July 24, 2014

6 Ways To Create An Agile Company Culture
One of the best places to start is with the people who will be executing on your vision: your employees. How you hire, train, and integrate new staff members will set the stage for the agile culture you want to create, eliminating resistance down the road. You want to establish a level of trust among employees, encourage collaboration across teams, and instill in them the understanding that failing, and failing fast, is key to learning and furthering the overall development process. Here are some of the steps we've taken to build an agile company at eNovance.


10 Technologies That Will Transform PCs in 2015 and Beyond
You might write off PCs as archaic or boring. You might take for granted that they'll get faster, lighter, more power-efficient and more convenient to use over time. But if you stop and consider all the things that go into making a computer better, there’s actually a lot to be excited about. Here are 10 PC advancements that will transform PCs over the next several years.


Collection Pipeline
Collection pipelines are a programming pattern where you organize some computation as a sequence of operations which compose by taking a collection as output of one operation and feeding it into the next. (Common operations are filter, map, and reduce.) This pattern is common in functional programming, and also in object-oriented languages which have lambdas. This article describes the pattern with several examples of how to form pipelines, both to introduce the pattern to those unfamiliar with it, and to help people understand the core concepts so they can more easily take ideas from one language to another.


Smart Supply Network 3.0: The Next Big Thing?
“The internet of things is the result of connecting collectors, sensors, smart phones – all kinds of things – with the internet,” says Sherman, principal essentialist at Trissential. It is the natural follow-on to Web 1.0, “which was mostly static web pages,” and Web 2.0, “which was more interactive and collaborative,” he says. “Now we have this network of interconnected nodes that gives us unprecedented ability to connect people and things and all of the data in the supply chain.” Instead of a linear supply chain where things don’t work together, “we can now create an optimally performing network that I call the smart supply network – or, taking it one step further, Smart Supply Network 3.0,” he says.


Why Your High-Efficiency Data Center Needs Good PDUs
Power consumption in the data center continues to be a rising trend. The need to provide redundant power systems with high reliability and availability of compute resources is a major driving force for the increase in power utilization. Some data centers use just as much power for non-compute or “overhead energy” like cooling, lighting and power conversions, as they do to power servers. The ultimate goal is to reduce this “overhead energy” loss so that more power is dedicated to revenue-generating equipment, without jeopardizing reliability and availability of resources.


Dutch government can use spy data gathered illegally, court rules
Although the court admitted the possibility exists that intelligence agencies gather and potentially use information that wasn't collected in line with Dutch legislation governing such practices, it has ruled that collaboration with foreign intelligence agencies is necessary to ensure the safety of the Dutch people. Moreover, the Hague court noted that data gathered by foreign intelligence agencies is subject to less strict privacy rules than the information gathered by Dutch agencies.


10 More Robots That Could Change Healthcare
It is difficult to estimate just how many robots are wandering the halls of our local hospitals, because it depends on how you define robot. For instance, at least 800 hospitals use telepresence robots. These are rolling devices controlled by doctors and equipped with cameras and tools to allow for remote consultations. There are also "robot surgeons" like the da Vinci, which also require a human to operate them remotely. Both of these are innovative, but they aren't robots so much as remotely operated machines. We wouldn't call a remote control toy car a robot.


The 7 principles of highly effective innovation culture change programs
Innovation culture is one of the five cornerstones on which innovation success builds. The other four are strategy, processes, organization/management/governance and networks/ecosystems. Actually, two thirds of executives regard culture to be more important than the firm’s strategy or its operating model, as a 2013 study by the Katzenbach Center has found. Ex-IBM CEO Lou Gerstner, who led one of the largest business transformations in history, even went further by saying that “culture is everything.” Changing culture is not easy and one in two attempts will fail. This figure may come as a surprise given the fact that since the mid-2000s, organizational change management and transformation have become permanent topics on the management agenda.


Tim Cook talks about Apple's drive for business penetration
This is the first time Apple has acknowledged that those numbers don't give the full story about the iPad in the enterprise market. During questions Cook acknowledged that penetration in business is low -- 20% -- compared to notebook adoption, which he pegged at over 60%. He went so far as to say Apple wins if it can drive penetration from 20% to 60%. Those figures certainly match a lot anecdotal evidence about the breadth of iPad use across a range of industries. It also highlights the importance of the partnership with IBM. As the tablet market has matured in the U.S. and other developed countries, we've seen slower refresh cycles compared to smartphones.


Lessons Learned Building Distributed Systems at Bitly
Asynchronous messaging has its complexities, though, and in many occasions it can be more natural to handle a certain kind of operations synchronously. As examples of this, Sean mentioned that URL shortening is implemented at bitly as a fully synchronous operation, due to the requirement for it to be as fast as possible and consistent, meaning that the same shortened URL should not be returned to different users. On the other hand, analytics have different requirements altogether that make it a suitable candidate for going fully asynchronous. So, when bitly wants to collect and process some metrics data related to a user action on a link, it just enqueues it downstream, where it will be eventually dealt with without much concern for how long this will take.



Quote for the day:

"When nobody around you measures up, it's time to check your yardstick." -- Bill Lemly

July 23, 2014

Exploring Autonomous System Numbers
“The classic definition of an Autonomous System is a set of routers under a single technical administration, using an interior gateway protocol (IGP) and common metrics to determine how to route packets within the AS, and using an inter-AS routing protocol to determine how to route packets to other ASs. Since this classic definition was developed, it has become common for a single AS to use several IGPs and sometimes several sets of metrics within an AS. The use of the term Autonomous System here stresses the fact that, even when multiple IGPs and metrics are used, the administration of an AS appears to other ASs to have a single coherent interior routing plan and presents a consistent picture of what destinations are reachable through it.”


Weak encryption enables attacker to change a victim’s password without being logged
To understand this vulnerability, let’s first take a look at the protocols behind Active Directory’s Single Sign On (SSO) authentication – NTLM and Kerberos. SSO is what allows users to provide their password only once even though they access various services – whether in the corporate network or in the Cloud. As mentioned, the underlying SSO authentication protocols are NTLM and Kerberos. NTLM is the older Windows’ authentication protocol which, although still enabled by default due to backward compatibility reasons, suffers from security issues and so has been superseded by the Kerberos protocol.


