February 24, 2015

Technical Debt: A Repayment Plan
Just as how we plan to pay back known technical debt we can also build into our project plan a buffer with which to address bit rot each sprint. Though the specific tasks that fill this buffer may not be known at the time, having the buffer there gives us a dedicated space with which we can payback those unplanned issues such as bugs, minor refactorings that must be handled immediately, or small pieces of system maintenance that make themselves known as our codebase naturally ages and decays. But what about the larger issues that can’t be handled in a few hours of development time? Perhaps there are more systemic problems plaguing our system such as a failing infrastructure or aging architecture that no longer fits the shape of our business.


Many attackers lurk undetected for months, then pounce
One of the main problems is that attackers are moving away from using malware that can be quickly detected. Instead, they're stealing authentication credentials and using them to log into systems remotely. In that way, they look like legitimate users logging into systems, which becomes difficult to detect. In two of the largest payment card data breaches, affecting Target and Home Depot, attackers obtained credentials used by third-parties to access those retailers' networks, allowing them to gain a foothold that eventually enabled attacks on their point-of-sale systems.


Memory Deep Dive - Optimizing for Performance
The two primary measurements for performance in storage and memory are latency and throughput. Part 2 covered the relation between bandwidth and frequency. It is interesting to see how the memory components and the how the DIMMs are populated on the server board impact performance. Let’s use the same type of processor used in the previous example’s the Intel Xeon E5 2600 v2. The Haswell edition (v3) uses DDR4, which is covered in part 5. ... Populating the memory channels equally allows the CPU to leverage its multiple memory controllers. When all four channels are populated the CPU interleaves memory access across the multiple memory channels. This configuration has the largest impact on performance and especially on throughput.


Security is CIOs' worst nightmare
"Disaster recovery and continuity are two things you just can't cut from your budgets, and I feel they're some of the most underappreciated vendors we work with. So much of budget planning for these services comes down to trust between a CIO and a CEO and others in the C-suite. There must be open and honest communication between all the parties involved so when we go to other executives they understand the absolute necessity of these services, and that we as CIOs are accurately representing the risks involved if budgets must be cut," says Jones. Downtime is more than just an inconvenience, says Martha Poulter, CIO at Starwood Hotels, it can greatly impact an organization's capability to generate revenue and grow business in the long-term, too, especially in a market such as hospitality.


Reaping global business benefits from software-defined data center
Columbia Sportswear has been going through a global business transformation. We’ve been refreshing our enterprise resource planning (ERP). We had a green-field implementation of SAP. We just went live with North America in April of this year, and it was a very successful go-live. We’re 100 percent virtualized on VMware products and we’re looking to expand that into Asia and Europe as well. So, with our global business transformation, also comes our consumer experience, on the retail side as well as wholesale. IT is looking to deliver service to the business, so they can become more agile and focused on engineering better products and better design and get that out to the consumer.


How Businesses Can Avoid Legal Risks of Social Media Usage
Ford says employers should answer a few questions before implementing social media for business purposes: what is the platform, how does it work, and why am I using it? “Just because you can use social media doesn’t mean it is building business, so use it in a way to build your business.” After answering those questions, employers should create a social media policy that addresses two audiences: employees who work on social media for the company and general employees—complementing other company policies, such as those addressing harassment or ethics.


Q&A with Matthew Carver on The Responsive Web
Bandwidth and memory exist in a budget and in order to accomplish tasks you must spend that budget. Developers might over spend in those budgets for a myriad of reasons but it's not a valid reason to dismiss responsive design as a whole. That's just silly. There's this old saying "A shoddy carpenter blames his tools". Responsive design is a tool to solving the problem of device parity on the web. Device fragmentation is a reality on the web and just because responsive design isn't perfect doesn't mean it's worth abandoning.


Welcome to the Age of Constant Attack
The perspectives on how best to address cyber security threats have gone through their own evolution. Headlines suggest that in the case of a threat like DDoS the challenge is simply having enough capacity to handle volumetric attacks. We know from experience that it just isn’t that simple. What’s needed to solve the problem of DDoS is based on three core characteristics of attacks: number of vectors, volume of attack, and finally, duration of attack. Escalations of all three present their own unique challenges, and the best approach will be one that balances a focus on preparation and response.


Creating a Simple Collection Class
No matter what limited set of features you intend to provide, if you're building a collection there are some features that you must provide. At the very least, for example, your collection will need to support processing all of its items with a For…Each loop. In addition, it's very unusual a collection doesn't support retrieving individual items in the collection by position (an indexer). In practice, if you don't supply those two features, then developers might not regard what you've created as a collection at all.


Teen hacks car with $15 worth of parts
Markey's office issued a report on vehicle security and privacy earlier this month, noting that automakers are developing fleets with fully adopted wireless technologies like Bluetooth and wireless Internet access, but aren't addressing "the real possibilities of hacker infiltration into vehicle systems. "Even as we are more connected than ever in our cars and trucks, our technology systems and data security remain largely unprotected," Markey, a member of the Commerce, Science and Transportation Committee, said in a statement. "We need to work with the industry and cyber-security experts to establish clear rules of the road to ensure the safety and privacy of 21st century American drivers."



Quote for the day:

"Take time to deliberate; but when the time for action arrives, stop thinking and go in." -- Andrew Jackson

February 23, 2015

Forget the tech bubble. It’s the biotech bubble you should worry about
The biotech craze isn’t, of course, built entirely on hot air. There was a jump in drug approvals last year, there are some potentially revolutionary drugs in development, and the US Food and Drug Administration (FDA) opened up a few ways of getting promising drugs approved faster. Biotech saw its first true blockbuster for some time in Gilead’s Hepatitis C drug Sovaldi, which was approved in late 2013, and quickly set sales records. Companies that have products on the market and are growing their revenues may warrant their high valuations. But others do not.


Burley Kawasaki on best tips for attaining speed in enterprise mobile apps delivery
If you look at the stats or the data, most industry analysts predict that up to 60 percent or 70 percent or more of mobile development is outsourced today, to either an interactive agency, a systems integrator, or someone else, because of lack of skills.  So it has been outsourced to some third party, and who knows what technologies they are using to build the app. It's outside the typical controls or governance of IT. So it's not only shadow; it's dark matter. You don't even know it exists; it’s completely hidden.  Yet, at some point, inevitably, those apps that you may have outsourced for your first version, it’s not just a first version release.


Apple, Linux, not Windows, most vulnerable operating systems in 2014
The top spot for vulnerabilities in operating systems no longer goes to Microsoft Windows; in fact, Windows isn't even listed in the top three. Instead, the most vulnerable OS was Apple Mac OS X, followed by Apple iOS and Linux kernel. As you can see in the list below, Mac OS X had 147 vulnerabilities, with 64 being rated as high-severity bugs. There were 127 in iOS, 32 of those rated as high. Linux kernel had a rough year, with 119 security vulnerabilities and 24 being rated as high-severity. The flip-side is that none of the security holes in Windows versions were rated as low severity.


