August 21, 2014

Google fills the gap between IaaS and PaaS
"We don't think there's platform as a service and infrastructure as a service," said Dan Belcher, a Google product manager, at a recent roadshow in Cambridge, Mass. "We really think about a continuum of the level of control and management that you want us to handle and that you'll handle yourself." Developers choosing between infrastructure and platform services face too many tradeoffs, so there is still plenty of room to improve the ability to run workloads in the cloud and eliminate the either-or scenario, Belcher said.


Chief Compliance Officers: Five Steps to Hiring the Right Team
“It’s no longer about being reactive, but proactive,” says Kate Quinn, executive vice president with search firm DHR International in New York, specializing in capital markets and asset management. “Nobody wants a regulator calling to discuss a short-coming. It’s far better to catch things early on than to fix a problem later. Compliance is about following the rules and taking the preventative steps to ensure the fund or entity is following the rules, while still making money.” Granted, CCOs have always had to keep abreast of regulations, establish internal policies and procedures to meet them, document their work and ensure that everyone follows the rules.


Should the Entire Internet Be Encrypted?
What ties all these headlines together? Your online presence is being tracked, monitored, intercepted, evaluated, and compromised. With something like Heartbleed, you would pretty much be helpless if the online assets of a company that you were working with were compromised. You can mitigate your online footprint slightly by using features like “Incognito” mode in Google Chrome, or a “Private” tab in Opera web browsers, but these options really only eliminate local tracks. This is where the IceBrowser comes in. One of the best ways to cover your tracks and secure your Internet usage is through a VPN


Data Quality – Who’s Responsible
Data quality management is an important job and Everybody is sure that Somebody will do it. Anybody can do it, but Nobody does. Somebody got angry about that because it was Everybody’s job. Everybody thinks that Anybody can do it, but Nobody realises that Everybody won’t do it. In the end, Everybody blames Somebody when Nobody does what Anybody could do. Accurate data is undoubtedly the cornerstone of industry, but a lack of standardised data prevents efficient information exchange between departments and subsidiaries and impedes decision-making and understanding of business problems.


PaaS Debate Heats Up At Interop
With microservices, each service in an application runs in its own virtual machine or Linux container. Part of developers' excitement about the Docker container system is that it provides a detailed format for doing this, allowing services to be linked and nested in relation to each other and moved around as necessary. The microservice approach also makes them more maintainable. When a master copy of a service is modified and proven by testing, the order can be given for all containers running the service to get an automated upgrade.


The Internet of Things Brings Legal Gotchas to CIOs
“Many of the legal issues are not well understood even by sophisticated privacy practitioners,” says Christopher Wolf, a partner at the law firm Hogan Lovells. “In the world of sensors rather than computer screens, the legal issues are challenging.” The Federal Trade Commission last September took its first action against an Internet of Things manufacturer. TRENDnet, which marketed its Internet-connected cameras for home security and other uses, settled with the FTC over faulty software that left its cameras vulnerable to online viewing and listening.


Regulatory pressure accompanies changing IT landscape
Monitoring multiple devices for every employee at an organization is a challenge. The virtualized enterprise is not just about technology, though. Whether you are working at a firm in New York City or on an island, the expectation is that you will be working quickly and with more agility. You have to be able to do work on a range of mobile of devices. Everyone expects a high level of manageability and efficiency. And no one wants to pay extra money for these capabilities.


New attacks secretly use smartphone cameras, speakers and microphones
Have you ever stopped to think of the front-facing camera on your phone as a keylogger? How far away do you hold your smartphone from your face/eyes? The researchers demonstrated how an “attacker can use reflections in the user’s face to perform keylogging with a smartphone’s front camera.” This attack works even on phones with wretched megapixel cameras; phone “cameras with only 2MP are already sufficient for corneal keylogging if the phone is held in not more than 30 centimeters (11.8 inches) distance. Cameras of 32MP even allow for keylogging operations if the phone is held at 60 cm (23.6 inches) distance.”


Beefed-up Couchbase Server 3.0 beta targets developers and admins
"In addition to foundational changes, like the advanced stream-based protocol and tunable memory, which improve performance and enable Couchbase to support many new use cases, we have dramatically improved the developer experience making it easier to build and extend applications built on Couchbase," Couchbase VP products and engineering Ravi Mayuram said in a statement. The stream-based DCP improves speeds by removing bottlenecks, and helps the way increased memory and network capabilities are used, according to Couchbase. Among other benefits, it lists better view performance and the immediate streaming and rapid indexing of changes made to documents to enable data queries at near real-time speeds.


SOA and API Schism and Unification
When creating a unified architecture strategy embracing SOA and REST, a logical next question is when to create a service or an API. From a messaging perspective, services and APIs have similar attributes. They are both network accessible endpoints delivering data or triggering a transaction. From an architecture perspective, both services and APIs provide an opportunity to create loosely coupled solutions exhibiting separation of concerns. Many architects and developers desire to extend their Service Oriented Architecture (SOA) with APIs, but are not clear on when to create a service or create an API.



Quote for the day:

"The most important thing in communication is hearing what isn't said" -- Peter Drucker

August 20, 2014

Software-Defined Networking: Beyond the Hype
New and groundbreaking technologies tend to focus on innovation rather than practicality, so security is typically the last feature added to any new revolutionary piece of software. In other words, even though security is becoming increasingly important, it’s often prioritized later in the game. But with SDN making 75 percent of network and security configurations, the business risk for data breaches increases greatly without sufficient oversight. To curb this, you will have to be just as proactive and cautious about security as the admins working on legacy infrastructure.


5 Ways To Beat The Digital Disruption Curse
Rather than just focusing on collaboration efforts across IT (a la DevOps), look for opportunities to unify digital teams across lines-of-business. One manufacturer I know did this by forming a cross-business DevOps style team tasked with integrating proprietary plant equipment with ERP for more seamless stock replenishment. In this case, IT teams provided expertise in security and standards, while engineers guided app development and analytics -- a perfect digital business combo.


Google SSL Decision: IT's Chance To Be A Hero
Unlike past algorithm tweaks that focused on keyword relevance and metadata optimization, this change requires IT to get the business ahead of the game or at least keep it playing. In the interim between now and when the full effects of the new algorithm begin to have an impact on organizations your business has an opportunity to gain a competitive advantage by ensuring it's SSL-enabled -- before the competition. Google's post gives seven specific steps to take. This change puts the ball squarely in IT's court. It is only within the bowels of IT that SSL can be enabled, whether implicitly on every application server that might deliver an app that will be affected, or explicitly via an SSL-enabled reverse proxy architecture.


