January 19, 2015

Expert panel: Creating innovation in the federal government
The primary challenge is bringing together the right people to discuss interesting and important topics. When evaluating potential guests, I seek people whose ideas and activities are genuinely shaping our shared future. Three prominent guests appeared on CXO-Talk for a discussion about the evolving impact of technology in the federal government. The conversation explored how to encourage an environment of innovation in a huge, slow-moving organization. Although all three guests are strong supporters of work done by the Executive Office of the President and the agencies, their perspectives reflect the stark realism of experience.


Big Data Enters 2015
As we enter the new and exciting year 2015, the big data industry is well poised to achieve some truly great things. Our friends a DataRPM put together the compelling infographic below, “The Dawn of Smart Enterprise,” to highlight their predictions for how big data will advance in the coming year. 2015 should be gangbusters and insideBIGDATA will be here as your official news source to keep you well-informed.


The Three Cs of Web App Security
It's an application world and that means we're also increasing the rate with which we expose new web applications (and APIs) to the world. That parenthetical, too, is important. Failure to treat your API with as much care as a web app with respect to security could net you some pretty ugly results. And not the kind of ugly that grows up into a beautiful benevolent swan; I'm talking about the 9-headed hydra kind of ugly - the kind that takes the stuff of myth and legends to get rid of. For the security (and increasingly operations) practitioner, following the three Cs of web application security can provide a good foundation for keeping that hydra out of your app and your network and, of course, your data .


Where are Scrum Masters
It is no wonder that ‘ScrumMaster-less Scrum’ is one of the most common ‘Scrum-buts’ that I find when assessing Agile transformations. Considering that many companies obtain great benefits from this approach, it’s even tempting to consider ScrumMasters as ‘nice to have, although optional’. In fact, several Agile frameworks like Kanban, Cristal or Lean Software Development do not prescribe a ScrumMaster or Agile Coach role – and there is no mention of these in the Agile manifesto or in Nonaka and Takeuchi’s seminal article that inspired Scrum itself. To make things worse, Scrum-bashing has become a major sport on the Agile community.


SDN: software defined networking,  . . . or small distributed namespaces?
As a discipline, networking has lived a strangely separate existence from computing, over its history, and has adopted very different methodologies. It has embraced perhaps more of the methods of distributed systems than its computational counterpart (as it was forced to confront issues of scalability earlier), but it has fallen behind in the era of free and open source software innovation, and it's overdue for a makeover. Software defined networking could be that makeover. Maybe.


A Bendable Implant Taps the Nervous System without Damaging It
What’s new is how stretchable electronics are merging with a widening effort to invent new ways to send and receive signals from nerves (see “Neuroscience’s New Toolbox”). “People are pushing the limits because everyone wants to precisely interact with the brain and nervous system,” says Polina Anikeeva, a materials scientist at MIT who develops ultrathin fiber-optic threads as a different way of interfacing with neural tissue. The reason metal or plastic electrodes eventually cause damage, or stop working, is that they cause compression and tissue damage. A stiff implant, even if it’s very thin, will still not stretch as the spinal cord does.


Building Hybrid Teams
My experience with many hybrid teams is that the attitude towards each other as well as the coaching process is often not entirely positive - I will caveat this with saying that I've rarely coached a team that had only just started out, usually there was already a perceived "problem" with or in the team that highlighted the need for coaching. However I don't believe my experience is all that novel - a lot of offshoring team members are under great pressure to "be perfect" and having identified a need for coaching directly contradicts this perception. Equally, attitudes of onshore team members towards offshore team members can sometimes be negative - offshoring is often viewed as the "cheap" alternative and perceived as a direct threat to job security and ability to make a decent living.


The 1 Thing Every Employee Needs That Most Bosses Don’t Know How to Give
Every employee needs candid (yet caring) feedback about her performance, but most bosses shudder in fear at the thought of having that tough conversation. I’m the first to admit that having a discussion about an employee’s failing performance is one of the most unpleasant things a leader has to do; it’s awkward and uncomfortable for both parties involved. I mean, come one, no one likes to hear they aren’t doing a good job. But the way in which the feedback and coaching is delivered can make a huge difference. The key is to have a plan and process to follow.


Wishlist for 2015: The solutions we need in business tech
In general, there's always plenty of buzzing around fresh ideas in the tech industry, but too much of it focuses on quick hits and low hanging fruit. That's the easy stuff. It's a lot harder to go after intractable problems. But, we need some companies to step up, show leadership, take risks, and doggedly pursue solutions to these big problems. Make no mistake, some of these challenges connect into the larger themes of 2015, but they need a stronger focus on usefulness, especially for solutions that can benefit organizations and professionals.


Obama to Highlight Cybersecurity Proposals in State of the Union
"We don’t regulate Internet security the way we do, say, chemical plants and food production facilities. We just don’t do that - we might, but we’re not doing that now,” said Harris. In all, the White House has introduced three separate measures to combat cybercrime and strengthen privacy. The first, the Personal Data Protection and Notification Act, would require companies that handle data to alert customers if any of their private information had been compromised or stolen by hackers within 30 days. The measure has won strong backing by many retailers and other data companies.



Quote for the day:

"Most organizations staff their problems & starve their opportunities." -- Peter Drucker

January 18, 2015

David Cameron in 'cloud cuckoo land' over plans to deify security services
Independent expert Ive Noclue said: “It’s crazy. Cameron is living in cloud cuckoo land if he thinks that this is a sensible idea, and no it wouldn’t be possible to implement properly. You can't just go around turning ordinary intelligence officers into divine beings and creating a new omnipotent pantheon. This is obviously what the Tories are planning to do and it's not sensible." Other security experts echo Noclue, describing the approach as “idiocy” and saying Cameron’s plans are “ill-thought out and scary”.


Top Cloud Security Tips for CISOs
Integrating traditional security tools like those you're used to using in your on-premise data center might prove to be very complicated to use in the cloud, and may thus eliminate many of the cloud automation advantages. When possible, try to use tools specifically tailored to the cloud. Dome9 does a wonderful job providing an IaaS firewall, Incapsula provides a Web Application Firewall solution for such clouds, and Porticor provides an innovative key management and encryption solution for multiple IaaS clouds.