3 Risk Management Functions for Secure Cloud Governance
While risk formats have changed in the industry, business continuity is said to be affected with the ushering in of cloud model. The pressure on cloud service providers is increasing in terms of identifying and tracking new risks emerging out of this trend, which sometimes has an adverse impact on the business. Sethu Seetaraman, VP& Chief Risk Officer, Mphasis, says that risk management basics do not change with cloud....“As far as BCP/DR is concerned, the organisation owns BCP/DR in case of Infrastructure as a Service and Platform as a Service. Service providers will own BCP/DR in case of Software as a Service. You must build or take these services from the cloud service provider based on the availability risk,” avers Seetharaman.


Insurers Think Inside the (Black) Box
For most P&C insurers, a lack of underwriting profitability has been a long-standing problem. According to Insurance Services Office Ltd., insurers have posted net gains on underwriting for just 21 of the 113 quarters since the company began collecting quarterly data. And external factors, including persistently low interest rates, the glacial economic recovery and increasingly intense competition, over which insurers have little control, are exacerbating the profitability challenge. As a result, underwriting, due to its historically manual nature and its potential to increase profitability and reduce complexity, has for many insurers become a target for innovation.


Could health apps save your life? That depends on the FDA
The vast majority of the health apps you’ll find in Apple’s or Google’s app stores are harmless, like step counters and heart beat monitors. They’re non-clinical, non-actionable, and informational or motivational in nature. But the next wave of biometric devices and apps might go further, measuring things like real-time blood pressure, blood glucose, and oxygen levels. You’ll begin to see these more advanced biometrics as we move from single-purpose fitness trackers like FitBit to more all-purpose devices like Apple’s upcoming “iWatch.” Some have wondered if the FDA, in its current form, is up to the task of regulating these increasingly sophisticated devices and apps.


BGP Best Path Selection Algorithm
Border Gateway Protocol (BGP) routers typically receive multiple paths to the same destination. The BGP best path algorithm decides which is the best path to install in the IP routing table and to use for traffic forwarding. ... Assume that all paths that a router receives for a particular prefix are arranged in a list. The list is similar to the output of the show ip bgp longer-prefixes command. In this case, some paths are not considered as candidates for the best path. Such paths typically do not have the valid flag in the output of the show ip bgp longer-prefixes command.


5 Ways To Truly Change Your Management Style
As is with each stroke of an artist’s brush, every management decision, every corporate downsizing and every improvement initiative reveals something about the culture executives are creating. Since information travels quickly, the impact from these actions is felt more rapidly than ever before. ... If you’re wondering what you can do to change things up – and improve – read on. We’ve identified the root causes of five typical management failures that erode throughput rates, operating expenses and employee engagement levels. Each of the problems is an opportunity to mend your organization’s health and increase cash flow. Fail to recognize these signs, however, and employee’s innovative capabilities, creativity and purpose will be stifled.


eBook: Android Programming Succinctly
In Android Programming Succinctly, Ryan Hodson provides a useful overview of the Android application lifecycle. Topics ranging from creating a UI to adding widgets and embedding fragments are covered, and he provides plenty of links to Android documentation along the way. Each chapter is conveniently summarized to ensure you get the most out of reading the book, and summaries include helpful suggestions for expanding your abilities in this growing app market.


Small cell device tech set to connect workplace Wi-Fi with 3G and LTE
Day predicts that Cisco's early success with MicroCells will be followed by an explosion in small cell sales over the next 12 months, as the company starts focusing on bringing the technology to indoor workplaces. Specifically, Cisco wants to connect 3G and LTE cellular networks to Wi-Fi access points that are already widely deployed in enterprise facilities. The networking giant proposes to primarily deploy small, low-cost devices called Universal Small Cells that can be clipped on to Cisco's Aironet 3600 and 3700 Wi-Fi access points (see photo).


Architecting for the Cloud: Best Practices
There are some clear benefits to building apps in the cloud: A scalable infrastructure, should your app suddenly go viral Almost zero upfront infrastructure investment Reduced time to market But in today’s “era of tera”, software architects need to cope with ever-growing datasets, unpredictable traffic patterns, and the demand for faster response times. This paper focuses in on concepts, principles and best practices in creating new cloud applications or migrating existing apps to the cloud. Discover how concepts such as elasticity have emerged due to the cloud’s dynamic nature.



Quote for the day:

"Executive ability is deciding quickly and getting somebody else to do the work." -- John G. Pollard

July 22, 2014

Backup your data now: New, more powerful ransomware using Tor spotted in the wild
Critoni “seems to be a strong, well thought piece of malware,” according to French security researcher "Kafeine," who has a good write-up and several screenshots. Kafeine reported that Critoni can be delivered by the Angler exploit kit, but attackers using different vectors have also been spotted in the wild. Basically that means this is not a one-size-fits-all attack; there is not just one way to end up getting infected. “Early detection is not possible,” according to the advertised list of “pros.”


RSA's security utopia requires China, US to be friends
RSA Executive Chairman Art Coviello urged the need for greater cooperation between nations and establish national and global policies that are appropriate for the current interdependent economy. He noted that while most governments and businesses recognize the world is more connected today than ever, they continue to behave as if they are not.  "We haven't really advanced that much in our thinking beyond where we were 100 years ago in the run-up to World War I. We pretend that geography, national identity, and incorporation are still the most meaningful dividing lines, ignoring the fact that the digital world has blurred those lines beyond recognition," Coviello said.


Whitepaper - Creating a Data Quality Strategy
In the 21st century, the majority of data managers and consumers understand the importance of accurate robust data. We know that our data warehouses, CRM systems, ERP systems, and business intelligence reports are compromised if the data we feed them is suspect. To realize the full benefits of their investments in enterprise computing systems, organizations must have a plan how to monitor, cleanse, and maintain their data in a quantified state.


7 considerations when moving on-premise software to cloud
To cloud or not to cloud is the question that many software vendors are currently facing. Should they continue to offer their software as on-premise or move to a cloud-based model? A move to cloud computing is a win-win scenario for cloud vendor and customers alike. As a cloud vendor, you get to benefit from the economies of scale, while your customer gets to benefit from additional capabilities that cloud brings at a lower cost of shared infrastructure. ... When you’ve made up your mind to migrate on-premise Software business to cloud based model, below are some key focus areas and challenges that you should consider:


Top 10 worst big data practices
The idea of the data lake is being sold by vendors to substitute for real use cases. (It’s also a way to escape the constraints of departmental funding.) The data-lake approach can be valid, but you should have actual use cases in mind. It isn’t hard to come up them in most midsize to large enterprises. Start by reviewing when someone last said, “No, we can’t, because the database can’t handle it.” Then move on to “duh.” For instance, “business development” isn’t supposed to be just a titular promotion for your top salesperson; it’s supposed to mean something.


