January 09, 2015

2015: The year the Internet crashes. Hard
Finally, let’s not forget good old human error. Logins and passwords are also being swiped by cyber-crooks from companies all the time As former FBI director Robert Mueller said this summer, “There are only two types of companies — those that have been hacked, and those that will be.” Even the tech elite are vulnerable. Earlier in December, ICANN, which oversees DNS, was hacked. The attacker got access to user information, including email and postal addresses. ISC, makers of BIND, the world’s most popular DNS software, also got hit, but we don’t know what, if any, information was taken from the site.


Denmark throws down $75m to build up offensive cybersecurity capabilities
Most of the initiatives outlined in the strategy however discuss better cyber-preparedness by government agencies, their suppliers, and private sector critical infrastructure providers. Danish defence minister Nikolaj Wammen said of the threats facing the country: "there are external actors exploiting the internet to spy on Denmark and to steal trade secrets." If Denmark is building up its cyber-offensive capabilities, it joins a growing list of nations whose intelligence services have used malware to spy on foreign targets or, as in the case of Stuxnet, used it to target other countries' national infrastructure.


3 Practical Tips for Effective BI Dashboard Design and Implementation
According to the preeminent expert on data visualization and analysis, Stephen Few, a dashboard is a “visual display of the most important information needed to achieve one or more objectives; consolidated and arranged on a single screen so the information can be monitored at a glance.” The challenge is not necessarily building the resources to display, it’s to design and present these resources effectively and in a way that makes the processing of the information quickly. That leads us to an overarching and significant dichotomy of sorts in the BI universe. A BI solution has a number of interrelated components, and if you want a BI solution that’s successful and sustainable, all of these components need to be wrapped together harmoniously.


Cloud, Mobility, Big Data Key To Growth In Managed Services Space
“Many managed service providers have backgrounds as technicians, so there is a constant focus on taking advantage of technology innovation. Most solution providers are also starting to look toward moving into that environment, where they have end-to-end control,” he explained. The strongest MSPs are looking at how to enhance their offerings around mobility, cloud computing and big data, he said, but noted that the latter may not yet be ideal for all clients. “I think people use the term ['big data'] but don’t yet know what it means in the managed services provider space. From a solution provider’s perspective, we have to look at our client’s perspective and see if this can actually help them,” he said.


The era of big data won’t materialise without fast data
Enterprises could spend years, even decades making sense of the information they’re collecting. However, the current business climate requires, above all else, agility, and in order to remain competitive, organisations must be able to make decisions at near-real-time speed. Furthermore, as applications are required to meet increasingly demanding SLAs, this requires the ability to process data as rapidly as it is being generated. With traditional computing, this isn’t possible. The need to process exponentially growing datasets instantaneously will undoubtedly prompt innovations that haven’t even entered the big data discussion yet.


Radware 2014-15 Global Application & Network Security Report
This year’s report illuminates how security attacks are more complex, even as macro-IT trends contribute to the dissolution of security effectiveness. Research confirms that the motives, means, and effectiveness of security attacks are on the rise – and it also highlights the need for greater agility to quickly adapt to evolving threats. In addition to results survey, expert analysis and data visualization, the report also includes a checklist that can be used for evaluating your preparedness for attack detection and mitigation capability. This tool should prove valuable in assessing your attack resiliency.


8 Skills to Look for in IT Project Managers
As the economy continues to climb out of recession, demand for project management professionals has skyrocketed. Finding the right project management talent for mission-critical IT projects can be difficult, as the role requires a unique mix of technical and soft skills. In addition to the usual suspects -- attention to detail, focus on process, time management and capability to multitask, for instance -- there are some less obvious, but equally crucial, skills that separate the good from the great. Here, our experts weigh in on what to look for when hiring IT project managers.


EMC to Leverage Big Data to Target Channel Marketing Dollars
While EMC is among the furthest along in terms of leveraging big data analytics in the channel, it won’t be too long before every major vendor is heading down the same path. While it may be a while before big data analytics can be applied against the entire small-to-medium (SMB) category, it’s clear that as far as large accounts are concerned vendors intend to leverage big data analytics to more tightly align channel partners with their internal sales staffs. In fact, the goal is nothing less than to both uncover and then lock up sales opportunities long before any actual request for proposal actually gets generated.


Apple has a serious problem with software quality
What started out as robust and stable ecosystems have increasingly become buggy and problematic. For me the problems don't appear to be anywhere near as bad as they became on the Windows platform, but they are getting there. If things continue as they are, I can foresee a future where an iOS or OS X release is as buggy as Windows Vista was when it was released. Ironically, Microsoft has been working hard to clean up its act, although the current situation, where patches are being pushed out to fix problems caused by earlier patches is horrendously messy. And while we are on the subject of patches, Apple is slow when it comes to delivering fixes for problems, and far too many never get fixed and end up being rolled forward to the next major release, which is just unacceptable.


Personal Healthcare Data: Patients Will Take Control
It’s a very different look and the doctor is now a partner. Patients have more equal footing because they have the power of their own data and information. They get to choose whether they’re going to share it, who they are going to share it with, and when they are going to share it. In effect, they own the data, which they never owned before. Most consumers do want their data. Every survey suggests that 80 percent want it. Most physicians don’t want to give the data. Seventy percent will not give copies of office notes to patients and almost the same percent won’t even email with patients. So, we have a mismatch of what consumers want and what the dominant proportion of doctors are willing to give and do.



Quote for the day

"Most discussions of decision making assume that only senior executives make decisions. This is a dangerous mistake." -- PeterDrucker

January 08, 2015

Using the Kanban Canvas for Driving Change
Systems Thinking uses the iceberg metaphor, where individual events are what we see above the water line. Below the water, often unobserved, are the patterns of events over time. Below that are the system structures that create those patterns, and even further down are the mental models that lead to those structures. To begin to understand the systemic problems we want to address, we first need to look for the patterns. One way of finding patterns is through narrative. I ask people to tell stories about what has happened in the past, over time.


Corporate officers — security changes for 2015!
CSOs rarely quantify a return on investment, as the rest of your department heads can. Instead, CSOs talk about threats to other companies, and deep down you’re wondering who would have both the inclination and capability to attack your company anyway? You have firewalls, and you’re forced to memorize (okay, write down in your secret place) longer and longer passwords that NOBODY could guess. You’re compliant with your industry standards, such as PCI (for payment cards) and HIPAA (health records), so you must be protected. In short, you need to trust your CSOs to do their jobs, just as you trust your CFOs — in the same way that President Reagan trusted the Soviet Union to disarm: “Trust but verify.”


