December 21, 2014

2014 Is Ending, but This Wave of Technology Disruptions Is Just Beginning
The sun is setting on 2014, but we're about to watch a new wave of technologies rise and remake the world. (Katherine Frey/The Washington Post) Changes in technology are happening at a scale which was unimaginable before and will cause disruption in industry after industry. This has really begun to worry me, because we are not ready for this change and most of our leading companies won't exist 15-20 years from now. Here are five sectors to keep an eye on:


Data science handbook: 3 tips for becoming a data scientist
To get a clearer picture of the state of data science, how employers and employees alike can take advantage of it, and how you can enter the field, we spoke with some of the field’s most prominent voices: DJ Patil, co-coiner of the term “data scientist”; Michelangelo D’Agostino, formerly of Obama 2012’s data team; and Clare Corthell, creator of The Open Source Data Science Masters. We’ve distilled their insights into three main pieces of insight that we will share below.


New Ransomware Avoids Hitting the Same Victim Twice
OphionLocker uses infected websites to install itself on unpatched computers, then encrypts the victim's data with strong opensource Cropto ++ elliptical curve cryptography. The cost to recover the files is typically around 1 Bitcoin, or about US $333. According to KnowBe4, the ransom amount varies based on the victim's country, with the U.S. having the highest rates. After victims are infected and their files encrypted, the malware sends the victims to the ransomware site where they are given payment instructions. However, the ransomware does not secure delete the files or remove shadow volume copies, so a file recovery tool or a program like Shadow Explorer could be used to recover the files.


Policy frameworks can help or hinder India's tech revolution
By 2025, India could reach a "tip ping point," where the economic benefits of large-scale technology adoption accrue at an accelerating rate. For example, digital tech nologies such as verifiable digital ID and the mobile Internet used in concert will enable universal financial inclusion, potentially raising incomes of people who lacked access to banking and credit by 5 to 30%, which could add economic value of $32 billion to $140 billion per year in 2025. The administration of school and online teacher certification and training, along with blended learning--using online systems and MOOCs can boost the quality of K-12 and post-secondary institutions, and deliver $60 billion to $90 billion in economic value per year by 2025 through a better skilled workforce.


New Chip Points the Way Beyond Silicon
The semiconductor industry is finding that scaling any smaller introduces a range of problems. At one panel held during the IEDM conference, Mark Bohr, a senior fellow at Intel, estimated that silicon scaling would end in about a decade. “My general response is wild enthusiasm for any new idea,” he said. With superb electrical properties, germanium has always promised to make speedier circuits than silicon. But engineers were unable to use it to make compact, power-efficient circuits based on the industry’s established manufacturing technique, known as complementary metal-oxide semiconductor, or CMOS, technology.


Coder, sell thyself
Assuming that you have your goals in mind and are serious about the pursuit of new business, you now have to create the space to allow your business to develop. If you are currently employed by someone, you have to quit your job. If you are currently engaged in a 100% on-site contract position, you have to step away. You must create a vacuum in order to draw in new clients and project work. If you are mentally in a space where you want to find new work, but are physically occupied by an opposing force, you will repel potential opportunities. You must be aligned mentally and physically in order to draw new clients and paid project work to you.


Setting Up a Redundant Internet Connection With BGP
Many organizations have identified the Internet as a critical resource that should never be down. As a result, a redundant Internet connection is configured to help ensure there’s at least one connection to the Internet up at all times. In this post, we’ll consider the topology for a network with a redundant Internet connection that uses Border Gateway Protocol (BGP) routing. Here, BGP will do two things: learn the Internet routing table, and announce the local, publicly accessible network to the Internet. To keep things as simple as possible for those of you who’ve never worked with BGP before, we’ll do this with a single Internet router.


Point-to-Point Generic Routing Encapsulation ( GRE ) over IP Security ( IPSEC )
Diverse multi protocol traffic requirements forces the use of a Generic Routing Encapsulation ( GRE ) envelope within the IPSEC tunnel. The p2p GRE tunnel is encrypted inside the IPSEC crypto tunnel. Native IPSEC is not multi protocol and has no support IP multicast or broadcast traffic. As a result, proper propagation of routing protocol control packets cannot take place in a native IPSEC tunnel. With a p2p GRE over IPsec design, all traffic between hub and branch sites is firstly encapsulated in the p2p GRE packet BEFORE the encryption process takes place.


Organizational Resilience: The Business Continuity Institute's View
The Business Continuity Institute realises the value of BS 65000 and the thinking that comes behind it. It affirms its premise of strengthening the collaboration among ‘protective disciplines’ in order to create a coherent approach to achieving resilience. Business continuity as a discipline has resilience at its heart and the BCM Lifecycle explicitly relates to building resilient organizations. In participating in the ongoing development of organizational resilience, the BCI makes a positive case for the ‘protective disciplines’ and enabling top management buy in into our work. It also makes practitioners responsible for resilience more visible to top management, taking their work as a matter of strategic importance to the organization.


Don’t trivialise the internet of things
Walport said IoT could have a much greater impact on society than the first digital revolution, with the potential to support “an extraordinary range of applications and economic opportunities”. However, he warned there will also be potential for significant challenges around security and privacy breaches, and it will be critical that scientists, programmers and entrepreneurs behave and act responsibly. “Equally,” wrote Walport, “policy makers can support responsible innovation and decide whether or how to legislate or regulate as necessary. Everyone involved in the IoT should be constantly scanning the horizon to anticipate and prevent, rather that deal with unforeseen consequences in retrospect.”



Quote for the day:

"The problem with being a leader is that you're never sure if you're being followed or chased." -- Claire A. Murray

December 20, 2014

Roy Fielding on Versioning, Hypermedia, and REST
Anticipating change is one of the central themes of REST. It makes sense that experienced developers are going to think about all of the ways that their API might change in the future, and to think that versioning the interface is paving the way for those changes. That led to a never-ending debate about where and how to version the API. ... This is precisely the problem that REST is trying to solve: how to evolve a system gracefully without the need to break or replace already deployed components.


Buckle up IT: The enterprise needs you for cloud adoption
"When you're talking about applications and services that are important to the enterprise, it's crucial to have IT in the loop so that they can assess security, performance and availability risk factors," Olds said. "Sort of like having your doctor by your elbow at the buffet. It's not as satisfying, but you'll be healthier in the long run." Allan Krans, an analyst with Technology Business Research, noted that the days of companies having multiple silos of information and applications running without IT's involvement or knowledge should be coming to an end in the coming year.


