April 23, 2015

Infosec still in the Dark Ages, says RSA president
According to Yoran, the industry has promoted a defensive strategy that aligns with a Dark Ages mindset of simply “building taller castle walls and digging deeper moats,” but that is not solving the problem. “It is like we’re working from a map of a world that no longer exists; and possibly never did,” he said. Yoran said that despite knowing that perimeters are not sufficient, the perimeter mindset persists, and the security profession continues to rely on signature-based systems. “We’ve all heard that the threats that matter most are the ones you haven’t seen before. These tools by definition are incapable of detecting the threats that matter to us most,” he said.


IT Security: The Good, the Bad & The Ugly [INFOGRAPHIC]
When it comes to IT security and risk, we've seen some pretty interesting things. The crazy part is that these things are very common among SMBs who either don't have budget allocated or don't place an importance on risk management. We want to offer you some statistics that will uncover the good things, the bad things and the downright ugly statistics that come with IT security for small business.


In Data Center Perimeter Security, TCO is a Continuous Process
To apply security products, you need to define the type of threat first: Are they terrorists or local kids? “The type of threat will guide you to the right budget and product,” said Claus. “We’ve seen it all.” After adding a deterrent around the perimeter, the next step is to determine how many layers of protection you need. Single layer sensor protection is a fence with sensors on the inside. A dual layer approach combines multiple types, in addition to better coverage; it better allows tuning out false alarms. One sensor technology is usually placed at the outer perimeter and the second at the asset. Multi-layer protection includes several different types. These sensors can extend beyond the perimeter to help detect someone doing reconnaissance. The downside is that it also detects animals and other triggers of false alarms.


Facebook’s secret plan to kill Google
Facebook is out to kill Google. There, I said it. You probably think I’m crazy, but there are a bunch of macro-trends coming together, as well as several moves that Facebook got right. that support this. But first, a disclaimer: I’m the cofounder of AdEspresso, a Facebook partner that manages advertising for SMBs and SMEs. As a Marketing Partner, we do have access to privileged information not disclosed to the public, as well as a view on a broader dataset of around $250 million of Facebook Advertising Data, but the analysis that follows is not based on any of the above, rather on public information that has been disclosed in the past few weeks paired with public insights from thought leaders.


Preparing for the digital disruption that’s coming to your industry
Whatever your business, significant disruption is either already occurring or on the way. Much of this is due to the latest wave of emerging and disruptive technologies that are serving as foundational building blocks for new, digitally based business models. I’ve talked with a number of CEOs and business leaders recently, all of them keen to glimpse around the corner to prepare for what’s ahead. Even if your business is going strong right now, you should be doing the same. To help you in this task, here are a few thoughts that arose from those recent discussions.


Systems thinking and practice
Those claiming systems ideas and methods have important characteristics in common, not least a common philosophical base. For these people systems has emerged as an important discipline or field of interest in its own right. They are interested not just in particular sorts of systems, but in systems thinking in general. And although systems has drawn ideas and techniques from engineering, biology, sociology, psychology and many other fields some say there is something special about systems, just as the different disciplines mentioned above are said to have different ways of thinking about the topic that characterises them.


Time for a new school of cyber defence, says HP
The first thing many organisations need to learn is that basic security hygiene must still be the top priority, he said. “The second thing is that it is the people and the processes that make us safe because so many of the attacks are against old vulnerabilities that we know exist,” said Gilliland. The third most important thing many organisations still need to learn is to focus on the security fundamentals, he said. Gilliland said that in relation to those fundamentals, for the past five years, HP and the Ponemon Institute have published an annual study that correlates spending on different categories of capability with the estimated cost of data breaches. The latest study found that a much broader focus on protecting the information that matters through things like the use of encryption will reduce the cost of breaches by 20%compared with the average.


Information Sharing: A Matter of Trust
While banking institutions have always been concerned about emerging attacks, they've historically been less concerned about identifying the threat actors who wage the attacks. That's mainly because banks don't have access to intelligence that would help them link attacks to certain groups or nation-states, Nelson says. Today, however, institutions, with the help of the federal government, are putting more emphasis on attribution, he adds. The government is increasingly helping the financial services industry attribute attacks to nation-states or specific crime rings, Nelson says. "Our government now is more willing to give attribution to these types of attacks, and we've seen that with some indictments against some senior officers in the Chinese military, and the Sony attack being attributed to North Korea."


Google Introduces Wireless Service Called Project Fi
“Since it’s hard to predict your data usage, you’ll get credit for the full value of your unused data,” according to the blog post. “Let’s say you go with 3GB for $30 and only use 1.4GB one month. You’ll get $16 back, so you only pay for what you use.” In many ways, the wireless service is similar to the Google Fiber Internet service that has been introduced in a handful of American cities, including the Kansas City area and Austin, Tex. Google is piggybacking on giant physical networks that are owned by other companies, creating a barrier that, for now at least, limits Google’s competitive threat to traditional carriers. But Google has a long history of trying to cut out middlemen — including Internet service providers, online stores and delivery businesses — that stand between the company and users.


Row-level security provides enterprise chops
Limiting access to the database in this way meant that a whole set of data access coding techniques I had previously used didn't work anymore, and that certain reporting packages didn't work either. You might ask why we went through all this trouble. The reason was that the company I was working for was a major bank and it had to ensure that users could only see the data for which they were authorized. It wasn't enough to implement this security in the application; it had to go in the database, so that no matter how a user connected to it -- through the application or directly -- unauthorized data remained inaccessible. Eventually I got used to the new programming patterns, and subsequent releases of major reporting tools became stored procedure-friendly. In effect, stored procedure access to tables had become an Enterprise standard throughout the industry.



Quote for the day:

"Leadership is Influence and Influence is All Around Us" -- Sam Shriver

April 22, 2015

Machine Dreams
The Machine is designed to overcome these problems by scrapping the distinction between storage and memory. A single large store of memory based on HP’s memristors will both hold data and make it available for the processor. Combining memory and storage isn’t a new idea, but there hasn’t yet been a nonvolatile memory technology fast enough to make it practical, says Tsu-Jae King Liu, a professor who studies microelectronics at the University of California, Berkeley. Liu is an advisor to Crossbar, a startup working on a memristor-like memory technology known as resistive RAM. It and a handful of other companies are developing the technology as a direct replacement for flash memory in existing computer designs. HP is alone, however, in saying its devices are ready to change computers more radically.


Top 10 Humanoid Robots Designed To Match Human Capabilities And Emotions
Some are predicting that robots of all types could fully replace humans by 2045. Artificial intelligence is now advancing to a point where a new type of brain can be offered to complement the relatively menial tasks of modern-day robotics, hinting at the next stage of machine evolution. The current list of robots designed over the last few years to match human capability demonstrate what is described above could become reality sooner than we think ... ASIMO, with his space-suit looking appearance, is cheerful and endearing. He has paved the way for many subsequent walking, human-like robots, but still holds his own as an advanced and powerful robot.


Why Combined Heat and Power Makes Sense for Data Centers
Generally, CHP engines are 40-percent efficient in the way they convert fuel into energy, according to Waldron. An average utility is 33 percent efficient. Energy is lost in the generation process, transmission, and transformers on the user’s property. With a 40-percent efficient engine, the remaining 60 percent of energy takes the form of heat, which an absorption chiller converts into chilled water. Coincidentally, the amount of chilled water a 40-percent efficient engine can produce this way is about equivalent to the amount of chilled water needed to cool the servers it powers, Waldron said. “It’s an interesting balance,” he said. “No-one designed the engine in that way. It just happened that way.”