We Don’t Have Time for Risk Management
Unfortunately, that kind of response is not unusual or unfamiliar to even basic risk management questions, particularly when there is a pressing need for results. Risk management is time consuming and consequently costly but it is often more costly to rush forward without considering risk, because when the unexpected happens, we have to react, which involves delay, rework, and sometimes waste. In Gene’s case, not considering the areas of uncertainty means that important areas of planning might be overlooked; potentially impacting work, schedule, and cost expansion by unknowingly accepting significant liabilities related to property and safety. Part of the problem is that Gene (like many) thinks of risk as interference to his plans and timelines.


Merging Old and New: Embracing the Hybrid Cloud
It requires careful planning to manage a private cloud and a third-party public cloud host. But for companies that want to get the benefit of new technology while still needing to provide bullet-proof continuity of operations, the old and the new need to work together. Many established companies with significant IT infrastructure are making the decision to develop a hybrid cloud. For example, NiSource Inc., one of the largest natural-gas transmission companies in the U.S., recently said that it plans to move to a hybrid cloud.


How to boost creativity in your organization?
“Being creative is going to be associated with a lot of failure,” says Dr. Lynne Vincent, co-author of Outside Advantage: Can Social Rejection Fuel Creative Thought? “You have to have the confidence to persevere and continue on past the hurdles and barriers.” People say they value creativity, but in reality they celebrate the successful outcome of its implementation. I have seen many organizations stuck in a creativity slump as their employees focus too much on what they’re working on and they don’t see the forest for the trees. One question I am asked often times is: how do I boost creativity in my organization?


How To Use BGP Prefix-Independent Convergence
BGP Prefix-Independent Convergence is described in a draft RFC, which initially came out in September 2012 and was updated a couple of times in 2013 but is currently in an expired state with the IETF. Cisco does support PIC on all their routing platforms (IOS, IOS-XE, IOS-XR and NX-OS). The BGP PIC edge and core for the IP and Multiprotocol Label Switching (MPLS) function improves convergence after a network failure. This convergence is applicable to both core and edge failures on IP and MPLS networks. Normally, BGP can take several seconds to a few minutes to converge after a network change.


Internet of Things demands security by design
"Connected devices are effectively allowing companies to digitally monitor our otherwise private activities," Ramirez says. ... She points to "ubiquitous data collection" and the potential for consumers' information to be used or shared in ways they would not expect as particular areas of concern, along with the worry that manufacturers and service providers aren't adequately securing the data they collect. ... "The small devices are sort of a problem. You have limited capabilities in terms of computation," says Joseph Lorenzo-Hall, CTO at the Center for Democracy and Technology, a Washington digital rights group. "Some of them are meant to be very disposable and lightweight, which is going to be difficult to maintain and make a business case and do security upgrades for."


Why CIOs Should Turn To Cloud Based Data Analysis in 2015
CIOs are under tremendous pressure to quickly deliver big data platforms that can enable enterprises to unlock the potential of big data and better serve their customers, partners and internal stakeholders. Early adopter CIOs of big data report clear advantages of seriously considering and choosing the cloud for data analysis. These CIOs make a clear distinction between business critical and business enabling systems and processes. They understand the value that the cloud brings to data analysis and exploration and how it enables the business arm to innovate, react and grow the businesses.


Introduction to Puppet
unlike procedural scripts, Puppet’s language works across different platforms. By abstracting state away from implementation, Puppet allows you to focus on the parts of the system you care about, leaving implementation details like command names, arguments, and file formats to Puppet itself. For example, you can use Puppet to manage all your users the same way, whether a user is stored in NetInfo or /etc/passwd. This concept of abstraction is key to Puppet’s utility. It allows anyone who’s comfortable with any kind of code to manage systems at a level appropriate for their role. That means teams can collaborate better, and people can manage resources that would normally be outside their ken, promoting shared responsibility amongst teams.


Next Shift: From Big Data to Deep Data
As big data moves beyond hype to realized value, things are beginning to change. As we enter 2015, companies will move toward the "Deep Data" framework– an approach based on the premise that a small number of information-rich data streams, leveraged properly, can yield more value than masses of captured data. By shifting to a deep (rather than big) data approach, businesses are able to better understand their customers and offer actionable, scalable and customized insights while crucially enhancing the value of the economic investment in data to their businesses.



Quote for the day:

"Because a thing seems difficult for you, do not think it impossible for anyone to accomplish." --Marcus Aurelius


January 07, 2015

Risk Management through people
The Future of Risk Management is not just looking through the windshield; scanning the horizon might just be the most important thing to do, you cannot control or stop what is coming, you have to prepare to respond to it. So many organisations spend large amounts of money to focus and report only on what is happening inside the organization, where they actually have control. Your biggest risks are outside of the organization, where you have no control.  Key elements for the future of your risk strategy should include internal networking; you have to talk to the informal groups and their informal leaders just as much as you do talk to the executives and managers, maybe even more.


The CISO Challenge: Articulating Data Worth and Security Economics
If you are an online retailer and your web server goes down because of a major denial of service attack, what does that cost the business? How much revenue is lost every minute that site is offline? Enough to put you out of business? See the figure below that illustrates how to approach this conversation. If the impact of a breach and the risk of losing business is high and the investment in implementing a solution is relatively low, the investment decision is an obvious one (represented by the yellow area in the upper left corner). ... Another dimension Dave described is communicating the economics of a solution that could prevent an attack based on the probability that the attack would occur (see next figure below).


New Years Resolutions
Well, every post on this blog is designed to help with one of the many challenges of enterprise modeling – and so I thought it might be interesting to look at how I could model my New Year’s resolutions in ArchiMate. ... For one thing, a diagram is a lot more of a visual thing to print out and post on my wall – much more so than a simple list. ... Well, resolutions are all about setting goals to achieve desired results, so something from the motivation viewpoint seems right. Realizing my goals…let’s go with the goal realization viewpoint. The goal realization viewpoint permits Goals and Requirements, Principles and Constraints.


I want in! Sentiment analysis gives mobile app users a voice
At its most basic, sentiment analysis is about collecting and analyzing a set of textual data in an effort to extract or characterize the attitudes, opinions and emotions contained within, according to a set of predefined criteria. It does this through a combination of natural language processing techniques and textual data analysis, with a dose of computational linguistics tossed in. Sentiment analysis has been around for a few years now and has been used in a number of applications, often by consumer-focused companies. Today it is being taken to a deeper level as a driver of big data initiatives, as enterprises start to gather and assess customer sentiment on a large scale across multiple input channels.