Dear Enterprises: Now Is The Time To Get Freelance Work Right
The writing is on the wall. In 2015, enterprises MUST get it right when it comes to managing independent contractors. More companies than ever are turning to freelancers and independent contractors — especially large, billion-dollar enterprises who can capture significant business value from deploying a flexible, non-employee workforce. Since we first started Work Market in 2010, we’ve been helping enterprise companies navigate the nuances of independent work. Fast forward five years, and we’re seeing a greater number of enterprises turn to independent workers than ever before.


SQL Zip Compression, RegEx and Random Functions
While SQL Server natively supports storing data as compressed, with this library we are able to achieve goals that transcend any one application layer. ... The biggest advantage is that since the data is stored and delivered compressed, it is low impact on SQL (both Disk I/O and CPU) and the network to deliver the data to the client. This opposed to SQL native compression where SQL compresses on receive and decompresses on send, the network then recompresses while sending, then the client decompresses the network packet on receive.


Wouldn’t it be fun to build your own Google?
Imagine you had your own copy of the entire web, and you could do with it whatever you want. (Yes, it would be very expensive, but we’ll get to that later.) You could do automated analyses and surface the results to users. For example, you could collate the “best” articles (by some definition) written on many different subjects, no matter where on the web they are published. You could then create a tool which, whenever a user is reading something about one of those subjects, suggests further reading: perhaps deeper background information, or a contrasting viewpoint, or an argument on why the thing you’re reading is full of shit.


New Intel Platform Rich with Transformative Features
Many high-performance computing (HPC) users are familiar with Intel AVX 1.0, which increased floating point packet processing from 128 bit to 256 bit. Now Intel AVX2 doubles integer packet processing, from 128 bit to 256 bit. That essentially doubles your integer processing ability on the same clock speeds. This advance will drive new workload performance gains, particularly for the demanding HPC applications used in life sciences, physics, engineering, genomic research, data mining, and other types of compute-hungry scientific and industrial work. In our testing, we have seen up to a 1.9x increase in performance with Intel AVX2.[1],[2]


We Still Don’t Understand Very Well How Social Change Occurs in the Digital Age
he Internet is responsible for one of the paradoxes of the digital age. We are just a click away from having a friend in the antipodes, but we end up following friends who we already know from work, school or just around the corner. Ethan Zuckerman, director of the Center for Civic Media at MIT, denounces the lack of globalism on the web and alerts us to a few hazards that may cause damage to the democratic quality of our governments. Zuckerman proposes alternatives to the current model of Internet business and puts the magnifying glass on users in order to understand how social changes come about in the digital age.


Creating a Sales Dashboard with Bootstrap and ShieldUI
Although a complete Dashboard can include any possible combination of widgets and layout elements, I have picked the most widely used. From a layout perspective, the page is divided into responsive panels, the positioning of which is determined by the Bootstrap layout system. On smaller screens, each section is adequately positioned to occupy all of the available space. The widgets used are JQuery QR code, JQuery rating control, two different layouts for the graphs, utilizing a JQuery Chart plugin, a circular progress bar, and a grid. From a development perspective, I have used a simple html file, which hosts all the required code.


Artificial Skin That Senses, and Stretches, Like the Real Thing
Finally, in a further effort to make the materials seem more realistic, they added a layer of actuators that warm it up to roughly the same temperature as human skin. The new smart skin addresses just one part of the challenge in adding sensation to prosthetic devices. The larger problem is creating durable and robust connections to the human nervous system, so that the wearer can actually “feel” what’s being sensed. In a crude demonstration of such an interface, Dae-Hyeong Kim, who led the project at Seoul National University, connected the smart skin to a rat’s brain and was able to measure reactions in the animal’s sensory cortex to sensory input.


Alchemy: Message Buffer
One topic that has been glossed over up to this point is how is the memory going to be managed for messages that are passed around with Alchemy. The Alchemy message itself is a class object that holds a composited collection of Datum fields convenient for a user to access, just like a struct. Unfortunately, this format is not binary compatible or portable for message transfer on a network or storage to a file. We will need a strategy to manage memory buffers. We could go with something similar to the standard BSD socket API and require that the user simply manage the memory buffer. This path is unsatisfying to me for two reasons:



Quote for the day:

"Ignorance is a death sentence for any leader as it eliminates the option to take action effectively." -- @ManagersDairy

December 19, 2014

IT pros: Rethink before you replace
Rethink your solutions. Newer technologies sometimes offer simpler solutions than older apps. For example, Hangouts handles browser-based, multi-person meetings much easier than most legacy meeting apps. Similarly, Chromebox for Meetings offers an affordable, powerful alternative to traditional small office conferencing systems. Quip combines messaging, documents, and spreadsheet collaboration -- all in a single, easy-to-use app. The "default" choice from a legacy provider might now be matched by a clever combination of lower-priced hardware working with smarter software.


Not Just Code Monkeys
Martin Fowler keynotes on the importance of building a healthy social environment where software development can thrive. You can view here part 1 of this presentation ... Martin Fowler is an author, speaker, consultant and general loud-mouth on software development. He's the Chief Scientist at ThoughtWorks - an international application development company, and has written several books on software development and also writes articles regularly


Android Will Soon Be Baked Right Into Your Car
In its current form, Android Auto allows drivers to display Android apps and functionality on a vehicles dashboard screen by connecting it to a smartphone. By baking Android fully into the car, Google would be able to control not just the infotainment system but also have access to a car’s camera, GPS, diagnostics and telematics … everything piece of data that a car can provide about its driver. Google already can collect much of this data through Android smartphones, but Android Auto locks drivers into the Google and Android experience while eliminating the need for a smartphone running on a limited battery.


Big Dataclast: My Concerns about Dataclysm
Contrary to his disclaimers about Big Data hype, Rudder expresses some hype of his own. Social media Big Data opens the door to a “poetry…of understanding. We are at the cusp of momentous change in the study of human communication.” He believes that the words people write on these sites provide the best source of information to date about the state and nature of human communication. I believe, however, that this data source reveals less than Rudder’s optimistic assessment. I suspect that it mostly reveals what people tend to say and how they tend to communicate on these particular social media sites, which support specific purposes and tend to be influenced by technological limitations—some imposed (e.g., Twitter’s 140 character limit) and others a by-product of the input device


A Feminist Critique of Silicon Valley
Obviously the pipeline is a huge issue. But too often, our industry focuses on early stages of the pipeline that they have no control over. You see venture capitalists talk about the need to get more 10-year-old girls into programming, and that’s so far removed from their direct sphere of influence. Meanwhile, there is attrition in every stage of the career path of women once they get into the industry. Over 50 percent of women will leave by the halfway point in their careers. We are not getting hired, and we are not getting promoted, and we are being systematically driven out of the industry.


