November 20, 2014

Data Is Not the New Oil, It's the New Soil
Not long ago companies began waking up to the fact that people everywhere were generating huge volumes of data. Data that could be collected and used to understand people in ever finer detail. The phrase “data is the new oil” started to spread like wildfire across the web. The buzz around “big-data” emerged . Oil is valuable. If you find, collect and store oil it will remain valuable. Data is a very different thing. Data is generated when people do something. It is a record of an event. That means it starts losing value almost as soon as it is generated because it ages.


DOT chief data officer prepares for forthcoming ‘wave’ of digital transportation data
“One of the things that makes it really important we get our acts together around data is the digital transportation world that is about to unfold,” McKinney said in October at ACT-IAC’s Executive Leadership Conference in Williamsburg, Virginia. Pointing to information generated from vehicles connected thanks to the Internet of Things and bridges and roads with sensors talking to cars, he said, “All of that data is sort of like standing on the beach and seeing that wave that’s building. It’s way out there, but you can see it. So you can either get ready for that, or you can get swamped.”


The Fantastic Four: Chief Analytics Officer, FICO World Panel
“Analytics as a function grew at Ford Motor Credit because we had a president who joined from American Express who had a vision,” explained Cateriano. “For me the Chief Analytics Officer appointment is about developing a skilled team for credit. Originally we had to push our services but now our key executives turn to our data analytics to solve the problem. I would say 80% of the time they are pulling us to the table”. ... Sigala explained there has been a deep shift towards analytics at Caesars. “It’s deeply integrated. When we deliver financial results it’s the Chief Analytics Officer that delivers the results and that has been a conscious decision.


Nine Steps to Unlock Big Data's Hidden Value
It is being billed as the next big thing and every business appears to be surfing the big wave. But if the hype makes you feel you’ve been left behind, fear not. Gartner poll results released in September 2014 revealed that while 73 percent of firms surveyed in 2014 are interested in adopting big data, only 13 percent have actually deployed these technologies. Without a clear place to start, many organizations are either misusing big data or not using it to its full potential. However, a focused approach can help make the transition less daunting, minimize the hurdles along the way, and enable organizations to take advantage of this valuable and growing corporate asset.


Only Engaged Innovation Teams Succeed
Managing innovation is making choices and dealing with constant trade-offs about different issues, particularly the ones related to people. The ultimate goal should be to make innovation a collective responsibility of the entire organization. However organizations cannot afford to have a single policy for keeping continuous motivation and engagement among all people. They should draft a plan to encourage that at least key people actively contribute for the innovation program and become long-term supporters. Key people are the stakeholders that have the interest and the power to influence the success of the innovation program.


Dynamic Duo of Analytic Power: Business Intelligence Analyst PLUS Data Scientist
The data science process is highly collaborative; the more subject matter experts involved in the process, the better the resulting model. And maybe even more importantly, involvement of the business users throughout the process ensures that the data scientists focuses on uncovering analytic insights that pass the S.A.M. test –Strategic (to the business), Actionable (insights that the organization can actually act on), and Material (where the value of acting on the insights is greater than the cost of acting on the insights).


Facebook’s Open Source Virtual Machine HHVM Stabilized
HHVM itself isn’t widely deployed or even widely known. It is extremely fast, but has not been considered production-ready because it sometimes causes system reboots. For the first time PHP and HHVM can run side by side on the same server, which increases speed, performance, and stability in production environments. WP Engine’s latest release, called Mercury, leverages the new capability. “HHVM is extremely fast running WordPress,” said Tomas Puig, head of labs at WP Engine. “Getting it ready and stable is truly an accomplishment.”


2015 prediction: Expect massive spikes in global information security threats
PWC rightly points out that cyber security has become a persistent business risk and that threats (both to the economy and intellectual property) are on the rise. The report goes on to identify some very troubling incidents, including ... With the idea of a security paradigm shift on the table, today's cyber-defenders should be thinking in different terms than just traditional security initiatives, shifting their focus towards an ideology of "cyber risk management", which is being fueled by an initiative founded by the NIST. The NIST has set forth a security framework (NIST Cybersecurity Framework) that stresses management over technology and highlights several best practices that should help organizations defend against the imminent threats posed by increasing cyber-attacks.


Cloud Comfort for Financial Services
"You're giving your data to some third party," Alexander Southwell, a partner at Gibson, Dunn & Crutcher and former cybercrimes prosecutor, told attendees during a panel presentation. "Do you know where in fact the data is? Do you know who is housing that data? How well [are] they funded? Are they gonna be around?" Indeed, many financial services organizations are specifically required to assess factors such as these when contracting with third parties, as a matter of due diligence. These questions and others concerning how client data is stored are especially important because most cloud providers are not yet SEC- or FINRA-compliant.


The Open Group IT4IT™ Reference Architecture, Version 1.3
The IT Value Chain and IT4IT Reference Architecture represent the IT service lifecycle in a new and powerful way, providing the missing link between industry standard best practice guides and the technology you need to select and execute those processes. The IT Value Chain and IT4IT Reference Architecture are a new foundation on which to base your IT4IT operating model and provide a welcome blueprint for the CIO to accelerate IT’s transition to becoming a service broker to the business. This Snapshot is intended to make public the direction and thinking about the path we are taking in the development of the IT4IT Reference Architecture.



Quote for the day:

"Leadership is the wise use of power. Power is the capacity to translate intention into reality and sustain it." -- Warren G. Bennis

November 19, 2014

The Resurrection of Product Risk Analysis
The risk management described here aims at identifying risks connected with the development and implementation of an information system. The risk is the probability that development and implementation will cause measurable economic damage to the company, and perhaps also will cause other, less measurable damage. Damage could be that the results of a project are less favourable than expected or that the organisation will suffer direct or indirect loss. Risks extend beyond IT and concern the business, too.


The Web Isn't Dying, But Control Is
Apple's control of content in iOS apps is too much. If Apple wishes to continue to censor apps based on content, it should license third-party iOS stores or at least adopt Google Play's less fussy content policy. There's no reason native apps should be treated any differently from books or films when it comes to lawful content. There's no reason Apple should be able to reject an app with lawful content. With web apps, this isn't an issue; no permission is required to publish a web app. The issue isn't so much that the web is dying; it's that too many people prefer autocratic convenience over the web's messy democracy.


When will this madness stop?
Designing, building and launching digital products and services usually involves multiple areas of the organisation working together to create something new and innovative. Being a digital business means being a joined-up business. Digital does not stop at functional boundaries; it flows through the organisation to create integrated offerings and a seamless customer experience. A business with silos, whether organisational, data, systems or any other type, will struggle to survive in the digital age. Just because marketing is spending an increasing amount on technology does not mean there is a need for a marketing technology strategy.