GetReal Says Stop Messaging, Just Meet
Of course, being freshly launched, GetReal’s immediate hurdle is the network effect. The bootstrapping developer behind the startup, Arnaud Meunier — a U.S.-based former engineering manager at Twitter who was acqui-hired in 2010, when Twitter bought his prior startup Twitoaster, leaving in 2014 to work on GetReal — has to spoof his location to mine so I can see how the interface works. When he’s not around there’s no one else near me in London to try to meet. He says he’s been testing the project for two months with a beta group of around 200 users. The initial focus has been New York City and San Francisco — owing to the obvious pool of “tech industry people, willing and constantly needing to grow their networks”.



Java gets browser eviction notices from Spartan and Chrome 42
For most users, the removal of NPAPI is a welcome change -- modern web design is now focused on HTML5 and JavaScript, removing the need for additional plugins, which are often fraught with security vulnerabilities and memory leaks, or a measurably negative impact on battery life. That is not to say that these changes will bring about the end of all plugins. In Chrome, Flash support is contained in the new PPAPI plugin system. Oracle has not provided a PPAPI-compatible plugin for Java, nor has Microsoft for Silverlight. PPAPI is not a standardized technology -- it is only supported in Chrome and Opera, and Mozilla has no plans to include it in Firefox. For Windows 10, a new plugin system for Spartan is planned, but details have not yet been made available.


Why the journey to IPv6 is still the road less traveled
The new protocol, which is expected to provide more addresses than users will ever need, has made deep inroads at some big Internet companies and service providers, especially mobile operators. Yet it still drives less than 10 percent of the world’s traffic. This is despite evidence that migrating to IPv6 can simplify networks and even speed up the Web experience. The good news is that for ordinary enterprises, it can be just a matter of asking your ISP (Internet service provider) or hosting company for IPv6 service. Many of the major ISPs and CDNs (content delivery networks) are equipped to provide both IPv4 and IPv6 connections to a customer’s website, allowing partners and potential customers to reach it over the new technology if they have it.


How big will the connected vehicle market be?
“Connected vehicles have enormous potential to provide drivers with increased situational awareness of upcoming hazards and congestion,” he explained in Navigant’s latest study on the topic. “Automakers and governments are striving to meet consumer demands for safer cars with lower emissions and energy consumption,” Abuelsamid said. “This push is driving the development of a number of crucial technologies, including electrification and automated driving systems that rely on real-time data to vehicles, drivers, and pedestrians, through connected vehicle systems as V2X.”


Using Storytelling in Organizational Change
Obviously storytelling is not the single, sanctifying skill any leader or professional should master. The pitfall lies in believing that a story will help you get away with anything or that it is the key that will fit any door. A pitfall that has to do with the nature of the story you are telling is the temptation to make it all sound easy or spectacular. Robert McKee, an advisor to many award winning Hollywood storywriters, says we should never star an ‘overdog’ and that we should never star ourselves. It’s good to share successes but what people really want to hear is that you – or whoever the protagonist is – are also vulnerable. That you also face bad luck, that you also have to fight your inner demons, etc. Your story must draw them into empathy or identification with you. No identification, no connection.


Zurich Insurance turns to augmented reality to train 10,000 managers
Zurich, which is making a multi-million investment in learning technology, is developing mobile phone apps that will track a manager’s training and direct them to materials tailored to their style of learning. The technology is expected to come into its own during classroom-based training sessions, when managers will be able to point their phones at a poster or a “learning card” that could take them to a video, an online training course, or a book that could offer more in-depth information. “The challenge with training 50 people is how you direct them. Augmented reality allows people to self-direct. They can point a phone at a poster and get more information on coaching, for example,” said Neubauer.


EU data protection reform triggers privacy warning
The council is discussing changes to the new data protection regulation. The European Commission made the original proposal for a new regulation, which the European Parliament adopted with slight changes in March last year. However, while the original plan was well-defined and included strong data protections, documents leaked about the council's plans in March show that it is trying to destroy key elements of the original proposal, according to an analysis by European civil rights group EDRi, which wrote the email on behalf of the rights organizations. For instance, the council proposes to allow companies to collect personal data under a "legitimate interest" exception, which means that a company does not need to get an individual's consent to gather personal information if it feels it has a legitimate reason to do so.



Quote for the day:

"Make a decision to keep pressing forward. Keep believing and keep stretching until you see your dream fulfilled." -- Joel Osteen

April 21, 2015

The Internet of Finance: Unleashing the Potential of Blockchain Technology
Because most of today’s financial instruments exist electronically and because the current financial system is comprised of a set of digital records, many observers reason that blockchain technology could eventually supplant the current market infrastructure, where centralized ledgers are held and controlled by large institutions. However, for this to occur on a significant scale, various obstacles, including the blockchain’s requirement for enormous computational power and the associated high energy maintenance costs would need to be addressed. A number of analysts believe that these obstacles can, and will, be overcome and that blockchain technology could be as disruptive as the Internet thanks to its ability to transfer value as seamless and low-cost as the Internet made the transfer of information.


Microsoft’s Seven Tenets of Data Center Efficiency
As the field of robotics shifts away from static “dumb” robots that have resulted in inflexible manufacturing facilities toward more versatility, and design of data centers and especially data center hardware move toward more standardized commodity equipment where individual components can be easily replaced, “we’d expect to see robots much more inside the data center,” Slater said. ... While robots in data centers are a thing of the not-too-distant future, Microsoft already has some of the most efficient data centers in the world. Slater has started an initiative within the company to share the ways it achieves data center efficiency with the world and find areas that can apply to smaller enterprise data centers, whose challenges may be very different from homogeneous hyperscale facilities.


Bypassing The Password, Part 2: Trusted Identities
Security pundits have raised further concerns about the security of elliptic curves adopted as standards by the National Institute of Science and Technology (NIST) -- such as the type relied upon by FIDO -- in the wake of Edward Snowden's revelation that the NSA inserted a backdoor into at least one such NIST encryption standard. (NIST, incidentally, is the agency spearheading NSTIC.) Cyber security innovation and experimentation should generally be applauded, but -- even if unwittingly and unwillingly so -- FIDO's biometrics may wind up serving as a lapdog for government interests.


How the Internet of Things Can Unlock the Door to a More Robust BMS
Although the flexibility offered by open BMS solutions is highly desirable, property owners have too much invested in existing systems to simply abandon them. When “rip and replace” is not an option, it’s possible to use IoT technologies to instrument buildings with utility meters, people counters, and other sensors. ... Also augmenting existing equipment, Daikin Applied retrofitted its installed HVAC units to seamlessly connect to the cloud. As a result, customers of this leading air conditioning equipment manufacturer can proactively manage the performance of their buildings and address HVAC issues before they happen, thus avoiding expensive repairs and unpleasant temperature excursions. Online diagnostics provide year-round, 24-hour protection through early detection of equipment deterioration and abnormalities.


Huawei calls for global consensus on the future network
“The current network cannot solve these challenges. We need an end-to-end transformation,” said Xu. “We need to adopt a more open strategy to extensively collaborate with enterprises and carriers, because we cannot do it all ourselves.” Huawei claimed it was already playing a constructive role in helping to move the industry forward, and set out a new ambition to transition away from hardware to a more services-led business model as it pursues its collaboration goals. “In the future, products and services will be the driver, not just products, to fulfil business development. We can help [enterprises and carriers] pursue their ambition to transform the network, IT architecture and customer experience,” said Eric Xu, rotating CEO.