IDG Survey – State of IT Cyber Defense Maturity
Download this IDG global survey report based on responses from over 1500 IT security professionals that sheds light on the state of cyber defense maturity. In addition to affording new incident and violation trends across industry and region, the results yield insights into IT security management capabilities, deficiencies and planned investments. Read it and see where your organization fits on the IT cyber defense maturity spectrum compared to your peers. The report delivers insights on: Network Complexity, Exposure; Diversity and Issue Velocity; and Challenging Security Management


The Next Battleground In The War Against Quantum Hacking
So in the cat and mouse game of information security, physicists have been fighting back by designing equipment that is more secure. Today, Nitin Jain at the Max Planck Institute for the Science of Light in Erlangen, Germany, and a few pals show how the changes still leave the equipment open to attack but at the same time reveal how the next generation of quantum cryptography could be made better. In quantum key distribution, Alice sends information to Bob encoded in the polarisation of single photons. So she might send a sequence of 0s and 1s as a series of photons polarised horizontally and vertically. Bob can then use this information as the key to a one-time pad for sending information with perfect security. Hence the name quantum key distribution.


Moving to the Cloud: 3 Data Integration Facts That Every Enterprise Should Understand
Overall, there seems to be two types of enterprises: First are the enterprises that get the value of data integration. They leverage the value of cloud-based systems, and do not create additional data silos. Second are the enterprises that build cloud-based data silos without a sound data integration strategy, and thus take a few steps backward, in terms of effectively leveraging enterprise data. There are facts about data integration that most in enterprise IT don’t yet understand, and the use of cloud-based resources actually makes things worse. The shame of it all is that, with a bit of work and some investment, the value should come back to the enterprises 10 to 20 times over.


Integrating R with production systems using an HTTP API
Today, two problems — one technical, and one organizational — create friction when trying to integrate R code into existing software applications. First, while R is a great language for analytical code, most enterprise software systems are written in more general purpose languages, such as Java, PHP, C#, C++, or even data pipeline tools such as Informatica or Microsoft’s SSIS. Invoking R code from these languages requires some non-trivial technical work, or translation to another language. This leads to the second problem: in most companies, software engineering teams are separate from analytics teams, so when analysts need engineering help, they are forced to compete against other priorities, or they must do their own engineering.


Data Governance: The Silent Hero to Achieving MDM Triumph
As the challenge to manage critical organizational data grows, businesses are increasingly embracing data governance strategies to protect the integrity of their valuable enterprise assets and to get the most from their master data management initiatives. Andrew White of Gartner recently blogged about the data governance challenge, saying, “In 2012 and 2013, a notable number of end users were struggling to embed the work of governance and stewardship in normal, day to day work of business users. Many firms are continuing to struggle with this. It is perhaps one of the major challenges of MDM and ANY information governance effort in this decade.” Designed to give control processes for data stewards and data custodians, data governance is more of a methodology than a tool.


3D Printing will Transform the Corporate IT Environment
The rise of 3D printing is likely to lead to the re-invention of many old products, as well as the introduction of extraordinary new innovations. Since these processes can print virtually anything that can be designed on a computer—thus eliminating the limitations posed by machine tools, stamping and moulding— engineers and designers will no longer be limited in their designs because of previous manufacturing technologies. In fact, the use of the technology has evolved beyond initial imagination with 3D printing technology being studied by biotechnology firms and academia for possible use in tissue engineering applications – in which organs and body parts are built using inkjet techniques.


PUE - the benevolent culprit in the datacentre
By some estimates, many datacentres are actually only using 10-15% of their electricity to power servers that are actually computing something. Companies should minimize costs and energy use, but nobody invests in a company solely based on how efficiently they move electricity. Datacentres are built and maintained for their computing capacity, and for the business work that can be done thereupon. I recommend correlating computing and power efficiency metrics with the amount of useful work and with customer or end user satisfaction metrics. When these factors are optimised in a continuous fashion, true optimization can be realised.



Quote for the day:

“True leaders bring out your personal best. They ignite your human potential”. -- John Paul Warren

August 19, 2014

About 4.5M face risk of ID theft after hospital network hacked
The hacker group has been involved theft of intellectual property such as medical device and product development data, CHS said. In this instance, though, the group apparently targeted non-medical patient identification data. Since the breach was discovered, CHS is working with Mandiant to clean out its systems and implement new remediation measures, the filing noted. CHS is also cooperating with federal agencies in the investigation. The CHS incident is the second major breach to be disclosed in the past week.


Start-Up Has New Approach for SDN Security
The company is taking advantage of new capabilities offered by the exploding SDN technologies in its effort to provide security for software-defined datacenters. "SDN is an opportunity to introduce advanced security controls and capabilities into the datacenter network in a way that can scale to the demands of a large data centers and offer a dynamic and pro-active security control framework, detecting and mitigating an attack at an early stage," the company said. "Using these principles, GuardiCore offers a security platform, targeting the detection and prevention of attack techniques used by hackers in the propagation and control phases of the attack’s 'kill-chain' inside datacenters."


World-Class EA: Business Reference Model
Business architecture is being used to design, plan, execute, and govern change initiatives throughout public and private sector entities. An architectural approach can systematically highlight the most effective state for a given environment, and then define how change can be effected within acceptable benefit, cost, and risk parameters. A key challenge to this approach is the consistent definition of the organization and where it needs to be, and in response this White Paper introduces a comprehensive reference model for business. The Business Reference Model (BRM) can be applied to both private and public sector organizations alike, and gives complex organizations a common way to view themselves in order to plan and execute effective transformational change.


BYOD Twists and Turns Keep CIOs Off-Balance
BYOD's ripple effect, however, pales in comparison to the benefits. There are huge corporate gains from employees using their mobile devices for work, Waran says. It's conventional wisdom that mobility improves worker productivity and collaboration, and BYOD's ability to scale the number of people in a mobile network will lead to exponentially higher benefits, a la Metcalfe's Law. There are individual worker productivity gains with BYOD, too. A BMC Software survey found that the average BYOD-carrying employee works an extra two hours and sends 20 more emails every day. One out of three BYOD employees checks work email before the official start of their work day, between 6 a.m. and 7 a.m.


HTC One Runs Windows
As far as Windows Phones go, the HTC One for Windows Phone is an appealing option. The metal design may steal sales away from Microsoft and its Lumia devices, thanks to its slick appearance and high-end materials. Its exclusivity to Verizon Wireless may hinder HTC a bit, but it left enough wiggle room in the press release language to imply other carriers might offer the device later this year. HTC is re-entering the Windows Phone market at in interesting time. Windows Phone's market share has dropped in the US to just 1.5%. Perhaps this premium handset, which stands in stark contrast to the polycarbonate designs from Microsoft/Nokia, is just the kick in the pants Windows Phone needs to regain some of its lost presence.


