August 09, 2014

Talking To Big Machines
In Comstock’s vision, software intelligence improves machines in two respects: it makes them both more selfish and more selfless. “Selfish machines” monitor themselves and ask for help when they need it, as when a jet engine calls for service because vibration sensors have detected early signs of wear. Human operators have typically performed this function, observing, for instance, that a combination of rising temperature and falling pressure suggests an oil leak. Not only can software monitor machines at extremely high accuracy and frequency, it can also present nuanced, abstracted conclusions to human users.


Redefine App and Data Delivery for the Modern Workforce
The modern workforce is one that spans devices, countries, time zones and schedules. Delivering apps and data to them can be a serious challenge, and moreover, a serious drain on your resources.So join Holger Daube for this session as he shows you how to: Move your enterprise from device-level management to dynamic delivery of apps and data; Create highly automated, self-service systems to securely deliver data and applications across all devices; and Build a well-managed foundation that enables end user services (e.g., BYOD, VDI, app store) within an ITaaS framework


Silicon Valley’s Youth Problem
As an enterprise start-up, Meraki has been impeded by its distance from the web scene. It simply does not have the same recognition as a consumer company whose products users (and potential recruits) interact with every day. “You say, ‘I work at Pinterest,’ and people know what that is — they use Pinterest,” Biswas said. “You tell them you work at Meraki, and they’re a little more reserved. They’re like, ‘What’s that?’ Once we explained our culture and our approach, we were able to hire great talent, but it’s always a challenge.” Since the acquisition, Biswas, who is 32, has fought to retain the spirit of the vanguard, but his struggle reveals an implicit fear — that young engineers might be willing to work at Meraki but not at Cisco


Keeping IT Relevant isn't about the Title of the CIO
There are ramifications for the entire IT organization when pursuing a staffing model that includes technical and business savvy folks being embedded within each of the functions. There is the risk of further stratification of IT between the "innovators" and the "operations teams". There is the risk of having a distributed team performing poorly or not communicating without greater leadership focus. The fact is, there isn't an easy way to slice this artichoke and someone's ego or job function is likely to get poked. However, if you have the courage to make the necessary changes and make the tough calls on staffing models based on people and opportunity not silos or turf, you can make it work.


The cultural gaps between enterprise mobility and business intelligence
"When the project is coming from the BI team, these are the guys who have been doing BI and publishing dashboards around the company," Alsbury said. "The first thing typically they are looking at is we have these ten reports or these thirty five reports now we want to enable people to access them on their phone so can you make our reports that look this way look the same way on a phone? That's the first break down right there." Alsbury adds that some organizations perceive is as a transcription or transposition project where we are taking the same thing they look at here on their desktop and put the same thing on their phone.


Peer Pressure! Business Pushing the Cloud on Enterprise IT
"The cloud is getting so much attention and chat time that all of a sudden there is an urgency," said Jeff Kagan, an independent analyst. "Tomorrow the cloud will be tested and trusted. However, today it's still the wild, wild West. IT executives know this but they get pressure from their chief executives to jump into the cloud because it's becoming the new code word for success. And no one wants to be last." Brad Shimmin, an analyst with Current Analysis, said IT shops are under considerable pressure to improve overall operational efficiency and even to drive business opportunities through the nimbleness that comes along with being a leaner organization.


Taking A Wait-And-See Approach With Disruptive Innovations
While the word has taken on many meanings (as Lepore’s article notes), Christensen’s original definition includes two characteristics that show up in sequence. At first, the technology performs worse than alternatives on performance criteria that mainstream customers care about. At this point, we can only say that it is potentially disruptive. Only if its performance later improves can we say that a technology is actually disruptive. That’s why startups with potentially disruptive technologies start out competing instead of cooperating. Incumbents can’t tell whether their technology is any good, so they decline to license it.


Five Smart Cybersecurity Moves From Top Security CEOs
The complexity of security threats to individuals has also increased, but no individual cybersecurity issue will receive the headlines that a corporate breach would, so one can be lulled into a false sense of security. I sought the counsel of four CEOs of major information security companies to ask them what steps they take personally to secure their information and their computing devices. They offered the following five recommendations.


The future of TV is social
Now there’s a whole generation of cord-cutters, something my colleague Janko has written about extensively, and I have one daughter firmly in that camp: when she and her boyfriend got an apartment together, they chose to get high-speed internet and either download everything they want to watch or stream it via an Android set-top box. But my two youngest daughters — one teenager, one in her 20s — are even further down the curve: like the kids surveyed by Variety, names like PewDiePie and Smosh are more relevant to them than than most Hollywood actors.


Why Do We Need Self-Organising Teams?
Organisations have no longer been able to choose whether they want to respond to these demands or not. Change has become mandatory. Trying to hold onto the status quo is like trying to keep the leaves on trees in autumn. For an organisation to be successful, it must adequately deal with the risks and use the opportunities every change brings along. In other words, the organisation must keep up with, or ideally be ever so slightly ahead of, the current market demands. How inconvenient then that this market behaves unpredictably. That which is ‘top’ today can be a ‘flop’ tomorrow; yesterday’s success factor can become a burden overnight.



Quote for the day:

"Simplicity and complexity need each other." -- John Maeda

August 08, 2014

Sysinternals new Sysmon tool looks for intruder traces
Sysinternals is a set of Windows utility programs first released in 1996, long before Russinovich joined Microsoft. Almost all were written by Russinovich and his then-partner Bruce Cogswell. Sysmon, written by Russinovich and Thomas Garnier, also of Microsoft, is the 73rd tool in the set, and has been used internally at Microsoft for some time. The point of Sysmon is to monitor for three specific system events which are often used by malicious processes and which can be difficult to separate from the flood of events in a normal Windows system. Sysmon runs as a service using the Local System account and loads very early in the boot process in order to give the best chance of finding the origin of any problems.


8 Reasons Big Data Projects Fail
Big data is all the rage, and many organizations are hell bent on putting their data to use. Despite the big data hype, however, 92% of organizations are still stuck in neutral, either planning to get started "some day" or avoiding big data projects altogether. For those that do kick off big data projects, most fail, and frequently for the same reasons. ... Because so many organizations are flying blind with their data, they stumble in predictable ways (including thinking that a data scientist will magically solve all their problems, but more on that below). Gartner's Svetlana Sicular has catalogued eight common causes of big data project failures, including:


Continuous Improvement Of Your Compliance Program, Part II
While many companies will look at continuous monitoring as a software solution that can assist in managing risk, provide reporting metrics and, thereby, insights across an organization, it should be viewed more holistically. You will need to take many disparate systems, usually across a wide international geographic area, which may seem like an overwhelming process. Justin Offen, explained this in his article, entitled “Mission Impossible? Six steps to continuous monitoring”, where he detailed a six-point program to ensure that your “CM solution doesn’t become part of the problem” rather than a solution.


