January 08, 2015

Using the Kanban Canvas for Driving Change
Systems Thinking uses the iceberg metaphor, where individual events are what we see above the water line. Below the water, often unobserved, are the patterns of events over time. Below that are the system structures that create those patterns, and even further down are the mental models that lead to those structures. To begin to understand the systemic problems we want to address, we first need to look for the patterns. One way of finding patterns is through narrative. I ask people to tell stories about what has happened in the past, over time.


Corporate officers — security changes for 2015!
CSOs rarely quantify a return on investment, as the rest of your department heads can. Instead, CSOs talk about threats to other companies, and deep down you’re wondering who would have both the inclination and capability to attack your company anyway? You have firewalls, and you’re forced to memorize (okay, write down in your secret place) longer and longer passwords that NOBODY could guess. You’re compliant with your industry standards, such as PCI (for payment cards) and HIPAA (health records), so you must be protected. In short, you need to trust your CSOs to do their jobs, just as you trust your CFOs — in the same way that President Reagan trusted the Soviet Union to disarm: “Trust but verify.”


We Don’t Have Time for Risk Management
Unfortunately, that kind of response is not unusual or unfamiliar to even basic risk management questions, particularly when there is a pressing need for results. Risk management is time consuming and consequently costly but it is often more costly to rush forward without considering risk, because when the unexpected happens, we have to react, which involves delay, rework, and sometimes waste. In Gene’s case, not considering the areas of uncertainty means that important areas of planning might be overlooked; potentially impacting work, schedule, and cost expansion by unknowingly accepting significant liabilities related to property and safety. Part of the problem is that Gene (like many) thinks of risk as interference to his plans and timelines.


Merging Old and New: Embracing the Hybrid Cloud
It requires careful planning to manage a private cloud and a third-party public cloud host. But for companies that want to get the benefit of new technology while still needing to provide bullet-proof continuity of operations, the old and the new need to work together. Many established companies with significant IT infrastructure are making the decision to develop a hybrid cloud. For example, NiSource Inc., one of the largest natural-gas transmission companies in the U.S., recently said that it plans to move to a hybrid cloud.


How to boost creativity in your organization?
“Being creative is going to be associated with a lot of failure,” says Dr. Lynne Vincent, co-author of Outside Advantage: Can Social Rejection Fuel Creative Thought? “You have to have the confidence to persevere and continue on past the hurdles and barriers.” People say they value creativity, but in reality they celebrate the successful outcome of its implementation. I have seen many organizations stuck in a creativity slump as their employees focus too much on what they’re working on and they don’t see the forest for the trees. One question I am asked often times is: how do I boost creativity in my organization?


How To Use BGP Prefix-Independent Convergence
BGP Prefix-Independent Convergence is described in a draft RFC, which initially came out in September 2012 and was updated a couple of times in 2013 but is currently in an expired state with the IETF. Cisco does support PIC on all their routing platforms (IOS, IOS-XE, IOS-XR and NX-OS). The BGP PIC edge and core for the IP and Multiprotocol Label Switching (MPLS) function improves convergence after a network failure. This convergence is applicable to both core and edge failures on IP and MPLS networks. Normally, BGP can take several seconds to a few minutes to converge after a network change.


Internet of Things demands security by design
"Connected devices are effectively allowing companies to digitally monitor our otherwise private activities," Ramirez says. ... She points to "ubiquitous data collection" and the potential for consumers' information to be used or shared in ways they would not expect as particular areas of concern, along with the worry that manufacturers and service providers aren't adequately securing the data they collect. ... "The small devices are sort of a problem. You have limited capabilities in terms of computation," says Joseph Lorenzo-Hall, CTO at the Center for Democracy and Technology, a Washington digital rights group. "Some of them are meant to be very disposable and lightweight, which is going to be difficult to maintain and make a business case and do security upgrades for."


Why CIOs Should Turn To Cloud Based Data Analysis in 2015
CIOs are under tremendous pressure to quickly deliver big data platforms that can enable enterprises to unlock the potential of big data and better serve their customers, partners and internal stakeholders. Early adopter CIOs of big data report clear advantages of seriously considering and choosing the cloud for data analysis. These CIOs make a clear distinction between business critical and business enabling systems and processes. They understand the value that the cloud brings to data analysis and exploration and how it enables the business arm to innovate, react and grow the businesses.


Introduction to Puppet
unlike procedural scripts, Puppet’s language works across different platforms. By abstracting state away from implementation, Puppet allows you to focus on the parts of the system you care about, leaving implementation details like command names, arguments, and file formats to Puppet itself. For example, you can use Puppet to manage all your users the same way, whether a user is stored in NetInfo or /etc/passwd. This concept of abstraction is key to Puppet’s utility. It allows anyone who’s comfortable with any kind of code to manage systems at a level appropriate for their role. That means teams can collaborate better, and people can manage resources that would normally be outside their ken, promoting shared responsibility amongst teams.


Next Shift: From Big Data to Deep Data
As big data moves beyond hype to realized value, things are beginning to change. As we enter 2015, companies will move toward the "Deep Data" framework– an approach based on the premise that a small number of information-rich data streams, leveraged properly, can yield more value than masses of captured data. By shifting to a deep (rather than big) data approach, businesses are able to better understand their customers and offer actionable, scalable and customized insights while crucially enhancing the value of the economic investment in data to their businesses.



Quote for the day:

"Because a thing seems difficult for you, do not think it impossible for anyone to accomplish." --Marcus Aurelius


January 07, 2015

Risk Management through people
The Future of Risk Management is not just looking through the windshield; scanning the horizon might just be the most important thing to do, you cannot control or stop what is coming, you have to prepare to respond to it. So many organisations spend large amounts of money to focus and report only on what is happening inside the organization, where they actually have control. Your biggest risks are outside of the organization, where you have no control.  Key elements for the future of your risk strategy should include internal networking; you have to talk to the informal groups and their informal leaders just as much as you do talk to the executives and managers, maybe even more.


The CISO Challenge: Articulating Data Worth and Security Economics
If you are an online retailer and your web server goes down because of a major denial of service attack, what does that cost the business? How much revenue is lost every minute that site is offline? Enough to put you out of business? See the figure below that illustrates how to approach this conversation. If the impact of a breach and the risk of losing business is high and the investment in implementing a solution is relatively low, the investment decision is an obvious one (represented by the yellow area in the upper left corner). ... Another dimension Dave described is communicating the economics of a solution that could prevent an attack based on the probability that the attack would occur (see next figure below).


