October 11, 2014

User Interface Testing for Mobile Applications
It is the duty of a QA to ensure that the application has a easy to use user interface. The QA should have a proper knowledge about the flow of the devices in which the application is to be tested, as the application might have impact on the mobile device’s native application like phone,email,camera,contacts,calender etc. Below are some of the important points that is to be considered in a user interface testing alongwith the some of the basic steps that a QA generally follows to test the various aspects.


“We are in the third era of computing – the cloud and mobile era – but security considerations on cloud are still not widely understood. It is important to address the public cloud security concerns to facilitate its adoption,” Russinovich told delegates at the annual IP Expo 2014 in London.  “This is important because there is no cloud without trust.” Drawing from Cloud Security Alliance’s top nine cloud computing threats, Russinovich listed ten security concerns – listed below – that are typical to public cloud services and explained the measures taken by public cloud service providers, such as Microsoft Azure and AWS, to address those security risks.


Microsoft’sQuantum Mechanics
Progress toward that computational nirvana has been slow because no one has been able to make a reliable enough version of the basic building block of a quantum computer: a quantum bit, or qubit, which uses quantum effects to encode data. Academic and government researchers and corporate labs at IBM and Hewlett-Packard have all built them. Small numbers have been wired together, and the resulting devices are improving. But no one can control the physics well enough for these qubits to serve as the basis of a practical general-purpose computer.


Hybrid Cloud: Hype or Reality
The transition might be gradual, but this approach does not prevent an exciting vision for the organization. Hybrid provides endless option and helps drive innovation, while removing barriers that slow IT down. The promise of cloud is real, but the promise of a one-size-fits-all cloud strategy, however, is not. ... Among all three basic types of cloud – public, private and hybrid – the hybrid cloud is the most flexible and it can be customized to address business service level agreement, compliance and regulatory requirements, while tapping the public cloud for business agility, expansion of new services and shifting expenditure from CAPEX to OPEX. It is no wonder that hybrid cloud continues to draw the interest of executives across all industries.


Zephyr’s CEO Discusses A Simpler Solution To Test Automation Integration
Given the vast array of automation tools and test management solutions in the market that are not geared up for this kind and level of change, you just might have to. It might mean going back to the drawing board to find a new and more appropriate automation tool; and then trying to integrate it back to the test management solution, which might need upgrading or changing itself. Maybe you can’t even integrate this new tool. You are suddenly surrounded by silos of tools and tests and execution results that you are desperately piecing together inefficiently ... In a word, you are in “scramble-state”.


InstantClick dramatically speeds up your website
Latency is inevitable with today’s internet architecture so InstantClick cheats by preloading links you are likely to click on. Before visitors click on a link, they hover over that link. Between these two events, 200 ms to 300 ms usually pass by. InstantClick makes use of that time to preload the page, so that the page is already there when you click. On mobile devices, preloading starts on “touchstart”, letting 300 ms (Android) to 450 ms (iOS) for preloading the page. If you want your website to not be flooded by requests, you can set a delay before preloading starts when users hover a link.


Descriptive, Predictive, and Prescriptive Analytics Explained
The promise of doing it right and becoming a data driven organization is great. Huge ROI’s can be enjoyed as evidenced by companies that have optimized their supply chain, lowered operating costs, increased revenues, or improved their customer service and product mix. Looking at all the analytic options can be a daunting task. However, luckily these analytic options can be categorized at a high level into three distinct types. No one type of analytic is better than another, and in fact, they co-exist with, and complement each other.


Is It Time to Move Your Databases to the Cloud?
For organizations ready to embrace the cloud, options range from self-service DBaaS products to managed database services that offer more in the way of hands-on support. Lines blur between services, though. ... The act of purchasing cloud services is sometimes associated with customers that possess limited technical infrastructure. Akamai demonstrates that's not always the case. "Clearly, there's no lack of server resources," Scobie notes. That said, Akamai's network lacked a persistent data service that would fit the kinds of distributed configurations that company had in mind for its API management application.


Towards a Resolution-Independent Web with SVG
The main advantage of SVG - rightfully advertised all over the web - is its scalable nature. When preparing an icon, a designer can stop worrying about “how it will look” in different dimensions or on mobile devices with different pixel densities, and focus solely on making the asset look great. With SVGs there is no need to export two different raster assets for retina and non-retina displays. As a matter of fact, there’s no need to worry at all about the pixel density of any device, especially given the (sometimes absurd) non-standardised nature of it, but focus rather on the artwork itself. Once an icon is ready, the designer exports a single SVG file - directly from Illustrator - which can be resized at whim by the developer with no loss of quality.


HTML5: A multi-threading approach with Web Workers
The word Web Worker specifies a JavaScript running in the background, without affecting the performance of the page, independently of other user-interface scripts that may also have been executed from the same HTML page. Let’s go into little depth to understand what it exactly means :). Javasc ... Javascript will hang the browser, where the code written by us requires a high CPU utilization. When executing scripts in a Web page, the page becomes unresponsive until the script is finished and shows “unresponsive script” alert message.



Quote for the day

"It is not only what we do, but also what we do not do, for which we are accountable" -- Jean Baptiste Moliere

October 10, 2014

Microsoft: Surface Pro line is here to stay
"Surface Pro 3 is off to a strong start with both individuals and businesses," maintained Surface General Manager Brian Hall in that blog post. He said Microsoft is guaranteeing that Surface Pro 3 will be upgradable to Windows 10. And he said the current line of Surface Pro 3 accessories — Surface Pro 3 Type Covers; power adapter, Ethernet adapter and other "infrastructure accessories", and the docking station — will be compatible with "the next generation of the 'Pro' line of Surface."


Who Gets the Call When Your Analytics Process Crashes?
IT feels it has been burned too many times in the past when analytics processes were thrown over the wall to them and then they had to scramble to deal with issues that arose. They were hesitant to continue to add more processes without a better way to handle maintenance. I believe that my client’s real problem is with the contract that IT has with the analytics teams when it comes to placing something into production.