IBM Reveals Proof of Concept for Blockchain-Powered Internet of Things
The ADEPT concept, or Autonomous Decentralized Peer-to-Peer Telemetry, taps blockchains to provide the backbone of the system, utilizing a mix of proof-of-work and proof-of-stake to secure transactions. IBM and Samsung chose three protocols – BitTorrent (file sharing), Ethereum (smart contracts) and TeleHash (peer-to-peer messaging) – to underpin the ADEPT concept. ADEPT was formally unveiled at CES 2015 in Las Vegas. According to the draft paper, blockchains deployed within the ADEPT system would serve as a ledger of existence for billions of devices that would autonomously broadcast transactions between peers in a three-tier system of peer devices and architecture.


The time a major financial institution was hacked in under 15 minutes
Darkhotel is a specific operation where attackers are targeting C-level executives at major companies, and they're compromising hotel WiFi networks such that when you go to log into the hotel network, you get into the network and you think you're on the hotel's network, but they've actually gotten into the middle, so to speak, and your device then tells you, "Oh, you need to download a security patch for Adobe. Click here to update." And you're actually executing some malware on your device. Why are the C-level execs the target? Well, a couple of reasons. First, C-level execs are famous for wanting the rules bent for them. "I know you've got your security policies, but just make my iPad work, please!" That kind of thing.


Sony Xperia Z3 Tablet Compact review: Outstanding multimedia experience at a price
The Sony Xperia Z3 is one of my favorite smartphones, check out my review, so I was looking forward to spending time with the Xperia Z3 Tablet Compact. Sony took many elements of the sleek Z3 design and brought them to an eight inch Android tablet. It's thin, light, waterprooof, focused on audio and video experiences, optimized for PS4 gaming, and one of the best Android tablets you can find today. It is an iPad mini competitor and worth considering if you want an Android tablet.


Aligning Big Data
In order to bring some semblance of simplicity, coherence and integrity to the Big Data debate I am sharing an evolving model for pervasive information architecture and management. This is an overview of the realignment and placement of Big Data into a more generalized architectural framework, an architecture that integrates data warehousing (DW 2.0), business intelligence and statistical analysis. The model is currently referred to as the DW 3.0 Information Supply Framework, or DW 3.0 for short.


10 Companies to Watch in 2015
Every year we highlight 10 companies and technologies to watch. Our selection is driven primarily by the fact that the companies we mention have briefed us in the past 12 months, and hence we are reasonably familiar with their capabilities. Naturally, we tend to choose companies and technologies that are distinctive, innovative and align with what we consider to be the direction of the IT industry. Here is this year’s list, arranged in alphabetical order to avoid any suggestion that ranking is involved:


Should enterprises join the rush to use Docker's container software?
"Containers are not a landmark innovation," he wrote an email. If you take into account OS-level virtualization technology like BSD jails and Unix chroot, containers have actually existed for up to 30 years, he said. So why are the likes of Google, IBM, Amazon and Microsoft, as well as non-tech firms and big banks, signing up for what The New York Times describes as "a new way to create software," facilitated by Docker's brand of container technology? For starters, as Forrester's Dave Bartoletti lays out, Docker makes containers easier and more efficient to use, providing benefits that allow companies to provide services in such a way that formerly was possible only from large cloud vendors.


Podcasts by The Open Group
Listen to, or read the transcripts of, recent podcast sessions available on The Open Group Blog. The podcasts feature subject matter experts and panels consisting of Open Group members and staff. Our archive of podcasts serves as a repository of analysis and exploration on subjects most integral to the profession, and continues the conversations being held in our industry.


Is Open Source Collaboration the Key to Better Communication?
Communication has been pushed to new heights with advancing smartphone capabilities and cloud-based applications and services, but are these technologies making communication better?  One of the benefits of modern communication systems is the reduced friction of team and business collaboration. To fully realize the promise of these modern technologies, they must fit into daily workflows. They cannot be disruptive and must be complementary to how employees want to work.



Quote for the day:

"Remember that not getting what you want is sometimes a wonderful stroke of luck." -- DALAI LAMA

January 17, 2015

Things every programmer should know
Learning process of developers never ends. It is in our DNA to continuously feel the need to learn and self develop. As much as we learn, we have even more to learn. The technology world is moving so fast that to keep the pace and be up to date with cutting edge knowledge, we need to embrace learning as part of our daily activities. Whenever we say we learned to use a framework, we see that 7 other frameworks have become famous and we need to take a look on them. One of the most frequent questions of my students is the question “what should I learn to be a good programmer?”.


Introduction to the blockchain
The blockchain data structure is an ordered back-linked list of blocks of transactions. The blockchain can be stored as a flat file, or in a simple database. The bitcoin core client stores the blockchain metadata using Google’s LevelDB database. Blocks are linked “back,” each referring to the previous block in the chain. The blockchain is often visualized as a vertical stack, with blocks layered on top of each other and the first block serving as the foundation of the stack. The visualization of blocks stacked on top of each other results in the use of terms like “height” to refer to the distance from the first block, and “top” or “tip” to refer to the most recently added block.


Big Data Is No Longer Confined to the Big Business Playbook
Many smaller businesses are reluctant to invest in leading-edge technologies. Limited capital or the lack of the right staffperson might prompt even the most forward-thinking companies to avoid innovations or postpone such a move until they reach a certain revenue or profit goal.  It's an erroneous notion among small business owners and decision-makers that big data is too complex or something only big companies can afford to try out. Even the name -- the “big” in big data -- can seem off-putting. But it’s not as tough to dive into big data as small companies might think and the payoff can be significant.


Moving Towards a Theory of Enterprise Architecture
Enterprise architects are called upon to help in both ways. We have to answer questions like: “what does “innovation X” do for us, and what does it do to us?” We also have to contribute to ongoing concerns like “how do I grow my business in “Market Segment Y” in an innovative and compelling way?” and “How do I cut the cost of our IT expenditures?” and “How do I improve the quality of my customer data?” These questions fall under the category of “organizational cost”. Cost and quality come together to include a balance of monetary cost, effectiveness, customer satisfaction, efficiency, speed, security, reliability, and many other system quality attributes.


Man Saves Wife’s Sight by 3D Printing Her Tumor
Balzer wanted a tangible model of Scott’s cranium so that he could get perspective on the location and size of the tumor and think about what kind of treatment to pursue. The standard removal process for a tumor like Scott’s, known as a meningioma, is a craniotomy, in which the skull is sawed open. Her tumor was located under her brain, so to remove it, doctors would have to physically lift her brain out of the way. This is as risky as it sounds. Nerves can be dislodged, and patients can lose their sense of smell, taste, or even sight. Thinking about her thyroid surgery, she and Balzer wondered if a similarly noninvasive procedure might be possible.


