November 10, 2014

Google releases tool to test apps and devices for SSL/TLS weaknesses
The tool includes a client component for Android and Linux systems that tells the MitM component what specific tests to run. The client is also important for tracking which applications that run on the tested systems opened certain SSL/TLS connections, something that can be hard to determine just from the MitM side. Nogotofail can check for weaknesses like vulnerabilities in third-party SSL/TLS libraries, susceptibility to attacks that strip the SSL/TLS or STARTTLS encryption and improper certificate validation, a widespread problem in applications.


How enterprises will use the cloud for big data analytics
Compatibility, security, and performance concerns have kept enterprise organizations from being completely comfortable with the idea of moving their complex core applications to the cloud. Without a seamless application migration blueprint, the project can seem more like a headache — and a risk — than it’s worth. This report, which is based on a survey by Gigaom Research and sponsored by Cazena in September 2014, reviews the different considerations when moving some or all big data-analytics applications to the cloud. The report is will give guidance to CxOs, IT and business leaders, and decision-makers at software as a service (SaaS) companies and cloud service providers.


Linux Foundation: Open Source is Eating the Software World
There is a wholesale shift in the enterprise software world from using a little bit of open source code here and there to an 80-20 split, where 80 is the open source portion, he said. The reason for the shift is quite simple: software has become a way for an enterprise to add value, and open source is the best way to use a lot of software. “There is too much software being written for any organization to write that software on their own,” Zemlin explained.


Become a great listener
To succeed in today’s business world, leaders must be proactive, skilled listeners. Leaders who make themselves accessible for conversation and listen regularly are well-informed of the goings on in their workplaces. They better understand others’ opinions and attitudes and are able to take this information into consideration when making decisions. There are other benefits to listening well. One is building trust. Effective listening conveys a sense that the leader cares about her people, their thoughts, opinions and concerns. A leader also builds stronger commitment within others when people feel that she cares about them personally as well as in how they fit within the organization.


The Half-Life of Data [INFOGRAPHIC]
Radioactive substances have a half life. The half life is the amount of time it takes for the substance to lose half of its radioactivity. Half life is used more generally in physics as a way to estimate the rate of decay. We can apply exactly the same principle – the rate of decay – to business information. Like natural materials, data is subject to deterioration over time. In science, the half life of a given substance could be milliseconds. It could be many thousands of years. The half life of data has been measured, and it may be shorter than you were expecting.


Security Think Tank: Guidelines for dealing with Shellshock
It is useful to know that there are many other shells that may be utilised in Unix deployments. However, bash is the default shell for both Linux and Mac OS X. The use of both of these operating systems is popular for enterprise and home applications. This vulnerability has been present in Bash for around 22 years. Chet Ramey a senior technology architect at Case Western Reserve University in Ohio, has been maintaining the Bash open source project and believes Shellshock dates back to a new feature introduced in 1992.


Emerging tech under standards scrutiny
We want the standard to support that sort of rapid development. In the public cloud, you can spend small amounts of money to get a prototype working, and then think about rollout and production – that's the point at which you should be thinking about long-term interoperability and questions like ownership and data recovery." In every aspect of the Open Platform 3.0, security is a concern, along with related topics of identity and privacy. Says Harding: "Security is a key concern, and so is identity. You need a framework to identify who owns the data, who is trying to access it.


Raids cast doubt on integrity of TOR
This makes it unclear whether these authorities have broken Tor to the point that it can no longer mask the location of its infrastructure or whether they found them using other intelligence. Tor relies on volunteers who host nodes of the network. Traffic bounces around within Tor in order to disguise where it comes from, but exit nodes and entrance nodes would yield the most useful information about actual IP addresses connecting to Tor. “Law enforcement could try to get in that first layer and see the sources and therefore try to reduce the anonymity as much as possible,” says Ben Johnson, chief evangelist at Bit9+Carbon Black.


Look out OpenDaylight, there's a new open source SDN controller
"It's a distributed core that runs on multiple servers," Appalaraju said. "Each instance is identical and they cooperate together to form a single system. If you need more control plane capacity, you add more servers. It also has high availability. If an instance fails, the workload is seamlessly distributed to other systems." ONOS also has carrier-grade persistence. The state of the entire control plane is stored on every instance at once, which enables hitless updates. Like OpenDaylight, the southbound abstraction layer of ONOS uses multiple protocols, including OpenFlow, to interact with network infrastructure.


Leveraging Three Tiers of Health Data
With Meaningful Use, you have to be able to email patients and share data among and between other physicians, et cetera. People are getting certified for MU, but if you actually look at the rules they don't say you have to do it 100 percent of the time. They say you have to have an electronic medical record with a problem list on x number of patients, and that keeps escalating over the years. The same is true with with email. I think we're about halfway there. In my experience it's not there, but I know what MU is about and that people are getting certified.



Quote for the day:

"The best strategy for building a competitive organization is to help individuals become more of who they are." -- Marcus Buckingham

November 09, 2014

How Your Clients Can Use COBIT and BiSL to Manage Their Information
Most of BiSL’s guidance addresses the first point, whereas COBIT is stronger in the second area. Many COBIT practices apply to business information management and contribute to providing assurance that business information management processes are executed effectively. Business information managers who want to use COBIT key practices, to assure themselves and stakeholders that the information systems (in the broadest sense of the word) are under control, can use BiSL to help them decide how to implement the key practices. BiSL does not provide specific guidance as to how to comply with the key practices, but gives an extensive description of the content of the processes.


Agile and SaaS – Lessons for Value Realization
SaaS and Agile combine to enable more nimble project governance. Business leaders are able to steer the project in two-week increments to gain maximum benefit by focusing resources on features that yield immediate value, while deferring “nice-to-have” features for future deployments. As well, business leaders gain the confidence to manage the project in this way, knowing that the Agile approach means that Release 1 will indeed be the first of many value-adding deployments in a multi-release program.


TGF: Impact of the Internet of Things Version 1.0
The latest wave of developments takes interworking still further by incorporating objects of all sorts into the network of IT services, information, organizations and people. This is the Internet of Things (IoT) that provides the potential for e-devices to be commonly built into infrastructure such as roads, vehicles, localities (e.g. smart cities), homes, livestock and even people (e.g. for measuring bodily functions). Many organizations, including governments, are realizing that there are financial, social and other benefits that are emerging though the use of networks of e-devices for the collection of data (e.g. the monitoring of people and their environment for health purposes) or raising alerts (e.g. when river levels rise).