Data Quality Predictions for 2015
The champagne has been drunk, the mince pies are eaten and we’re packing away the Christmas baubles for another year. After a well-earned rest, thousands of businesses are returning to face the challenges that the New Year will bring to their business, and that means refocusing efforts on quality, usable data. But the world of IT rarely stands still, and 2015 will bring immense change that will intensify our use of data and change our dependence on it.


Heatwave, Cooling Failure Bring iiNet Data Center Down in Perth
An unusually warm day coupled with what iiNet said was multiple air conditioner failure meant that some servers needed to be shut down. It was the hottest January day on record for the area since 1991, and the heatwave is expected to continue into the week.iiNet is the second-largest DSL Internet provider in Australia. Email and corporate websites went down; thousands of customers ended up offline. ... “We have had multiple air conditioners fail on site causing temperatures to rise rapidly,” company representative Christopher Taylor said in a forum post. “We have additional cooling in now. We will begin powering services back up once the room has cooled adequately. If we are premature the room won’t recover and risk the A/C failing again.”


In IoT standards battle, there is no neutral zone for this CTO
IoT capability has tremendous importance to Electrolux, Brockmann said. Take ovens, for instance. The appliance maker will be putting cameras inside ovens so a cook can check on how the roast chicken is progressing. In a true IoT world, the image of a browning roast ought to be viewable on any device, including TVs. But it won't happen if electronics vendors don't agree on protocols. By connecting products, the appliance maker can establish a lifelong relationship with the consumers, send recipes, deliver preventive maintenance, and offer information about new products, Brockmann said.


Evolution of containerization extends its cloud reach
"People are rethinking how they can deploy cloud applications as these distributed containers with loosely coupled data layers. … Docker folks are responding to that by making these things more lightweight and ultimately better-performing," Linthicum said. What does the future of containerization look like? As multi-cloud deployments increase, containers that are able to live-migrate from cloud to cloud -- as well as well-designed applications localized in containers and decoupling databases -- middleware and security creates this orchestration of containers, according to Linthicum.


Why You Need to Move Your Data Center to a Software-Defined Paradigm
In the new software defined paradigm you can find completely new approach to operating — no RAID related calculation, no SAN setup, no Zones creation, no special cabling or special switch hardware, architectural unlimited space and performance scaling. Standard 10 Gbps Ethernet network is enough. Disks, nodes, and rooms, are all suitable replication locations, which guarantee multiple replication levels and the deepest granularity of the replicated object. For this new storage model, you can easily add new disks to nodes or add rack of nodes to a system without any downtime during the maintenance. Rebalancing, migration, new replication and so on can be just programmed because this storage already a program.


Nvidia Demos a Car Computer Trained with “Deep Learning”
The computer uses Nvidia’s new graphics microprocessor, the Tegra X1. It is capable of processing information from up to 12 cameras simultaneously, and it comes with software designed to assist with safety or autonomous driving systems. Most impressive, it includes a system trained to recognize different objects using a powerful technique known as deep learning (see “10 Breakthrough Technologies 2013: Deep Learning”). The computer is also designed to generate realistic 3-D maps and other graphics for dashboard displays. “It’s pretty cool to bring this level of powerful computation into cars,” said John Leonard, a professor of mechanical engineering at MIT, who works on autonomous-car technology.



Quote for the day:

"The most important quality in a leader is that of being acknowledged as such." -- Andre Maurois

January 06, 2015

Flexibility in the Cloud: Customer-Defined Computing
What we wanted to do was give something that was analogous to the idea of a virtual data center. Customers could come, benefit from public cloud and its benefits, such as elasticity, the ability to manage equipment in all different geographies of the world from your own location, transparency of cost, those kind of things. But at the same time, keep the things that you like about your private environment: being able to control it, configure it and do so very accurately. That was the genesis of the idea and vision behind CloudSigma. It was to bring this sort of virtual data center approach to the public cloud.


Software-Defined Storage: What's Fact or Fallacy?
The problem is that SANs have traditionally been tightly bound to their own hardware: redundant controllers, shelves of drives and whatever features (such as replication or deduplication) the vendor could pack in. Upgrades can be expensive — or impossible — and when new capabilities are needed, the options to add them might not be available at all. With SDS, storage vendors offer an additional management layer on top of the storage architecture, which provides a set of upgradeable services and makes use of whatever SANs are available, not necessarily ones that run on the same platform or are made by the same manufacturer.


Samsung at CES 2015: Internet-of-Things is not science fiction, but 'science fact'
"It's not science fiction anymore. It's science fact," Yoon insisted. Yoon theorized consumer devices now have what it takes to make science fiction dreams real through the marriage of sensors and wireless connectivity, but also one more important ingredient: purpose. Part of the common rhetoric uttered at CES and even before the show by other Silicon Valley leaders have stressed that connected devices are really about people and solving problems. "We have to show consumers what's in it for them and what IoT can achieve," Yoon asserted, continuing that IoT also has the potential to "transform our economy, society, and how we live our lives."


BitYota Introduces Breakthrough Data Warehouse Technology
Availability of compute and storage groups manageable by end users. Building on BitYota’s unique capability to separate and elastically grow/shrink compute and storage nodes within a cluster, this feature collects BitYota instances running on these nodes into discrete storage or compute groups that can be assigned to individual users or business roles. This eliminates resource contention between long and short running jobs and enables better allocation of resources to improve performance and ability to meet service-level agreements (SLAs).


Is Agile Harder for Agencies?
Successful relationships require trust and honesty, and we shouldn’t be afraid of discussing this aspect of project management. If you do move away from a fixed scope of work, then the other two items (costs and timings) can be fixed – more or less. If you can get your clients to buy into this from a standing start then you are doing well. In fact you probably deserve a promotion. For most of us this is a continual discussion. Anyway, as soon as you’ve made headway on the argument that it makes little or no sense to try and fix the scope of a digital project, you usually run into a related concern, which we’ll look at next.


Benefits of Continuous Integration
This tip is not intended to go into any details about a particular CI tool or technology or to give instructions on setting up and configuring a CI server, but is instead intended to rationalise why a development team should consider spending the time and effort of implementing CI. After all, there is no such thing as a free lunch, and it takes time and effort to introduce CI. You need to select an appropriate tool that fits your existing technology ecosystem, and then you need to set up and configure it for use within your current development environment. All of this takes time and effort that could be utilized elsewhere.