Prep for continuous delivery with iterative development
If you don't have a staging environment for review before production release, you aren't ready for continuous delivery. If the business you work for hasn't made a commitment to continuous delivery, you cannot reap the full benefit of ongoing, rapid software releases. "Continuous delivery is the sum of a series of practices," said Carl Caum, prototype engineer at Puppet Labs. "The end goal is to deploy every [software] change at the push of a button. But there are numerous problems you have to solve before you can do that."


IT development, operations teams really do deliver when working together
DevOps is a key initiative because developers and operations teams typically have different mindsets -- developers tend to work in a more informal style, and all any and all hours. Operations folks are more focused on structure and schedules. To get software releases out the door faster, these two groups need to work in sync. ... Looking at the benefits another way, IT and business leaders with DevOps programs underway report they have seen upward bumps in the business metrics they have tied to their initiatives.


An introduction to Gulp
Gulp focuses on a few key points: First and foremost, speed. That speed comes in two flavors. We do not only have superior build system (does usually not matter so much), but also superior development speed (that matters much more). Why is the build speed superior? We will see that Gulp uses streaming, which will keep the working version in-memory, until we decide to create a version on the hard disk with the current contents. Easy CS101 tells us that latency and transfer rates of a computer's main memory is better than the usual HDDs. The second flavor is more controversial, yet much more important. By allowing any code to run, Gulp manages to get rid of plugins altogether.


Department of Defense Launches New Cloud Computing Security Requirements
“The SRG is designed to ensure that DOD can attain the full economic and technical advantages of using the commercial cloud without putting the departments data and missions at risk,” said DISA Risk Management Executive Mark Orndorff in a statement. Orndorff also issued a memo earlier this week (PDF) which indicates the version released by DISA may be followed by updates pending further research into some industry comments. The SRG applies to missions with “secret” or lower classification, and takes the place of the previous Cloud Security Model used by the DoD.


4 Reasons Why Executives Are Concerned About Digital Risk
Beyond the hype and hysteria in the press about cybersecurity threats, board members and senior executives are genuinely interested in the IT risks they currently face. This growing interest in IT risk is currently being driven by four consistent themes that we experience in our daily client interactions at Gartner.



Quote for the day:

"A single question can be more influential than a thousand statements." -- Bo Bennett

January 16, 2015

Cameron and Obama plan war games to test cyber resilience
The cyber war games agreement was announced as prime minister David Cameron held talks with president Barack Obama in the US. The two leaders also agreed that intelligence agents from GCHQ, MI5, the National Security Agency and the FBI will co-operate in "cyber cells" in both countries to improve the sharing of information about cyber threats, reported the BBC. ... Obama is expected to focus on cyber security in his State of the Union address on 20 January 2015. He recently previewed the address in a speech at the US Federal Trade Commission, in which he outlined some of the legislation he would like the US Congress to pass.


What do you do when your code has cancer?
One truth about business software applications is that they evolve together with business requirements. From different reasons, sometimes from lack of experience of developers and sometimes from not having enough time to devise good solutions, the code often tends to create some sort of cancer inside, which progressively grows to unmanageable pieces of software until it breaks the whole system. What do we do if we find such phenomenon in your code? In my experience I have seen that dealing with such code is almost inevitable in brown field projects. Ignoring them makes things only worse.


Flavors of Concurrency in Java: Threads, Executors, ForkJoin and Actors
Java threads are actually mapped to the operating system threads and every Thread object represents one of the lower level computation threads. Naturally, the lifecycle of a thread is taken care of by the JVM and scheduling is not your concern as long as you don’t have to make Threads communicate with each other. Every thread gets its own stack space, consuming a part of the designated JVM process memory. The Thread API is pretty straightforward, you feed it a Runnable and call .start() to begin the computation. There’s no good API to stop the Thread, you have to implement it yourself using some kind of boolean flag to communicate.


5 attitudes to accelerate leadership development in 2015
Often the elephant in the room (or on the team) is the consistent poor performer. No matter what you do, you can’t find a role where they bring energy. Everyone seems drained as they interact with them. At best, they are simply someone to be avoided. At worst, they act like a ringleader, sucking people into their energy drain. You still must put them in a position to succeed, too. That may mean a very unpleasant review or series of reviews. It may even mean helping them find someplace else to work. Helping them become a good performer is in their best interest. No one wants a job where they’re not appreciated.


Defense IT Investment to Focus on Big Data, Cloud
The combination of a shrinking force size and technological advances are driving the importance of data and analytics. Advances in sensors, wireless networks, and unmanned aerial vehicles have resulted in a flood of new data. Despite the need to rely more heavily on data for situational awareness and predictive analytics to give them the edge over the enemy, defense leaders are concerned that they will not have the people or time to deal with all this new information. Technology will need to bridge the gap. Additionally, on the business side of the house, the military is looking at its data for new ways to increase efficiencies and make more informed decisions.


Time for CEOs to Step In and Stop CIO-CMO Bickering
On the relationship side, we've certainly seen people recognizing the real challenge, not just focusing on personality differences. CMOs in particular need to understand the challenges in the technology environment. We've spent a lot of time with clients working through that awareness and education about what's smart and not smart implementing technology and, ultimately, the end result that may come about if CMOs make lateral decisions too quickly. On the business side, it's what do we do about it? We've got some of these technologies that are hard to work around. We've seen some organizations able to implement cloud-based solutions and incrementally move the needle on what the marketing organization is able to achieve.


Developers See Enterprise Shift for IoT in 2015
"These survey results confirm that IoT is crossing over from consumer gadgets to business productivity and customer engagement," said Michael Swindell, senior vice president of products at Embarcadero, in a statement. "In the consumer space, individuals connect to IoT typically through a single personal mobile device, with the IoT experience encircling the user. However with business solutions IoT includes users and encircles the business and enterprise assets. The IoT connected applications developers build for the Enterprise are essential to connect the disparate parts of a distributed IoT business solution – from mobile devices, to wearables and sensors, to cloud and on-premises Enterprise back-ends. Software developers will clearly play a pivotal role in driving IoT innovation and business adoption in 2015 and beyond."