The important details of Tesla’s Model D and how autopilot works
This is important because this suite of features is what unlocks the newly enabled “autopilot” functions on the Model S that Elon Musk was showing off during the launch event. The “technology package” will cost an extra $4,250 — yeah, I know, I thought it would be another free upgrade to the Model S. But hey, Tesla wants to get paid this time for all its extra engineering. So with the autopilot software, the Tesla Model S can do some things now, and some things down the road. During the test drive, our Tesla driver showed us how the car can read speed limit signs and notify the driver if they go over the marked speed limit.


'Big Data Mistakes' and 'What Not to Do'
The phenomena of Big Data continues to grow as companies of all sizes start to realize the potential ROI that comes from the correct use of massive amounts of data. MIT found that firms who can leverage Big Data can achieve 5-6 percent greater productivity and profitability than their competitors. Knowing the most common mistakes made when handling Big Data will help your organization achieve its goals.


Microsoft researchers create a secure haven in the cloud
Haven provides additional protection that can’t be offered by existing techniques, runs on commodity operating systems and works with any legacy application. “The single most common barrier to adopting cloud computing is the lack of trust in the cloud provider’s ability to provide the same level of confidentiality and integrity as one could with an on-premise solution,” wrote Jonathan Trull, chief information security officer for security research firm Qualys, in an email exchange about Haven.


Professor James G March - Foundations of knowledge & innovation
This interview is the next in a series of interviews on the foundations of knowledge and innovation, where PhD students interview scholars who have made a profound impact on the field of management. Professor March has published over 200 books and articles, the work that shaped the way management scholars think about organizations. The garbage can model, the behavioral theory of the firm and balancing exploration and exploitation are only a few of his profound ideas.


How IoT Impacts Business Strategy
While IoT is growing significantly, generally there’s also significant resistance to it because of costs, implementation, uncertainty and other factors. Unfortunately, that resistance is ultimately going to be a great hinderance for companies. If one thing is certain, it’s that IoT is happening and will continue with even greater speed. If companies want to be ahead of the competition, they need to get going with IoT. Especially because of how much IoT and big data technology go hand in hand. "Smart devices" that generate and collect sensor data will contribute significantly to the growing volume of big data.


Grassroots Programmers: Love vs. Money
Kenny Skaggs who works in consulting in the US, loves helping people and has “never felt an urge to climb the corporate ladder”, characterises his motivation as the desire “to pursue” his “own dream”. “What I'm really passionate about when programming is the opportunity to build something up,” he continues. “I love to take the primitives of a language and build them up into constructs, and then put those constructs together like cogs and mechanisms to form the machine that the program is. It is how I imagine an artist paints a picture: breaking down what they want to represent into lines and colours and re-constructing them in their own style.”


Man plus machine required for big data variety
Schreiber called it "a counterintuitive discovery," but as he explained, variety is a spectrum. The more structured the data is, the less robust it tends to be. "Just as a rule of thumb, my observation has been that the level of information seems to go up as the structure goes down," Schreiber said. Highly structured data, such as sensor data, is "data at the lowest level," he said. For it to have any kind of value, it still "needs to be interpreted."Unstructured data, such as text used in PowerPoint slides, is "the result of an analysis and people's decisions around whether a particular drug should progress to the next phase of development," he said.


Three Practical Guidelines for Business Decisions
It is a a humoristic practical approach to understanding why decisions are so complex and what can be done about it. In order to create the combination between top-down problem-decisions (waterfall like approaches) and local problem-decisions (Agile project approach) here are practical guidelines to pursue Three practical complex decision-problems guidelines: Simple local rules; Strategic top down rules; and Visual problem view



Quote for the day:

"If you don't demonstrate leadership character, your skills and your results will be discounted, if not dismissed." -- Mark Miller

October 09, 2014

Microsoft Wants to Kill Email Attachments
Because the linked file is stored in the cloud, it can be accessed simultaneously by multiple recipients. OWA's interface supports real-time co-authoring of linked and attached documents, so several collaborators can simultaneously work on a single document. This summer, Microsoft added a new side-by-side view to OWA to help streamline the real-time collaboration process. The view lets users open linked or attached documents alongside email, allowing them to both modify a received document and reply with an email message from within a single interface.


Disruption Coming For MDM - The Hub of Context
Much more intuitive, analytic, and intelligent about our master data. And this is what innovative MDM companies are doing - using a graph db repository (ie. Pitney Powes Spectrum MDM). And, still other innovative organizations are saying, we can build this on our own by leveraging a graph db (good confirmation and examples of this with NeoTechnologies). And, you have data profiling and discovery tools like Global IDs helping you identify and build a graph of your data (they OEM NeoJ from NeoTechnologies and use the open source graph db Titan).


DukeScript: A New Attempt to Run Java Everywhere
The basic architecture of a DukeScript Application is actually very simple and consists of three components. There’s a Java Virtual Machine, there’s a HTML-Renderer Component, and there’s DukeScript. DukeScript glues the JVM and the HTML-Component together and acts as a bridge between the business logic running in the VM and the UI written in HTML/JavaScript. DukeScript applications run inside a JVM and use the HTML-Renderer to display the page. When the page is loaded, DukeScript binds the dynamic elements of the page to the data model using Knockout.js internally.


Mobile technology: Ushering in the search generation
Since mobile devices have always been around, they have no intimidation about learning how they work. They have been able to do things with them from the get-go, and like the inquisitive kids they are have rapidly learned how to make them do what they want. They have seen Mom and Dad "just Google it" countless times, and the search process is normal for them. Learning to search on devices is happening at a very early age, which is clear if you talk to their parents. Show them once and they hit the ground searching. This may be the most profound effect that mobile technology will have on society in developed countries.


The cloud according to Daryl
Plummer pointed out that while interest in cloud is high, moving to the cloud is a long, slow journey for large enterprises. According to Gartner research, 90% of respondents to a recent survey said they are doing some form of cloud computing. And 78% said they plan to increase cloud spending through 2017. In fact, one-third of IT spending on services goes to cloud-based services. But cloud is only 4% of the total IT spend, which means companies are dipping their toes into cloud, but aren’t diving in by any means. Plummer dismissed concerns about cloud security. ``Most clouds I run into are more secure than most enterprises I run into,’’ he said.