Technology and marketing disconnect hinders customer analytics success
“What tends to happen and what we have seen in recent years, is that there’s a fundamental disconnect in the way business leaders think about data, and how technology leaders think about it,” she told CMO in an interview before the event. “We see lots of lost opportunities. There has been a focus on big data projects and platforms and solutions by technology teams, or vendors are wooing marketing leaders, but they’re not so good at solving business problems. Business and technology are not working together towards a common purpose, which is using that data for customer engagement.”


How SaaS solutions help CFOs get IT right
With the widespread acceptance of SaaS, it’s easier to evaluate technology based on what your business needs rather than getting bogged down in details about functional alignment with existing technology. And this rings true for many types of business solutions, including finance. Leading CFOs have realized they are uniquely positioned to consider potential TCO, ROI and use-case factors to determine how well solutions fit with the overall business strategy, even if they are non-technical. At the same time, CFOs are increasingly embracing cloud computing. 72 percent of CFOs believe that “disruptive” technologies such as cloud, social and mobile will change the way they structure and run finance.


Car Security Is Likely to Worsen, Researchers Say
Because of the proliferation of wireless access in vehicles, especially Bluetooth and cellular connectivity, remote execution is increasingly possible. The feasibility of sending commands to the electronic control units that manage different vehicle functions depends on the design of the car. Car companies need to design their systems to detect exploitation attempts and prevent security from being compromised, Miller said: “You want to make each of these three steps harder for the attacker.” But with car manufacturers competing on features, the addition of in-car applications from navigation to streaming music could leave more vehicles vulnerable, Miller added. “In-car apps and desktop-like features pose huge upcoming threats,” he said.


5 Priorities For Chief Data Officers
How can CDOs ensure their own relevance and success? Finch said the key is making sure that data projects are for the sake of business objectives, not for the sake of data. For example, too many companies take the approach of putting a big data lake in place just hoping somebody will find a use for it. There should be a clear business objective, such as reducing data warehousing costs by a targeted amount, comparing same-store sales to weather patterns to improve merchandising, or streaming real-time information into the lake and finding more fraudsters.


Seven data science lessons from McGraw-Hill Education analytics guru
Practice, practice, practice, Essa said, citing Ezra Pound's classic guide to writing poetry, ABC of Reading. "His idea was read lots of poetry to prepare," Essa said. "So we do that with data scientists." He gives data scientists all kinds of data sets (on education and beyond) and instructs them to "do some descriptive analytics and just tell me what questions you can answer." In some cases, data scientists work individually; in others, they operate as part of a team. "A very important part of doing data science is interactive data exploration," he said."


Architecting a High Performance Storage System
A good data storage system is a well-balanced: each individual component is suited for its purpose and all the components fit together to achieve optimal performance. Designing such a system is not straightforward. A typical storage system consists of a variety of components, including disks, storage controllers, IO cards, storage servers, storage area network switches, and related management software. Fitting all these components together and tuning them to achieve optimal performance presents significant challenges. Experienced storage designers may employ a collection of practical rules and guidelines to design a storage
system.


Cyber Risk Strategy Must Evolve to Match Changing Threats
The bad guys are winning, primarily because they can keep one step ahead by deploying a wider array of attack methods. In a recent Deloitte survey, 75 percent of global financial institutions believed their info security program was at a maturity level 3 or higher (on a 1 to 5 scale, with 5 being best), but only 40 percent were confident that they would be protected from outside attack. That’s a scary number, but completely understandable. The cyber threat landscape is constantly evolving, and cybersecurity must transform itself to keep pace. The basis of this new approach is easy to understand. An effective cybersecurity strategy includes three legs: security, vigilance and resilience.



Quote for the day:

"Hold yourself responsible for a higher standard than anybody expects of you. Never excuse yourself." -- Henry Ward Beecher

August 07, 2014

Oracle hasn't killed Java -- but there's still time
By the time Oracle bought Sun, its troubles had leaked into Java 7, which took approximately 100 years (give or take) to be released -- and with far fewer features. Oracle started making promises about releases and tried to create a release schedule (good idea), However, it failed to fix Sun's semi-abortive attempts to open-source Java, which might have made it more responsive to the industry, or to create any new Java products that anyone wanted to buy. In fact, Oracle trimmed Sun's portfolio of immature products that no one was purchasing. It was probably a good move, but some of Oracle's offerings in those areas are rickety at best. Then Oracle continued Sun's late attempt to tick off its allies and sued Google with a position ripe with collateral damage for our entire industry. Needless to say it was sort of predictable.


What Does the Future of Work Look Like?
In the future of work, apps and operating systems will light up scenarios such that, whatever device you use, it's the functional equivalent to being on the corporate network. We saw some of this with the DirectAccess feature that Microsoft enabled in Windows 7 and Windows Server 2008 R2, but this now extends in Windows 8 and beyond. No more user-initiated tunneling. No more clunky laptops trying to boot up. A user will take a computer, unsleep it within a few seconds, and use it like he or she is on the corporate campus. The takeaway for IT? Make the boundary between your network and your users as transparent as you possibly can.


5 Breakthrough DARPA Technologies Beyond GPS
"More worrisome is that adversaries can jam signals. GPS continues to be vital, but its limitations in some environments could make it an Achilles' heel if warfighters rely on it as their sole source of PNT information," DARPA says on its program website. In fact, illegal devices that jam GPS signals are becoming increasingly available. Some simple gadgets that plug into 12-volt car receptacle connectors and cost as little as $30 can render GPS systems inoperable for miles, according to GPS systems provider NovAtel. In its search for new technologies that offer an alternative to GPS, DARPA is particularly interested in systems that provide long-duration precision and accuracy in positioning and timing for global synchronization, secure communications, and cooperative effects.


I give the new Raspberry Pi B+ an A-
My two favorite B+ features are four USB ports (compared to two on the B board) and the micro SD card slot (compared to the full-sized SD card slot on the B board). Micro SD is the perfect platform for a board this small. That, and the micro SD card doesn't stick out too far from the board's boundaries. ... everything on the B+ board is more organized and better placed, although the camera serial interface (CSI) and display serial interface (DSI) didn't move very much. But the DSI is now situated very close to the edge of the board making it more convenient for cabling.


The big data architecture dilemma for CIOs
As CIOs architect for big data, they're likely to bump up against a common and longstanding IT dilemma: To build or buy? Today, big data infrastructure bottlenecks can be specific and ill-suited for the one-size-fits-all solutions that have dominated the market for years. The better fit may come from technology alternatives such as in-memory or NoSQL databases, cloud, open source or, as is the case for Facebook and Tesla, a custom build. But first, CIOs will have to parse through the ambiguity of the term "big data" itself, juxtaposing what has become a catch-all marketing phrase with the technical pain points the business faces. And in the end, they're likely to make surgical rather than sweeping technology investments.


