September 16, 2015

Invisible revolution: How wearables are quietly invading the enterprise

The study, The State of Enterprise Wearable Adoption, focused on the IT or business decision makers in 201 companies with 500 to more than 5,000 employees, and from a range of industries. The industrial enterprise sector was the focus of the study, with government, non-profit, education, professional services, media, hospitality, health care and financial services industries excluded since those areas do not have a direct use for wearables relevant to the study. The 93% of companies interested in wearables are split across almost every industry included, with manufacturing and life sciences "very big" and transportation and retail smaller than anticipated, Ballard said.


5 Ways Big Data Is Making a Splash in the Insurance Industry

Leveraging Big Data insights is well known for its ability to provide quality prospects for businesses, but another lesser known feature is its ability to shed light on low quality prospects or frustrated clients. Advanced analytics tools allow insurers to target individuals who are apt to be a long term loyal customer, and also to weed out individuals who are a high risk of canceling coverage. Predictive analytics is used to track and reveal signal behaviors that indicate an impending cancellation. This allows insurance agents to reach out to unhappy consumers before their final decision has been made, and tailor opportunities to encourage them to stay with the company.


What's New in iOS 9: New SDK Frameworks

Although the new SDK does not introduce as many new or enhanced features as iOS 8, which included more than 4,000 new APIs, it does still provide a wealth of new functionality and enhancements. Along with the new SDK, iOS 9 is also marked by new developer tools to support some of its features, and new releases of Apple’s major programming languages, Swift and Objective-C. This series aims at introducing all that is essential for developers to know about building apps for the latest release of Apple’s mobile OS. It comprises five articles that will cover what’s new in iOS 9 SDK, new features in Swift, Objective-C, and developer tools, and Apple’s new bitcode.


The science of organizational transformations

The latest findings suggest that investing time and effort up front to design a transformation’s initiatives also matters. According to the new results, the most effective initiatives involve four key actions: role modeling, fostering understanding and conviction, reinforcing changes through formal mechanisms, and developing talent and skills. These actions are critical to shifting mind-sets and behaviors. But it’s not enough to design a portfolio of initiatives based on one, or even two, of these actions. When executives report that their companies used all four, the odds of a successful transformation are much higher than if just one were used. The process of howinitiatives are designed is critical too.


High-Potential Employees: 3 Ways to Get More From Your HIPO Program

CEB data show that HIPOs produce 91% more valuable work for the company and exert 21% more effort than non-HIPOs. Managers are right to worry about identifying them (only 1-in-7 high performing employees classify as HIPOs) and to worry twice as much about keeping hold of them, and developing them so that all that glittering potential is realized. And it’s not only their managers. A full 50% of HR professionals worry about their company’s HIPO program (the initiatives in place to identify, retain, and develop HIPOs). HR teams ask questions like, “My high-potential program is expensive – am I investing in the right people?”, “How should we prepare our HIPOs to take on more challenging senior roles in the future?” and, “Why is my high-potential program not working? People we thought of as high-potential are failing when placed into more senior roles.”


Cisco router break-ins bypass cyber defenses

Routers are attractive to hackers because they operate outside the perimeter of firewalls, anti-virus, behavioral detection software and other security tools that organizations use to safeguard data traffic. Until now, they were considered vulnerable to sustained denial-of-service attacks using barrages of millions of packets of data, but not outright takeover. "If you own (seize control of) the router, you own the data of all the companies and government organizations that sit behind that router," FireEye Chief Executive Dave DeWalt told Reuters of his company's discovery. "This is the ultimate spying tool, the ultimate corporate espionage tool, the ultimate cybercrime tool," DeWalt said.


Deception May Be the Best Way to Catch Cybercriminals

"You could do things like emulate an Apache server and make it look like Apache is running somewhere when it isn't," Pingree said. "Or you could run a real copy of Apache that's monitored." As soon as an attacker sends data to the honeypot, it issues an alert. The attacker will most likely start rummaging around, performing passive scans of hosts on the network. The beauty of a honeypot is, legitimate users know it is fake. So the only people accessing it are cybercriminals and hackers, meaning there are no false positives, there is no need to filter out the noise that occurs in most fraud-detection systems. "The biggest problem with security-transaction monitoring is you have to filter out what's good and what's bad," Pingree said. "But if it's a decoy, everyone that's hitting it is bad."


What’s Wrong with the Mainframe?

Despite its technical and economic superiority to distributed platforms, a surprising number of industry voices still contextualize the mainframe as a “legacy” platform from which enterprises need to migrate their core applications if they are to succeed in the digital economy. This makes no sense. First of all, why would any organization migrate its most critical applications from a supremely reliable, secure, scalable and secure platform to a relatively risky and expensive one? And why would any CIO allocate limited resources to a low- or negative-ROI migration project when so many other urgent imperatives clamor for his or her limited IT resources? The answer is that there is no reason. That’s why analysts like Gartner are reporting minimal migration activity—and why 88% of CIOs assert that their mainframes will run existing and even net new workloads for at least another decade.