Activist Elliott Pushes EMC to Dump VMware
The two companies are holding each other back, the letter said, and cites several examples where the two outfits, ostensibly part of the same company, effectively compete against each other — with the result that EMC shares have underperformed compared to its peers (companies like Hewlett-Packard, IBM, Cisco Systems and Intel) and the wider markets. The firm, controlled by the billionaire Paul Singer, controls more than two percent of EMC’s shares, and started its campaign to force its breakup in July. But this latest sally comes just days after HP announced its big breakup plan.


Obama Had Security Fears on JPMorgan Data Breach
Jim Duffy, an ADP spokesman, said the payroll processing firm had “observed Internet-based traffic from those criminals allegedly reported” to have hacked into JPMorgan. But he added that ADP had not “observed any issues associated with such scanning of our defenses.” Regions said in a statement that it “consistently monitors for any unusual activity. At this point, we have no evidence of any breach.” ... JPMorgan has said that the attackers obtained names and some email addresses but did not penetrate enough to get account information, and that there was no evidence of any illicit movement of money across the 76 million affected households.


Judges spar with attorneys on national security data requests
Federal judges challenged attorneys on Wednesday to clarify the rationale and constitutionality of government data requests, in a line of questioning that may ultimately introduce greater transparency into what is now a tightly cloaked process. The hearing, held in a federal appeals court in San Francisco, focused on National Security Letters, or NSLs, a type of data request commonly used by the Federal Bureau of Investigation to obtain information from companies, ostensibly for the purposes of investigating national security matters.


Shellshocked, and expecting worse to come
Unfortunately for those of us that have to deal with the vulnerability, the Linux operating system is used in lots of devices that we don’t normally think of as computers, so they don’t fall into a normal patching routine. I suppose it’s so widely used because it’s free, making it attractive as a platform for vendors to use when they set out to create a new product, from toasters to cars. But for many of those products, the Linux operating system is way more complex than what they really need. On my network, I found it in network devices, load balancers and even a couple of my favorite security products. And one of those was my firewall!


Half of all Android devices still vulnerable to 'privacy disaster' browser bug
At the time, Todd Beardsley, a researcher with security firm Rapid 7, described the bug as a "privacy disaster", explaining that "any arbitrary website (say, one controlled by a spammer or a spy) can peek into the contents of any other web page". The bug also allowed an attacker to hijack a web session by stealing a session cookie. Since the affected browser ships with all pre-KitKat versions of Android (Google dropped the browser in Android 4.4), it would mean that around 75 percent of all Android users with the Google Play app could be exposed to such an attack,according to Google's figures.



Quote for the day:

"The best way to find yourself, is to lose yourself in the service of others" -- MK Gandhi


October 08, 2014

BYON is a bigger threat to the enterprise than BYOD
Bring your own network (BYON) is "the ability of end users to create or access alternative networks when the available options are not satisfactory for their purposes." This sounds great if you're an end user or a vendor selling mobile access, but it's not so great if you're in charge of corporate security. From an enterprise perspective, BYON is seen as a derivative of the bring your own device (BYOD) movement. Since we're dealing with employee-created, unauthorized networks, however, data that travels via BYOD channels can't be monitored, which is a glaring data security risk that can introduce cyberthreats, such as malware, into a company's digital assets.


Peter Thiel talks Apple, Bitcoin, tech investing, innovation
Speaking at the Gartner Symposium ITxpo, Thiel, at the conference to plug his Zero to One book, covered everything from entrepreneurial thinking to currency and investing in new technologies. Thiel covered a lot of ground ranging from education, innovation and how vertical integration is generally underestimated. There's also a big difference between globalization and technology innovation. Here's the recap on Thiel's talk.


Four Strategies For Thinking Ahead of the Curve
When I asked Filippo how he keeps his mind focused on seeing around corners, he revealed his lifelong passion for competitive chess. “It forces you to think two and three moves ahead.” All the great innovators do this. They take in more data, more inputs from the environment, from the meeting, from wherever. They live in what I call the future moment. This skillset, which I write extensively about in Winning the Innovation Game, is a safeguard to being blindsided by change. It’s fundamental to discover incredible opportunity. Below are four strategies for stepping up your game in this essential area.


Son of a Breach! Can Companies Just Safeguard Their Customers’ Data?
Sure enough, six days later, the company admitted that its payment systems were in fact breached and that the hack was going on for months. They went on to say that while credit card data was exposed, personal pins were not. Reassurance (not really). And while the exact number of affected cards wasn’t known at that time, one thing was for certain: If you used a credit card at one of Home Depot’s U.S or Canadian stores in the past 4-5 months, you needed to consider your credit card stolen and get on the phone with your bank ASAP.


Improve IT Governance with a Quick Assessment
Too often today we hear from both CIOs and clinical leaders that IT is operating in a silo and not well aligned with the emerging needs of the organization. Meaningful use and ICD-10 projects are good examples. These initiatives are often managed by IT, yet the decisions on workflow, training, content development, and management call for collaboration from clinical, business, and operational leadership. Well meaning executive teams develop cross-functional governance models, yet when it comes to decision making and participation we find too often that governance structures are largely on “paper only,” with IT making it happen.


Cloud Security's Silver Lining
With mobility on the rise, there's a trend of bypassing internal controls. This leads to a loss of visibility [for central IT]." At the core of these changes is the large growth in the SaaS market, drastically increasing the scope of the vulnerability of businesses and indicating the need to look at security as less of a "walled garden" model and more holistically. "In the future," Patel says, "the Internet edge will be cloud delivered. What's more, "although more mature CSPs have done a lot of work on security, […] that market is growing every day, and not everyone is equal."


Meet Linux kernel 3.17's best new features:
This means great new features are coming to a Linux distribution near you, though the 3.17 kernel's changes mostly consist of new and improved hardware support. New versions of the Linux kernel will eventually make their way into all sorts of other devices, too. A new Linux kernel means improvements for Chromebooks, Android devices, network routers, and any number of other embedded devices. Here's the most notable new features you'll find in the Linux 3.17 kernel.


Red Hat Storage Server 3: Not your usual software-defined storage
This new RHSS can run on your commerical off-the-shelf (COTS) x86 servers, and on OpenStack or Amazon Web Services (AWS) cloud. It's based on open source Red Hat's GlusterFS 3.6 file system and Red Hat Enterprise Linux (RHEL) 6. Red Hat claims that RHSS 3 can "easily scale to support petabytes of data and offer granular control of your storage environment while lowering the overall cost of storage."