The key to a successful security project
Being first held a couple meanings for us. When working with people - be first to understand what they needed and offer them help getting there. This is how we found out what to report on our scorecard line. We simply treated everyone we interacted with like our most valued customer. No matter where in the org chart, or when in the project cycle, we treated relationships like the success of our project depended on it, because it did. Second, when faced with a new idea - could we be the first to do something in our organization, could we lead it somewhere, improve something?


How to Systematically Incorporate Social and Cultural Factors into EA Practice
Ceri Williams drills deep into a key area of difference and explores what it means in practice for the Enterprise Architect. He considers how SSM is inclusive of all areas of the situation/action space (i.e. scientific, technological, mechanical, material, psychological, social and cultural), while an engineering approach excludes psychological, social and cultural influences. This paper describes how an Enterprise Architect can appropriate elements of SSM and related social and cultural disciplines, and blend them in as a defined part of a holistic approach to Enterprise Architecture.


Are You Ready for Web 40.0?
Personal and “desktop” computers will completely disappear. All single-purpose stationary machines – like fax machines and copiers – will completely disappear. Intelligent, networked tablets, watches, smart phones and wearables will integrate and become increasingly unnoticeable as they disappear into Web 40.0, the most important utility of the 21st century. Today’s discussions about “the Internet of Things” (IOT) and the “Internet of Everything” (IOE) represent the official launch of human/ digital/personal/professional integration.


Collaboration Techniques for Large Distributed Agile Projects
In past few years, it has become quite common for software development teams to be distributed across time-zones and comprise of multiple vendors with 50-100+ people. Agile practices encourage in-person interactions to foster collaboration, whereas, distributed and large teams force communication into the opposite direction. Therefore, it is important to achieve agility albeit with different, or modified mechanics, that work well for distributed and large team.I have shared examples for my project to explain Agile practices that work well in Large multi-vendor distributed teams.


How HTTP/2 will speed up your web browsing
The first way HTTP/2 speeds up traffic is by transferring all data as a binary format instead of HTTP 1.1's four text message styles. Besides making it simpler for web servers and browsers, this new format is more compact, because the more compact a web page is, the less time it takes to be transmitted. HTTP/2 uses multiplexing. This makes for a more responsive website by avoiding HTTP 1.1's "head-of-line blocking" problem. With earlier versions of HTTP, only one data request can be handled at a time, even though every time you visit a website, you start from four to eight TCP/IP connections. With HTTP/2, each website only gets one TCP/IP connection, but you can have multiple data requests being dealt with simultaneously.


NSA planted surveillance software on hard drives, report says
Surveillance software implanted on hard drives is especially dangerous as it becomes active each time the PC boots up and thus can infect the computer over and over again without the user's knowledge. Though this type of spyware could have surfaced on a "majority of the world's computers," Kaspersky cited thousands or possibly tens of thousands of infections across 30 different countries. Infected parties and industries include government and diplomatic institutions, as well as those involved in telecommunications, aerospace, energy, nuclear research, oil and gas, military and nanotechnology. Also, included are Islamic activists and scholars, mass media, the transportation sector, financial institutions and companies developing encryption technologies. And who's responsible for this sophisticated spyware?


Google and Apple Fight for the Car Dashboard
Here at Google’s headquarters, Android Auto is about to make its debut in Americans’ cars after two years in development. Plug in a smartphone with a USB cord and the system powers up on a car’s screen. The phone’s screen, meanwhile, goes dark, not to be touched while driving. Apple’s CarPlay works similarly, with bubbly icons for phone calls, music, maps, messaging and other apps appearing on the center screen. (Apple declined to comment for this article.) While the idea of constantly connected drivers zipping along roads raises concerns about distracted driving, both companies say their systems are designed with the opposite goal: to make cellphone-toting drivers safer.



Quote for the day:

“If you want to rebel, rebel from inside the system.That's much more powerful than rebelling outside the system.” -- Marie Lu

February 21, 2015

Kevlin Henney on Worse is Better and Programming with GUTS
Nonfunctional is a wonderfully vague English word. We're trying to define something by its negative. What qualities are important? Well, not the functional ones. It doesn't really make sense. ... So a nonfunctional behavior is generally and literally a thing you don't want. It's a thing we work against rather than for. What we're interested in are qualities of execution or qualities of development. As "nonfunctionals", these have merged together. Labelling these different categories as "nonfunctional requirements" mixes things together that happen at different times: at run time, such as speed and memory usage, versus development time, which is a completely different organism.


Tech essentials for the office and when on the road
When you think of tech it's easy to think of the big sticker items such as PCs and smartphones and tablets and such. But the small things can also make a huge difference. Here's a tour of some of the things that I take for granted, but which work hard for me every day, and without them I wouldn't be able to do as much as I do each and every day. Here you'll get to see some of the tools, batteries, chargers and other gear I personally use on a daily basis.


HP Latest to Unbundle Switch Hardware, Software
The disaggregated hardware/software model attempts to decouple switch hardware from networking software so operators of Web scale networks can quickly scale their networks at low cost with any product of choice, and without the entanglements of vendor-specific offerings. But by offering a branded white box option, vendors like HP –and Dell and Juniper before it – can sell into the Web scale opportunity and make money by providing follow-on service and support. ... To start, HP is introducing two brite box switches that enable 10G/40G spine and 10G leaf data center deployments. Both switches will be available in March with Cumulus Linux and offer OS installation using ONIE.


Hack gave US, British spies access to billions of phones: Report
The report by The Intercept site, which cites documents provided by former NSA contractor Edward Snowden, could prove an embarrassment for the U.S. and British governments. It opens a fresh front in the dispute between civil liberties campaigners and intelligence services which say their citizens face a grave threat of attack from militant groups like Islamic State.It comes just weeks after a British tribunal ruled that GCHQ had acted unlawfully in accessing data on millions of people in Britain that had been collected by the NSA. The Intercept report said the hack was detailed in a secret 2010 GCHQ document and allowed the NSA and GCHQ to monitor a large portion of voice and data mobile communications around the world without permission from governments, telecom companies or users.


Computing brains: neuroscience, machine intelligence and big data in the cognitive classroom
The field of educational neuroscience, or neuroeducation, is flourishing. At the same time, a number of initiatives based in computer science departments and major technology companies are also taking the brain seriously. Computer scientists talk of developing new braininspired cognitive learning systems, or of developing new theoretical and computational understandings of the brain in order to then build new and more effective forms of machine intelligence. The important aspect of these synchronous developments in neuroscience and brain-based systems is that they are beginning to come together in particular technological developments and products targeted specifically at schools.


Superfish security flaw exists in other apps, non-Lenovo systems
Superfish uses a man-in-the-middle proxy component to interfere with encrypted HTTPS connections, undermining the trust between users and websites. It does this by installing its own root certificate in Windows and uses that certificate to re-sign SSL certificates presented by legitimate websites. Security researchers found two major issues with this implementation. First, the software used the same root certificate on all systems and second, the private key corresponding to that certificate was embedded in the program and was easy to extract.


