consists in decomposing the whole architecture and evaluating it according to the McCall model, i.e. a list of quality factors arising from business needs grouping criteria composed by metrics


An Event-Driven Service-Oriented Architecture Model For Enterprise Applications
Enterprise Applications are difficult to implement and maintain because they require a monolith of code to incorporate required business processes. Service-oriented architecture is one solution, but challenges of dependency and software complexity remain. We propose Event-Driven Service-Oriented Architecture, which combines the benefits of component-based software development, event-driven architecture, and SOA.


The Open Group Open Platform 3.0™ Starts to Take Shape
The Open Platform 3.0 standard will have other common artifacts: architectural principles, stakeholder definitions and descriptions, and so on. Independently-developed architectures that use them can be integrated more easily. Enterprises develop their architectures independently, but engage with other enterprises in business ecosystems that require shared solutions. Increasingly, business relationships are dynamic, and there is no time to develop an agreed ecosystem architecture from scratch. Use of the same architecture platform, with a common architecture environment including elements such as principles, stakeholder concerns, and basic models, enables the enterprise architectures to be integrated, and shared solutions to be developed quickly.


Why Obama Administration Should Have Paid More Attention to Load Testing
It seems like those responsible for deploying the site didn't really appreciate the importance of load testing, which is especially surprising when you consider that the website had in fact failed a pre-launch load test miserably. Of course, politics came into play as the deadline for the website was non-negotiable. But with all the red flags warning of failure, load testing should have played a much more critical role ... big issue with HealthCare.gov was that the contractors claimed they didn't have enough time and felt extreme pressure to roll out the website before it was properly tested. If load testing occurred earlier in the website development phase, testers would have been able to identify the parts of the website that were not working properly.


Building and Testing a Microservice in a Service-Oriented Architecture
The microservice architectural style is an approach to developing a single application as a suite of small services, each running in its own process and communicating with lightweight mechanisms, often an HTTP resource API. These services are built around business capabilities and independently deployable by fully automated deployment machinery. ... One of the advantages of architecting your application in this style is that Microservices aren’t tied to a particular technology stack. This gave us the flexibility to choose technologies instead of defaulting to a technology that may or may not make sense.


Burn-Down or Burn-Out? How to Beat the Red-Sprint Agile Anti-Pattern
One of the key and often much underestimated benefits of working in agile teams, whether working on products or projects, is the idea of sustainable pace. Sustainable pace makes sure that the team retains its cool even under time pressure, which is common in software development. Those of you who have been part of agile teams will have noticed that achieving sustainable pace is not always easy. Either project management is chasing unrealistic estimates or is trying to prevent overruns or management expects ever-increasing productivity to meet a shorter time-to-market for their products.


Privacy vs personalization: The risks and rewards of engineered serendipity
“The notion of ‘designing for serendipity’ is an oxymoron because once we try to ‘engineer’ it into a system, users may no longer perceive the experience as serendipitous,” says Dr. Stephann Makri, a lecturer in Information Interaction at City University in London. “Designers of interactive systems shouldn’t try to offer serendipity on a plate. Instead, they should design tools that create opportunities for users to have experiences they might perceive as serendipitous.” Nonetheless this reworked notion of serendipity is here to stay on the web. With the rise of machine learning, a growing number of online publishers are using complex algorithms to learn from readers’ viewing habits and provide people with what they want to know before they know they want it.



Quote for the day:

"If you're not occasionally failing, you're not trying hard enough" -- Arthur Sulzberger Jr

July 05, 2014

Metadata: More Important Than We Ever Thought
Consider the routine way in which information about online behaviour is collected and analysed commercially. What's usually processed is not the content but the metadata. That means different things to different organisations, but at a simple level it might mean an ISP collecting the date, time, subject and recipient of an email but not the body content. Similarly, phone companies might log the date, time and recipient of a call but not the actual conversation. Why do they do this? The main reason is financial. Analysis of the bulk metadata allows them to infer useful information in order to better target their advertising and design new services that will appeal to their customers.


8 Brilliant Tools For Web Designers
Creating a website that is able to engage people requires creativity, skills and passion. Possessing the right tools can help web designers to shape up their ideas and concepts into lively designs. They can work more smoothly and their productivity will get boosted. Thus they would be able to create top notch designs and get applauded for their efforts. As there are so many tools around, choosing the right ones calls for investing time and effort. But we have made that search quite easy by providing a collection of immensely useful tools. All that designers need to do is to go through them and test these for their usefulness.