What The United States Can Learn From Israel About Cybersecurity
In contrast to the United States, Israel’s government interacts closely with the private sector, academia, and civil society on cybersecurity issues. In fact, in 2013 Israel inaugurated an Advanced Technology Park at Ben Gurion University to serve as an international center of excellence for “cybernetics and cybersecurity.” The Technology Park brings together companies, academics, and the Israeli Defense Forces (IDF) to collaborate on projects, share research and information, and foster new thought leadership.


Shadow IT Risk and Reward
Don’t expect Shadow IT teams to conform to a single ALM governance model. Shadow IT teams follow their own process, and one has to carefully incorporate enterprise policies into Shadow IT ALM processes. Choose ALM tools that efficiently support multiple governance models. An important aspect to consider is different environment configurations and solution promotion rules. A department level Shadow IT team does not always want a development, test, and production environment. They may want to develop on their desktop/laptop, and push directly to production.



Quote for the day:

"Leadership is intangible, and therefore no weapon ever designed can replace it." -- Omar N. Bradley

October 07, 2014

Rebooting Deduplication in Your Next-Generation Data Center
There are a number of considerations to determine how deduplication should fit into an organization’s modern data center and workflows. However, there is no silver bullet technology to rein-in data center complexity. The type of data, content, and frequency of access required all need to be evaluated in order to find the best deduplication solution. Virtual machines (VMs), for example, require many backup applications to work within more dynamic and virtual workflows, which they are ill-equipped to handle. This data type must be managed differently from traditional data.


Microsoft CEO Nadella: Windows 10 is an IoT play too
The key for Windows in the future will be offering user experience consistency where ever it will run. "The Internet of Things end points will need an operating system that's manageable and secure. I feel Windows will be a fantastic operating system to run on the edge," said Nadella. Another key point will be taking that OS and the data end point and offloading into Azure for predictive analytics. "That's really our IoT strategy," said Nadella. "We're in IoT today. Listening to you today makes me want to go back and put my marketing department on it."


Gartner: Top 10 strategic predictions for businesses to watch out for
For a session that is high-tech oriented, this year’s Gartner strategic predictions were decidedly human. That is to say many were related to increasing the customer’s experience with technology and systems rather than the usual techno-calculations. “Machines are taking an active role in enhancing human endeavors,” said Daryl Plummer is a managing vice president, chief of Research and chief Gartner Fellow. “Our predictions this year maybe not be directly tied to the IT or CIO function but they will affect what you do.”


IBM, Pentaho make the case for a big data refinery
It's that push-pull between access and governance that seems to be helping bubble up another marketing term du jour: the data refinery. In IBM's vision, it enables businesses to keep data in the close-to-raw format, refining it to a properly integrated, aggregated and governed state "automatically, on demand when the business user is asking for it," Corrigan said. ... Hortonworks was on to this back in 2012, which Shaun Connolly, vice president of corporate strategy, described as "a new system capable of storing, aggregating and transforming a wide range of multi-structured raw data sources into usable formats that help fuel new insights for the business."


CIOs Face Digital Leadership Problem: Gartner
One of the problems CIOs face is that inspiring people and developing strategic vision requires time. Aron suggested that CIOs appoint an "IT COO" to be in charge of operational issues within the division. He pointed out that CIOs who had such a person on their team gained at least a day each month that they could use for other, more critical tasks. The change in leadership is critical if a CIO is going to lead a change in IT culture, he said. The change in culture is critical if IT is going to respond to the changes facing businesses. Aron leaned on Peter Drucker for this action item, repeating Drucker's quote, "Culture eats strategy for breakfast."



Hacking: How Ready Is Your Enterprise?
For the first, it is important that you then ask what percentage of IT services and programs are covered by a risk assessment and what percentage of security incidents taking place were not identified in the risk assessment. The first question tells you how actively your IT is managing security and the second tells you whether there a gaps and risks. Your goal here should be to ensure that “IT-related enterprise risk does not exceed your risk appetite and your risk tolerance”. With regards to the security plan, you should be asking your IT leadership (your CIO or CISO) about the number of key security roles that have been clearly defined and about the number of security related incidents over time.


5 Steps to Take When a Data Breach Hits
The IT industry has an answer to almost every security problem. Need to lock down an app server to ward off hackers? There's likely a product available for that. Same goes for making sure a stolen Android phone uses strong authentication to keep a hacker from stealing data. However, if the worst does happen – say, the hackers manage to break into a server and steal credit card numbers from a database – it can be hard to know what to do next (other than panic). CIO.com spoke to several security and legal experts to find out what to do after a leak occurs. Here are their five steps for how to survive a data breach, in chronological order.


10 things you need to know before hiring penetration testers
Penetration testing is a crucial part of fortifying and maintaining network, IP and physical security, but as we discovered through numerous interviews, it's not a simple task to hire for. Pentesting involves giving professional pentesters permission to test and verify that new and existing systems, networks, applications and safeguards don't provide unauthorized access to malicious hackers — but pentest individuals and companies range from razor-sharp, thorough and helpful, all the way to oversold, irresponsible and negligent. Today's attackers are devious, creative, and not held back by anything. Here are the ten most critical things you need to know in order to hire the right pentesters.


Protection & Decompiling Software
The most common software crack is the modification of an application's binary to cause or prevent a execution specific part of the program. This is accomplished by reverse engineering the program code using a debugger until the software cracker reaches the subroutine that contains the primary method of protecting the software or by disassembling or decompiling an executable file with a program. Cracking some time done by monitoring the registry or file system changes done by the installation and 1st run of the application.


Ricoh's plans for transformation
Ricoh is in the midst of transformation, actively streamlining its company structure to accelerate growth across a number of markets. Like many traditional print hardware companies, it is shifting its focus to services. Its primary focus is on what it calls "workstyle innovation". Over the past few years, Ricoh has repositioned the company as a services-led organisation - and has greatly enhanced its marketing communications and web presence to shift perception of Ricoh as a company that can support a business' transformation in today's evolving and mobile workplace.