CIO interview: Federico Florez Gutierrez, Ferrovial
Gutierrez says the CIO has to wear multiple hats today as technology changes promise businesses more than just operational efficiency. “I have three roles: as the CIO, I am in charge of IT for the company; as Innovation Officer I coordinate the business innovation function applying our open innovation methodology, and as chairman of the Purchasing Committee I lead the purchasing function for common families within the group,” he says. Gutierrez thinks IT is complex at Ferrovial owing to the variety of businesses in the group. For example, the IT team has to manage local applications and vertical applications and it centrally manages the communications, IT purchasing and IT security, for the entire group.


2015 is make or break for Microsoft
The problem child for Microsoft is mobile. Windows Phone was released in late November 2010, and more than four years later, after billions of dollars spent, including the purchase of Nokia’s phone and tablet business for more than $7 billion, Windows Phone will have only a 2.7% worldwide market share by the end of 2014, according to IDC. And that share is heading in the wrong direction, being down from a 3.3% worldwide market share in 2013. Windows tablets have fared only slightly better, with an expected 4.6% market share by year’s end.


Thick data closes the gaps in big data analytics
"Individual interaction rules can be interpreted in a deterministic way only up to a certain extent, due to the ultimate unpredictability of human reactions. It is the so-called bounded rationality, which makes two individuals react possibly not the same, even if they face the same conditions. In opinion formation problems this issue is of paramount importance, for the volatility of human behaviors can play a major role in causing extreme events with massive impact...." This is exactly the problem confronting many big data and analytics efforts as they probe into the dynamic of customer behaviors and develop predictability models for when particular customers are most likely to purchase, and what they are most likely to purchase.


Ronica Roth on Vision, Visibility and Business Agility
when you start getting into that alignment and that cadence and getting all of those teams doing mid-range planning together, then now you are beginning to look at something that looks a little like the Scaled Agile framework or some form of it; it doesn’t have to, but the pictures I have in my slides, the pictures that I’ve had for a long time and I look at the big picture of SAFe, ... but be performant and the things that getting the way of that I think are, so we could blow up our silos to do some pilot teams but are we really ready to blow up our silos for a hundred people, are we really ready to break out of a project mentality where we are assigning resources to projects and instead get into a product mentality where we were flowing work through teams



Quote for the day:

“Rank does not confer privilege or give power. It imposes responsibility.” -- Peter F. Drucker

January 05, 2015

Are PC Hard Drives Destined to Die at the Hand of the Cloud? Maybe, Analysts Say
Enterprises don’t like content stored on local devices because of the risk that it could leak outside company walls, and the costs associated with redundant storage placed right next to the worker. Connectivity problems, such as limited Wi-Fi at hotels and other locations, is fading away. And every time a company has bet on local services, such as Apple’s determination to sell MP3s rather than stream music, that company has lost. “The most disruptive technology in the market right now is Chromebooks,” Enderle said. The bottom line? There’s no easy answer to the question of whether local hard drives or SSDs are doomed.


10 things you should do to manage BYOA
BYOD and BYOA are both part of the greater movement of the consumerization of IT. People are used to consumer tools "just working," and that is part of the appeal of the BYOA movement. Many of the apps people bring into the workplace are designed to operate simply, much like their consumer counterparts. This can create problems for IT leaders, especially, as it changes expectations for other corporate software as well. You can manage the expectations by engaging employees and helping them understand the differences in the applications they are bringing in and the software your company relies on to run its core business processes.


D-Link shows off radical 802.11ac routers and Wi-Fi adapters at CES
The flagship DIR-895L/R is based on Broadcom’s BCM47094 chipset and can operate two independent networks on the 5GHz frequency band (with theoretical TCP throughput to 802.11ac clients of 2165Mbps on each), and a third network on the 2.4GHz band with theoretical TCP throughput of 1000Mbps. It will be outfitted with eight high-power antennas, and it supports MU-MIMO (multiple users-multiple input/multiple output) technology so that it can stream high-definition video and audio to multiple clients. The DIR-890L, equipped with six antennas, can also operate two independent 5GHz networks,


Hands-on with Makulu Linux Xfce 7.0: The most beautiful Linux distro I have ever seen
As has been the case in previous Makulu releases, this version includes the WPS Office Suite (aka Kingsoft Office). I don't want to get into a long discussion of the pros and cons of this choice, I will simply say that if you aren't happy with WPS, or you absolutely must have LibreOffice for whatever reason, all you have to do is go to the Software Center (or Synaptic, they are both installed) and install LibreOffice. I just did that, it took less than five minutes to download and install, LibreOffice was automatically added to the Office group in the Whisker menus, and of course is listed in synapse searches.


An example of preparatory refactoring
There are various ways in which refactoring can fit into our programming workflow. One useful notion is that of Preparatory Refactoring. This is where I'm adding a new feature, and I see that the existing code is not structured in such a way that makes adding the feature easy. So first I refactor the code into the structure that makes it easy to add the feature, or as Kent Beck pithily put it "make the change easy, then make the easy change". In a recent Ruby Rogues podcast, Jessica Kerr gave a lovely metaphor for preparatory refactoring.


Held for ransom by the digital ‘mob’
Consumer ransomware is, “a business model that’s going to scale, especially as we get control over more traditional cybercrime business models,” Dai Zovi said. “They’re (cyber criminals) basically entrepreneurs, and they’re going to shift when a new market gives them better returns than an existing market, or their existing market goes away.” Another reason is that, as has been clear for some time, just because a device is “smart,” does not mean it is secure. And embedded devices in the Internet of Things (IoT) are notoriously insecure.


Why doctors are excited about mobile blood pressure monitoring
There are a few reasons. For one, there is quite simply more data being gathered when a cuff worn around one’s arm checks blood pressure at regular intervals throughout a day. But this kind of mobile monitoring also helps catch two types of people who are easily misdiagnosed – those with “white coat” syndrome, who get nervous in doctor’s offices and experience artificially high blood pressure at precisely the time of monitoring (a condition that may affect as many as 30 percent of people thought to be hypertensive), and those who react oppositely, with lower readings either because they take their meds before going to the doctor’s or because they experience more stress in their home environment.


CIOs Need to Snap Out of Complacency
CIOs are spending more time overseeing the nitty-gritty of digital transformation work, such as implementing new systems and re­designing business processes, according to our survey. In some cases, that means a diminished role in big-picture strategic activities such as identifying new commercial opportunities. Specifically, 27 percent of our CIO respondents can be classified as business strategists this year, down from 34 percent last year. And 36 percent of CIOs admit they are fighting turf battles against others in the C-suite--a kind of tumult that can arise in times of big change.