IT needs to stop pretending it's not responsible for cloud security
So whole IT departments will use public cloud for their own work, but refuse to update perimeter security or network monitoring enough to let them see web apps, let alone encrypt that traffic and possible secure them? Who is supposed to do that, if not IT? Seventy-nine percent of IT people polled by Forrester in May of 2014 said end users should be primarily responsible for securing data in the cloud. That doesn't mean IT thinks users are responsible; no one in IT thinks users are responsible.


Cybercrime and spam are far bigger security threats than you think
"There are very few types of cybercrime that exist in a vacuum. Most forms of cybercrime are in some way connected to others. For example, nobody runs a botnet or robs bank accounts without taking steps to hide their true internet address. Usually to do that they are using hacked computers to route their traffic through, they are probably using hacked servers to store the stolen data, and then they are using money laundering networks to cash out transactions."


Keys To Collaborating Over A Business Network
The real potential for transformation comes from the ability of a business network to enable trading partner collaboration not just for invoice processing, but also for management of related documents such as catalogs, contracts, purchase orders, order confirmations, change orders, service entry sheets, freight line items, advance ship notices, payment status, and payment remittance. This means that, from one platform, in the cloud, you can streamline essential collaborative business processes from procurement through payment. At the same time, you can improve compliance by driving more orders off catalogs and simplifying the matching of invoices to purchase orders, contracts, and service entry sheets.


7 Important Tech Regulatory Issues In 2015
The Internet is now a central engine of society and must allow for continued innovation and development, Robert Atkinson, president of the Information Technology and Innovation Foundation (ITIF), told InformationWeek. "To this end, net neutrality rules should be tailored to allow for a case-by-case approach to prioritization, and network management that allows for some subtlety and nuance in regulation. This is to be preferred to an over-broad, proscriptive rule grounded in Title II regulation for the telephone era that would likely limit the Internet's potential to become the multi-purpose platform it promises to be," he said.


Overcoming Hurdles to Integrating Analytics with Operational Processes
Acceptable speed-of-response rates differ between operational and analytical use cases. Often operational processes require some real-time processing. Think of going to the grocery store or ordering a product or service, you expect this particular process to take place in real time. When you use an online or mobile application, your tolerance for slow response actually goes down. With the ability to change providers/applications quickly, it is important to match the expected speed of response with the performance of the application. This means that if you integrate analytics directly into operational processes, the speed of analytical response needs to match the real-time nature of most operational processes.


A Preview of C# 6
Mads Torgersen, C# program manager at Microsoft, published a short video presentationdescribing what is coming in the next major C# version, C# 6. Among C# 6 new features, Mads highlighted getter-only properties, the lambda-arrow operator, string interpolation, and more. First off, says Mads, C# 6 will not change C# design philosophy and will mostly provide many small features that will help clean up code.


Time for Data-Driven Intuition
The book The House Advantage: Playing the Odds to Win Big In Business (Jeffrey Ma) should be required reading for anyone working in the data management and business intelligence fields where we often oversimplify the business decision-making process by saying it’s either data-driven or intuition-driven—and strongly emphasizing that using data is always better than using intuition. Although Ma is definitely an advocate for data-driven decision making, toward the end of his book he also acknowledges that there are times when somewhat of a middle ground between data and intuition is called for.



Quote for the day:

"Consider spending more time setting the conditions for things to go right than dealing with things that go wrong." -- @ShawnUpChurch

November 18, 2014

CIO interview: Anna Barsby, CIO, Halfords
“There’s complexity running a programme and upgrading SAP, which is pretty much at the heart of our system estate,” she says. “And it was our first move into the cloud at the same time,” she adds. “Going into the cloud with anything has its unknowns, but with SAP as our first foray it just felt risky.” “Culture was a really big one for us,” she says. “Once agreed on HP, we decided we also wanted to move from a physical server to the cloud.” Barsby says while the move to the cloud increased risk, the retailer only needed one period of downtime to complete the upgrade.


Testing Strategies in a Microservice Architecture
There has been a shift in service based architectures over the last few years towards smaller, more focussed "micro" services. There are many benefits with this approach such as the ability to independently deploy, scale and maintain each component and parallelize development across multiple teams. However, once these additional network partitions have been introduced, the testing strategies that applied for monolithic in process applications need to be reconsidered. Here, we plan to discuss a number of approaches for managing the additional testing complexity of multiple independently deployable components as well as how to have tests and the application remain correct despite having multiple teams each acting as guardians for different services.


Mega Data Breaches: Are They Here to Stay?
Current security solutions either do not have the capabilities to aggregate, analyze and correlate information from multiple sources, or cannot scale and handle the volume of data generated by the activities over a period of time. The greatest area of unmet need with conventional security solutions is effective, targeted attack prevention and breach detection. Organizations are failing at early breach detection, with more than 92% of breaches detected and notified by a third party—this is what ultimately impacts the size and cost of the data breach.


Cloud computing's not-so-secret mission
As the cloud matures, we are seeing another layer of cloud computing that promises to shake the foundation of our IT infrastructure to its core – the advent of IT-as-a-Service, which will be perhaps the cloud’s highest calling. Initially, many thought of the cloud as the successor to the web host. The next-gen data center. As someone who first became involved in web hosting in 1995 or so, I will admit that I thought that as well. The cloud is a great place to keep your web infrastructure, and it is even great to keep your apps and app infrastructure. However, the cloud is also a great place to which you can move your entire IT infrastructure as well. It took a little longer than moving websites or even apps to the cloud, but IT in the cloud has arrived.


9 Healthcare Innovations Driven By Open Data
Vinod Khosla, a leading tech venture capitalist and the former CEO of Sun Microsystems, sees the change as inevitable. He described his vision in a keynote at this past June's Health Datapalooza, an annual celebration of new developments in data-driven healthcare. Khosla predicted that "data science will do more for medicine than all the biological sciences combined" over the next two decades. One driver, he believes, will be the need to reduce medical errors by using computers for more accurate case monitoring than humans can accomplish. These new advances are made possible by two related categories of data: big data and open data.


Five winning strategies of successful CIOs
Whether CIOs are being asked to deliver or transform, Marks says they will always have to consider a digital element. Data centres, he says, are being transformed, while mobility has become crucial and software is being delivered as a service by default. "The new digital value lies in the CIO's ability to match the best combination of technologies and to negotiate the right deal for all parties,” says Marks. “Whether the CIOs of today have the experience, skills, and motivation to achieve this combination is a different matter. This is perhaps the more daunting challenge for the CIO than the march, and possibly passing trend, of the chief digital officer.”