Massive Russian hack has researchers scratching their heads
Some security researchers on Wednesday said it's still unclear just how serious the discovery is, and they faulted the company that uncovered the database, Hold Security, for not providing more details about what it discovered. "The only way we can know if this is a big deal is if we know what the information is and where it came from," said Chester Wisniewski, a senior security advisor at Sophos. "But I can't answer that because the people who disclosed this decided they want to make money off of this. There's no way for others to verify."


Run virtual machines on Windows 8.1 with Client Hyper‑V: A quick how-to
Many Windows users aren't aware of it, but a powerful virtualization tool is built into every copy of Microsoft Windows 8.x Pro and Windows 8.x Enterprise, Client Hyper-V. This is the very same Type-1 hypervisor that runs virtualized enterprise workloads and comes with Microsoft Windows Server 2012 R2. The virtual machines you create on your desktop with Client Hyper-V are fully compatible with those server systems as well. If you're a software developer and need to do testing, or simply want additional operating system(s) running on your computer, such as Linux, Hyper-V can be a great feature to have enabled on your PC.


Big Data and Biometrics: Why Your Face Matters More than Ever
The face recognition software that makes those Facebook tagging suggestions possible is part of a larger discipline called biometrics that includes fingerprints, retinal scans, and gait recognition, and the field is advancing fast. Combining those capabilities with big data analytics tools allows us to understand who you are simply by looking at you—whether you’re in a photo on Facebook, a video clip, or merely walking around in the world. So, is this good or bad? The answer is probably both.


HTML5: Doomed to fail or just getting started?
Developers want easy-to-use, powerful tools, but HTML5 yields them a somewhat fragmented platform that lags native tool-chains from Apple and Google. Developers need distribution, so they launch in the Apple App Store and/or Google Play Store (never mind that they quickly get lost in the clutter of millions of other apps....). They need monetization, and the major platforms provide an understandable -- if difficult -- route to money. HTML5 offers an open alternative to these platforms, but as VisionMobile points out, "The open nature of HTML5 doesn't intrinsically help anybody do their job better." It may keep developers free, but it doesn't pay the rent.


Internet of Things: A Big Use Case for Big Data
There are three types of data that we have in our study: transactional data, something that comes out of a point of sale system; there’s human-generated data that might be Twitter, a blog or a picture; and then there’s machine-generated data, which is log files, sensors, etc. The reason that machine-generated data swapped places with human-generated data is that from a sensor perspective it’s easy for me to look at the log files that come out of my environmental control system and say “If I raise the temperature in the buildings in the summertime from 71 to 72, I can affect a dollar change and a lowering of my costs.”



Quote for the day:

“To the person who does not know where he wants to go there is no favorable wind.” -- Seneca

August 06, 2014

One Click to Disaster Recovery
Quorum says that the system is secure with all data transferred from the appliance to the disaster recovery cloud going through a 128bit advanced encryption standard (AES) session over a 256bit AES virtual private network tunnel that directly connects the Cloud to the local appliance. There is a dedicated firewall to isolate each virtual network. Moreover, with more than a nod to the retail businesses it hopes to attract, Quorum is Payment Card Industry (PCI) certified, meaning that in the event of a failure all confidential financial information, such as credit card details, is handled in a fully PCI-compliant way.


The antidote to shadow IT: Trust and transparency
Making the situation worse, most IT departments do a poor job of explaining to users what enrolling a device in an enterprise mobile management (EMM) solution means -- they don't clearly explain how they can set restrictions, monitor the device and enterprise assets on it, and wipe some or all data from the device. (Sometimes they're deliberately vague so they don't have to explain how limited those capabilities actually are.) Even when policy documents and guides are explicit about what control and access employees are giving, many users don't trust them. So it's easy to see why surveys find most users are reluctant to hand over control of a personal device to IT, or to accept a device that they're told to treat as their own under the CYOD


Optimize Your Virtual Environment with Software-Defined Storage Approach
With flash storage technology becoming more prevalent and cost-effective, a new approach to consider in virtualized environments is software-defined storage, which employs software as a means for controlling data center storage. In the coming year, current flash-based storage systems are expected to transition to a software-defined approach, producing a new landscape that will change the industry permanently. A software-defined storage tier has the flexibility to scale up or scale out easily as application and business needs dictate.


CIOs Cede Digital Transformation Ground To CMOs
Altimeter's "2014 State of Digital Transformation" report defined digital transformation as "the realignment of, or new investment in, technology and business models to more effectively engage digital customers at every touch point in the customer experience lifecycle." Some 88% of executives and digital strategists indicated that their company is undergoing a formal digital transformation effort this year, according to the report. But only one quarter said they mapped out the digital customer journey and have a clear understanding of new digital touch points.


The CIO and CMO Perspective on Big Data
CIOs can be a good check on the business value of the latest shiny big data tool and force CMOs to put the business outcome first. “Marketing is often used to take quick action and get quick results,” says Meyers of Biogen Idec. “Since much of this is still so new, and the technology is still so immature its important we focus on the handful of things that really matter and spending the time together to work through an experiment and scale it up to something that can be sustainable for the long-haul.”  “CMOs and marketing organizations need to hone their focus on both the business questions they need answered, and the decisions they want to inform, with analytics,” says Suzanne Kounkel, principal and leader of Deloitte Consulting’s customer transformation practice.


Why Data Should Be a Business Asset: The 1-10-100 Rule
The 1-10-100 rule can be applied to data quality challenges at various stages in the database lifecycle, since it illustrates the importance of maintaining a high standard of data quality continually rather than occasionally. The rule applied to data is as follows: Verifying the quality a record costs the business $1. This is known as the prevention cost; Cleansing and deduplicating a record costs the business $10. This is the correction cost; and Working with a record that’s never cleansed costs $100. This is the failure cost. ... Data quality is not a problem that can be tackled once and forgotten, and tackling it soon and often is better than late or not at all.


Blackrock: measuring risk in a datacentre
In engineering risk terms, at first glance Blackrock appears to deliver fairly standard resilience. As a minimum standard Tracy says it offers "n+1" resiliency. “We generally have two independent power trains which have their own generators and UPS. Our independent emergency generator and UPS can handle half of the load out on the A and B cord. We could lose an entire generator line and still have ample cover to run the full operation,” he says. After the company bought Barclays Capital in 2010 it had 28 datacentres around the world. Then it began a migration strategy to move to a single platform. Today BlackRock has 11 datacentres and the plan is to get that down to six or eight.