The BYOD Revolution: A Dream of Efficiency or a Security Nightmare?
"Bring your own device" phenomenon is becoming more and more prevalent in IT today. Employees tend to use their own devices whether IT departments allow or know about it or not. So what do you need to know to keep up with this trend? In this webinar, hear a panel of experts discuss how BYOD is transforming the workplace and its benefits in improving efficiency and productivity of your business as well as discover the security concerns to look out for like data breaches, mobile malware and hacking.


A Tough Corporate Job Asks One Question: Can You Hack It?
Chief information security officers have one of the toughest jobs in the business world: They must stay one step ahead of criminal masterminds in Moscow and military hackers in Shanghai, check off a growing list of compliance boxes and keep close tabs on leaky vendors and reckless employees who upload sensitive data to Dropbox accounts and unlocked iPhones. They must be skilled in crisis management and communications, and expert in the most sophisticated technology, though they have come to learn the hard way that even the shiniest new security mousetraps are not foolproof.


Stealthy Web tracking tools pose increasing privacy risks to users
"The tracking mechanisms we study are advanced in that they are hard to control, hard to detect and resilient to blocking or removing," they wrote. Although the tracking methods have been known about for some time, the researchers showed how the methods are increasingly being used on top-tier, highly trafficked websites. One of the techniques, called canvas fingerprinting, involves using a Web browser's canvas API to draw an invisible image and extract a "fingerprint" of a person's computer.


Leadership Caffeine—In Praise of Mistakes Made for the Right Reasons
Remember, character always gets a positive vote. After a certain age, character is formed and nothing you can do will alter someone’s core character. You cannot change someone. Assess character carefully. Look for behavioral examples around values, and if the view is dissonant, it’s a non-starter. Passion and desire are powerful reasons to take a chance on someone, even if others around you suggest this person isn’t right for a role. I like betting on the underdog if I’ve done my homework on the individual. Taking chances on people who show that extra spark is part of the essence of leadership. Much like character, you cannot teach passion, you can only help it emerge.


Unusual Ways to Create a Mobile App
RoboVM is a new open-source project with the ambition to solve this problem without compromising on neither developer nor app-user experience. The goal of the RoboVM project is to bring Java and other JVM languages, such as Scala, Clojure and Kotlin, to iOS devices. Unlike other similar tools, RoboVM doesn’t impose any restrictions on the Java platform features accessible to the developer, such as reflection or file I/O, and lets the developer reuse the vast ecosystem of Java 3rd party libraries. It is also unique in allowing the developer to access the full native iOS APIs through a Java to Objective-C bridge.



Quote for the day:

"Our character is what we do when we think no one is looking." -- H. Jackson Brown Jr.

July 21, 2014

Translating network policy in SDN isn't a one-protocol show
It's better to define how a three-tiered web application is designed, enabling the middle-tier app server to talk to the web servers and the back-end database tier, but to prevent the web servers from talking directly to the database tier. In that scenario, an imperative model would have required specific definitions of ACLs, which would be defined specifically for the infrastructure in the deployment -- i.e. switch commands using IOS or NX-OS -- which only makes sense for the network administrators and is a notion that's distant from the concerns of the application owners and architects.


Forensic scientist identifies suspicious 'back doors' running on every iOS device
Zdziarski, better known as the hacker "NerveGas" in the iPhone development community, worked as dev-team member on many of the early iOS jailbreaks and is the author of five iOS-related O’Reilly books including "Hacking and Securing iOS Applications." In December 2013, an NSA program dubbed DROPOUTJEEP was reveled by security researcher Jacob Appelbaum that reportedly gave the agency almost complete access to the iPhone. The leaked document, dated 2008, noted that the malware required "implant via close access methods" but ominously noted that "a remote installation capability will be pursued for a future release."


Julia King: We're all data scientists now
"As front-line workers have their capabilities augmented by digital technologies, they are emboldened to make informed, real-time decisions and encouraged to become more engaged with the organization," notes a recent report by McKinsey Global Institute. But these workers must know how to deal with all of the data coming their way if it's to yield the flabbergasting productivity gains McKinsey predicts. In the manufacturing sector alone, the business consultancy maintains that big data and analytics can yield improvements in production, supply chain and R&D amounting to something between $125 billion and $270 billion.


Our Cloud Disaster Recovery Story
We took the "small jump, medium jump, high jump" approach. In this case, we deployed one low-risk server using the startup vendor's methodology. Then we moved to one mid-risk server. Then a mid-risk n-tier application. Armageddon didn't ensue. In terms of permission, our IT organization has earned credibility with other business units in our city. We offer a high level of uptime. If we screw up, we admit it and communicate about it. Although we must enforce policy, we aren't the No Police. And we recognize that we aren’t the owners of systems; we're the custodians.


Data integration as a business opportunity
A significant fraction of IT professional services industry revenue comes from data integration. But as a software business, data integration has been more problematic. Informatica, the largest independent data integration software vendor, does $1 billion in revenue. INFA’s enterprise value (market capitalization after adjusting for cash and debt) is $3 billion, which puts it way short of other category leaders such as VMware, and even sits behind Tableau.* When I talk with data integration startups, I ask questions such as “What fraction of Informatica’s revenue are you shooting for?” and, as a follow-up, “Why would that be grounds for excitement?”


13 ways to optimize your Android smartphone
Listen up, Android users: It's time for a smartphone tuneup. Don't get me wrong, most Android devices work fine out of the box. But with a few minutes of manipulation and a few helpful apps, you can optimize your phone to make it more powerful, useful, and efficient. Isn't that what technology's all about? Let's get to it, then. Here are 13 quick tweaks that'll improve your Android experience.


Chinese hackers break into US federal government employee database
Speaking at a news conference in Beijing Thursday, Kerry said of the breach, “At this point in time, it does not appear to have compromised any sensitive material.” But he also condemned China’s cyber spying in unusually harsh language, saying it “harmed our business and threatened our nation's competitiveness." Department of Homeland Security officials confirmed that they were aware of an attempt to hack into the Office of Personnel Management (OPM), which houses the personnel files of federal employees, including those applying for top-security clearance.


Why Bankers will Rely More on ‘Tablet Banking’
Tablets used today to help a customer get an experience – saves time by up to 10 folds. Those are going to grow up in popularity, and people will begin to trust them as a main form of communication. So in future, customers will interact with their banks seamlessly with tablets without a lag. Intel is strengthening its tablet market – focusing on industry verticals like banking, financial services and insurance, education etc. For that, Intel may soon, in partnership with various OEMs, offer these tablets across those industry verticals. Tablet banking allows for great user experience, especially with the rich interface tablets offer, which is nearly unlimited.