Determining data value to reduce cloud storage risks
The value of data deals with the utility of data. Data utility requires evaluation for the value of the content in the present, along with the potential value of that same data content in the future. A useful analogy might be to consider an old photograph taken of a subject in his younger days and showing him wearing the styles of that era. At the time the picture was taken, the image provided no offense to the subject. However, the same picture many years later might cause the subject to cringe at the fashion it displays. Now consider that instead of an old, funny picture, business or personal data is on display.


CIO success is all about winning friends and influencing people
The general consensus is that these pillars of technology are last year’s news, because CIOs today should be thinking about the concepts and technologies that sound a bit left field – such as how 3D printing and the internet of things (IoT) could influence the organisations they work in. One of the keynote sessions at this year's Gartner Symposium in Barcelona was a "fire-side" chat with Oliver Bussman, CIO of UBS. During the interview, Bussman was asked about the challenges facing the banking sector. "Digital disruption has arrived in banking," he said.


More users will hire criminals to fight cyber crime
The idea of using the skills of people that were once on the wrong side of the law is one that is taking hold in a rising number of companies, according to findings from KPMG. The firm found that over half of UK firms would consider hiring a hacker or someone with a criminal record in order to improve their own defences and stay ahead of the criminals. The reason why many would recruit former criminals is because the overwhelming number (74%) recognise there is a growing cyber threat and they are struggling, in the cases of 57%, to get hold of specialised staff and then keep them.


Cisco hands over security analytics framework to open source development
Announced in a blog post on Monday, the San Jose, CA-based company said Opensoc, a framework that uses big data analytics to detect threats, is now available for businesses to integrate within their own systems. ... The OpenSOC framework integrates elements of the Hadoop ecosystem, including Storm, Kafka, and Elasticsearch. According to the firm, this means OpenSOC is capable of full-packet capture indexing, storage, data enrichment, stream processing, batch processing, real-time search, and telemetry aggregation, and also provides a platform that can "effectively enable security analysts to rapidly detect and respond to advanced security threats."



Quote for the day:

"Too many people overvalue what they are not and undervalue what they are." -- Malcolm Forbes

November 17, 2014

13 Things to Do When a Hacker Steals Company Data
If the worst happens--e.g., a hacker steals your customer records or breaks into a server--it's easy to go into a tailspin and try solve every problem all at once. Apart from the headaches this can cause, it's also not the best approach to a data breach. Orlando Scott-Cowley, the director of technology marketing at Mimecast, a company that makes a secure cloud-based e-mail service, told me about an action plan he advises.


HP Analytics blazes new trails in examining business trends from myriad data
There are 20 million SMBs in US, and we are able to build a model to predict which of these prospects are similar to the clusters we had. That’s where we were able to find customers that looked like our most profitable customers, which we ended up callingVanguards. That resulted into a tremendous amount of a dollar increment for HP. It's a good example of what you talked when you find unexpected things. We just wanted to analyze data. It led us to a journey and ended up finding a customer group we weren't even aware of. Then, we could build marketing strategy to actually go target those and get some value out of it.


James Lewis on Microservices
Johannes Thönes talks to James Lewis, principal consultant at ThoughtWorks, about microservices. They discuss microservices’ recent popularity, architectural styles, deployment, size, technical decisions, and consumer-driven contracts. They also compare microservices to service-oriented architecture and wrap up the episode by talking about key figures in the microservice community and standing on the shoulders of giants.


ArchiMate 2.1® Poster Pack - Print Version
The ArchiMate meta-model and notation is fast becoming the de facto standard for depicting Enterprise Architecture. The ArchiMate® 2.1 Poster pack provides a quick-glance reference to both ArchiMate Concepts and ArchiMate Viewpoints.


A Primer on Measuring Employee Engagement
There are many factors that contribute to employee engagement — ranging from corporate culture to management style to competing priorities outside of work — and the pertinent factors are different for each employee. This complexity is what makes it so challenging to measure and understand engagement in an actionable way. While still in its infancy, people analytics is beginning to give organizations the data and tools to understand what drives engagement, perhaps even better than employees understand themselves.


Fitbit Data Now Being Used In The Courtroom
The lawyers aren’t using Fitbit’s data directly, but pumping it through analytics platform Vivametrica, which uses public research to compare a person’s activity data with that of the general population. Muller says the case is “unique,” and does appear to be the first known case where data from a wearable is used in court. (If other earlier cases come to light I will update this post.) “Till now we’ve always had to rely on clinical interpretation,” Muller says from his office in Calgary. “Now we’re looking at longer periods of time though the course of a day, and we have hard data.” His plaintiff will share her Fitbit data with Vivametrica for several months as part of an assessment period.


Are Asean CFOs starting to embrace the Cloud? Oracle asks
Despite the apparent advantages of Cloud computing, not all organisations are convinced that this is the best way forward as many CFOs still have their reservations about the quality of software vendors, and the possible creation of processing silos. Especially, the migration of ERP applications onto the Cloud is facilitating one of the biggest shifts in financial systems. The challenge of integrating systems and technologies remains a key barrier to adoption at many organisations; as well as the question of whether there are sufficient internal skills to make the shift.


Laser-Radio Links Upgrade the Internet
Technology that uses parallel radio and laser links to move data through the air at high speeds, in wireless hops of up to 10 kilometers at a time, is in trials with three of the largest U.S. Internet carriers. It is also being rolled out by one telecommunications provider in Mexico, and is helping build out the Internet infrastructure of Nigeria, a country that was connected to a new high-capacity submarine cable from Europe last year. AOptix, the company behind the technology, pitches it as a cheaper and more practical alternative to laying new fiber optic cables. Efforts to dig trenches to install fiber in urban areas face significant bureaucratic and physical challenges.


Data science: 'Machines do analytics. Humans do analysis'
Humans have to find the patterns, ask the right questions and make the connections in the data. "Machines do analytics," explained Sullivan. "Humans do analysis." Computers are good at detail and examining the past, but real data science requires imagination and cognitive ability. "I can take 10 tools, U.S. Census data and agriculture data and determine that people who were strangled by their bed sheets tracks cheese consumption," Sullivan said. "A human knows that makes no sense. You can't commoditize reasoning by a human." Another way to put it is that machines are used as "data janitors" to clean data and crunch numbers, but it's a small part of the overall process.


As open source goes mainstream, institutions collaborate differently
"There's a clear progression that nearly every government agency goes through, fromconsuming open source, to publishing open source (as a one-way broadcast), to collaboratingon open source," said Balter. "A similar progression is also seen from open source, to open data, and open government policy. Policymakers see the geek's tooling, realize the value of collaboration, and want to bring it into their own workflow. If your doctor takes a multivitamin every day, wouldn't you? To me, the idea of working more openly, regardless of format or form, within an organization, or with the public is the idea that we're seeing catch on. It's starting with open source, but that's just the start."