Cybersecurity should be professionalized
"There were a lot of self-described doctors, but no standards," she said. "We need some kind of focal point to gather around to foster minimum, basic standards and frameworks so people have a way to navigate the cybersecurity field." Currently, it is difficult to determine the actual skills and abilities of professionals based on their education or certification credentials, she said. It is even harder to map those skills to real-world job requirements, she said. "There's nothing that prioritizes different educational programs. There are no standards across different specialties. There is no single organization that can take ownership of this field" as the AMA and the American Bar Association do, Spidalieri said.


Transition tips for new leaders
A leadership transition is one of the most important yet underappreciated aspects of a new leader’s experience. It helps to frame the new leader’s role and the relationship that he develops with his team. If managed well, such transitions can make all the difference in promoting acceptance from within the ranks, and allowing the new leader the time and patience necessary to get acclimated and begin to build equity. One of the most successful transitions on record occurred in antiquity.


The Impact of Personalized BI
The biggest challenge in BI is the volume of data that is accessible. When faced with a comprehensive body of data from multiple overarching business systems, it is easy to become overwhelmed. Many leaders use BI as the foundation for reporting, pulling vast amounts of data from disparate systems to create multipage reports that are never actually analyzed. By personalizing your BI, you can streamline the reporting process and create effective, meaningful analytics that help you reach your goals.


Leading a Culture of Effective Testing
Once a team of individuals are given the responsibility to develop, test and support a system, we can either wait for them to come to the conclusion that manual verification isn't going to cut it, or we can avoid gambling and educate them. Making the leap to automated testing can take years without guidance, especially when individuals are overwhelmed with daily responsibilities. Once individuals buy into it, it will take years to become proficient. Most of this can be avoided by leveraging expertise to demonstrate the value.



Quote for the day:

"Experience is a hard teacher because she gives the test first, the lesson afterwards" -- Vernon Sanders Law

August 05, 2014

Yes, there's a tech bubble: Google Shopping Express proves it
Google has plenty of money to subsidize its service as long as it cares to, but the story quotes one observer saying “There’s no line of sight” to making the service pay for itself. This is a money loser now, and it projects to be for the foreseeable future. But at least GSX, as Google calls it, charges something for its service. The real riddle is companies like Seamless.com and WunWun, which offer free or almost free delivery from restaurants and other retailers in a number of cities. Instead of asking consumers to pay, they charge the retailers a commission and other fees that a recent BusinessWeek articlesaid made Seamless unsustainable for many restaurants.


'The Internet Of Things' Will Change Virtually Everything About How Large Companies Operate
The IoT will be a diffuse layer of devices, sensors, and computing power that overlays entire business-to-business, consumer-facing and government industries. The IoT will account for an increasingly huge number of connections: 1.9 billion devices today, and 9 billion by 2018. That year, it will be roughly equal to the number of smartphones, smart TVs, tablets, wearable computers, and PCscombined. In IoT research from BI Intelligence, we look at the transition of once-inert objects into sensor-laden intelligent devices that can communicate with the other gadgets in our lives.


Can Strategic CIOs Create a Renaissance Revolution?
Filippo Passerini, Group President-Global Business Services, and CIO at P&G is passionate about creating information democracy across the various business units. His digitize, visualize, and simulate strategy changed the business model and helped managers make well-informed business decisions. There is no doubt that there is a renaissance revolution occurring in the C-suite today and CIOs are leading the charge. Strategic CIOs change the dynamics of the business enterprise by leveraging information and technology in new and innovative ways to create customer value, improve margins, and enhance shareholder wealth...a winning outcome for any business enterprise.


How giant websites design for you (and a billion others, too)
Facebook’s “like” and “share” buttons are seen 22 billion times a day, making them some of the most-viewed design elements ever created. Margaret Gould Stewart, Facebook’s director of product design, outlines three rules for design at such a massive scale—one so big that the tiniest of tweaks can cause global outrage, but also so large that the subtlest of improvements can positively impact the lives of many.


Ugly Research: Data is easy, Deciding is hard
Tracy Allison Altman over at Ugly Research has a great new white paper – Data is easy: Deciding is hard - in which she quotes me (thanks Tracy). It’s a great paper and makes what I think is the critical point – that you don’t need a data culture but a decision culture. And I would add that you need this at every level – strategic, tactical and operational. The paper has some great advice and I would add a couple of additional thoughts: For decisions you make often – some tactical and all operational decisions for instance – build a decision model so you know how you think you are going to/should make the decision moving forward.


Using Big Data to Optimize Business Operations
Business – and life in general – is becoming data-centric. In order to uphold reliability and preserve reputation, a data center must maintain an unimpeded flow of data at a level not anticipated even just a few years ago. To do that, a data center needs to refine how it values data used in monitoring its own operations so that the flow of information generated in running the facility does not flood or overwhelm IT and management capabilities.


The Dark Age Of Enterprise Software Is Ending
We all need to realize that it’s a whole new ballgame. And just like the insular, glacial world of baseball, this new age of software is a tectonic shift in the enterprise that makes a lot of people very uncomfortable. For our enterprises to succeed in this new world, we need more than just shiny new software. We must change long-held cultural, political biases about “how we do things here.” In making critical decisions, enterprises too often rely on perceived rather than rigorously analyzed historical patterns. They let competing entities argue their positions, too often giving power to the loudest voice in the room.


Defining F5's role in software defined networks
With regards to F5 specifically, the company does have a broad set of software defined application services (SDAS) today. BIG-IQ is an architecture for managing F5 SDAS elements and can be used to provide simplified abstractions to the control or orchestration plane. This can be useful when integrating a number of heterogeneous components. This is why the F5 Synthesis partner ecosystem is so broad today and is an SDN “whose who,” including Cisco, VMware, Big Switch, Arista, Oracle, Splunk, Rackspace, and the list goes on. F5 is also one of the few vendors that’s playing both sides of the VMware/Cisco card. Clearly, the SDN wars are heading down a path where there’s a defined Cisco camp and VMware camp.


Hunting Concurrency Bugs
The bug was in the JVM, rather than my code. I've been waiting since 2010 to publish it, because a malicious coder could insert this into his code and jam up your application server. Since you cannot connect JConsole or jstack or JVisualVM to it, nor can you generate a stack trace with CTRL+Break or CTRL+\, it can be quite tricky to discover where this is coming from. As Java programmers, we often think that all bugs are in our code. But the JVM was also written by people and we all make mistakes. The only reason that there are less bugs is because more people are using the JVM than your code and so the bugs tend to get rooted out more quickly.