Quote for the day:

"There are only two types of darknesses. One that harvest the shadows..and one that leads the light" --Warda Patel

October 06, 2014

The prospects for Apple Pay in the UK
David Emm, principal security researcher from Kaspersky Lab, said people’s reaction to Apple Pay would have been different if not for the iCloud hacking claims. “I suspect we wouldn’t have had so much focus on this from a security point of view,” he said. “That suggests to me that in the longer term, security is unlikely to be a top priority for people. There’s no question that the convenience of mobile money services, being able to pay for things just by swiping your device, is increasing.”


How the CIO Role Is Changing As Business Needs Evolve
The duties of the CIO have changed in the last decade, says Steve Durbin, managing director of Information Security Forum. "Ten years ago, these guys were worrying about things like the mainframe computer," he says. "They didn't have people like you and me – users who would suddenly decide they're going to use their iPhone or tablet to access information." Part of the reason for the increased CIO role is that the power shifted away from IT and into the hands of the end users, whether they were customers or employees of the company.


IoT technology starting to impact product development
"What you are seeing is the convergence of industrial systems, Internet solutions, big data and the ability to build systems that use an enormous amount of compute power potentially distributed all over the planet," Soley said. For example, Coca-Cola Co. uses sensors in every part of its distribution, according to Soley. This entails everything from tracking down where a bottle needs to be delivered to orders of a specific syrup flavor. "They are sensing potentially hundreds of thousands of sites all over the world based on communication systems," he said.


Home Depot Security Team Understaffed And Overwhelmed For Years, Insiders Say
In fall 2011, Home Depot’s overall security team had about 60 employees with a variety of responsibilities, from finding security flaws in the network to ensuring that the company was meeting industry security standards. ... "You're having a hard enough time finding security holes," one former Home Depot security engineer told HuffPost. "Then half the people in your department leave and your workload doubles. It makes it even harder to catch stuff." Two former security employees described Mitchell as "bullying" and "abrasive" and said he was partly to blame for the loss of talented personnel.


HP to Separate Into Two New Industry-Leading Public Companies
Both companies will be well capitalized and expect to have investment grade credit ratings and capital structures optimized to reflect their distinct growth opportunities and cash flow profiles. The separation into independent publicly traded companies will provide each company with its own, more focused equity currency, and investors with the opportunity to invest in two companies with compelling and unique financial profiles well suited to their respective businesses. Management Structure Meg Whitman, President and Chief Executive Officer of HP, and Cathie Lesjak, Chief Financial Officer of HP, will hold these positions with Hewlett-Packard Enterprise.


The Navy is building robotic weaponized boats
The technology, which uses artificial intelligence, machine perception and distributed data fusion, was successfully demonstrated over two weeks in August on the James River in Virginia. "This is a huge advance for robotics and, specifically, for object recognition and artificial intelligence implementations," said Patrick Moorhead, an analyst with Moor Insights & Strategy. "These are the smartest robots I have seen. The combination of speed, object recognition and artificial intelligence is very, very impressive."


How Much of Your Data Would You Trade for a Free Cookie?
In a highly unscientific but delicious experiment last weekend, 380 New Yorkers gave up sensitive personal information — from fingerprints to partial Social Security numbers — for a cookie. “It is crazy what people were willing to give me,” said artist Risa Puno, who conducted the experiment, which she called “Please Enable Cookies,” at a Brooklyn arts festival. The cookies — actual cookies — came in flavors such as “Chocolate Chili Fleur de Sel” and “Pink Pistachio Peppercorn.” To get a cookie, people had to turn over personal data that could include their address, driver’s license number, phone number and mother’s maiden name.


The Agile Coaches' Coach Shares Her View on SAFe
An incredibly frustrating aspect of multiple Scrum teams in the same product area is the interdependencies between them, which can easily turn into interdependency gridlock. The cause of this is the way organizations organize. Most don’t yet organize in a way that lets us slice theWedding Cake into thin slices of actual customer value. I can rail against that all day long, but in the meantime, interdependencies between teams flourish and can result in unexpressed contracts -- think of them as informal Service Level Agreements (SLAs) between teams.


CIO interview: Ben Hine, technology director, UKTV
“Technology is a huge part of everyday life and defines the way they work,” he says. “But we didn’t want it to define us; we wanted people to define what they wanted from technology.” During the infrastructure refresh, the UKTV team moved buildings, so it had a blank canvas to work with. On day one, employees came into the new building to find their chosen laptop waiting for them. “We made every single person mobile,” he says. “We took their desks and every piece of kit – the telephone, PC, TV, personal video recorder, Sky Box – and managed to squash it all into a laptop.”


JPMorgan Chase attackers hit other banks
The attack compromised information and data used in connection with providing or offering services, the bank said. However, sensitive information including account numbers, passwords and credit, debit and Social Security numbers are not thought to have been compromised, the back stated. The bank said it does not believe customers "need to go through the inconvenience of having their cards reissued." Even when an attack does not involve credit card or social security numbers, however, information such as names of people who use a certain service can be used by criminals to pry more sensitive information from unsuspecting consumers via phishing attacks.



Quote for the day:

“The growth and development of people is the highest calling of leadership.” -- Harvey S. Firestone

October 05, 2014

Dirk Slama Keynote on The Internet of Things
"The vision for the Internet of Things is very powerful – a world in which assets, devices, machines, and cloud-based applications seamlessly interoperate, enabling new business models and services; with big data analytics as a foundation to support intelligent decision making in this connected world. As with every vision, the question is how to make it happen. This presentation provides key success factors for IoT, as well as a detailed overview of concrete IoT uses cases in the areas of automotive and transport, manufacturing and supply chain, as well as energy. Finally, a framework for IoT implementation is presented, which helps making your IoT projects a success."


NoSQL Databases: An Overview
Over the last few years we have seen the rise of a new type of databases, known as NoSQL databases, that are challenging the dominance of relational databases. Relational databases have dominated the software industry for a long time providing mechanisms to store data persistently, concurrency control, transactions, mostly standard interfaces and mechanisms to integrate application data, reporting. The dominance of relational databases, however, is cracking.


