April 12, 2015

Balance exploitation & exploration within your organization with TOGAF
Every organization is confronted with ambidexterity. Ambidexterity is about achieving a healthy balance between the management of operations, the daily work, exploitation vs. the management of innovation, discovering, incubating and accelerating new products and services, exploration. Ambidexterity within organizations means "exploiting the present and exploring the future". Consider financial services providers, for example consumer banks. As illustrated in the figure below the daily operations of a consumer bank involves activities such as – and certainly not limited to – the management of:


A community distribution of OpenStack
It's worth pointing out that RDO is a community effort, so when it comes to support, the project's mailing lists, IRC channels and ask.openstack.org site are your best options. If you need professional support for your production environment, a commercial distribution like Red Hat Enterprise Linux OpenStack Platform (RHEL-OSP) would be the way to go. ... The rest of the work performed in RDO is done within the community boundaries. We follow most of the OpenStack and Fedora development conventions and practices, so sometimes the line between one and the other is blurred. Needless to say, everything done in RDO is open and committed to public repositories as it's being developed.


Data Viz Pioneer Nicholas Felton: "There Is A Real Shadow Over Data"
Ryan and I went out to California for some meetings about Daytum and about starting this pursuit of getting funding so we could work on it full-time. We went and talked to Mark and found out they were working on Timeline. We were especially interested in Open Graph, which was basically the ability to plug anything into Facebook. This included data sources that we were pretty interested in, like music, being able to visualize what you were listening to, or things that you’re watching from Netflix. At that point, the question for us was, "Do we want to work on Daytum and try and bring it to a grand scale, or have even a tiny influence on what 600 or 700 million people are using?" That was a hard conversation.


The Battle For Your Wrist Has Begun: Android Wear Versus Apple Watch
On the bright side, improvements to security could be coming in short order for Android Wear devices. Liviu Arsene, Senior Security Analyst at Bitdefender, explains, “These security risks could easily be fixed with stronger or better methods for ensuring the safety of the entire communication.” His suggestions include the use of Near Field Communication (NFC) to safely transmit a PIN code during pairing, but he warns that using NFC “would likely increase the cost and complexity of the devices.” An alternative method would be to “supersede the entire Bluetooth encryption between Android device and smartwatch and use a secondary layer of encryption at the application level.”


Containers Explained: 9 Essentials You Need To Know
At the most basic level, containers let you pack more computing workloads onto a single server, and let you rev up capacity for new computing jobs in a split second. In theory, that means you can buy less hardware, build or rent less data center space, and hire fewer people to manage that gear. Containers are different from virtual machines - which you probably already run using VMware or Microsoft Hyper-V virtualization software, or open source options KVM or Zen. Specifically, Linux containers give each application running on a server its own, isolated environment to run, but those containers all share the host server's operating system. Since a container doesn't have to load up an operating system, you can create containers in a split-second, rather than minutes for a virtual machine.


Strategic Torque: Enterprise Architecture & Portfolio Management
Practical application of integration based on theoretical foundations shows that the implementation of portfolio management is facilitated by enterprise architecture practices and in doing so contributes to the realisation of strategic planning and the overall improvement of cross-competency IT effectiveness. This discussion will show that there is a history of risk aversion, opportunity cost and siloed ‘think’ in the IT departments of tertiary educational institutions. ... This optimisation of organisation and organisational change combines service based value add client interaction, through streamlining process (through silo integration), and the reduction of opportunity cost and waste. This is in part an impact of risk appetite / tolerance. The ability to influence outside ones silo is perceived as riskier as control seems to be lacking.


Lean Documentation
People use documentation to find answers to the questions they have. The quality of the documentation can be measured by the time it takes to find the answers. We used Google Earth as a model. Have you ever tried to find your house on Google Earth (drilling down, not searching on address)? How long did it take? Maybe 30 to 60 seconds? Finding your house on the surface of the Earth is like finding 1 answer among 1,5 trillion (1,5 * 1012) answers. If you are looking for an answer it shouldn’t take more than 60 seconds, even if your system is complex and huge. How does this apply to documentation? We followed a hierarchy analogous to moving through the levels in Google Earth: moon level, satellite level, airplane level, helicopter level and so on.


Deep Gooses MySQL Performance with New Database Math
Instead of continually writing data to disk, CASSI uses machine learning algorithms to better predict the optimal moment to write data to disk, based on the particular configuration and capability of a computer, says Chad Jones, the chief strategy officer for Deep IS. “As things come in we’ll say, ‘What’s the best way to handle this by splitting up the in-memory and disk structures,'” Jones says. “We’re able to put an adaptive layer in between. It allows us to say ‘I’m not going to write this down right now because the data hasn’t quiesced. I keep seeing a lot of changes in this one column of data, so let’s defer writing until we know it’s ready to be written and then write it, so we eliminate a lot of extra work in the database.'”


You can’t have Big Data until you have Good Data
Rather than rushing in and trying to learn big data analytics by searching through irrelevant data collected by separate IT systems, companies should prepare the ground, start organising their data – show it some respect. Capturing data from lots of different places whether that be from emails, forms on the website and even manually, can cause mistakes, so that when it comes to analysing data companies are not always analysing the correct information – it might be old data or based on false inputs. Companies must stop measuring the wrong data; stop deceiving themselves about the accuracy of their data, and go back to basics. There are many data capture solutions available on the market. For example, in the finance department, accounts processing today should include scanning paper based invoices as standard and adding them to your PDF invoices from email.


What Are the Legal Concerns in a HIPAA Risk Assessment?
“There are handfuls of different reasons to have security folks look at your systems and audit you and give you various reports, and that’s fine,” Rostolsky said. “Ultimately, you need to have something that’s specifically looking at the security requirements and speaks and uses HIPAA language in the assessment.” Essentially, healthcare organizations should not rely on a false sense of security. It’s important that when their data systems and safeguards are being reviewed, that facilities try and keep in mind what the OCR would be looking for so no areas are missed. Having current physical safeguards, administrative safeguards, and technical safeguards is not only required by the Security Rule, but they work together to protect health information, according to Spencer.



Quote for the day:

"The old mantra of ‘be everywhere’ will quickly be replaced with ‘be where it matters to our business" -- Mike Stelzner

April 11, 2015

Big Data Platforms: How To Migrate From Relational Databases to NoSQL
With our discussion scope sufficiently narrowed, we'll start by tackling a relatively simple relational structure. The very first thing we'll need to do is to evaluate which entities can be de-normalized to become what I call super-classes. "Super-class" is not a standard big data term. It's my term and I find it makes things easier for the initial discussion. I'll explain why later. Each of these super-classes will be used to help define the new composite structure (an actual Big Data term). We'll be using the following Entity Relationship Diagram (ERD) to lay out the steps needed to identify our super-classes.


5 Competitive Strategies of Successful (and Ethical) Companies
Ethics becomes part of the competitive advantage that enables them to succeed. When I talk about a conscious strategy incorporating ethics, I am not thinking of a formal (written) strategic plan. Many organizations do not have formal strategic plans. But whether or not there is a formal plan, successful companies employ certain strategies to compete effectively. It is among these competitive strategies that ethics finds a place. I identify five competitive strategies common to companies that are successful and ethical on a sustained basis. None of these strategies considered alone guarantees ethical success. However, each strategy increases your chances of combined ethical and market success.