New Years Resolutions
Well, every post on this blog is designed to help with one of the many challenges of enterprise modeling – and so I thought it might be interesting to look at how I could model my New Year’s resolutions in ArchiMate. ... For one thing, a diagram is a lot more of a visual thing to print out and post on my wall – much more so than a simple list. ... Well, resolutions are all about setting goals to achieve desired results, so something from the motivation viewpoint seems right. Realizing my goals…let’s go with the goal realization viewpoint. The goal realization viewpoint permits Goals and Requirements, Principles and Constraints.


I want in! Sentiment analysis gives mobile app users a voice
At its most basic, sentiment analysis is about collecting and analyzing a set of textual data in an effort to extract or characterize the attitudes, opinions and emotions contained within, according to a set of predefined criteria. It does this through a combination of natural language processing techniques and textual data analysis, with a dose of computational linguistics tossed in. Sentiment analysis has been around for a few years now and has been used in a number of applications, often by consumer-focused companies. Today it is being taken to a deeper level as a driver of big data initiatives, as enterprises start to gather and assess customer sentiment on a large scale across multiple input channels.


Data Quality Predictions for 2015
The champagne has been drunk, the mince pies are eaten and we’re packing away the Christmas baubles for another year. After a well-earned rest, thousands of businesses are returning to face the challenges that the New Year will bring to their business, and that means refocusing efforts on quality, usable data. But the world of IT rarely stands still, and 2015 will bring immense change that will intensify our use of data and change our dependence on it.


Heatwave, Cooling Failure Bring iiNet Data Center Down in Perth
An unusually warm day coupled with what iiNet said was multiple air conditioner failure meant that some servers needed to be shut down. It was the hottest January day on record for the area since 1991, and the heatwave is expected to continue into the week.iiNet is the second-largest DSL Internet provider in Australia. Email and corporate websites went down; thousands of customers ended up offline. ... “We have had multiple air conditioners fail on site causing temperatures to rise rapidly,” company representative Christopher Taylor said in a forum post. “We have additional cooling in now. We will begin powering services back up once the room has cooled adequately. If we are premature the room won’t recover and risk the A/C failing again.”


In IoT standards battle, there is no neutral zone for this CTO
IoT capability has tremendous importance to Electrolux, Brockmann said. Take ovens, for instance. The appliance maker will be putting cameras inside ovens so a cook can check on how the roast chicken is progressing. In a true IoT world, the image of a browning roast ought to be viewable on any device, including TVs. But it won't happen if electronics vendors don't agree on protocols. By connecting products, the appliance maker can establish a lifelong relationship with the consumers, send recipes, deliver preventive maintenance, and offer information about new products, Brockmann said.


Evolution of containerization extends its cloud reach
"People are rethinking how they can deploy cloud applications as these distributed containers with loosely coupled data layers. … Docker folks are responding to that by making these things more lightweight and ultimately better-performing," Linthicum said. What does the future of containerization look like? As multi-cloud deployments increase, containers that are able to live-migrate from cloud to cloud -- as well as well-designed applications localized in containers and decoupling databases -- middleware and security creates this orchestration of containers, according to Linthicum.


Why You Need to Move Your Data Center to a Software-Defined Paradigm
In the new software defined paradigm you can find completely new approach to operating — no RAID related calculation, no SAN setup, no Zones creation, no special cabling or special switch hardware, architectural unlimited space and performance scaling. Standard 10 Gbps Ethernet network is enough. Disks, nodes, and rooms, are all suitable replication locations, which guarantee multiple replication levels and the deepest granularity of the replicated object. For this new storage model, you can easily add new disks to nodes or add rack of nodes to a system without any downtime during the maintenance. Rebalancing, migration, new replication and so on can be just programmed because this storage already a program.


Nvidia Demos a Car Computer Trained with “Deep Learning”
The computer uses Nvidia’s new graphics microprocessor, the Tegra X1. It is capable of processing information from up to 12 cameras simultaneously, and it comes with software designed to assist with safety or autonomous driving systems. Most impressive, it includes a system trained to recognize different objects using a powerful technique known as deep learning (see “10 Breakthrough Technologies 2013: Deep Learning”). The computer is also designed to generate realistic 3-D maps and other graphics for dashboard displays. “It’s pretty cool to bring this level of powerful computation into cars,” said John Leonard, a professor of mechanical engineering at MIT, who works on autonomous-car technology.



Quote for the day:

"The most important quality in a leader is that of being acknowledged as such." -- Andre Maurois

January 06, 2015

Flexibility in the Cloud: Customer-Defined Computing
What we wanted to do was give something that was analogous to the idea of a virtual data center. Customers could come, benefit from public cloud and its benefits, such as elasticity, the ability to manage equipment in all different geographies of the world from your own location, transparency of cost, those kind of things. But at the same time, keep the things that you like about your private environment: being able to control it, configure it and do so very accurately. That was the genesis of the idea and vision behind CloudSigma. It was to bring this sort of virtual data center approach to the public cloud.


Software-Defined Storage: What's Fact or Fallacy?
The problem is that SANs have traditionally been tightly bound to their own hardware: redundant controllers, shelves of drives and whatever features (such as replication or deduplication) the vendor could pack in. Upgrades can be expensive — or impossible — and when new capabilities are needed, the options to add them might not be available at all. With SDS, storage vendors offer an additional management layer on top of the storage architecture, which provides a set of upgradeable services and makes use of whatever SANs are available, not necessarily ones that run on the same platform or are made by the same manufacturer.


Samsung at CES 2015: Internet-of-Things is not science fiction, but 'science fact'
"It's not science fiction anymore. It's science fact," Yoon insisted. Yoon theorized consumer devices now have what it takes to make science fiction dreams real through the marriage of sensors and wireless connectivity, but also one more important ingredient: purpose. Part of the common rhetoric uttered at CES and even before the show by other Silicon Valley leaders have stressed that connected devices are really about people and solving problems. "We have to show consumers what's in it for them and what IoT can achieve," Yoon asserted, continuing that IoT also has the potential to "transform our economy, society, and how we live our lives."


BitYota Introduces Breakthrough Data Warehouse Technology
Availability of compute and storage groups manageable by end users. Building on BitYota’s unique capability to separate and elastically grow/shrink compute and storage nodes within a cluster, this feature collects BitYota instances running on these nodes into discrete storage or compute groups that can be assigned to individual users or business roles. This eliminates resource contention between long and short running jobs and enables better allocation of resources to improve performance and ability to meet service-level agreements (SLAs).