The path to continuous delivery
Continuous delivery from the business angle needs small incremental changes to be delivered on a regular basis. Agile IT aims to do the same, but there are often problems in the development-to-operational stage. Sure, everything has been tested in the testing environment; sure, operations understand how to implement those changes in the run-time environment. According to a survey by VersionOne, 85% of respondents stated that they had encountered failures in Agile projects - a main reason stated was that the company culture was at odds with an Agile approach.


Resource Governor Enhancements in SQL Server 2014
The Resource Governor allows the user to put restrictions on the amount of resources which can be used from the SQL Server instance’s total available resources in each database’s workload. The versions of Resource Governor that we released with SQL Server 2008 to SQL Server 2012 were limited in functionality as they could specify limits for only the CPU and the memory requested by the incoming application within a resource pool. In the latest version, SQL Server 2014, the developers have improved this feature to include a couple of additional functionalities. These settings can now control the minimum and maximum physical I/O operations per second per disk volume for user threads of a given resource pool.


Conversation Patterns for Software Professionals. Part 3
Since the source code can be structured (in the form of design patterns), which makes it easier to develop and maintain, why not apply the same analogy to a conversation? When we look at the conversation in a structured and orderly manner, it may help us lead it more effectively. What we mean here is not related to patterns of conducting meetings, during which every participant has their specific role. We are talking about something more fundamental – about how people exchange information (especially people form business with those from IT) in the course of a conversation. We assume that your interlocutor does not need to have any knowledge about the techniques of gathering information or conducting meetings.



Quote for the day:

"As a manager; the more uncomfortable the conversation you have to make is, the more important it is." -- @LeadershipCures

January 15, 2015

2015 Top Five Data Center Trends
As the conversations continue to circulate between IT companies and Datacenter Providers, it appears we have some differing opinions on what is to emerge in the New Year. Although there are many predictions on what will increase and what will decrease in popularity, some areas of the industry have brought about an increased chatter among the experts. In this article, we walk though the top five up-and-coming themes predicted to take place in 2015. They include trends in cloud, virtualization, internet of things (IoT), and the size of the industry.


Mobile users encountered malware 75% more often in 2014 compared to 2013
"We've seen a significant increase in both the frequency and sophistication of attacks that would truly represent a concern for the enterprise, like exploits that would let the bad guys get access to corporate networks," he said. "We also saw a greater prevalence and sophistication of applications that enable rooting or jail breaking the device." For enterprises in particular, the top security threats associated with mobile devices are loss of sensitive data and illicit access to corporate networks. "The threats that we found targeted both of these issues," Cockerill said.


Bruns-Pak: Datacenters vs. collocation vs. cloud computing
Owning and operating one's own data center might actually be the lowest cost option if the overall cost is considered. This approach, however, is not without its challenges. This approach requires the largest up-front investment as well as the need for the largest staff. Using this approach makes it possible, however, for an enterprise to take advantage of the reduced costs produced by purchasing systems, storage, software, power and networking in bulk. It also offers the opportunity of potential tax advantages of owning real estate, buildings and the like.


Intel-backed OIC advances in fast-moving IoT standards race
Though it seems too soon to be pushing out specifications and code, given that the industry isn’t expected to settle on standards until next year or later, this may be the best time to capture the hearts and minds of product developers. The International CES show last week in Las Vegas was rife with emerging (and some half-baked) IoT devices, especially for smart homes. Those that make it to market will eventually need to lock into some platform for working with other connected products. The OIC is developing its own standard for IoT connectivity but turned to the Linux Foundation to organize the project that is developing IoTivity. That project is open to anyone who wants to participate, whether they belong to OIC or not.


Nine CIO tips for surviving and thriving in 2015
In part one of Harvey's 2015 predictions column for CIOs, he singles out three trends that will continue to have big ramifications for the CIO role and enterprise IT next year. Here, he offers readers nine CIO tips for surviving and thriving in 2015, plus a cautionary compilation of quotes illustrating the danger of making technology predictions:


How to make applications resilient on AWS
Amazon provides different services to decouple systems and make them more reliable. One of the first services was Simple Queuing Services (SQS). Amazon describes SQS as a distributed queue system that enables service applications to quickly and reliably queue messages that one component in the application generates to be consumed by another component. Later, other services such as Simple Notification Service (SNS) or Simple Workflow Service (SWF) followed. One of the main characteristics of the cloud is elasticity, which means not making any assumptions about the health, availability or fixed location of other components.


Keeping Big Data Secure: Should You Consider Data Masking?
As Girard points out, one of the problems associated with traditional data masking is that, “every request by users for new or refreshed data sets must go through the manual masking process each time.” This, he explains, “is a cumbersome and time-consuming process that promotes ‘cutting corners’– skipping the process altogether and using old, previously masked data sets or delivering teams unmasked versions.” As a result, new agile data masking solutions have been developed to meet the new demands associated with protecting larger volumes of information.


5 Agile Ways to Achieve your New Year’s Resolutions
Perhaps we can use recent advances in software project management to get that success rate higher. Traditional software development efforts last one to two years and are managed by planning everything up front with what are called “waterfall” management practices. According to the Standish Group, the failure rate for waterfall projects from 2002 to 2011 was 29%. The costs for these failures can be measured in billions of dollars wasted. Agile management practices, which introduce frequent inspection and adaptation, have succeeded in reducing project failures to about 9%.


New report: DHS is a mess of cybersecurity incompetence
The report cautions about DHS's limited strategies, noting: "While patch management and cyber hygiene are clearly important, they are only basic security precautions, and are unlikely to stop a determined adversary, such as a nation state seeking to penetrate federal networks to steal sensitive information." The section on cybersecurity is titled: "The Department of Homeland Security is struggling to execute its responsibilities for cybersecurity, and its strategy and programs are unlikely to protect us from the adversaries that pose the greatest cybersecurity threat." One example in that section shows DHS departments effectively lying about performing critical and well-known security updates -- updates that DHS warned the public about via US-CERT.


New service wants to rent out your hard drive's extra space
The service works by first uploading a file-sharing application onto a user’s computer then breaking file data into small 8MB or 32MB blocks, or “shards,” as Storj calls them. Each block of data is encrypted with a unique hash, and then the pieces are distributed throughout the cloud network, according to a white paper the company published on its peer-to-peer storage technology. The file blocks get distributed throughout the network on nodes called “DriveShares” located all over the world. Storj uses hash chains or Merkle Trees, as they are sometimes called, to verify the contents of a file after it has been broken up into blocks or “leaves” off of a master or root hash.