Quote for the day:

"Sometimes when you innovate,you make mistakes. It is best to admit them quickly,and get on with improving your other innovations." -- Steve Jobs

November 16, 2014

How to Become a Data Scientist in 8 Easy Steps
Our friends over at DataCamp just came out with a cool new infographic entitled “Become a Data Scientist in 8 easy steps.” This hits home to a lot of people who are trying to enter this new industry hoping to satisfy a lot of unfilled job openings. The question is how best to make this transition. The useful infographic below will help answer this question by outlining the process of becoming a data scientist ... These are all excellent tips, so examine the infographic carefully for more detail. You too can become part of the “sexiest job of the 21st Century!”


Search for Growth in Social, Mobile Fuels Tech M&A Boom
“Now it’s disruptive technology that’s in the crosshairs,” Liu said. “Consolidation involves coporations needing to catch up in a way that they are not able to do fast enough orignaically.” The aggregate global value of all publicly disclosed-value deals set a new post-dotcom era quarterly high of US$73.7 billion [b], up 41 percent sequentially and 4 percent year over year. At 923 deals in total, overall volume also set a record for any quarter since 2000, rising 6 percent sequentially and 31 percent year over year. Corporations, as opposed to private equity deals, continue to drive the growth, increasing aggregate value 40 percent sequentially and 9 percent year over year to $65.3 billion.


IoT Won’t Work Without Artificial Intelligence
The big problem will be finding ways to analyze the deluge of performance data and information that all these devices create. If you’ve ever tried to find insight in terabytes of machine data, you know how hard this can be. It’s simply impossible for humans to review and understand all of this data – and doing so with traditional methods, even if you cut down the sample size, simply takes too much time. We need to improve the speed and accuracy of big data analysis in order for IoT to live up to its promise.


What Every Business Owner Needs to Know About Data Sovereignty
Unfortunately, the laws and regulations protecting digital information can be extremely complex. They are dependent on different governments and jurisdictions, and data stored in certain countries may or may not be subject to subpoena by another country’s government. As an IT professional, you’re likely responsible for ensuring that your company’s data is fully protected. However, you need to provide your business’s owner with the basics to enable him or her to make the best decisions for the company — and the valuable data it possesses. For those who don’t work with technology all day, however, the variables can be overwhelming.


Collective intelligence, big data and IEML
There are two big problems with this landscape: The first is related to the methodology; today we use mainly statistical methods and logical methods. It is very difficult to have a semantic analysis of the data, because we do not have a semantic code, and let’s remember that every thing we analyze is coded before we analyze it. ... So you need a semantic code to have a semantic analysis. We do not have it yet, but I think that IEML will be that code. The second problem is the fact that this analysis of data is currently in the hands of very powerful or rich players –big governments, big companies. It is expensive and it is not easy to do –you need to learn how to code, you need to learn how to read statistics, is not easy.


MSSP: Integrate, NOT Outsource!
This means that for the MSSP to work well for you, process integration must be carefully planned. Here we talked about the alert response integration (and here about the SLAs), but the same applies to device management (integrate with your change management and reporting),incident response (integrate with your IR) and many other processes. This also means that this focus on integration allows you to vary the degree of security ‘outsourcing’ or externalization. If your plan – monitor – triage – respond – refine chain is well planned, you can almost painlessly engage external resources (MSSP, consultants, etc) at whatever stage: need more help with cleaning the mess? Call that IR consultant. Want to shift some perimeter monitoring duties outside? Go get that MSSP.


Requirements Discovery and Constraints Analysis
The process of requirements discovery broadly involves elicitation of functional and non-functional requirements from business needs. A business or enterprise architect’s role in requirements discovery is wider and broader in terms of scope, responsibility and, nature and stage of engagement. ... The nature of business concerns will not be limited to problems addressable by technology solution but also include considerations such as investments, ROI (Return on Investments), business case, timelines, priorities, risks and solution strategies potentially involving an eco-system of internal and external stakeholders (e.g. technology providers).


Simulation-Based Embedded Agile Development
While simulations containing embedded software need not be developed in an agile manner, Scrum’s agile framework helps realize greater benefits from a SiS approach. One Scrum event is the sprint review, in which the development team demonstrates what was accomplished during the sprint. It can be challenging to have something visual to demonstrate with embedded software development as there is often little to “see.” We might get only a blinking light or a wiggling fin. ... When such feedback is used in the sprint review as well as daily collaboration, these collective learning opportunities allow more nimble responses to necessary changes in requirements and design.


BlazeMeter, New Relic Team Up To Deliver Richer App Performance Testing Analytics
“Data analysis is most valuable when you can understand and act upon it instantly. Testing makes it easy to trigger a symptom, but you need monitoring to identify the root problem in the first place,” Girmonsky told IDN. “Together, BlazeMeter and New Relic provide their customers a full 360-degree view of their systems. Customers can dynamically define the KPIs they want to analyze, query the application and instantly understand the specific quirks of their system,” he added. The growing BlazeMeter/New Relic partnership is also a sign of how IT is increasing its use of machine data and big data to improve their software lifecycle -- design, development, testing and operations.


Optimizing Enterprise Risk for Value Creation
With IT risk being a subset of Enterprise risk, and given the pervasiveness of technology within the business, optimizing IT risk has a direct and positive effect on the overall risk of the organization. So important is risk optimization of the Enterprise’s IT to the organization that within COBIT 5 there is not one, but two, dedicated processes - ‘Ensure Risk Optimization’and ‘Manage Risk’.  The Ensure Risk Optimization process is within the Governance area of the COBIT 5 framework and is supported by 3 governance practices and 16 activities. The process ensures that the enterprise’s risk appetite and tolerance are understood and not exceeded by Enterprise IT, the impact of IT risk to enterprise value is identified and managed, and the potential for compliance failures is minimized.



Quote for the day:

"Take the first step in faith. You don't have to see the whole staircase, just take the first step." -- Martin Luther King Jr.

November 15, 2014

5 Hadoop Security Projects
While other projects attempt to improve Hadoop’s security from the inside, Apache Knox Gateway tries to do it from the outside. Apache Knox Gateway creates a security perimeter between Hadoop and the rest of the world by providing a REST API gateway for interacting with Hadoop clusters. All communication with Hadoop is done via Knox Gateway, which controls and moderates it. Knox includes the following features: LDAP and Active Directory integration, support for identity federation based on HTTP headers, and service-level authorization and auditing.