Early interest in LTE-connected cars is strong
It's clear GM is fully backing the idea of a connected car. While Audi actually had the 4G LTE-connected car on the market, GM will have the broadest selection of connected cars, with 30 models hitting the market this year. Chan said the goal was to further expand 4G LTE-connection in the car lines next year. Beyond the consumer, Chan said she sees an opportunity to sell its 4G LTE-connected car service to businesses that deal with vehicles, such as the trucking industry. GM has opened up its software programming to allow businesses to create apps that take advantage of a connected car.



Quote for the day:

"Whenever you do a thing, act as if all the world were watching." -- Thomas Jefferson

August 04, 2014

Urban Jungle a Tough Challenge for Google’s Autonomous Cars
Humans make use of myriad “social cues” while on the road, such as establishing eye contact or making inferences about how a driver will behave based on the car’s make and model, Alberto Broggi, a researcher at Italy’s Universita di Parma, told MIT Technology Review. Even if a computer system can recognize something, understanding the context that gives it meaning is much more difficult, said Broggi, who has directed several major European Research Council grants in autonomous driving. For example, a fully autonomous car would need to understand that someone waving his arms by the side of the road is actually a policeman trying to stop traffic.


5 technologies every cloud-ready systems administrator should know
In the last week of June 2014, I had the chance to share a project with worldwide information technology (IT) experts—all of them with a wide breadth of experience in the IT industry. We discussed several topics during those days—of course each expert has a very particular and personal point of view about the market and technologies—but one point that I want to highlight is a fact that all of us agreed on: information technology is an unending journey. Because of this, I’ve started to think on how important it is to be up to date on IT technologies as an IT professional. In this blog post, I want to share my opinion about the five technologies an IT professional must to know to become a cloud-ready systems administrator:


Netmagic Building Reportedly Largest Mumbai Data Center
Netmagic, subsidiary of the Japanese telecom giant NTT Communications, is building a massive data center in Mumbai, which it says will be the largest data center in the area. Netmagic is one of the biggest data center service providers in India. While growth has been slow this year, India’s economy has generally done well in recent years compared to other countries. Strong economy usually means a thriving IT services market, which in turn benefits data center service providers like Netmagic.


Cloud ROI: Why It's Still Hard To Measure
While the 122-year-old General Electric also is "all-in on the cloud," says GE Cloud chief operating officer Chris Drumgoole, its approach is dramatically different from Airbnb's. Unlike Airbnb, the 300,000-employee GE wasn't born in the cloud and must find a way to migrate a massive legacy application infrastructure. GE operates 34 company-owned data centers and runs more than 9,000 applications. It's now consolidating to five data centers and painstakingly evaluating which applications it will rearchitect and move into a private or public cloud, and which ones it will phase out. It's also using software-as-a-service selectively, striking a deal in May, for example, to give employees access to Box online storage.


EBay Is Running Its Own Sociology Experiments
This means more than just the items that show up on the homepage or what auctions are most prominently featured in the mobile app. Demographic and site use data about eBay users is used, Churchill says, not for homepage design but for notifications. The emails users receive from eBay are shaped considerably by demographic information. “Demographic data is used most effectively for notifications and marketing campaigns, rather than algorithmic recommendations,” she added. A big part of this is using data about a user to figure out the sweet spot that will get them to visit eBay more often without annoying them.


Wirelessly Hacking--And Unlocking--Cars Is Easier Than It Should Be
Silvio Cesare, the car-hacking security researcher, explained the whole technique to Wiredrecently. It basically involves tricking the car into thinking that it's being unlocked with the standard wireless key fob, when really it's being pinged with a signal from a software-defined radio attached to a laptop. The radio first finds the frequency that the key fob is using and then cracks the specific mode of encryption using a brute force attack. As Cesare very clearly shows in a video of the exploit, the car pops open after a few keystrokes.


How to Solve Data Fragmentation, or Why to Invest in a Distributed Data Warehouse
The necessary data to lead a data-driven company or strategy is far reaching. It encompasses everything from enterprise financial data quarter-over-quarter to bounce rates week-over-week. Worse, for your individual teams, each department needs different data sets, often visualized to cater to the team with action items dedicated to increasing the productivity and efficiency of said department. In other words, what your sales team uses and what your marketing team uses aren’t often going to be the same data platform, and if it is, its likely that one of those teams is suffering for it.


API Compatibility War Validates Abstraction Approach to Cloud Computing
In addition to the application profile, a key enabler of this abstracted approach is a cloud orchestrator. Often a single, multi-tenant virtual appliance that resides transparently on each supported private or public cloud, this orchestrator is responsible for coordinating the requirements of the application, represented by the output of the application profile, with the best-practice infrastructure and services of the cloud, allowing it to provision its resources in order to deploy the application. In this model, the onus is on the CMP to constantly update its cloud orchestrators to take advantage of innovations of each cloud vendor, who no longer needs to be concerned with breaking API compatibility.


Hackers can tap USB devices in new attacks, researcher warns
The finding shows that bugs in software used to run tiny electronics components that are invisible to the average computer user can be extremely dangerous when hackers figure out how to exploit them. Security researchers have increasingly turned their attention to uncovering such flaws. Nohl said his firm has performed attacks by writing malicious code onto USB control chips used in thumb drives and smartphones. Once the USB device is attached to a computer, the malicious software can log keystrokes, spy on communications and destroy data, he said.


Data Scientist Role Shifting to Focus on Developers
"The developers are the new kingmakers," he adds. "They are unlocking business value by building apps. The data scientist needs to have a new mindset — it's not just about solving big problems in isolation anymore. The mindset has to be: How do I enable these developers?"For his part, Jhingran says he is working to drive that mindset at Apigee. Data scientists there are no longer in data science teams set apart from others. Instead, they've been spread out and now sit with developers in the lines of business.



Quote for the day:

"Leaders don't force people to follow, they invite them on a journey" -- Charles S. Lauer

August 03, 2014

Agile Enterprise Architecture Finally Crosses the Chasm
“It does look like we’re crossing the chasm,” Cockcroft agreed, referring to Geoffrey Moore’s theory about the technology adoption lifecycle. “I’m seeing a few ahead, a lot in the middle, and a few laggards.” Perhaps the central characteristic of this chasm-crossing transition is the shift from early adopters as risk takers to the early majority who doesn’t want to be left behind. Cockcroft continued, “Enterprises face the threat of not doing such transformation – of their competitors running away from them.” As a result, “Enterprise IT has got to catch up quickly.”


Second-generation cloud architecture: breaking the application silo
The cloud as we have come to know it is starting to crack. Like any new technology, it has become a buzzword at the peak of its phase of inflated expectations. Just as early television programs were little more than filmed stage plays, first-generation cloud applications are often just yesterday’s apps in a different data center. But the cloud has grown up, and there are no more excuses for building siloed, brittle applications that can’t exploit all the benefits of distributed, on-demand computing. ... We must change the way application architects and information managers approach application development and integration going forward.