5 Steps to Actionable Key Performance Indicators
A KPI (Key Performance Indicator) should immediately inform the reader how the business is performing which in turn should suggest what actions need to be taken. And if we are measuring the effectiveness of a website, the KPIs need to inform us how the site is doing in driving our business objectives. But most don’t. Too many organizations create Top-10 lists: Top-10 pages, downloads, videos, keywords, referrers, etc. Is it important to know which documents were downloaded the most, or what keywords drove the most traffic to your site?


List of sample KPIs in 5 perspectives of BSC
Here is a general list of key performance indicators which are divided into categories. This list should not be viewed as a must have set of indicators, but it is based on the experiences of many companies and researches related to scorecards. ... t is often reasonable to evaluate not only the efficiency of some production processes and operations at a given moment, but also assess the potential of these indicators, and the opportunities to improve them in order to increase production output and broaden production line.


Agile Enterprise Architecture Increases IT Relevance
Five years ago, Cisco started on an enterprise architecture journey to unify business strategy with IT investments. Today, all of our planning and decision-making is based on an agile, well-defined architecture-based framework.We make it real by ensuring that everything we do in IT is based on business architecture. We understand what our clients are doing and what they need, and then translate that into technology architecture and roadmaps that deliver capabilities to meet their needs. ... Enterprise architecture is a springboard for cultivating consistent communication and transparency between IT and the business. It’s a mechanism for helping our users across Cisco derive strong business value from IT.



Architecturally Significant Requirements
As you progress in your career you will learn that architectural requirements are hard to determine, primarily because they need to be gathered so early in the lifecycle before anything is really known. We know that architects should start early in project lifecycles based on when an architect engages in a project, with the end goal being integration into the innovation and project funding lifecycle itself. Hopefully, your organization has learned that getting an architect engaged before the project kickoff will not only save you money but is at the root of incremental innovation. Either way at some point the solution architect will be faced with a business case and business architecture


KeyStone Security and Architecture Review
This presentation will cover architectural and procedural security concepts within KeyStone, specifically Trusts or Delgations, AMQP Security with KeyStone and integration with a Corporate LDAP for single source of truth. Given the distributed nature of OpenStack KeyStone plays a major role in binding all of the Projects together but not much is mentioned about how to do this with KeyStone or what the pitfalls and dangers of hooking up a centralized Security System to the rest of the cloud will be. Not only do you have to be wary of the services that connect to KeyStone but you also have to be cautious of the kinds of input and data you give to KeyStone from external sources.


Testing the Internet of Things: The Human Experience
“Human Experience” testing has the following components of human interaction with the device. We should test all things physical, including sizes, shapes and genders of the users. We should also include sensory reactions including sight, sound, and touch. Orientation or the interaction with human movement is an incredible crucial part of the test. We must plan for testing in various geographical locations, different weather conditions and contexts. Finally we must consider value and most thoroughly test in terms of the users’ perceptions, mindsets, biases and emotions when interacting with the device.


Agency TheoryAgency theory assumes that the interests of owners and managers are inherently in conflict and that defensive activities are necessary by owners to protect these interests. Stewardship theory points out that these assumptions aren't always true. A series of theoretical propositions concerning the stewardship model were made by Davis, Schoorman and Donaldson. Their ideas, in conjunction with ideas on best practices in IT governance from Weill and Ross  provide an explanation for variance in the effectiveness of a varietv of governance models. Application of the stewardship model results in several novel approaches to IT governance and technology management, especially with regard to post implementation value delivery



Quote for the day:

"If the rate of change on the outside exceeds the rate of change on the inside, the end is near." -- Jack Welch

November 08, 2014

Does Watson Know the Answer to IBM’s Woes?
The hope is that the technology will be able to answer more complicated questions in all sorts of industries, including health care, financial investment, and oil discovery; and that it will help IBM build a lucrative new computer-driven consulting business. At the M.D. Anderson Cancer Center in Houston, a version of Watson is helping doctors develop treatment regimens from a patient’s symptoms based on an analysis of thousands of pages of medical papers and doctors’ notes. There is good reason for IBM’s management to hope that the technology might provide the spark for its reinvention.


Why Amazon Echo is the future of every home
As artificial intelligence, voice recognition, speech recognition and other technologies related to virtual assistants improve, these interfaces will do amazing things for us. They'll understand, interpret and make decisions based on past behavior. We'll blurt out "Alexa" or "Hey Siri" or "OK, Google Now" or "Yo, Cortana" followed by something cryptic and colloquial: "We need paper towels!" The assistant will know your preferences and will have access to your credit card, so it will go ahead and order the paper towels and have them shipped. It's not hard to see why this is important to Amazon.


Windows 10 Enterprise Features Revealed
Microsoft also announced Friday that Windows 10's device management options will be more expansive than Windows 8.1's. In the latter OS, Microsoft introduced mobile device management (MDM) capabilities that allowed enterprises to manage PCs, tablets, and smartphones with one technique. This addition was designed primarily for BYOD scenarios, but in Windows 10, Microsoft will add MDM options for corporate-owned devices. The additions will include support for managing multiple users who share a single device, full control over the Windows Store, VPN and device-wipe capabilities, and the configuration of Enterprise Data Protection policies.


How to Master Google Analytics
Google analytics is a free platform which integrates seamlessly with any website and has a tremendous amount of data that can easily be extracted once users are familiar with the interface. In addition, Google analytics is a platform that will grow with the company without any additional investment. There are other analytic platforms out there such as Clicky, which are low-cost and have a few different bells and whistles than Google analytics does, but in my opinion this analytics platform has all the things you’ll need to get started and grow your online business.


Mark Zuckerberg's Great Vision for the Next 10 Years of Facebook
Facebook will be investing in ways to better target and measure campaigns through data. It wants to help brands measure online to offline sales conversions. Currently advertisers only spend about 11 percent of their budgets on mobile, according to Facebook COO Sheryl Sandberg, because the right tools aren't yet in place. Finally, Facebook wants to build the next major computing platform, which Zuckerberg believes could be augmented reality and Oculus. He also wants to bring the internet to more people through Internet.org. "We're going to prepare for the future by investing aggressively," Zuckerberg said.