White House plans to leave IT in better shape than it found it
Obama complained about the state of government IT almost as soon as he took office, when he was deprived of the use of his BlackBerry. In 2011, he called government IT operations across all agencies "horrible," and that was two years before the Healthcare.gov debacle. One issue faced by government IT is perception. When compared to the private sector, government IT is seen as a step or two behind in technology adoption. It's a fair assessment, Johnson said, "and I think we should be OK with that." The White House operates in a fishbowl, and any IT issues it faces may have a broader impact. Johnson prefers to have the private sector be the early adopter, with users figuring out new technologies, learning from their mistakes and then partnering with government.


Sony hack could be game changer
Despite passing a flurry of small-bore bills in late 2014, Congress has not moved major cybersecurity legislation in years. And the issues raised by the Sony incident — cyber relations with China, United Nations guidelines for how countries handle cyber issues — are not necessarily areas where Congress wields a heavy hand. “I’m not sure there’s such a direct output for Congress on the international side of things,” said Kristen Eichensehr, an international security professor at the University of California, Los Angeles, School of Law and former State Department attorney.



Quote for the day:

"Character is like a tree and reputation like a shadow. The shadow is what we think of it; the tree is the real thing." -- Abraham Lincoln


January 04, 2015

Big data needs a product like Microsoft Access
Such a product, call it “Big Access”, would connect to cloud data sources, spreadsheets, enterprise data sources, log files, and perhaps certain machine data beyond those log files. Big Access would also provide functionality for data quality, data blending, and data shaping. It would provide basic data visualization capabilities, though it would leave the fancy stuff to tools that already cover the visualization space. Big Access would also provide predictive analytics functionality. The amount of explicit effort required to build a predictive model on existing data in Big Access would actually be quite small.


Soon Your Tech Will Talk to You Through Your Skin
It’s not hard to see why designers are looking for a new conduit. Our eyes and ears, the dominant modes for the digital world, are full to bursting. Devices bombard us with text alerts and audio bleeps. Your skin, on the other hand, is an “underused channel,” says Raymond Kiefer, a safety expert who helped design GM’s vibrating seats. “This is a way to cut through the visual and auditory clutter.” There’s a danger here, of course. Vibrations cut through the white noise of today’s alert-o-sphere.


Top 10 Data Center Predictions for 2015
In 2014, mission critical innovation drove new standards in PUE reduction, water use and digital service efficiency. Pressing data center operator concerns include security, operational expense management and Internet of Things (IOT) growth. Everyone seems to be balancing big data, cloud and SDN initiatives. And with shadow IT coming to light, you have more internal influencers with input on your data center operations. So what does this mean for 2015? I forecast a year of incremental adaptation vs. radical change as industry buzz gives way to genuine innovation and proven methodologies. As much as some things will change, others will frustratingly stay the same.


5 Mobile Design Trends That Can Teach Us Something
There are so many apps within the App Store and there are so many more on Google Play. It’s hard to tell what the up and coming design trends are but it’s significantly easier to pick five current trends and analyze them. Let’s see how color, innovative ideas and simplicity of current apps can teach us a thing or two about mobile app design. ,,, It’s interesting to see that some apps out there are trying to promote a sophisticated and elegant vibe through design. It’s not something common on websites either, but it’s significantly less common among mobile apps.


Microsoft's karmic gaffe is 'opening up the conversation'
"There are biases about everything," said Larson-Green on December 5 in a 40-minute-long interview. Those biases affect women, but also minorities and even individuals with more introverted personalities. "Are there ways to bring out the best in people? That's been a really great conversation we've had internally." Larson-Green isn't the only woman in the leadership ranks at Microsoft. Amy Hood, a 12-year Microsoft veteran, was named CFO in May 2013. Women also head business development and human resources.


Hiring Cultural Creatives
Cultural creatives, many of whom are millennials, are employees who go beyond just producing to actually innovate new ideas. They are independent, seek achievement, thrive on ambiguity and risk taking, and look for new opportunities at every turn. Cultural creativeshave a desire to do work that matters and matches their values, contribute to a shared vision, and express their personal beliefs at the office. Many business gurus, from Creative Class author Richard Florida to Bill Gates, have extolled the importance of this new group of passionate workers to propel the 21st century economy forward.


Deciding When to Replace ERP Is Complicated
Replacing the ERP system may not be the most cost-effective solution to business issues. To gauge that aspect, an important first step is determining whether the process or data issues identified by users are the result of a poorly executed implementation. Midsize companies in particular don’t always get the most competent consultants to set up their software, especially if the consultant (or the individual running the project) is not familiar with the peculiarities of the company’s industry or its specific operating requirements. Checking in with user group members in a similar business is an easy way to confirm if the issue is systemic or simply a poor job of setting up the software.


If 2014 Was The Year Of The Data Breach, Brace For More
Data breaches dominated headlines in 2014, and they appear poised to usher in 2015 as well. While the cybersecurity plights of certain high-profile retailers, financial institutions, and one prominent movie studio became common knowledge and headline fodder, these companies were far from the year’s only victims. In fact, a recent study found that more than 40% of companies experienced a data breach of some sort in the past year – four out of ten companies that maintain your credit card numbers, social security numbers, health information, and other personal information. That number is staggering, and shows no signs of retreat.


'New Year will be crucial to Korea's cloud market'
This is because cloud computing can help business innovation by allowing companies to react to rapidly-changing business conditions and to quickly adopt new IT infrastructure without significant up-front costs. Consequently, Korean enterprises started to recognize cloud computing as a "business enabler" and "speed-to-market" facilitator for its ability to drive business agility. Also, there have been a series of outages in datacenters used by crucial infrastructures, caused by disasters, and they triggered a failure of IT functions at businesses. This made many companies consider equipping themselves with highly automated disaster recovery strategies, leveraging the benefits of cloud computing.


Q&A with John Sonmez on His Book on Soft Skills
Another major challenge is self-motivation. When you are sitting in an office it is easy to get into work-mode, but at home with a full refrigerator, XBox, television and other distractions, it can be easy to goof-off instead of working. A remote worker has to develop a good schedule and a very strict habit of self-discipline to avoid all the distractions from working at home. A few others are things like: communication--which can be more difficult when not done in person. Guilt--even when you get more work done, you might feel like you are not getting enough done, since no one can actually see you working.



Quote for the day:

"Try not to become a person of success, but rather try to become a person of value." -- Albert Einstein


January 03, 2015

Mainframe Futures: Reading the Tea Leaves
The question about the role of the mainframe then devolves to the underlying motivations of mainframe users - will they stay or will they migrate to nominally lower-cost platforms? I think the answer is kind of a blended analysis against a rapidly changing technology and workload background. While many workload have indeed migrated, primarily to RISC Unix and to a lesser extent to x86 Linux, much of the mainframe workload is still anchored to the mainframe by two underlying issues - software and overall scaleability and reliability.