Amazon Phishing Attacks Pick Up for Holiday Shopping Season
"If you get an email with a Word attachment, don't open it, just go to the site, log into your account, and all the transaction history is right there readily available." he said. "It's always a good idea to go right to the horse's mouth." So far this month, AppRiver has quarantined more than 600,000 email messages with the subject line "Your Amazon Order Has Dispatched (#3digits-7digits-7digits)" and a return address of "amazon.co.uk." The attached Word document has a macro that installs a Trojan dropper that creates a process named "SUVCKSGZTGK.exe" and the dropper then installs a keylogger that harvests banking information, email logins, and social media accounts.


ETH Researchers Develop a Thought-Controlled Genetic Interface
Using the interface they designed, the ETH team showed a human volunteer wearing an EEG cap could use his thoughts to trigger production of a particular protein, called SEAP, in human kidney cells growing in a petri dish. He could also turn on supplies of the cells that had been implanted under the skin of lab mice. The research is interesting because it shows how futuristic brain implants might function, Folcher and company write in this week’s Nature Communications. Such devices, the ETH authors speculate, might sense a person’s feelings of pain (or perhaps oncoming epileptic seizure) and then automatically trigger brain cells to pump out a helpful biotech drug.


Facebook nudges users to take control with privacy makeover
"Over the past year, we've introduced new features and controls to help you get more out of Facebook, and listened to people who have asked us to better explain how we get and use information," wrote Erin Egan, Facebook's chief privacy officer. "Protecting people's information and providing meaningful privacy controls are at the core of everything we do, and we believe today's announcement is an important step." Facebook has had its share of privacy controversies. It has repeatedly been criticized for its privacy policies and even for the difficulty in using privacy controls.


Why bug bounty hunters love the thrill of the chase
“Having a look at the security community, we can tell that there are a lot of top-notch bug hunters who fulfill nearly all of the above points. On the other hand, there are ‘unskilled’ or new bug hunters who try to make some quick bucks by using one-click-tools and sometimes go as far as threatening the business owners. We refuse to call these people ‘bug hunters’,” they said. They enjoy bug bounty hunting because it gives them the freedom to break things whenever they want. “By submitting useful reports the chances are good that more and more companies will get the idea about responsible disclosure,” they said in calling bug bounty hunting the ultimate in crowdsourcing.


Security Skills Gap Continues to Stymie Enterprise Cyber-Defenses
"Good resources are scarce and you have to find new ways to provide needed security services," Chip Tsantes, chief technology officer of the cyber-security practice at Ernst & Young, told eWEEK. “You have to be more creative to find the skills that you need.” The lack of information-security professionals has been a common theme over the past five years. More recently, government hiring and the increase in the number of devices added to networks requiring security support has led to a continue shortfall in skilled security people, which Cisco estimates at 1 million workers worldwide.


10 Big Data Career Killers
Data scientists are in high demand. The Big Data market will grow anywhere from 20 percent to 40 percent annually through 2017, depending on the market forecast you trust most. But even an industry boom doesn't guarantee job security. Here are 10 missteps that can stop your Big Data career in its tracks. Note: Special thanks to Jack Welch, executive chairman of Jack Welch Management Institute at Strayer University. Taking poetic and editorial license, we adjusted his "10 Career-Killing Pitfalls" list to focus on the Big Data market.


Next-Generation Robot Needs Your Help
“It is very good idea,” says Bilge Mutlu, an assistant professor at the University of Wisconsin, Madison, who researches the interaction between humans and robots. “It’s a lot more flexible and adaptable to day-to-day environments.” Human-robot collaboration is already increasing in industrial settings (see “Increasingly, Robots of All Sizes are Human Workmates”). Finding ways for machines to collaborate in other settings could hasten the development of a new generation of service robot. “I am 100 percent sure that if people embraced robots with limitations we would have them in our homes as we speak,” Veloso says.


Chief data officer: My mixed and nuanced musings on the need for one
When people say that "data is the new oil," they're usually making a general statement on how deeply modern organizations depend on data to drive transactions, analytics and processes in general. It's not a statement about public sector institutions but about organizations of any sort. It's in that context that many organizations decide to appoint something called a chief data officer (CDO) to oversee this precious resource. If you want a deep dive into what the CDO role entails, I strongly urge you to download this excellent whitepaper from the IBM Center for Applied Insights.


Fifty Quick Ideas to Improve Your User Stories
Teams often struggle selling stories as small chunks of work that need to fit into a sprint. Business stakeholders simply don't care about that (fully justified), because this is purely technical. We end up coming back to organising things that are easy to develop, not that are valuable to a stakeholder. Small stories are good not because they fit into a sprint, but because an organisation can quickly get feedback from them. A story is supposed to deliver something valuable to a stakeholder, and if so, we should be able to decide if the work is really done or not from a business perspective, learn from that delivery and get ideas for future work.



Quote for the day:

"Ninety-nine percent of all failures come from people who have a habit of making excuses." -- George Washington Carver

November 14, 2014

With $100 Million, Entrepreneur Sees Path to Disrupt Medical Imaging
The imaging system is being developed by Butterfly Network, a three-year old company that is the furthest advanced of several ventures that Rothberg says will be coming out of 4Combinator, an incubator he has created to start and finance companies that combine medical sensors with a branch of artificial-intelligence science called deep learning. Rothberg won’t say exactly how Butterfly’s device will work, or what it will look like. “The details will come out when we are on stage selling it. That’s in the next 18 months,” he says. But Rothberg guarantees it will be small, cost a few hundred dollars, connect to a phone, and be able to do things like diagnose breast cancer or visualize a fetus.


Solving the information and big data challenge with Artificial Intelligence
Semantic Understanding uses a linguistic approach to make sense of the text and locate key content in the email text body. For example, if it finds the phrase “I don’t want to cancel the contract”, it applies linguistic intelligence and recognises the whole sense of the communication and understands it is about a contract non-cancellation. In contrast, a rule based system would only pick up the word ‘cancel’ and understand Cancel Contract and then act on it contrary to the customer’s wishes. This is great stuff, also used by SIRI, Google NOW and the likes.


New iOS social engineering exploit reminds us to keep alert
The vulnerability has been confirmed to exist in iOS 7.1.1, 7.1.2, 8.0, the current iOS 8.1, and the 8.1.1 beta -- both on jailbroken and non-jailbroken devices. Each app on the App Store has a so-called bundle identifier, a numeric name that makes the normal-language name of the app superfluous. If a malware app is given the same bundle identifier as a standard App Store app, it can be installed over it if the user can be enticed to click on a link on a website or email message. This means that a carefully designed and targeted link to an app download could be sent to an executive or politician, with a socially engineered message "from" an associate meant to entice a user download of a "new game" or some other innocuous app.