Inside the robot house: Is this your future? Photos
As part of the project, four robot houses were created in France, Germany, the Netherlands and in a residential area near the Hertfordshire University campus in England. The robotic environments share common features, such as overhead 360-degree cameras providing fish-eye views of the rooms below to track and record the movements and relative positions of robots and humans. The houses also employ sensors on doors and cabinets to show what has been opened, together with bot plugs, which can relay data on how much electricity is being consumed by individual devices. So if a fridge door is left open, triggering a rise in power consumption, that information is sent to the central computer and potentially to the robot as well.


Service-Oriented Architecture and Legacy Systems
Moving to SOA isn’t easy, and enterprises wishing to do so must be aware of the difficulties and inherent issues. Needless to say, every IT organization will experience multiple tradeoffs with SOA implementations; your mileage may vary. For effi ciency and fl exibility we recommend an incremental transition to SOA in legacy environments. ... Because legacy systems usually support key business processes, a step-by-step change plan should be developed and a feasible evolution of the current systems using a hybrid approach should be designed to achieve a pure SOA architecture. There are several strategies for converting legacy systems to SOA.


Why You Should Forget Your 'Right to be Forgotten'
It's easy to be misled on this issue. After all, privacy — on the Web, in the home or the in workplace — is a right most of us cherish. It's a right that's violated all the time by technology companies, advertisers and the government. I've certainly done my share of ranting about that issue, but erasing the past does not enhance our privacy. In many cases, deleting old information that pertains to a single individual hurts no one, and the banished bits will never be missed. But not always. The case that triggered the ruling illustrates its absurdity. The ruling concerned a specific request by a Spanish citizen, Mario Costeja González.


Dependency Inversion Principle - Let's keep it simple
SOLID is an acronym in which D stands for Dependency Inversion. Its another famous name is Inversion of Control (IoC) but this often confuses people when people try to remember the five SOLID principles embedded in the SOLID acronym as there is an I in SOLID as well but do remember that I in SOLID stands for a different design principle known as "Interface seggregation" principle. I will not say that this principle is in anyway more or less important than other four design principles but it is used more explicitly a lot because market has huge number of products which are famously known as IoC containers which are used by most developers to induce loose coupling in their components and enhance unit testing capabilities of their modules.



Quote for the day:

"Integrity is the soul of leadership! Trust is the engine of leadership!" -- Amine A. Ayad

February 20, 2015

What will soar and fail in tech and business in 2015
No one does predictions like Mark Anderson, whose forecasts about the intersection of the economy and technology are closely followed in Silicon Valley. He has a global view of what’s the next big thing and place along an eye for hot products and countries that about to take a dive. Anderson is head of Strategic News Service, a newsletter publisher for industry leaders and venture capitalists. It claims a readership that includes Dell CEO, Michael Dell, Tesla CEO Elon Musk and Microsoft’s Bill Gates. Recently, Mark Anderson listed his predictions for 2015 during a gathering in San Francisco. Here are his key points:


Best Practices for Enabling Employee-Owned Wearables in the Enterprise
It seems as if wearables have appeared almost overnight. It’s a new area for people to use technology to enhance their lives, particularly around personal health and fitness. And it’s a new area for IT to support and manage. At Intel, David Byrne is one person paying close attention to this technology in its infancy. He’s a mobility specialist in the Intel IT engineering group. In this podcast he talks about the increased wearable use by employees, how Intel IT is developing best practices to help support their use in the enterprise, and the business opportunities wearables present.


Mobile networks prep for the Internet of Things
It's good news for mobile users that they may not hear much about. A more efficient network leaves more free capacity for the video or application you want to run, and a more flexible carrier could quickly launch services in the future that you don't even know you'll need yet. The new architectures may even change how some businesses pay for mobile services. Just as enterprises used to buy separate servers for each application, carriers often use dedicated hardware for each function involved in delivering a service, such as billing and authentication.


How Large Companies Can Leverage Startups to Innovate
Our three business innovation experts represent a broad spectrum from investing in startups to guiding startups to being an entrepreneur inside a large organization.Evangelos Simoudis is a venture capitalist and an expert on innovation based in Silicon Valley; Todd Schofield runs the Innovation Centre for the London-based Standard Chartered Bank; and Philippe Mauchard is a partner with McKinsey and the co-founder of McKinsey Solutions. It is my hope that both startups and large companies will benefit from their guidance on how the two can come together for their mutual success.


Enterprise IT faces upheaval to move to cloud-first computing
"Unlike the situation where you have full control on-premise, you are outsourcing some of the control," said Kalush. "Even with a cloud service that offers 99.9% uptime, you need to assume there will be 0.1% downtime." As such, he said when building enterprise software for the cloud, the application needs to assume there will be breakages and failures.  Kalush added that the design of a cloud-based application requires a far more robust disaster recovery capability from day one compared to on-premise software.


The future of ‘everywhere ergonomic’ technology
In a recent interview with the Economist Intelligence Unit on ‘The Future of Work’, (sponsored by Ricoh Europe), Alan Hedge, Director of the Human Factors and Ergonomics Laboratory at Cornell University, points out that this type of technology is just the start, “we are at the very beginning of a revolution in ‘active’ objects and products that have sensors built into them.” Professor Hedge terms this interaction between people and design technology ‘everywhere ergonomics’. While smart chairs and surfaces may not have made their way to all workplaces just yet, many people will already be using everywhere ergonomics at home. It’s only a matter of time before the boom in wearable devices begins to have a transformative effect on the workplace.


Cognitive Computing (Slowly) Changes Healthcare
After over a year of research, we are capable of saying that cognitive computing is important to healthcare and is more than a science project. What we have found is that there is a divide between big health care business and smaller ones. The big businesses, the ones that are true centers of excellence in the provider, payer, and drug research arena are using the advances of cognitive computing machine learning and big data to innovate in fundamental ways. We also see the march to the main stream, as is always true in healthcare will be slow.


7 Modern Marketing Frameworks Every Startup Need to Know
As a young marketer navigating the digital landscape, I love frameworks. Not only do they help me plan and prioritize, but they help me visualize how everything I’m working on fits together. No, I won’t be talking about (and I’m looking at you, classically trained marketers) the 4Ps, Porter’s 5 forces, or SWOT analyses. Sure, those frameworks have their place, but they don’t provide much direction for startups looking to focus their energy on growth. Plus, they’re getting pretty old. The frameworks below were developed by modern marketing gurus. Together, they’ll help you make a growth strategy, select traction channels, and influence your customers’ behavior.