Microsoft files suit against alleged tech support scammers
It is a big problem. Since May 2014 alone, Microsoft has received over 65,000 customer complaints regarding fraudulent tech support scams. According to a survey issued by Microsoft, over one-third of U.S. citizens fall for the scams once contacted, causing them to suffer approximately $1.5 billion in financial losses each year. In an attempt to stop the scammers, Microsoft filed a civil lawsuit with the U.S. District Court for the Central District of California against a California company trading as Omnitech Support, and related companies, for unfair and deceptive business practices and trademark infringement, Microsoft said Thursday.


Cyber Attackers Increasingly Sneaking Corporate Data Out Through DNS
The technique is simple. Attackers encode data in base 64 and encapsulate the information within DNS requests, which are sent to an attacker-controlled server. The server then decodes the traffic and recovers the data. Generally, such techniques are considered tunneling if the communications channel can send data in either direction. DNS exfiltration is focused on getting the data outside of a company’s firewall without being detected. The straightforward technique is difficult to stop because every company needs to allow domain traffic to pass to the Internet. Moreover, because many companies are not looking for such covert communications channels, attackers are likely successful in exfiltrating sensitive corporate data, Cloudmark’s Cook said.


Reflections of an IT recruiter: Happy times are here again!
"In 2014 we really saw new positions, so companies were finally working with new budgets. Companies in the Tampa Bay area have done a lot on the infrastructure side and the security side of technology, versus the development side. "Have we had some development projects? Absolutely. But if I were to step back and look at the numbers, I can tell you with assurity that the majority of positions that we have filed and worked on, even all the way up to the executive level, have been more security-based and infrastructure-based."


Australia 2015 Tech: A Big Cloud Move Coming
“The old adage that IT must be aligned to business is probably over. IT and business must be integrated — business is taking over IT and IT is becoming part of business — you can’t separate these things. That is going to be a big trend in Australia next year,” Sweeney said. Transformation and disruption of traditional businesses has been gaining pace Down Under during 2014 and will continue to accelerate in 2015. Not only are companies such as Netflix, Uber and AirBnB making life rather uncomfortable for established players in their respective industries, the real threat of a slowdown in Australia’s economic growth could force even relatively new firms to rethink their business plans, according to Mark Troselj, managing director for NetSuite APAC and Japan.


McKinsey Global Identifies Twelve Technologies that Can Add to India’s GDP
“The spread of digital technologies, as well as advances in energy and genomics, can be one of the most dominant drivers of productivity in India, redefine how basic services are delivered, and contribute to higher living standards for millions of Indians by raising education levels and improving healthcare outcomes,” says Noshir Kaka, MD of McKinsey & Company in India. To assess the potential impact of the 12 technologies on the economy of India and the lives of its people, MGI sized more than 40 applications in six sectors of the economy: financial services, education and skills, healthcare, agriculture and food, energy, and infrastructure.



Quote for the day:

“Give them quality. That’s the best kind of advertising.” -- Milton Hershey

December 18, 2014

Death To Fillable PDFs And MS Word Forms
Sorry, Adobe. You had a chance with PDF forms, and you blew it. And the world needs to move on. ... The cloud options are easy and inexpensive. SurveyMonkey will work in some cases. Google Forms is flexible and free. Wufoo has more features, as does FormSite, and both are inexpensive. One caveat: For employees who are more comfortable mulling over a form before filling it out, it's courteous to provide the option of viewing the entirety of the form before data entry. Two wins: First, the collector gets the form data back… as data. (PDFs and Word documents can, but usually don't, come back as tabular data.) Second, employees are less frustrated.


Why HP is Investing a Lot in the OpenStack Project
Composability is the main theme. HP wants to have a pure OpenStack platform that can be augmented with as many different plug-ins as possible. “The enterprise needs that flexibility,” Hilf said. Ability to plug in different kinds of software defined network controllers, hypervisors, or storage systems is very important. “We can’t only have the HP storage solution as the answer. It can’t only be that HP SDN controller is the answer.” For this model to work in the long run, OpenStack, the core platform, has to be solid, which is why HP has been investing so much in the open source project.


Find the Right Expert for Any Problem
The basic idea is that you identify people who might have some knowledge of or interest in a given topic area, and you ask them who else might know even more than they do — or who else might know of others with greater knowledge. Then you contact those people and repeat the process until you’ve gotten to the top of that particular topic area, or pyramid, and found individuals with the highest levels of expertise and passion. Once you’re at a peak of a pyramid, you’re more likely to get a referral to someone in a distant but analogous topic area (when we say “distant,” we’re not referring to geography but to contextual differences between subjects). That’s because the highly curious, knowledgeable, well-connected people at the top of pyramids tend to reach out to people outside their domains.


Is Your Brain Trying To Sabotage Your CIO Career?
Possibly more than any other C-suite executive, the CIO runs the gauntlet between dealing with the task- or detail-focused and building the relationships needed to influence effectively. Although a growing number of CIOs come from business rather than engineering backgrounds, the style needed to lead staff working on IT projects is much more likely to be in your brain’s Task-Positive than Default Mode network. Research has shown that the more time your brain spends operating in one network, the more difficult it is to switch between the two. If you've managed to make it into the C-suite, chances are you're already doing a pretty decent job of moving between one and the other but there are things you can do to make that transition even easier for you.


Human error root cause of November Microsoft Azure outage
The outage stemmed from a change in the configuration of the storage service, one that was made to improve the performance of the service. Typically, Microsoft, like most other cloud providers, will test a proposed change to its cloud services on a handful of servers. This way, if there is a problem with the configuration change, engineers can spot it early before a large number of customers are impacted. If the change works as expected, the company will then roll the change out to larger numbers of servers in successive waves, until the entire system is updated.


Wearables In 2015: 4 Predictions
In a Forrester Research survey of 3,000 global technology and business decision-makers, 68% said that wearables are a priority for their company, with 51% calling it a moderate, high, or critical priority. Consumers haven't been as eager. Yet Forrester analysts say that in the coming year more consumers will turn their lonely eyes (and wrists) to wearables, spurred by the arrival of Apple Watch. Forrester predicts the Apple Watch will pull in 10 million users next year.


Indian IT services firms focus on innovation like never before
"Companies are making heavy investments in training the workforce. For instance, Infosys is training its engineers in design thinking, it is training sales teams to sell non-linear services. Companies are investing in building out infrastructure such as digital labs," said Sundararaman Viswanathan, associate director at consulting firm, Zinnov. Infosys' rival Wipro, also Bangalore-based, has invested in a state-of-the-art Technovation Center, a hub of emerging technology solutions that leverages the intersection of technologies to deliver business innovation.