Impossible to Ignore: The importance of IT Governance
The decision framework and the corresponding tools and processes to support them must be clearly communicated so that day-to-day activities and decisions are made within this context. ... Clearly the desired outcomes that shape IT will vary between industries and organizations. For example, some enterprises may focus on product innovation and accelerated go-to-market strategies while others may strive to create operational efficiencies throughout the value chain. CIOs may also encourage management to consider new technologies such as a big data, real-time analytics initiative or social-media-based customer satisfaction programs to support business performance.


PCI DSS v3 compliance – What you should know when completing your SAQ(s)
In the PCI DSS v3.0 SAQs they have added the phrase “merchants confirm that, for this payment channel:” before each of the eligibility criteria. This means that any organisation can fill out multiple SAQs, just making sure that each of their different payment methods (or channels) fit the criteria for one of the SAQs and then completing them. This means that it can be much easier to complete the questionnaires by dividing up the payment channels and concentrating on one at a time.


Why Enterprise Architects Need to Think About Data First
“Enterprise Architecture needs to be the forward, business facing component of IT. Architects need to create a regular structure for IT based on the service and product line functions/capabilities. They need to be connected to their business counterparts. They need to be so tied to the product and service road map that they can tie changes directly to the IT roadmap. Often times, I like to pair a Chief Business Strategist with a Chief Enterprise Architect”. To get there, Enterprise Architects are going to have to think differently about enterprise architecture. Specifically, they need think “data first”


High Performance PHP Application Architecture
Limundo/Kupindo websites daily have more than 300 000 visitors which generate 10 million page views per day. During peak hours around 10 000 users are online simultaneously. On the other side, speed, stability and scalability are three main requirements that need to be matched with a PHP application architecture. Currently, Limundo is a self-configurable High Availability system that achieves page loads of under 1s and 99.999% uptime, while manipulating more than 15 TB of data on a monthly basis. This paper describes software and hardware architecture spread over several server clusters hosted in the private cloud, that makes this possib


UK government recognises datacentre sector as a key economic contributor
“In contrast to other EU countries, the UK has been slow to recognise the importance of a thriving datacentre industry to a country’s economic health,” said Emma Fryer, associate director of Climate Change Programmes at techUK. “However, that has all changed. The treasury has recognised the need to protect future investment and growth by, at least partially, levelling the playing field for UK operators competing with their counterparts overseas.”  Climate change agreements (CCAs) are negotiated arrangements between government and energy intensive sectors.


CCOs Take Note: It’s the Culture, Stupid
First, the CCO should report on the company’s culture and message. They need to report on an annual culture survey. If an annual enterprise-wide survey has not been conducted, they need to conduct targeted surveys that measure culture in specific offices, regions, units or even third parties. A CCO should have at least one measure of culture to report to senior management and the Board for each quarter. CCOs have to get creative here and monitor and report on the state of the company’s culture. If the message is getting through, senior management and the Board have to know. If the message is not getting through, then senior management and the Board needs to know that immediately.


The Enterprise Architect as Enterprise Ecologist
The use of systems science and practical offshoots, such as systems thinking is increasingly imperative. While so-called reductionist thinking–breaking a complicated problem down into its component parts and studying how each one specifically acts within the whole — is invaluable at certain scales, such as individual deployable components, it falls apart as one studies complicated systems as a whole. The alternative, expansionist thinking, is more “up-and-out” in nature; start with a component within the system and work “outwards” from there. One way to do this is to build a graph of such interactions for each component, and use those graphs to understand the larger system.


Surviving & Thriving in the Current Risk Management & Regulatory Environment
Systems investment is necessary to reduce operating cost and speed processing. This has a direct benefit when organizations are faced with increased demands for compliance. In fact, in recent years, forward-thinking banks have driven the purchase of origination systems from a risk perspective rather than simply from a focus on operational efficiency, because of the necessity of creating a repeatable, sustainable, and transparent risk management process.



Quote for the day:

"Talent is God-given; be humble. Fame is man-given; be thankful. Conceit is self-given; be careful" -- John Wooden

August 02, 2014

How one judge single-handedly killed trust in the US technology industry
The ruling on Thursday follows from an earlier lower court, in which U.S. Magistrate Judge James Francis in New York ruled that a search warrant can be applied outside the country. The theory was that because Microsoft, named in this case, owned and controlled a foreign subsidiary company based in Dublin, Ireland, any data stored in its overseas offices or datacenters still fell within US territory — albeit loosely. The official channels between countries that allow cross-border law enforcement operations to work, called mutual legal assistance treaties (MLAT), are "generally... slow and laborious," Francis said in his ruling. He added that the "burden" on the US government to work with other nations would be "seriously impeded."


Beyond Localization: Software for a Global Audience
This article is about going beyond localization and delivering software to a truly global audience. Most developers think this can be accomplished simply by translating and localizing the text, but this is not true. This article does not contain source code and is not about the technical aspect of localizing your software. Rather it is about the process and how to prepare your team and software for the necessary changes. Globalizing your software includes adapting for language, dialect, customs, cultural issues, monetary issues, times, dates, formatting, and measurement standards.


Six reasons why cloud computing will transform the way banks serve clients
The EC is also waking up to the possibilities. In a recent policy paper, the EC’s European Cloud Partnership spelt out the need to tackle issues around data, privacy security and legal differences across national boundaries. Its vision is to create a secure environment in which private and public sector organisations can use, buy and sell cloud services. All this momentum is building at a time when banks are under increasing pressure to use their IT budgets more efficiently, while competition from non-bank payments providers is much tougher and the need to serve clients better is becoming more acute. But it is not a technological Valhalla – there are disadvantages too.


Is Silicon Valley’s Image Going Up in Flames?
In a July 28 blog post, Rudder admitted that OkCupid experimented by, at times, removing user pictures or profile texts, and indicating a good match or bad match even though the algorithm showed the opposite. The goal apparently was to find out how much importance is being placed on a user's picture, the power of suggestion, and how effective OkCupid's matching engine works. Ethical questions about secret experimentation be damned. "We noticed recently that people didn’t like it when Facebook 'experimented' with their news feed," writes Rudder in a blog post,


Meet the Engineer: Sravya Tirukkovalur
As Cloudera rightly says in one sentence: It lets you “ask bigger questions”. If you think about how much data we produce every day versus how much we actually process, it is astonishing to imagine how many ways the world could benefit if we had the software capabilities to easily store, process, measure, and learn from all of it. And with more and more new datasets becoming available daily, it is very important for the software to evolve rapidly in terms of scale, performance, usability, and security. I think this rapidity of software development in the Hadoop ecosystem is only possible because of the open source community, and I am very glad to be a part of that community as well as working with the leader, Cloudera.