How will the future of IoT impact data centers?
What complicates the whole issue is that data usage is often near-real-time. For example, when you shop, your location in the store can be detected. The time for personalized advertising is just one or two seconds. Most IoT data is "digested" on entry to the data center (e.g., face recognition turned into store location). The raw data is kept for a while, depending on what it is, so it will be streamed off to a disk farm. The output of digestion is a new, more valuable data stream. This, along with other streams, is sent to powerful analytics engines using big data techniques to generate inferences.


India lifts block on Vimeo; Pastebin, Internet Archive, others still banned
(...) Many of these wbsites [SIC] does not require any authentication for pasting any material on them. Other upload articles, Videos or photos or to download the contents which helps to hide the identities. These websites were being used frequently for pasting, communicating such content by just changing page name even blocking the earlier one. (...) Contact has also been made with some of the websites. These websites have undertaken not to allow pasting of such propaganda information on their website and also work with the Govt. to remove such material as per the compliance with the laws of land.


Problem Solving for Software Engineers
It may seem obvious that in order to be able to solve a problem we have to first understand it. Nothing is farther from reality in the IT business. It is not uncommon in my profession to see entire applications and architectures flowed and crippled by initial misunderstandings of a problem or requirement. While spending time to deeply understand what we have to build may not sound like the most ‘agile’ thing to do, the price to pay for a faulty start could be quite high. We usually start learning about the problem when analyzing software requirements that explain how things should work from the user’s perspective.


FBI seeks 'ethical' hackers to be 'cyber special agents'
"The FBI seeks highly talented, technically trained individuals who are motivated by the FBI's mission to protect our nation and the American people from the rapidly evolving cyber threat," Robert Anderson Jr., executive assistant director for the bureau's criminal, cyber, response and services branch, said in a statement Monday In its job post, which is open until Jan. 20, the agency said it has "many vacancies" for cyber special agents. Such agents, the FBI said, should have the skills to "conduct multi-faceted investigations of high-tech crimes, including cyber-based terrorism, computer intrusions, online exploitation and major cyber fraud schemes."


Get a good start with mob programming
”The basic concept of mob programming is simple: the entire team works as a team together on one task at the time. That is: one team – one (active) keyboard – one screen (projector of course). It’s just like doing full-team pair programming.” Read more about mob programming in his blog post or watch thisYouTube video of a real mob programming day compressed into a couple minutes.


How Big Data Will Transform Our Economy And Our Lives In 2015
But thinking ahead about wide-ranging technology and market trends is a useful exercise for those of us engaged in the business of partnering with entrepreneurs and executives that are building the next great company. Moreover, let’s face it: gazing into the crystal ball is a time-honored, end-of-year parlor game. And it’s fun. ... The global scale of the Internet, the ubiquity of mobile devices, the ever-declining costs of cloud computing and storage, and an increasingly networked physical word create an explosion of data unlike anything we’ve seen before.


Social Media Marketing Reaches Inflection Point
New analysis from the firm’s Analyzing Customers' Social Voices research found that the most important trend in social media analytics is cross-channel integration. Organizations are starting to integrate social media analytics with speech, text and Web analytics to cover all customer touch points. Disruptive technologies such as social media provide an opportunity to reshape organizations, change business models and transform industries, according to Deloitte’s 5th Annual Tech Trends Report. Over the years the focus of social business has shifted from measuring volume to monitoring sentiment, Deloitte said.


The future of storage: 2015 and beyond
The major problem facing any radically different storage technology is the extremely competitive market for existing techniques. This is, in one sense, like a commodity market -- vast and operating at very low margins. This makes it hard for any new idea to scale up quickly enough to claw back research, development and manufacturing costs in a reasonable timeframe. Yet the existing storage market is also quite unlike a commodity market in that it demands and gets continuous technological development through competition in two dimensions -- between drive manufacturers, and between solid-state and rotating media.


Message Structure Library
Generally, a message has a checksum field which is located in last byte(s) of message. It is an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data. Blocks of data entering these systems get a short check value attached, based on the remainder of a polynomial division of their contents; on retrieval the calculation is repeated, and corrective action can be taken against presumed data corruption if the check values do not match. And here's the class diagram of the message structure library:



Quote for the day:


"Leaders are more powerful role models when they learn than when they teach" -- Rosabeth Moss Kantor

January 02, 2015

Relating the IoT to Enterprise Business Strategy
According to Porter and Hepplemann, the key element of “smart, connected products” is they take advantage of ubiquitous wireless connectivity to unleash an era where competition is increasingly about the size of the business problem solved. Porter and Hepplemann claim that as smart, connected products take hold, the idea of industries being defined by physical products or services alone will cease to have meaning. What sense does it make to talk about a “tractor industry” when tractors represent just a piece of an integrated system of products, services, software, and data designed to help farmers increase their crop yield?


Zero Day Weekly: ISC hacked, SS7 mobile security, Windows privilege escalation
This week the Internet Systems Consortium site was hacked, a Lizard Squad member was caught (and released), a privilege escalation bug was revealed in Windows, SS7 research nuked mobile privacy beliefs, The Interview became an Android malware vector, post-breach perceptions of Sony and Staples were analyzed, and more.


Wearables Carve New Path To Health In 2015
"The wearables market is starting to see technology that produces richer and more precise user data than ever before. The problem we're seeing is that most fitness trackers are offering a flat world of data, without much insight beyond what an accelerometer can capture," Kenzen CEO Sonia Sousa told InformationWeek. "This is why wearable fatigue is so high. After about six months, you stop caring because the number of steps doesn't really change." Use of health-oriented wearables will almost triple between 2014 and 2018, according to Juniper Research.


Why the Software Defined Data Center is the Future
“[IO’s] approach to the data centre has been to build a physical data centre layer that is modular in its approach. Our modules can be componentised, delivered in separate pieces, at the right size to meet changing needs. Also it is configured and managed by stacking a software layer on top of the components so that you create a smart data centre – a data centre that has a path to connect to the application layer and react in a dynamic fashion. The application layer is changing, and the physical data centre can change the way it behaves to support that.”