The App That’s a Breath of Fresh Air
Like many other innovations, BreezoMeter was born out of frustration. Its CEO, Ran Korber, was frustrated by the lack of centralized air quality information available when he was seeking a place clear of air pollution for his new home in Israel. As an environmental engineer with a pregnant wife, he was particularly concerned about the air quality. Finding nothing on the market provided all the answer he sought, he created his own solution. The app proved successful in Israel where 300 sensors sufficed to cover the most populated areas of an area roughly the size of New Jersey. Scaling up to cover an area hundreds of time bigger was a challenge for the startup. BreezoMeters’s CMO, Ziv Lautman, said it took half a year to collect air quality data from thousands of sensors scattered around the United States.


IS Audit Basics: Auditor: About Yourself (And How Others See You)
Technical expertise is necessary, but not sufficient to be or become a successful auditor. That is, a successful auditor is one who is credible, respected and personable enough to be considered a valuable source of information and advice. Having a good knowledge of oneself and the soft skills that facilitate human interaction is just as important as professional knowledge and, probably, harder to acquire. Being sensitive to how others perceive us is at least as important. “O would some Power with vision teach us to see ourselves as others see us! It would from many a blunder free us, and foolish notions.


10 minutes with… Two-Factor Authentication author Mark Stanislav
By combining different ‘factor classes’ (e.g. something you have, something you know, something you are), account security is greatly strengthened as the challenge of a criminal to get past two factors is a difficult hurdle. Because passwords are often poorly created, easily stolen, and commonly reused, their ability to protect our most important systems and services aren’t well matched for the needs and risks facing people today. Through the book I am able to educate my readers about not just what two-factor authentication is, but what choices they have to do it, what the upsides and downsides are to different methods, and what they should think about to make sound decisions regarding their security needs.


Intuitive Reasoning, Effective Analytics & Success: Lessons from Dr. Jonas Salk
To perceive something differently or even to know something as being true is of little or no value if you’re not willing to stand apart from the crowd. It’s very clear from his interview this was never an issue for Dr. Salk. He was extraordinarily thick-skinned, and had an exceptionally healthy attitude regarding criticism and rejection. And yet, he was fully willing to follow the hard road necessary for a new truth to be recognized and accepted. People lacking these high-EQ attributes are unfortunately likely to keep intuitive reasoning to themselves or just give up. ... the greatest insights, advances and innovations using big data will come from people with unique subject matter expertise and high intuitive reasoning skills – enabling them to “see” challenges very differently. And they will probably not be formally trained in data science or programming.


Burn Rate Doesn’t Matter
Too bad burn rate doesn’t matter. More specifically, burn rate (net cash outflow per month) is a vanity metric. Just as top-line revenue doesn’t tell you much about the health of a DJIA blue-chip, burn rate says very little about whether a startup is on track. Only by evaluating a company’s use of cash and long-term strategy can high burn be diagnosed as good or bad. In many cases, the low burn ideal is actually dangerous. At Founders Fund we avoid investing in companies unless they are consuming cash. We’re here to invest when doing so will bring about positive progress faster, which often manifests as the conversion of cash into assets and increased burn. Cash-flow-positive businesses are usually past this inflection point, or simply don’t have enough ideas about what valuable things to do with more money.


Self Service: A Data Scientist Productivity Boost
There are no less than six new and emerging roles within any organization, with data developers/engineers and business analysts being two of those, according to a recent Forrester webcast. The pool of data developers and engineers is roughly three million worldwide. These individuals count data modeling as a core skill; where data is in their DNA and the IT department is their home. Data developers have Excel, SQL, Microsoft Access and declarative dataflow diagrams down cold. They can work in declarative programming metaphors, draw dataflow mapping diagrams of what they want the system to do, but don’t necessarily do a lot of coding. The challenges this group faces are similar to those of the data scientist.


Surveys: Employees at fault in majority of breaches
"Security awareness is a must, but it's a slow and difficult task, and as CompTIA study shows human error is still the largest factor behind security breaches," said Igor Baikalov, chief scientist at Los Angeles-based Securonix, Inc. "The game changer," he said, "is continuous risk monitoring through automated analytics." It can detect human error, reduce false positives, and lower incidence response times, he said. "Humans were always considered to be the weakest point of the IT security chains -- and the more privileges they have, the more risk they pose to the corporate network," said Péter Gyöngyösi, product manager at Luxembourg-based BalaBit IT Security.


Asynchronous Programming in .Net with QnA
Task based Asynchronous Pattern (TAP) is based on concept of a task, represented by Task type inSystem.Threasing.Tasks namespace. It represents an asynchronous operation which you could wait for completion, cancel it, or specify a continuation to execute when this asynchronous operation is complete. It provides an object-oriented approach to writing asynchronous code. This frees up developer from worrying about semantics of language or execution environment for executing asynchronous operation and he can rather focus on functional aspects of application. Core idea here is to enable developer to execute methods on a separate thread seamlessly.



Quote for the day:

“Stories are the single most powerful weapon in a leader’s arsenal” -- Howard Gardner

April 10, 2015

SDDC adoption on a 'slow roll'
"It is a very new model, especially on the [software-defined networking] side," Dennehy said. "Customers are being extra careful about how they go down this road." In addition to the changes that SDDC brings to hardware and software, it also will usher in changes to IT staff. Tasks previously performed by highly skilled employees can be performed by software, according to Forrester's brief, "The Software-Defined Data Center Is Still A Work In Progress" by Richard Fichera. ... "The adoption of SDN is really concentrated in telecom and the very big data centers such as Google, Amazon and Facebook," Dennehy said. As for software-defined storage, it's not "plug and play" said Stanley Stevens, also a senior analyst at TBR.


Technology is turning genealogy on its head
The search for identity is often rooted in the past, which is why genealogy remains so popular. Technology has helped in many ways, from making it easy for home family-tree builders to create diagrams and search local council records, to powerful servers crunching data to find geographic correlations that might imply family connections. And then there's our DNA. Watson and Crick's discovery of the double-helix DNA 'code' didn't immediately change the world. But as computing power has increased, so too has the scope of DNA analysis. Sequencing that once cost tens of thousands of dollars now costs much less than one percent of that – and it's sequencing that tells us who we are biologically, or at least what we're made of.


Lambda Complexity: Why Fast Data Needs New Thinking
Rather than address the flaws directly, you simply run both the batch and streaming systems in parallel. Lambda refers to the two systems as the “Speed Layer” and the “Batch Layer”. The Speed Layer can serve responses in seconds or milliseconds. The Batch Layer can be both a long-term record of historical data as well as a backup and consistency check for the speed layer. Proponents also argue that engineering work is easier to divide between teams when there are two discrete data paths. It’s easy to see the appeal. But there’s no getting around the complexity of a Lambda solution. Running both layers in parallel, doing the same work, may add some redundancy, but it’s also adding more software, more hardware and more places where two systems need to be glued together.


HP Spectre x360 review: A sexy convertible that just can't take the heat
This configuration is actually fairly competitive. Outfitted with similar components, Dell’s XPS 13, for example, is $800—but it’s not a convertible and it even lacks the touchscreen at that price. Also, the XPS 13’s smaller, lighter form factor feels great until you touch the keyboard. The Spectre x360’s keyboard is far more comfortable to type on than the XPS 13’s. Frankly, I’d probably trade the XPS 13’s compact size for the Spectre x360’s keyboard in a second if it were my everyday driver. Other details of the Spectre x360 also impressed me. The tiny power button on the left side of the frame is a bit annoying—you have to hunt for it. However, it takes just enough pressure that you can’t easily activate it by accident. On the convertible Yoga 3 Pro, I’d put the machine to sleep all the time just by picking up the chassis.