BMC Is Fixing Its Enterprise IT Software With User Experience Design
The key is being able to understand what the call center agent needs in a given point of time and how much workload Smart IT can handle. Combine this with a better front-end user experience for the call center agent and everything runs that much more quickly. “Pick the world's largest company and think about the number of employees they have,” Kaempf says. “To deliver better service to employees--that's a real win for them.” In Kaempf's opinion, enterprise has been too focused on solving technical problems--not user problems.


IBM Tries to Make Watson Smarter
“We never would have thought of it; we don’t have that DNA,” he said. “It validated the idea that we needed to open up the platform and make it available to the startup marketplace.” Ultimately, Rhodin said, IBM will pursue a revenue-sharing model for any effort that reaches market. The company also continues to pursue applications in the medical, financial, and legal sectors. Using Watson to examine thousands of documents could, for example, help doctors see different diagnoses in order of probability and “rule out things they didn’t think of,” Rhodin said.


Honda's in-car Connect system does Android its own way
Honda's engineers definitely squeezed a lot of functionality into the system, which may suit some folks and not others. For instance, you can download and use Android and Honda's own car-specific apps, including an optional Garmin-powered GPS. Other functions include FM radio, CD playback, USB and HDMI connectivity, Mirrorlink and Bluetooth. While it's great to have choices, we hope all of that functionality doesn't make the system difficult to use. The interface was a bit more fussy than we'd like, which could distract the driver. On the other hand, it's not lacking much in functionality compared to a smartphone, making it potentially more useful than other in-car systems.


Fixing the internet for confidentiality and security
First, it became clear that total surveillance is the norm even amongst Western democratic governments. Now we hear the UK government wants to be able to ban organisations without any evidence of involvement in illegal activities because they might “poison young minds”. Well, nonsense. Frustrated young minds will go off to Syria precisely BECAUSE they feel their avenues for discourse and debate are being shut down by an unfair and unrepresentative government – you couldn’t ask for a more compelling motivation for the next generation of home-grown anti-Western jihadists than to clamp down on discussion without recourse to due process.


Cyber Threat Intelligence
Threat intelligence is often presented in the form of Indicators of Compromise (IoCs) or threat feeds, although despite various attempts by vendors, it does not come in the form of an XML spreadsheet. Hence, threat intelligence requires organizations to understand themselves first and then understand the adversary. If an organization does not understand its assets, infrastructure, personnel and business operations – it cannot understand if it’s presenting opportunity to malicious actors. If an organization does not understand themselves fully to thus, identify what malicious actors might be interested in them – then it cannot properly recognize the intent of actors.


"Robotics Has Too Many Dreamers, Needs More Practical People"
Grishin said he wants to do more deals per year but, of course, he wants to find the right deals. "Robotics need dreamers," he said. "But there are too many dreamers now, and we need more practical people developing actual products." Grishin said that while looking for business opportunities, he saw too may entrepreneurs proposing cool new robots and concepts but with no business cases to support them. The robotics industry, he added, needs more startups to fail to allow entrepreneurs to learn from past mistakes and come up with more enduring plans.


Travel Intelligence and its big (data) benefits
The emergence of new technologies offers real-time data analyses and cutting edge forecasting capabilities across the entire travel cycle, allowing travel industry players to start doing things they had never even considered doing before. Big data is also today’s most powerful ingredient in the ongoing battle for competitive differentiation and personalisation. Understanding today’s traveller is vital to gain the competitive edge: the travel industry is moving beyond standard leisure and business segmentation towards a more personalised view of the customer. Real customer understanding can be drawn from multiple sources that exist at a company, industry and global level.


How to transform USB sticks into an undetectable malicious devices
Nohl explained that his team has written malicious code and deployed it intoUSBcontrol chips used in thumb drives and smartphones, at this point it is sufficient that victims connect the USB device to a computer to trigger the execution of malicious software. Nohl and Lell’s BadUSB demonstrations during Black Hat illustrated how their code could overwrite USB firmware and turn a USB device into anything. A flash drive plugged into a PC, could for example, emulate a keyboard and issue commands that steal data from the machine, spoof a computer’s network interface and redirect traffic by altering DNS settings, or could load malware from a hidden partition on the drive.



Quote for the day:

"You’ve got to get up every morning with determination if you’re going to go to bed with satisfaction.” -- George Lorimer

October 04, 2014

Driving IT Business Alignment: One CIOs Journey
To fix things, Dale and his team partnered with the business. Doing it together rather than separately enabled the IT organization and the business to collaborate and to build a better and more permanent partnership. Dale says, “We have really enjoyed implementing the solution, because the business units are now working very closely with IT”. Dale claims as well the relationship with their business units has gotten to be a very solid, trusting relationship with them, and very collaborative. They have learned to trust IT’s input, and IT has learned a lot from the business units about how they operate and like to operate.”


EA in practice: The Case Container
A central part to any typical Enterprise Application is the Case or Dossier, and the process handling this. The information going in to a Case, the business logic applied to it, and the subsequent business decision(s). It all has to be filed with accuracy. Case handling get complex because information changes over time, business decisions are made, and the business logic and the information going into it are also complex. Just look at financial institutions and insurance systems, as well as government systems. These have a load of legislation and business rules - that change over time – and every business decision must comply to the rules and information that was valid at that point in time. Otherwise that decision does not have integrity.


Examine API integration trends in the enterprise
As customers are looking to API integration tools more and more for mobile enablement, [representational state transfer (REST)/Javascript Object Notation] has become an accepted standard for exposing enterprise applications as APIs. Tools should facilitate the creation of these REST APIs, and on the back end [they should] support service discovery, shaping, cataloging and publishing APIs, and [monitor] the health and performance of these APIs at runtime.


Your Roadmap to Successful Adoption of Agile
Lean software development presents the traditional Lean principles in terms that relate to software development. Often when Lean is discussed, there tends to be a strong focus on eliminating waste and rightly so. However the real focus of Lean is the identification of value to the customer: delivering what they want, when they want it, and with the minimum amount of effort. To be sure, what is considered “valuable” also becomes a driver for what is considered wasteful. As folks think about Agile principles, I suggest that they also consider the Lean software development principles to help them in their Agile journey.