SanDisk's Ultra II SSD offers prices as low as 44 cents per gigabyte
The SanDisk Ultra II has a maximum sequential read/write speed of 550MBps and 500MBps, respectively. The SSD's random read/write performance tops out at 99,000 I/Os per second (IOPS) and 83,000 IOPS, respectively. By comparison, Samsung's TLC consumer SSD, the 840 EVO, retails for as little as $469 for a 1TB model. Samsung's 840 EVO SSD read/write performance tops out at 540MB/s and 520MB/s, respectively. As with other consumer-grade SSDs, SanDisk's new drive is designed and being marketed to deliver a cost-effective and upgrade for desktop and laptop users who want to increase performance, battery life and power efficiency.


Enhance Customer Retention and Acquisition Strategies with Insurance Data Analysis
By analyzing free form text data in adjuster notes, insurance companies can not only measure the time it takes to complete these activities but actually evaluate the quality of the interaction representatives have with customers. These are the moments of truth that can make or break the ever delicate relationship an insurer has with its customer. For example, if explaining the claims process is required when making first contact with the customer, the adjuster notes detailing the first contact activity can be analyzed to confirm if this requirement was met.


Feeling rushed? Break the habit of hurry and overwhelm
Take a deep breath. Seriously, when you feel your world about to spin out of control, close your office door or find someplace to be alone for a few minutes. Close your eyes and just breathe. Let your mind go blank — don’t think about your never-ending to-do list. Then open your eyes and focus on one single thing, whatever is next on your agenda. Consciously slow down as you walk back to your office or head for your next meeting. Your blood pressure will thank you, and so will your co-workers.


Interview with Thomas Imart, Creator of Tweetinvi
Twitter has become an integral part of most companies’ communication strategy. While direct messaging will always be in the forefront, the ability to analyze Twitter trends is often necessary. But Twitter doesn’t always make that easy. Over time many of the older APIs have been deprecated or removed entirely. Newer APIs have taken their place, but they often work very differently than one might expect. So we decided to talk to Thomas Imart, creator of Tweetinvi about his offering.


Exclusive: White House meets with big biz on immigration
Obama has pledged to act by the end of the summer, but the timing is a growing concern to Senate Democrats, who fear that a sweeping program to temporarily halt deportation will further endanger their chances of maintaining control of the chamber. They are most worried about the impact on key Senate races in red states, including Arkansas, North Carolina, Louisiana and Alaska. Obama has not yet received recommendations from his staff, and no decision has been made on how he should proceed, according to sources familiar with the process.



Quote for the day:

"A friendship founded on business is better than a business founded on friendship." -- John D. Rockefeller

August 18, 2014

MPTCP offers performance and resiliency but security is nonexistent
"With MultiPath TCP, a perfectly normal client could say, 'I want to open 10 different TCP connections that are all part of one logical TCP connection.' It would simply fragment the traffic across all of those in such a way that there isn't enough information on any of those TCP channels for an intrusion detection system to recognize what the application layer is, or more precisely that it is malicious," he said. "If the intrusion detection is not aware that MPTCP exists and doesn't know how to collect all those TCP streams and reassemble what's going on, then it's blind to the application layer traffic."


Heartbleed software flaw exposes weaknesses in hardware design
Data is vulnerable to hackers when in transit or in computer memory, said Ruby Lee, professor of engineering at Princeton University's Department of Electrical Engineering, at a presentation to the Hot Chips conference. The weakness is in the memory and cache, or secondary memory where data temporarily resides before being sent for processing or storage. "This is correctly functioning hardware -- with no bugs -- but it is leaking out information," said Lee, who was chief architect and one of the lead processor developers at Hewlett-Packard before joining Princeton.


Collaborative Software Development Platforms for Crowdsourcing
Crowdsourced software development, by its very nature, is collabor-ative. The stakeholders in a crowdsourced software project form a virtual team with the support of collaboration tools and social media technologies. Various kinds of communication, collaboration, and coordination (3C) happen among the requesters, providers, and platform vendors for example, requesters and providers communicate about a task’s requirements and evaluation criteria, requesters coordinate the progress and technical decisions of different tasks, and providers collaborate with each other via shared artifacts and workspace.


For Big-Data Scientists, ‘Janitor Work’ Is Key Hurdle to Insights
“Data wrangling is a huge — and surprisingly so — part of the job,” said Monica Rogati, vice president for data science at Jawbone, whose sensor-filled wristband and software track activity, sleep and food consumption, and suggest dietary and health tips based on the numbers. “It’s something that is not appreciated by data civilians. At times, it feels like everything we do.” Several start-ups are trying to break through these big data bottlenecks by developing software to automate the gathering, cleaning and organizing of disparate data, which is plentiful but messy.


The Data Analysts Toolkit: Why are Excel and R useful together, and how do we connect them?
One area of interest is Predictive Modelling. This is the process of using a statistical or model to predict the value of a target variable. What does this actually mean? Predictive modelling is where we work to the predict values in new data, rather than trying to explain an existing data set. To do this, we work with variables. By their nature, these vary; if they didn’t, they would be called a constant. One pioneer was Francis Galton, who was a bit of an Indiana Jones in his day. Although he wrote in the 19th century, his work is considered good and clear enough to read today. Therefore, this research has a long lineage, although it seems to be a new thing. We will start with the simplest: linear regression.


Consumer-facing industries lead in digital strategies: Forrester
"This is mainly because many want to ignore the changes that are taking place, but then there are others who say they know what it is, but they really don't know what it is. We refer to that as a 'bolt on' digital strategy where some executives will believe they are pushing a digital strategy but it's just really lip service, and they're not driving it through the business," he said. The report recommends in order to move from being a 'digital dinosaur', where a digital strategy is virtually non-existent, to a 'digital master', CIOs need to help shape a digital business vision in collaboration with other businesses leaders within the company.


Technology Can Make Lawful Surveillance Both Open and Effective
In brief, any surveillance process that collects or handles bulk data or metadata about users not specifically targeted by a warrant must be subject to public review and should use strong encryption to safeguard the privacy of innocent users. Only after law-enforcement agencies identify people whose actions justify closer investigation and demonstrate probable cause via an authorized electronic warrant can they gain access to unencrypted surveillance data or employ secret analysis processes. The details of an investigation need not be public, but the data collection process would be—what information was collected, from whom, and how it was encrypted, stored, searched, and decrypted.