Fears over the IT security of new banks are overblown
According to a study of more than 6,000 people, 72% said they trust their bank with card details. In contrast, three-quarters of online shoppers don’t trust even large retailers with their card information. The study by Bizrate Insights said while PayPal – trusted by 48.9% of respondents – could form strong competition for banking services, tech giants such as Apple and Google were only trusted to protect personal details by 21.4% and 12.9% of people respectively. In the face of competition from a new breed of finance firms that boast state-of-the-art technology, traditional banks' secure IT systems could be their biggest advantage.


The Three C’s of Self-Service BI
The three C’s of Self-Service BI offer a simplified explanation of what, in essence, is hard work. It’s the type of hard work that brings value in terms of efficiency, better decision-making, and empowered users who are all aligned to your organization’s vision. The next time Self-Service is discussed in your organization, keep in mind the three C’s—Connection, Context and Control—and you’ll achieve the necessary framework for a high-performing business intelligence program and an extremely successful Self-Service BI initiative.


Should Your Company Get Cybersecurity Insurance?
Companies feel the need to take out a cyber-insurance policy because the financial cost of an attack can be devastating. Target's data breach cost the company $146 million and counting. Just the act of notifying customers of a breach affecting their credit card data starts at $500,000, Roberta D. Anderson, a partner at K&L Gates in the law firm's cybersecurity practice, tells the Washington Post. While a cyber insurance policy can provide some peace of mind, one expert stresses that it's no substitute for having an in-house cybersecurity expert and following the best practices and protocols.



Quote for the day:

"Continuous improvement is better than delayed perfection." -- Mark Twain

December 17, 2014

Developers Hold the Keys to Unlocking the Cloud
Since programmers coming out of college have been using cloud computing, they have a natural transition to coding in the cloud when they are hired by an enterprise or start their own company. Advanced software tools available to any developer provide an interface that is consistent and easy to use. Since everyone is working on the same platform, it is easy to get help by speaking to a developer in the next cubicle or with a text message to an associate.  By using advanced software tools on cloud platforms, developers can get access to the latest security technology. They can focus on writing code to do what they want to do and then they can figuratively bolt on the security features at the end.


The Theory of Data Trust Relativity
The first take-away is that data governance is having an affect on data use by establishing data quality reports to guide data trust. However, there is a noticeable divide for big data analytics and the data scientist who rely on tribal input and not evidence. If we take data quality's impact on the results and risk of using dirty data for decision making off the table for a minute (stay with me now!) how does this affect data trust? Our survey brought in a small number of executive level business professionals. The number is too low to be quantitative, but it does give directional insight.


Top five books for IT professionals in 2014
Information security, IT governance and IT service management are the dominating topics for our audience in 2014. Brought to the market by our publishing imprint, IT Governance Publishing, the following five books were the best sellers in 2014 across all of the regions we currently serve. We are happy to share this success with you, our blog followers. If you are looking for a useful (and pleasant) read during the festive period, why not take advantage of the following?


Sony’s smart glass uses regular glasses, aims for sports and work
The unit clips round the back of the user’s head, attaching to each of the glasses’ temples. Sony is working on a software development kit (SDK) so people can make hands-free information apps for the thing – the Japanese firm reckons it will be ideal for sports and factory work, and could even be paired with a high-quality action camera to make it easier to check the angle of view. Although the pictures of the device that Sony released on Wednesday suggest otherwise, the module doesn’t have its own camera. Indeed, a Sony spokesman told me that the images are of a prototype and do not represent the finished product.


Cloud Adoption Driven by Reliability, Business Continuity
Patterson noted cloud adoption is moving from the early adopters and development oriented organizations to the more traditional, legacy workloads. "We look forward to more applications being written for the cloud, but the economics and overall convenience of cloud will bring in more and more line of business applications as well," he said. "Our survey shows that security is still one of the biggest concerns when looking at cloud or colocation, but the last few years have proved that cloud is just as secure as a private data center, and in many cases, more so." The study found security continues to be a key priority when enterprise organizations look at migrating IT workloads to either an IaaS model (61 percent) or when considering colocation services (58 percent).


KPMG: Data Security Still Top Cloud Concern
"While the challenge posed by cloud related data loss and privacy threats are less pronounced in the minds of global industry leaders, they are still taking the issue seriously," said Rick Wright, principal and global cloud enable leader at KPMG, in a prepared statement. "The clear trend in the data that we have collected shows that, even in the face of significant media attention paid to recent data breaches, global leaders are still willing to embrace the transformative potential of the cloud." Security may be a concern, but there are other factors that are driving adoption of cloud computing technologies.


Cloud computing helps make sense of cloud forests
The researchers want to unravel the impact of micro-climate variation in the cloud forest ecosystem. Essentially, they want to understand how the forest works—how carbon dioxide, water, nitrogen, and other nutrients cycle through plants, animals, and microorganisms in this complex ecosystem. To do so, they've placed some 700 sensors in 15 forest plots, locating the devices at levels throughout the forest, from beneath the soil to the top of the canopy. The integration of such a vast number of sensor data streams poses difficult challenges. Before the researchers can analyze the data, they have to determine the reliability of the devices, so that they can eliminate data from malfunctioning ones.


Workflows of Refactoring
Martin Fowler keynotes on the need for refactoring and different ways to approach it. You can view here part 2 of this presentation. Martin Fowler is an author, speaker, consultant and general loud-mouth on software development. He's the Chief Scientist at ThoughtWorks - an international application development company, and has written several books on software development and also writes articles regularly.


Finding Maturity in Your Metadata Strategy
The elusive concept here is the connection between all of these new and often repetitive ways of revisiting our information. Organizations continue to struggle with the need to map, the need to interpret and, ultimately, the need to identify. We’ve reached the world of “Metadata 2015.” Because our data will always exist in more than one place it is separated in some way, yet it is similar or absolutely the same in another. Most of us may think we are seeing things differently when we look at these fragmented pieces – whether in the cloud, in stored and downloaded segments, or on our devices. Often this is the case, but sometimes it really is not.


Tools for Project Management and Collaboration
Tools are great! We experiment, test, recommend, and implement tools frequently for clients. But, as you know, implementation and adoption can be two very different things. And even (or perhaps especially) with IT professionals, adoption can be a challenge. Why? IT pros are smart and often feel that the way they do things is the "best" way. They have their tools, and they tend to like them. They are busy and don't want to be bothered adopting a new system or tool. However, at some point, you are the boss. I like to provide leeway in the method, but I do need some standards. To that end, my team and I had several conversations where their input was requested and accepted.