Security Professionals Stymied by Outdated Visualization Tools
Today, about 85% of a security analyst’s job involves looking at lines of code and characters and the remaining 15% is looking at visual graphics or representations of the information such as dashboards, graphics and maps. Ideally, that ratio should be reversed, author of the book, said Raffael Marty, author of the book, Applied Security Visualization. In some quarters of the security industry, there’s a dawning realization that better-considered visual tools, based on solid data and analytics, could help make it easier for network defenders to do their jobs and open up cybersecurity jobs to more types of people.


Containers: Fundamental to the cloud's evolution
At the hosted private cloud and hyperscale public cloud level, when you are talking thousands or hundreds of thousands of virtual machines, many of which that have workloads that have been shifted away from on-premises, you start running into scalability issues. So what's the long-term solution to VM sprawl? That solution is Containerization. Containerization, like VM technology, also originated on big iron systems. Although it previously existed on FreeBSD as "Jailing", the first commercial implementation of containers was introduced as a feature within the Sun (now Oracle) Solaris 10 UNIX operating system as "Zones". This technology eventually found its way into x86 Linux and Windows as Parallels (now Odin) Virtuozzo.


ISACA introduces a portfolio of new cybersecurity certifications
The CSX training and certifications were developed over a two-year period by a working group of global chief information security officers (CISOs) and other cyber security experts and went through a rigorous peer review by more than 100 experts. The innovative course delivery and testing components are the result of a collaboration with the Art of Exploitation (AoE) cyber security team of TeleCommunication Systems, Inc. (TCS), a world leader in cyber security training and enterprise solutions. A key feature of CSX’s training and skills verification is an adaptive, performance-based cyber laboratory environment. A professional’s skills and abilities are measured in a virtual setting using real-world cyber security scenarios.


Plan X: DARPA's Revolutionary Cyber Security Platform
Although Plan X has been described as in its nascent stages, it is already showing tremendous promise for the future of information security, the future of cyber defense, and the future of the Internet by making cyber security more accessible. The following slides offer an overview of some of the neatest accessibility features of DARPA's Plan X as publicly outlined thus far. These features, in turn, have stimulated our curiosity at InformationWeek, and we want to know what you think. What features of Plan X do you see potentially helping your organization's network security efforts? Can you see yourself managing an offshoot to keep track of the security of your own home network? Does the potential for network immersion that Plan X offers excite you or frighten you? Let us know your thoughts and reactions in the comments section below.


Driving Agile Architecting with Cost and Risk
One of the criticisms of architecture from the agile community is based on the misconception that an architect’s purpose in life is to deliver “an architecture,” commonly interpreted as a piece of documentation—which, according to the Agile Manifesto, is valued less than working software. This is a poor representation of what real architects do every day: they look for architectural concerns to address, figure out the options they have for addressing those concerns, and then decide the best course of action given their current context. Looking at it this way, the architect’s main deliverable isn’t a document but a stream of decisions.  This way of looking at architecture work is perfectly compatible with the agile mindset, regardless of whether these decisions emerge from early implementation and refactoring, from careful upfront modeling, or from a combination of both.



Quote for the day:

“Trust is knowing that when a team member does push you, they're doing it because they care about the team.” -- Patrick Lencioni

April 20, 2015

5 Easy Tips to Deal with Conflicts Within Distributed Agile Teams
After being a buzzword for years, Agile has now become the go-to development methodology for most entrepreneurs. However, if your development team is remote, working on agile is a challenge. In this article, we highlight some conflicts which arise while you are working with distributed agile teams. Let’s identify these issues and understand how you can deal with them. ... Communicate regularly and effectively. Having face-to-face interactions helps. If you meet them personally, say once or twice a year, it works wonders in fostering the connection between you and your team. Building socializations platforms and creating opportunities for informal conversations is also a good idea. Team building sessions also help. Gaming sessions and co-worker trivia can come in handy when establishing a better relationship with your remote team


How to make more successful enterprise software purchases
By the time the requirements analysis is complete, an organization should know what they need in detail, and why they need it. An inadequate requirements analysis sets the stage for a troubled implementation project with ballooning costs. Part of the problem of ballooning costs is caused by waiting for the implementation stage to flesh out requirements in sufficient detail. However, there are many benefits to doing this work early on in the project, namely at the requirements analysis stage. ... It is difficult to estimate accurately the time and resources needed for implementing the software when the requirements are written at too high a level. A one-line requirement can encapsulate weeks or even months of work for the unwary. Far better to provide the detail needed to get more accurate implementation estimates.


Five silver linings of the public cloud
one of the most significant positives has been the speed at which Seaco can recover from system failures. Its recovery point objective - the maximum period that data is unavailable following a major incident - is down from 12 hours to one hour and its recovery time objective - the time it takes to restore a business process after IT-related disruption - was reduced from three days to two hours. ... In its early days, the firm spent millions of dollars building 1,000 foot datacentres in London and Washington. But as demand for its services increased it found it became "very expensive to keep every feature of the platform behaving with globally consistent performance".


With data analytics, no more Pontiac Azteks
Analytics exponentially expands the zone of what can be known. For-profit executives and hard-working public servants no longer need to make stuff up as they try to achieve organizational objectives. Nowhere is this truer than in the world of product development, especially with respect to bringing insights about customers to that process.  In the middle of the last century, during the era on Madison Avenue of Mad Men, the focus group was the cutting-edge method of doing this. Consumers would be brought in to spend a few hours in a conference room at a company’s marketing department or ad agency, and they would be asked things like how they used a product and what they wanted from a category of products.


Protecting infrastructure secrets with Keywhiz
To protect secrets stored on the server side, every secret is AES-GCM encrypted with a unique key before being stored in a database. This unique key is generated using HKDF. Square uses hardware security modules to contain derivation keys. Services get access to secrets through KeywhizFs. At Square, each service on every host has a directory where a KeywhizFs filesystem is mounted. Services merely have to open a read-only “file” in that directory to access a secret. Performing a directory listing shows which secrets are accessible. Local access control is straightforward; traditional Unix file permissions are used for the secret “files.” The advantage of a file-based representation is that nearly all software is compatible with reading secrets from files.


Meet the Cybersecurity Company Helping Sony Fend Off Hackers
Though not a household name, the Milpitas, California-based company has become a go-to security firm when big companies fall victim to cyberattacks. ... So when Sony's Los Angeles security team realized the studio's network had been breached, they asked FireEye to help figure out exactly what had happened and where the systems were vulnerable. That's the first step for many FireEye clients, most of which then ask the company to repair and improve their data defenses. "We were founded on the idea that cyber­attacks would ultimately overrun all existing defenses. Now this has been overwhelmingly demonstrated," says Ashar Aziz, the company's founder, chief strategy officer, and vice chairman.


IT consulting: Is moving out on your own the right move?
It's understandable why you might be considering going down the consulting path. For some, a full-time position can grow stale from working in the same environment, seeing the same people and dealing with the same problems day after day. "There can be an inherent lack of diversity, more limited exposure to different approaches. You may only experience certain types of projects once and only have one shot at success -- for instance, a major CRM application implementation," says Levine. Many times in your career you may find yourself at a crossroads. Neither direction is the right or wrong path, but if you consider the pros and cons carefully, you should be able to make the smarter choice. To help you get closer to the answer, we spoke with c-level tech experts to find out what you need to consider.