Police lost 20,000 stop-search records after 'wrong button pressed'
Assistant Chief Constable Wayne Mawson told members of the justice committee that 20,086 stop-search records were corrupted last year - because a computer programmer pressed "the wrong button". Now, as a former computer programmer myself, I question this. Even if it were that easy to delete thousands of records with one keystroke, most database management systems have a way to retrieve data - and, even if they didn't, why weren't back-ups made? If there are no back-ups to a system that loses data then my advice would be to mark that pesky keyboard button in red, and encase it in unbreakable glass to avoid any future errors.


Security professionals warn against relying on cyber insurance
“While insurance may help mitigate some of the financial impact of a security incident or breach, the reputational impact and the impact to the business operation cannot be mitigated with insurance in the same way,” he said. Lay said that businesses should instead aim to be smart with their approach and consider the people, process and technology elements when it comes to responding to the threats they face. “By taking this risk-based approach, businesses can ensure that they are dealing with the largest and most dangerous issues first,” he said. Lay said recent Fujitsu stud on digital enablement showed that for the 12% of UK consumers who said they never use digital services, security was a top concern.



Quote for the day:

"The leader has to be practical and a realist, yet must talk the language of the visionary and the idealist." -- Eric H

February 19, 2015

Who's writing Linux today? Capitalists
All together more than 4,000 developers from 200 companies have contributed to the kernel. Half of the kernel developers were contributing for the first time. That number may look large, and it is, but the Foundation also found that "there is still a relatively small number who are doing the majority of the work. In any given development cycle, approximately 1/3 of the developers involved contribute exactly one patch." Since the 2.6.11 release, the top ten developers have contributed 36,664 changes -- 8.2 percent of the total. The top thirty developers contributed just over 17 percent of the all the code.


There's no way of knowing if the NSA's spyware is on your hard drive
According to a report by Reuters, a former NSA employee "confirmed that the NSA had developed the prized technique of concealing spyware in hard drives, but said he did not know which spy efforts relied on it." ... "There is no way to understand whether your HDD is infected," Igor Soumenkov, principal security researcher at Kaspersky Lab, said in an email reply to Computerworld. "Once the hard drive gets infected with this malicious payload, it's impossible to scan its firmware."


Ansible CEO: A New Fold In The IT Automation Universe
Ansible brings a new aspect of IT automation to the Enterprise. The idea of being able to automate updates to your infrastructure simply and with higher flexibility has driven the high adoption rate we’ve seen in the past two years. This space has been dominated by what I call the “pre-virt automation” tools that made a name for themselves before Virtualization and Cloud was around. Ansible was built as a cloud native tool, able to manage both on-prem and cloud instances seamlessly and with greater flexibility ... We strongly believe that IT Automation should be a dull task; your IP competency should be your priority and the main focus for your software developers. Managing your infrastructure must be simple to a point that it’s almost boring.


French Minister Thinks Netflix Needs To Pay ISPs A 'Bandwidth Tax'
This reasoning is incoherent and stupid, since customers and content companies alike already pay plenty for bandwidth and infrastructure. Still, somehow Whitacre's absurd attempt to try and offload network operation costs to others went viral globally, and we've repeatedly seen overseas telcos trying to argue the same point ever since. Of course, whereas Google used to be the global telco whipping boy, we're increasingly seeing Netflix playing that role given its more vocal support of net neutrality.


Is Microsoft still the CIO's best friend?
"Licensing has probably been the single biggest reason why CIOs would not count Microsoft as a friend," he says. "The fact that there are specialists whose sole purpose is to interpret and explain how these licensing models work tells you all you need to know about the complexity, mystery, and confusion that exists around the myriad of Microsoft licence agreements." Even more frustratingly, Cox says that CIOs are often none the wiser as to which licensing model represents best value for the organisation after spending time with these specialists.


Heroku Expands Cloud Services For Enterprise Development
A new collaboration feature allows a wider team of developers, project managers, system administrators, partners, and contractors to work together on an application or a group of apps. "Enterprises are looking for a more powerful collaboration capability," noted Jesper Joergensen, senior director of product management, in an interview with InformationWeek. Heroku is trying to provide wider collaboration that is still under the review and control of a few overall managers, he said. For example, an application that made use of the language combination available on Heroku could be worked on by different teams under the new Enterprise collaboration umbrella.


To cloud or not to cloud for mobile enterprise security?
The cloud service providers, because of the nature of their service, have specific people to manage and provide the service. In the case of a dedicated infrastructure, an organization will need to train its own personal. As for provisioning, with a dedicated infrastructure, the client has to provide the infrastructure resource for their projected user baseline for the next 2-3 years. This means the resource will be oversized for the first couple of years. In a cloud-based model, the client doesn’t need to worry about this because he can pay just for the infrastructure that he is currently using. Finally, in terms of process, cloud service providers will have their own processes for meeting the requirements.


Microsoft adds HTTP Strict Transport Security support to Internet Explorer
HSTS addresses SSL stripping attacks by allowing websites to instruct browsers that they should always connect to them over HTTPS. Websites can express this policy through a Strict-Transport-Security HTTP header sent in a response. Once a browser sees such a header for a website, it will remember the preference and only accept HTTPS connections for that site in the future. Internet Explorer is actually the last major browser to get support for HSTS and even now it's not for all versions. Google Chrome has had HSTS support since 2009, Firefox since 2010, Opera since 2012 and Safari since 2013.


Microsoft: big data analytics for everyone
This news comes just 24 hours after HP announced its Haven Predictive Analytics software was fit for operationalising large-scale machine learning. These new services from Redmond reaffirm that "Microsoft is embracing open source" (the team is saying that a lot) and simplifying Hadoop (every body wants to do that, Hadoop is hard) for simplicity and ease-of-use. Updates to Azure HDInsight include a public preview of HDInsight on Linux and general availability of Apache Storm for HDInsight.


Metadata Driven Design - An Agile Bridge Between Design and Development
Usually, when metadata is put into use, it exists as simply a configurable set of data that can determine some aspect of behavior in an application. C# attributes can designate the preferred mode of a defined class, and a set of .properties files can contain the values needed by a Java application in order to establish a database connection. To some extent, one can scrutinize this metadata alone and deduce its intended effects upon the program’s execution. In some cases, it even has the power to tell a narrative, and if formed meticulously, it can tell the story of an entire architecture. Truthfully, there’s no reason that the very same metadata can’t also drive such an architecture, but we’ll get to that part later.



Quote for the day:

A community is like a ship; everyone ought to be prepared to take the helm." -- Henrik Johan Ibsen

February 17, 2015

Why Improving Emotional IQs Makes for Better IT Leaders
Why is this important to you? Because your IT and technology managers are a key part of your execution and retention strategies; those with a higher emotional intelligence will deliver better results in areas like team leadership, influencing people, organizational awareness, self-confidence and overall leadership. The good news, says Angela Yochem, CIO of BDP International is that, "The great thing about the technology field is that it attracts intelligent, passionate, interesting people, and I believe that, in general, the same openness to new ideas that attracts people to technology brings motivation, integrity, and comfort with change - all elements of high EQ."