Why heresy is good business strategy: Dell’s Armughan Ahmad
Ahmad said that Dell Blueprints – which optimize Dell integration with partner ecosystems – are a critical part of their strategy. Dell Blueprints comprise five separate disciplines: Unified Communications and Collaboration, like Skype for Business (formerly Microsoft Lync); Enterprise Applications such as OLTP, CRM and databases; VDI; Big Data analytics; and high performance computing. “Underneath these, we have these vendor partnerships, and all these companies power these solutions for us,” Ahmad said. “We let them put their hooks deep into our products, and we are willing to democratize the IT for that.” Here’s where the heresy comes into play. Dell’s model embraces a willingness to wipe Dell’s own technology off the partnered products, sacrificing short term CAPEX profits, in the interest of longer term benefits from reducing customer OPEX costs.


A Data Scientist's Advice to Business Schools
The expectation on any business graduate is that they possess an ability to strike a middle language between the priorities of a business and the deep domain knowledge of a company's experts. They should carry that 'generalist's touch' and be able to synthesize myriad high-level approaches into real-world utility for their organization. To produce graduates like this a business school must find ways to teach the general high-level approaches used by domain experts across a company's departments. Graduates should have an understanding of how an expert's deep expertise in their field adds value to the overall strategic direction of the company. Only then can value-producing conversations and disruptive ideation exist between the business graduate and the domain expert.


AT&T's data breach settlement called a 'slap on the wrist'
It's "alarming" that AT&T allowed contractor workers to have access to unencrypted customer records, Blech added. "There should no longer be any debate as to whether sensitive customer data should be encrypted or not," he said. It's interesting that the data breach settlement came through the FCC, when the U.S. Federal Trade Commission has been the agency that often pursues companies for data breaches, said Robert Cattanach, a partner at law firm Dorsey & Whitney focusing on cybersecurity and other regulatory litigation. The FCC settlement, the largest in agency history for a data breach, "ups the ante" for penalties, but the FCC may still have been a better option for AT&T, Cattanach said.


Q&A: Marcus Ranum chats with Privacy Professor CEO Rebecca Herold
Identify the risks those vendors present to the organization based on a variety of factors, including the types of information they are accessing, whether or not they are storing sensitive and personal information within their own systems, and the types of safeguards they have in place for those systems. Document it. Determine which vendors are high, medium and low risk; then dedicate attention appropriately. Perform regular security and privacy reviews -- there are many ways to do this -- for the high-risk vendors, as well as appropriate checks for the medium- and low-risk vendors. Keep an eye out for any published reports of breaches for the vendors they are using.


Internet of Things must learn interoperability lessons from history
“IoT is a whole myriad of different ways of connecting things,” he says. “It could be fixed, Wi-Fi, NFC, cellular, ultra-narrow band or even ZigBee - so many but they have different uses. You have to mix and match what is best to make connections work.” In the early days of Ubiquisys Franks encountered similar issues. There were, he says, a number of wireless proprietary technologies that wouldn’t talk to each other, making it impossible to roam from town to town let alone country to country. The solution was to get all the technologies into the same room and try and thrash out an interoperability plan.


You’ve Completed Unit Testing; Your Testing has Just Begun
Stopping just after unit testing the code is akin to starting mass production of automobiles after testing each nut and bolt of a car. Of course nobody would ever take such a huge risk; in real life, the car would first be taken on many test drives to check that the assembly of not just every nut and bolt, but every other part perform in coordinated orchestration as intended. In the software development world, test driving translates into what we affectionately refer to as integration testing. Integration testing guarantees that the collaboration of classes works. In the Java world, both the Spring framework and the Java EE platforms are containers that provide APIs over available services, for example JDBC for database access.



Quote for the day:

"Anyone can hold the helm when the sea is calm."  -- Publilius Syrus

April 09, 2015

Redefine BI to Unleash Big Data's Power
Legacy Enterprise Data Warehouse (EDW) systems will not disappear in the near future, if ever. Many business users are dependent on the rigorous performance reporting implemented from an ROI perspective and a replacement is not currently feasible. Additionally, some of the newer tools need to reach a level of maturity for production systems. On the other side, no enterprise can ignore the availability of a newer parallel processing platform that can run complex computational algorithms based on massive volumes of structured and unstructured data. Legacy EDW systems are simply not designed to provide insights from new formats and higher volumes of data on an industrialized scale, which has led to significant opportunities for newer technologies to overcome the challenges enterprises are faced with.


The one thing Microsoft's Project Spartan browser needs to succeed
IE once enjoyed a virtual monopoly of the browser market. Firefox and Chrome--and to a lesser extent Apple's Safari--have eaten away at that dominance. IE still has more market share than all of those rivals combined, but its 90+% market share dwindled to just over 50%. Even that figure is debatable, because it depends on how you measure the browser market. There are metrics that suggest Chrome is more popular than IE. Part of that is driven simply by the browser itself. Firefox and Chrome both have vibrant, dynamic ecosystems of extensions and plug-ins that enable the browser experience to be customized and more powerful than the off-the-shelf browser itself. IE also has add-ons available, but they've never had the loyal following of Firefox and Chrome.


A Better Way for Leaders to Envision the Future of Their Industries
Most business strategy papers suffer from the same problem. In order to prepare their readers for a future defined by different rules, authors virtually always decide to kick things off by listing a series of changes they foresee in the landscape of the organization. They inform us that "intensified pressure from newcomers will transform the business landscape," "today’s business models will increasingly become outdated," and "success in the future will depend on ever more flexibility and agility in our decision-making." Shocked? Startled awake? I didn’t think so. This trend-line language doesn’t really engage our minds. It makes us envision, subconsciously, a line that depicts a gradual change in our daily reality.


Former Goldman Exec Wants to Upend the Way the World Moves Money
“It’s ironic that we can send a physical package from one part of the world to another faster, cheaper, and with more transparency than money,” Uberoi says over a curry lunch at an Indian eatery next door to Earthport’s offices in the City of London. “We saw a need to create a FedEx for money,” he continues, “but it was going to be difficult. Banks are highly regulated, they are risk averse, and moving money is a mission-critical function for them. We came to market offering a solution in 2011, and banks looked at it and said, ‘You’re crazy! Here you are, this money-losing company, telling me I can do payments differently? Forget it!’” ... “It’s plumbing, but the payments market has opened up, and its size could not be larger,” Hammer says. Wim Raymaekers, SWIFT’s head of banking, says that the time has come for fundamental change.


Advanced threats are the new baseline, says Websense
“It is only when organisations have a clear picture of everything that is going on with the tools and capabilities that make cyber crime so easy for attackers that they are in a position to secure their enterprise.” Despite the growing awareness of the kill chain model that analyses cyber attacks in seven key stages to find ways to detect and disrupt each stage, Leonard said organisations still tend to focus on point systems. “But while these systems can be very good at identifying one particular aspect of a threat, there is a need for broader technologies to operate across the kill chain and raise the bar by putting obstacles at every stage of an attack,” he said.


The Internet of Things
Creating a climate for trust and responsible innovation is essential, as the development of IoT touches upon questions of security, privacy and trust. Furthermore, as the IoT will become widespread in citizens' lives at home, in the office, in public or on the move, discussion needs to identify any policy or regulatory requirements, where an impact could be foreseen, as well as in terms of education. In order to fully deploy IoT, pervasive and easy access to wireless and mobile communication and identification/numbering resources to connect billions of objects is necessary. Iin particular, mobile access should be provided in a competitive, low-cost and cross-border manner to allow Machine-to-Machine and IoT applications to flourish.