How to Make Your Department More Data-Friendly
Of course, most organizations or businesses aim to be data-driven. In reality, though, decision-makers aren't the ones primarily using the data. They are instead at the receiving end, where the effectiveness of a data-driven strategy is polished into pretty presentations.  We're not here to focus on them. Instead, we're here to focus on the pieces of the business using the data on a day-to-day basis to not only do their jobs better but also do them more effectively. And we're here for them to provide something rarely seen when it comes to big data productivity: a game plan.  See, there's a simple way to get started and make your department more data-driven in the process, and it begins with these five steps.


Cloudify Aims To Automate Cloud Troubleshooting
Cloudify has the potential to erase the border between monitoring and orchestration. The new version of Cloudify provides a feedback loop from the monitoring engine to the orchestration engine. When it spots performance falling below expected thresholds, it can notify the orchestration engine, which can "react to monitored events with appropriate corrective measures." While the capability is now part of a re-designed product, it remains to be fleshed out with policies that will provide the guidance for non-manual, automated corrective actions, says Shalom. They are due in the fourth quarter, according to the announcement.


We don’t do that here
Taking a Big Bang approach to becoming FIT is just as foolish as taking a Big Bang approach to delivering large projects. There is far too much risk to go that way. Think of making these changes like the way an airplane’s autopilot works. Trying to hit the runway in Hawaii based on calculations made once in LA is impossible. Not virtually possible but not probable, it is impossible. Not only is there the need for extreme accuracy that would be required if you only take one reading, but there are all the variables of wind speed, direction, atmospheric pressure and others. With all these variables it is impossible to set course once. That is not how autopilot works. The auto pilot systems on airplanes are constantly taking readings against their destination and making small course corrections.


DDoS Attacks Are Still Happening — and Getting Bigger
This is partly because banks have invested in better DDoS mitigation technology and services, observers say. Another factor is that banks are being targeted less frequently — only about 10% of incidents. Gaming, technology and media companies have become more popular targets. But attacks are still being launched against banks and other companies, and with greater force than ever, according to large information security providers such as Prolexic (which is now owned by Akamai), Verizon and Verisign. The three companies recently issued reports that shed light on the changing nature of DDoS attacks.


Ynote Classic - Text and Source Code Editor
The first ynote version consisted of nothing, just a TextBoxcontrol and some basic commands - Cut, Copy, etc. Then I saw the FastColoredTextBox control. TheFastColoredTextBox control was first included in v2.0, supporting only 5 languages. Now, it has just everything a perfect code editor can have. Another reason was to know the capabilities of .NET because I didn't find any decent Text Editor written using the .NET Platform (not including C++) So I mae "Ynote Classic" - The Text Editor, coded with .NET.



Quote for the day:

"Leadership and learning are indispensable to each other." -- John F. Kennedy

August 01, 2014

Cloud app development can reap the benefits of Agile
The first step is to think of the cloud as an ever-changing organism, rather than a static platform. "A developer may not realize that the infrastructure beneath them is shifting constantly in the cloud and [may need to] incorporate responses to common transient failures." One example of this would be scalability. What would happen if a cloud application got popular and the traffic suddenly spiked? Developers would need to know beforethis happened in order to carry out an effective scalability plan. When it comes to the cloud, quality is not an end result. It is a constant process, and cloud applications need to be designed with a process-oriented mindset.


In a hyper-social world, some seek a little privacy
"Companies have realized there's some privacy boundaries to what people want to share," said Justin Brookman, director of consumer privacy at the Center for Democracy and Technology, a nonprofit group in Washington, D.C. Comments from Zuckerberg reflect the shifting tide. In an onstage interview in 2010, Zuckerberg suggested people were happy to share widely. "People have really gotten comfortable not only sharing more information and different kinds, but more openly and with more people," he said at the time.


How to reach a software-defined operational state of bliss
It is an "operational state" achieved by eliminating current silos of compute, storage, network and software and adopting a new way of managing and controlling all the moving parts within the infrastructure. With the trend toward software-defined infrastructure comes a new level of complexity that can only (says Cirba) be controlled through sophisticated analytics and purpose-built control software. The ability to make unified, automated decisions that span compute, storage, network and software resources, that are based on the true demands and requirements of the applications, and that are accurate enough to drive automation without fear, is the foundation of the next generation of control of IT infrastructure.


Surrounded by 'code halos'? Here's how your IT organization can embrace this new religion
These security, privacy and compliance issues are not simple, but every day different companies across the world are making tremendous progress on being able to solve some of these issues. That’s part one. The second side of the coin is people in many cases are willing to share more and more information, right? What we’re seeing is more and more of an opt-in economy. So people are saying, “Yes, I am willing to share this information, my information, with you, as a company, but you have to treat it with respect. ” Companies have to be compelling and honest in their ability to manage that information in an ethical and trustworthy way, and they have to deliver a level of value that makes it worth the give. We call this the "give-to-get" ratio.


Emotional intelligence: Key to our success
It is important to realize that emotional intelligence is the primary determinant of the quality of relationships in our business as well as in our personal lives. Emotional intelligence is often referred to as our soft skills. I have mixed feelings about that, as some may be inclined to downplay the importance of soft skills, and our EQ is very, very important! Emotional intelligence is having empathy, being able to put ourselves in the shoes of others to sense how they feel and even why they may feel that way. EQ is knowing how to put people at ease, to connect with them and convey the sense that we care.


When tracking defects, make efficiency the end goal
Tracking defects to provide insight also seems suspicious. It allows management by spreadsheet. I would prefer that management get involved in the work. If your team doesn't fix all the preproduction bugs, and customers care about them, then tracking bugs to remember those details might make sense. My preference is only to file a bug report if the issue is not fixed, but is deferred and still worth documenting. The fourth idea is to change the test strategy to find the defects that are actually emerging. To do this, I would look at both preproduction and production defects along with our test approach to see what defects we are missing and what tests we could run to find them.


CISOs still struggle for respect from peers
Those companies that have a CISO have tended to relegate them to a purely operational, fire-fighting role with little say in overall risk management. Over the years, CISOs have often complained about not having enough clout within their organizations to effect real change. The situation stems from an overall misunderstanding of the CISOs role in enterprises, said ThreatTrack Security president and CEO Julian Waits. Many in the C-suite view the CISO function as purely technology related and fail to appreciate the broader role that security executives can play in mitigating and managing overall operational risk, Waits said.


What the IBM and Apple deal means to you and me
Basically, it's going to mean that your devices and your apps learn you. Think about combining Google, Amazon, Facebook, your best friend, and your mom into a device. That's what this new Watson-powered Apple device is going to be. And you thought Watson was cute when it won on Jeopardy. You thought it was just an IBM research project that had no real world application. You were wrong. Watson is at the epicenter of this new phase of computing. Your phone, your tablet, your car, your computer, and even your home will become extensions of you. Forget the Jetsons—that's as far from what's coming as the Jetsons were from the Flintstones.