The VR growth cycle: What’s different this time around
Long story short, high-end VR would get crushed under its own weight long before it hits mass-market size. On the low end, total cost of ownership is lovely: $20 for a drop-in viewer and you have access to loads of two-minute, snack-sized VR that is cheap enough to produce that developers can create free, free to play, $.99 and ad-supported VR all day long. Now, the danger at the low end is that it passes from novelty into fad, instead of into a must-have, transcendent part of our everyday experience. I personally think we need to come at this from both ends to fully explore the potential of this as a business. And if I had to bet on one, I would bet on something closer to the low end. Maybe not Cardboard, maybe a cheaper edition of Gear VR. But something affordable to consume and produce. That will get the market to bigger numbers, faster.


Microsoft readies first developer preview of its new microservices Service Fabric
Using this Service Fabric, Azure applications can be decomposed into smaller components, a k a microservices, that can be updated and maintained independently of the underlying infrastructure. The Service Fabric enables the various microservices to communicate with one another via programming interfaces. Russinovich said last year that Microsoft was using the Service Fabric technology to run pieces of the Azure core, as well as services including Skype for Business (Lync) and the Azure SQL Database. Microsoft officials said today that the company also has used Service Fabric in building/deploying Intune, Event Hubs, DocumentDB and Cortana. Customers will get the exact same Azure Service Fabric framework technology that Microsoft uses internally, not a subset or different version of it, according to an April 20 blog post announcing the coming service.


Interview: The software processes behind Hailo's success
“Our developers provision their components and the system takes care of placing the service where it needs to be running, routing traffic to it and bringing feedback to the developers, who can control how much traffic is routed to the new service,” he says. This allows the development team to see if they have built something that does not work. “It is important for us to get the services we develop into production as quickly as possible, so we have automated testing, starting with the Hailo application and going back through integration testing of all its constituent components,” he says. One of the challenges a traditional software development team faces with DevOps is how testing and quality assurance fits in with continuous development and rollout.



Quote for the day:

"The art of leadership is saying no, not yes. It is very easy to say yes." -- Tony Blair

April 19, 2015

The business architect role and the enterprise architecture of tommorrow
To sum up, this enterprise business architect should operate higher up in the enterprise hierarchy to cover the business architecture and integrate it with the technology architecture. He will ensure that it is the full blueprint of the enterprise that it is delivered rather than the IT blueprint. And he will make sure that the audience is the whole enterprise rather than IT. This blueprint would enable stakeholders model own parts with same conventions and constraints in the enterprise wide context. This would unite the enterprise in one coherent operation and development effort. The EA would be the collective cross enterprise design where everybody contributes to the same plan and goals, in synchronization.


The Value of Data Platform-as-a-Service (dPaaS)
dPaaS provides enterprise-class scalability enabling users to work with rapidly-growing and increasingly complex data sets, including big data. Users have the flexibility to deploy any analytics tool on top of the platform to facilitate analyses in different environments and scenarios. The platform provides data stewards full transparency and control over data to ensure adherence with GRC (governance, regulatory, compliance) programs. dPaaS allows enterprises to reduce the burden of maintenance requirements for hardware and software. Companies can shift IT budgets from capex to more predictable opex, while freeing up IT teams to work on higher-return projects using market-leading technologies in collaboration with business units.


5 Unusual Ways Businesses Are Using Big Data
Big data is where it’s at. At least, that’s what we’ve been told. So it should come as no surprise that businesses are busy imagining ways they can take advantage of big data analytics to grow their companies. Many of these uses are fairly well documented, like improving marketing efforts, or gaining a better understanding of their customers, or even figuring out better ways to detect and prevent fraud. The most common big data use cases have become an important part of industries the world over, but big data can be used for much more than that. In fact, many companies out there have come up with creative and unusual uses for big data analytics, showing just how versatile and helpful big data can be.


How a Toronto prof changed artificial intelligence
In quick succession, neural networks, rebranded as “deep learning,” began beating traditional AI in every critical task: recognizing speech, characterizing images, generating natural, readable sentences. Google, Facebook, Microsoft and nearly every other technology giant have embarked on a deep learning gold rush, competing for the world’s tiny clutch of experts. Deep learning startups, seeded by hundreds of millions in venture capital, are mushrooming. Hinton now spend three-quarters of his time at Google and the rest at U of T. Machine learning theories he always knew would work are not only being validated but are finding their way into applications used by millions. At 67, when he might be winding down a long and distinguished career, he is just now entering its most exciting phase.


6 Wearables That Will Enhance The Wearable Revolution In 2015
The hearing aids continuously scan the acoustic environment and activate the most optimal settings for that particular listening situation. For example, if you are at a noisy family gathering, the smart hearing aids hone in on speech coming from the front while softening speech and noise from other directions. Later, if you are out walking the dog, they automatically adjust so you can enjoy the sounds of nature. ... The FitLinxx AmpStrip is a thin, waterproof device that tracks heart rate and activity around the clock with accuracy – all within a device as discrete and comfortable as a Band-Aid. It can be comfortably worn all day, every day. It easily sticks to your torso and automatically tracks heart rate, activity, exercise load, skin temperature and posture.


10 reasons to buy a Windows tablet for work instead of an iPad or Android
Tablets are going to work instead of laptops in some cases or to augment them in others. They can do a lot in the enterprise, some more than others. While the iPad and Android tablets are capable workmates, the tablets of choice are those running Windows. Windows has enjoyed a long reign as king of the workplace and that hasn't changed. There are a number of solid reasons why that is, and these reasons contribute to making Windows tablets the choice to take to work. ... Since Windows tablets provide more options to the enterprise when it comes to accessories, there is more cost flexibility. Also, business professionals will benefit from the app selection and the wide range of accessories.


Podcast: How to Architect for IoT
Some excerpts of this Podcast - IoT data is messy. Devices get cut off in mid-transition. How do you detect this–and clean it up–as data arrives?; IoT data is of incredibly high volume. By 2020, we will have 4x more sensor and IoT data than enterprise data. We already get more data today from sensors than we do from PCs. How do we scale to consume and use this. In addition, connected devices are not always smart or fault-tolerant. How do you ensure you are always ready to catch all that data; IoT and sensor and of itself is not terribly useful. It is rarely in a format that an analyst would even be able to read. It would be incredibly wasteful to store all this as-is in a business warehouse, DropBox repo, etc.


Digital Reasoning Goes Cognitive: CEO Tim Estes on Text, Knowledge, and Technology
Tim Estes founded Digital Reasoning in 2000, focusing first on military/intelligence applications and, in recent years, on financial markets and clinical medicine. Insight in these domains requires synthesis of facts from disparate sources. Context is key. The company sees its capabilities mix as providing a distinctive interpretive edge in a complex world, as will become clear as you read Tim's responses in an interview I conducted in March, to provide material for my recent Text Analytics 2015 state-of-the-industry article. Digital Reasoning has, in the past, identified as a text analytics company. Maybe not so much any more.