Managing Mobile Risk in the Cloud
Iterative and agile software development methodologies and tools are the buzzwords of the moment because they capture how software developers are ideally working in this environment. Perfection will not be achieved before code is released, but at the same time certain minimum standards of data security and privacy, as well as release objectives, need to be met. This can be done, but certain preconceptions about the cloud need to be overcome in order to do so. The most important misconception about the cloud is that it necessarily exposes apps and data to the outside world. However, this is not so.


Grocery stores in multiple states hit by data breach
According to Supervalu, its internal IT team detected the intrusion and quickly moved to remediate it. "An investigation supported by third-party data forensics experts is on-going to understand the nature and scope of the incident," the company said. "Supervalu believes the intrusion has been contained and is confident that its customers can safely use their credit and debit cards in its stores. " The company is offering consumers affected by the breach a year's worth of free identity protection services. In a separate statement, AB Acquisition, which owns and operates Albertson's, ACME, Jewel-Osco, Shaw's and Star Markets said it is working closely with Supervalu to find out what exactly happened and what data might have been stolen.


“Professionalize” Information Security?
The only question is whether companies wish to invest in ensuring that they are hiring the professionals they need for information security. The technology world is rife with examples of private consortia establishing standards and other metrics for all sorts of critical networking and other tasks, often without the prodding or confiscated money of politicians. Licensure is simply an easy way to shove the costs of background work on taxpayers—effectively, socialization of security. To be sure, proponents of “professionalization” will state that the entire public has something to gain and on and on, offering the usual hackneyed justifications for yet another program to be administered by a government that can’t afford half of what it’s already doing.



Quote for the day:

"We're living in a time when disruptive use of technology can take a business from nothing to number one." -- Robert Stroud

August 17, 2014

Database Development: Comparing Python and Java ORM Performance
I have a good deal of experience with Java, which helped me in getting the Java ORM working, but a beginner might not be able to get past the setup difficulties. However, having used and written about both languages, I should note that despite these occasional difficulties my preference would generally be to use Java. Why? Well, Java is a proven technology; out of the box, Java is structured, secure, strongly typed, and thread-safe. Anyway, that's enough grumbling. Let's see how to set up some ORM code in these two languages.


Parallel-lazy Performance: Java 8 vs Scala vs GS Collections
Sponsored by Goldman Sachs. Java 8 has Streams, Scala has parallel collections, and GS Collections has ParallelIterables. Since we use parallelism to achieve better performance, it's interesting to ask: how well do they perform? We'll look at how these three APIs work with a critical eye toward performance. We'll also look at common performance pitfalls. Listen to Craig Motlin, the technical lead for GS Collections, a full-featured open-source Collections library for Java and the author of the framework's parallel, lazy API


MaxClients in Apache and its effect on Tomcat during Full GC
Let's see how the MaxClients option in Apache affects the system when Full GC has occurred in Tomcat. Most developers know that "stop the world (STW) phenomenon" occurs when GC has occurred in Java (for more refer to Understanding Java Garbage Collection). In particular, Java developers at NHN may have experienced faults caused by GC-related issues in Tomcat. Because Java Virtual Machine (JVM) manages the memory, Java-based systems cannot be free of the STW phenomenon caused by GC. Several times a day, GC occurs in services you have developed and currently operate. In this situation, even if TTS caused by faults does not occur, services may return unexpected 503 errors to users.


Performance Comparison of Virtual Machines and Linux Containers
The results show that Docker equals or exceeds KVM performance in every case tested. For CPU and memory performance KVM and Docker introduce a measurable but negligible overhead, although for I/O intensive applications both require tuning. Docker performance degrades when using files stored in AUFS, compared to using volumes, that have better performance. A volume is a specially-designated directory within one or more containers that bypasses the union file system, so it does not have the overhead that the storage backends may have. The default AUFS backend causes significant I/O overhead specially when using many layers and deep nested directory hierarchies.


Getting Serious About IPv6 – Go Big or Go Home
Think carefully before you just start shutting off IPv6. Remember, it is enabled and preferred and if your existing production network is using IPv6 for some of its network traffic you will have a production outage while you disable IPv6. Furthermore, you might not even know all the applications that ARE using IPv6, have fun troubleshooting that one. Even after you think you have turned off IPv6 on your equipment, how often do you actually audit and check to see if it is running? Does it get re-enabled with OS patches and updates? What about third party equipment that runs on your network or wireless/wired guest network?


Pattern Recognition Algorithm Recognizes When Drivers Are on the Phone
A dashboard camera in front of the driver is well-positioned to spot cell phone use. Their system processes the images from this camera in three steps. First, it locates the driver and crops the image to show just the face and area to each side of the face. The idea is to see the driver’s hands should they be raised next to the ear in holding a mobile phone while making a call. Next, it identifies any skin pixels in the image and assesses the position of these pixels. It then segments the image into areas showing face and hands. Finally, it assesses the likelihood that the driver is on a call and issues a warning accordingly.


Oracle slaps Oregon with a lawsuit over troubled Obamacare website
A key bone of contention in the dispute centers around the fact that Oregon hired Oracle on a time-and-materials basis, with the state serving as its own systems integrator. “That decision was akin to an individual with no construction experience undertaking to manage the processes of designing and building a massive multi-use downtown skyscraper without an architect or general contractor,” Oracle said. Another alleged flaw in the state’s approach: It decided to build Cover Oregon at the same time it was embarking on a major IT modernization project for other aspects of its health and human services operations.


SQL Server Change Tracking: A Near Bullet-Proof ETL Solution
This segment will introduce the concept of CT as well as provide a substantive demo (i.e., something better than a hello world example) of CT’s functionality. CT was introduced with SQL Server 2008R2 and unlike Change Data Capture (CDC) is available for all versions of SQL Server 2008 (and later) including SQL Server Express. CT captures changes to database table rows over a period of time. It does not record each change during that period, but retains the net changes by tracking the individual rows (using the Primary Key) that have changed. Thus, it is great for data extraction/synchronization, but not for auditing (that is CDC’s area of expertise).


An Introduction to Functional Programming with Java 8
Given functional programming has been around since the 50s, and until recently mostly disregarded by the mainstream, why has it become such a hot topic? My opinion is that it’s because of its ability to easily process work in parallel taking advantage of multi-core processors, lazy (on-demand) evaluation, and ease of integration with other languages such as Java. Certainly the JVM has provided a good base for Scala which can even be embedded in a Java program, giving the best of both worlds plus an easier migration path for developers.