Using Open Source Solutions for Cloud-Ready Big Data Management
This growth and reliance around data will be offloaded to the only platform that can handle these types of demands: the data center. Any growing organization must look at data center hosting options as a viable solution to an ever-evolving business and IT environment. Whether this is a cloud solution or a manage services option, the modern data center is the spot that can support changed business needs and evolving IT solutions. Database administrators have been forced to find new and creative ways to manage and control this vast amount of information.


“Dark Web” Version of Facebook Shows a New Way to Secure the Web
The Tor software works by connecting to a network of computers around the world known as “nodes.” When you access a website via Tor, your data hops between three of those nodes in encrypted form before traveling to the operator’s server. Data sent back to you by that server gets the same treatment. Tor software for website operators allows them to create a .onion address – known as a “hidden service” – and obscure the true identity and location of their servers. By using that, Facebook is the only major Web company to join what is dubbed the “dark Web.”


Monetizing Big Data: A Q&A with Wells Fargo's Data Chief
The incentive piece is tough. It's my job to show how there's a mutual benefit. Take online bill pay: it tells you a lot about customer relationships. Customers use online bill pay to pay other banks for products they don't have with us. If a customer has a deposit account in online bill pay with us but not a mortgage, and they own a home, they're paying a mortgage with a different bank, so that's why you should care about online bill pay if you have the deposit account. If someone's paying a different credit card with their online bill pay, that's why you should care about their data.


Data-Driven Intuition
The definition of intuition is “a direct perception of truth or fact independent of any reasoning process,” i.e., what is often referred to as “going with your gut.” In his quest to find a successful individual who truly used their gut and nothing else to make decisions, Ma discovered he needed to redefine intuition as “a direct perception of truth or fact independent of any documentedreasoning process” because “no one successful truly makes decisions without some reasoning process. ...  or they may not have the sufficient information to document that reasoning process, but it’s clear in all cases I explored that there was a method behind the madness.”


Getting the most out of impact mapping
Impact mapping is a strategic planning and visualisation technique with roots in user experience strategy and design. An impact map visually connects solution ideas (deliverables, such as user stories) to business goals through impacts on stakeholders and customer segments. By putting deliverables into perspective of user needs and behaviour changes, and putting user needs into the perspective of overall organisational objectives, an impact map visualises assumptions. This helps to create a big picture for software delivery and facilitates many good product management techniques, such as customer research and iterative planning, as well as helping stakeholders align and prioritise iterative delivery.



Quote for the day:

"Keep true, never be ashamed of doing right, decide on what you think is right and stick to it." -- George Eliot

November 07, 2014

IT Talent Shortage: Ugly Truths
"As one of the 'unemployable' IT workers with 3 decades of experience, I think you are missing something," one reader emailed me. "The one thing that was not discussed is how we are treating the people as disposable commodities in an industry where it can take decades to develop the knowledge, wisdom, and experience that is required." Disposable commodities. Take that in for a minute. For many people, I bet it hit home instantly. He's not the only person to voice that sentiment to me in the past few weeks as I researched this article, but he crystallized it.


Software Designs Products by Simulating Evolution
Dreamcatcher shows how even creative industries could be changed by automation. “Designers worry it will take their job away, and [they] doubt that it can create beauty,” acknowledges Autodesk’s senior director of design research, Mark Davis. Dreamcatcher’s simulated evolution process begins with the software offering a set of potential solutions to a problem posed by the user. The software then “breeds” a new generation of solutions by recombining the best of those designs, as chosen by the user, and adding some random variation. The software can repeat this process to produce thousands of designs


Five things we learned from robotics expert Mark Setrakian
While Setrakian may have started off with low, slightly lumpy robots on wheels, hacking and pummeling each other, Robot Combat League took the fight to humanoid form, scaling the difficulty of pretty much everything. Compared to the two or three motors found in the wheeled variety of drones, humanoid bots would take around 28 motors, with multiple degrees of freedom for movement -- he adds there was now a nuance of puppetry to how the humanoid bots moved and were controlled. These robots also had engineering ties to a project that followed after: the Female Figure.


The problem of managing schemas
But the worst problem by far is the fact that with CSV and JSON data, the data has a schema, but the schema isn’t stored with the data. For example, CSV files have columns, and those columns have meaning. They represent IDs, names, phone numbers, etc. Each of these columns also has a data type: they can represent integers, strings, or dates. There are also some constraints involved — you can dictate that some of those columns contain unique values or that others will never contain nulls. All this information exists in the head of the people managing the data, but it doesn’t exist in the data itself.


The Future of Enterprise IT: An interview with Geoffrey Moore
Systems of record are a must-have. They’re foundational, they’re critical, and they have to be protected. Systems of engagement are a nice-to-have in many industries, moving to must-have, where there’s opportunity to create a competitive advantage. You want to have an agile system of engagement that can interface to a stable system of record. The IT function has to bifurcate itself into two camps: A conservative camp that maintains and protects the systems of record; and A progressive camp that takes risks with systems of engagement. There will have to be some interface between the two, which is a new architectural interface that we haven't had to build in the past.


Home Depot attackers broke in using a vendor's stolen credentials
The stolen login credentials didn't provide direct access to its point-of-sale terminals, Home Depot said. But once inside, the hackers gained "elevated rights" that allowed them to navigate to other parts of its network and install their malware on self-checkout systems in the U.S. and Canada. The retailer didn't identify the third-party vendor that was compromised. A Home Depot spokesman said the attack is still under investigation and the company could not comment further.


InfoShot: EU Tech Lobbying Spend
According to the data, Microsoft is the biggest tech lobbying spender in Europe, splashing out €4.75million trying to influence lawmakers. That’s half the company’s US figure for roughly the same time period. China’s Huawei is also one of the biggest spenders in the tech industry, coughing up €3million, but its US spend last year barely scraped €500,000. Google, the biggest spender on US tech lobbying, only spent €1.25-1.5million in Europe, well short of the €11million the search giant spent in the US last year. This trend of spending less in Europe wasn’t just limited to Google and Microsoft.