Government-grade malware in hacker hands
Gyges was discovered in March this year by Sentinel Labs Research Lab, as detailed within the company's latest intelligence report (.PDF). According to the report, the malware probably originated from Russia, and "is virtually invisible and capable of operating undetected for long periods of time." "It comes to us as no surprise that this type of intelligence agency-grade malware would eventually fall into cybercriminals’ hands," Sentinel Labs states. "Gyges is an early example of how advanced techniques and code developed by governments for espionage are effectively being repurposed, modularized and coupled with other malware to commit cybercrime."


Why is SaaS testing harder than traditional testing?
SaaS testing tends to require executing a greater number of test types. Service-level agreement (SLA) adherence, failover/disaster recovery and deployment are examples of SaaS tests that are typically not part of traditional Web application testing. These may be tested in standard Web applications, but they generally are not deemed critical. In SaaS, SLA adherence is required in order to avoid business disruption. Failover and disaster recovery are essential in order to verify the SaaS is solid and responds appropriately if a release or server fails.



Quote for the day:

"Really great people make you feel that you, too, can become great" -- Mark Twain

July 20, 2014

Being a Good Enterprise Architecture Citizen
One of the big problem I see with most enterprise level tools is they want to do everything. Most large enterprises would already have a financing system, organization directory, customer relationship management, document management, messaging, business process, calendaring and user authentication systems in place already. Yet, quite a few enterprise tools I have seen have their own data store for finance, organization directory, customer relationship management, document management, messaging, business process, calendaring and user authentication.


Fujitsu designs leaner supercomputer with fewer switches
Fujitsu has developed an approach to cluster supercomputers that reduces the number of network switches by 40% without sacrificing performance. The approach centers on using a new communications algorithm that efficiently controls data transmissions as well as deploying a multilayer full-mesh topology in the arrangement of the network. Compared to a three-layer "fat-tree" network topology, which employs a tree-like structure of connections, the multilayer full-mesh topology eliminates a layer of switches through more efficient mapping.


A Checklist for Architecture & Design Review
One of the key aspects of the IT Governance is to ensure that the investments made in software assets are optimal and there is a quantifiable return on such investments. This also means that such investment does not lead to risks that could lead to damages. Most of us are well aware that reviews play a key role in ensuring the quality of the software assets. As such, in this blog post, I have tried to come up with a checklist for reviewing the architecture and design of a software application. While the choice of specific design best practice is interdependent on another, a careful tradeoff is necessary. For a detailed discussion on Trade off Analysis of Software Quality Attributes.


How Data and Analytics Can Help the Developing World
First, data can be used to keep people healthy. With the help of IBM, the city of Tshwane, South Africa piloted a crowdsourced app known as WaterWatchers that lets users report water supply information, such as faulty pipes, through SMS. As a result, IBM found that the city was losing almost $30 million in wasted water annually. A similar effort by Cipesa, a Kampala-based communications technology non-profit, allows journalists and citizens to monitor and document health services delivery in Northern Uganda with a mobile app, in order to identify discrepancies in official reports and drive infrastructure improvement efforts


Can You Trust Your Algorithms?
A lot depends on the data, including when it was measured, by whom, and with what accuracy. “It also depends on the algorithms you use to mine the data,” he says. “Yes of course we can get patterns and yes of course there are many case studies where the patterns really buy you something. But optimizing and calibrating these models to certain situations is, for the foreseeable future, going to be the central component. Without algorithmic differentiation, it’s going to be a major pain.” Failure to abide by the laws of mathematics could doom some big data projects being susceptible to the dreaded random factor.


Google Smart Contact Lens Focuses On Healthcare Billions
Today, under a new development and licensing deal between Google and the Alcon eyewear division at Novartis, the two companies said they will create a smart contact lens that contains a low power microchip and an almost invisible, hair-thin electronic circuit. The lens can measure diabetics’ blood sugar levels directly from tear fluid on the surface of the eyeball. The system sends data to a mobile device to keep the individual informed. Google co-founder Sergey Brin said the company wanted to use “the latest technology in ‘minituarisation’ of electronics” in order to improve people’s “quality of life”.


Home router security to be tested in upcoming hacking contest
Researchers are gearing up to hack an array of different home routers during a contest next month at the Defcon 22 security conference. The contest is called SOHOpelessly Broken—a nod to the small office/home office space targeted by the products—and follows a growing number of large scale attacks this year against routers and other home embedded systems. The competition is organized by security consultancy firm Independent Security Evaluators and advocacy group the Electronic Frontier Foundation (EFF), and will have two separate challenges.


Apple-IBM deal threatens Android's enterprise push
The analyst firm said IBM's Endpoint Manager software "excels in patch management, multiplatform support and overall scalability" and called the software a "good choice for organizations heavily focused on security configuration management, including patching and those that require strong multiplatform server management in addition to client management or scalability to support tens of thousands of endpoints." But Gartner said in the May report that the IBM software is "not as good a choice" for those organizations that require simple usability, a failing which seems to beg for the kind of help that Apple may provide. Gartner also faulted IBM for complexity in its packaging, bundling and pricing of its various management software functions.


A Large-Scale Empirical Study on Software Reuse in Mobile Apps
The fact that software reuse, in the form of inheritance, class, and library reuse, is prevalent in mobile apps of the Google Play app store, means that app developers reap all the typical reuse benefits, such as improved productivity, higher-quality software and faster time to market, although many didn’t receive a formal training in software engineering. It isn’t clear whether this successful reuse is due to the quality of mobile platforms, development tools, app stores, or a combination of other factors. Possible other factors could be the relatively small size of the mobile app code base and development teams, although in recent work, we’ve found that for these characteristics, mobile apps behave identically to small Unix utility applications


A Few BGP Security Considerations
BGP uses TCP for transport which makes it vulnerable to TCP based attacks. The example used in the book is the TCP reset attack, and it involves sending a spoofed a packet with the TCP reset bit set. If such a packet is received, the TCP session is immediately terminated. For this attack to be successful, the packet must have src/dst IP addresses and src/dest TCP ports that match what the BGP speaker expects to receive from its neighbour. Since it’s BGP, it’s known to the attacker that either source or destination port is 179 (depending on who is client/server in the particular session), with the other port being a randomly generated number. Armed with this knowledge, the attacker sends a series of packets with varying port numbers, eventually sending just the right one, resetting the session between the two BGP speakers.