JPMorgan Big Data Algorithm Identifies Rogue Employees
“What they’re trying to do is forecast human behavior,” said Mark Williams, a former Federal Reserve bank examiner who’s now a lecturer at Boston University’s Questrom School of Business. “Policing intentions can be a slippery slope. Do people get a scarlet letter for something they have yet to do?” Care will be taken to strike the right balance in monitoring employees at JPMorgan, said Dewar, a former U.K. regulator. She’s responsible for helping executives at the investment bank implement the new controls, while Chief Control Officer Shannon Warren has oversight of the firm-wide effort. The bank wouldn’t describe all of the inputs being used for its predictive program, which specific business it’s being tested on, or what steps will be taken if concerns are raised about an employee.


Is Augmented Reality The Next Tech Revolution?
A number of companies are in various stages of developing augmented reality tech. But are the claims and demo videos that have already been released too good to be true? Will the visions of startups like MagicLeap become a reality, or do they simply offer an illusion of something better than modest reality underneath? If the future of virtual and augmented reality technologies plays out the way the companies behind them hope it will, then one day your laptop, your smartphone, and your television could be replaced by devices that overlay virtual apps and experiences on your surroundings or create immersive experiences that let you experience an entirely different world in your living room.


​MariaDB Corp picks off speed bottlenecks and tightens anti-SQL injection measures
MariaDB is the community-developed branch of Oracle's open-source MySQL database, acquired for $1bn by Sun Microsystems, which in turn was bought by Oracle for $7.4bn in 2010. By then, some of the database's original creators had already left to create MariaDB. Last October, commercial MariaDB company SkySQL announced it was changing its name to MariaDB Corporation. The new MariaDB Enterprise release features protection against SQL-injection attacks using a database firewall filter. In a few months community MariaDB will also include the database encryption developed and used internally by Google, which has been using MariaDB for a year.


Keeping Up with the Growth of Scientific Data
Physicists have been using metadata to manage really big data for decades, developing their own bespoke metadata and data management tools with each new project. Cern actually developed three separate metadata systems to manage the two storage systems used in their ground-breaking LHC work that famously captured 1PB of detector data per second in search of the elusive Higgs boson. So when NASA needed to keep track of all the data coming from the Hubble Space Telescope, it consulted the physicists at the Stanford Linear Accelerator (SLAC) BaBar experiment, and applied their metadata-based techniques to astronomy. Data collected from Hubble over the decades is meticulously annotated with rich metadata so future generations of scientists, armed with more powerful tools, can discover things we can’t today.



Quote for the day:

"I can find technical expertise more easily than I can find situational leaders, and project managers are situational leaders." -- Raj Kapur, president of the Center for Project Management

April 08, 2015

In SMBs, the CFO role in IT decisions grows
Despite CFOs’ growing IT decision making role, not many are partnering with their CIOs on those decisions, particularly in SMBs, the study found. Only 14% collaborated with IT on IT decision making in midsize companies, and a mere 11% work with their CIOs in small organizations (in large organizations, the number is slightly higher, at 16%). This data indicates that although these financial executives understand how crucial technology is to business success, quite a number of them see themselves as either directly responsible for IT or at least a major authority on IT decisions. These perceptions make sense, according to Gartner, because CFOs are generally tasked with controlling their organizations’ budgets and examining the highest-value items.


NIST incident response plan: Four steps to better incident handling
The NIST Incident Handling process introduces four phases: preparation; detection and analysis; containment, eradication and recovery; and post-incident activity. Each of these phases is iterative in nature. When a security incident occurs, rather than reactively jumping into its remediation and expending a considerable amount of time, cost and resources for identification, containment and recovery, the NIST incident response guide suggests that being prepared for such incidents is the best defense.


The way to greatly reduce cloud computing costs
What makes this architecture so impressive is that it blends mainframes, reduced instruction set computing (RISC) machines and x86 servers into a cohesive cloud. Most clouds, whether they are within an enterprise or run by managed service providers, are based on one architecture: x86, which is not ideal for running all workloads. Further, other companies have shown the benefits of adopting a mixed-platform environment, as IBM has done to reduce its cost of computing by $2.3 billion. Other enterprises and MSPs can likewise save really big money by adopting a multi-platform cloud approach; in fact I estimate that enterprises can reduce their cost of cloud computing by 30-40% by using the multi-platform approach with strict process overlay.


Diving into the Dark Web: Where does your stolen data go?
Bitglass found that within only a few days, the fake credentials had been downloaded in over five countries, three continents and was viewed over 200 times. By day 12, the file had received over 1,080 clicks and had spread to 22 countries on five continents. "By the end of the experiment the fake document of employee data had made its way to North America, South America, Asia, Europe, and Africa. Countries frequently associated with cyber criminal activity, including Russia, China and Brazil, were the most common access points for the identity data. "Additionally, time, location, and IP address analysis uncovered a high rate of activity amongst two groups of similar viewers, indicating the possibility of two cyber crime syndicates, one operating within Nigeria and the other in Russia," the team's report states (.PDF).


The State Of Business Technology Resiliency 2014-2015
 Forrester Research, in a joint survey with Disaster Recovery Journal, has identified several current trends in business resiliency. In this report, Forrester presents an analysis of these trends and how they may affect your BC/DR planning. The report also offers recommendations for taking your business resiliency to the next level, including using new analytic capabilities to help you recognize patterns in preventable outages to prevent downtime; automating as much as possible to improve recovery points and recovery times, and determining real costs of downtime to use as leverage in presenting budgets.


Forrester: CIOs will architect and operate the Internet of Things
It’s a pattern we’ve seen before with PCs, websites, and smartphones, all started as “do-it-yourself” projects by the business but ultimately falling into the CIO’s realm of responsibility, Gillett writes. He predicts this will happen with the IoT as well and CIOs will ultimately be called to manage the growing complexity of connected devices for their company. ... Every company will face the challenges (as well as the opportunities) that come with owning and managing connected assets, Gillett wrote. CIOs who are part of companies that sell physical products will face even more challenges, including helping the business design, build and operate connected products, Gillett added.


CIO interview: Bruna Pellicci, global head of IT, Ashurst
One key focus remains information security. Pellicci recognises, like so many of her peers, that defence remains a moving target. CIOs could potentially spend every penny of their IT budgets on preventative systems and techniques. Pellicci says the modern focus on securityis in sharp contrast to the early days of her career. “When I started working in IT, you didn’t need to worry about people hacking your systems,” she says. ... “Technology changes so quickly, so the thought of a model that allows people to choose their own device is potentially great. But that simple strategy can be complicated by the choices people make – what if someone wants to use more than a single device, and should we give these employees access to their corporate information across a range of devices?” asks Pellicci.


Painless Refactoring of SQL Server Database Objects
It is quite common for perfectly-functioning SQL code to be knocked off its feet by a change to the underlying database schema, or to other objects that are used in the code. If we are "lucky," the code will suddenly start producing error messages; if not, it may just silently start producing different results. In either case, once the problem is discovered, the process of adjusting all of the application code can be long and painstaking. Fortunately, there are a few simple defensive techniques that take little time to implement, but yet may significantly reduce the possibility of such errors. ... This article will examine several examples of how changes to database objects can cause unexpected behavior in the code that accesses them, and discuss how to develop code that will not break, or behave unpredictably, as a result of such changes.