Why Involving CFOs in Innovation Is No Longer Optional
CFOs can bring to the innovation discussion finance’s expertise and depth in data and analysis pertaining to core business metrics, especially when an innovation initiative is occurring in core business functions. In cases where an organization is considering more breakthrough or disruptive types of innovation, CFOs and finance should be at the table and thinking more broadly about the risks the company might be taking on and how those risks might impact, or relate to, other elements of risk. In addition, any time an organization assesses strategy and how innovation could contribute to the overall corporate growth agenda, the CFO should have a prominent voice in the discussion.


eBook: Securing Tomorrow – The Road To Business Resiliency
EMC’s new Business Resiliency eBook outlines why firms need to rethink their ability to consistently and systemically anticipate significant interruptions and failures while fulfilling all business commitments and requirements. Isn’t it time to prepare your business to withstand both the expected and unexpected? Read the blogs (Left column) by security experts or jump to an eBook chapter (Right column) to learn more.


Why you don't need a SAN any more
Scale-Out File Server is the logical endpoint of Windows Server 2012 R2's software-defined storage. It's fast, flexible, and cheaper than the SAN alternatives. It might not be for every network, but it's also something you can build up to, as you start to use Storage Spaces and then add clustering to your network. The end result is a storage fabric, much like that used by Azure -- and ready for your own private cloud. While it's not suitable for all workloads in this version (especially not SharePoint and other document-centric services), Scale-Out File Server is ideal for hosting virtual machine images and virtual hard disks, for handling databases and for hosting web content.


Preparing for the data center of the future
The data center of 2020 will look vastly different from today's data center in a variety of ways. As application silos are broken down and resource tiers consolidated, the result will be data centers that consist of three hardware tiers -- for processing, memory and storage. Applications will dynamically allocate resources from each of the tiers, providing the required elasticity to respond to changing demands. With the advent of cheaper memory, more federal agencies will adopt in-memory computing technology to reduce application response times. That approach has the added benefit of transferring the load from transactional databases, which can further reduce licensing and operating costs.


SQL Stored Procedure Performance improvement
In this article we will focus on basic things which are useful to increase performance of the stored procedure for fetching or retrieving data. We will try to understand what kind of precautions we should take while creating a stored procedure for fetching or retrieving data. ... Stored Procedure for fetching or retrieving data from database may take long time to execute. Following are some points which will help to improve performance of such type of stored procedures


ScALeD – Scaled Agile and Lean Development
ScALeD – Scaled Agile and Lean Development – is not another scaling framework. We see ScALeD primarily as a practitioner driven movement to help organizations to find a sound and balanced approach to agile transition and scaling questions. Inspired by Lean and agile values, driven by principles and completed through various practices and frameworks. Our main mission is to create awareness about what agility can mean for an organization. The core of ScALeD is a set of 13 principles, structured into 5 pillars. The pillars or outline of ScALeD resemble the main lean values:



Quote for the day:

"Always do right. This will gratify some people and astonish the rest.” -- Mark Twain

January 01, 2015

Template Method Design Pattern in .Net
Template method design pattern falls under the category of Behavioral Design Pattern. In this pattern, a template method defines a skeleton of an algorithm in terms of abstract operations. The template method can contain one or more steps. But these steps will have to be in abstract form only. That
Template method design pattern falls under the category of Behavioral Design Pattern. In this pattern, a template method defines a skeleton of an algorithm in terms of abstract operations. The template method can contain one or more steps. But these steps will have to be in abstract form only. That said, we cannot change the order of steps, and most importantly we cannot override the template method itself.


How Could Big Data Change Oncology?
The huge range in the origin and progression of each form of cancer requires a level of decision-making that might never be reducible to algorithms. ... A false negative is equally harmful, offering the illusion of good health that might cause a patient to pass the point at which treatment could have been life-saving. Unless and until the tools for analyzing cancer and the metabolic pathways it exploits are much more refined—a process that could take decades—there will be a need for the judgment of humans in the interpretation of big data. In no other area of medicine is this so clear as in oncology.


100+ Top Agile Blogs
It seems that I got a pretty long list therefore I am passing it to you. The list is ordered based on Alexa.com raking with the exception of the top three blogs where I could not isolate personal blogs from msdn.com and blogspot.de therefore the top three are not accurate. If you find any errors, or if you have more blogs to add to this list just contact me :) If you find more blogs that you think that could be added to this list just leave a comment. I hope you appreciate this list.


Big Data Knows When You're Going to Quit Your Job Before You Do
Computer predictions aren’t just about making office life a little more pleasant. Airbnb uses a variation of these algorithms to predict which renters and guests would be the best fit. The room-rental site says the technology has improved matches by 4 percent. Airbnb is currently developing a system to look at the photos of homes uploaded to the site and figure out how “attractive” they are to customers. “We are trying to promote listings with more attractive images,” says Maxim Charkov, the search lead at Airbnb. Eventually, Airbnb may offer a digital interior designer that predicts ways to enhance listings and spruce up homes to increase bookings.


IT pro's revitalization guide 2015
For seasoned and new IT leaders alike, the new year is a good excuse to pause and take stock of your professional and personal progress in our always interesting, always chaotic industry. Take a few moments to read through all the best of Computerworld's management and career articles, or click a link below to skip directly to your chosen topic.


We Need No Less Than Pervasive Leadership
We need leader-full organizations in order to thrive in the present and in the future. Pervasive Leadership combines aspects of servant leadership, chaordic leadership, and personal leadership operationalized through facilitative leadership tools and techniques. It assumes that “leader” does not presume follower in the traditional sense, and that true followers cannot be forced to follow. It also recognizes everyone in the organization has leadership potential and responsibility. In other words, we need leaders who are competent to and capable of using the tools ofauthentic power. This means that they must do as they say is best, the most difficult thing to do under difficult circumstances. Their work as a leader is first and foremost work on themselves.


Chief analytics officer: The ultimate big data job?
"When you start thinking about how to organize your analytics better and how to get more bang for the buck, you'd better be thinking about hiring a chief analytics officer," says Bill Franks, CAO at data-services firm Teradata. "You can't take analytics where you want to without someone who's accountable for those strategic decisions." There's plenty of upside in adopting a more strategic approach to big data. In a recent study by management consultancy EY, for example, 69% of companies said customer experience was vital to their growth strategies, but just 12% said they take full advantage of analytics to extract customer insights and deliver better customer service.


Samsung brings curved screen from TV to PC
The Ativ One 7 Curved is a good example of Samsung's engineering chops, but the product has some flaws. It does not have a touchscreen, which is common in all-in-one desktops from Lenovo, Hewlett-Packard, Dell, Asus, Acer and other PC makers. Samsung's PC division doesn't yet have touch technology for curved screens, Ng said. Creating the all-in-one was a challenge as the electronics needed to be behind the curved display. All-in-one PCs have processor, memory, storage and other components behind the display. Samsung installed a slightly curved motherboard at the back of the display. Samsung's PC division worked with the TV business unit to make the all-in-one, Ng said.