Is Agile Harder for Agencies?
Successful relationships require trust and honesty, and we shouldn’t be afraid of discussing this aspect of project management. If you do move away from a fixed scope of work, then the other two items (costs and timings) can be fixed – more or less. If you can get your clients to buy into this from a standing start then you are doing well. In fact you probably deserve a promotion. For most of us this is a continual discussion. Anyway, as soon as you’ve made headway on the argument that it makes little or no sense to try and fix the scope of a digital project, you usually run into a related concern, which we’ll look at next.


Benefits of Continuous Integration
This tip is not intended to go into any details about a particular CI tool or technology or to give instructions on setting up and configuring a CI server, but is instead intended to rationalise why a development team should consider spending the time and effort of implementing CI. After all, there is no such thing as a free lunch, and it takes time and effort to introduce CI. You need to select an appropriate tool that fits your existing technology ecosystem, and then you need to set up and configure it for use within your current development environment. All of this takes time and effort that could be utilized elsewhere.


CIO interview: Federico Florez Gutierrez, Ferrovial
Gutierrez says the CIO has to wear multiple hats today as technology changes promise businesses more than just operational efficiency. “I have three roles: as the CIO, I am in charge of IT for the company; as Innovation Officer I coordinate the business innovation function applying our open innovation methodology, and as chairman of the Purchasing Committee I lead the purchasing function for common families within the group,” he says. Gutierrez thinks IT is complex at Ferrovial owing to the variety of businesses in the group. For example, the IT team has to manage local applications and vertical applications and it centrally manages the communications, IT purchasing and IT security, for the entire group.


2015 is make or break for Microsoft
The problem child for Microsoft is mobile. Windows Phone was released in late November 2010, and more than four years later, after billions of dollars spent, including the purchase of Nokia’s phone and tablet business for more than $7 billion, Windows Phone will have only a 2.7% worldwide market share by the end of 2014, according to IDC. And that share is heading in the wrong direction, being down from a 3.3% worldwide market share in 2013. Windows tablets have fared only slightly better, with an expected 4.6% market share by year’s end.


Thick data closes the gaps in big data analytics
"Individual interaction rules can be interpreted in a deterministic way only up to a certain extent, due to the ultimate unpredictability of human reactions. It is the so-called bounded rationality, which makes two individuals react possibly not the same, even if they face the same conditions. In opinion formation problems this issue is of paramount importance, for the volatility of human behaviors can play a major role in causing extreme events with massive impact...." This is exactly the problem confronting many big data and analytics efforts as they probe into the dynamic of customer behaviors and develop predictability models for when particular customers are most likely to purchase, and what they are most likely to purchase.


Ronica Roth on Vision, Visibility and Business Agility
when you start getting into that alignment and that cadence and getting all of those teams doing mid-range planning together, then now you are beginning to look at something that looks a little like the Scaled Agile framework or some form of it; it doesn’t have to, but the pictures I have in my slides, the pictures that I’ve had for a long time and I look at the big picture of SAFe, ... but be performant and the things that getting the way of that I think are, so we could blow up our silos to do some pilot teams but are we really ready to blow up our silos for a hundred people, are we really ready to break out of a project mentality where we are assigning resources to projects and instead get into a product mentality where we were flowing work through teams



Quote for the day:

“Rank does not confer privilege or give power. It imposes responsibility.” -- Peter F. Drucker

January 05, 2015

Are PC Hard Drives Destined to Die at the Hand of the Cloud? Maybe, Analysts Say
Enterprises don’t like content stored on local devices because of the risk that it could leak outside company walls, and the costs associated with redundant storage placed right next to the worker. Connectivity problems, such as limited Wi-Fi at hotels and other locations, is fading away. And every time a company has bet on local services, such as Apple’s determination to sell MP3s rather than stream music, that company has lost. “The most disruptive technology in the market right now is Chromebooks,” Enderle said. The bottom line? There’s no easy answer to the question of whether local hard drives or SSDs are doomed.


10 things you should do to manage BYOA
BYOD and BYOA are both part of the greater movement of the consumerization of IT. People are used to consumer tools "just working," and that is part of the appeal of the BYOA movement. Many of the apps people bring into the workplace are designed to operate simply, much like their consumer counterparts. This can create problems for IT leaders, especially, as it changes expectations for other corporate software as well. You can manage the expectations by engaging employees and helping them understand the differences in the applications they are bringing in and the software your company relies on to run its core business processes.


D-Link shows off radical 802.11ac routers and Wi-Fi adapters at CES
The flagship DIR-895L/R is based on Broadcom’s BCM47094 chipset and can operate two independent networks on the 5GHz frequency band (with theoretical TCP throughput to 802.11ac clients of 2165Mbps on each), and a third network on the 2.4GHz band with theoretical TCP throughput of 1000Mbps. It will be outfitted with eight high-power antennas, and it supports MU-MIMO (multiple users-multiple input/multiple output) technology so that it can stream high-definition video and audio to multiple clients. The DIR-890L, equipped with six antennas, can also operate two independent 5GHz networks,


Hands-on with Makulu Linux Xfce 7.0: The most beautiful Linux distro I have ever seen
As has been the case in previous Makulu releases, this version includes the WPS Office Suite (aka Kingsoft Office). I don't want to get into a long discussion of the pros and cons of this choice, I will simply say that if you aren't happy with WPS, or you absolutely must have LibreOffice for whatever reason, all you have to do is go to the Software Center (or Synaptic, they are both installed) and install LibreOffice. I just did that, it took less than five minutes to download and install, LibreOffice was automatically added to the Office group in the Whisker menus, and of course is listed in synapse searches.


An example of preparatory refactoring
There are various ways in which refactoring can fit into our programming workflow. One useful notion is that of Preparatory Refactoring. This is where I'm adding a new feature, and I see that the existing code is not structured in such a way that makes adding the feature easy. So first I refactor the code into the structure that makes it easy to add the feature, or as Kent Beck pithily put it "make the change easy, then make the easy change". In a recent Ruby Rogues podcast, Jessica Kerr gave a lovely metaphor for preparatory refactoring.


Held for ransom by the digital ‘mob’
Consumer ransomware is, “a business model that’s going to scale, especially as we get control over more traditional cybercrime business models,” Dai Zovi said. “They’re (cyber criminals) basically entrepreneurs, and they’re going to shift when a new market gives them better returns than an existing market, or their existing market goes away.” Another reason is that, as has been clear for some time, just because a device is “smart,” does not mean it is secure. And embedded devices in the Internet of Things (IoT) are notoriously insecure.