Highly Distributed Computations Without Synchronization
Under this model, objects are no longer susceptible to these “concurrency anomalies”, because objects that observe Strong Eventual Consistency are designed to converge correctly under both concurrency and failure. This property makes these data types very powerful for ensuring correctness in distributed systems, especially distributed databases which use optimistic replication techniques. These data types come in two flavors: state-based, which rely on the properties of semilattices, and operation-based, which are more space-efficient and rely on the commutativity of all operations.


Neptune Duo inexplicably reverses the roles of smartphones and smartwatches
Ultimately, the Neptune Duo reeks of a device built by geeks for geeks, but with little thought about how normal people actually use technology. We can't imagine too many people would be eager to trade in their slim smartphones for a giant sci-fi movie prop. And there are still plenty of usability concerns to to deal with, like the mere act of taking phone calls. You can use the wearable's speakerphone or a wireless headset to chat with people, but you can't take calls over the Pocket (even though that seems like the most obvious way to do so). We'd have a bit more faith in the project if we saw the Duo working, but right now it's just a dumb prototype.


15 Hot Skill Sets For IT Pros In 2015
Security is one of the hottest fields for IT recruiters this year. "Security is a huge issue. Mobile and cloud computing is everywhere," said Laura McGarrity, VP of digital marketing and recruiting firm Mondo, in an interview with InformationWeek. McGarrity lists "security architect" and "security engineer" among her most sought-after titles this year. "Users are now connected on multiple devices, with multiple endpoints, making it tough to manage security risks," she said. If you want to ensure your skills stay sharp, it certainly pays to keep tabs on emerging and, dare we say, trendy technologies, as well as on the technology news headlines. That doesn't mean every marketable IT skill is a buzzword. In fact, far from it. Java developers are still highly employable -- the language remains ubiquitous in enterprise IT.


Gartner Says Managing Identities and Access Will Be Critical to the Success of IoT
The Identity of Things (IDoT) is a new extension to identity management that encompasses all entity identities, whatever form those entities take. These identities are then used to define relationships among the entities — between a device and a human, a device and another device, a device and an application/service, or (as in traditional IAM) a human and an application/service. Since devices have not traditionally been part of IAM systems in this way, the IDoT must draw upon other existing management systems to aid in developing the single-system view for the IoT. IT asset management (ITAM) and software asset management (SAM) systems have traditionally managed IT and software assets of all types.


IBM Redefines Storage Economics with New Software
IBM Spectrum Accelerate enables clients to layer their infrastructure with intelligent features derived from XIV. These features include unique architecture with zero-tuning that can help clients dynamically add storage capacity in minutes versus the months it takes today to add, install and run storage hardware systems. The software can help provide business continuity upon disaster for all committed data, compared to the risk of losing 15 minutes of data or more with certain other competing storage software. Both speed and data protection are essential to clients in data-driven industries such as financial services, healthcare, retail and telecommunications as they seek to deploy new workloads on the hybrid cloud.


Why an InfoSec Pro is Like a Doctor
"There is a shortage of common approaches to the education process in Information Security," Loeb says. "The long term approach needs to include influencing curriculum in the academic community to establish some of the principles of the cybersecurity mindset." In this exclusive interview with Information Security Media Group, Loeb speaks about the expectations being set by the new Modi government and how the ecosystem is poised for a change. He shares insight on how a sustainable training mechanism can be brought about to meet the nation's need for capacity building in the skilled information security workforce. Loeb also addresses:


Chips under the skin: Biohacking, the connected body is 'here to stay'
While the idea of chips embedded under the skin brings to mind the idea of cyborgs, Sjoblad was quick to point out at the conference that they are "already among us" -- thanks to pacemakers, medical implants, insulin pumps and neurally controlled prosthetics. Over time, the development and cost of materials to produce such technology becomes cheaper -- only 10 years ago mapping the human genome costed over $100,000, now it is closer to $10,000 -- and in the same way, rapid miniaturization of technology, lower production costs and demand for increased connectivity will propel under-the-skin smart technology forward.


Microsoft claims compliance with ISO data privacy standard
Cloud competitors are likely to call this a PR stunt — a concept that Microsoft is familiar with — but a security expert said ISO/IEC 27018 certification could become a major selling point to privacy obsessed consumers who balk at the notion that Google, because of its advertising business, uses customer data to sell stuff. Said this expert, who requested anonymity because he works with both Google and Microsoft: “Google would never agree to this since advertising is everything to them … Personally when I pay someone for a service, I expect my data to be private. When I use a service for free I accept that it is being paid for by sacrificing my privacy.”


Increasing Enterprise Agility and Agile Innovation
With the mainstreaming of Lean and Agile work practices, teams and employees are now increasingly "at war" with middle managers who have not been given a new role and continue to believe their value comes from directing and managing work and teams. Their mistrust of the self-direction and self-management that these practices promote cause them to increase their command and control management style, build silos of power and information, and worse, block access and direct engagement with executives (which keeps them in the dark and unaware of the problem).



Quote for the day:

“The greatest mistake we can make is to stay on the ground after falling.” -- Victor Manuel Rivera

February 15, 2015

5 Ways Data Virtualization Can Enhance Your Investment in the Enterprise Data Warehouse
As a replacement platform, Hadoop (as well as other high performance NoSQL tools) can be used to simplify the acquisition and storage of diverse data sources, whether structured, semi-structured (web logs, sensor feeds), or unstructured (social media, image, video, audio). In addition, data distribution and parallel processing can speed execution of algorithmic applications and analyses, and provide elastic augmentation to existing storage resources. However, at the current level of system maturity Hadoop does not necessarily address our aforementioned challenges. While there is a promise of linear scalability, migrating reporting and analytics to a big data platform does not address data dependencies and synchronization requirements.


Simple TOSCA Orchestration for Docker
TOSCA orchestration is already fairly mature, with a proven track record and speed of development, and many organizations are betting on and contributing to its success. TOSCA is now beyond its second major revision, has been around for a couple of years now, and is gaining traction in both commercial and open source projects such as: Juju, Cloudify, IBM Cloud Orchestrator, OpenStack Heat. It’s also being adopted by leading Telco vendors such as Alcatel-Lucent, Huawei, and Cisco. The fact that TOSCA is backed by a standards body (OASIS) makes it a great platform for defining a standard container orchestration specification that is portable across various cloud environments and container providers.


Thinking About Gamifying Your Workplace? Think Again
Gamification is hot. And why not? Turning mundane tasks into games will better engage your employees... and make coming to work a lot more fun, right? Maybe not. According to research conducted by Bonusly, a web platform that helps companies reward and motivate employees by using peer-to-peer bonuses--workplace gamification can result in a number of problems ... But that doesn't mean gamification won't work in the right situations. Check out the infographic for ways to effectively use gamification strategies.