BI Industry Going Through Midlife Crisis
Seriously all the chatter about old slow BI approaches being left behind for rapid data discovery with little governance, one version of the truth being tossed to the wind in a new BI world being driven by the business, and even a short opening keynote flick created by the Gartner team showing a middle aged woman leaving her husband, tired of waiting, disappointed by empty promises, etc. did send a message and a warning signal. ... Data discovery tools are becoming totally irresistible to the business because they are fast, easy to use and visually drop-dead gorgeous. However, I can’t help but think a bit more BI sanity may return in a few years after the business realizes there is much more to a successful BI implementation than quickly connecting to data and creating pretty charts.


A Tester’s Perspective on Agile Snags
The true agile QA is also often responsible for non-unit-test tools, test environments, and test data. People in this role will find themselves weighing conflicting choices. The choices resemble those in non-agile projects, but the short timescales of an agile project make the problems particularly acute. The responsibility for test management is often delegated to one or two members of an agile team, rather than taken on by the team as a whole. Although working in agile keeps you on your toes, distributed responsibilities and better time management makes your work easier as well as efficient. Estimations also challenge agile testers.



Quote for the day

"I believe you have to be willing to be misunderstood if you're going to innovate." -- Jeff Bezos

April 18, 2015

Six cyber security startups kick off with CyLon accelerator
CyLon is supported by sponsorship from technology defence and security specialist Raytheon. CEO of Cyberlytic Stuart Laidlaw said his team – one of the selected six teams to form the first cohort – are looking forward to starting at CyLon. “We are delighted to have been selected for the first CyLon programme, which offers us a fantastic platform to grow our business into a leading global cyber security provider," he said. According to Iain Lobban, director of GCHQ until November 2014, cyber security is one of the most challenging issues in this generation.


Data science demands elastic infrastructure
The problem with trying to run big data projects within a data center revolves around rigidity. As Matt Wood told me in a recent interview, this problem "is not so much about absolute scale of data but rather relative scale of data." ... In a separate conversation, he elaborates: "Those that go out and buy expensive infrastructure find that the problem scope and domain shift really quickly. By the time they get around to answering the original question, the business has moved on. You need an environment that is flexible and allows you to quickly respond to changing big data requirements. Your resource mix is continually evolving--if you buy infrastructure, it's almost immediately irrelevant to your business because it's frozen in time. It's solving a problem you may not have or care about any more."


Anticipating the digital future
AI will more aggressively support decision making. The resulting information will be presented in a way that it can be absorbed through multiple senses. OK, that’s new. Privacy will increasingly be a problem/opportunity and while this will likely vary greatly across age groups, consumer-directed tools should help close the gap on privacy fairness. To net out much of this, the future will require a vastly changed set of tools and skills and only by focusing on remaining agile and keeping your eye on the trends, problems, and related technology advancements will you have a hope of keeping up. Good news is that most clearly won’t be able to so if you can keep up you’ll stand out sharply in a crowd of under performers.


The Non-parametric Bootstrap as a Bayesian Model
Still, the bootstrap produces something that looks very much like draws from a posterior and there are papers comparing the bootstrap to Bayesian models (for example, Alfaro et al., 2003). Some also wonder which alternative is more appropriate: Bayes or bootstrap? But these are not opposing alternatives, becausethe non-parametric bootstrap is a Bayesian model. In this post I will show how the classical non-parametric bootstrap of Efron (1979) can be viewed as a Bayesian model. I will start by introducing the so-called Bayesian bootstrap and then I will show three ways the classical bootstrap can be considered a special case of the Bayesian bootstrap. So basically this post is just a rehash of Rubin’s The Bayesian Bootstrap from 1981.


5 Things To Know About The Rise Of Open Source
If you still think open source technology is less reliable than proprietary software, or less secure, it’s time to learn more about the private sector’s digital revolution. During the past year major tech brands such as Google, Facebook and Microsoft have adopted a more open source philosophy, evident in their latest software releases. Similarly, more large companies are utilizing open source solutions alongside proprietary software to tap into open source’s diverse, creative, cooperative community of developers, thought leaders and users. If you want to expand the use of open source in your own business, there are a few things you should know.


What’s slowing down your network and how to fix it
The all-too-obvious answer is to see bandwidth as the problem, but with investigation, it is often not within a LAN environment, where a high amount of bandwidth is available. More likely, the problem lies within the WAN, where capacity is more finite and expensive. Problems with slow networks in a WAN environment are more likely to result from not employing quality-of-service software, according to Jason Peach, principal consultant at Networks First. “Rather than throwing more bandwidth at the problem, using more intelligent analysis to optimise bandwidth is often a better way to solve a bandwidth contention – the problem in any network scenario – LAN, WAN or WLAN, for example,” he says.


How wearables and mobile health tech are reshaping clinical trials
The average cost of bringing a drug from development to FDA approval is over $2.5 billion, according to a recent study by The Tufts Center for the Study of Drug Development. This figure includes costs for the drugs that don’t make it through to the approval phase, and the Tufts Center notes that higher drug failure rates contribute significantly to increases in R&D costs. But there’s a big opportunity here: If life science companies can get enough insight early in development, they can create a more efficient drug development process and prioritize resources for the most promising therapies. Big data analytics and new clinical technology — such as mobile health solutions and wearable devices — promise to significantly change how trials are conducted and increase the value of the data and insights that come out of these trials.


Hollywood movies vs. the real future of AI
AI is a supremely complex technology to understand, let alone create, and oftentimes Hollywood blockbusters stretch the technology's limitations to fit some desired scenario. In other words, the AI popularized and propagated by Hollywood seldom reflects the direction the technology is actually headed. "AI is nowhere near able to take over the world in the next few years," said Charlie Ortiz, senior principal manager of the Artificial Intelligence and Reasoning Group within Nuance's Natural Language and AI Laboratory. "And given the distance to that point, there are lots of other futures that could evolve. It could very well evolve into something that is more helpful and collaborative and could teach us if necessary."


Designing an Impediment Removal Process for Your Organization
Instead of trying to find and eliminate waste as a means of improving efficiency, I find it more natural to focus on the flow of work as a means of improving effectiveness. From that perspective, two questions become central. The first questions is “how does work flow through our system”? It can be very revealing for people to see the end-to-end picture of how work flows through the entire system, and not just their nominal area of functional responsibility. Managers and leaders from across the organization need to work together to create this picture. The second question is “what impedes the flow of work through the system”? Or, asked a different way, “what opportunities exist to improve the flow of work through the system?”


John Zachman on gaining synergies among the major EA frameworks
Friends of mine wanted me to change the name of this to Zachman Ontology, because if you recognize this, this is not a methodology; this is an ontology. This does not say anything about how you do Enterprise Architecture—top-down, bottom-up, left to right, right to left, where it starts. It says nothing about how you create it. This just says this is a total set of descriptive representations that are relevant for describing a complex object. ... A framework is a structure. A structure defines something. In contrast, a methodology is a process, a process to transform something. And a structure is not a process, and a process is not a structure. You have two different things going on here.



Quote for the day:

"If you genuinely want something, don't wait for it--teach yourself to be impatient." -- Gurbaksh Chahal

April 17, 2015

Cyber extortion: A growth industry
Jody Westby, CEO of Global Cyber Risk, also said in her experience, cyber extortionists have kept their side of the deal. She said for most of her clients, it comes down to a business decision. “I have seen IT guys say, ‘No way, we aren't negotiating or paying a dime,’” she said. “But then the CFO or another C-suite executive gets involved, evaluates the amount of money requested, and says it is a no-brainer: They are going to pay and keep the business running. It would cost more to have the system down.” Of course, not all extortionists are so “honorable”. According to Saengphaibul, “if you look hard enough, you’ll find numerous victims experiences showing hackers not upholding their end of the deal by not unlocking computers after ransom is paid.”