Information Security Controls Relating to Personnel
While the risk of threats are increasing, study says that the threat is more from the inside than from the outside. This has mandated the need for framing polices, procedures and controls around the employees of the organization, so that such risks arising from within can be mitigated or managed well. Whilst personnel security controls cannot provide guarantees, they are sensible precautions that provide for the identity of individuals to be properly established.


An immature security program is an exciting challenge
There are similarities between where my new company is right now with regards to security and where my old company was when I started there. But I don’t expect this new job to be a repeat of the last four years. For one thing, I am starting with all the knowledge and experience that I gained over the past four years. In the course of that time, I have learned a lot about things like cloud computing, mobile devices, advanced malware, data handling and security awareness. And I expect to keep on learning, since new things that I can’t even anticipate are sure to crop up.


Inside the Secret Clash of CIOs and CMOs
There's a fundamental problem in the way CMOs and CIOs look at technology projects. CIOs don't like loose ends. That is, they want to see projects that have a clear beginning and end -- a clear-cut return on investment. CMOs, however, can't afford to wait for this kind of clarity before embarking on projects. ... CMOs call this open-ended approach as being "agile," which is very different from what CIOs hear. For CIOs, "agile" means a software development methodology, according to The CIO-CMO Omnichannel study


When Good Federation Goes Bad
Given a choice of identity providers to leverage when logging in to a service provider, I generally choose the IdP that has the least data about me. In loose order of preference, this translates to Twitter, Microsoft, Google, and finally, Facebook. The first three generally require only my email address and a few other attributes, such as profile information I share publicly. Facebook, however is a whole other matter. I've written before on how Facebook throws a plethora of user identity attributes at a service provider when you use it as identity provider for a federated login.


Identity and Access Management Through the Enterprise Service Bus is a Pipe Dream
The first is the bi-directional nature of the ESB’s interface with the rest of your systems. This simply means the ESB can send and receive data and commands to any system it is connected to. Identity and Access Management processes don’t work the same way, however, as the type of data is “very different.” The changes involved, such as “a change in job or surname, or a promotion or departure of employees,” often can’t be read by the applications in their default modes, requiring significant development work on the part of the application supplier to make the system function. A result is that only very basic messages can be sent, such as the creation of a new identity.


The Problem with “Always On” Deduplication
The bigger problem is the way in which database systems store data. Relational databases use tables to improve performance and manage operations. A relational database such as Oracle has no duplicate data blocks, because each block in a tablespace (the logical container in which tables and indexes are stored) contains a unique key at the start and a checksum containing part of that key at the end. As a result, most shops are going to see little space saving, while paying the price of increased latency as the hardware pointlessly attempts to find matching blocks.



Quote for the day:

"A leader takes people where they would never go on their own." -- Hans Finzel

October 03, 2014

Security Think Tank: Minor failings can trigger major data breaches
When small incidents go unchallenged – or even unnoticed – they become the accepted culture. So, the first time a door to a file room is propped open for the sake of convenience, the security policy is bypassed. If this goes unchallenged, it will happen again because “Fred” does not see the importance of putting his PIN code into the door entry system for the file room. This mindset cascades, with more and more people believing it to be acceptable behaviour. Before you know it, propping the door open is the norm within the business, offering an opportunity for files to be removed by unauthorised staff, altered and copied – and a more major security breach could occur.


10 Tips to Ensure Your IT Career Longevity
Many organizations are getting better at providing embedded employee performance and career management processes, according to Karen Blackie, CIO of Enterprise Systems & Data for GE Capital. However, she warns that you are your own best advocate and should always strive to "own" your career. Don't wait for your organization to do it for you because that day may never come. This means stepping back and thinking about where you want to be in X amount of time and then outlining the different skills and experience needed to get there.


Blowing the Lid off BYOD Containers for Security and Productivity
With the MaaS360 Secure Productivity Suite, you can prevent data leakage by controlling emails and attachments. This facet of the larger Enterprise Mobility Management suite also conducts online and offline compliance checks before email can be accessed. You can set it to restrict forwarding, moving data to other applications via cut and paste restrictions, and screen captures. This last point is a very important consideration as public apps embed deeper into the enterprise and homegrown programs are updated to serve the app world.


Artificial intelligence in your shopping basket: Machine learning for online retailers
BloomReach is able to aggregate data from many sources, with user data kept in silos for privacy reasons - an approach which also means keeping the computational, data-processing and machine leaning infrastructure separate from the serving infrastructure. The result is a micro services model that can deliver millions of pages from the cloud, while still learning from user interactions and new content. De Datta points out that without new information search boxes degrade over time, and the more inputs you have, the smarter the system gets.


CIOs must argue for smarter, more strategic technology investments
"We certainly see shifts in the IT budget, because growth was previously very strong in areas like storage and physical servers, but clearly that growth is reducing, as there are shifts to virtualisation and higher uptake of cloud models," she said. At the same time, these new forms of technologies and the service delivery models of the cloud are changing the way that IT is consuming technology, most evident in the shift of IT spending from a capital expense (capex) to an operating expense (opex) model.


Government Toils To Create Big Data Infrastructure
"This is not necessarily a new problem," said Steve Wallach, former technical executive at the National Geospatial-Intelligence Agency (NGA). As long as 30 years ago computers were producing more data than could be practically used, and the ability to produce it has outpaced our ability to manage it since then, he noted. "We are moving into a new area," said Wallach. The other major challenge is making the data available to other researchers who can add value to it. "I spend a lot of the taxpayers' money producing this data with the big machines,"


Does Hadoop Mean the End of the Data Model?
The natural result of separating the data content from the data structure is that the MapReduce program becomes the place where the two are linked. Depending on the data processing needs, this may or may not be a complete data structure definition. In addition, each developer will define this mapping in slightly differing ways, which results in a partial view that makes unified definition hard to assemble. The late-binding of data content to the data structure essentially places the developer as the middleman between the data and the data consumer since most data consumers are not MapReduce trained.


Cyber risk and the UK’s Cyber Essentials Scheme
The scheme builds on elements of ISO 27001, laying out a procedure for establishing resistance to cyber risk; the key aspect of the new initiative is that this resistance can be externally certified. External certification is important: it is designed to enable those dealing with an organisation – customers, suppliers and perhaps insurers – to know whether it meets a measurable minimum standard of cyber hygiene. This in turn should create a competitive advantage for those who demonstrate compliance over rivals who do not. Once the scheme is up and running, applicants will be able to get certification showing the level of compliance they have attained.