Why doctors are excited about mobile blood pressure monitoring
There are a few reasons. For one, there is quite simply more data being gathered when a cuff worn around one’s arm checks blood pressure at regular intervals throughout a day. But this kind of mobile monitoring also helps catch two types of people who are easily misdiagnosed – those with “white coat” syndrome, who get nervous in doctor’s offices and experience artificially high blood pressure at precisely the time of monitoring (a condition that may affect as many as 30 percent of people thought to be hypertensive), and those who react oppositely, with lower readings either because they take their meds before going to the doctor’s or because they experience more stress in their home environment.


CIOs Need to Snap Out of Complacency
CIOs are spending more time overseeing the nitty-gritty of digital transformation work, such as implementing new systems and re­designing business processes, according to our survey. In some cases, that means a diminished role in big-picture strategic activities such as identifying new commercial opportunities. Specifically, 27 percent of our CIO respondents can be classified as business strategists this year, down from 34 percent last year. And 36 percent of CIOs admit they are fighting turf battles against others in the C-suite--a kind of tumult that can arise in times of big change.


White House plans to leave IT in better shape than it found it
Obama complained about the state of government IT almost as soon as he took office, when he was deprived of the use of his BlackBerry. In 2011, he called government IT operations across all agencies "horrible," and that was two years before the Healthcare.gov debacle. One issue faced by government IT is perception. When compared to the private sector, government IT is seen as a step or two behind in technology adoption. It's a fair assessment, Johnson said, "and I think we should be OK with that." The White House operates in a fishbowl, and any IT issues it faces may have a broader impact. Johnson prefers to have the private sector be the early adopter, with users figuring out new technologies, learning from their mistakes and then partnering with government.


Sony hack could be game changer
Despite passing a flurry of small-bore bills in late 2014, Congress has not moved major cybersecurity legislation in years. And the issues raised by the Sony incident — cyber relations with China, United Nations guidelines for how countries handle cyber issues — are not necessarily areas where Congress wields a heavy hand. “I’m not sure there’s such a direct output for Congress on the international side of things,” said Kristen Eichensehr, an international security professor at the University of California, Los Angeles, School of Law and former State Department attorney.



Quote for the day:

"Character is like a tree and reputation like a shadow. The shadow is what we think of it; the tree is the real thing." -- Abraham Lincoln


January 04, 2015

Big data needs a product like Microsoft Access
Such a product, call it “Big Access”, would connect to cloud data sources, spreadsheets, enterprise data sources, log files, and perhaps certain machine data beyond those log files. Big Access would also provide functionality for data quality, data blending, and data shaping. It would provide basic data visualization capabilities, though it would leave the fancy stuff to tools that already cover the visualization space. Big Access would also provide predictive analytics functionality. The amount of explicit effort required to build a predictive model on existing data in Big Access would actually be quite small.


Soon Your Tech Will Talk to You Through Your Skin
It’s not hard to see why designers are looking for a new conduit. Our eyes and ears, the dominant modes for the digital world, are full to bursting. Devices bombard us with text alerts and audio bleeps. Your skin, on the other hand, is an “underused channel,” says Raymond Kiefer, a safety expert who helped design GM’s vibrating seats. “This is a way to cut through the visual and auditory clutter.” There’s a danger here, of course. Vibrations cut through the white noise of today’s alert-o-sphere.


Top 10 Data Center Predictions for 2015
In 2014, mission critical innovation drove new standards in PUE reduction, water use and digital service efficiency. Pressing data center operator concerns include security, operational expense management and Internet of Things (IOT) growth. Everyone seems to be balancing big data, cloud and SDN initiatives. And with shadow IT coming to light, you have more internal influencers with input on your data center operations. So what does this mean for 2015? I forecast a year of incremental adaptation vs. radical change as industry buzz gives way to genuine innovation and proven methodologies. As much as some things will change, others will frustratingly stay the same.


5 Mobile Design Trends That Can Teach Us Something
There are so many apps within the App Store and there are so many more on Google Play. It’s hard to tell what the up and coming design trends are but it’s significantly easier to pick five current trends and analyze them. Let’s see how color, innovative ideas and simplicity of current apps can teach us a thing or two about mobile app design. ,,, It’s interesting to see that some apps out there are trying to promote a sophisticated and elegant vibe through design. It’s not something common on websites either, but it’s significantly less common among mobile apps.


Microsoft's karmic gaffe is 'opening up the conversation'
"There are biases about everything," said Larson-Green on December 5 in a 40-minute-long interview. Those biases affect women, but also minorities and even individuals with more introverted personalities. "Are there ways to bring out the best in people? That's been a really great conversation we've had internally." Larson-Green isn't the only woman in the leadership ranks at Microsoft. Amy Hood, a 12-year Microsoft veteran, was named CFO in May 2013. Women also head business development and human resources.


Hiring Cultural Creatives
Cultural creatives, many of whom are millennials, are employees who go beyond just producing to actually innovate new ideas. They are independent, seek achievement, thrive on ambiguity and risk taking, and look for new opportunities at every turn. Cultural creativeshave a desire to do work that matters and matches their values, contribute to a shared vision, and express their personal beliefs at the office. Many business gurus, from Creative Class author Richard Florida to Bill Gates, have extolled the importance of this new group of passionate workers to propel the 21st century economy forward.


Deciding When to Replace ERP Is Complicated
Replacing the ERP system may not be the most cost-effective solution to business issues. To gauge that aspect, an important first step is determining whether the process or data issues identified by users are the result of a poorly executed implementation. Midsize companies in particular don’t always get the most competent consultants to set up their software, especially if the consultant (or the individual running the project) is not familiar with the peculiarities of the company’s industry or its specific operating requirements. Checking in with user group members in a similar business is an easy way to confirm if the issue is systemic or simply a poor job of setting up the software.


If 2014 Was The Year Of The Data Breach, Brace For More
Data breaches dominated headlines in 2014, and they appear poised to usher in 2015 as well. While the cybersecurity plights of certain high-profile retailers, financial institutions, and one prominent movie studio became common knowledge and headline fodder, these companies were far from the year’s only victims. In fact, a recent study found that more than 40% of companies experienced a data breach of some sort in the past year – four out of ten companies that maintain your credit card numbers, social security numbers, health information, and other personal information. That number is staggering, and shows no signs of retreat.


'New Year will be crucial to Korea's cloud market'
This is because cloud computing can help business innovation by allowing companies to react to rapidly-changing business conditions and to quickly adopt new IT infrastructure without significant up-front costs. Consequently, Korean enterprises started to recognize cloud computing as a "business enabler" and "speed-to-market" facilitator for its ability to drive business agility. Also, there have been a series of outages in datacenters used by crucial infrastructures, caused by disasters, and they triggered a failure of IT functions at businesses. This made many companies consider equipping themselves with highly automated disaster recovery strategies, leveraging the benefits of cloud computing.