Three Secrets of Organizational Effectiveness
These are, of course, widely appreciated management methods for raising performance. But they’re rarely put into practice. Perhaps it’s because they feel counterintuitive to many managers. Even the leaders who use them, and whose enterprises benefit from the results, don’t know why they work. So the value of these powerful practices is often overlooked. That’s where neuroscience comes in. Breakthroughs in human brain research (using conventional experimental psychology research in addition to relatively new technologies like CT scans and magnetic resonance imaging) are revealing new insights about cognitive processes.



Quote for the day:

"The first and best victory is to conquer self." -- Plato

August 16, 2014

Converging API Governance and SOA Governance
API governance is heavily influenced by IT business goals and objectives. Leading API governance platforms provide analytics supporting the assessment of IT business value. The platform should capture service tier subscription information, collects usage statistics, present productivity metrics, and integrate with billing and payment systems. API governance encompasses API subscriptions and API promotion meta-data. Governance activities managing API promotion meta-data include rationalizing keyword tags used to categorize APIs, and developer documentation content management.


A Look at Cyber Security Trends for 2014
This year, there’s been more discussion than ever about numerous topics such as the benefits of big data, the Internet of Things, mobile technology, and how to make the most of cloud computing. There’s plenty of excitement to be had so far and much more on the way, but in the fast moving technological environment we now live in, there’s also reason to worry. Security in particular, whether it’s network security, computer security, or IT security, is foremost on many business leaders’ minds. To prepare for what the future may hold, it’s important to look back at some of the recent trends to see the threats and solutions having the biggest impact on cyber security.


IoT is here and there, but not everywhere yet
isco Systems has estimated IoT will generate $14.4 trillion in economic value between last year and 2022. But Kevin Shatzkamer, a distinguished systems architect at Cisco, called IoT a misnomer, for now. “I think we’re pretty far from envisioning this as an Internet,” Shatzkamer said. “Today, what we have is lots of sets of intranets.” Within enterprises, it’s mostly individual business units deploying IoT, in a pattern that echoes the adoption of cloud computing, he said. In the past, most of the networked machines in factories, energy grids and other settings have been linked using custom-built, often local networks based on proprietary technologies.


Think like a cop: two simple questions that will protect you from cyber wolves
The secret to avoiding danger is not to rely on lists of things experts tell you to do, but to get into the habit of knowing what to ask to avoid trouble. There are two questions that the C-suite and customers should ask to minimise their risk of exposure to cyber crime but these are not being asked. Why is that? ... The diligent police detective knows their powers of arrest and restraint before they start grappling around on the floor with a villain. They know and remember this because there is a strong likelihood they will face this danger and they must do the right thing when it happens. Once ingrained in the thin blue mind, the cue card can be written.


10 Essential Elements of a Mobile Strategy
In the past few years, our thought processes have shifted in three fundamental ways. We expect to: Satisfy any impulse on a mobile device within a minute. 52% of highly mobile people are frustrated when something they want isn’t available on their smartphone; Access relevant information in any circumstance via an app or mobile search. 45 percent of users between 18 and 29 use mobile search daily; Perform a wide variety of personal and professional tasks on our mobile devices, including accessing critical documents, sharing photos, submitting expenses, performing banking tasks, managing investment portfolios etc.


NASA Mission: Cloud Governance
After the IT group realized that there were multiple root accounts, it had to design and implement a governance model for managing the accounts and apply that model to the existing network infrastructure and cloud deployment, says JPL cyber security engineer Matt Derenski. The highly automated AWS cloud system helped JPL's IT staff sort out and manage the accounts issue and then other governance and compliance requirements. Chiang notes that JPL IT staffers sometimes have difficulty tracking usage and application data on the laboratory's internal network, but the Amazon cloud offers complete visibility into the number of active accounts and which servers they're running on.


5 Must-Have Characteristics to Enable Enterprise Architecture Successfully
A lot of organizations have tried to implement Enterprise Architecture in IT, but have had a hard time gaining credibility within the organization and communicating its value effectively. Many are now turning to consultants with strong EA backgrounds to come in and help make EA successful. There are 5 characteristics that we should ascribe to in order to enable a strong Enterprise Architecture foundation for an organization: Transparency; Integrity; Selflessness; Empathy; and Effective Communication.


Information Governance: Why it’s a priority, not an option
Despite purchasing highly sophisticated data management solutions from the best of vendors, organizations’ data suffers from inconsistencies with effects as minor, but embarrassing, as wrong address or contact person name being printed on customer invoice, to as major as wrong decisions being taken by top management because of incorrect/insufficient data being available to them. In extreme cases, the organizations may fail to support regulatory compliance, or might have to re-issue their financial statements in the face of reports containing inaccurate or incomplete information being presented to relevant stakeholders.


Big Data and the Information Governance Imperative
With a smaller information footprint, organizations can more easily find what they need and derive business value from it. They must eliminate the data debris regularly and consistently, and to do this, processes and systems must be in place to cull out valuable information and discard the data debris. An IG program sets the framework to accomplish this. But a key challenge is that because of the inter-disciplinary requirements for implementing IG—no one wants to own IG. It touches on parts of the strnegths of a CIO or General Counsel, but it also requires them to go out of their confort zone into new areas.


The IT skills conundrum: too many threats and not enough professionals
With fewer skilled professionals, some organisations will simply continue to struggle to do anything beyond keeping the lights on. The smarter businesses will take action to understand their risk exposure across the business and prioritise areas to focus on. This enables them to make more informed decisions around resource requirements to help mitigate risk. But a lack of resource will often mean that there is nobody available internally to carry out the assessment in the first place. Risk and security management are important areas for any organisation and, as the threat landscape evolves, every enterprise needs to consider its current risk exposure in the context of its commercial objectives.



Quote for the day:

"Have confidence that if you have done a little thing well, you can do a bigger thing well, too." -- Joseph Storey

August 15, 2014

The two main benefits I’ve seen from switching to Scrum
If you’re not using Scrum, there may be a reason below to consider it. If you’re using Scrum, you may find something we’re doing differently which could work for you. If you’ve no interest at all in Scrum, I’d say the things below are of use to any software development team, perhaps you can find a way to adopt them in your process. Also, these benefits certainly don’t require Scrum but they came as a result of adopting some of the processes commonly adopted alongside Scrum so I relate the former to the latter in my thinking.


Peak vs. Tibbr: Two Apps That Help Track Team Communications
The two services have somewhat different takes on how they work: Tibbr can be used to both monitor and post to various linked networks; Peak is read-only. Both have a variety of analytics to give you a better picture of how you use your various networks. The two also differ as to which networks they connect to, with Tibbr offering more options. ... The difference is that both Peak and Tibbr go beyond the standard social media networks and connect to business-related networks such as GitHub and Google Drive. They also are designed for teams to use, rather than just individuals who want to retweet the same message on a particular schedule.