Quote for the day:

"Your chances of success in any undertaking can always be measured by your belief in yourself." -- Robert Collier

July 19, 2014

Authentic Leadership and Letting Your Strengths ‘Bloom’
When something goes well, you wish you’d done it sooner. We did a pretty good job of integrating [acquisitions]. So, I don’t have a lot of regrets about that call. It’s interesting that the first acquisition Medtronic [made was] eventually spun off. It was interesting because it was not a fantastic [deal], but it opened the door to a lot of other things and put us in the game and gave us self-confidence. So, I don’t even regret doing that [one]. We were in chains and we had to bust loose from those chains. So I don’t have a lot of second thoughts about those deals.


Net Threats: Internet Openness in Danger
War ignited this year over Net Neutrality, with government officials, lawmakers, Internet service providers, entertainment providers, and even comedians joining the fray. The conflict stems primarily from the explosion of American data consumption – and who should pay for it. Internet service providers maintain that entertainment providers like Netflix and Google should pay for the rise in Internet traffic, while content providers argue that those costs would undermine the freeness and fairness of the Internet for smaller companies and organizations.


HP Throws Trafodion Hat into OLTP Hadoop Ring
Trafodion fills a gap in Hadoop when it comes to ANSI-compliant and ACID-supporting transactional databases, says Rohit Jain, a distinguished engineer at HP who’s the chief technologist for Seaquest and Trafodion. “We took our transactional heritage and experience and IP [intellectual property] and brought it down to HBase, because HBase doesn’t have the transactional support,” Jain tells Datanami. “It has ACID support only at the row level. We bring full-blown ACID for cross-row, cross-table, cross statement-type transactions. Essentially this is a little niche that has not been filled yet by anybody. We’re effectively saying you can use Hadoop for all workloads, all the way from OLTP to analytics.”


Math can make the Internet 5-10 times faster
The advantage is that errors along the way do not require that a packet be sent again. Instead, the upstream and downstream data are used to reconstruct what is missing using a mathematical equation. "With the old systems you would send packet 1, packet 2, packet 3 and so on. We replace that with a mathematical equation. We don't send packets. We send a mathematical equation. You can compare it with cars on the road. Now we can do without red lights. We can send cars into the intersection from all directions without their having to stop for each other. This means that traffic flows much faster," explains Frank Fitzek.


From Big Data to Deep Data
The real problem of big data is that we are increasingly outsourcing our capacity to sense and think to algorithms programmed into machines. While this seems very convenient and cool at first and offers access to services that many of us want, it also raises a question about who actually owns big data, about the rights of individuals and citizens to own their personal data and to exercise choices regarding its use. While big data has certainly opened up a whole new range of possibilities, I would like to suggest a distinction between surface big data and deep data. Surface data is just data about others: what others do and say. That is what almost all current big data is composed of.


Streams Library Brings Lazy Evaluation and Functional-style to C++14
Streams is a C++14 library that provides lazy evaluation and functional-style transformations on the data, to ease the use of C++ standard library containers and algorithms. Streams support many common functional operations such as map, filter, and reduce. Streams are an abstraction on a set of data that has a specific order. Various operations can be applied to streams such that data passes through the stream pipeline in a lazy manner, only getting passed to the next operation when it is requested


The Tech Startup Scene in Cape Town
“A lot of the developed countries round the world are looking to produce solutions for the developing world,” says Edelstein. “I think in South Africa there are two types of entrepreneurs. [Those] who are looking to create applications or platforms that are applicable to the whole world. [And those] who are looking to provide solutions for South Africa or Africa.” “The people who were early into the internet industry were more concerned about building a business. Because they were doing it in South Africa they couldn’t compete with Silicon Valley.


New Health Data Deluges Require Secure Information Flow Enablement Via Standards,
We, like others, put a great deal of effort into describing the problems, but figuring out how to bring IT technologies to bear on business problems, how to encourage different parts of organizations to speak to one another and across organizations to speak the same language, and to operate using common standards and language. That’s really what we’re all about. And it is, in a large sense, part of the process of helping to bring healthcare into the 21st Century. A number of industries are a couple of decades ahead of healthcare in the way they use large datasets — big data, some people refer to it as.


Zaana Howard on Design Thinking at Lean UX 14
Design Thinking is really kind of abstract and useless term in many ways that just causes more confusion than clarity to people overall and Design Thinking is really, I think it’s more the mindset that you bring to design more than it is an actual process or method in itself. Design Thinking often just follows design process, if you use the UK Design council double diamonds sort of method it’s just discover, define, design, deliver, develop, deliver, something like that, and then it’s really just about the mindset that you bring to each of those stages that allows you to do Design Thinking and such.


The robots are coming: The big question is will you hand over your job - or your life?
"Unmanned systems are increasingly likely to replace people in the workplace, carrying out tasks with increased effectiveness and efficiency, while reducing risk to humans. This could ultimately lead to mass unemployment and social unrest," it warns, perhaps invoking the shade of Rick Deckard by noting "There will almost certainly be challenges to overcome, such as establishing whether we can learn to 'trust' robots." It said improvements in robotics have "obvious applications" for military usage, noting that unmanned naval vessels such as reconnaissance submarines to probe a hostile shore could be as standard a part of the military set up as drones in the air.



Quote for the day:

"For an organization to be exceptional, all teams within the organization must be moving toward a shared vision." -- @Rich McCourt

July 18, 2014

IT Career Advice: How To Sell
Nothing could be further from the truth. Consider the CIO who needs to sell the board of directors on funding for a critical strategic technology initiative. The CIO must explain why this initiative is important, anticipate potential objections, and hope to persuade and guide the board to a favorable decision. And that's only a simplistic view. The CIO's initiative will compete for resources with other high-priority investments, and some sponsors of these initiatives may have direct personal ties to certain board members. Competing projects may have been previously promised to shareholders or employees.


Microsoft CEO Lays Out Vision of Cloud Convergence
"We're building out that digital infrastructure that ties together people, their activities, their relationships, to all of the artifacts of their life – be they photos or documents and more. That's what digital work and life experiences mean," Nadella says. "We're going to do the best job of being able to enable dual use," he says. "This entire notion that somehow I buy my device for consumption and personal use, and then I'll give up that device for work and take another device, just doesn't work. We know that. Simply saying even just BYOD is not good enough. We've got to harmonize this dual use."


Hidden Benefit To The ACA: It May Help Bring Science 2.0 To Pass
The volume of data is daunting - so are concerns about interoperability, security and the ability to adapt rapidly to the lessons in the data, writes Dana Gardner at Big Data Journal. That is why Boundaryless Information Flow, Open Platform 3.0 adaptation, and security for the healthcare industry are headline topics for The Open Group’s upcoming event, Enabling Boundaryless Information Flow on July 21 and 22 in Boston, he notes. Solving the issue will take a combination of enterprise architecture, communication and collaboration among healthcare ecosystem players. It's no secret that Collaboration and Participation are the big missing puzzles in the Science 2.0 mission.