The great internet swindle: ever get the feeling you've been cheated?
Part of the problem here, argues Keen, is that the digital economy is, by its nature, winner-takes-all. “There’s no inevitable or conspiratorial logic here; no one really knew it would happen,” he says. “There are just certain structural qualities that mean the internet lends itself to monopolies. The internet is a perfect global platform for free-market capitalism – a pure, frictionless, borderless economy … It’s a libertarian’s wet dream. Digital Milton Friedman.” Nor are those monopolies confined to just one business.


Can the Internet be archived?
The average life of a Web page is about a hundred days. Strelkov’s “We just downed a plane” post lasted barely two hours. It might seem, and it often feels, as though stuff on the Web lasts forever, for better and frequently for worse: the embarrassing photograph, the regretted blog (more usually regrettable not in the way the slaughter of civilians is regrettable but in the way that bad hair is regrettable). No one believes any longer, if anyone ever did, that “if it’s on the Web it must be true,” but a lot of people do believe that if it’s on the Web it will stay on the Web.


9 Generic Big Data Use Cases to Apply in Your Organization
Big Data means something different for every organization and every industry. What Big Data can do for your organization depends on the type of company, the amount of data that you have, the industry that you are in and a whole lot of other variables. Whenever I advise organization on their Big Data strategy, this is the main problem; there are so many different possibilities and often it is a struggle to find the right use case to develop into a Proof of Concept. That’s why I have developed the Big Data Use Case framework, to help organizations understand the different possibilities of Big Data and what it can do for their business. The framework divides 9 generic Big Data use cases into three different pillars


Stop Data Misuse, Speed Data-Driven Innovation
So, a main idea of its technology is for organizations to create those policies independent of individual data elements, instead applying rules to a higher layer. “The power to represent those policies at a higher semantic level is important,” he says, because it leads to the ability to speedily update policy changes at an organizational level. “Being able to do that and not have to tie things down to data fields is a great opportunity for the whole privacy and governance world,” Towvim believes. The angle TrustLayers takes to get organizations quickly started and able to scale up with Big Data authorization activities begins with capturing its policies for modeling, including the option to use policies pre-built at a higher abstracted level for specific industry sectors.


Microsoft tightens leash on POODLE attacks against IE11
With Tuesday's update to IE11, the browser is now set to stymie by default what's called "SSL 3.0 fallback," a mechanism that forces the browser to switch to the buggy SSL 3.0 from more secure encryption protocols, such as TLS 1.2. In December, an IE11 update offered the kill-SSL-fallback only as an option. With another update now slated for April 14 -- that month's Patch Tuesday -- Microsoft will completely disable SSL 3.0, the final step in its defensive change. Rival browser makers moved much faster than Microsoft to dump SSL 3.0.
.

Information Governance v Search: The Battle Lines Are Redrawn
Where are the rights to both privacy and security in the challenge of too-much-information? I am a strong proponent of privacy, and so are many in the IG world. I am also a strong proponent of cybersecurity. I think it is possible to have both. In both the Search and IG camps their are people who agree with me on these points, and others who disagree. Many see it as one or the other, especially people in government. They take extreme views favoring either security or privacy. Many in both tech and government simply dismiss the importance of privacy, and say just get over it. Advocacy for individual privacy is a separate battle in both worlds, IG and Search. The same is true over cybersecurity. I favor a balanced approach, and so do many in the IG world.


The more IT changes, the more technology issues remain the same
What is worse, according to Beighton, is that some CTOs are failing to track technology trends effectively. He says: "A good CTO should be naturally inquisitive. But a lot of CTOs are not keeping up with the times and the knowledge." Often he says, the CTO is not leading the technology direction of their organisations. Speaking at a Rackspace roundtable in London on e-commerce search, he said that product search had not evolved. He argues that most e-commerce sites work on the basis of publishing the availability of product or stock and hope the user buys from them. Often, sites will have spent a lot of money on Google Ads to get people there. "There’s so much more opportunity for these sites to help people and give them inspiration," he says.



Quote for the day:

"Earn your leadership every day." -- Michael Jordan

February 14, 2015

Our Fear of Artificial Intelligence
The question “Can a machine think?” has shadowed computer science from its beginnings. Alan Turing proposed in 1950 that a machine could be taught like a child; John McCarthy, inventor of the programming language LISP, coined the term “artificial intelligence” in 1955. As AI researchers in the 1960s and 1970s began to use computers to recognize images, translate between languages, and understand instructions in normal language and not just code, the idea that computers would eventually develop the ability to speak and think—and thus to do evil—bubbled into mainstream culture.


Hyperloop Is Real: Meet The Startups Selling Supersonic Travel
You remember the hyperloop, don’t you? It’s that far-out idea billionaire industrialist Elon Musk proposed in a 58-page white paper in August 2013 for a vacuum-tube transport network that could hurtle passengers from San Francisco to Los Angeles at 760 miles an hour. Laughed off as science fiction, it is as of today an actual industry with three legitimate groups pushing it forward, including Hyperloop Technologies, the team in Harry Reid’s office. They emerge from “stealth” mode with this article, armed with an $8.5 million war chest and plans for a $80 million round later this year. “We have the team, the tools and the technology,” says BamBrogan. “We can do this.” The 21st-century space race is on.


Three Key Disruptors to Business as Usual!
The internet of everything is transformational because it is creating an ‘explosion of connectivity!’ This potentially makes it possible for governments, organizations and businesses to invent and innovate with unlimited access to global connectivity. The internet of everything connects People, Things, Processes and Data, in ways that enables us to take Data to create Knowledge, Wisdom and Business. ... One of the key questions is how can we use entrepreneurship to break the ‘education-work-employment’ paradigm? How can we to teach the one quarter of the world’s youth who are neither studying nor working (as well as the growing more mature jobless generation) how to take personal responsibility for creating their own futures by adopting an entrepreneurial mindset?


What Do I Do With All This Data?
Before you can even begin thinking about implementing a big data solution – what do you do with the data you already have? Or maybe you are dabbling in digital marketing and social media on some level, but meanwhile, your data continues to pile up without any real insights into what it is telling you. If any of this sounds familiar, read on as we share some practical tips on how to better manage “all that data”. ... As part of any new data initiative, a business needs analysis should also be performed to understand what is required of data moving forward. A business needs analysis focuses on understanding business objectives, strategic goals and business drivers.


Big data digest: The backlash begins
The problem, according to Science News, is one of validity. With so much data and so many different tools to analyze it, how can one be sure results are correct?“Each time a scientist chooses one computer program over another or decides to investigate one variable rather than a different one, the decision can lead to very different conclusions,” Tina Hesman Saey wrote. The validity problem is not one faced only by big data enthusiasts, but by the science community in general. In an earlier article, Science News tackled the issue of irreplicable results, or the increasing inability of scientists to reproduce the results from previously published studies.


Automating the Data Scientists
Computers have made it trivial to run complex mathematical operations on large collections of data, and selling data analysis software is a growing business. But human creativity and expertise is still needed to choose and deploy the methods that can explain the patterns in a data set. The automatic statistician is one of a handful of tools being built to automate some of that expertise. When the system was given a decade of data on air travel, for example, it produced a nine-page report with four mathematical explanations for trends seen in the data that could be used to produce forecasts.