Three information infrastructure myths debunked
The Information Management keynote session at IBM Insight 2014 brought new product offerings, memorable stories and answers to some common information infrastructure myths. Beth Smith, general manager of IBM Information Management, accompanied by special guest Grant Imahara of former Mythbusters fame, and a slew of IBMers led the audience on a systematic journey to debunk three specific misconceptions about information infrastructure one by one.


How to create a realistic enterprise strategy for cloud computing
"If you understand that this is just a platform change, it's not so scary," he said. "We have all moved to new technology … with cloud; we are just using things we don't own that sit on the open Internet." In some cases, that is certainly a nerve-wracking proposition. But it makes sense in others. For example, retailers that need to scale up or down quickly or expand storage at low cost find the cloud to be a good option and should develop a strategy for cloud computing.


Android 5.0 deep-dive review: Exploring Lollipop's many layers
Everything has been recreated to match the Lollipop look, right down to the Contacts (formerly known as "People") and Downloads apps -- although curiously, in the case of the latter, I'm seeing a version of the app on my Nexus 6 review unit that doesn't quite match the one on my Nexus 9. Given that the Nexus 9 received a software update prior to its consumer launch, I'm guessing that the Nexus 6 will soon be brought up to parity. The visual overhaul isn't just within Android itself, either; it's across Google as a whole. Though the desktop evolution is still underway, Material Design has slowly but surely been creeping into Google's various apps and services for a while.


Virtual Reality Aims for the Mobile Phone
Mobile seems a logical platform for the technology. When you find yourself fully immersed in a virtual realm, the illusion is compromised by the dim awareness that you remain attached to a PC via a cat’s cradle of wires. Mobile devices, theoretically, offer a more liberating experience. They’re not only self-contained but also cheaper to buy and run. And yet there are significant technological hurdles to overcome before the Gear VR, or its successors, can become mass-market products. “Heat is our primary issue,” says Cohen. “When you run a mobile phone’s CPUs and GPUs at maximum, the device heats up really quickly, and it needs to either cut the speed by throttling or shut down entirely.”



Automakers Agree on Guarding Car Computers From Hacking
The accord, to be announced today, calls for heightened security for information such as driver location and behavior, according to the Alliance of Automobile Manufacturers and the Association of Global Automakers, Washington-based groups whose members include General Motors Co. (GM:US) and Toyota Motor Corp. (7203) “As modern cars not only share the road but will in the not-too-distant future communicate with one another, vigilance over the privacy of our customers and the security of vehicle systems is an imperative,” John Bozella, president and chief executive officer of Global Automakers, said in a statement.


Chip Industry's IoT Facelift Comes With Security Wrinkle
Europe is already ahead of the US and most of the world in building out the infrastructure for the cloud and connectivity, according to Ploss, thanks to the infrastructure it has in place from its leadership in smartphones. Rick Clemmer, executive director, president, and CEO of NXP, was more emphatic regarding Europe's advantage, particularly with respect to security for IoT. "US is a leader in the Internet, but is a third-world country in security," he said. Still, said Clemmer, usability is a key issue for IoT devices, especially, as Bozotti pointed out, when the users themselves are becoming older as part of a general aging of the population, which creates even more pull for smarter cities -- based on easy-to-use devices.


What CIOs Can Learn From the Biggest Data Breaches
The worst data breaches are sometimes left unsolved, but security professionals can sometimes piece together the root cause. Idan Tendler, the CEO of security analytics company Fortscale, says it's possible, based on unconfirmed reports, that the JP Morgan Chase breach of 83 million customers' persona data happened after hackers obtained a list of the applications that run on the bank's internal servers. Once hackers had the list, they searched for known vulnerabilities for each application until they found a way to break in. They then obtained administrative privileges to gain access to the servers.



Quote for the day:

"The key element in good business management is emotional attitude. The rest is mechanics." -- Harvey Geenan

November 13, 2014

Are You Sweeping Big Data Privacy Under the Carpet? 5 Things to Do Instead
Admit it: When you read or hear about big data privacy, you’re ready to move onto the next topic or swipe to the next screen. Or sweep it under the carpet. You know the discussion is important, but let’s be honest: it’s not exciting, it’s sometimes creepy, and it’s not easy to navigate its complexities. ... There’s no question that we all play multiple roles—i.e., that of a consumer, citizen, private sector employee and/or government worker—and that our time is limited, so what can we do? For starters, I suggested five options during my presentation. Here’s the Cliff Notes version:


Software Defined Networking - What's New?
This presentation will give a look at the Open Data Center Alliance rev 2.0 software defined networking (SDN) usage model that incorporates network function virtualization, and five new usage scenarios.  SDN is no longer considered an emerging technology; the technology is proven, although it is still at an early stage in its life cycle. In comparison, NFV is at an earlier stage of development, but because the technology effectively complements SDN and is important to service providers, NFV is likely to be widely adopted across the industry. To improve evaluations and decision making, IT departments and cloud subscribers will require standard features and defined metrics.


Expired Antivirus Software No. 1 Cause Of Unprotected Windows 8 PCs
“Running expired antivirus software can give people the impression that it is still protecting them even if it hasn't downloaded updates in a while,” says Tim Wilson, director of cybersecurity and cloud strategy at Microsoft. “However, data from our latest report indicates that running expired antivirus software is nearly as unsafe as having no protection at all,” Wilson said in comments emailed to Dark Reading. The malware infection rates on Windows 8 clients with expired antivirus tools were almost as high as the infection rate in PCs with no protection at all, the Microsoft researchers discovered.


Global Banking and Big Data: The Challenge of Anti-Money-Laundering Compliance
A series of high-profile decisions by the U.S. Department of Justice against BNP Paribas, JP Morgan Chase, Barclays, and other large, global banks resulting in multi-billion-dollar fines has brought anti-money-laundering (AML) to the top of the financial services industry’s priority list. While the first wave of investment in big data tools and technology has heretofore been targeted at the identification and prevention of nefarious activities that lead to direct costs for banks, payment processors, and their customers, spending in the near term may likely be related to compliance with three key pieces of AML regulation


Top 10 tech conspiracy theories of all time
The appeal of the conspiracy theory is rooted in its own essential slipperiness. In terms of technical definition, a conspiracy refers to multiple persons or groups working together toward some kind of shady result. But in popular culture, conspiracy theories can be plausible or impossible, true or discredited -- and everything in between. Here we take a look at the 10 most infamous conspiracies and conspiracy theories that have made the rounds in the world of high tech.