Hadoop Isn't for Everyone
Well get ready for your desires for the in-house capacity and staff of experts to go unfulfilled long term.Data scientists are a rare breed and the bulk of Hadoop experts in the market are being snapped up quick by companies building and offering MapReduce services like HortonWorks, CloudEra and GoGrid. And unless you have IPO stock to offer or are an attractive acquisition candidate, you will likely find it hard to win this rare breed of employee - let alone hold onto the ones you have already. The financial and skills shortage realities around big data will drive much of your desire for better customer insight and creation of predictive applications to leverage pre-built big data services that reside in the cloud.


Is Open Source Collaboration the Key to Better Communication?
Communication has been pushed to new heights with advancing smartphone capabilities and cloud-based applications and services, but are these technologies making communication better? One of the benefits of modern communication systems is the reduced friction of team and business collaboration. To fully realize the promise of these modern technologies, they must fit into daily workflows. They cannot be disruptive and must be complementary to how employees want to work.



Quote for the day:

"The value of a company is the sum of the problems you solve." -- Daniel Ek


December 31, 2014

The Greatest Tech Wins and Epic Comebacks of 2014
While 2014 didn't bring much in the way of revolutionary technology, it was a great year for refinement. The products and services we've relied on for years became cheaper and more accessible, while once-difficult concepts like virtual reality and mobile wallets starte to look a little more practical. And if you look hard enough, you can even find some examples where the government didn't screw everything up. Here are the top 10 products, companies and ideas that emerged victorious in the tech world this year.


REST-y Reader
In the first list are books that speak directly to the work of HTTP, APIs, REST, and Hypermedia. These are certainly not the only books on these subjects but they are the ones I find myself referring to most often in my own work. The second list contains books that, while not directly in the field of APIs, have affected my thinking on the way we design and implement stuff on the Web. I had a hard time narrowing down this list and there are quite a few more I’d add but I’ll save that for another time. Finally, I added a section named "Other Resources." These are sources that I have found useful over time that are not in full-on book form.


11 things to consider before going to work for a startup
The fact of the matter, according to Robert Half Technology data, is that 8 out of 10 employees prefer the structure and stability of an established organization over the volatility of the startup market ... We hear a lot about startup success stories, but the fact is that most fail. Different statistics put the average failure rates from 40 percent to as high as 90 percent. According to this Wall Street Journal article, 3 out of 4 startups fail. What does that mean for you? It means you’ve got to do your research and make sure the organization you go with has the best chances of survival.


The Top Technology Failures of 2014
All successful technologies are alike, but every failed technology flops in its own way. Success means a technology solves a problem, whether it’s installed on a billion smartphones or used by a few scientists carrying out specialized work. But many—maybe most—technologies do not succeed, typically because they fail to reach the scale of adoption that would make them relevant. The reasons for failure aren’t predictable. This year we saw promising technologies felled by Supreme Court decisions, TV cameras, public opinion, and even by fibbing graduate students.


Technology’s Impact on Workers
The internet and cell phones have infiltrated every cranny of American workplaces, and digital technology has transformed vast numbers of American jobs. Work done in the most sophisticated scientific enterprises, entirely new technology businesses, the extensive array of knowledge and media endeavors, the places where crops are grown, the factory floor, and even mom-and-pop stores has been reshaped by new pathways to information and new avenues of selling goods and services. For most office workers now, life on the job means life online.


Nine insanely long-running tech lawsuits
At the center of Charles Dickens's Bleak House is the fictional court case of Jarndyce and Jarndyce, a dispute over an inheritance that has gone on for decades. It may have been inspired by the legal wrangle over the estate of William Jennens, which incredibly dragged on for more than a century and ended only when legal fees had devoured all that remained of Jennens's vast wealth. The tech industry has seen a number of long-running lawsuits as well. While none have gone on for quite so long, the fast pace of technological change means that often, no matter who wins or loses, the tech world has changed so much by the time the verdict arrives that it becomes difficult to remember what the argument was about in the first place.


Delivery by drone: French postal video shows it can be done
News reports say from France say the test took place near the town of Pourrières, which is in the southern region of Provence. La Poste has not specified when the service will be in full swing, but suggested that it anticipates using Géodrone to provide service to residents in remote mountainous and maritime regions. The Géodrone project represents another impressive achievement for France’s emerging unmanned aircraft industry. Earlier this year, drone enthusiasts in the Alps conducted a Star Wars-style pod race in a French forest with the permission of the local government. Meanwhile, a researcher in Holland has showed how an ambulance drone can deliver a defibrillator to a heart attack victim in under two minutes.


Infrastructure Analysis -- A New Culture of Analytics
there is a significant amount of information that organizations can learn through deeper analysis of the underlying infrastructure. A time map of the time network architecture is useful for large corporate networks improving a legacy of unreliable, imprecise, un-adaptable time sources across the network and applications. A time map can identify, for example: an application server responsible for distributing unreliable time across the network and all applications that rely on it, time distribution networks falling out of sync when companies glue time distribution networks together ...  if the system is relying on the sources that sync back to the same source, and how far downstream the tie source is and how reliable it is.


India blocks 32 websites, including GitHub, Internet Archive, Pastebin, Vimeo
Internet users in India are starting to lose to access websites including GitHub, Internet Archive, Pastebin, and Vimeo under an order from India's DoT (Department of Telecom). It appears an order to block the sites issued on December 17 is taking effect -- albeit unevenly. Today, Centre for Internet and Society (Bangalore, India) Policy Director Pranesh Prakash posted a copy of the notice listing the 32 blocked URLs. ... Problems accessing GitHub are going to be especially painful for India's enormous developer workforce, and will definitely impact both India's domestic and outsourced software development business sector.


Windows Server cloud support unlikely bedfellow for Google
From Google's perspective, Microsoft is a dominant force in enterprise computing, any service that doesn't support Microsoft technologies could face extinction in the enterprise. The move also shows that Google is willing to open itself up to a competitor's technologies if it is in the best interests of mutual customers -- a trait Microsoft seems increasingly willing to manifest as well. Running Windows on Google may increase the likelihood of further price-competition wars in the cloud space. Google does not have much of an edge or a differentiator against Amazon Web Services (AWS) or Microsoft, so it is primarily left to compete on price.



Quote for the day:

"You have to put in many, many, many tiny efforts that nobody sees or appreciates before you achieve anything worthwhile." -- Brian Tracy