How to Help Millennials Shine in the Workplace
This is the millennial generation’s moment in the hot seat. Millennials are often viewed as impatient, tech-obsessed and disloyal to their employers, but while the specifics may be different, each generation has been in this position before: You’re new to the workforce, you have new ways of working and businesses can’t quite figure out how to deal with you. “Each generation had a different backdrop,” says Gloria Larson, president of Bentley University. Millennials, like every other generation, are “a group that is facing the realities of the decades they grew up in,” she says.


Object Pool Design Pattern
Object pools (otherwise known as resource pools) are used to manage the object caching. A client with access to a Object pool can avoid creating a new Objects by simply asking the pool for one that has already been instantiated instead. Generally the pool will be a growing pool, i.e. the pool itself will create new objects if the pool is empty, or we can have a pool, which restricts the number of objects created. It is desirable to keep all Reusable objects that are not currently in use in the same object pool so that they can be managed by one coherent policy. To achieve this, the Reusable Pool class is designed to be a singleton class.


Application Security for Agile Projects
Leaving requirements like security until the end can be detrimental, but making certain decisions too early can also cause problems. Software architecture covers many of the cross-functional requirements of your application like performance, scale or security. These requirements are often discussed and decided upon before you have written a line of code. This is when you know the least. Architectural decisions made at the very beginning of an engagement can lead to security issues, because we don’t have all the information we need to make the right decision. By the time security vulnerabilities are uncovered, it might be too late to change the architecture.


'Governance by exception' are current board processes too slow?
As technology has become integral to modern organisations, enterprise technology governance has become integral to corporate governance. And here's where the increasing risks lie and why we're starting to see board fiduciary responsibility challenged in relation to technology. Boards continue to recruit people with the same competencies - mostly finance and legal + industry experience. That increases a key aspect of competency risk. The knock-on effect flows into areas such as security risk, infrastructure, competitive and reputational risks. Think Sony and how hackers shut it down. Think about the growing number of once iconic brands that have gone out of business or lost significant market share because they simply didn't keep up with technology-driven change in their sector.



Quote for the day:

"Keep your fears to yourself, but share your courage with others." -- Robert Louis Stevenson

February 13, 2015

Pivotal CEO says open source Hadoop tech is coming
Multiple external sources have told Gigaom that Pivotal does indeed plan to open source its Hadoop technology, and that it will work with former rival (but,more recently, partner) Hortonworks to maintain and develop it. IBM was also mentioned as a partner. Members of the Hadoop team were let go around November when active development stopped, the sources said, and some senior big data personnel — including Senior Vice President of R&D Hugh Williams and Chief Scientist Milind Bhandarkar — departed the company in December, according to their LinkedIn profiles. Both of them claim to be working on new startup projects.


Keeping The Cloud Up--The Great Amazon Microsoft Cloud Reliability Showdown
In assessing what the results mean for organizations using AWS, CloduEndure was quick to point out that planning the location of infrastructure based on the historical number of errors and performance issues is probably not the best approach. While cloud provider issues are undeniably important, as I’ve said many times before, it is important to remember that the top reason for application downtime remains human error. The best way to resolve many issues is to be as redundant as possible – geographically and from a vendor perspective.


Obama to sign executive order on cybersecurity info-sharing
"The federal government cannot, nor would Americans want it to, provide cybersecurity for every private network. Therefore, the private sector plays a crucial role in our overall national network defense," the White House said. "The framework recognizes that no organization can or will spend unlimited amounts on cybersecurity. Instead, it enables a business to make decisions about how to prioritize and optimize its cybersecurity investments." Along with tech giants Apple and Intel, plus Bank of America and PG&E, companies committing to the framework include US Bank, AIG, Walgreens, QVC and Kaiser Permanente. Also joining in the effort are the Entertainment Software Association, network software company FireEye and online storage provider Box.


Transforming Customer Experience Culture Through Natural Language Processing
The new WDS Virtual Agent, manages customer care interactions by analysing data and learning from its human colleagues. Silently listening, it detects how human agents diagnose customer problems and offer solutions. In doing this it quickly develops the intelligence it needs to understand and solve customer queries itself, without having to be programmed. “Because many first-generation virtual agents rely on basic keyword searches, they aren’t able to understand the context of a customer’s question like a human agent can,” explains WDS’ Nick Gyles, Chief Technology Officer. “The WDS Virtual Agent has the confidence to solve problems itself because it learns just like we do, through experience.


Will increasing cyber attacks spell the end of username and password security?
Bruce Schneier, a leading voice on cybersecurity ... said cybersecurity-focused regulators and the constituencies they serve, might be better off focusing on outcomes instead of mandating specific security requirements. “Let the companies figure out how to do it. Good regulation regulates the results, not the process,” Schneier told the Guardian. “It always surprises me that people who understand there’s never a one-size-fits-all solution in other aspects of their lives, when it gets to IT, they start demanding – where’s the answer? Well, where’s the answer to burglary? To murder? There’s just a whole lot of things you do. And even then, the murder rate is never going to be zero.”


Anatomy of the Target data breach: Missed opportunities and lessons learned
Poulin suggests several attack scenarios, "It's possible that attackers abused a vulnerability in the web application, such as SQL injection, XSS, or possibly a 0-day, to gain a point of presence, escalate privileges, then attack internal systems." Not knowing the details, makes it difficult to offer a remediation for this portion of the attack. However, Poulin opines that IPS/IDS systems, if in place, would have sensed the inappropriate attack traffic, notifying Target staff of the unusual behavior. According to this Bloomberg Business article, a malware detection tool made by the computer security firm FireEye was in place and sent an alarm, but the warning went unheeded.


Determining whether penetration testing is effective
Attackers are side-stepping perimeter defenses by getting company employees to initiate an external connection. The two most popular methods are using a phishing email or duping employees to visit a malicious website. According to Marrison, internally establishing a connection outside the company's network perimeter allows the APT attacker a way in. Cisco's 2014 Annual Security Report affirms Marrison's claim. It states, "Most organizations, large and small, have already been compromised and don't even know it: 100 percent of business networks analyzed by Cisco have traffic going to websites that host malware."


Facebook Finally Realizes Its Members Die
Not only do you need to know who to leave your house to, but who is going to run your Facebook account. If you set this up with Facebook, your selected buddy to the end will get to memorialize you with tribute status updates, post new pictures in tribute, and even accept new friend requests from people who didn't like you enough when you were alive to friend you, but somehow decided it was OK when you were dead. Truthfully, I'm guessing most people were already doing this on their own by using the credentials of their loved ones to maintain pages. This will allow you to select someone to be the caretaker (undertaker?) of your page, but the person won't get to see your private messages from when you were alive.