7 Trends That Can Define the Future of Cloud Computing
There are two big reasons that leaders across every industry are gung-ho about the Cloud. One reason for this huge confidence in Cloud computing is that it is one of the most disruptive technologies to have emerged on the scene in the last decade. The second and what I think is a far more critical reason is what the Cloud, its adoption and application promises for the future. It is when business owners “foresee the future” of the Cloud that they say to themselves, “Yes, this is the technology that I want to tie my business fortunes to”.


Microsoft's Answer To Death By Email: Meet Clutter
Clutter relies on Office Graph, a machine learning technology that maps the user's relationship with people, events, documents, projects, and other types of information. Office Graph allows Clutter to recognize that a user has ignored a co-worker's email about his new cat but read and responded to another colleague's message about an upcoming campaign, for example. Observations such as this help Clutter determine which messages to prioritize. From the user's perspective, Clutter operates something like Gmail's importance ranking, but in reverse; whereas Gmail partitions emails it deems "important" into a secondary folder instead of in the main feed, Clutter puts the important messages front and center, with less important content relegated to a "Clutter" folder.


Unlock Your Computer and Websites with a Glance
The Myris is a squat, palm-sized cylinder that connects to your PC with a USB cable. Its underside has a small mirror in the center with a small camera lens next to it. Any time you meet a login screen after the device has been set up, you hold up the Myris in front of your face so that both eyes are visible in its mirror. A few seconds later, a green ring lights up to signal that you’ve been recognized, and the device’s companion software will log you in without your having to touch a key. You can do that for websites, for desktop applications, or to log in to your user account on a computer.


Are Legacy Vendors Pulling OpenStack in the Wrong Direction?
Over the past couple of years, OpenStack has turned from a small skunkworks effort to build Amazon Web Services-like clouds but open source into a movement backed by some of the IT industry’s biggest legacy vendors. It’s not uncommon nowadays to hear that OpenStack has become the de facto standard for building cloud infrastructure. Such mainstream support, however, comes at a cost, threatening to detract from the project’s original goal. That’s according to Jim Morrisroe, CEO of Piston Cloud Computing, a San Francisco-based startup co-founded by Joshua McKenty (one of OpenStack’s founding fathers) that helps customers stand up OpenStack clouds of their own.


Introducing Essence#: A Smalltalk-based Language for .NET
The Essence# compiler generates DLR dynamic call site for each and every message send, regardless of the receiver. The compiler does not and cannot know the type of the object that is receiving a message, so it just emits a DLR CallSite for all message sends, and the CallSite for a message send is always an instance of the ESMessageSendBinder class. An ESMessageSendBinder figures out, at run time, how to implement the message send. That’s done one way in the case of native Essence# objects, done another way in the case of the CLR primitive types, done yet another way for any non-essence# objects that implement the IDynamicMetaObjectProvider interface



Quote for the day:

"You can, you should, and if you’re brave enough to start, you will." -- Stephen King

November 12, 2014

Open-source .NET, free Visual Studio, support for Linux, Mac, Android and iOS
As part of the change, Microsoft will give developers the ability to use the .NET runtime and framework to make server- and cloud-based applications for Linux and Mac. Microsoft is also releasing a new, full-featured version of Visual Studio 2013 that will be available at no cost to independent developers, students, small companies and others not making enterprise applications. And the company is releasing a preview of Visual Studio 2015 and .NET 2015 with new features for building applications that run on platforms including Windows, Linux, iOS and Android.


Dealing With the KPI Terminology Problem
And remember, ‘KPI’ is just one of the many performance management terms that does not have a standardised, universally accepted definition. I have no idea how this problem of varying terminology is going to be resolved, and that’s not the intent of this article. The intent of this article is to give you a contextual framework to make sense of where ‘KPIs’ – or performance measures, or whatever you call those quantitative pieces of evidence of our performance results – should fit. So let me tell you my definition of these terms, and then you can map your own terms to my meanings and thus avoid distraction and confusion when you try to make sense of your own strategy.


Alcatel-Lucent pins growth on R&D, enterprise
"Our customers need a network that can scale quickly, and break down silos in between the different technologies,' Combes said. "SDN [software-defined networking] makes network resource as easily consumable as compute and storage. We strongly believe that the answer to complexity is around NFV [network functions virtualisation] and SDN combined." Although Alcatel-Lucent was reducing its size globally, investment in the company's Bell Labs research division remains at €2.2 billion year on year, Combes said, with divisions opening in Israel and the UK. "You can expect a very strong Bell Labs in the next few years because that is a key differentiator for us," he said.


IT still not ready for IoT
Despite the benefits of connected devices, more than half (51%) of respondents believe the biggest challenge regarding the Internet of Things is increased security threats, while a quarter (26%) are concerned about data privacy issues. Two-thirds (68%) admit they are very concerned about the decreasing level of personal privacy. More than a quarter of respondents say the general public’s biggest concerns about connected devices should be that they don’t know how the information collected on the devices will be used (28%) or they don’t know who has access to the information collected (26%).


Update now, Windows users: Microsoft patches critical (and old) security flaw
Microsoft has issued emergency patches for a flaw that affects all supported versions of Windows. It’s a nasty one – a vulnerability in Windows’ implementation of the protocols for encrypting internet communications. The critical flaw lies in Secure Channel (Schannel), a security package – used by Internet Explorer — that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. While there’s no evidence of its exploitation yet, it allows attackers to remotely execute code on the target’s machine and take it over, so it is imperative that all Windows users run an update immediately.


IndependenceIT: 'Switzerland' Of Virtualized Desktops
IndependenceIT is trying to make it practical to provision and sustain virtualized end-users, a goal that has tended to recede about as fast as many companies have approached it. Implementing virtual machines for end-users who have varied needs, little tolerance for slow-functioning desktops, and a likelihood of being mobile at some point has complicated the deployment of virtual desktops and, in many cases, delayed it. Individualized desktops that each need to be stored drive up storage costs. Power end-users require a delivery protocol that prevents jitter in the multimedia and video they view. When the end-user disconnects from the corporate network, what then?


SDN meets the real world, part two: SDN rewrites the WAN manual
Wide-area networking (WAN), the part of the enterprise network between applications and end-users, is traditionally slow, expensive, and inflexible — and hence, ripe for innovative new approaches. SDN is broadly applicable to other parts of the networking requirement, so offering up a pool of resources that can be programmatically controlled by software should be explored in different contexts and settings. This report lays out a conceptual approach whereby SDN can be applied to the WAN to drive cost savings, agility, and flexibility for enterprise customers.


Samsung And SAP Partner On Mobile Devices For Business
“Increasingly, our customers are away from the desk and require a fundamentally new way to interact with the enterprise applications to align with how they work today,” said Steve Lucas, president, Platform Solutions Group, SAP, in a statement. “The applications that match the current trends in mobility must work to create a seamless experience as the work modality embraces mobile devices, wearables, Internet of Things and other alternative forms of mobile computing. Through our partnership with Samsung, we are working on plans to offer a premium mobile enterprise experience for customers.”