Quote for the day

"The quality of a man's life is in direct proportion to his commitment to excellence, regardless of chosen field of endeavor." -- V. Lombardi

December 16, 2014

Finding critical business data -- fast
"We used to call it ‘complex event processing,’" he adds. But that approach required proprietary software and expensive servers, which limited usage. In contrast, one of today’s technologies, Hadoop, "is linearly scalable, and you can throw lots of hardware at it and use memory very effectively," he says. Roll into that the lower cost of flash memory, adds Baer, and "now we can process data very fast, and do more sophisticated processing than when you were bound by I/O."


The 5 Elements of A Killer Mobile App
By 2015, more than 780 million people will be mobile users only. This means they won’t own a laptop or desk computer. These 780 million users will be your customers, partners, business stakeholders, suppliers, and other business associates. As organizations begin to align their mobile first strategy with this shift in users, it’s important to focus on what these mobile apps must do.


APIs should not be copyrightable
The story of SMB and Samba is a good example of how non-copyrightable APIs spurred competition. When Windows became a dominent desktop operating system, its SMB protocol dominated simple networks. If non-windows computers wanted to communicate effectively with the dominant windows platform, they needed to talk to SMB. Microsoft didn't provide any documentation to help competitors do this, since an inability to communicate with SMB was a barrier to their competitors. However, Andrew Tridgell was able to deduce the specification for SMB and build an implementation for Unix, called Samba. By using Samba non-windows computers could collaborate on a network, thus encouraging the competition from Mac and Linux based systems.


This Linux grinch could put a hole in your security stocking
The fundamental flaw resides in the Linux authorization system, which can inadvertently allow privilege escalation, granting a user "root," or full administrative access. With full root access, an attacker would be able to completely control a system, including the ability to install programs, read data and use the machine as a launching point for compromising other systems. To date, Alert Logic has not seen any exploits that harness this vulnerability, nor did the research team find any existing mention of this hole in the vulnerability database maintained by the Community Emergency Response Team (CERT), according to Stephen Coty, Alert Logic's director of threat research.


Frameworks and Leadership on Cyber-Risks
Just identifying and defining the risks is a daunting enough task. Stuart Levi, a partner with law firm Skadden, Arps, Slate, Meagher & Flom who focuses on cyber-security, warns that any company with even a single computer connected to the internet is vulnerable. “Every public company—regardless of their industry, what they do, what data and information they have —needs to be focused on this issue,” he says. ... Aaron Weller, a managing director in data protection and privacy with PwC, said at Compliance Week West that companies need to think beyond compliance to make their data and their systems secure. “Compliance is not security,” he said


How CIOs Can Prepare for Healthcare ‘Data Tsunami’
"Identify who owns the data and build consensus on data definitions," Dunbrack says in an email. "Understanding what the data means is key to making data governance and interoperability work, and is essential for analytics, big data initiatives and quality reporting initiatives, among other things." To be sure, ironing out data governance policies within a healthcare organization is anything but a black-and-white process. Complicating matters significantly are the diverse and growing sources of medical data, each raising distinctive ownership and compliance questions.


Defining a Major IT Transformation Now Happening in Telecoms
"One of the things I'm looking at as operators go through this journey is that this is a cycle that will take between 10 and 15 years," Kelly told eWEEK during a break at the conference. "Most operators have a high capital expenditure structure--they have a lot of high sum costs in the infrastructure--and they're not going to abandon that. What they are trying to do is take advantage of opportunities in the digital services economy to compete against the over-the-top providers, mostly because their core businesses are under attack."


2015 will be the year Linux takes over the enterprise
This rise of Linux in the world of big data will have serious trickle down over the rest of the business world. We already know how fond enterprise businesses are of Linux and big data. What we don't know is how this relationship will alter the course of Linux with regards to the rest of the business world. My prediction is that the success of Linux with big data will skyrocket the popularity of Linux throughout the business landscape. More contracts for SuSE and Red Hat will equate to more deployments of Linux servers that handle more tasks within the business world. This will especially apply to the cloud, where OpenStack should easily become an overwhelming leader.


The First Agile and Lean Open Source Method for Continuous Improvement
There are no silver bullets, we only move forward by learning, experimenting and sharing our discoveries with each other. That is the spirit of Open Kanban to keep those communications lines open, to help people innovate, and collaborate across the aisles of Lean and Agile, a method where innovation and people who think different are welcome. As wonderful as it is to have a few people who think different and collaborate from different sides of Agile and Lean today, this is not enough, especially when they get attacked simply becauase they are seen as the rebels, the non-conformants, the ones who dare to challenge the establishment in their respective camps of Agile or Lean.


QA & Testing Budgets Are Rising for Financial Services Firms
The survey found that as many as 52 percent of organizations are investing more in transformational projects rather than maintaining legacy systems (48 percent). This includes developing new mobile, cloud, and big-data applications and systems. With more development, comes more risk. One application failure can quickly turn into a business process disaster, consumer backlash, and reputational damage -- reiterating the importance of QA and testing today.



Quote for the day:

"My definition of agile is that you accept input from reality, and you respond to it." -- Kent Beck

December 15, 2014

From Police to Partner: The Changing Role of IT
As an IT professional, it’s your job to equip employees with the tools they need to get their jobs done while policing to make sure all solutions meet security or compliance requirements for the business. Managing employees is especially important with the emergence of BYOIT and as new web-based services gain traction in consumer and business markets — you don’t want them to circumvent your policies when they use their favorite tools, after all.  But how do you get employees on board when you can’t lock them down anymore? You must adopt a new role that strikes a balance between employee needs and preferences and security. You have to become a “partner.”


Three IT Roles at Threat from Self-Service Business Intelligence
Something has to change when decisions are reliant on a team of many because it’s simply not sustainable. It’s too costly when non-technical employees (95% of an organization’s staff) have no way of creating views or information dashboards that integrate all of their relevant data in a unified business intelligence platform. So, going back to my question about how many decision-makers are required to produce a dashboard, the answer really comes down to every organization and its comfort level in empowering employees with the right tools to integrate, cleanse and enrich data themselves.


Cloud Compliance Remains a Challenge
A technical interpretation of the data protection law would solve the problem. Analogously, a meaningful technical solution does not have to stand in the way of unfashionable, non-IT oriented law. That sounds compelling. A revision of the data protection law would thus not be necessary at all. Caution is called for once again: As opposed to the copyright law, data protection law is not a commercial law. Data protection is a personal right. Hence, the interests of the citizens in data protection principally ranks behind a technical and thus economy-friendly interpretation of the law. As a result, the issue of control and data sovereignty on the cloud therefore remains unresolved to date.