The complexity of the IoT requires experience design solutions
What we’ll accept in the digital world isn’t the same as what we’ll accept in the physical world. “We have these expectations about things — like Skype calls can fail and web pages can be slow to load and sometimes emails go on a long route round to get to you and take a while,” Rowland says. “It is not great, but we’re used to that. However, we are used to physical things in the world around us responding immediately and reliably. That might not happen [with the IoT]. It is obviously not acceptable if you’re to turn a light on from your smartphone and have that take 30 seconds to respond. You are just going to think it’s not working. ”


Dogs In The Data Center: Flexibility Gone Wild
Reader "Technorati" wrote in to ask what I think about dogs coming to work at the IT department. I like dogs. Dogs are great. But this trend where your fellow IT workers feel like it's OK to bring them into work? Suuuuuure... Bring your dog to work. Outfit him with matching Birkenstocks and a hoodie. As long as he has expertise with Javascript, Python, help desk, or general sys admin. Or maybe some other things. I understand that your dog cannot write code, but maybe your dog can inspire you to write more or better code. But when is enough enough?


Collaboration: It’s not what you think it is
A continuum of interaction that I learned many years ago helped me to understand what collaboration is. It can help you to understand what you really want to do in the situations you deal with and therefore direct your attention, intention and behavior when you choose to collaborate. Three words that begin with “C” broadly describe the types of interactions and relationships you may have with others. On a continuum, they look like this:



Quote for the day:

"Playing it safe is the most popular way to fail" -- Elliott Smith

November 06, 2014

Nationwide launches smartwatch banking capabilities
Nationwide customers are now able to check their bank balance on smartwatches if they have already downloaded the building society’s mobile banking app. The firm partnered with IBM to develop a system to allow Android Wear users to perform banking tasks on their wearables. The smartwatch will connect to the mobile banking app to provide users with real-time updates of their balance. The new features were developed in the Front Office Innovation Centre, which was set up by IBM and Nationwide to find new ways to provide customers with the building society's services.


Apple unveils new enterprise support plan
As outlined on the site, AppleCare for Enterprise generally fits what industry analysts were told during summer briefings. Apple and IBM unveiled their alliance on July 15. Apple will assign a liaison -- an AppleCare account manager -- to companies that purchase support, and replace damaged or lost iPhones and iPads. Apple said it would exchange devices within one business day in most cases, and capped that part of AppleCare at 10% of a company's devices registered under the plan. IBM Global Technology Services, an arm of the Armonk, N.Y. company, will provide next-day onsite service, which is available for either two-year or three-year stretches.


Business transformation considered essential, but the enterprise struggles
Business transformation is about more than efficiency -- innovation is also a key theme. In order to stay ahead, executives said changes in client expectations, technological advances and rising competition must be considered. In order to do so, new business models must be developed, portfolios improved, and processes have to be streamlined. In total, 82 percent of executives cited the need for innovation as an important driver of the need for business transformation.


IDC To CIOs: 60 Percent Of You Will Be Supplanted By Chief Digital Officers By 2020
“By 2020, 60% of CIOs in global organizations will be supplanted by the Chief Digital Officer (CDO) for the delivery of IT-enabled products and digital services.” In its presentation, IDC added that “some CIOS will find an opportunity to expand their role leveraging their experience in setting strategy, innovation, and relationships.” But why only 40% will be able to expand their role and the others “will be challenged to fill the growing gap for the CDO role”?


Enterprise Architecture Practice - Capabilities
Though Enterprise Architecture is not a very new practice, the maturity level is still not the optimal in most enterprises. Seeing the benefits that the EA function can bring to the table, many enterprises are attempting to setup the EA practice within, but are in fact struggling to get it right. EA not just science and not just art as well. It is a combination of art and science. Successful EA practice has been found to being able to demonstrate certain key capabilities. In the EA world, there is no such thing as 'one size fits all', as it is highly dependent on the enterprises' business, its objectives, goals, strategies and priorities, which is never the same across enterprises.


2014's Hottest IT Certification
With more than half of 2014 behind us, it's that time of the year where we look at IT certifications standings in real world IT. The right certifications can help earn tech workers premium pay or land the job they've been aspiring to. That's why knowing what is "hot" with employers is important when considering your professional development. Every quarter Foote Partners compiles their data in the IT Skills Demand and Pay Trends Report, and they speak with over 2600 employers to bridge the disconnect between job titles, job content and compensation. Read on to find out where the heat is in regards to IT certifications, salaries and employer needs.


Predicting the Role of Healthcare CIOs in 2020
Steele describes that as a feat of "clinical reengineering," one that required baking best practices into Geisinger's EHR system so they could be accessed at the point of care. The program, known as ProvenCare, is served to up in a variety of high-frequency care episodes, including perinatal care, COPD, hysterectomies, and hip and knee replacements. Add to that Geisinger's ProvenHealth Navigator, an advanced version of the patient centered medical home, and its participation in OpenNotes, which opens clinical progress notes to patients,


CIO interview: Glenn Murphy, London & Capital
CIO Glenn Murphy says that, as the global economy picks up, London & Capital’s IT department has had to shift focus. “We are moving away from the national economic uncertainty of the last five years, where cost-appropriate solutions were foremost on everyone’s mind,” he says. “There is more confidence in moving towards systems that add business value and deliver real-time value to our clients and front-office staff.” He says the IT department is underpinning the growth in business, creating systems to improve client reporting and management.


Facebook releases C++ libraries to ease Internet communications
The library, called Proxygen, could also help Internet-facing organizations prepare for the next-generation Internet data communications protocol, HTTP/2. "Even if they are not using C++, anybody who is following modern protocol development like HTTP/2, we are hoping they could look at Proxygen as a reference design," Matheny said. C++ programs most often use external Web server modules, such as CGI (Common Gateway Interface), to supply a connection to the network, which can be cumbersome and slow to set up and run.


Java 8 for Financial Services
Streams are a new way to work with data, as the name would suggest, as streams. Again like lambdas there is nothing you can do with Streams that you can’t do without them. It does however make your code a lot simpler and, as long as you understand it, easer to read and maintain. Lastly using these new constructs gives a lot more information to the compiler and JVM so further improvements can be made at runtime giving you better performance. There are a few gotchas like exception handling, debugging and infinite streams but we’ll cover those as we go along.