Quote for the day:

"A budget tells us what we can't afford, but it doesn't keep us from buying it." -- William Feather

January 14, 2015

Obama Cybersecurity Plan Seen Needing More Company Incentives
Most of what Obama will propose isn’t new. He’ll renew calls for Congress to pass stalled proposals, such as a federal data-breach notification law and legislation giving companies legal protections for sharing information about hacking threats with each other and the government. However, the concerted push has given industry officials who support the proposals reasons to be optimistic that they will finally be implemented, potentially setting the stage for even more progress this year.


Is banning encryption a crazy plan or an absolute necessity?
Comments this week by UK prime minister David Cameron have re-ignited the debate about how to weigh individuals' online privacy against the needs of law enforcement to be able to detect and prevent crime. "In our country, do we want to allow a means of communication between people, which even in extremis, with a signed warrant from the home secretary personally, that we cannot read?" said Cameron in a speech. "Up until now, governments of this country have said no, we must not have such a means of communication."


The Cultural Impedance Mismatch Between Data Professionals and Application Developers
It is well known that there is a technical impedance mismatch between object-oriented technology and relational database technology. It is also well known, although not as well recognized, that there is a cultural impedance mismatch which refers to the politics between the developer community and the data community. Specifically, these politics are the difficulties of developers and data professionals experience when working together, and generally to the dysfunctional politics between the two communities that occurs within IT organizations and even the IT industry itself. Worse yet, this impedance mismatch has become even more pronounced between the agile and data communities.


Facebook Unveils Facebook At Work, Lets Businesses Create Their Own Social Networks
The product puts Facebook head-to-head with the likes of Microsoft’s Yammer, Slack, Convo, Socialcast, and a huge number of others who are trying to tackle the “enterprise social network” space. Even LinkedIn conveniently let drop last night that it too was looking at building a product for coworkers to communicate and share content (but not chat, as a LinkedIn spokesperson tells me). Not all of these have been a hit: Lars Rasmussen, the engineering director at Facebook who is heading up the project, had in his past once headed up one of the failed efforts at an enterprise social network, Google Wave.


Use the Windows 8 registry to reduce CPU cycle waste
The Windows 8 registry is a big repository for the operating system to store its volatile and nonvolatile information. A Microsoft OS cannot operate without the registry database. Several actions are performed in Windows, depending on what is configured in the registry. In addition to using Registry Editor for desktop configuration, you can tweak two types of registry settings to improve the overall performance of Windows PCs. Let's start by looking at how to disable the background checks and other OS activities through the Windows 8 registry.


4 ways for IT to connect better with customers
IT workers who truly understand the business are better able to design systems to support and advance the organization's mission. And what better way to help IT workers gain that understanding than by bringing them together with the users they serve? In fact, according to Computerworld's 2015 Careers Survey, IT professionals report that the ability to interact with business colleagues is the top skill outside of technical expertise that will make them more valuable. Here's how leading IT shops model their workflows and business processes to incorporate communication and interaction between IT and its customers, and how that setup benefits the company — and the careers of IT professionals.


3 Common SQL Mistakes You are Probably Making as a Java Developer
Java developers also need to understand project requirements, design and develop a prototype for the assigned project, keep themselves updated with the latest changes happening in the programming industry and also have basic knowledge of other languages like HTML, SQL and many more! Professional life for Java developers is not a bed of roses and they have to try and meet each and every challenge head on. Even the best Java developers, at times, fall prey to some mistakes that could be avoided. Take for example the mistakes they make while writing SQL. These can definitely be avoided.


Keeping Skynet at bay: How humans can keep AI in check
"Perhaps the most salient difference between verification of traditional software and verification of AI systems is that the correctness of traditional software is defined with respect to a fixed and known machine model, whereas AI systems - especially robots and other embodied systems - operate in environments that are at best partially known by the system designer. "In these cases, it may be practical to verify that the system acts correctly given the knowledge that it has, avoiding the problem of modelling the real environment," the research states. The FLI suggests it should be possible to build AI systems from components, each of which has been verified.


A Manager’s Guide to Executive Coaching: 10 Questions and Answers
At some point in a manager’s career there may be an opportunity to consider hiring an executive coach. I’ve been coached, coached others, and managed executive coaching programs for a number of companies. Based on that experience, along with the advice of others, here are 10 questions and answers that managers may have about executive coaching.


Learning Fast in Design, Development and DevOps
User testing is of course another key element in the product manager's tool box. We don’t do it systematically but month after month we test our assumptions better, by observing users interacting with our products in conditions as close as possible to the real situations. Those practices and tools may seem pretty obvious now but it still a big cultural shift from 'thinking we know best what our users want and are willing to pay for' to relying more on discovery and user testing. This movement is still ongoing, but we had really impressive improvements recently! We also favor practices that maximize learning for all the actors whether they are fromproduct, devs, or ops:



Quote for the day:

"The one quality that can be developed by studious reflection and practice is the leadership of men." -- Dwight D. Eisenhower

January 13, 2015

Using COBIT 5 to Deliver Information and Data Governance
Part of doing this successfully involves ensuring the availability of reliable and useful information for decision making. This clearly involves keeping the ratio of erroneous or unavailable information to a minimum. Limiting erroneous decision making also involves ensuring that reporting is complete, timely and accurate.2 Measuring performance here involves looking at the percent of reports that are not delivered on time and the percent of reports containing inaccuracies. These obviously need to be kept to a minimum. Clearly, this function is enabled by backup systems, applications, data and documentation. These should be worked according to a defined schedule that meets business requirements.


Computers may soon know you better than your spouse
To judge the effectiveness of the computer algorithms, researchers gave questionnaires to friends and relatives of some participants. The survey results and computerized assessments were then compared with the self-assessments from the subjects. With just 10 likes, the computer would know someone as well as a work colleague. With more than 70, it would get to the level of a friend or roommate, and with more than 300 to the level of a spouse or close relative. The study is notable because of its large sample size, said Jennifer Golbeck a computer scientist at the University of Maryland, College Park and the director of the University of Maryland Human-Computer Interaction Lab.