A Rails Enthusiast’s take on MEAN.js
To dive into MEAN, what better way for a Rails fan to get up to speed than by following the path of the famous demo, and creating my own blog application with MEAN.js. A more up-to-date version of the Rails blog exercise, without the “Uoooops,” is the Rails getting started guide. Our journey here will mirror this guide and summarize my comparison with Rails. To follow along with my code, check out the project on GitHub. ... To start a new app in MEAN, like Rails, we use a generator. MEAN.js uses Yeoman for automation, and is configured with a generator for a starter application. In this case, I created an application called Blog.


How iPaaS integration gains platform status
IPaaS service offerings are built around an Agile development methodology where time to market speed is crucial. An iPaaS service platform typically provides prebuilt connectors and development and configuration tools that are user-accessible, drag-and-drop type tools. Using the provided tools, organizations can implement integration projects involving SaaS or on-premises endpoints, data sources, applications, services, APIs and processes. Users are able to develop, deploy, execute, manage and monitor integrated interfaces linking multiple endpoints.



Quote for the day:

"Talent hits a target no one else can hit; Genius hits a target no one else can see." -- Arthur Schopenhauer

October 02, 2014

Encryption IS for the children; it's the gift of electronic privacy rights
But it’s for the children! Sorry, but I’m as tired of that rationalization being used as a reason to justify surveillance and censorship as using the terrorism threat as an excuse. Both were used by FBI Director James Comey in the form of warning about how restricting quick access by law enforcement to a smartphone could cost lives in some kidnapping and terrorism cases. “What concerns me about this,” Comey said, “is companies marketing something expressly to allow people to place themselves beyond the law.”


UK falling behind in cyber intrusion detection, study shows
Global information security budgets decreased 4% in the past year compared with 2013, and security spending as a percentage of IT budget has remained stalled at 4% or less for the past five years. Leadership is cited by 30% of respondents as the biggest obstacle to improving the overall effectiveness of the security function. More than a quarter of respondents do not think there is a senior executive who proactively communicates the importance of information security. UK respondents said the top three obstacles to improving security are: insufficient capital funding, a lack of leadership from the CEO or board and the lack of an effective information strategy.


The battle for the IT budget: Operation versus experimentation
"Justifying the ROI for maintaining old solutions or building expensive new ones has become very challenging," Dufour said. "The win rate for on-premise has decreased a lot — below 20 percent for some products — and most companies have a solid aversion against buying hardware, paying for implementations and waiting for tangible results." Outsourcing is another way that many companies are saving money on operating expenses. Traditional outsourcing is still a popular way to save costs on helpdesk, but using platform-as-a-service (PaaS) and infrastructure-as-a-service (IaaS) tools are, in a way, a form of outsourcing support as well.


The scary truth about data security with wearables
The amount of data being collected by just the wearable device on your wrist is simply astounding. Damien Mehers, a wearables developer who built the Evernote app for Pebble and the Samsung Galaxy Gear, said, "Especially with the fitness [devices], if you read the license agreements, if people really realized what they are signing up for, they might be horrified at what they're allowing the companies to do with the data. I think there needs to be more clarity and perspective from the user."


Building a disaster recovery plan starts with IT disowning DR
Once we have scored the risks, we define mitigation plans, which should map correctly to the risks. Disaster recovery can be expensive and it is easy to over-invest in recovery options that we will never actually trigger. And, because redundancy -- in systems, processes and capabilities -- is incredibly expensive, we should have redundancy or partial redundancy only on the high impact/high probability risks. For everything else, we think of how to quickly recover from a disaster, with "quickly" being highly situational.


Implementing repository Pattern With EF4 POCO support
Here all the method responsible to do query, return result in ObjectQuery Which have been used for a special reason and that is ObjectQuery.EnablePlanCachingProperty that indicates whether the query plan should be cached. Plan-caching caches information which is computed as part of putting together the query itself. By caching this, a subsequent execution of the same query (even if you change parameter values) will run much faster than the first one. This information is cached per app-domain so you will generally benefit from the query cache across multiple client requests to the same web app and the like.


IT pros told to pay attention to 'shadow IT'
The newest form of shadow IT, which Comstock also called "dark IT," is cloud services. These are platform, software and infrastructure services that can be obtained by using a personal credit card. Such services are popular because they allow employees to more quickly set up the services they need, without going through a probably already-overworked IT department. Comstock urged the audience to embrace this new form of shadow IT, because it provides a glimpse to IT staff of what their users require.


Microsoft partners with financial services industry to fight cyber crime
Under the new collaboration agreement, Microsoft will provide FS-ISAC members with visibility into malware infections on banking networks. This agreement is the latest example of Microsoft proactively partnering with customers, industry leaders and global law enforcement to counter cyber threats. Criminals have moved into cyber space to target banks, businesses and customers to steal millions of dollars without ever cracking a safe, said Richard Boscovich, assistant general counsel at Microsoft’s Digital Crimes Unit.


The channel needs the right blend of youth and experience
The lack of knowledge of business processes is the primary reason why many IT integration projects fail. Let’s face it, IT salesmen aren’t the greatest listeners in the world. They only ever stop talking in order to think about what they’re going to say next – meanwhile, your queries wash over them. At the risk of making a massive generalisation, it might be said that women are better listeners than men. Surely, listeners are what we need in this industry. Which is why another movement, Women Who Code, could be useful too.


CFOs – Vanguards or Villains?
The bold CFOs are unafraid to admit that their existing reported information may be both flawed and incomplete. The flawed aspect deals with continued use of non-causal cost allocation factors that lead to misleading simultaneous under and over-costed products and services (because cost allocations must have a zero-sum error to reconcile). The incomplete aspect deals with not tracing and assigning the channel and customer-related expenses reported below the gross profit margin line. These channel, selling, customer service and marketing-related “costs to serve” are arguably more important than product costs.



Quote for the day:

"We think of our brains as thinking machines, but they're not. They're survival machines." -- Kris Kimmel