How Kanban Works
how (or may be why) Kanban works? Is it because it exposes the system and enables visual tracking of requests? Or is it due to limiting work-in-process and reducing the wasteful effect of task switching? Or may be due to frequent and granular feedback it provides to managers through simple measurements like cycle time and throughput? In this article, we will dig into details and study Kanban in the light of queuing theory and Little’s Law1. Also, using case studies, we will illustrate three typical problems which face managers of Kanban development systems, and how to resolve them. This will reveal some basic concepts and insightful ideas about how Kanban works.


IBM Acquires Security Software Provider CrossIdeas
“The addition of CrossIdeas extends IBM’s market share leading portfolio of identity and access management capabilities,” said Brendan Hannigan, general manager of IBM Security Systems, in a statement. “IBM can now provide enterprises with enhanced governance capabilities and transparency into risk from the factory floor to the board room, giving leaders the insight they need to protect their brand and customers.” As part of IBM’s Identity and Access Management portfolio, CrossIdeas will deliver new identity and access governance capabilities to help mitigate access risks and segregation of duty violations.



Quote for the day:

"The first responsibility of a leader is to define reality. The last is to say thank you. In between, the leader is a servant." — -- Max DePree

July 31, 2014

Develop and Implement your customized plan for adopting healthy agile-lean practices
Effective impediment management can be learned with practice and improved with process maturity and experience; management support is still needed for removing organizational impediments. As multiplexing and multitasking reduces, and the team starts following Stop-Starting-Start-Finishing lean mantra, the number of NT events should reduce over a period of time. Moving away from non-lean behaviors (3B and 4B) to healthy agile-lean practices (3P and 4P), shown along the Y-dimension of Figure 1 is a challenge that can be addressed at the team-level. It usually doesn’t depend on and need not wait for senior management support.


Infographic: Capitalizing on the Internet of Things
Let us give you three figures that show why the IoT creates challenges both long-term and immediate. First, consider the number of IP-enabled devices such as cars, heating systems or production machines. Based on research by the analyst firm Machina Research 14 billion of those things will be connected by 2022. Second, the ITU predicts that by 2015, 75 percent of the world’s population will have internet access. And third, the omnipresent mobile revolution: according to the mobile forecast from Cisco’s Visual Networking Index, more than 3 billion smartphones and tablets will be in use globally by 2017.


Hulu Chooses Cassandra Over HBase and Riak
“We looked at HBase and Riak at first,” said Rangel. “Cassandra was an afterthought.” ... “With Cassandra, it managed to handle the load, it’s very reliable, it allows range queries without limitations, and it’s easy to maintain,” said Rangel. “It’s night and day compared to HBase.” The team had to do some hardware changes because Cassandra specs are different. Cassandra is optimized for SSDs, which improved performance. Rangel also said that Cassandra was better at replication.


Attention Agile Programmers: Project Management is not Software Engineering
Many software developers today are working on client/server systems such as Web sites and Smartphone Apps. These systems are based on the exchange of requests and responses between a client and a server. In such systems, the Latency is the time interval between the moment the request is sent and the moment the response is received. The Throughput is the rate the requests are handled, i.e., how many requests are responded per unit of time. In client/server systems it is essential to constantly measure the latency and the throughput. A small code change, such as making an additional query to the database, may have a big impact on both.


Answer to OTP Bypass: Out-of-Band Two-Factor Authentication
When users attempt to visit their bank’s landing page, they get redirected to a fake bank page that steals their username/password. Then, they’re asked to type in the one-time password (OTP) sent by their bank’s mobile app - but, the SMS never arrives, so then the website prompts the user to install a malicious mobile app that’s pretending to be an OTP generator. Whew. This malicious Android app actually intercepts the real two-factor SMS tokens sent by the bank, thereby gaining access to the user’s account and stealing all their monies.


LibreOffice 4.3: The best open-source office suite gets better
According to Coverity, "LibreOffice has done an excellent job of addressing key defects in their code in the short time they have been part of the Coverity Scan service." Like previous versions, LibreOffice is available for Linux, Mac, and Windows systems. You can also run an older version, LibreOffice 4.2, from the cloud using a Software-as-a-Service (SaaS) model. With the United Kingdom making LibreOffice's native ODF its default format for government documents, LibreOffice is certain to become more popular. Other cash-strapped governments, such as Italy's Umbria province, have found switching to LibreOffice from Microsoft Office has saved them hundreds of thousands of Euros per thousand PCs.


'Software-defined' to define data center of the future
Simply being written in software shouldn't qualify as "software-defined"; the term should also apply to the overall resource served (e.g., networking or storage). Just as there are network switches for SDN, appropriately designed hardware and firmware solutions should exist for software-definable infrastructure. In other words, a well-designed physically assembled pool of modular (possibly proprietary and/or highly specialized) resource units could be elastically provisioned, dynamically partitioned and configured programmatically.


A New Hat for Negotiators
Kopelman, who broadly defines negotiations, thinks that even more enlightened win-win negotiators can find themselves impaired by the hat they wear. It’s as if the negotiator’s hat includes a set of blinders that artificially limits the options of every party in the negotiation. She says that we all wear multiple hats in our lives, and that each one represents a different role that comes with its own resources and constraints. (For instance, a business executive may also be a parent, a child, a spouse, a soccer fan, a scuba diver, or a church deacon.) But, Kopelman says, if we can integrate our hats, we might be able to use their combined assets to negotiate in a more genuine way and craft superior outcomes.


Top 5 Wearable Tech You Haven’t Heard of Yet
Forecast calls for 19 billion connected things by 2016, and the wearable technology sector is set to skyrocket from $3-5 billion in revenue to $30-50 billion over the next 2 years. The economic impact estimates as high as $14 trillion over the next decade (AllthingsCK.com). The products in beta and those already created are leading in the market. Fitbit fitness devices are available in 30,000 retail stores across 27 countries worldwide (Amazon published rankings). Google Glass expanded with Google Contact Lens. And the market for jackets that navigate, dresses that change color with mood, and bras that can track your heart rate are popping up everywhere.


Big Digital Leadership
Technology trends such as big data and the Cloud are driving the IT agenda, as are technology-fuelled trends such as mobility and social media. Increased user empowerment as demonstrated by the Byod movement is changing the CIO’s role from technology manager to digital leader. This white paper explores these trends from a strategic perspective. It also offers operational advice thus enabling you to turn these emerging themes into business value.



Quote for the day:

"Your time is limited, so don't waste it living someone else's life. -- Steve Jobs