How To Build Better Products by Building Stronger Teams
So what is “great culture?” Too often, the visible trappings of culture -- free food, free drinks, yoga classes, Aeron chairs, video games, office Nerf guns -- are equated with culture, but this is a mistake. Yes, a lot of companies, especially in the technology business, are offering these things,, and they are great, but they have nothing to do with culture. Culture is how we talk, work, organize, win, and lose together. It is not something that you can pinpoint, but that leads to happier, more productive employees. All the free food and office perks in the world are useless if people feel afraid of failure, trapped in a rigid hierarchy, or that their employer values profits over people.


How one company is using artificial intelligence to develop a cure for cancer
Thanks to partnerships formed with universities, hospitals, and even the U.S. Department of Defense, Berg and its supercomputers have been able to analyze thousands of patient records and tissue samples to find possible new drug targets and biomarkers. All this data crunching has led to the development of Berg’s first drug, BPM 31510, which is in clinical trials. The drug acts by essentially reprogramming the metabolism of cancer cells, re-teaching them to undergo apoptosis, or cell death. In doing so, the cancer cells die off naturally, without the need for harmful and expensive chemotherapy.


Big data is easier than ever with Google Cloud Dataflow
Big data applications can provide extremely valuable insights, but extracting that value often demands high overhead – including significant deployment, tuning, and operational effort – diverse systems, and programming models. As a result, work other than the actual programming and data analysis dominates the time needed to build and maintain a big data application. The industry has come to accept these pains and inefficiencies as an unavoidable cost of doing business. We believe you deserve better. In Google’s systems infrastructure team, we’ve been tackling challenging big data problems for more than a decade and are well aware of the difference that simple yet powerful data processing tools make. We have translated our experience from MapReduce, FlumeJava, and MillWheel into a single product, Google Cloud Dataflow.


What's the real key to building a great tech team?
"Successful IT management is all about the people," he says, suggesting CIOs must understand the motivations of individuals both inside and outside the workplace. "I personally spend fifteen minutes with everyone that's about to join the organisation - and that's before we make an offer. Whether it's a help desk employee or an infrastructure director, it's crucial that I understand what they're like as an individual and what their interests are, and not just what they're like in a workplace," he says. Harley says his checks help ensure the HR team have explained to candidates the nature of the role and the likely pressures. "We're a very driven organisation and we're very busy. So, I reinforce that message. I want people to be resilient. People need to be a good fit culturally," he says.


IT's cloud security concerns do not correlate to actual failures
But in reality, cloud security is much different than what these surveys indicate. Indeed, the larger cloud service providers are doing a good job. Because cloud computing is still a fairly new technology, the providers use current approaches and mechanisms, such as identity-based security and advanced encryption for data at rest and in flight -- mechanisms many enterprises don't use internally. I suspect that most of the worries are driven by the natural fear that comes from not having direct control over your systems and data. To adopt the cloud, you must put your trust in other organizations. The cloud providers perhaps have not done a great job of explaining their true competence when it comes to security.


Why businesses need self-service business intelligence
Self-service business intelligence is not just for business leaders. Rather than limit access to data to senior management, organisations are finding it is crucial to properly equip all employees with intelligence they can act on. This is particularly so for small to medium sized businesses, where investing in larger enterprise level solutions that require multiple resources may not be a viable option. For small companies where employees wear many hats, to the largest of enterprises, it’s about making data analytics fit simply into the day-to-day. Rather than data belonging to IT, it’s about real people in business, who understand the topic and the environment, using data to get insight that’s actionable, and will positively impact their bottom line.


Business Rewritten By IT: A Mass Requirement for Automation
The disruptive impact that IT has had on almost every business can be traced back to its ability to deliver on those principles – efficiency, agility, better products. IT-led businesses must be agile in order to disrupt slow-moving market leaders and take advantage of the business opportunity differentiation offers. Technology-driven startups have to be efficient so they can battle with the balance sheets of the Fortune 500. (These balance sheets and huge investments often are in parallel to lethargy in reacting to the changing business landscape). IT-driven companies must be able to deliver ultimately better solutions to spark such dramatic market change in a relatively short period of time, and to drive businesses to incorporate IT into their offerings and infrastructures.


Big Data Processing with Apache Spark - Part 2: Spark SQL
Spark SQL, part of Apache Spark big data framework, is used for structured data processing and allows running SQL like queries on Spark data. We can perform ETL on the data from different formats like JSON, Parquet, Database) and then run ad-hoc querying. In this second installment of the article series, we'll look at the Spark SQL library, how it can be used for executing SQL queries against the data stored in batch files, JSON data sets, or Hive data stores. Spark 1.3 is the latest version of the big data framework which was released last month. Prior to this version, Spark SQL module has been in an “Alpha” status but now the team has removed that label from the library.



Quote for the day:

"Leading by example yields loyalty, leading by position yields frustration." -- @RichMcCourt

April 16, 2015

5 Factors to Retrospect after Every Sprint while Developing a Product
The essence of agile is to thrive for continuous improvement through empirical process control. True agile teams find ways to improve through experimentation, finding sustainability, and delivering business value earlier. It is a never-ending journey, and a sprint retrospective emerges as an opportunity to further accelerate this improvement process. It is a great time to allocate and analyse extraneous factors in detail, which otherwise may distract the team’s focus. In this post, we highlight 5 factors which every agile team should retrospect after each sprint. Let’s have a look.


Combining SIAM and DevOps for Digital Reimagination
Some of the most important aspects of the SIAM role are the coordination of people, processes, technology and data, and the governance across multiple suppliers, to ensure effective and efficient operations of the end-to-end service delivery to the business user. DevOps and SIAM converge in addressing current business and IT challenges and targeting people and attitude as primary drivers of performance and value. Whilst DevOps addresses the cons of functional specialisation and the spread of responsibilities across different IT teams, SIAM deals with the additional challenge of spreading services across multiple vendors.


Free ebook: Microsoft Azure Essentials: Azure Machine Learning
This ebook will present an overview of modern data science theory and principles, the associated workflow, and then cover some of the more common machine learning algorithms in use today. We will build a variety of predictive analytics models using real world data, evaluate several different machine learning algorithms and modeling strategies, and then deploy the finished models as machine learning web service on Azure within a matter of minutes. The book will also expand on a working Azure Machine Learning predictive model example to explore the types of client and server applications you can create to consume Azure Machine Learning web services.


Lack of skilled infosec pros creates high-risk environments
A portrait of the ideal cybersecurity professional emerges from this list of shortfalls: the top three attributes are a formal education, practical experience and certifications. The study reveals that organizations are experiencing attacks that are largely deliberate, and they lack confidence in the ability of their staff. The top four threat actors exploiting organizations in 2014 were cybercriminals (46 percent), non-malicious insiders (41 percent), hackers (40 percent) and malicious insiders (29 percent). 64 percent are very concerned or concerned about the Internet of Things, and less than half feel their security teams are able to detect and respond to complex incidents.


How The Internet of Things Is a Transformational Opportunity
Internet of Things looks like a massive opportunity over the years ahead, there are already many practical and valuable applications, and everything seems to be indicating that we are just in the first stages of what could be a game-changing series of innovations. However, opportunity attracts competition, and IBM will need to compete against several big players trying to get a piece of the pie. In January 2014 Google invested $3.2 billion in the acquisition of Nest Labs, a leading player in smart thermostats and smoke alarms. This means Google invested more in a single purchase than IBM over the coming four years in its whole Internet of Things initiative.