Making the Most At-Risk Generation Less Risky
Millennials are the most likely to engage in questionable or risky behavior, and not just in terms of compromising standards. This generation is also particularly open and transparent on social media tools, making them more likely to share information about work experiences, both positive and negative, with others in their social networks. This behavior could create significant reputational risk, and today’s directors don’t want their dirty laundry aired worldwide. Millennials are also the most likely to keep copies of confidential company documents, which, if shared outside the company, could get into the hands of competitors.


Drilling into Network Disruptions
When Swedish communications services provider TDC needed network infrastructure improvements from their disparate networks across several Nordic countries, they needed both simplicity in execution and agility in performance. Our next innovation case study interview therefore highlights how TDC in Stockholm found ways to better determine root causes to any network disruption, and conduct deep inspection of the traffic to best manage their service-level agreements (SLAs). BriefingsDirect had an opportunity to learn first-hand how over 50,000 devices can be monitored and managed across a state-of-the-art network when we interviewed Lars Niklasson, the Senior Consultant at TDC.


Design Thinking and the Transformation of Hyatt’s Culture
To get out in front, Hyatt went back to school. The company connected with the Design School (d.school) at Stanford University in Palo Alto, California, and started using human-centered innovation concepts to create change within the organization. Hyatt leaders began by asking themselves, “Why do we need to change, what is the platform for change and why is it necessary?” and then used Stanford’s design innovation to help transform their culture. Hyatt’s management began with engagement surveys, listening to their employees and understanding what mattered to them.


5 Reasons Going Paperless Won't Work
Technologists have been striving to go paperless for at least 30 years, but it still hasn't happened. (The idea sounded good on paper.) The reality is that, for most organizations, there are multiple places in their workflow where the analog meets the digital, and where technology still hasn't been able to replace important legacy processes. Instead of throwing out legacy processes that are working, however, organizations would be wise to look to new solutions that include paper as an option in their digital workflows, embracing the old while ushering in the new. Here's why:


Intel experiments with mindfulness to combat digital overload
A handful of employees at Intel Corp. is taking statistics like these to heart. Two years ago, they rolled out a program to help colleagues manage the digital barrage that is part and parcel of every workday: hundreds upon hundreds of emails per day, instant messages that must be attended to. Nowhere in the Intel program, however, are there any lessons in improving organizational or multitasking skills. Instead, Intel's mindful awareness program, as it's called, is designed to develop things like better focus,emotional intelligence and stress management.


No money, no problem: Building a security awareness program on a shoestring budget
Often, executives view security and business as two separate items, and while this point-of-view is changing, it takes effort to get some executives to commit to security and make it part of the business overall. When this happens, tangible security needs such as license renewals, support and service contracts, firewalls and other appliances all of those are things that executives understand. However, awareness training, to the executives at least, seems like an extended version of general security training, and there just isn't money for something like that. At the same time, there's also a shakeup happening - thanks to a seemingly endless stream of data breaches this year that have placed several large companies in the headlines.


Why '123456' is a great password
Strong passwords would be more likely adopted if people learned to use them only on critical accounts, such as employer websites, online banking and e-commerce sites that store the user's credit card number. To be effective, this group should be small. Websites that hold no sensitive information and would not present a threat if hacked should get the throwaway credentials. ... "Far from optimal outcomes will result if accounts are grouped arbitrarily," the research says. Following the standard advice of choosing and never reusing passwords of eight characters or more that includes uppercase and lowercase letters, numbers and special characters, is "an impossible task as portfolio size grows," the research said.



Quote for the day:

"If you define your company by how you differ from the competition, you're probably in trouble" -- Omar Hamoui

July 17, 2014

Total internet failure: are you prepared?
“Because there has not been a significant failure of the internet to date, organisations never consider that as a possibility,” said Bonner. Yet organisations have at least one backup electricity supply even though the energy industry is heavily regulated and well managed, and reliable power supplies are usually supported by a contract. “But when it comes to the internet, which has no clear oversight or governance, organisations have no backup plan and nobody seems to be worrying about a major internet outage,” Bonner pointed out.


Without the cloud, Microsoft may lose grasp on the enterprise
"Microsoft recognizes that this is going to have a huge effect on its partners," he told Computerworld. "They need to show that their partners can make money and be successful with this. Microsoft's success is their partners' success and vice versa." "Cloud is essentially the new platform for Microsoft," said Mahowald. "I think it's more important than mobile, big data or social. What they had in Windows, they have to replicate [in the cloud] or they lose the franchise. If their old platform doesn't matter any more, then Microsoft has lost the software lock-in that is their crown jewel."


A New Dawn for System Design
Agile or rapid methods might be great for fast, iterative software development, but invite a designer into the exercise and you’ll learn how the design process allows for much more effective exploration and discovery. This isn’t the “design thinking” fad. This is “design doing” — technologists, business analysts, designers, researchers, executives and rank-and-file staffers defining possibilities together. They’re focused equally on the people that we need to perform, the technology we can deliver, and the business that must be served.


Should online accounts die when you die?
"This is something most people don't think of until they are faced with it. They have no idea what is about to be lost," said Karen Williams of Beaverton, Oregon, who sued Facebook for access to her 22-year-old son Loren's account after he died in a 2005 motorcycle accident. Facebook and other tech companies have been reluctant to hand over their customers' private data, and many people say they wouldn't want their families to have unfettered access to their life online. But when confronted with death, families say they need access to settle financial details or simply for sentimental reasons. What's more, certain online accounts can be worth real money, such as a popular cooking blog or a gaming avatar that has acquired certain status online.


The One Thing CIOs Want, More than Anything
Rather than consuming more and more IT resources on inefficient legacy server platform operation and management, virtualization provides automation that typically delivers increased application provisioning speed and improved infrastructure optimization results. However, while virtualization has offered a compelling way to consolidate expensive hardware and enhance utilization, the benefits can diminish over time. The first step is to optimize all the workloads that aren't already virtualized -- Linux workloads, for example. Once virtualization is ubiquitous in your datacenter, how can you achieve even greater financial savings and improve performance?