A Terabyte on a Postage Stamp: RRAM Heads into Commercialization
Because of its greater density, RRAM will be able to use silicon wafers that are half the size used by current NAND flash fabricators. In a single chip, it has nearly 10 times the capacity of NAND flash and uses 20 times less power to store a bit of data. It also sports 100 times lower latency than NAND flash, meaning performance is massively improved, according to Crossbar. And because RRAM is fully compatible with the standard manufacturing processes already used in NAND fabrication, no changes will be needed in manufacturing facilities. But before it could send its technology to the factory, Crossbar had to overcome a major technological hurdle -- error-causing electron leaks between memory cells.


Government IT In 2014: GAO's Critique
The General Accountability Office has always been a reliable resource for seeing what IT dilemmas the federal government is grappling with. Through its reports and testimony, the GAO seeks to help the feds keep IT projects on schedule, maintain high levels of security, meet statutory requirements, and make the most of their investments. The GAO produced 31 reports and testimony on IT in 2014. While some reports focused on mundane IT matters, others addressed emerging technologies or uncovered government-wide IT deficiencies that merit inclusion in this roundup.


10 cybersecurity predictions for 2015
Year end is a time for reflection. Based on my history in this space, plus the fact that my day job of running CSC's Global Cybersecurity Consulting business lets me talk to and help hundreds of executives around the world, I wanted to offer my perspective on how 2014 turned out and my thoughts on what to watch for in 2015. ... 2014 had both high- and low-profile attacks against industrial control and SCADA systems, and it continues to be a head-to-head battle where the atom meets the bit.


Does the world need 5G? Driverless cars, IoT, future devices will demand it
5G probably won't diverge from the age-old pattern, but it does come with one added hassle: we just don't have enough spectrum to go around any longer, according to wireless analysts. Roaming in particular could be problematic. "Spectrum is and will remain a major challenge for the success and early rollout of 5G. We don't have enough spectrum in general and 5G is a lot about optimising the use of spectrum. But clearly, allocating more spectrum to 4G and later 5G would help and this is a global challenge... An additional challenge will be to find a globally harmonised band for 5G roaming since all suitable spectrum is already in use in one or another part of the world," said Thibaut Kleiner, head of the European Commission's CONNECT Directorate-General.


Top 10 Big Data Predictions For 2015
Big data has seen a massive growth in interest in recent times, as more and more companies are investing in various facets of this technology. While this year, businesses’ understanding and willingness to explore big data opportunities have matured from the previous years, the coming year is expected to be even more critical, believe analysts. IT market research agency IDC has shared top 10 predictions for Big Data and analytics segment. These predictions will help IT leaders and CIOs to come up with better strategies in 2015, states the research firm.


6 IT Workforce Predictions for 2015
2015 promises to be a banner year for IT workers as the unemployment rate continues to plummet, salaries increase and organizations double down on retention and engagement strategies. CIO.com asked experts to predict the biggest trends, technology and strategies that will make an impact on hiring and recruiting in 2015. Every new year brings a unique set of challenges and opportunities for IT workers as existing technologies evolve and new technologies emerge. The first half of 2015 looks promising based on these six predictions from career experts.


Secret CIO: Stop Making Stupid Software Decisions
Most LOB experts focus on the here and now. That's what lines of business are all about. But we make major software investments for the future, for requirements we don't necessarily have yet, for the business we want to create. It's difficult for most LOB managers to step into a software assessment project and shift their perspective. They're not being replaced during the evaluation, so they're distracted by present-day work. The three major players in this type of software project have three different objectives. The company wants to power current and future business capabilities -- to increase customer value and create competitive advantage.



Quote for the day:

"The most important quality in a leader is that of being acknowledged as such." -- Andre Mauroisv

December 14, 2014

Google and Avaya to bring Chromebooks and WebRTC to call centers
Avaya hopes the offering will attract new clients and prompt customers of its call center software to upgrade their systems, especially those looking to move away from traditional Windows desktop PCs loaded with local software or to replace thin, virtualized clients, and thus simplify their infrastructure. Meanwhile, Google expects the partnership to help spur demand for Chromebook devices. Although Google doesn’t make Chromebooks, the company generates revenue licensing and IT administration software for the devices. The Avaya-Google bundle includes the Avaya Agent for Chrome software, and the Google Chrome management console.


5 Ways to Pull Useful Analytics Out of Big Data
It is generally made up of both structured and unstructured data. Structured data is data that’s already in a format designed for analysis, like data in a spreadsheet or database, while unstructured data is freeform, and includes things like infographics, presentations, blog posts, and social media posts. Astounding quantities of data are generated every day. In just one minute, there are 2 million Google searches, 685,000 Facebook updates, and 48 hours of video uploaded to YouTube. How can organizations draw useful analytics from this massive, heterogeneous pool of data? Here are 5 ways.


Debunking Disruptive Innovation – Why Disruptive Innovation is Not a Strategy
Most people familiar with the research on innovation also know about “paradigms.” Paradigms are mental models that contain unquestioned assumptions about how things work. The world is flat. The sun revolves around the earth. People get AIDS because God is punishing them for being gay. These assumptions are accepted as truths, until they’re turned upside down and replaced with an alternative paradigm. Paradigms have, and will always exist. Just like “quality” and “reengineering” were the business world’s lenses in the 1980’s and 1990’s, disruptive innovation is one of today’s biggest paradigms.


Iranian Hackers wiped out machines at Sands Corp Casino
“Typing from a Sony (SNE)VAIO computer, they compiled a small piece of code, only about 150 lines long, in the Visual Basic programming language. The program proved potent. Not only does it wipe the data stored on computers and servers, but it also automatically reboots them, a clever trick that exposes data that’s untouchable while a machine is still running. Even worse, the script writes over the erased hard drives with a random pattern of ones and zeros, making data so difficult to recover that it is more cost-effective to buy new machines and toss the hacked ones in the trash.” continues the post.


69 new external resources and articles about data science, big data
Starred articles were potential candidates for our picture of the week published in our weekly digest. Enjoy our new selection of articles and resources (R, data science, Python, machine learning etc.) Comments are from Vincent Granville.


NSA revelations forced Google to lock down data
After reporters showed Google engineers a diagram of the intelligence agency’s methods to tap links between Google data centers, the engineers responded with a “fusillade of words that we could not print in our family newspaper,” Washington Post reporter Craig Timberg said. Google responded to the revelations by former NSA contractor Edward Snowden by spending a lot of money to lock down its systems, including 2,048-bit encryption on its traffic, Schmidt said. “We massively encrypted our internal systems,” he said. “It’s generally viewed that this level of encryption is unbreakable in our lifetime by any sets of human beings in any way. We’ll see if that’s really true.”