Why now is the time to start planning your exit strategy
So it makes sense that business leaders would avoid planning for the day they sell their company or step down from their role. Without a clear exit strategy, however, you could be putting your company, your employees, and your own future in jeopardy. Addressing every aspect of succession planning takes more time than you might realize. If you don’t start this process early enough, you could spend years running your business in a way that sabotages your own end goals, depletes your resources, or cripples your negotiating power. Companies that lack a well-designed succession plan can also be left weak and vulnerable during the transition period, making them easy targets for competitors.


A Startup’s Plans for a New Social Reality
Jeremy Bailenson, head of Stanford’s Virtual Human Interaction Lab, says that while that video games and films are thought of as the main applications for virtual reality, simply communicating with others could turn out to be important. Communicating via avatars could become more effective than by talking via video chat or even face-to-face, he says, as software could help us do things like tailor our appearances and attentiveness to whomever we’re speaking with. To make social interactions really effective in digital spaces, though, sensors will need to track facial expressions and body movements well enough to render them realistically, he says.



Quote for the day:

"Keep true, never be ashamed of doing right, decide on what you think is right and stick to it." -- George Eliot

April 07, 2015

Digital agenda streamlines public sector in Norway
As the name implies, DAN is inspired by the Digital Agenda for Europe framework but is tailored for Norway’s own priorities and challenges, including a small domestic market and a sparsely populated country. It is also a continuation of earlier ICT policies such as the eNorway program introduced in 2000. This long-term approach is starting to bear fruit. Almost 60% of Norwegians are eGovernment users, while the corresponding EU average is 33%. In the Norwegian Tax Administration alone the country’s "digital by default" scheme has pushed the number of electronic services users from less than 900,000 in 2014 to 3.4 million in 2015. Not bad for a country with a population of 5.1 million.


The Network Intelligence Movement Will Add Personal Context to the Online World
The movement is called “network intelligence,” and it’s a reimagining of the term that originally referred to the technology used for data analysis. This new movement focuses on people, and builds on the rise of business intelligence and analytics in both startup and corporate environments. New products built to harness network intelligence will allow for the analysis of relationships between members of a network and their specific skill sets to help achieve business objectives. These products will bridge the gap between business intelligence analytics and goals by adding people back into the equation. After all, every organization is built upon smart and connected people.


A CISO reveals why the cloud is your secret weapon for faster, better, and cheaper PCI audits
As Joan explains, “Bernie Madoff worked from a big NYC skyscraper. The building provided great security. He ran a total scam.” In the cloud, a hacker can run a scam on a “certified” AWS instance. The key is to look deeper and understand what the company is doing with your data. Joan points out that the certification of the underlying platform, however, is valuable. “We call it an unbroken-chain of paperwork. One of the things that made my audit easy. Physical and network security was AWS. They admit they’re responsible for that. Now the other 10 sections are my responsibility.”


How can privacy survive in the era of the internet of things?
Usman Haque is the founder of Thingful, which he calls a search engine for the IoT. It documents IoT devices around the world, categorising them by function, so that you search for, say, air quality in Manhattan. Haque says that people should be able to set policies governing which devices can talk to the devices that they own, and what information is shared about them. “I can make data available in real-time to my doctor, but I might delegate access to monthly figures to my mother,” he explains. “And I might be happy to participate in a medical study where I give the years’ aggregate data. So privacy has to be granular.”


The Security Concerns of SSL / TLS Encrypted Traffic
The challenges of SSL/TLS as a cover currently fall broadly into two categories: malicious activities that are directed towards enterprise servers and the malicious activity directed towards enterprise workstations, mobile devices, tablets, etc. The former consists of attackers generating application DDoS, like the application attacks that make up the Open Web Application Security Project (OWASP) Top Ten. The latter consists of malware that arrives from infected SSL/TLS servers on the Internet (such as music swapping sites, adult sites, etc.,) or via email malware/scamware that accesses the enterprise server through personal email use.


Critical infrastructure commonly hit by destructive cyber attacks, survey reveals
Trend Micro chief cyber security officer Tom Kellermann said the Americas research should serve as a wake-up call that critical infrastructures have become a prime target for cyber criminals. “These groups have escalated their attacks by leveraging destructive campaigns against the infrastructures of the Western Hemisphere," he said. Kellerman said Trend Micro hopes the findings will serve as a catalyst to motivate and encourage necessary change. OAS Inter-American Committee against Terrorism executive secretary Neil Klopfenstein said governments in the Americas and around the world must recognise the serious vulnerabilities inherent to critical infrastructure and the potential for grave consequences if not properly secured.


How the current intellectual property landscape impacts open source
Understanding the business model of the client is especially important so that the technical solution developed by the IT professional matches the business goals of the client. ... Not all open source licenses are created equal. This includes understanding the fact that the underlying power of the open source license actually resides in copyrights; the very monopolistic vehicle that allows the open source license to be enforced ... It seems that the Intellectual Property system is getting away from the original Constitutional mandate to “To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries.” United States Constitution, Article I, Section 8, Clause 8.


Why You Should Start a Brain Technology Company
If effective, these new therapies could even, some argue, bring about the end of disability.  Some believe that developing such interfaces will require advanced brain implants that are still a decade or more away. More recently, though, neuroscientists—as well as a legion of “brain hackers”—have turned to powerful new sensing, processing, and prototyping tools to explore a host of non-invasive techniques to stimulate the brain. Some of these methods, proponents say, could benefit not only patients who suffer from disease or injury, but also healthy individuals, who would be able to learn faster, acquire better math skills, improve their memory capabilities, and even boost their creativity.


Microservices For Greenfield?
One of the ways in which we handle the complexity of deploying multiple separate services for a single install is by providing abstraction layers in the form of scripts, or perhaps even declarative environment provisioning systems like Terraform. But in these scenarios, we control many variables. We can pick a base operating system. We run the install ourselves. We can (hopefully) control access to the machines we deploy on to ensure that conflicts or breaking changes are kept to a minimum. But for software we expect our customers to install, we typically control far fewer variables. We also ideally we want a model where each microservice is installed in it's own unit of operating system isolation. So do our customers now need to buy more servers to install our software?


AI Doomsayer Says His Ideas Are Catching On
It’s a very, very small existential risk. For it to be one, our current models would have to be wrong—even the worst scenarios [only] mean the climate in some parts of the world would be a bit more unfavorable. Then we would have to be incapable of remediating that through some geoengineering, which also looks unlikely. Certain ethical theories imply that existential risk is just way more important. All things considered, existential risk mitigation should be much bigger than it is today. The world spends way more on developing new forms of lipstick than on existential risk.



Quote for the day:

"In matters of style, swim with the current; in matters of principle, stand like a rock." -- Thomas Jefferson

April 06, 2015

The Dawn Of The Age Of The Software ‘Infrapreneur’
Today’s enterprise infrastructure startup leaders need to be focused on pairing innovative software with commodity off-the-shelf (COTS) hardware. They are, in essence, software “infrapreneurs.” The software infrapreneurs we’re seeing are coming out of either Internet-generation companies like Google, Facebook, Amazon and Yahoo, or had significant terms at hardware companies such as Cisco, EMC, Hewlett-Packard and Sun Microsystems/Oracle. To individuals in both groups, the advantages of software-led companies are obvious. They recognize that a hardware-focused approach has limitations and that the real opportunity in infrastructure today is via software.