Quote for the day:

"The secret of managing is to keep the five guys who hate you away from the four guys who haven't made up their minds." -- Casey Stengel

November 05, 2014

Remote working puts business data at risk, study shows
Banks said that – even though eight in ten of the employees interviewed read or write work emails on the move, and around seven in ten work on electronic documents outside their office – businesses fail to provide tools for secure remote working, or put the right security policies in place. Fewer than six in ten respondents said their organisation had a remote working policy. Of those that did have a policy, over a quarter admitted they had broken the policy to work remotely, either knowingly or unwittingly.


Using PouchDB for Offline/Data Sync
PouchDB offers not only client data replication to remote servers, but also provides a robust key/value data store for the browser as well. And not only the browser, but any JavaScript environment with disk access, including Node.js. The PouchDB web site has an introductory tutorial that steps you through the process of building a simple single page app (SPA). The app is modeled after the vanilla JavaScript implementation of the excellent TodoMVC benchmark for JavaScript frameworks. If you’re looking for a great comparison of SPA frameworks by the way, I’d highly recommend checking out TodoMVC.


Driving Innovation with IaaS
New technologies and service models can change how businesses operate, and become key drivers in innovation and cutting back operational expenditure. Infrastructure-as-a-Service (IaaS) is one such model where servers and other resources are provisioned as required over the cloud. This model provides self-service, on-demand access to IT resources, which means users can create and access tools they need within minutes, instead of days, weeks or months.


BlackEnergy cyberespionage group targets Linux and Cisco
Variants of the BlackEnergy plug-ins developed by the cyberespionage group were discovered for both Windows and Linux systems. They enhance the malware program with capabilities like port scanning, password stealing, system information gathering, digital certificate theft, remote desktop connectivity and even hard disk wiping. Different selections of plug-ins are deployed from command-and-control servers for every victim, depending on the group's goals and the victim's systems, the Kaspersky researchers said.


A CIO fights to keep his tech options open
"The impact on customer choice and negotiating positions" is very strong, he added. The concern about a narrowing of choices isn't limited to platforms. The industry consolidations resulting from mergers and acquisitions could lead to the discontinuation of development work on certain systems. "That may force us to switch tools and vendors," Spears said. The impact of consolidation can be particularly acute in certain markets. The banking sector, in particular, may be the canary in the coal mine that offers an early sign of the risks of IT consolidation.


AT&T, Others Launch OpenDaylight SDN Alternative
OpenDaylight has seen some recent momentum with two code releases, and heightened support from its own member companies. Brocade will ship this month an OpenDaylight-based SDN controller. And initial skeptics HP and Dell have raised their investment and participation in the effort. Like OpenDaylight, ONOS delivers an SDN control plane featuring northbound and southbound APIs, and a range of management, control, and service applications. Initially targeted to service providers, the community’s goal is to extend the platform for cloud service providers, enterprises and mainstream deployments.


The Only Way to Save Your CRM from Failure
Data also decays naturally, compounding the effect of human error. Estimates put the rate of data decay at around 2 percent per month. It is a completely natural process, and it is unavoidable. As your contacts change jobs, get married, change email addresses or get promoted, your CRM will start to lose track. Looking closely at CRM failure rates, we have a range of statistics to work from. C5 Insight estimates that the failure rate of CRM software is around 16 percent. It says that this figure is “optimistic”, and puts its own estimates at 38 percent.


Despite skeptics, security awareness training for employees is booming
"Effective education is a non-trivial thing, and it takes a very solid understanding of the audience and how you're going to measure the effectiveness of that education," said Walls. "Within the industry, the history of security education has ignored all that. It doesn't worry about impact; it doesn't worry about [asking] 'Is this effective?' "As a result, the word on the street is that security training isn't worth the time and money," Walls continued. "It's the classic syndrome of blaming the tools … the fault lies with you, not the audience."


Why coding's cool for school
There are some initiatives leading the way here. Google's Made with Code, for example, provides great inspiration for young women by showcasing the diverse career routes taken by those with an interest in tech. And Capability Jane is another notable organisation, aiming to improve diversity across sectors by encouraging businesses to hire working mothers on a more flexible basis. Such initiatives are crucial in encouraging the next generation of young women to study STEM subjects with a view to a career in tech.


A Look at ETW – Part 3
Although a strength of ETW is its strongly-typed events, after seeing several examples which use more “generic” events yet still benefit from ETW and its tooling, I’m going to try that and go with a few general-purpose events. Several of the logging frameworks use the concept of “category” (or a dictionary of categories), so I’ve decided that might be useful here too. Since I want to trace both methods and code blocks I use “Action” and “actionName” to designate either. I also want to make timing optional: ETW events have a high-resolution timestamp and some tools will pair up start/stop events, so doing my own timing isn’t always necessary.



Quote for the day:

"Doing the same thing over and over, yet expecting different results, is the definition of crazy." -- Unknown

November 04, 2014

How Smart, Connected Products Are Transforming Competition
Some have suggested that the internet of things “changes everything,” but that is a dangerous oversimplification. The rules of competition and competitive advantage still apply. ... The increasing capabilities of smart, connected products not only reshape competition within industries but expand industry boundaries. This occurs as the basis of competition shifts from discrete products, to product systems consisting of closely related products, to systems of systems that link an array of product systems together. A tractor company, for example, may find itself competing in a broader farm automation industry.


Gartner Hype Cycle: Exploring the leading-edge technologies for a digital business
"Skinput provides a new input technique based on bioacoustic sensing technology that allows the skin to be used as a finger input surface." Tapping your skin in various places creates distinct acoustic signals, which sensing devices can pick up. The software can process differences based on bone density, size, and effects produced by soft tissues and joints. "Interactive capabilities can be linked to different locations on the body." Skinput is a 21st century approach to the classic computing notion of input.


An open source ERP system built to self-implement
Another key aspect of the industry is that users would need an IT consulting company to implement and customize an ERP. We want to change that. ERPs should be simple enough to be self-implemented. This is why users are selecting ERPNext over other alternatives, because we are completely focused on the do-it-yourself user. There are a couple of good open source ERPs out there, but they are still hard to configure and need a partner to help you get started.