Analytics Across the Enterprise: An interview with the authors
Deliver results interactively: don’t define a multi-year project without any checkpoints, prototypes or deliverables for several years. You’ll get a faster time-to-value if you do an early prototype and show it to stakeholders. This is key for actions and decisions that generate value. Don’t give up on driving an analytics culture—you’ve got the facts behind you and, quite simply, analytics works. Several studies have highlighted the value of analytics, and companies that use predictive analytics are outperforming those that do not by a factor of five.


IBM Builds A Scalable Computer Chip Inspired By The Human Brain
“This new chip will provide a powerful tool to researchers who are studying algorithms that use spiking neurons,” Dr. Terrence J. Sejnowski told me. Sejnowski heads Computational Neurobiology Laboratory at the Salk Institute. He’s unaffiliated with IBM’s project but is familiar with the technology. “We know that such algorithms exist because the brain uses spiking neurons and can outperform all existing approaches, with a power budget of 20 watts, less than your laptop.” It’s important to note, though, that the SyNAPSE system won’t replace the computers of today – rather, they’re intended to supplement them.


How to recognise the cyber insider threat
"Once an adversary has code execution on your computer, they are essentially an insider. The controls you need to build need to take into account what an insider could do to your network." He added that the insider threat needs to be communicated to the company's board so that they can have input into decisions that are made to deal with the problem, in conjunction with the IT department. "Cyber security is a team sport and that team can consist of people in your organisation and service providers," said Smith. ... "The Australian banking industry is starting to conduct extreme cyber scenario planning as part of their regulatory requirements. In doing so, banks are considering the worst case scenarios that could occur."


Complementing Agile SDLC with Agile Architecture
Agile methodologies extend product lifecycles through faster TTM and continuous delivery maintenance in order to ensure its high quality of service (QoS) defined by functional feasibility, business, and technology capabilities. Agile SDLC produces the minimally viable product (MVP), which is continuously enhanced with “value-added product features.” While most architects may not have the ability to envision what the product software may look like in the not-so-distant future, they must still provision for seamless future enhancements throughout the entire product lifecycle. This type of application architecture fits the definition of Agile.


Annual Report: State of the Information Governance Industry
IG's biggest problem is that, due to its complexity and crossing of functional lines, it takes a long time to shape up an IG project: 58% of Practitioners stated it takes a year or more to startup an IG project - from conceptualization to beginning. (And that's not even getting results and completing it!) Also, related to that issue, 68% of Practitioners stated it was "Important or Very Important" to quantify the financial benefits of IG, but also, more than three-quarters of the survey Practitioners include 'soft' costs and benefits in their model, such as risk avoidance and improved employee productivity.


Writing Right Policies and Procedures for Cloud Governance
From his role perspective, Pandey says, “A CISO may have independent accountability or has to work in tandem with other department(s) because more than necessary information is exposed to internal users and confidential data is accessible to external users or simply outsiders.” “A CISO should ensure that organisational digital assets are personally used, compliance to regulatory standards/requirements is mandated and organisational data in cloud must not be visible to third part entities,” says Pandey.


Hacktivism: good or evil?
Whether hacking is worse than a physical assault, such as sending large numbers of useless facsimiles or holding a mass protest outside the buildings of the Church of Scientology, depends on your point of view. Is it worse? At first sight it might seem so, since those protesting electronically invariably do so anonymously. However, some of those protesting physically do so wearing hoods or masks. Of course, like many protests, innocent bystanders can be hurt.


Microsoft postpones IE's Java blocking after IT complains
Microsoft characterized the blocking as a security improvement -- though, in truth, rival browsers have had similar or even more aggressive tools for years -- and said it would add other ActiveX controls to the banned list over time. When the tool is turned on, IE will show a warning if it tries to call an obsolete Java ActiveX control: for Java 8, those include any version except for mid-July's Java SE 8 Update 11. ... IT administrators can manage the notifications on workers' PCs using Group Policy settings, including one that turns off the warning altogether and another that prevents employee overrides.



Quote for the day:

"Speed is useful only if you are running in the right direction." -- Joel Barker

August 14, 2014

Systems Disparity: The Implications of Data Proliferations on Business Decisions
A typical too-big-too-fail organization will have between 1,500 and 2,000 applications. These applications have proliferated for various reasons, ... they can run on a variety of hardware platforms and technologies (each with its own unique operating system). The applications in question are designed according to a variety of paradigms and methodologies and are developed using a vast range of tools. These tools, which are generally aligned to a technology platform, encompass, among other things, programming languages, database-management systems, and user-interface builders. And it is in the context of this variety and the resulting heterogeneous environment that the term disparate is coined.


How to Expedite Continuous Testing
The prescription for continuous testing is deceptively simple: Automated unit tests, version control and a continuous integration server. We wanted to first get past the buzzwords and talk about how to actually do it, by getting started with Ruby and GitHub. Today, we'll install Jenkins and CircleCI, hook them to our GitHub repository and get continuous automated build/inspect going, step by step. Along the way we'll talk about some common setup problems; you may want to read the whole article first, then try to follow the step-by-step instructions.


Partnership Enables Smaller Companies to Leverage Advanced BI Solutions
“Robust BI and analytics solutions are tools that organizations of all types and sizes must actively use to achieve success in today’s business environment,” said Gerald Cohen, president and CEO of Information Builders. “All companies, regardless of size, should have access to the BI tools they need to understand and make positive use of the information generated by their organizations. Information Builders is thrilled to be partnering with Arrow to extend the power of BI to a greater pool of potential users and ensure that more companies have the tools needed to make informed decisions, improve business processes, and boost revenue.”


Create real-time graphs with these five free web-based apps
Creating graphs is easy -- grab your favorite spreadsheet program, enter some data, and use the chart wizard. What's more difficult is creating those graphs to be published on the web based on dynamic data. Plenty of options are available to graph hard-entered data, but few are capable of dynamic generation. In this edition of Five Apps, we take a look at five free web-based tools for creating different types of graphs from dynamic data. Each of these apps offers a vast number of options and lots of customizability, more so than I could possibly demonstrate here. So take a look at each webpage and browse through the examples provided to see the power of each of these tools.


Cyberspace 2025: Overview
Our research forecasts that by 2025, two billion new Internet users will come online, for a total of 4.7 billion people online. Nearly 75 percent of these Internet users will hail from emerging economies. During the same period, social and demographic trends, such as the growing need for a highly-skilled workforce and increases in aging populations, will create new layers of challenge for policymakers already grappling with societal dependence on the Internet.