Lack of in-house skills stymies IaaS migration, says report
Reconnix CTO Steve Nice noted a “clear desire for business to move away from traditional environments and towards IaaS providers”. “It’s natural for many businesses to err on the side of caution, but this conservative approach can mean that many are missing out on the transformative benefits of the cloud,” said Nice. “It’s clearly a confidence issue, and the challenge is for IT departments to take the necessary steps to prepare themselves for inevitable change. “By failing to take action now, they risk putting themselves at a technological disadvantage to competitors, or being caught blindsided and forced to rush through a migration that could end up costing over the odds.”


Don’t Surround Yourself With Smarter People
Freedom is therefore implicitly freedom to win in a specific sense. This is not an accident. Any time you define freedom in terms of capacity for action (intrinsic and situational), you’ve defined freedom in a finite-game (Carse) way. Increasing freedom becomes a matter of increasing your capacity for victory over increasingly capable opponents, until you’ve defeated them all. Stated another way, freedom to win is freedom to get smarter in the sense of a given finite game. Freedom in a finite-game sense is always freedom-to-win (and therefore, freedom to stop playing at some point).



Quote for the day:

"Look for people who will aim for the remarkable, who will not settle for the routine." -- David Ogilvy

November 11, 2014

Big Data Survey: Trouble Brewing For IT
Enterprises are faltering in their ability to comprehensively analyze big data, and IT has opted to walk away. Look, for years IT organizations have been told they don't own enterprise data, the business does. Lately we've heard about the rise of the CMO and how it takes that mindset to really know what data matters and how to mine it. So the message too many IT teams seem to be taking away: "This isn't an IT problem. We build the systems, keep the lights on, try to keep attackers out. We don't own big data. Our input isn't wanted."


Rackspace Launches Azure Services From Data Centers
Microsoft's partnership with Rackspace looks a lot like VMware's moves in the same hybrid cloud space. It launched its own vCloud Air data centers, offering VMware-compatible public cloud services. But it also commissioned a wide variety of regional providers to offer vCloud services, calling it the vCloud Air Network (versus Microsoft's Cloud OS Network). At the same time, Rackspace's adoption of private cloud packaging inside its cloud data centers is another step back from the brink. In May, it hired Morgan Stanley to act as an agent to explore the possibility of being acquired or taking on a tight partner relationship.


Are fingerprints PINs or physical artifacts?
“Courts are essentially wrong distinguishing between various methods of encryption and decryption,” said Rasch. “They are all, at their core, a mechanism for protecting the privacy and security of data. Indeed, a person encrypting a drive with a biometric would have cause to believe that this was more secure, and that they had a greater expectation of privacy in the biometric than they do in a simple four-digit PIN. To say that announcing the numbers ‘2580’ as a password is testimonial incrimination, but handing over a complex PGP key, or causing a complicated mathematical calculation based upon a biometric is not testimonial misses the point.


Why Your 2015 Plan Needs To Include Data & Analytics Governance
An extremely important aspect of a centralized data governance group is representation from various stakeholders across the organization. Even the word “analytics” means very different things across the different groups within your organization. Finance, web, marketing, customer and business teams all generate and use data in very different ways, and often these data sets can end up living in isolated silos. And, beyond your own organization, keep in mind that there are typically many third parties and agencies you’re working with, and often organizations will choose to bring in an external specialist or consultant to provide insight into trends and new opportunities in the data & analytics space.


SaaS: The dilemma of visibility and control
The supply of SaaS solutions is increasing and will continue to do so at an ever increasing pace. According to Forrester Research (Application Adoption Trends: The Rise Of SaaS) SaaS spending accounts for the 23% of the application software budget. However, it grew a whopping 53% over the previous year (4Q 2012-4Q 2013). In addition to customer relationship management (CRM), SaaS adoption is strong in human resources management, collaboration tools, and e-procurement. Forrester is also seeing a dramatic increase in SaaS interest in business intelligence (BI) and several other application categories.


Here's what your tech budget is being spent on
Andrew Horne, managing director at CEB, said IT departments are introducing more flexible budgeting and making better use of cloud computing which allows them to reallocate budget to innovation. The CIO's attitude towards innovation is often tempered by a big dose of caution, so much so that they have started to lose responsibility for innovation projects to other managers. Meanwhile, IT chiefs are finally waking up to the threat coming from shadow IT, where other execs have been getting more interested in developing their own digital projects outside of the control of the CIO.


10 bad technology decisions that can come back to haunt you
As organizations build their tech roadmap for the years ahead, the wrong choices and strategies could have unfortunate repercussions. Here are some pitfalls to watch out for. A bad strategic or tactical move can unleash an avalanche of negative effects on your organization, some lasting for years to come. Here are some of the worst of the worst -- and a few suggestions on how to avoid them.


Cures For The Common Help Desk Headaches
With all three of the most common help desk headaches, though, you need to go beyond technology and look to training and cross-departmental collaboration to really build skills into your corporate cultures. Defining a technological skillset matrix for your team will reveal gaps in knowledge. A simple "X skills needed, Y people on the team with a 1-, 2-, or 3-rating per block" will show where you need to provide more training and where you can hold a related session in a conference room each month.


Why Hire Veterans? They Bring a Lot to the Table, Say CompTIA Members
Veterans do bring a lot to the table, agreed Aaron Woods, director of USSP relationship and partner programs for Xerox Corp.’s Global Customer Service Delivery and a six-year veteran of the U.S. Army. “All veterans have attained a number of skills while in the military that would fit the needs of any employer,” Woods said, citing teamwork, leadership, discipline and the ability to follow a chain of command. IT companies should consider the specific traits that veterans possess, like being team-focused and disciplined with a strong drive to complete a task. “The ability to work in a team environment is one of the most important attributes a veteran will bring to an IT company,” he said.


Hire Self-Motivated People — the Single Smartest Thing a Hiring Manager Can Do
A self-motivated recruiting prospect, candidate, or employee is an individual with a track record of having the internal drive and motivation to begin and continue tasks without external prodding or extra rewards. You don’t have to identify why they are so driven. Just be satisfied with the fact that it is something in their character, upbringing, training, or attitude that drives them to work without any external stimulus or threat. Once you bring this recruiting approach to any hiring manager’s attention, they almost instantly appreciate its value. But if you are cynical, I have listed below some of the many benefits that come from hiring self-motivated people.



Quote for the day:

"Everything you want is just outside your comfort zone." -- Robert Allen