Information Security - Cost Analysis
In the best interests of the investors, any spending or investment should be backed up with an appropriate cost-benefit analysis. Applying this cost-benefit-justifications to Information Security function is gaining focus but remains a challenge. Quantification forms the basis for being able to perform the cost-benefit analysis. The advantages of quanti fication are its accuracy, objectivity, and comparability. In addition, quanti cation is the basis for calculations and statistical analyses. While costing is a comparatively easier aspect, quantifying the benefits is still a challenge as it depends on the occurrence of uncertain events.


Collection Pipeline
Collection pipelines are a programming pattern where you organize some computation as a sequence of operations which compose by taking a collection as output of one operation and feeding it into the next. (Common operations are filter, map, and reduce.) This pattern is common in functional programming, and also in object-oriented languages which have lambdas. This article describes the pattern with several examples of how to form pipelines, both to introduce the pattern to those unfamiliar with it, and to help people understand the core concepts so they can more easily take ideas from one language to another.


A Brain-Inspired Chip Takes to the Sky
The first time the drone was flown into each room, the unique pattern of incoming sensor data from the walls, furniture, and other objects caused a pattern of electrical activity in the neurons that the chip had never experienced before. That triggered it to report that it was in a new space, and also caused the ways its neurons connected to one another to change, in a crude mimic of learning in a real brain. Those changes meant that next time the craft entered the same room, it recognized it and signaled as such.


The next wave of IT fadeouts
IT and its hosting enterprises have passed through monumental changes over the past decade. Through it all, CIOs have maintained a strategic eye on 'next thing' technologies. However, with relatively flat IT budgets, they have also looked for IT investments that are on the decline. Some of these technology 'fadeouts' are internal approaches to IT and general business operations and management that just don't seem to work well any more. Others involve a particular technology solution that has seen its day. ... What are the likely technology fadeouts?


Why LinkedIn’s data science reorg actually makes a lot of sense
And no, the shakeup hasn’t brought product innovation to a halt. Employees still get one “InDay” per month to do things they don’t ordinarily do. Look, for instance, at a project Lutz did a few months ago, right after the reorg happened. Finger, who generally does work for internal consumption, used LinkedIn’s vast supply of information on users to predict the career trajectory of a reporter at Mashable. “It was just an idea,” Finger said. His colleagues thought it was awesome, he said, and supported it.


Forecast 2015: IT spending on an upswing
When it comes to new technology, business leaders don’t know what they don’t know, he says. Therefore, it’s part of his innovation strategy to make all parts of the organization aware of new technologies that can improve business processes and bring in new customers. And why not? With the economy slowly improving, IT leaders are more optimistic that corporate purse strings will loosen up in 2015, and they’re eager to bring new technologies into the fold in addition to just keeping the lights on.


Updated Principles of Service Orientation
A SO ecosystem is “a space in which people, processes and machines act together to deliver those capabilities as services”. In a SO ecosystem, “there may not be any single person or organization that is really ‘in control’ or ‘in charge’ of the whole”  ecosystem. Services in the SO ecosystem are the means by which “the needs of a consumer are brought together with the capabilities of a provider”. Services are the realization of business functionality accessible through defined service interfaces.



Quote for the day:

"Our expectation in ourselves must be higher than our expectation in others." -- Victor Manuel Rivera

November 03, 2014

Look at what Google and Amazon are doing with databases: That's your future
"The era of the one-size-fits-all database is over. It used to be when I grew up as a developer that for the architect in the project, when it came to choosing the bottom layer of the stack — the persistence layer — the choice was Microsoft, or IBM, or Oracle, or Sybase. It was a vendor choice," he said. "They were all the same type of database. But that era has gone forever and it will never come back because data is just so big and so irregularly shaped now that you're always going to be able to get a hundred times improvement, a thousand times improvement, a million times improvement if you get a data technology that is shaped like the shape of your data.


It’s Not HR’s Job to Be Strategic
Companies will really start feeling the consequences over the next decade. Millennial Branding and Monster.com found that one-third of Millennials rank training and development opportunities as a prospective employer’s top benefit. Cutting corners in this area may jeopardize employee engagement and retention in a demographic that will represent 75% of the U.S. labor force by 2025. A centralized HR department is ill equipped to address this. But embedding learning and development — along with talent acquisition — within each business function can solve the problem because it will shift the focus from cost reduction to value creation.


When It’s Sink or Swim
Walking away from a two-year project that’s at 200% of budget, yet seems 2% away from the finish line, is a tough call to make and is no small admission of misspent resources. But, even worse, what if the new approach were to fail at its own 95% point? What then? The company weighed the risk factors of each choice, gave us leash to further prove our new technology stack, and made the decision to switch platforms. Ultimately, time was the enemy posing the greatest threat, and they had to stand up a robust product soon. Fast-forward eight weeks and finally they had their “Netflix” platform, a stable, fully functioning health information exchange.


Where the data science jobs are, by sector and by state
The data science meme has been trending for several years now. Nearly everyone wants to be a data scientist, talk to a data scientist, hire a data scientist or invest in a data science startup. But where are all those data scientists working? And what are they working on? A good place to get a handle on the data science sector is Data Science Central, one of the industry’s leading data science community sites and blogs. It’s the online watering hole for data scientists and its edited and run by Vincent Granville.


8 Strategies to Fund Your New Business
As many first-time entrepreneurs know, or have found out, getting a traditional bank or even an SBA loan to start a new business isn't easy. So where else can you go to fund your dream? Fortunately, today entrepreneurs have many options than ever when it comes to funding their new business or business idea, many of which are less difficult to obtain and less expensive than a bank loan. Here are eight strategies for financing a new business, product or service.


Your 2015 IT Security Plan: What You Need to Know
Over 80 percent answered that IT departments actually felt secure with the technology that they had in place, but they feared what end users might do, either intentionally (example: Edward Snowden) or unintentionally (example: CryptoLocker). The response was that, although IT departments are the focus of where to combat the new threats, it’s the actions of end users that are often the root cause of the problem. Despite the great innovation in newer security products, the industry itself is still in a reactionary mode, responding to modern threats rather than being a step ahead. Therefore, while the technology is important, other areas of the business need to be addressed in order to make a company more secure.