Juggling Data Connectivity Protocols for Industrial IoT
A great example is the Connected Boulevard program in Nice, France, which uses Industrial Internet technologies, including an innovative data-sharing platform, to help manage and optimize all aspects of city management, including parking and traffic, street lighting, waste disposal and environmental quality. ... The key to these benefits is the ability to derive value from the data. The data must be accessible wherever it resides and delivered to wherever it’s needed (edge to the cloud) so that it can be analyzed and acted upon in the right amount of time. There are a range protocols currently used to provide this “data-sharing function” within an Industrial Internet system (see chart above)


Big data is all about the cloud
The key to big data success, Wood says, is more than Spark or Hadoop. It's running both on elastic infrastructure. Hortonworks Vice President of Corporate Strategy Shaun Connolly agrees that the cloud has a big role to play in big data analytics. But Connolly believes the biggest factor in determining where big data processing is done is "data gravity," not elasticity. ... Connolly says, is to extend and augment traditional on-premise systems, such as data warehouses. Eventually, this leads large organizations to deploy Hadoop and other analytics clusters in multiple locations -- typically on site. Nevertheless, Connolly acknowledges, the cloud is emerging an increasingly popular option for the development and testing of new analytics applications and for the processing of big data that is generated "outside the four walls" of the enterprise.


Vulnerable Dell support tool now detected as risky software
“We are continuing to investigate further issues and actions that may be necessary to protect our customers,” the F-Secure researchers said. On Friday, security vendor Malwarebytes announced that vulnerable versions of the program will now be detected as PUP.Vulnerable.DellSystemDetect by its products. In the antivirus industry PUP stands for potentially unwanted program. “We at Malwarebytes are pretty sure there are a lot of folks that won’t know about this vulnerability, so we decided to detect it for the sake of raising awareness,” the company said in a blog post. “Vulnerable versions of this tool have been seen as early as mid 2012 though most likely even earlier, according to our sources so anyone with a Dell system purchased a few years ago should take special notice and run a scan ASAP.”


C# - Optical Marks Recognition (OMR) Engine 2.0a
This article discusses the 2nd version of OMR engine I wrote in 2012. It is highly recomended for the readers to experience the first version of engine first which is located at: C# - Optical Marks Recognition (OMR) Engine 1.0 This project started as a fun but grabbed my time as soon as I started to imagine the possibilities. Including me, many people have brought this project into commercial usage as well as research purpose at university projects.  Some the people would ask, "Why re invent the wheel?" because there are numerous OMR engines and even embedded systems available in market. But this project is open source and written in high level language. So, integration with other .Net application is not an issue. This is the main reason I've been devoting time since it started.


Enterprise Agility Through Culture
Culture is messy, and complex. Deliberate change needs to be coherent with its nature. The results of our actions will depend on intent, situation, and context. Stories are perfect to make sense of culture, as they can be messy and complex and still be easily understood. Culture is created and transmitted through stories. Therefore, storytelling formats are important culture building tools. One such format which Michael and I experienced together in 2011 at the Agile Coach Camp in Columbus, is called Temenos. Temenos was developed by Siraj Sirajuddin. It is an experiential team and personal development lab which we’ve run in different sizes for more than 50 times since. In addition, we have since then used and developed more methods and tools to understand and improve culture.


Managing a project is like driving a BMW
In project management, much like driving vs. riding in a 1992 BMW 3 series, managing the project is quite different from working on the project. I’m not saying it’s better. I’m not saying it’s the ultimate management experience. But I am saying that much like driving a BMW 3 series, if you’re organized and successful as a project manager, you do have a nice sense of control. You are in charge, you are making the decisions, and eventually you realize you wouldn’t have it any other way. Again, not saying it’s for everyone and not that it’s better than everything else. Some people like to drive a truck. But if you like that feeling of control and taking charge, there aren’t too many things like it. Yes, I’m talking about both – driving the BMW AND managing projects.


Price and Revenue Optimization (PRO)
At the heart of price and revenue optimization is the concept of demand-based pricing. As its name suggests, demand-based pricing is a method that sets a price that is controlled by the seller’s assessment of what the buyer is willing to pay, which in turn is based on an estimate of a good’s or a service’s perceived value to the buyer. Companies use demand-based pricing to optimize – rather than simply maximize – their pricing to achieve revenue and profitability objectives. It uses data to estimate where the prospective buyer sits on a demand curve and therefore how much the individual is likely to pay. In some respects this is similar to what happens daily in souks, bazaars and other markets in cultures that do not insist on set prices.


How to Tailor Agile to Your Distributed Team Environments?
Distributed Agile added another dimension to agile practise – involving teams based at different locations – be it different offices, different cities or different countries with different cultural background and different time zones working simultaneously on the same project. Distributed Agile thus breaks the basic principle of co-location for successful agile implementation. Distributed agile thus is a complex phenomenon involving multi-cultural team based at different locations, may be from same organisations or from two different organisations. ... To make agile successful, open communication and collaboration is crucial. The key members from different locations need to be face-to-face at least in the early stages. It ensures that the team begins work on the project with a shared understanding of customer context as well as common minimum guidelines.


Enterprise bank accounts targeted in new malware attack
IBM has estimated that 95 percent of all corporate attacks rely on some form of human error. Most employees have already been trained not to click on unknown documents received by e-mail, as well as to not give up passwords over the phone. A single inattentive user, however, could result in the loss of large sums of money. To guard against Dyre Wolf, security professionals should reinforce company best practices that should already be in place. Employees should be reminded that banks never ask for passwords and that they should report any suspicious behavior. An organization may also wish to carry out mock-attacks to ensure that employees are fully trained on how to handle such incidents, Kuhn said.



Quote for the day:

"A leader is one who sees more than others see and who sees farther than others see and who sees before others see." -- Leroy Eimes

April 05, 2015

Three Emerging Themes of Big Data Analytics
For years, analytics has been changing the face of business, but never to the degree we are witnessing now. Technologies that have shown promise for years are starting to deliver tangible results. New entrants are using analytics to disrupt established markets, and big data conversations have migrated from the IT department to the boardroom. The code has finally been cracked, and enterprises are taking notice. With all the attention that big data receives, three emerging themes rise to surface in my daily interactions with senior executives: the realization of personalized marketing, the collapse of the middleman, and the recognition of data equity.


Machine Learning at American Express: Benefits and Requirements
In the case of fraud detection and prevention, machine learning has been helpful to improve American Express’s already excellent track record, including their online business interactions. To do this, modeling methods make use of a variety of data sources including card membership information, spending details, and merchant information. The goal is to stop fraudulent transactions before substantial loss is incurred while allowing normal business transactions to proceed in a timely manner. ... It’s a challenge to do version control at the scale of terabytes and more of data, because it’s too expensive in space and time to make full copies. What is needed instead are transactionally consistent snapshots for data versioning, such as those available with the MapR data platform.


Collecting private information - Uses and abuses
In business, personal information has become a sort of raw material. Many smartphone apps can afford to be free because the companies that develop them sell the users’ personal data, something barely explained in the terms and conditions. If the service is free, then you’re the product, goes an old saw in Silicon Valley. ... Likewise, he rightly argues for better oversight and protection of whistle-blowers as a way of helping restrain government power. But his recommendation to “break up the NSA” is idealistic. Distributing surveillance authority to numerous agencies would indeed prevent an unhealthy concentration of power. But the specialised skills and huge resources required to perform surveillance well call for centralising responsibility.