Q&A with John Sonmez on His Book on Soft Skills
Another major challenge is self-motivation. When you are sitting in an office it is easy to get into work-mode, but at home with a full refrigerator, XBox, television and other distractions, it can be easy to goof-off instead of working. A remote worker has to develop a good schedule and a very strict habit of self-discipline to avoid all the distractions from working at home. A few others are things like: communication--which can be more difficult when not done in person. Guilt--even when you get more work done, you might feel like you are not getting enough done, since no one can actually see you working.



Quote for the day:

"Try not to become a person of success, but rather try to become a person of value." -- Albert Einstein


January 03, 2015

Mainframe Futures: Reading the Tea Leaves
The question about the role of the mainframe then devolves to the underlying motivations of mainframe users - will they stay or will they migrate to nominally lower-cost platforms? I think the answer is kind of a blended analysis against a rapidly changing technology and workload background. While many workload have indeed migrated, primarily to RISC Unix and to a lesser extent to x86 Linux, much of the mainframe workload is still anchored to the mainframe by two underlying issues - software and overall scaleability and reliability.


How will the future of IoT impact data centers?
What complicates the whole issue is that data usage is often near-real-time. For example, when you shop, your location in the store can be detected. The time for personalized advertising is just one or two seconds. Most IoT data is "digested" on entry to the data center (e.g., face recognition turned into store location). The raw data is kept for a while, depending on what it is, so it will be streamed off to a disk farm. The output of digestion is a new, more valuable data stream. This, along with other streams, is sent to powerful analytics engines using big data techniques to generate inferences.


India lifts block on Vimeo; Pastebin, Internet Archive, others still banned
(...) Many of these wbsites [SIC] does not require any authentication for pasting any material on them. Other upload articles, Videos or photos or to download the contents which helps to hide the identities. These websites were being used frequently for pasting, communicating such content by just changing page name even blocking the earlier one. (...) Contact has also been made with some of the websites. These websites have undertaken not to allow pasting of such propaganda information on their website and also work with the Govt. to remove such material as per the compliance with the laws of land.


Problem Solving for Software Engineers
It may seem obvious that in order to be able to solve a problem we have to first understand it. Nothing is farther from reality in the IT business. It is not uncommon in my profession to see entire applications and architectures flowed and crippled by initial misunderstandings of a problem or requirement. While spending time to deeply understand what we have to build may not sound like the most ‘agile’ thing to do, the price to pay for a faulty start could be quite high. We usually start learning about the problem when analyzing software requirements that explain how things should work from the user’s perspective.


FBI seeks 'ethical' hackers to be 'cyber special agents'
"The FBI seeks highly talented, technically trained individuals who are motivated by the FBI's mission to protect our nation and the American people from the rapidly evolving cyber threat," Robert Anderson Jr., executive assistant director for the bureau's criminal, cyber, response and services branch, said in a statement Monday In its job post, which is open until Jan. 20, the agency said it has "many vacancies" for cyber special agents. Such agents, the FBI said, should have the skills to "conduct multi-faceted investigations of high-tech crimes, including cyber-based terrorism, computer intrusions, online exploitation and major cyber fraud schemes."


Get a good start with mob programming
”The basic concept of mob programming is simple: the entire team works as a team together on one task at the time. That is: one team – one (active) keyboard – one screen (projector of course). It’s just like doing full-team pair programming.” Read more about mob programming in his blog post or watch thisYouTube video of a real mob programming day compressed into a couple minutes.


How Big Data Will Transform Our Economy And Our Lives In 2015
But thinking ahead about wide-ranging technology and market trends is a useful exercise for those of us engaged in the business of partnering with entrepreneurs and executives that are building the next great company. Moreover, let’s face it: gazing into the crystal ball is a time-honored, end-of-year parlor game. And it’s fun. ... The global scale of the Internet, the ubiquity of mobile devices, the ever-declining costs of cloud computing and storage, and an increasingly networked physical word create an explosion of data unlike anything we’ve seen before.


Social Media Marketing Reaches Inflection Point
New analysis from the firm’s Analyzing Customers' Social Voices research found that the most important trend in social media analytics is cross-channel integration. Organizations are starting to integrate social media analytics with speech, text and Web analytics to cover all customer touch points. Disruptive technologies such as social media provide an opportunity to reshape organizations, change business models and transform industries, according to Deloitte’s 5th Annual Tech Trends Report. Over the years the focus of social business has shifted from measuring volume to monitoring sentiment, Deloitte said.


The future of storage: 2015 and beyond
The major problem facing any radically different storage technology is the extremely competitive market for existing techniques. This is, in one sense, like a commodity market -- vast and operating at very low margins. This makes it hard for any new idea to scale up quickly enough to claw back research, development and manufacturing costs in a reasonable timeframe. Yet the existing storage market is also quite unlike a commodity market in that it demands and gets continuous technological development through competition in two dimensions -- between drive manufacturers, and between solid-state and rotating media.


Message Structure Library
Generally, a message has a checksum field which is located in last byte(s) of message. It is an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data. Blocks of data entering these systems get a short check value attached, based on the remainder of a polynomial division of their contents; on retrieval the calculation is repeated, and corrective action can be taken against presumed data corruption if the check values do not match. And here's the class diagram of the message structure library:



Quote for the day:


"Leaders are more powerful role models when they learn than when they teach" -- Rosabeth Moss Kantor

January 02, 2015

Relating the IoT to Enterprise Business Strategy
According to Porter and Hepplemann, the key element of “smart, connected products” is they take advantage of ubiquitous wireless connectivity to unleash an era where competition is increasingly about the size of the business problem solved. Porter and Hepplemann claim that as smart, connected products take hold, the idea of industries being defined by physical products or services alone will cease to have meaning. What sense does it make to talk about a “tractor industry” when tractors represent just a piece of an integrated system of products, services, software, and data designed to help farmers increase their crop yield?


Zero Day Weekly: ISC hacked, SS7 mobile security, Windows privilege escalation
This week the Internet Systems Consortium site was hacked, a Lizard Squad member was caught (and released), a privilege escalation bug was revealed in Windows, SS7 research nuked mobile privacy beliefs, The Interview became an Android malware vector, post-breach perceptions of Sony and Staples were analyzed, and more.