Does the internet need rebooting?
Perrig has now developed a net­work architecture with his team that may enable all these drawbacks to be remedied. This concept, called Scion, is not only supposed to make the in­ternet safer, but also more straightfor­ward and efficient. The central idea is to divide the internet into several in­dependent units, so-called “isolation domains”. In every domain, the au­tonomous systems themselves control the paths along which they exchange data. Therefore, autonomous systems in Domain 1 no longer have an influ­ence on the data traffic in Domain 2 and vice versa. Of course, a global data exchange is also possible with this new structure – via so-called edge routers at the boundaries of the individual domains.


Data retention won't catch terrorists without big data strategy
The real crux of big data analysis is to look for patterns and for testing hypotheses. We should also remember that predictive analytics techniques are not perfect by definition, i.e. they have to be coupled with other intelligence and research.  Finally, it's a hard sell to believe a tech-savvy terrorist would use the same IP address or the same mobile phone that they used a year ago. Once people learn about the legislation, it won't be difficult for them to bypass the system. A better solution would be for the federal government to work with telcos and ISPs on real-time anomaly data detection techniques by enabling/funding them to deploy big data techniques within their firms.


The Ethics of Data, Visualized [INFOGRAPHIC]
In all, the biggest problem with data collection for most people is this: they didn't know it was happening. For better or worse, understanding around what type of data is being collected and how it is being used is relatively low. And, because of this, many companies easily sneak data collection methods into Terms of Service agreements most users never read, or wouldn't fully understand if they did. What we are lacking here in transparency and accountability in data collection and use. And this is a big deal, because much of this data is personal, non-anonymous and can be hacked, stolen or used to discriminate against particular groups or segments.


What's new with Java
Unsigned applets run in a Java sandbox, walled off from the host system. Although the sandbox is far from perfect, reasonable people might consider applets confined to a sandbox safer. Oracle considers them more dangerous. In my opinion, they are placing way too much faith in the Certificate Authority system. Nonetheless, because Oracle thinks they are a greater security risk, they make it harder to run an unsigned applet than a signed one. The other big factor in running applets is the Java security level. Java 7 has three security levels, Java 8 (as of Update 20) has only the two highest levels from Java 7. Both versions of Java default to the second highest level, which Oracle calls "high".



Quote for the day:

"Nothing is easier than saying words. Nothing is harder than living them day after day." -- Arthur Gordon

November 02, 2014

The Minimum Viable Product and Incremental Software Development
The MVP is used in the context of the “build-measure-learn” feedback loop. From the Lean Startup site: “The first step is figuring out the problem that needs to be solved and then developing a minimum viable product (MVP) to begin the process of learning as quickly as possible. Once the MVP is established, a startup can work on tuning the engine. This will involve measurement and learning and must include actionable metrics that can demonstrate cause and effect question.” Now the question is: What is the right way to build the MVP? Of course we should adopt some form of incremental development, in which the MVP should be concluded after a few initial iterations.


Introducing Pair Programming
In an environment where every line of code is reviewed as it is written, code quality goes up dramatically. The quality of the code review gets increased because the reviewer is fully in the context of the code and actively participating in its formation. Several studies such as this one by Alistair Cockburn and Laurie Williams have compared side by side code written in pairs vs code written solo, and concluded that the paired code had fewer defects, and better design than the soloed code. In the Cockburn and Williams study, the paired programs were "consistently 20 percent shorter than their individual counterparts, indicating a more elegant and maintainable solution."


Random Image Experiment Reveals The Building Blocks of Human Imagination
Here’s a curious experiment. Take some white noise and use it to produce a set of images that are essentially random arrangements of different coloured blocks. Show these images to a number of people and ask whether any of the images remind them of, say, a car. Most of the time, these random images will appear to people as, well, random. But every now and again somebody will say that an image does remind them of a car. Set this image aside. And repeat. After assessing, say, 100,000 images in this way, you’ll end up with a set of essentially random pictures that remind people of cars.


You’ve Got To Admit It’s Getting Better
Even test-driven development — the notion that a development team’s automated tests are even more important than the actual software they write, and should be written first — is being criticized. Once this belief seemed almost sacrosanct (although in my experience most of the industry paid it only lip service.) Now, though, Pieter Hintjens argues, “The more you test software, the worse it will be.” Peter Sargeant agrees: “The whole concept of Test-Driven Development is hocus, and embracing it as your philosophy, criminal.”


The 5 Most Common Data Relationships Shown Through Visualization
As the amount of data available to organizations and marketing departments grows, visualizations of that data are growing more complex. That’s not to say that data visualizations are becoming unwieldy – quite the opposite. The increasing amount of information being displayed in visual form helps viewers understand the often convoluted relationships between ranges of data. However, when presented with the choice to visually represent data relationships, it can be difficult to choose which model to apply. Different types of data work better with specific visualization models.


Eight Docker Development Patterns
A foundation for all of my Docker experiments, is keeping state that should persist in volumes, so that the Docker containers themselves can be re-created at will without data loss (unless I've been naughty and modified container state without updating the Dockerfile's - and regularly rebuilding the containers helps stop that bad habit). The examples Dockerfiles below are all focused on that: Creating containers where the containers themselves can be replaced at any time without having to think about it. The more regularly the containers are recreated; the more habitual this becomes, the more it reinforces a habit of avoiding state outside of clearly defined locations that are explicitly persisted.


Foundations of Data Science
The field of algorithms has traditionally assumed that the input data to a problem is presented in random access memory, which the algorithm can repeatedly access. This is not feasible for modern problems. The streaming model and other models have been formulated to better reflect this. In this setting, sampling plays a crucial role and, indeed, we have to sample on the fly. in Chapter we study how to draw good samples efficiently and how to estimate statistical, as well as linear algebra quantities, with such samples.


The Potential Of Beacon Technology
Beacons are a unique and sophisticated tool in the world of merchandising and advertising. However, if we take a step back and think about exactly how beacons are reaching retail locations, there is reason for concern rather than excitement. Currently, beacon networks are fragmented and closed. At quick glance, this may not be a concern, but thinking ahead, this fragmentation will likely result in long-term negative implications for consumers, retailers and developers alike. An analogy for beacon technology is GPS. Since its inception, GPS technology has always been an “open system” onto which developers could innovate and extend new product applications.