The six burning questions for firms looking to make money from big data
Extracting, refining and ultimately capitalising on data is notoriously difficult, particularly for existing firms who have to contend with an ingrained company structure, culture and traditional revenue streams. But it is the competitive advantage associated with effective big data utilisation that is driving the desire for existing mainstream businesses to become data-driven. Up to now there has been no systematic framework to enable established organisations and business start-ups to transform an innovative data-driven idea into a feasible business model that is driven by data. As a result of our research, we have devised a template for what we call the Data-Driven Business Model (DDBM) Innovation Blueprint.


Evaluating re-identification risks with respect to the HIPAA privacy rule
Most risk evaluation metrics for individual level data focus on one of the following factors: (1) the number, or proportion, of unique individuals; or (2) the worst case scenario, that is, the identifiability of the most vulnerable record in the dataset. Of those that consider the first factor, the most common approach simply analyzes the proportion of records that are unique within a particular population. Alternative approaches that have been proposed add nuance, for instance not just considering unique links, but the probability that a unique link between sensitive and identified datasets is correct. This accounts for the complexities of the relationship between the populations represented.


Code as a Second Language – And Why It Matters
Learning to code is being proposed by some as an alternative to learning a second language. Imagine having the choice: French, English or JavaScript. It’s an interesting concept, but could present problems if you’re, for example, traveling in Spain and order a bottle of fine Rioja with something like“function getwine(‘2 liter’,’house’){};” ... According to our brains and MRI research, playing music and programming computers are the same thing. In fact, just thinkingabout playing music is the same as programming. These three activities each activate a portion of the brain known as Brodmann’s area 40, located slightly above your ear.


The Cloud Could Be Your Best Security Bet
One of this issues around cloud computing is who exactly controls the data. If law enforcement comes knocking at the door, would the cloud company be forced to hand over your content, even if you didn’t want it to? The rules aren’t crystal clear, but some cloud vendors are forcing the issue. Earlier this year, Box released a product called Enterprise Key Management that puts your company firmly in control of your content. Box couldn’t give the content to law enforcement no matter what because it’s encrypted and only the owner has the encryption keys, forcing the law enforcement official back to you to get at it. But much like Cowan’s assessment of cloud security, not every cloud vendor has this capability and without it, the situation becomes much murkier.


Cloud Architecture #2: Eventual Consistency Patterns
Eventually data consistency (EC) is used to improve performance and avoid contention in data update operations. This is not a simple and straightforward model to use. In fact, if possible to architect an application to use the native transactional features for update operations – then do that! Only use eventual consistency (and the compensating operations) when necessary to satisfy needs that a strongly consistent data story cannot. A typical business process consists of a series of autonomous operations. These steps can be performed in all sequences or partially in parallel. While they are being completed that overall data may be in an inconsistent state.


Cynefin 101 – Shared Context and Sense Making
Remember that diversity and naivety are key tenets of Cynefin so it desirable to engage other parties as they bring different perspectives to bear. If you are doing this in the context of a department think about engaging people who you see as your clients and suppliers, those that depend on you and in turn those that you depend upon to ensure that you are taking a holistic view. You may want to keep this exercise internal to avoid ‘washing your dirty laundry in public’ but if this is the case then see if you can get some people who would act as surrogates for these external parties.


The battle for an open internet: A look at the Net Neutrality debate
"The TRAI consultation leans significantly towards finding some middle ground between what the telecom industry wants and the Internet that we've all grown up with," says Pahwa, who, along with 70 other enthusiasts, crunched it down to a concise 23 pages that you can actually understand ... It's important to remember that it's not just telecom companies that are interested in a non-neutral Internet in India. According to the TRAI consultation paper, 83 percent of India's Internet users access the Internet from their mobile phones. This massive audience is crucial for multi-billion dollar corporations like Twitter, Facebook and Google.



Quote for the day:

"I find that the harder I work, the more luck I seem to have." -- Thomas Jefferson

April 04, 2015

Are Wearables The Future Of Banking?
Berdak says that banks that are unconvinced by the current crop of wearable devices will still benefit from creating low-cost prototypes however, trialling a few technologies and preparing for when adoption surges. “Banks would be silly not to try and engage with this technology early on,” she says. “They do not have to have final apps already launched in the marketplace, but they definitely should be thinking about what they want to do in this space, building some proof-of-concepts and creating some early stage plans.” This is not only because of an expectation that customer adoption will pick up, she says, but also because banks will often need to build up a skill base ... as well as getting the right teams and developing best practices.


Adding Greater Realism to Virtual Worlds
Improbable has developed techniques that make it possible to share large amounts of information between multiple servers nearly instantaneously. This will allow many more players to experience a virtual world together than is currently possible. It will also allow more realistic physical interactions to take place within those worlds. Currently, in even the most elaborate virtual worlds, some characters and objects cannot interact because it would require more computational power than is available. Virtual worlds will no longer feel as if they’re built of “cardboard,” saysImprobable’s CEO and cofounder, Herman Narula. Moreover, using Improbable’s technology, objects and entities will be able to remain in the virtual world persistently, even when there are no human players around


Intel releases the 750 Series SSD, its fastest consumer flash
"The key to this product is raw performance. It's the highest SSD performance you'll see ... for a long time," said Jeff Fick, an Intel product marketing engineer. "We're delivering anywhere from two to four times the performance over our last SATA-based drive." The 750 Series SSD comes in 400GB ($389) and 1.2TB ($1,029) capacities. Using 4KB operations, its random read/write performance peaks out at 440,000 input/output operations per second (IOPS) and 290,000 IOPS, respectively. "We focused this product specifically on random [performance]. What we're targeting here ... is high-end desk top users as well as workstations," Fick said. "But the sequential performance is quite high as well when we compare it to SATA-based products."


Developing hybrid mobile apps with Phonegap, AngularJS, Bootstrap
Bootstrap is a mobile-first responsive front-end framework. What this mean? Bootstrap has an easy to use responsive grid which allows you to position your layout in a well structured responsive way. As the framework is built with mobile use in mind, it responds well to different screen sizes and adapts the layout of the app easily to different screen sizes. This is a good possibility to use the very same implementation for tablet and mobile devices of different screen sizes. And it is not only the grid that makes it special. It helps you manage typography, responsive images, forms, form validation messages, notification messages, responsive tables, and a good number of UI components. You can download it from getbootstrap.com.


Setting standards for in-house app development and delivery
Internally developed applications are designed and built within an organization by its own IT staff. Many businesses have some sort of development capability, whether that means a single developer or thousands, and more and more companies want to build custom apps for their employees to use on mobile devices. By developing apps internally, a company has complete control of what features they include and when to make changes. Programmers don't have to worry about including third parties in the process, and, furthermore, developers can tailor the user interface to the organization's particular needs.


The Allure of Singapore, the World’s Second Gateway to China
Singapore is one of Southeast Asia’s more mature data center markets, Jabez Tan, senior analyst at Structure Research, says. Telcos dominate data center markets in other parts of the region, while Singapore has a good mix of both telcos and data center specialists. The primary reason the small island nation has such an active data center market is that it has become an Internet gateway between China and the rest of the world, Tan explains. Now on its way to reaching a gateway status that’s on par with Hong Kong, Singapore is where international companies go to serve customers in China, and where Chinese companies go to serve customers in Europe or North America.


How to design the right blueprint for your IT project
To truly succeed businesses need to accept that regardless of any precautions taken, things will go wrong during IT projects, but the most important thing is to respond quickly. IT managers should not be afraid of failure. Leading companies today have adopted “accepting failure and recovering quickly” as key elements of their innovation processes. Finding out what doesn’t work is often a necessary step on the path of exploring new territory and essential for successful innovation and remaining competitive in a fast changing market. The skill is in learning to fail fast and cheaply - identifying as early as possible that a project is no longer likely to provide a return on its investment, so as to be able to minimise the cost.