Will containers kill the virtual machine?
Containers are not a new technology: the earliest iterations of containers have been around in open source Linux code for decades. But in the past year they've captured the hearts and minds of many developers for building and running applications. Containers isolate specific code, applications or processes. Doing so gives whatever is inside the container a neat envelope for managing it, including moving it across various hosts. Whereas you can think of a virtual machine slicing up a server into multiple operating systems, containers run atop the OS so unlike a VM, they don't require an OS to boot up when they're created. In essence they can virtualize an operating system to provide a more lightweight package of an application compared to a VM.


SSL/TLS/HTTPS: Keeping the public uninformed
Perhaps the most important thing to understand about the SSL/TLS/HTTPS system that secures websites is that you are not supposed to understand it. ... If SSL/TLS/HTTPS was reallydesigned for security, this would have been done long ago. But secure websites are security theater. They seem to be secure, techies say they are secure (at least in public), but the system is flawed. That it took so long to expose Superfish was because the system is rigged against normal folks. Jonathan Zdziarski recently made another simple suggestion that, like mine, will never see the light of day. He points out that HTTPS interception, such as Superfish, can be detected if the web browser notices that the last X "secure" websites were all vouched for by the same Certificate Authority.


SEC’s Stein touches all the bases in discussion on data, technology
With a goal of collecting an estimated 58 million records per day, there is little doubt that CAT will require a tremendous amount of industry cooperation. However, Stein pointed out that a proposal that might seem like a regulatory reform wrought with headaches for the industry might eventually simplify the work of compliance professionals. “Only though CAT can we develop regulations that are driven by the facts,” Stein explained. Stein touched on how the Flash Crash and the lengthy investigation that followed highlighted the need for CAT and lamented the slow march to implementation, which remains years away. “We need the CAT as soon as possible,” Stein said.


Infosec taking the strain as threats evolve and skills gap widens
Davis added it may also indicate that information security professionals in Germany have a higher level of top executive support than in the UK and elsewhere in Europe. Despite budgets allowing for more personnel, 62% of respondents reported that their organisations have too few information security professionals – up from 56% in 2013. Frost & Sullivan estimates that the global workforce shortage will widen to 1.5 million in five years, while the variety and sophistication of cyber threats are expected to continue. The situation is exacerbated by the broadening footprint of systems and devices requiring security oversight. Signs of strain, including configuration mistakes and oversights, were identified as a significant concern, and recovery time following system or data compromises was found to be getting steadily longer.


Why CIOs can’t sell enterprise collaboration tools
One of the biggest challenges is determining how to implement enterprise collaboration in cross-functional manner, says John Abel, senior vice president of IT at Hitachi Data Systems, “Teams are pretty good at communicating within their own group but when it comes to integrating across departments silos tend to happen, which ultimately becomes problematic when each team needs to align on certain campaigns or key topics,” he says. NetScout’s CIO and Senior Vice President of Services Ken Boyd says the landscape of collaboration tools available today makes it difficult to pick the best ones for a specific workforce. “Locating a collaboration tools provider that can offer the right balance for the needs of our enterprise users can be a significant challenge,” he says.



Quote for the day:

“...A man can only stumble for so long before he either falls or stands up straight.” -- Brandon Sanderson

April 15, 2015

GoodData analytics developers on what they look for in a big data platform
Far and away, the most exciting is about real-time personalized analytics. This allows GoodData to show a new kind of BI in the cloud. ... It's for telling you about what’s going on in your electric smart meter, that FitBit that you're wearing on your wrist, or even your cell-phone plan or personal finances. A few years ago, Vertica was blazing fast, telling you what a million people are doing right now and looking for patterns in the data, but it wasn’t as fast in telling you about my data. So we've changed that. With this new feature, Live Aggregate Projections, you can actually get blazing fast analytics on discrete data. That discrete data is data about one individual or one device. It could be that a cell phone company wants to do analytics on one particular cell phone tower or one meter.


Security risk potential linked to young, mobile users
The public sector was the least likely to report lost or stolen data, although that does not mean the public sector is not losing data. Attitudes were also lax among people working in high-tech industries, who were more likely than average to give up their device password if asked for it by IT, and in education, where teachers revealed a tendency to write their passwords down on a piece of paper. ... “Corporations have thought about security historically as very much a perimeter solution and put a big firewall at the gateway,” he said. “We’ve been eroding that for a good 10 years as information becomes more fluid, but we have not yet moved away from the idea that security sits only at the perimeter of the network.”


4 data wrangling tasks in R for advanced beginners
With great power comes not only great responsibility, but often great complexity -- and that sure can be the case with R. The open-source R Project for Statistical Computing offers immense capabilities to investigate, manipulate and analyze data. But because of its sometimes complicated syntax, beginners may find it challenging to improve their skills after learning some basics. If you're not even at the stage where you feel comfortable doing rudimentary tasks in R, we recommend you head right over to Computerworld's Beginner's Guide to R. But if you've got some basics down and want to take another step in your R skills development -- or just want to see how to do one of these four tasks in R -- please read on.


Report: Internet of Evil Things is your next nightmare
"Virtually every organization has some sort of rogue wireless access point or printer," Paget said. Worst of all, many companies don't know what devices are on their networks because employees can easily go out and buy them and install them themselves -- or bring them from home as part of corporate Bring Your Own Device programs. Employee-owned devices are a particular concern, Paget added, because there are limits to what a company can do to secure them. Overall, he said, when scanning corporate systems, Pwnie discovered that companies typically had two to three times more devices than they thought they did.


Intel & Ingenico Announce Secure Payment Agreement for the Internet of Things
“This is a great example of how innovation can simplify the purchasing experience and further enhance the merchant-consumer relationship. Bringing secure payment into connected devices will root our payment acceptance expertise in the Internet of Things.” “The shift in liability this October will be a major milestone in the United States for banks and credit card companies, but especially for retailers,” said Doug Davis, senior vice president and general manager, Internet of Things Group, Intel. “Intel and Ingenico Group are working to bridge the retail experience and security gap while also making sure devices are easy to deploy and manage so we don’t create new burdens for the merchants.”


Navigating An Internet of Things Legal Minefield
This article explores how big data and the rights of data subjects can coexist. With the help of Amor Esteban, an attorney who helps companies navigate these murky and often dangerous waters, we explore the balance that may be struck between a company’s legitimate business interests and respect for the individual’s right to data privacy. ... He currently chairs that group and is editor in chief of its The Sedona Conference International Principles on Discovery, Disclosure & Data Protection: Best Practices, Recommendations & Principles for Addressing the Preservation & Discovery of Protected Data in U.S. Litigation. Together we will delve a little deeper into the development of IoT, the role of analytics in a complex IoT environment and what companies should be considering before embarking on a project.