Simplifying F# Type Provider Development
Type providers are one of the most interesting and empowering features of the F# 3.0 release. Properly written type providers make data access virtually frictionless in F# applications as they eliminate the need for manually developing and maintaining the types which correspond to the underlying data structures. This aspect is particularly important for data exploration tasks where many competing data access technologies require a fair amount of configuration before they're useful. For all their strengths, type providers tend to be a bit of a black box; once referenced, they usually just work. Not being the type of developer that settles for magical incantations, I recently spent some time delving into their depths.


Getting Data Governance and Legal to Work Together
Legal is, or should be, the source of regulations about data privacy and protection in the jurisdictions within which the enterprise stores, manages, or accesses data. However, legal typically cannot translate these rules into operationalized practices that ensure the enterprise is truly in compliance with the law. Data governance can bridge that gap. It can provide an understanding of the situation in the environments that manage data, and help to identify potential gaps with respect to laws and regulations. Jointly, with legal, data governance can help to determine what solutions have to be put in place to deal with these gaps. These solutions will often be changes to business practices rather than changes to the underlying systems.



Quote for the day:

"Your greatest area of leadership often comes out of your greatest area of pain and weakness.  -- Wayde Goodall

February 12, 2015

Building Microservices with Spring Boot
A distributed system decomposes the components of a monolith into individual units of deployment, which are able to evolve their own scaling requirements irrespective of the other subsystems. This means that the resource footprint for the overall system can be more efficiently managed, and the interconnection between components can share a less-rigid contract, since the interdependency is no longer managed through the runtime environment. In traditional SOA, the service boundary may encapsulate a breadth of functionality for a business function, centralized around potentially many data domains. A microservice architecture marries the concept of system distribution with the promise of managing only a single business function and data domain, which means that logically getting a handle on the capabilities of a subsystem is fairly easy to do.


Can Twitter Fix Its Harassment Problem without Losing Its Soul?
“There’s a bigger threat to not taking on this problem than taking on this problem, simply because public sympathy is going to go more in the direction of the abused than the abusers,” Shirky says.+ But while the time seems right for Twitter to act, it is far from clear how best to discourage such behavior. It does have methods in place to help deal with abuse, such as the ability to block and report a user who’s bothering you. Yet while that may help if you’re dealing with one or even a few bothersome tweeters, it cannot stop a deluge of nasty posts, and a determined harasser can always just make a new user profile and start the harassment anew.


Networks: The New Model for Business
These business networks are unlocking the ability for companies to extend processes and insights broadly and affordably to customers, suppliers, and other partners. Therefore, they're better able to engage with the participants across these networks in new and innovative ways.  We'll look at the historical record for how open markets and communities are rapidly changing business platforms. We'll see how today's consumer business models -- exemplified by Amazon, Uber, and Airbnb -- are extending to business-to-business (B2B) commerce, allowing buyers and sellers to find and know each other openly and accelerate B2B transactions and commerce efficiencies.


7 Digital Business Transformation Lessons
With the roles of the CIO, COO, CMO and CDO mixing and mingling, exactly who is leading the digital transformation revolution? Sutcliff says that ultimately it's a C-suite agenda where they come together and all work together. "Because businesses can now buy things as a service and buy things that enable them, digital is being seen not just as a technical issue but as an enabler to the whole business that encompasses operations at every level of the organization," says Sutcliff. Sutcliff has huge respect for the role of the CIO and says they are continuing to lead digital transformation initiatives.


How Big Data Pieces, Technology, and Animals fit together
Oozie is a workflow scheduler. The oversimplified description would be that it's something that puts together a pipeline of the tools described above. For example, you can write an Oozie script that will scrape your production HBase data to a Hive warehouse nightly, then a Mahout script will train with this data. At the same time, you might use pig to pull in the test set into another file and when Mahout is done creating a model you can pass the testing data through the model and get results. You specify the dependency graph of these tasks through Oozie (I may be messing up terminology since I've never used Oozie but have used the Facebook equivalent).


Rethinking The Four Faces of Competitive Intelligence
For many of us who are involved with competitive intelligence for a living, our thinking has evolved beyond this traditional matrix. Lessons learned along the way—combined with new technological capabilities in Big Data—have persuaded us that the above traditional approach doesn’t accurately represent the optimal four faces of Competitive Intelligence. In fact, it’s getting increasingly difficult (and expensive) to contract for exact metrics at a deep detail level.  ... CI is a mix of empirical learning and intuitive leaps, but it can be systematic. Our four faces of CI relate to where data resources are found and how they are collected and stored. This alternate focus reframes the questions and practices that are most logical to pursue.


EU privacy ruling should apply globally, says digital chief
The decision in question was made last year by the Court of Justice of the European Union, the EU’s highest court, in a case involving a Spanish man who wanted to remove from Google’s results an old news article about his long-ago debt problems. The CJEU’s decision set a new precedent by saying EU data protection law, which allows people to request the erasure of out-of-date information about themselves in limited circumstances, applied to search engines. The question of how far its implementation should extend touches on a fundamental conundrum about the internet — countries need to be able to apply their laws online as they do offline, but the onlne layer’s lack of inherent borders makes that difficult to do effectively.


How I Landed My CIO Dream Job
Yes. I learned all that I possibly could about the company. I started by actually reading the annual report and was surprised by how helpful that was. I found people who worked there, I reached out to them and invited them to have lunch – people I did not know at all. In retrospect, that was a good move - very eye opening about the culture at the firm and how people did their work.I also contacted the former CEO of my last employer and met him for lunch, which was another really good move. He is a smart executive with a lot of experience in manufacturing, so I asked him what he thought about this company and their market space, the job opportunity, and how to interview for it. He gave me some invaluable perspective and advice.


U.S. Department of Defense sets its cloud security guidelines
this long-awaited guide has provided some clarification around DOD’s expectations from Integrators, CSPs, and DOD mission owners. The DOD has clearly laid out for Integrators and CSPs the expectations for inclusion into the DISA Cloud Service Catalog. It will be interesting to see how and if the definition of a prime CSP evolves and how the industry and government alike adapt to that distinction. My initial reaction to the SRG is that it limits the playing field of prime CSPs that are able to comply with these requirements today. For small integrators trying to migrate applications to the cloud on behalf of the federal government, it makes the proposition riskier.


Platforms, not products, are the way to bring financial services to the poor
In the West, where advanced credit rating systems already crawl every financial transaction, this would seem a needless intrusion. But Lenddo operates in countries where only a small proportion of the population spends money in ways that are visible to credit ratings agencies, says Arjuna Costa of the Omidyar Network, a venture capital firm focused on social enterprise and which funds Lenddo. For the rest, their social media activity, combined with other sources signals such as financial performance over time, can make for a pretty good proxy. ... Lenddo targets the so-called “emerging class”—people who work at call centers in Asia, for instance. These are people who live well above the poverty line, but who nonetheless have precarious financial lives.



Quote for the day:

“Start by doing what's necessary, then what's possible and suddenly you are doing the impossible.” -- St. Francis of Assisi