Open Data Grey Areas
“The trustworthiness of open data,” Boswarva explained, “depends on the particulars of the individual dataset and publisher. Some open data is robust, and some is rubbish. That doesn’t mean there’s anything wrong with open data as a concept. The same broad statement can be made about data that is available only on commercial terms. But there is a risk attached to open data that does not usually attach to commercial data.” Data quality, third-party rights, and personal data were three grey areas Boswarva discussed. Although his post focused on a specific open dataset published by an agency of the government of the United Kingdom (UK), his points are generally applicable to all open data.


eBook: Android Security (and Not) Internals
Android is a software stack for a wide range of mobile devices and a corresponding open-source project led by Google. Android consists of four layers: Linux Kernel, Native Userspace, Application Framework and Applications. Sometimes Native Userspace and Application Framework layers are combined into the one called Android Middleware. Figure 1.1 represents the layers of the Android software stack. Roughly saying, in this figure the green blocks correspond to the components developed in C/C++, while the blue cohere with the ones implemented in Java. Google distributes the most part of the Android code under Apache version 2.0 licence.


The ERP monolith begins to unravel, sort of
Again, blame it on the cloud. The days of huge, complex on-premises IT infrastructures interwoven through the business are numbered. Many essential services and application functions can be accessed as needed and in piecemeal style via cloud, versus making huge up-front investments in software, equipment, and consulting assistance. "Raised with a new set of social, mobile, sensory, and wearable technology, [IT managers] will demand SAP's experience and functionality to reflect the new order." That order, of course, would be using HR, finance, and operational services from the cloud.


Companies need to trust gov't on cybersecurity, DOJ says
In addition to more trust, more engagement from private companies is needed, added Joe Demarest, assistant director of the Cyber Division at the FBI. But calls by DOJ officials for legislation to require mobile phone operating systems to include back doors in newly announced encryption tools may be a major stumbling block to additional cooperation. In recent months, FBI Director James Comey[cq] called on Congress to rewrite the 20-year-old Communications Assistance for Law Enforcement Act to allow for law enforcement agencies to access encrypted data on smartphones.



Quote for the day:

"The first step to leadership is servanthood." -- John C. Maxwell

December 13, 2014

Interview: Lucie Glenday, chief digital officer, Surrey County Council
“It’s a hard thing,” she says, calling herself a troublemaker. “That’s what the role is – somebody to come in and ask questions no one else has asked.” But CIO Paul Brocklehurst has taken it all in his stride. Already the council is advanced when it comes to digital thinking and has managed to deliver £250m worth of savings over the past four years. “But we’ve got more to go, and when you’ve got that constant battering of someone saying ‘I think you can do that better’, that’s really tricky,” says Glenday. “Especially when, to all intents and purposes, it’s a new face, someone who’s come down from cabinet officer and doesn’t seem to act in the same way everyone else does.”


The Cost of Data Loss on a Smaller Scale
If these numbers don’t scare you enough, they pull out another familiar figure: the dollar sign. These companies like to estimate the cost of data loss for a company. In 2012, Seagate estimated that $40 million is lost annually on data loss events. According to an Aberdeen research study, the average company loses $163,674 in unused labor and lost revenue for each hour of downtime due to data loss. But most of the time, these daunting percentages and huge numbers seem like empty threats. Data loss can’t possibly be that common, right? And even if it were, it certainly couldn’t cost that much, right?


Seven areas to focus on when complying with PCI DSS v3.0
Merchants and service providers are required to comply with the Payment Card Industry Data Security Standard (PCI DSS), which represents a set of guidelines for securing card data. If a business is found to be noncompliant, it can suffer considerable repercussions. Despite this, the Verizon 2014 PCI Compliance Report revealed that in 2013 only 11.1% of organisations fully complied with the requirements of the PCI DSS, and only one in five organisations came close to complying and passed 95%+ of controls.


Building a Data Governance Team with a Eye on Information Security
Potter noted that information is essential to supporting good patient care, as well as operational effectiveness, reducing costs; but data in itself also produces a level of risk for the organizations. Historically, she said, there has been a perception that data should be available any time, anywhere. There needs to be recognition that provider organizations must maintain control of data, which is essential to the care of the patient, she said. She noted that provider organizations today have access to vast amounts of data, from personal identifiable information, personal health information, corporate information, intellectual property and research.


For Long-Term Data Archive Solutions, Tape Storage Still on Top
For long-term data archive solutions, why does Google prefer to use tape storage drives and devices to archive and back up every email it stores? Because Google, recognizes that tape is less expensive, has greater longevity and reliability and is more portable and compatible with a variety of data formats than hard disk drives (HDDs). The need for long-term data archive solutions that will endure well into the future is only increasing. Recent advances in the Linear Tape File System (LTFS) and tape libraries from IBM, Oracle, Quantum, Spectra Logic and others are making data access times much faster. In addition, Linear Tape-Open (LTO) standardization, now on its sixth iteration (LTO-6), guarantees data access across devices well into the future.


Hyper-V Replica for Disaster Recovery
Appropriately called Hyper-V Replica, Microsoft introduced it with Windows Server 2012 R2 and upgraded it in the subsequent release. While it provides replication designed to ensure business continuity, Hyper-V Replica is not a substitute for failover clustering. If your organization has the budget to build a clustered Hyper-V deployment, you should definitely do so. Although there are similarities between replication and failover clustering, failover clustering is the preferred method for protecting your virtual machines (VMs).


Managed Failovers To Overtake Traditional Disaster Recovery Testing By 2018
“It has been a target for criticism that while it’s technically an open-source technology, it’s really controlled by the company behind it. Rival products are being launched to ‘rein in’ the problem, producing a slew of open projects that developers can tailor to meet their specific needs. We can expect to see more of this in the next couple of years.” Cloud object storage is another “one to watch” in 2015, says Dymacz: “We have been saying this for years, but object storage is something that’s hugely underused at the moment. Data is continuing to grow faster than most organisations know what to do with, and the costs associated with storing that data are growing year on year.


US technology companies facing growing UK pressure over internet spying
No such criticism of American institutions, much less companies, has ever been made before by a senior British government official. According to John Hemming, the Liberal Democrat MP for Birmingham and a cryptographer, "this statement from GCHQ is without precedent". "The US has an unfortunate track record of ignoring other countries' laws, in the area of high tech especially. It is good that they have been given a clear message from the UK that this must stop happening in the UK. I welcome GCHQ's openness and clarity on this matter. This is a very welcome development," he said.