Wearables Carve New Path To Health In 2015
"The wearables market is starting to see technology that produces richer and more precise user data than ever before. The problem we're seeing is that most fitness trackers are offering a flat world of data, without much insight beyond what an accelerometer can capture," Kenzen CEO Sonia Sousa told InformationWeek. "This is why wearable fatigue is so high. After about six months, you stop caring because the number of steps doesn't really change." Use of health-oriented wearables will almost triple between 2014 and 2018, according to Juniper Research.


Why the Software Defined Data Center is the Future
“[IO’s] approach to the data centre has been to build a physical data centre layer that is modular in its approach. Our modules can be componentised, delivered in separate pieces, at the right size to meet changing needs. Also it is configured and managed by stacking a software layer on top of the components so that you create a smart data centre – a data centre that has a path to connect to the application layer and react in a dynamic fashion. The application layer is changing, and the physical data centre can change the way it behaves to support that.”


Why Involving CFOs in Innovation Is No Longer Optional
CFOs can bring to the innovation discussion finance’s expertise and depth in data and analysis pertaining to core business metrics, especially when an innovation initiative is occurring in core business functions. In cases where an organization is considering more breakthrough or disruptive types of innovation, CFOs and finance should be at the table and thinking more broadly about the risks the company might be taking on and how those risks might impact, or relate to, other elements of risk. In addition, any time an organization assesses strategy and how innovation could contribute to the overall corporate growth agenda, the CFO should have a prominent voice in the discussion.


eBook: Securing Tomorrow – The Road To Business Resiliency
EMC’s new Business Resiliency eBook outlines why firms need to rethink their ability to consistently and systemically anticipate significant interruptions and failures while fulfilling all business commitments and requirements. Isn’t it time to prepare your business to withstand both the expected and unexpected? Read the blogs (Left column) by security experts or jump to an eBook chapter (Right column) to learn more.


Why you don't need a SAN any more
Scale-Out File Server is the logical endpoint of Windows Server 2012 R2's software-defined storage. It's fast, flexible, and cheaper than the SAN alternatives. It might not be for every network, but it's also something you can build up to, as you start to use Storage Spaces and then add clustering to your network. The end result is a storage fabric, much like that used by Azure -- and ready for your own private cloud. While it's not suitable for all workloads in this version (especially not SharePoint and other document-centric services), Scale-Out File Server is ideal for hosting virtual machine images and virtual hard disks, for handling databases and for hosting web content.


Preparing for the data center of the future
The data center of 2020 will look vastly different from today's data center in a variety of ways. As application silos are broken down and resource tiers consolidated, the result will be data centers that consist of three hardware tiers -- for processing, memory and storage. Applications will dynamically allocate resources from each of the tiers, providing the required elasticity to respond to changing demands. With the advent of cheaper memory, more federal agencies will adopt in-memory computing technology to reduce application response times. That approach has the added benefit of transferring the load from transactional databases, which can further reduce licensing and operating costs.


SQL Stored Procedure Performance improvement
In this article we will focus on basic things which are useful to increase performance of the stored procedure for fetching or retrieving data. We will try to understand what kind of precautions we should take while creating a stored procedure for fetching or retrieving data. ... Stored Procedure for fetching or retrieving data from database may take long time to execute. Following are some points which will help to improve performance of such type of stored procedures


ScALeD – Scaled Agile and Lean Development
ScALeD – Scaled Agile and Lean Development – is not another scaling framework. We see ScALeD primarily as a practitioner driven movement to help organizations to find a sound and balanced approach to agile transition and scaling questions. Inspired by Lean and agile values, driven by principles and completed through various practices and frameworks. Our main mission is to create awareness about what agility can mean for an organization. The core of ScALeD is a set of 13 principles, structured into 5 pillars. The pillars or outline of ScALeD resemble the main lean values:



Quote for the day:

"Always do right. This will gratify some people and astonish the rest.” -- Mark Twain

January 01, 2015

Template Method Design Pattern in .Net
Template method design pattern falls under the category of Behavioral Design Pattern. In this pattern, a template method defines a skeleton of an algorithm in terms of abstract operations. The template method can contain one or more steps. But these steps will have to be in abstract form only. That
Template method design pattern falls under the category of Behavioral Design Pattern. In this pattern, a template method defines a skeleton of an algorithm in terms of abstract operations. The template method can contain one or more steps. But these steps will have to be in abstract form only. That said, we cannot change the order of steps, and most importantly we cannot override the template method itself.


How Could Big Data Change Oncology?
The huge range in the origin and progression of each form of cancer requires a level of decision-making that might never be reducible to algorithms. ... A false negative is equally harmful, offering the illusion of good health that might cause a patient to pass the point at which treatment could have been life-saving. Unless and until the tools for analyzing cancer and the metabolic pathways it exploits are much more refined—a process that could take decades—there will be a need for the judgment of humans in the interpretation of big data. In no other area of medicine is this so clear as in oncology.


100+ Top Agile Blogs
It seems that I got a pretty long list therefore I am passing it to you. The list is ordered based on Alexa.com raking with the exception of the top three blogs where I could not isolate personal blogs from msdn.com and blogspot.de therefore the top three are not accurate. If you find any errors, or if you have more blogs to add to this list just contact me :) If you find more blogs that you think that could be added to this list just leave a comment. I hope you appreciate this list.


Big Data Knows When You're Going to Quit Your Job Before You Do
Computer predictions aren’t just about making office life a little more pleasant. Airbnb uses a variation of these algorithms to predict which renters and guests would be the best fit. The room-rental site says the technology has improved matches by 4 percent. Airbnb is currently developing a system to look at the photos of homes uploaded to the site and figure out how “attractive” they are to customers. “We are trying to promote listings with more attractive images,” says Maxim Charkov, the search lead at Airbnb. Eventually, Airbnb may offer a digital interior designer that predicts ways to enhance listings and spruce up homes to increase bookings.


IT pro's revitalization guide 2015
For seasoned and new IT leaders alike, the new year is a good excuse to pause and take stock of your professional and personal progress in our always interesting, always chaotic industry. Take a few moments to read through all the best of Computerworld's management and career articles, or click a link below to skip directly to your chosen topic.


We Need No Less Than Pervasive Leadership
We need leader-full organizations in order to thrive in the present and in the future. Pervasive Leadership combines aspects of servant leadership, chaordic leadership, and personal leadership operationalized through facilitative leadership tools and techniques. It assumes that “leader” does not presume follower in the traditional sense, and that true followers cannot be forced to follow. It also recognizes everyone in the organization has leadership potential and responsibility. In other words, we need leaders who are competent to and capable of using the tools ofauthentic power. This means that they must do as they say is best, the most difficult thing to do under difficult circumstances. Their work as a leader is first and foremost work on themselves.