A 21st Century Way of Life: From 20th Century Work-Life Balance to Lifeworking
The reason that organizations have been slow to truly rethink the concept of work-life is due more to cultural inertia than any other factor. The industrial-age assumptions about technology, organization and processes have become deeply ingrained within society, and have been reinforced through general and business education and the media. In most organizations these deeply entrenched assumptions have become orthodoxy, and this is why the question of work-life balance remains. Some enlightened organizations have made progress in some areas, especially with regard to virtual working and flexible working time, but in most cases these initiatives only patch the much deeper underlying problems


Nearly 1 million new malware threats released every day
Directed attacks and data breaches also grew, according to Symantec. Five out of six large companies were targeted by cybercriminals, a 40% rise on the previous year. The mining industry was the world's most targeted sector. Samir Kapuria, a Symantec executive, recalled one case in which hackers snuck into an energy company's computer network and stole a draft report. The report detailed the secret discovery of a potentially lucrative energy drilling spot. Hackers were trying to sell the information on a black market website to stock traders, Kapuria said. But they were foiled when the energy company (operating under a pseudonym) told prospective black market buyers that the information was false. Kapuria declined to mention the name of the company.


Data breaches may cost less than the security to prevent them
In a March 2015 column on The Conversation, Dean provided a hard to disagree with defense of why things security-wise "ain't gonna change" soon. "When we examine the evidence, though, the actual expenses from the recent breaches at Sony, Target and Home Depot amount to less than 1% of each company's annual revenues," wrote Dean. "After reimbursement from insurance and minus tax deductions, the losses are even less." Dean then administered the knockout punch: "This indicates that the financial incentives for companies to invest in greater information security are low and suggests that government intervention might be needed."


The Hybrid IT Enterprise Demands an End to Network Guessing Games
As visibility, control, and optimization are brought to hybrid networks it will become increasingly important to construct an analytics-driven infrastructure that can take action when problems occur anywhere in the network. We’re already seeing more IT organizations instrumenting network architectures with predictive analytics to create self-correcting, self-generating networks that respond to business needs and intents. Well-instrumented infrastructures provide the foundation for introducing automation. Such automation helps infrastructures react to changing demands without requiring manual intervention. Visibility tools can help to discover and map dependencies in application workloads, a necessary element for true workload portability.



Quote for the day:

"Courage is to never let your actions be influenced by your fears." -- Arthur Koestler

April 14, 2015

Enough With the Silos – Connect, Connect, Connect
It was the year that interest in Service-Oriented Architecture (SOA) exploded and began to influence the way developers built software. It was the year that virtual machines took off like a rocket. From a technology perspective, it was a busy year. Before then it usually made sense to drop applications into silos, no matter whether the silo was a cluster of powerful machines or a single server. You could provision enough hardware to ensure reasonable performance, configure the application for backup and recovery, wrap it all up in a bow and dump it in a dark corner of the data center. Windows and Linux both encouraged the silo approach because neither operating system shared resources efficiently between co-residing apps. It had become a one-app-per-server world.


Cloud machine learning wars heat up
Machine learning is the next frontier in Big Data innovation. And the cloud is the next frontier within that frontier. Almost five years ago, Google launched its Prediction API cloud-based machine learning service. This past July, Microsoft launched its Azure Machine Learning (Azure ML) service as a preview, and brought it into general availability in February. That service had (and has) surprisingly good integration with code written in the open source R programming language. ... They also provide APIs for developers to send input variable values and receive a predicted value for the target variable. The attraction of putting this all in the cloud is that any client application can run a prediction by making a single web service call.


Multi Threaded PowerShell Cookbook
I had the idea to try to directly leverage the TPL from within Powershell and effectively tackle the problem in exactly the same way as one would if writing multi threaded code in .NET, e.g., instantiating Task objects, etc. ... My preference was to use the TPL but I quickly found that things didn't quite work. Although we can write .NET code directly from within Powershell, that doesn't mean we should try to follow the same patterns in both. They are both markedly different and at the thread level I found that trying to instantiate and manipulate threads from within a Powershell script was a recipe for disaster. That left me using the System.Management.Automation.Runspace namespace and the results were quite pleasing.


Pivotal sets the stage for open-source in-memory computing
Releasing the code is the first step in Pivotal's plan,formulated earlier this year, to open-source components of the company's Big Data Suite, which includes GemFire. Later this year, the company plans to release the code for its Pivotal Hawq SQL engine for Hadoop and the Pivotal Greenplum Database. Not all of GemFire is being open-sourced. The company is holding back some advanced features for its commercial edition, such as the ability to stage continuous queries and establish wide-area network connectivity between clusters. Those who pay for the commercial edition will also receive enterprise-level support.


Digital Lumens: Why CIOs should 'lean in' to the IoT
The first thing that CIOs need to do is lean forward into IoT. I think in many cases CIOs are watching it happen without their control and management. I think that engenders fear, engenders fear about management of data, engenders fear about products and organization, I'm sure engenders fear about security. ... It's the role of the CIO to lean forward, talk about the security and policy procedures of the company but then say, 'Well, once you have those in our building, how can we help you? How can we think about that data flow? How can we store that reliably for you? What are other integration points?'


Wearable devices - now a reality for the workplace
The primary reasons for wearable devices are to gain access to IT resources without encumbering the user and getting in the way of the task in hand. So many other items of technology involve varying degrees of significant physical commitment - sitting down to use a desktop or laptop, two hands to use a tablet while standing and even cradling a smartphone requires a hand and at least one eye or ear. Something worn on the wrist, accessed by a glance, tap or spoken word not only fits a Dick Tracey wish-list, it also frees up hands, is out of sight and allows the user to be 'footloose'.


Metadata-Driven Design: Designing a Flexible Engine for API Data Retrieval
From plain flat files to structured XML files to the more esoteric ones (like ISO 2709), developers and administrators have been shuffling these files and ingesting their data for decades. There are both advocates and naysayers on the time-honored practice of ingesting data files. Critics point out that data files are not real-time sources of information, and depending on the chosen format, it may require a certain amount of coordination and finesse in order for them to be handled properly. Advocates, on the other hand, would make the argument that data files have been used for decades, and as a result, the accrued cornucopia of libraries and commands for handling them can empower even the untrained novice.


3 best practices for bootstrapping an open source business
That open source startups are hard to find in the investment-first ecosystem is not surprising, because they're usually started by people who actually build the product. Most of the time, seeking early stage investment for an open source product doesn't make financial sense. On the other hand, there's much to be gained from the business and marketing knowledge in local startup communities, so being sequestered from them can put open source developers at a disadvantage. If you're bootstrapping your open source company, here are three tips to help you prepare for that ultimate transition from development project to fully fledged business.


IBM Creates Watson Health to Analyze Medical Data
The Watson Health announcement is also the latest in flurry of initiatives IBM has announced this year that include new corporate partnerships as well as moves in cloud computing, data analytics and Watson. They are evidence that IBM is intent on investing for future growth, and showing it is doing so, in a year when its financial performance is likely to lag. IBM has reported disappointing earnings recently, and Virginia M. Rometty, IBM’s chief executive, has told industry analysts and investors that 2015 would be a transition year in which new growth businesses like Watson did not yet overcome the profit erosion in some of its traditional hardware and software products.


Government IT over the last five years – the good, the bad and the digital
“The landscape has changed significantly under the Government Digital Service. GDS has had a significant impact, and what’s happened which has been good is the dynamic and disruptive leadership shown by GDS in tech and digital and IT,” said Adam Thilthorpe, director of professionalism at BCS, the Chartered Institute for IT. “Some of the things they’ve done have had real impact on people’s lives and have made things better. Some of the things that they’ve done would actually be a great lesson to be listened to in the private sector.”



Quote for the day:

"It is always safe to assume, not that the old way is wrong, but that there may be a better way." -- Henry F Harrower