Building Scalable and Resilient Web Applications on Google Cloud Platform
A highly-available, or resilient, web application is one that continues to function despite expected or unexpected failures of components in the system. If a single instance fails or an entire zone experiences a problem, a resilient application remains fault tolerant—continuing to function and repairing itself automatically if necessary. Because stateful information isn’t stored on any single instance, the loss of an instance—or even an entire zone—should not impact the application’s performance. A truly resilient application requires planning from both a software development level and an application architecture level. This document primarily focuses on the application architecture level.


Are privacy laws and regulations strangling Europe’s productivity?
This fear is predicated on the fact that the current privacy and data protection laws have placed a fair amount of burden on businesses in Europe. The greatest difficulty stems from the fact that these laws are different for each of the 28 European Union states. This is particularly burdensome for multinational companies that must consequently deal with hundreds of different regulations and 28 different national data protection authorities (NDPAs) across the region. “If your company has subsidiaries in every country in the EU, you will have to declare every personal data file to the country's NDPA in the national language,” says Yves Le Roux.


Three ways a CSO can stop being the bad guy
And when you're not going around telling people to stop doing what they want, or asking for money, are you delivering bad news about breaches? "I was the least invited person to meetings," recalls Adam Bly, who, before founding his own security company, San Francisco-based Bluebox Security, used to manage security, risk and compliance at companies like TiVo and Walt Disney. "I would 'no' to a lot of things because there was risk and I didn't have a solution," he said. But some security executives are redefining their roles to become people who say "yes," and restructuring their departments around becoming enablers of business. Here are some of the ways they're doing it.



Quote for the day:

"A 'strong' leader isn't someone who always has answers. It's someone who isn't afraid to learn and question." -- @Bill_George

April 03, 2015

Python Programming Resources
This is a comprehensive list of Python Programming resources. Python is a widely used general-purpose, high-level programming language. Its design philosophy emphasizes code readability, and its syntax allows programmers to express concepts in fewer lines of code than would be possible in languages such as C++ or Java. The language provides constructs intended to enable clear programs on both a small and large scale. It was named by Guido van Rossum, the creator, after Monty Python’s Flying Circus.


SQL SERVER – 3 Common Mistakes of Agile Development
Most of the development shops that I’ve worked have struggled with the ongoing battle to get features built and shipped on a schedule that satisfies business requirements. Good developers are proud of their craft, and want maximum time to create; business needs features to go out the door quickly in order to compete. These goals are often in conflict with each other. Agile methodologies (such as scrum) try to help balance this tension by encouraging active conversation between business and development, and continuously delivering working software that is flexible and adaptable to change. In the shops where I’ve seen agile development fail to deliver, I’ve noticed the following 3 bad habits


Navigating I/O Flows/Networks to Enhance the Governance Management Cycle
Since its legacy versions, COBIT has explained the relationships among activities in several processes systematically and organically, showing I/O flows/networks, which is one of the strongest points of difference from other frameworks, guidelines or standards. However, COBIT 5 has transformed its I/O flows/networks, changing the unit of I/O relationships from processes in COBIT 4.1 to management practices. Thus, I/O flows/networks to support the governance management cycle must be traced back to processes as outlined in the conceptual model of business case processes in the article “The Business Case as an Operational Management Instrument—A Process View”6 (the “article”)


What Lies Beneath the Data Lake
Closely related to the quality issue is data governance. Hadoop’s flexible file system is also its downside. You can import endless data types into it, but making sense of the data later on isn’t easy. There’s also been plenty of concerns about securing data (specifically access) within Hadoop. Another challenge is that there are no standard toolsets yet for importing data in Hadoop and extracting it later. This is a Wild West environment, which can lead to compliance problems as well as slow business impact. To address the problem, industry initiatives have appeared, including the Hortonworks-sponsored Data Governance Initiative.


Scotched eggs: Is this the death of the Easter egg?
Easter eggs have not undergone the same levels of scrutiny of the rest of the code, he says, and there may be vulnerabilities attached to them. "They still happen, but they're less likely to be little bits of code, more likely to be hidden in documentation or code comments," adds Brendan Quinn, a software architect in London. "Actual executable stuff hidden in code is something that people are trying to eliminate. With varied success around the industry." The argument goes if a manufacturer can't stop developers from sneaking in benign undocumented features in, how can you be sure they've not inserted a backdoor, too.


The interoperable Enterprise
IT customers have each experienced the frustration of trying individually to get key IT suppliers to fix this problem. Many have also tried collaborative efforts, both within their own industry and across industries, to marshal collective procurement $ to bring pressure on the supply side. Also for too long IT suppliers have had to deal with large lists of vague and ambiguous requirement statements. ... To further these aims, The Open Group is evolving this business scenario that describes the problem caused by the lack of interoperability. The Open Group will use this business scenario to achieve convergence around the real business issues that IT suppliers should be addressing on behalf of their customers, and to set in motion an empowered team of our technical champions to work with The Open Group in setting the standards agenda to address these problems.


Toolkits for the Mind
Switching languages altogether wasn’t an option. Facebook had millions of lines of PHP code, thousands of engineers expert in writing it, and more than half a billion users. Instead, a small team of senior engineers was assigned to a special project to invent a way for Facebook to keep functioning without giving up on its hacky mother tongue. One part of the solution was to create a piece of software—a compiler—that would translate Facebook’s PHP code into much faster C++ code. The other was a feat of computer linguistic engineering that let Facebook’s programmers keep their PHP-ian culture but write more reliable code.


The Hierarchy of Needs for Analytics
We see too many organizations that achieve success with one minor analytics project and then try to live off that glamour, like middle-aged suburbanites reminiscing about that epic night out in college. What these companies really need to do is scale their analytics efforts – turn that one success into the first of many. In order to do that, there are series of steps an organization must take, and certain needs that must be met. You may be familiar with Maslow’s Hierarchy of Needs, developed to explain the needs of the human race in pyramid form, from the most basic to the most advanced. In that spirit, we’ve developed our Hierarchy of Analytics Needs.


Make sense of cloud service brokers
That lack of consistency is frustrating. It's easy to define the business case. However, it's not easy to map that to the providers. Despite the differences in what each offers, CSBs clearly have a great deal of value if you use them appropriately: providing a common mechanism to access public and private cloud computing services, ensuring that these services are both cost-effective and deliver as expected. I hope some CSB standards will emerge; that would help the industry gain more traction. I know this space will change a great deal in the next few years, so today's selection might not be right tomorrow. Choose carefully, and be able to change your CSB approach in the future.


Fifteen Years of Service-Oriented Architecture at Credit Suisse
The sheer size of the landscape, the technical and architectural heterogeneity, and the need for dynamic development and tight integration create a very challenging environment for application integration. Credit Suisse strategically responded to these challenges by placing integration architecture in the spotlight, emphasizing the decomposition of the overall IT system into clearly defined subsystems decoupled through SOA.2 This article reports on Credit Suisse’s journey over the past 15 years. Why 15? Because 15 years ago, two events fundamentally challenged the traditional enterprise architecture: one, there was a need to replace existing systems because they had reached the end of their useful life cycle, and two, it became clear that, with the Internet, banking services had to be offered via new technical channels that were largely



Quote for the day:

“The task of leadership is not to put greatness into humanity, but to elicit it, for the greatness is already there.” -- John Buchan