New Form of Memory Could Advance Brain-Inspired Computers
Phase-change memory is expected to hit the market in the next few years. It can write information more quickly, and pack it more densely, than the memory used in computers today (see “A Preview of Future Disk Drives”). A phase-change memory chip consists of a grid of “cells” that can each switch between two states to represent a digital bit of information—a 1 or a 0. In IBM’s experimental system, each “synapse” is represented by a pair of memory cells working together. Computer scientists have been working for some time on chips that crudely mimic neurons and synapses. Such “neuromorphic” designs are radically different from the chips we use today.


5 ways to give IT recognition
We all like to know that our efforts are appreciated. For people working in IT, recognition is too often neglected, simply because so much of what IT workers do is behind the scenes and goes unnoticed by the majority of employees. Click through to see five things that Paul Ingevaldson, author of The 9 ½ Secrets of a Great IT Organization, did when he was the CIO at Ace Hardware that cost little to nothing and that you can implement today.


Google Launches Cloud Application Performance Tool
Google Cloud Trace can perform a sort of "replay" analysis of a process stream to identify which users experienced slow request response times and then compose a report that identifies where the time is being spent in the system. Some slowdowns affect only a handful of users but nevertheless produce urgent complaints. Developers often have trouble identifying what's different about the response they obtained from the application versus other users. Cloud Trace is intended to speed the process up. Cloud Trace can break the steps of a single request down into the number of milliseconds that each part takes, pinpointing for developers the likely location of the slowdown.


Samsung, SmartThings and the open door to the smart home (Q&A)
In effect, Samsung is readying for the Internet of Things (IoT), the term for the concept of using sensors and other technologies to hook just about anything you can think of into the Internet. Analyst firm Gartner predicts the number of networked devices will surge to 26 billion units by 2020 from about 900 million in 2009, turning formerly "dumb" objects into smart ones that can communicate with each other. IDC reckons the IoT market will hit $3.04 trillion that same year. Samsung acquired smart-home startup SmartThings in August to help with its push. SmartThings' technology helps consumers to control their appliances with their smartphones, smartwatches and other devices, and SmartThings has been viewed as key to Samsung's smart-home and Internet of Things efforts.


DiversityMediocrityIllusion
When interviewing, we make a point of ensuring there are women involved. This gives women candidates someone to relate to, and someone to ask questions which are often difficult to ask men. It's also vital to have women interview men, since we've found that women often spot problematic behaviors that men miss as we just don't have the experiences of subtle discriminations. Getting a diverse group of people inside the company isn't just a matter of recruiting, it also means paying a lot of attention to the environment we have, to try to ensure we don't have the same Alienating Atmosphere that much of the industry exhibits. One argument I've heard against this approach is that if everyone did this, then we would run out of pink, sparkly marbles.


EU countries that set data retention rules must ensure they comply with e-Privacy Directive
In its opinion, the European Parliament's Legal Services unit said EU countries, since the CJEU's judgment, have had the option of either repealing their own laws on data retention or maintaining them. However, it said that should countries choose to maintain the rules then those rules must adhere to the e-Privacy Directive. ... The e-Privacy Directive sets out rules that generally protect the privacy of electronic communications and data associated with those messages, 'traffic data'. One specific provision places a general prohibition on the unauthorised storage of communications and traffic data.


The Future of Scaling and Strategy
One way that scaling strategies work is by distributing products and services through existing platforms. An existing network or platform may be able to replicate a product or service. This is especially helpful for non-profit programs who are already limited in regard to resources, but want to reach as many of those who would benefit from the program as possible. A small non-profit may be able to piggyback on an existing network, especially with the availability of cloud computing to get their message to a wider audience than they could otherwise.


Data Acceleration: Turning Technology Into Solutions
The landscape of solutions that foster data acceleration and enable a successful data supply chain has grown more complex than ever. Executives need to fully understand the technology components available on the market, because each supports data acceleration in unique ways. They also need to recognize that these components deliver maximum value only when they are combined in ways that capitalize on their complementary advantages. Only then can they decide which configurations may be best for their organization’s needs and discuss prospective solutions with vendors – and ultimately achieve returns from their analytics and big data investment.



Quote for the day:

"A good general not only sees the way to victory; he also knows when victory is impossible." --Polybius

January 12, 2015

Obama to propose new laws to protect consumer data, privacy
Obama will propose a new national standard that would require companies to tell consumers within 30 days from the discovery of a data breach that their personal information has been compromised, the White House said. The standard would need approval from Congress, where lawmakers have struggled to come up with a way to replace a patchwork of differing state regulations. As part of the law, Obama will also propose to criminalize overseas trade in stolen identities, the White House said. Obama will also resurrect a "Consumer Privacy Bill of Rights" that the White House created in 2012. He will ask lawmakers to codify the bill into law.


Uptime Simplifies System and Server Monitoring
With its agents, Uptime also has the ability to automate some common self-healing tasks. You can set up profiles, for example, to detect when a Web server is down and can then automatically restart it without any need for operator intervention. This is a very powerful feature. You can also build scripts that can restart certain Windows services: these can run on the central monitoring station rather than as part of the agent code. Like other systems management tools, there is a wide collection of user roles that can be set up in a very granular way. These roles can be applied to specific elements or action profiles, with the ability to view, add new ones, or change existing ones


Wearables go niche and narrow in the search for consumer relevance
Thanks to Fitbit, Jawbone and a slew of new smartwatches, we tend to think of wearable tech as living on the wrist. But at CES, some wearable makers tried to distinguish themselves by moving their hardware to other parts of the body. In doing so, they stand less chance of being rendered obsolete by increasingly sophisticated smartwatches and fitness bands. The most oddball example is Belty, a smart belt that aims to track users’ waistlines and provide extra comfort. The belt’s mechanical strap automatically loosens and tightens as you sit and stand, and uses tension sensors to figure out your ideal level of comfort over time.


2015 Enterprise Dev Predictions, Part 2: Convergence, Security, Automation and Analytics
What this means for enterprise developers, Gardner said, is that they must contribute to the decision making process at the architectural level to ensure that developer requirements don't get short shrift. "They will have to advocate for themselves in a wider environment of decision making," he said, "so that concerns about things like security and deployment flexibility in the hybrid cloud don't obviate the needs and concerns of developers. They need to learn to explain their past decisions and current needs in such a way that they are respected in the larger picture." Which is not to say that you should go charging into the CIO's office with a list of demands.