Java Update: Patch It or Pitch It
The trouble with Java is that it has a very broad install base, but many users don’t even know if they have it on their systems. There are a few of ways to find out if you have Java installed and what version may be running. Windows users can click Start, then Run, then type “cmd” without the quotes. At the command prompt, type “java -version” (again, no quotes). Users also can visit Java.com and click the “Do I have Java?” link on the homepage. Updates also should be available via the Java Control Panel or from Java.com. If you really need and use Java for specific Web sites or applications, take a few minutes to update this software.


Microsoft security critic Aorato in Redmond giant's buyout sights
The exploit is less of a problem for pure-Kerberos environments (but even there, said Be'ery, there's a potential problem, because the user's credentials stay alive for as many as ten hours, giving hacker plenty of time to get the hashes), but turning off NTLM authentication is impractical, as it would lock users out of many legacy services. "We've consulted with a lot of clients who raise the same idea as a solution, but after examining their deployment, we always come to the conclusion that it's impractical, if not impossible, without a major investment in upgrading everything."


Intel thinks your next PC should be thin, light and wire free
The company is developing chips and wireless technologies to meet those goals, with the first fruits of that development available starting this coming year-end holiday said, said CEO Brian Krzanich on an earnings call this week in which he discussed the company's vision of future PCs. About 600 million PCs worldwide are more than four years old and due for upgrades, so the development efforts come at a fortuitous time. Tablets thinner and lighter than the iPad that could be used as full PC replacements will be on store shelves by the end of this year, Krzanich said.


SCRUM explained
As mentioned before, SCRUM throws the problems at your face, giving you no solution for that. This is interesting because since paper-oriented processes hide these problems, specially when they were people related ones. Whenever SCRUM throws you these matters at your face, you have two options: either recognize and face them or blame the methodology you are following, ignoring what is really in front of you. This usually is related, as mentioned, to people issues. Maybe members of the Team do not get along, maybe you have a client who is too hard to deal with, maybe the ScrumMaster or the Product Owner are not adequate.


Why big data is crucial for innovation and competition
"There's a reason everything is compared to sliced bread," said Carl Frappaolo, innovation expert and director of Knowledge Management at FSG, a nonprofit consulting firm specializing in strategy, evaluation and research in the post. "It's the most successful innovation yet. The simple act of slicing bread for the convenience of customers led to huge and profitable changes in the baking industry." The thing is that we've collectively done much of the easier work to identify innovations like slicing bread. It's harder to see what might be improved upon now. That's where big data comes in--it enables you to see what and where to innovate



Quote for the day:

"Our business in life is not to get ahead of others, but to get ahead of ourselves." -- E. Joseph Cossman

July 16, 2014

Cloud Governance: Something Old, Something New, Something Borrowed…
Making matters worse, SOA governance tools are often missing in the Cloud Computing environment. There’s no central point for a Cloud consumer / developer to view the Services and associated policies. Furthermore, design-time policies are easily enforceable when you have control over the development and QA process, but those are notoriously lacking in the Cloud environment. The result is that design-time policies are not consistently enforced on client side, if at all. Clearly, SOA governance vendors and best practices need to step up to the plate here and apply what we already know about SOA registries/repositories and governance processes to give the control that’s needed to avoid chaos and failure.


Aligning Agile with Zachman EA framework
On the flip side - Agile being an umbrella for multiple known methodologies, i.e. Scrum, Kanban, Scrumban etc, I believe it could be moulded to meet the organization requirements and just like we saw how Zachman framework could be custom-built to suit to the organizational expectations and culture. Here we have covered just the user-story aspect of the agile process (aligned with Zachman model), and in the next part of this blog series I am going to showcase how one could make the overall SDLC process iterative and align TOGAF with Agile SDLC, at EPICS and Sprint level.


CIO Meets Mobile Challenges Head-on
"Android is a more challenging operating system to secure for the enterprise than iOS because of its fragmentation," says Ojas Rege, MobileIron's vice president of strategy, adding, "Deploying Android successfully requires us to make as much of the complexity and variability as possible invisible to our customer. We do expect that Google's increasing focus on enterprise Android combined with our engineering investments will continue to expand the business capabilities of Android and continue to make it easier to deploy."


Configuration management, IT asset management need to be integrated
The asset management process is actually a longer process than configuration management. If you think of the sub-processes, actually it [asset management] goes from plan through procure, receiving the asset, deploying the asset, then operating and optimizing the asset before eventually you move to decommission and dispose. As I said, the main parts of the asset management lifecycle are deploy and operate, then optimize, which is where the configuration process comes in. And with configuration, you have planning and management of the configuration item. You need to be able to identify the configuration item, control it, report on the status of the configuration item, and then you will do some audit and verification. So the processes have so many interfaces they have to operate in harmony.


Do you want power or influence?
The problem with positional power is that there actually are few of the really significant roles at the top of any organizational structure. It’s clogged up there. But that does not mean we are out of luck in terms of power if we have not had the fortune or good luck to step into these positions of power and the influence that goes with it. There are also sources of power that are personal and can provide both power and influence if we cultivate and use them well:


Hacker mindset a prereq for security engineers, says Markley CTO
A key theme at this year's MIT Sloan CIO Symposium on the digital enterprise was that the customer comes first for IT, no matter what kind of business a CIO is in. It follows that customer data is among an organization's most valued assets. Protecting customer data in today's digital enterprise, however, can no longer be relegated to your run-of-the-mill security engineers, according to Patrick Gilmore, CTO at data center services provider Markley Group. For Gilmore, candidate prerequisites include a high degree of paranoia and a hacker's mentality.


Wearables: Are we handing more tools to Big Brother?
"This is a massive violation of our right to keep sensitive information private," she said, adding that, "any kind of mental health diagnosis can ruin your life." Pam Dixon, founder and executive director of the World Privacy Forum (WPF), agrees. She is one of numerous privacy advocates who point out that most fitness trackers are currently exempt from any regulation -- they are not covered by HIPAA since they are consumer devices that have not been furnished or prescribed by a health-care provider.


Why Test in the Cloud?
First and foremost you want your cloud-based test management to enhance workflow and streamline processes for greater efficiency. One of the first things worth considering is integration. Can you integrate your existing bug-tracking software? Are there any plug-ins or browser-based tools that can help generate logs and record screenshots to create clear and concise bug reports? Can you easily import and export documents, deliverables, log files, images and other files? Can you set permissions levels, make bug status changes, and see real-time updates? Does it support automated test scripts? It's also important to think about versioning and tracking. Every action should be traceable and the ability to revert when something needs to be rolled back can prove to be a real time-saver.