As security startups heat up, a reminder that security is not a product or service: it’s a value
The security industry is notorious for amplifying new threats and using scare tactics associated with emerging technologies to sell software, but you’re not being paranoid if someone is really out to get you. There are still plenty of criminals, and as technology changes rapidly security tools that were once useful are not necessarily so. . ... Technologies that were once the building blocks of IT security, such as traditional defense perimeter protections and end point antivirus solutions, are slowly losing relevance, as they are no longer effective in stopping data breaches or even employee misuse of corporate information.


Bangalore To Become Asia's First IoT Innovation Hub
Cisco has announced a strategic engagement with Electronics City Industries Association (ELCIA) to develop Asia’s first end-to-end Internet of Things (IoT) Innovation Hub in Bangalore. The company believes India’s fast growing Internet penetration will drive this collaboration and help Electronic System Design & Manufacturing (ESDM) companies and others of electronic city engaged in IoT product development. ...  the demand for electronics hardware in the country is projected to increase to $400 billion by 2020 and this initiative will help address domestic demand, allowing local manufacturers to capture this growing market opportunity and save precious foreign exchange for India.


The 3 Keys to Agile Content Development
Agile means using real-time interactions and behavior monitoring to drive a more agile approach to creating and deploying branded content focused around the consumer. It seems obvious now that any effective approach to content has to put the consumer at the center and must be able to adapt based on cultural trends and consumer insights. Brands have become comfortable with “making the logo smaller,” and marketers and strategists have devised elegant thinking around content creation, often comparing brands to publishers or broadcasters.  It’s certainly safe to say there’s a lot of commentary and strategizing around agile approaches to content creation--much of it, dead on.


Improve scalability with the SessionCache service
SessionCache Service allows session data to be stored in an object grid, so enterprise applications scale easily with better performance and without any of the previously mentioned multiple database server issues. In the Stone Age, application developers implemented session persistence. Today, since session persistence is so common, most application servers allow selection of a persistence target using server configurations. Application developers only interact with HTTP session APIs; the server configurations determine whether to persist and which technology to use for persistence.


Interacting with a World of Connected Objects
A few interesting things emerged for me — how much of organising your smart objects feels like a chore for people. There was lots of discussion about having to become a software engineer to understand the rule-making systems, and some conversation about how you should be able to buy some off the shelf structures like “Crate and Barrel’s Smart Home Ruleset” (I believe that was a Sierra-ism). There were another set of conversations about how hard these things were to set up and how much data and noise people might be expected to deal with. I don’t think I was particularly surprised by any of the particular issues people had with connected objects, but I was definitely surprised by how strongly people felt them.


Understanding and Using Regular Expressions
Damian Conway, a well-known member of the international Perl community, a widely sought-after speaker and teacher, and also the author of several technical books as well as numerous Perl software modules, discusses what regexes really are, how they actually work, and how programmers can make use of their existing software development skills to construct correct and efficient regexes. *Note: We're not able to use our standard split-screen view to show this, but wanted to bring it to you anyway.*


Cloud: The Road to African Innovation
Africa’s developers, entrepreneurs, and business leaders have unprecedented opportunities for innovation as a result of the cloud. But to make the most of them – and ensure the sustainability of emerging communities of “disruptors” and entrepreneurs – we need to clearly define what we want the continent’s cloud to be in terms of its accessibility, security, and collaborative potential. The cloud needs to be open – to cross-border and cross-platform development – if it is to be a truly effective platform for innovation. Supporting common standards like OpenStack, a free and open-source system for building clouds, needs to be a priority for both innovators and the organisations that sponsor them.


10 things I miss about old technology
Take a trip down memory lane as Scott Matteson shares some of his favorite memories about technology from way-back-when. ... Since Rob was born in the early 1970's like me, we both played a lot of the same games on the same computer systems. This book, in conjunction with shopping for tech gifts for my family (namely, iPad Minis for the kids), has provoked some nostalgia for the things I enjoyed during the olden days (hereby defined as the 1980s and 1990s) of technology, when I was a kid. Let's take a look at my 10 favorite things!



Quote for the day:

"Being easy-going when you have a goal to reach seldom makes the going easy" -- Frank Tyger