BYOD and the challenges of managing VDI and VDA
Apart from the difficulties resulting from integrating these new devices into a corporate IT infrastructure, there are a number of specific software asset management (SAM) related issues to consider which have important licensing implications. For example: Who owns the software on the device that is brought in? What applications are they using? Are there apps in use that are free for personal use but need to be paid-for when used in a corporate environment? How will the software on these devices be consumed?


Managers Can Motivate Employees with One Word
David Rock, founder of the NeuroLeadership Institute, has identified relatedness — feelings of trust, connection, and belonging—as one of the five primary categories of social pleasures and pains (along with status, certainty, autonomy, and fairness). Rock’s research shows that the performance and engagement of employees who experience relatedness threats or failures will almost certainly suffer. And in other research, the feeling of working together has indeed been shown to predict greater motivation, particularly intrinsic motivation, that magical elixir of interest, enjoyment, and engagement that brings with it the very best performance.


Reconceptualizing the Board and its Metrics
The focus on features has lead to a faulty evaluation metric for corporate governance. Indeed, counting features is the most common scale used when comparing boards. When The Globe and Mail, for example, publishes its rankings of Canadian boards, it scores companies by looking at the number of features of governance. If Company A can check off more boxes than Company B, then the conclusion is made that Company A has a better board than Company B. The verification of a board’s features, however, does very little when it comes to understanding and evaluating actual board behavior.


The automated threat mitigation tool helping to beat Big Data security blues
Hexadite aims to bring that automation to corporate IT environments — and Barak believes the system is robust enough to allow administrators to rely on that automation to protect their environments. Hexadite comes with a pre-defined library of alerts and behaviours that look at all actionable information from the network and endpoints to gain a holistic view of what’s really happening. The system's analysis is built on algorithms that took years to develop, Barak said, that takes into consideration the minutiae of detail in a system, evaluating files, network connections, internet traffic, processes, and anything else going on — looking for the anomalies that can mean that a system has been compromised.


Balancing Quality and Velocity in Agile
Agile software development teams have to assure that the products that they develop have sufficient quality. Management often also expect that they increase their velocity to be able to deliver more functionality faster to their customer. Several authors explored the relationship between quality and velocity and suggested ways to improve both quality and velocity. Bob Galen wrote about the importance of software quality in respect to becoming faster in the blog post read my lips – agile isn’t fast:



Quote for the day:

“You have enemies? Good. That means you've stood up for something, sometime in your life.” -- Winston Churchill

August 13, 2014

Similarities and Differences Between Predictive Analytics and Business Intelligence
The similarities of BI and PA are points I’ve tried to make in talks I’ve given at eMetrics and performance management conferences. After making suitable translations of terms, these two fields can understand each other well. Two sample differences in terminology are described here. First, one rarely hears the term KPI at a PA conference, but will often hear it at BI conferences. If we use google as an indicator of popularity of the term KPI, “predictive analytics” KPI' yielded a mere 103,000 hits on google, whereas “business intelligence” KPI' yielded 1,510,000 hits. In PA, one is more likely to hear these ideas described as metrics or even features or derived variables that can be used as inputs to models are as a target variable.


2014's Hottest IT Certification
With more than half of 2014 behind us, it's that time of the year where we look at IT certifications standings in real world IT. The right certifications can help earn tech workers premium pay or land the job they've been aspiring to. That's why knowing what is "hot" with employers is important when considering your professional development. Every quarter Foote Partners compiles their data in the IT Skills Demand and Pay Trends Report, and they speak with over 2600 employers to bridge the disconnect between job titles, job content and compensation. Read on to find out where the heat is in regards to IT certifications, salaries and employer needs.


How To Refactor For Dependency Injection, Part 4: Configuration Changes
In the early days of DI containers, XML configuration was the generally recognized method of configuring a container. As time went on and fluent interfaces became popular, the focus shifted away from XML configuration and more toward using code as configuration. By using code as configuration you gain all the benefits of the compiler checking your types for you, making configuration much easier. Now, in modern DI, XML configuration is seldom used, and instead techniques that involve code configuration are used.


Microservices and the First Law of Distributed Objects
So in essence, there is no contradiction between my views on distributed objects and advocates of microservices. Despite this essential non-conflict, there is another question that is now begging to be asked. Microservices imply small distributed units that communicate over remote connections much more than a monolith would do. Doesn't that contravene the spirit of the first law even if it satisfies the letter of it?While I do accept that there are valid reasons to do for a distributed design for many systems, I do think distribution is a complexity booster. A coarser-grained API is more awkward than a fine-grained one.


Internet Touches Half Million Routes: Outages Possible Next Week
This situation is more of an annoyance than a real Internet-wide threat. Most routers in use today at midsize to large service providers, and certainly all of the routers that operate the core infrastructure of the Internet, have plenty of room to deal with the Internet’s current span, because they were provisioned that way by sensible network operators. Affected boxes cause local connectivity problems for the network service providers who still run them, so they will be identified quickly and upgraded as we pass the threshold. Their instability in turn causes some minor additional load on adjacent routers.


Delivering a Customer-Focused Government Through Smarter IT
The Digital Service will work to find solutions to management challenges that can prevent progress in IT delivery. To do this, we will build a team of more than just a group of tech experts – Digital Service hires will have talent and expertise in a variety of disciplines, including procurement, human resources, and finance. The Digital Service team will take private and public-sector best practices and help scale them across agencies – always with a focus on the customer experience in mind. We will pilot the Digital Service with existing funds in 2014, and would scale in 2015 as outlined in the President's FY 2015 Budget.


PaaS shoot-out: Cloud Foundry vs. OpenShift
For deployment of application source code, OpenShift uses Git, but it also allows you to deploy binary packages. Cloud Foundry only takes your binaries (.WAR files for now, with other formats to be supported later), then automatically combines them with buildpacks of languages and frameworks (such as Java and Tomcat) and services such as databases. The buildpack format was developed by Heroku and contributed to the open source community, spawning many community buildpacks, most of which work on Cloud Foundry.


Dell bundles backup software, eyes further development
“We have a new approach to data protection that is driving down the costs,” said Michael Grant, head of software product marketing at Dell. The release is a precursor to Dell delving more deeply into the market of storage software, not just as a vendor but as a developer of new technologies. “We’re making a pretty big investment in data protection,” Grant said. The new Backup and Disaster Recovery Suite contains popular Dell backup programs, AppAssure, NetVault Backup and vRanger. Dell acquired each of these programs through company acquisitions in 2012. Each application performs a slightly different function, Grant explained.