Chief analytics officer: The ultimate big data job?
"When you start thinking about how to organize your analytics better and how to get more bang for the buck, you'd better be thinking about hiring a chief analytics officer," says Bill Franks, CAO at data-services firm Teradata. "You can't take analytics where you want to without someone who's accountable for those strategic decisions." There's plenty of upside in adopting a more strategic approach to big data. In a recent study by management consultancy EY, for example, 69% of companies said customer experience was vital to their growth strategies, but just 12% said they take full advantage of analytics to extract customer insights and deliver better customer service.


Samsung brings curved screen from TV to PC
The Ativ One 7 Curved is a good example of Samsung's engineering chops, but the product has some flaws. It does not have a touchscreen, which is common in all-in-one desktops from Lenovo, Hewlett-Packard, Dell, Asus, Acer and other PC makers. Samsung's PC division doesn't yet have touch technology for curved screens, Ng said. Creating the all-in-one was a challenge as the electronics needed to be behind the curved display. All-in-one PCs have processor, memory, storage and other components behind the display. Samsung installed a slightly curved motherboard at the back of the display. Samsung's PC division worked with the TV business unit to make the all-in-one, Ng said.


Hadoop Isn't for Everyone
Well get ready for your desires for the in-house capacity and staff of experts to go unfulfilled long term.Data scientists are a rare breed and the bulk of Hadoop experts in the market are being snapped up quick by companies building and offering MapReduce services like HortonWorks, CloudEra and GoGrid. And unless you have IPO stock to offer or are an attractive acquisition candidate, you will likely find it hard to win this rare breed of employee - let alone hold onto the ones you have already. The financial and skills shortage realities around big data will drive much of your desire for better customer insight and creation of predictive applications to leverage pre-built big data services that reside in the cloud.


Is Open Source Collaboration the Key to Better Communication?
Communication has been pushed to new heights with advancing smartphone capabilities and cloud-based applications and services, but are these technologies making communication better? One of the benefits of modern communication systems is the reduced friction of team and business collaboration. To fully realize the promise of these modern technologies, they must fit into daily workflows. They cannot be disruptive and must be complementary to how employees want to work.



Quote for the day:

"The value of a company is the sum of the problems you solve." -- Daniel Ek


December 31, 2014

The Greatest Tech Wins and Epic Comebacks of 2014
While 2014 didn't bring much in the way of revolutionary technology, it was a great year for refinement. The products and services we've relied on for years became cheaper and more accessible, while once-difficult concepts like virtual reality and mobile wallets starte to look a little more practical. And if you look hard enough, you can even find some examples where the government didn't screw everything up. Here are the top 10 products, companies and ideas that emerged victorious in the tech world this year.


REST-y Reader
In the first list are books that speak directly to the work of HTTP, APIs, REST, and Hypermedia. These are certainly not the only books on these subjects but they are the ones I find myself referring to most often in my own work. The second list contains books that, while not directly in the field of APIs, have affected my thinking on the way we design and implement stuff on the Web. I had a hard time narrowing down this list and there are quite a few more I’d add but I’ll save that for another time. Finally, I added a section named "Other Resources." These are sources that I have found useful over time that are not in full-on book form.


11 things to consider before going to work for a startup
The fact of the matter, according to Robert Half Technology data, is that 8 out of 10 employees prefer the structure and stability of an established organization over the volatility of the startup market ... We hear a lot about startup success stories, but the fact is that most fail. Different statistics put the average failure rates from 40 percent to as high as 90 percent. According to this Wall Street Journal article, 3 out of 4 startups fail. What does that mean for you? It means you’ve got to do your research and make sure the organization you go with has the best chances of survival.


The Top Technology Failures of 2014
All successful technologies are alike, but every failed technology flops in its own way. Success means a technology solves a problem, whether it’s installed on a billion smartphones or used by a few scientists carrying out specialized work. But many—maybe most—technologies do not succeed, typically because they fail to reach the scale of adoption that would make them relevant. The reasons for failure aren’t predictable. This year we saw promising technologies felled by Supreme Court decisions, TV cameras, public opinion, and even by fibbing graduate students.


Technology’s Impact on Workers
The internet and cell phones have infiltrated every cranny of American workplaces, and digital technology has transformed vast numbers of American jobs. Work done in the most sophisticated scientific enterprises, entirely new technology businesses, the extensive array of knowledge and media endeavors, the places where crops are grown, the factory floor, and even mom-and-pop stores has been reshaped by new pathways to information and new avenues of selling goods and services. For most office workers now, life on the job means life online.


Nine insanely long-running tech lawsuits
At the center of Charles Dickens's Bleak House is the fictional court case of Jarndyce and Jarndyce, a dispute over an inheritance that has gone on for decades. It may have been inspired by the legal wrangle over the estate of William Jennens, which incredibly dragged on for more than a century and ended only when legal fees had devoured all that remained of Jennens's vast wealth. The tech industry has seen a number of long-running lawsuits as well. While none have gone on for quite so long, the fast pace of technological change means that often, no matter who wins or loses, the tech world has changed so much by the time the verdict arrives that it becomes difficult to remember what the argument was about in the first place.


Delivery by drone: French postal video shows it can be done
News reports say from France say the test took place near the town of Pourrières, which is in the southern region of Provence. La Poste has not specified when the service will be in full swing, but suggested that it anticipates using Géodrone to provide service to residents in remote mountainous and maritime regions. The Géodrone project represents another impressive achievement for France’s emerging unmanned aircraft industry. Earlier this year, drone enthusiasts in the Alps conducted a Star Wars-style pod race in a French forest with the permission of the local government. Meanwhile, a researcher in Holland has showed how an ambulance drone can deliver a defibrillator to a heart attack victim in under two minutes.


Infrastructure Analysis -- A New Culture of Analytics
there is a significant amount of information that organizations can learn through deeper analysis of the underlying infrastructure. A time map of the time network architecture is useful for large corporate networks improving a legacy of unreliable, imprecise, un-adaptable time sources across the network and applications. A time map can identify, for example: an application server responsible for distributing unreliable time across the network and all applications that rely on it, time distribution networks falling out of sync when companies glue time distribution networks together ...  if the system is relying on the sources that sync back to the same source, and how far downstream the tie source is and how reliable it is.


India blocks 32 websites, including GitHub, Internet Archive, Pastebin, Vimeo
Internet users in India are starting to lose to access websites including GitHub, Internet Archive, Pastebin, and Vimeo under an order from India's DoT (Department of Telecom). It appears an order to block the sites issued on December 17 is taking effect -- albeit unevenly. Today, Centre for Internet and Society (Bangalore, India) Policy Director Pranesh Prakash posted a copy of the notice listing the 32 blocked URLs. ... Problems accessing GitHub are going to be especially painful for India's enormous developer workforce, and will definitely impact both India's domestic and outsourced software development business sector.