Boost your security training with gamification -- really!
Building awareness of physical security was also part of the effort at Salesforce, which has 13,000 employees. A campaign to test "tailgating" (when an unauthorized person sneaks through a secured door by following immediately behind an authorized person) drew 300 volunteers who were rewarded if they successfully slipped through a door and took something. Generally, before security training, 30% to 60% of users will fall victim to a fake phishing email, says Lance Spitzner, training director at the SANS Institute, a security training vendor. After training and six months to a year of a gamification program, the rate can fall to 5%, he says.


Google’s Container Tool Attracts Support From Microsoft, IBM, and Others
Hölzle pointed out that Microsoft will work to make Kubernetes successful in its Azure cloud; RedHat plans to add support to its hybrid cloud product; IBM will contribute to Kubernetes and Docker while trying to establish a governance model; Docker pledges to align Kubernetes with its own similar service called libswarm; CoreOS will ensure that Kubernetes works with its Docker-centric operating system; Mesosphere says that they’ll integrate Kubernetes with their own management tool called Mesos; and SaltStack will make Kubernetes part of their configuration management toolset.



Quote for the day:

"Don't worry about people stealing your ideas. If they're any good you'll have to ram them down people's throats" -- H. Aiken

July 15, 2014

GraphLab thinks its new software can democratize machine learning
Given the current state of affairs, though, I asked Guestrin whether it’s really possible for a software product to democratize machine learning the way he hopes Create can do. “That’s a yet-to-be-answered question, because nobody has yet done it,” he said. So far, he acknowledged, most machine learning research has focused on one-off systems and “my curve is better than your curve” demonstrations. He thinks GraphLab Create can reach 80 to 90 percent of use cases because the focus from the beginning was on usability and robustness. There are other commercial machine learning products on the market, including Skytree, but Guestrin said the big difference between them and GraphLab is in the barrier to actually using the product.


New Strategies and Features to Help Organizations Better Protect Against Pass-the-Hash Attacks
Given that organizations must continue to operate after a breach, it is critical for them to have a plan to minimize the impact of successful attacks on their ongoing operations. Adopting an approach that assumes a breach will occur, ensures that organizations have a holistic plan in place before an attack occurs. A planned approach enables defenders to close the seams that attackers are aiming to exploit. The guidance also underscores another important point - that technical features alone may not prevent lateral movement and privilege escalation.


Executive Beware: The SEC Now Wants To Police Unethical Corporate Conduct
Clearly corporate bribery, insider trading, and intentional manipulation of financial results are both unlawful and unethical, but what about lesser misconduct? If a permissible, but highly aggressive, accounting treatment is employed to enhance financial reporting results, is the result legal but unethical because of the underlying motivation? Moreover, even if the acts in question technically comply with the law, does the unethical behavior violate the spirit of the law and expose the individual or entity to the unwanted consequences of a government investigation or shareholder suit?


Analytically speaking, Dell delves into the Internet of Things
One of Dell's main thrusts in this area is to round out their analytics platform and offering with Statsoft's analytics software. The short-term plan is to build a data factory. With a data factory, Dell's products can bring in all of your data sources, including IoT, and develop actions around the analytics that you gather. Because as we all well know, data is just noise unless you can do something useful with it. Dell plans to help you do something relevant with your data by using its other products in conjunction with Statsoft's STATISTICA software. John confirmed that there's a lot of talk within Dell surrounding IoT, predictive analytics, and product integration. You can look forward to some announcements related to cloud services and predictive analytics later in 2014.


Oracle hopes to make SQL a lingua franca for big data
Oracle over time will add support for using Big Data SQL with other hardware systems it sells, according to Mendelson. The software is set for general availability within the next couple of months, with pricing to be announced at that time. Big Data SQL isn’t an attempt to replace the SQL engines already created for Hadoop, such as Hive and Impala, which Oracle will continue to ship with the Big Data Appliance, he said. “We’re really solving a wider problem.” One big challenge facing data scientists is simply the overhead of moving data among systems, he said.


Data – the Next Big Thing for Utilities
On average, meter readers, for example, once collected one reading per customer per month. Today, utilities have access to an almost overwhelming amount of data from both meters and other smart endpoints on their infrastructure, as well as external sources such as news and weather aggregators. To realize maximum value of all the data their communication system delivers, utilities need data analytics. The first thing utilities should understand when adopting data analytics is that the majority of these applications are communication vendor agnostic. However, a fixed-base communication network with dedicated spectrum and the ability to prioritize incoming data is more efficient and reliable.


Orchestrate cloud service makes using many databases easy
If we fast forward to today, there are many more types of database engines that support many different types of data. Building an application that accesses and updates data using many different data sources can be quite a challenge for a developer. Furthermore, as each of the sources evolves over time, that application must be updated or things don't work any more. Orchestrate hopes that by inserting their middleware into the mix of technology that developers are using, they can use the API to access different data sources rather than be forced to develop their own ETL code.


Cloud Protection: How to Avoid Emergency-Related Outages
In an age of advanced technology and many excellent preemptive tools and systems available, it’s hard to imagine an entire data center losing power. However, it was only two years ago when Hurricane Sandy hit the East Coast wiping out data centers between Virginia, New York, and New Jersey causing them to lose public power and go dark for days. For government agencies or large enterprise organizations that use internal data centers to house their applications, public multi-tenant clouds offer a lower-cost, easy to deploy disaster recovery/continuation of operations (DR/COOP) solution. The following steps can help these data centers plan and execute effectively with minimal to no disruption in the production environment.


DBAccess: a Thread-safe, Efficient Alternative to Core Data
DBAccess claims to provide three key benefits over Core Data: Thread-safety; High performance and support for query performance fine tuning; Event model that enables binding data objects to UI controls and keep them updated with changes made in the database. DBAccess can be used and distributed freely. Its latest version includes a few improvements such as support for ASYNC queries, better performance with large result sets, and reduction in memory usage in queries with many columns. DBAccess proposes a very simple usage model. A persistent object declaration is very similar to a Core Data's:


Three Questions To Help Cultivate Your Leadership Style
Fortunately, a wise senior manager took me aside and suggested I would be more effective over the long haul if I quit acting like a machine and started acting like a human who cared about people at least as much as he cared about results. He suggested that I was leaving, money, performance and the growth of people on the table, and he challenged me to think long and hard about the type of leader I wanted to be. I am grateful to this day for that leadership wake-up call. Over the months following the “machine” comment, he regularly challenged me with a number of provocative questions that ultimately shifted my focus from results at all costs to results through supporting and developing others. How will you answer these questions?



Quote for the day:

"Not all problems have a technological answer, but when they do, that is the more lasting solution" -- Andy Grove