400 Gbit Ethernet: The Next Leap
According to the IEEE 802.3 Ethernet Bandwidth Assessment Ad hoc, industry bandwidth requirements are continuing to grow at an exponential pace. At such a rapid speed, networks will need to support terabit-per-second capacities by 2015 and 10 Tbit/s capacities by 2020. ... In May 2013, recognizing this growth and foreseeing the need for a new Ethernet speed rate, the IEEE 802.3 working group formed the IEEE 802.3 400 Gbit/s Ethernet (400 GbE) Study Group. When the working group last addressed the need for a new Ethernet speed rate, two rates were created: 40 GbE, which was intended to provide a medium path for servers, and 100 GbE, which was targeted at network aggregation applications.


Large Scale Event Tracking with RabbitMQ
On the one hand, they provide game designers and game balancers with a valuable tool for their work. The event data helps them answer questions such as whether players regularly quit the game at a specific quest, or how a new feature that has been implemented is performing. The insights gained are used to improve the gameplay and user experience. On the other hand they are a powerful tool for marketing specialists. Specific events make it possible to identify which marketing channel a new player is gained through, and thus allow a constructive adaptation of marketing strategies and channels. Finally, they can be used by the developer, for example to measure and improve performance of loading times or to identify and adapt to the mobile devices used.



Quote for the day:

"Reality is that which, when you stop believing in it, doesn't go away" -- Philip K. Dick

August 12, 2014

Redefining System Architecture with Data at the Core
System architecture in today’s cloud era should be defined by the data it contains rather than the hardware that stores and makes it available. Software-defined data platforms are drastically and rapidly changing the IT model. By abstracting the underlying hardware, and allowing data management and access to be defined workload by workload, data characteristics are now defining the infrastructure used, rather than vice versa. IT investment, therefore, needs to be better matched against the value of data to the business, while allowing increased flexibility and responsiveness.


Sentencing, by the Numbers
While well intentioned, this approach is misguided. The United States inarguably has a mass-incarceration crisis, but it is poor people and minorities who bear its brunt. Punishment profiling will exacerbate these disparities — including racial disparities — because the risk assessments include many race-correlated variables. Profiling sends the toxic message that the state considers certain groups of people dangerous based on their identity. It also confirms the widespread impression that the criminal justice system is rigged against the poor. It is naïve to assume judges will use the scores only to reduce sentences. Judges, especially elected ones, will face pressure to harshly sentence those labeled “high risk.”


Forget 'Things' – It's The Internet Of Business Models
Success in the Internet of Things will come to those who look beyond the disruptive technology. Indeed, as former Intel CEO Andy Groves perfectly put it: "Disruptive technologies is a misnomer. What it is, is trivial technology that screws up your business model." That's a great observation, especially with the Internet of Things where falling prices are making the technology more readily available -- so if you're looking to make money out of manufacturing home sensors, maybe think again because you'll be up against stiff competition, even from someone with some electronic smarts and $35 to spend on a Raspberry Pi.


'Biochip' aims to quicken disease diagnosis, cut medical test costs
The Hydra-1K -- which is a silicon chip -- can be used at doctor's offices or points of care, where a disease can be instantly analyzed to determine treatment, said Arjang Hassibi, founder and CEO of startup InSilixa, during a presentation at the Hot Chips conference in Cupertino, California. The chip -- which Hassibi also called a reader -- heats up a culture or sample, and can identify unique molecular structures like DNA sequences, to help identify possible strains of a disease, which can help determine medication, or whether a patient needs to be isolated. Right now the chip can test cultures or samples only for specific diseases and mutations.


A Glimpse Behind the Cloud: Tour the EMC Durham Data Center
Our virtual tour of the Durham Data Center gives you a high level understanding of how our data center works and a glimpse of EMC Cloud computing using Vblock architecture. It features purpose-built Vblocks which run our SAP-based, enterprise resource planning (ERP) system and Exchange environment, as well as 100 percent tapeless backup environments built on our Data Domain and Avamar technologies. With tens of thousands of VMs in our data center, our sales staff can tap in to Durham to demonstrate products and services in a real-life lab setting.


Agile Practices and Social Nudges in the Workplace
A special kind of nudge is the “Social Nudge”, which results from the interaction with other people. According to Thaler and Sunstein: “Social influences come in two basic categories. The first involves information. If many people do something or think something, their actions and their thoughts convey information about what might be best for you to do or think. The second involves peer pressure. If you care about what other people think about you, then you might go along with the crowd to avoid their wrath or curry their favor.”


Intel watches ARM as low-powered computing thrives
“You get more peak performance per thread on Intel than on ARM-based chips," said Novakovic.  “ARM-based architecture is more suited for mobile devices and connected devices such as the refrigerators and the washing machines." But Intel thought that if it built extremely high-end high-compute power processors first, it can scale it down to suit the mobile devices needs. “But ARM proved that strategy completely wrong by starting ground up,” said Novakovic. “There is a growing market for low-power CPU architecture and that’s where ARM is winning and that will be Intel’s biggest threat,” said technology blogger Scott Wasson.


Ontologies versus Data Models
The common definition of an ontology is: a specification of a conceptualization. I find this is a very difficult definition to apply practically. To me an ontology is a view of the concepts, relations and rules for a particular area of business information, irrespective of how that information may be stored as data. ... Using ontologies to drive clarity in business discussions is beneficial. We can clearly see that Figures 1 and 2 are not data models, and so data models cannot be used in this example. However, ontologies also play a vital role in conjunction with data models. As noted above, data models are sometimes held to represent business reality, as well as provide a design for a data store. Yet, a data model of any kind has to be a generalization across many different business views.


Virtual Meetings on the Rise, but Value Is Still Debatable
Meetings are increasing because, in general, workplaces are encouraging collaboration–between individual, teams, divisions and locations, Craig Daniel, vice president of collaboration products at LogMeIn, told eWEEK, noting there has been a dramatic increase of tablets and smartphones replacing PCs as the virtual meeting tool of choice. ... "Nobody will admit to liking meetings, but most people will acknowledge that they serve a purpose," Daniel said. "Many meetings are a waste of time, but every now and then, with the right attendees and the right tools, we come away from one saying, ‘That was a good meeting’."


Project Inception - How to Use a Single Meeting to Achieve Alignment
Inception attendees should include the core team doing the work and the sponsoring stakeholders or their designates. Typically this will include business, product, development and perhaps other teams like operations and support. It may also include representatives from upstream or downstream teams that are producers or consumers of this teams work. Practically the effectiveness of the meeting starts to diminish when the number of people is over 10 people because there is a lot of group participation and having 20 people all contribute effectively is difficult.



Quote for the day:

"There is no right way to do a wrong thing." -- Harold S. Kushner