Why Apple Pay won't be the death of Google Wallet
According to Jordan McKee, an analyst at 451 Research, Google's primary challenge is its name. The search giant is just that, a search giant, so most of its revenue comes from advertising. McKee said this can make merchants wary of Google's intentions. "Google is after data, and merchants remain hesitant to give that up," McKee said. "Many view working with Google as making a deal with the devil, fearing their data may be used against them for things like competitive offers." Both Apple and Google said that they do not share your credit card number with merchants who accept their respective payment systems.


Using Agile Retrospectives for Organizational Change
In agile, retrospectives are used for a team that works together and wants to learn from their joint past. For example it is a Scrum team wanting to learn from the last Sprint. Participants of a retrospective for organizational change are typically not members of the same team and do not share necessarily a joint past. Yet the retrospective for organizational change still allows them to bring different perspectives together, learn from one another’s past, and define experiments that allow dealing with complex change. Thus, a retrospective for organizational change is more about preparing for the future by enabling change than reflecting on the past.


Manjaro Linux: A few of my favorite things
Similar to the Gnome3 settings utility, but smaller and simpler, just a handy place where you can take care of things like administering user accounts, selecting the Linux kernel (more on this in the next point), checking hardware and configuring the keyboard type and language, and selecting what kind of notifications you want to get. This handy little utility is even customized with different content for the KDE and Xfce versions. I realize that this one might seem kind of trivial at first glance, but it has grown on me very quickly as I have been going through the initial setup and configuration of Manjaro on a number of different systems.


Peer into the Analytics Crystal Ball for 2015
We had a very good discussion on the call about how a CAO differs from a CDO and why an organization might look into putting both in place. We at IIA expect these roles to continue to proliferate in 2015. However, I have personally seen a lot of confusion with respect to these two roles. Many people seem to consider them interchangeable or accidentally mix and match the requirements of the two roles together so that it is hard to tell what exactly they are looking for.


Amazon Data Center Construction Fire Linked to Welding Mishap
The workers on site were welding roof components from inside the structure, “which ignited nearby combustibles,” the official statement read. The combustibles were construction materials stored on the roof. An AWS spokesperson confirmed this morning that the fire happened at the site where a third party contractor was building a data center for the cloud services company. The data center was not in production, so the fire did not affect any AWS users, she said. The contractor’s name was not disclosed.


3 Warning Signs to Watch for When Evaluating Vendors
Vendors become disingenuous for several reasons. The first is that circumstances change, they intended to do what they promised but conditions they had no control over caused them to change their minds. That is going to happen to everyone from time to time, change is a part of this industry. However, you want to look closely at how they deal with change because it typically goes one of two ways. ... The second reason is that often the folks you are talking to are out of the loop. In this instance, no one is being untruthful, but it does showcase a command and control problem inside the firm consistent with failure.  If the right hand doesn’t know what the left is doing the company won’t execute well.



Quote for the day:

"It is during our darkest moments that we must focus to see the light." -- Aristotle Onassis

January 11, 2015

Ranking the disruption potential of industry forces
We’re applying some Gigaom Research resources to mapping out the dynamics of industry disruption to create a framework for our readers and clients for identifying and characterizing disruptive forces so that they can drive them for their own success, or defend against being overwhelmed by them. ... We received over 100 responses, and we’ll be using that input as one of the drivers for our research. Overall, over 80 percent of respondents agreed “the economy as a whole was in a disruptive state with multiple strands of change.”


Breaking new ground for supporting the software-defined infrastructure (SDI)
To enable a unified view across software stacks, as well as support greater choice, HP experts plan, design and architect open SDI solutions based on open architectures such as HP Helion OpenStack across physical and virtual infrastructures.  ... HP takes Datacenter Care to new heights by including capabilities for Helion OpenStack, DevOps, SAP HANA and multivendor systems, as well as additional support within Flexible Capacity. With HP, your IT infrastructure and application development teams benefit from faster access to infrastructure resources and global expertise, as well as increased IT stability.


9 Must-Have Skills to Land Top Big Data Jobs in 2015
The secret is out, and the mad rush is on to leverage big data analytics tools and techniques for competitive advantage before they become commoditized. If you’re in the market for a big data job in 2015, these are the nine skills that will garner you a job offer.


Will Enhanced Servers Do Away With Need For Switches?
“We’re getting rid of layers: layers of switches, layers of links between switches,” says MH Raza, Fiber Mountain founder and CEO. “Switching as a function moves from being inside a box called a switch to a function that co-resides inside a box we call a server. If we put the switching function inside a server, it’s the same logic as a rack front-ending a number of servers; it’s the housing of a server with a switch in it front-ending a bunch of VMs. Why can’t that decision be made at the server? It can be made at the server.” Raza says he knows of a vendor – whom he wouldn’t name – offering an Intel multicore server motherboard with a Broadcom Trident II switch chip and a high capacity fiber connector.


Cloud Integration Issues? Look to the Enterprise Architects
The core opportunities lie with the enterprise architect, and their ability to drive an understanding of the value of data integration, as well as drive change within their organization. After all, they, or the enterprises CTOs and CIOs (whomever makes decisions about technological approaches), are supposed to drive the organization in the right technical directions that will provide the best support for the business. While most enterprise architects follow the latest hype, such as cloud computing and big data, many have missed the underlying data integration strategies and technologies that will support these changes.


The Inside Story of How Sony Handled the Biggest Hack in History
"People relied on each other and it's a good thing they relied on each other, because there wasn't a lot of assistance coming out of the community, except for the FBI," Lynton said. While most Sony employees already were on the Everbridge emergency notification system, workers recruited the rest to sign up. If he had to do it again, Lynton said he would have made it mandatory to already be on it. Senior managers created text and phone trees to communicate and held twice-daily meetings. Thirty to 40 people worked day and night through the Thanksgiving holiday. When employees arrived to work on Monday, one week after the Nov. 24th hack, a "concierge"-like desk greeted them to help get them signed onto a temporary email system set up by the technology team.


Machine-Learning Maestro Michael Jordan on the Delusions of Big Data
It’s true that with neuroscience, it’s going to require decades or even hundreds of years to understand the deep principles. There is progress at the very lowest levels of neuroscience. But for issues of higher cognition—how we perceive, how we remember, how we act—we have no idea how neurons are storing information, how they are computing, what the rules are, what the algorithms are, what the representations are, and the like. So we are not yet in an era in which we can be using an understanding of the brain to guide us in the construction of intelligent systems.