Exploring the Hexagonal Architecture
A hexagonal architecture has three layers with the key part being the Domain model containing all the logic and rules of the application. No technology concerns, e.g. HTTP contexts or database calls, are referenced in the domain, allowing changes in technology to be made without affecting the domain. Around the domain model is the Ports layer receiving all requests that corresponds to a use case that orchestrates the work in the domain model. The ports layer is a boundary with the domain on the inside and external entities on the outside.


Oxford Economics Study Reveals EMEA Companies Unprepared for Workforce 2020
All of this isn’t to say that EMEA-based companies aren’t taking steps to address the top issues of the future workforce. “Workforce development is seen by the board as a strategic priority as it’s critical to meeting corporate objectives and growing the business,” said Kevina Wepukhulu, Chief Manager, Human Resource and Administration, Kenya Power and Lighting Co. “The effort is arrayed around key areas, including strategies for systems, for the organization, and for teams and individuals. The approach is based on learning and development, which enables us to retain the workers we hire and train.”



Quote for the day:

"Great leaders use delegation as a time management tool for themselves and as a development tool for their team." -- @ManagersDiary

November 01, 2014

How Streaming Analytics Detects Fraud and Keeps Customers Happy
The most challenging aspect of fraud prevention is detecting it as it occurs across the entire account base. Because hackers can fleece individual accounts within seconds of infiltration on a large scale, if your security systems can’t detect fraudulent behavior within individual accounts in real-time, you are essentially compounding your losses with each passing second.  With streaming analytics, banks can continuously ingest, correlate, enrich, and analyze streams of data across diverse sources – including third parties – to immediately spot anomalies indicating fraud down to the second of occurrence and implement immediate automated remediation measures.


The Periodic Table of IoT
The promise of connecting devices across homes, retail stores, automobiles, and physical machinery, otherwise referred to as the Internet of Things, has emerged into what is now a substantial ecosystem of private companies, corporations, venture investors and acquirers. ... we’re excited to introduce the Periodic Table of IoT (Internet of Things) – a guide to help make sense of the key players in the growing Internet of Things universe. The 141 companies, investors and acquirers on the list were drawn from analysis using CB Insights data around financial health, company momentum, investor quality and M&A activity.


The 1s and 0s behind cyber warfare
Chris Domas is a cybersecurity researcher, operating on what's become a new front of war, "cyber." In this engaging talk, he shows how researchers use pattern recognition and reverse engineering (and pull a few all-nighters) to understand a chunk of binary code whose purpose and contents they don't know.


Why Microsoft loves Linux
Nadella admitted that 20 percent of the operating systems on Azure are Linux. The open-source operating system is already contributing a lot to Microsoft's bottom line. Today, Azure — while it doesn't support the top business Linux, Red Hat Enterprise Linux (RHEL) — already supports CoreOS Linux, CentOS, Oracle Linux, SUSE, and Ubuntu on Azure. ... It's not just Linux that Microsoft loves. After decades of resistance, Microsoft supports a variety of open-source programs such as the big data Hadoop; Docker containers; and Facebook's Open Compute datacenter project. Indeed, Microsoft is even open-sourcing more of its own technologies such as parts of .Net.


Security vendor coalition cleans 43,000 malware infections used for cyberespionage
So far the vendors’ disruptive action called Operation SMN resulted in the removal of 43,000 instances of malicious tools installed by the Axiom attackers on compromised computers, according to a full report published Monday by Novetta, the data analytics firm that led the coalition. The clean-up effort was done through Microsoft’s Malicious Software Removal Tool (MSRT), which is updated and distributed through Windows Update monthly, and through the security products of other vendors involved in the operation. One hundred eighty infections were instances of Hikit, a malware program used by Axiom for data exfiltration and persistence during the last stages of its attacks, Novetta said.


Data Science 101: Scalable Machine Learning with Apache Spark
In the presentation below, courtesy of the SF Machine Learning Meetup group in San Francisco, Xiangrui Meng introduces Spark and show how to use it to build fast, end-to-end machine learning workflows. Using Spark’s high-level API, you can process raw data with familiar libraries in Java, Scala or Python (e.g. NumPy) to extract the features for machine learning. Then, using MLlib, its built-in machine learning library, you can run scalable versions of popular algorithms. The talk also covers upcoming development work including new built-in algorithms and R bindings.


Learn to Boost Data Center Capacity With Public Cloud
Without a doubt, one of the most powerful benefits of cloud computing is the ability to extend the existing environment beyond the current datacenter walls. Administrators are able to do more with less as cloud computing components have become much more affordable. Now that both unified computing and WAN-based solutions have come down in price, IT environments are quickly seeing the direct benefits that cloud computing can bring to an organization.


Backup and restore of MySQL to OpenStack Swift
xbcloud uploads and downloads full or part of xbstream archive to/from OpenStack Swift. So what is xbstream? xbstream is a streaming format available in Percona XtraBackup that overcomes some limitations of traditional archive formats such as tar, cpio and others which did not allow streaming dynamically generated files, for example dynamically compressed files. Archive uploading will employ multipart upload for Large Objects on Swift. Along with this, the xbstream archive index file will be uploaded which contains list of files and their parts and offsets of those parts in xbstream archive. This index is needed for downloading only part of archive  on demand.


Major banks ready their own mobile payment apps
The most likely way will be through a technology called host card emulation, that was introduced in Android 4.4 “KitKat” and allows software apps to emulate the secure element chip found on some bank cards and the iPhone 6. Using software means wider compatibility with phones than if a dedicated chip was required. The mobile payments market had been relatively quiet until recently. Google Wallet and Softcard, a competitor backed by cellular carriers, were in the market but consumer awareness and interest appeared to be low.


Drupal warns unpatched users: Assume your site was hacked
"Attackers may have copied all data out of your site and could use it maliciously," the Drupal security team said. "There may be no trace of the attack." The vulnerability also allows the installation of multiple backdoors in the site's database, code, file directories and other locations and it's impossible for an administrator to say with complete confidence that all of them were found. Attackers may use such backdoors to attack and compromise other services on the underlying Web server, allowing them to expand their access beyond the website itself, the Drupal security team said.



Quote for the day:

“I suppose it is tempting, if the only tool you have is a hammer, to treat everything as if it were a nail.” -- Abraham Maslow