Windows Server cloud support unlikely bedfellow for Google
From Google's perspective, Microsoft is a dominant force in enterprise computing, any service that doesn't support Microsoft technologies could face extinction in the enterprise. The move also shows that Google is willing to open itself up to a competitor's technologies if it is in the best interests of mutual customers -- a trait Microsoft seems increasingly willing to manifest as well. Running Windows on Google may increase the likelihood of further price-competition wars in the cloud space. Google does not have much of an edge or a differentiator against Amazon Web Services (AWS) or Microsoft, so it is primarily left to compete on price.



Quote for the day:

"You have to put in many, many, many tiny efforts that nobody sees or appreciates before you achieve anything worthwhile." -- Brian Tracy


December 30, 2014

Consumerization Of Government Services Starts With Case Management
With a case-centric approach, agencies can track information more efficiently, make automated intelligent decisions, and route casework accordingly. This can mean serving a specific customer and fulfilling a request, or working across agencies to achieve a shared result, such as solving a crime, reducing the time required to determine whether a citizen is eligible for certain benefits, or even responding to a natural disaster and supporting recovery. The move to digital is critical if agencies wish to improve their standard of service -- and it means taking a holistic perspective at how your agency interacts with customers and considering new ways to leverage technology.


The World's Biggest Data Breaches, In One Incredible Infographic
In late November, hackers targeted Sony Pictures Entertainment in an unprecedented cyber attack. This led to the exposure of thousands of sensitive emails from Sony executives and threats to release more if the release of the film "The Interview" wasn't canceled. While this breach was indeed historically devastating, it's not the first successful cyber attack on a big corporate powerhouse. The folks over at Information Is Beautiful have put together an amazing infographic with the biggest data breaches in recenty history. You can see when the attack happened, who it happened to, and how large the impact was.


Alleged tech support scammers come up with all kinds of alibis to counter complaints
All four allegedly operated telemarketing scams where consumers were told that their Windows PCs were infected with malware or needed to be optimized to work properly. Some consumers had contacted the companies themselves after seeing their websites or search result ads, while others had been cold-called by the firms. The "help" provided was largely worthless, and in some cases the companies' representatives planted malware on the victims' PCs, the FTC and Microsoft charged. Customers were charged hundreds for the calls or fast-talked into expensive multi-year service contracts.


The Future of Everything? It’s About People Connecting with People
While a majority of organizations are starting to embrace social, mobile, real-time to various extents, if you really stop to think about it, they are simply running to where they think customers are rather than taking the time to understand why they’re in each channel, what they expect and how they (and you) define value. More importantly, there needs to be an integrated experience in these channels that align with the new customer journey that’s taking shape and evolving every day. The traditional funnel that exists today, or what I refer to in the new book as the Cluster Funnel, reflects how businesses are organized today.


The 2015 State of the U.S. Health & Fitness Apps Economy
It’s difficult to know what the best apps are for anything. So many apps populate Google Play and Apple App Store for each category that it is nearly impossible to know what is quality and what is merely mediocre. To help people understand what the best apps are for tracking their health & fitness and medical goals, Applause, the 360º app quality company, introduces the ARC 360 research report on The 2015 State Of The U.S. Health & Fitness Apps Economy. The report also helps companies determine where they stand in terms of quality vis-à-vis their competitors.


Designers Are Ditching The Mouse For The “Flow” 3D Motion Touch Controller
Co-founder Tobias Eichenwald thinks there are better ways to work than squinting at a screen. He wants Flow to let you control your computer “blindly, unconsciously, naturally” — like a guitar. Normally, designers have to dig through Photoshop menus, then use a clumsy mouse or hit the bracket button, which changes things in increments that are too big. “You can never do pixel-perfect graphics” says Eichenwald. With Flow, you can bump up or down the hue or brush size in Photoshop, alter model angles in AutoCAD, switch layers in Illustrator, select frames in a video editing app, and more.


5 Hyperscale Lessons For Mainstream Datacenters
In 2014, industry watchers have seen a major rise in hyperscale computing. Hadoop and other cluster architectures that originated in academic and research circles have become almost commonplace in the industry. Big data and business analytics are driving huge demand for computing power, and 2015 should be another big year in the datacenter world. What would you do if you had the same operating budget as one of the hyperscale datacenters? It might sound like winning the lottery, or entering a world without limitations, but any datacenter manager knows that infrastructure scaling requires tackling even bigger technology challenges -- which is why it makes sense to watch and learn from the pioneers who are pushing the limits.


2015 Prediction: FinServ & Regulators Will See Opportunity in Internet of Things
some legal gray areas might be whether it would be okay if a third party aggregated the farm information, combined it with satellite imagery of fields, and sold subscriptions to trading shops? If so, would that service come under regulatory scrutiny? And if that data could affect share price, how public would this data be? Would regulators call foul on firms that could not correlate the sensor data and flag suspicious employee behavior? What responsibility would a firm have to adopt these surveillance measures? "Regulators are going to be tapping into all these techniques and speeding up," Bates said. It is very probable they will leverage sensor data to track more people and things, just as firms will use the data to innovate their strategies.


Neglected Server Provided Entry for JPMorgan Hackers
The relatively simple nature of the attack — some details of which have not been previously reported — puts the breach in a new light. In August, when Bloomberg News first reported on the attack, which ultimately compromised some account information for 83 million households and small businesses, the bank’s security experts and the Federal Bureau of Investigation feared a sophisticated adversary. Some suspected the attack, possibly with backing from Russia, was intended as retaliation against economic sanctions levied by the United States and its allies in response to Russia’s policies in Ukraine. By mid-October, however, that theory began to fray, and the F.B.I. officially ruled out the Russian government as a culprit.


WiFi Preps for 5G, IoT Roles
The so-called NG60 study group has had just two meetings so far and may require as much as two years to complete its first draft standard. It is working on an upgraded version of the 60 GHz version of WiFi, 802.11ad, capable of delivering 20 Gbit/s over a very short range. Ultimately, NG60 also may include hardware support for mesh networks that could deliver a Gbit/s over 200 to 400 meters for backhaul links on small-cell base stations. Researchers at InterDigital Inc. are building a prototype of a 60 GHz directional mesh architecture using electronically steered phased array antennas that could support up to five hops.




Quote for the day:

"Great things are not something accidental, but must certainly be willed." -- Vincent van Gogh