Top 5 IT Resolutions for 2015
2015 is finally here and as most of the corporate world returns to work this week, it’s time for executives to come up with some New Year’s Resolutions of their own. While you’ve no doubt (I hope) already come up with your IT budget for 2015, there are a few housekeeping items that should be on your New Year’s Resolution list for your business when it comes to your technology. Drawing a blank on how to improve your situation in 2015? Here are our top 5 IT resolutions for 2015.


Apache Spark 1.2.0 Supports Netty-based Implementation, High Availability
Apache Spark 1.2.0 was released with major performance and usability improvements in the Spark core engine. It represents the work of 172 contributors from over 60 institutions and comprises more than 1000 patches. Spark 1.2.0 is fully binary compatible with 1.1 and 1.0 and includes a Netty-based implementation, which significantly improves efficiency. Spark streaming adds support for Python and High Availability via Write Ahead Logs (WALs). In addition there is a set of machine learning APIs called spark.ml.


The debate about good governance
The World Bank’s work on good governance addresses economic institutions and public sector management, including transparency and accountability, regulatory reform, and public sector skills and leadership. The United Nations highlights democratic governance and human rights, aspects avoided by the Bank. The IMF declares that “promoting good governance in all its aspects, including by ensuring the rule of law, improving the efficiency and accountability of the public sector, and tackling corruption, are essential elements of a framework within which economies can prosper.”



Quote for the day:

Leaders must be close enough to relate to others, but far enough ahead to motivate them. -- John C. Maxwell


January 10, 2015

M-Files: A better SharePoint than SharePoint
First, M-Files is very easy to install and configure. That is a refreshing difference compared to some of M-Files' competitors that have very complex requirements and lengthy installation procedures. Second, your information is stored by what it is and where it rather than where it is. Storing information by what it is saves you time and effort in locating a document later on. Think about trying to remember a document name three or six months after you first used it. How many folders will you have to search through to find it when you can't remember its name?


Why Once-Successful Companies Fail
In many cases, executives believe that if there is a control system in place, it will do the job for which it was intended. However, in many organizations, systems and policies are constructed for day-to-day transactions but not for analyzing the abundance of raw data – think Big Data – to make sense of what it all means. Long-term sustained performance is based on transforming data into analyzable information for insight and foresight to support decision making. This is where business intelligence, business analytics, and enterprise and corporate performance management systems with embedded analytics fit in. Software technology is no longer the impediment for performing investigation and discovery.


Office fitness trackers: Fun perk or creepy leash?
“Corporate wellness programmes are well-funded, well-respected and well-liked, particularly in the United States, despite the lack of hard evidence on their effectiveness,” said Jonathan Collins, principal analyst for ABI Research. He estimates that around 13m trackers will be brought into corporate programmes in the US alone by 2018, compared with only around 200,000 in 2012. Much of this is driven by the high cost to companies of health insurance in the US. “In the future when you get hired to work at a company they’ll say, ‘you're going to be enrolled in our wellness programme.’


Technology to improve India's shocking health indicators
There is finally some good news though. India is waking up to the fact that something must be done urgently to rectify its healthcare. And the country is taking the right approach. Authorities are looking at various ways in which technology can be used to better the ground realities. The best part of this is that, the initiatives are not just from the government side. Private parties are chipping in too. ... RA Mashelkar, the former Director General of CSIR (Council for Scientific and Industrial Research) agrees. “We need technology for addressing issues like the high incidence of anemia prevalent among women in rural India, and such others”. He feels technology can definitely play an important role in resolving healthcare issues in rural India.


IoT for Home Automation
The Internet of Things, IoT, is upon us in a huge way and people are rapidly inventing new gadgets that enhance our lives. The price of microcontrollers with the ability to talk over a network keeps dropping and developers can now tinker and build things inexpensively. Developers and hardware enthusiasts no longer need to wait on others to invent or build all the "cool" stuff!  The value of IoT is in both data and control. With home automation it is nice to have a log of events to know when a family member did something like got home or when they turned on the fireplace.


The Hacker's Manifesto turns 29 years-old
"Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike." It's been twenty-seven years since I first read those words, twenty-nine since they were written. If encouraging curiosity, accumulating and sharing knowledge, keeping an open mind and judging others on their deeds and not their circumstance or looks, or being a hacker means I'm a criminal – then I'll wear that title proudly for the rest of my days.


Intel's diversity goals face many challenges
It will be incredibly hard to change the status quo, train managers to hire people who aren't from similar backgrounds, and ultimately get people to admit the tech industry isn't the meritocracy it should be, said Ginny Clarke, an executive recruiter for talent firm Knightsbridge who works with tech companies on diversity hiring and retention. "We're really talking about a culture transformation," Clarke said. Change needs to take place at the deep core of a company. "I'm skeptical ... I'm not cynical yet, however, and I want to see it work."


Intel CEO Krzanich unveils wearable processor Curie
Intel noted that it introduced Edison, a computer the size of a postage stamp designed for wearables. Krzanich unveiled Curie, a computer about the size of a suit button. Intel's wearable strategy revolves around partnerships. Curie is just out of the labs and a prototype, but will land in the second half of 2015. "This changes the game on wearables," he said. ... "Everything that was once standalone is now becoming smart and connected," said Krzanich. Intel's CEO highlighted how the company could integrate security and RealSense in ADP security systems. Think authentication to get into your house.


Data Science And Statistics: Colleges Must Evolve
We generally find that specific majors aren't a perfect fit – and are often pleasantly surprised by "non-predictor" candidates who connect the academic/commerce dots in the interview process. Often it's the research and internship work that seals the deal. Computer science and math majors can be great but can also be overly theoretical, while students without pertinent work experience may not have the requisite data and computation skills. Several recent physical/natural science majors with strong research backgrounds have become capable apprentices.


An implementation of a list splicing and traversing library
The goals of this exercise was to write a set of useful list functions while exploring the possibilities of what using a list data structure provided. The basic operations were to be able to add or remove items from a list and to make changes to the list. I looked to the splice() function provided by php as a model for the Splice() method implemented in this package as well as to the C++11 Standard Template Library for a model for applying algorithms to the elements of a list. In order to make the If types of methods - FindIf(), FindIfNext(), ForEachRemoveIf(), etc. - more useful and flexible,



Quote for the day:

"Our chief want is someone who will inspire us to be what we know we could be." -- Ralph Waldo Emerson