Mac McMillan’s Clarifying Moment on Data Security
“The events of this past year ,” McMillan, CEO founder of the consulting firm CynergisTek Inc., told his audience, “have begun to show what’s going on, that the folks who want to do harm to us in healthcare have absolutely found us, and they’re not going away.” McMillan cited and briefly summarized 12 different, very serious, data breaches in 2014 that in a variety of ways are illustrative of all the threats facing patient care organizations in the U.S. What’s more, as he pointed out, the external threats—from hostile foreign governments, foreign-based criminal syndicates, and other entities—are beginning to emerge as potentially devastating for the U.S. healthcare system.


Forecasting to Improve Your Data Center Portfolio
Building and managing data center infrastructure represent large amounts of investments; it can easily reach up to hundreds of millions of dollars. Knowing whether or not you need additional capacity or whether your company can wait a few months to make this additional investment, can translate into a significant financial improvement to your data center portfolio. In retail, there are two forecasting models that allow you to manage your inventory levels between Original Equipment Manufacturers (OEM), distribution centers, retail stores and end customer: sell in and sell through models.



Quote for the day:

"To handle yourself, use your head; to handle others, use your heart." -- Eleanor Roosevelt

December 12, 2014

Why 2015 will be big for NoSQL databases: Couchbase CEO
"At the moment it's a relatively small number of applications and they're doing it more on an application-by-application basis," Wiederhold said. By the second half of next year that approach will alter to "a strategic, 'We're going to deploy this stuff in a very broad way'". ... "Phase one started in 2008-ish, when you first started to see commercial NoSQL products being available. Phase one is all about grassroots developer adoption. Developers would go home one weekend, and they'll have heard about NoSQL, they download the free software, install it, start to use it, like it, and bring it into their companies," Wiederhold said.


Renewable Energy and the Colocation Provider
Do colocation providers have the same responsibility when it comes to renewable data center energy, and should they be held to the same standards as an Apple or Google? Yes and no. The Googles and Facebooks of the world have the sway to effect real change on the grid, recently lobbying Duke Energy to commit $500 million to renewables. A colocation provider’s options are less flexible, due to efficiency, limited space, and limited flexibility in site selection. But its sway could affect the grid in the future. Currently for many, buying Renewable Energy Credits is the only way to go, though this practice isn’t quite pervasive outside of the mega providers like Interxion and Equinix.


Intelligence community must get its own house in order
The intelligence community has shattered the trust the public has in both technology companies and government itself, and at the same time seriously damaged the ability of firms to sell their products to foreign customers. Because of this distrust, technology companies are justifiably reluctant to work closely with the government, even when doing so would be in everyone’s interest. For example, intelligence agencies like the National Security Agency (NSA) have some of the world’s foremost cryptographers and security experts on their payrolls and should be offering technical assistance to tech companies, but doing so in today’s environment would likely drive away customers.


A brief history of Linux malware
Although not as common as malware targeting Windows or even OS X, security threats to Linux have become both more numerous and more severe in recent years. There are a couple of reasons for that – the mobile explosion has meant that Android (which is Linux-based) is among the most attractive targets for malicious hackers, and the use of Linux as a server OS for and in the data center has also grown – but Linux malware has been around in some form since well before the turn of the century. Have a look.


Gartner Reveals Every Customer MDM Product is Average or Worse
Gartner released the latest Magic Quadrant for Master Data Management of Customer Data Solutions and it is surprising to discover that only one product on the list was well received by customers. Gartner had three clear leaders – IBM MDM Advanced Edition, Informatica and Oracle (Siebel UCM). There were two other products just squeezing into the leaders quadrant – IBM MDM Standard Edition (formerly Initiate) and Tibco. What is surprising is that even though each vendor was able to choose reference customer sites for their products they still received average and below average scores for the software indicating a general difficulty in the marketplace in implementing MDM.


Cisco sees a data analytics fortune at the edge of the network
That’s one piece of Cisco Connected Analytics for the Internet of Everything, a set of new and existing capabilities that the company is introducing as a portfolio on Thursday. CEO John Chambers and services chief Edzard Overbeek are set to do the unveiling at an event at Cisco headquarters, a measure of the importance Cisco places on its Internet of Everything (IoE) vision, which it pegs as a US$19 trillion economy-wide opportunity over the next 10 years. Analytics is a $7.3 trillion chunk of that, the company says.


BlueData EPIC - making Big Data implementations easy
The company has developed a cloud-based platform, BlueData EPIC, designed to simplify the installation and use of common Big Data tools. Setting up a cluster of systems to execute Big Data tools is only a small number of clicks away. Simple enough that even an industry analyst could use it. The company has made it extremely simple to setup and use a cluster of virtual systems to conduct Big Data analysis and then scale it up or down as the company's requirements change. EPIC appears to support many of the most popular Big Data tools. Here's how the company describes what it currently supports:


Can an Industry Data Model Support Physical Instantiation?
The most foundational aspect of the integrated data warehouse design is the availability of a well-architected data model. As has long been the case, a logical data model (LDM) contains data elements organized to support a specific business or industry. The physical data model (PDM) components are the framework for the implementation of these structures, providing the details necessary to generate the DDL for the warehouse. The physical model resides alongside the logical model, expanded to include the components necessary to generate physical database structures like tables, views and indexes, designed to ensure optimum performance.


Desk Phone Extinction? Not so Fast
On Tuesday, Kansas-based AccessDirect Inc. said the results of a survey it conducted show that desk phones face “extinction" as younger employees, who prefer mobile alternatives, take over the workplace. That’s a bold statement, and it’s not the first time it has been made; ever since mobility and the softphone hit the market, people have forecast the demise of the desk phone. Ask yourself, though – how often do black-and-white predictions come to fruition in business technology? Almost always is there room for everything. Regardless, AccessDirect believes the end of desk phone days is nigh.


Introduction to Agile Methods by Sondra Ashmore & Kristin Runyan
Becoming Agile is a journey rather than a destination. Applying new practices is part of the journey. I believe there are some indicators that show that you are moving in the direction of agility. Key indicators that come to mind are regular communication, transparency, and more active engagement from stakeholders and customers. The part of the journey that I see teams struggle with the most is that they feel they encounter failures more often (albeit smaller ones) because they are getting more feedback sooner in the process. A team that is being agile embraces these early opportunities to make a change in the spirit of creating the best possible product for their customers.



Quote for the day:

"The role of leadership is to transform the complex situation into small pieces and prioritize them." -- Carlos Ghosn