Customer engagement takes a step forward with Microsoft Dynamics CRM 2016

For many of us, the concepts of customer engagement and customer resource management (CRM) are murky at best. We understand the general idea, and we appreciate the results when customers are happy and buying, but the mechanics of how those sales are accomplished are lost to us. And, for the most part, that is okay, because we don't really need to know how it all comes together. However, if you're a salesperson, the tools provided by applications like Microsoft Dynamics CRM are vital to your success. Without those tools, sales are not made, revenues are not realized, commissions are not calculated, and people don't earn a living. With that being said, for an enterprise of any size operating in today's highly competitive environment, a well-designed CRM solution is required for any sort of success.


Where’s The Money in Data? (Part I)

All data monetization efforts require that data is ultimately used to drive actions or decisions that solve a problem for an end consumer. This fundamental requirement is where most businesses fail when attempting to monetize data because the typical approach is “How can we sell data to increase our revenues?” which assumes that the value is the sale of the data itself. In order to successfully monetize data, organizations must flip this approach and start with the end in mind. The questions should be “What problem can our data solve?” and “How valuable would it be to the end consumer if these problems were solved?” It is important to note that “end consumer” does not always mean customer either. Monetized data solutions can be for internal end consumers as well.



Quote for the day:

"Cream always rises to the top...so do good leaders" -- John Paul Warren

September 15, 2015

Enterprise data architecture strategy and the big data lake

Data virtualization's use of defined semantic models to represent a converged view of original sources addresses both of the issues with accessing data in a data lake. Federating access to data in a data lake eliminates the need for users to rewrite their applications to include code to read the data from the data lake, reducing the need for data replication. Existing applications can target the semantic model, making the source of the data transparent to the consuming application. At the same time, data virtualization hides the complexity of schema-on-read by allowing each user to apply specific data normalization and transformation rules to the data to produce the "renderings" that are suited for each application use.


The new art of war: How trolls, hackers and spies are rewriting the rules of conflict

To put it another way: cyberwarfare models are maturing in the same way that other technologies mature. To take a more prosaic example, the evolution of cyberwarfare is a lot like the cycle e-commerce went through. There was a lot of initial excitement and investment from retailers in building separate e-commerce operations or businesses, but gradually these became not just a standard part of their operation but for many retailers the core of their business, just as cyberwarfare planning and strategy is gradually becoming a part of mainstream military planning. However that doesn't mean that all countries are taking the same approach to strategy or that they even agree on what should be included in the term cyberwarfare.


First Detailed Public Map of U.S. Internet Backbone Could Make It Stronger

Knowing the exact location of the most important Internet cables should help efforts to understand the possible effects of natural disasters or intentional attacks on the Internet, for example. Barford says he is also talking with researchers and people at telecommunications companies about the idea of adding extra fiber links that would be shared by different companies. They’d be located at key points where new fiber between major population centers could significantly improve the resilience and efficiency of the Internet. Although the Internet is publicly accessible, it is woven together from many privately owned networks that interoperate. Telecommunications companies sometimes show schematics of their core networks, but without much geographic detail.


How new data-collection technology might change office culture

The obvious fear for many employees is that data collected would not be anonymous and, instead, could be used for hiring, firing and promotion considerations. The growing market for these types of tools is sure to spawn imitators who might not uphold the same privacy safeguards. Privacy advocates shuddered when a software developer recently boasted that it would be possible for employers to peek into the emails and messages sent through Microsoft's Lync messaging system. "You can become your own mini-NSA," David Tucker, CEO of Australian-based Event Zero, told Network World. Managers could see which employees are dating and which ones are seeking out their next job. "Just make sure it doesn't end up on WikiLeaks," he advised.


Case study: Philips takes agile approach to building bridges between business and IT

“Over a longer period, it’s easier to miss a few edges. The financial impact is also much greater as you need a lot of management to keep everything on track in a six- to nine-month project,” says van Zoelen. “The amount of code we throw away is limited so we save money. I would almost say everything we do now is focused on delivering the most value possible.” For this reason, and since throwing its weight behind agile in 2011, the company claims to have made savings in the region of €47m as project lead times have fallen from 54 business days to 20. Over this same period of time, the number of teams involved has also grown from seven to 120. Within the teams are high levels of engagement and – because everyone is clear about what they should be doing – the working environment is largely positive, says van Zoelen.


RoboEthics – We Need Universal Robot Rights, Ethics And Legislation

Is it ok to torture or murder a robot? We form such strong emotional bonds with machines that people can’t be cruel to them even though they know they are not alive. So should robots have rights? Mistreating certain kinds of robots could soon become unacceptable in the eyes of society. In what circumstance would it be OK to torture or murder a robot? And what would it take to make you think twice before being cruel to a machine? ... There is a new emerging technology called quantitative legal prediction. It turns out that experienced lawyers often add a lot of value by making predictions. Using big data, complex analytics, robots will be best at “predicting” if you’re going to win a case, or that the case will be overturned on appeal, for example.


Can training transform CISOs into business leaders?

“If you look at other C-suite roles – CEO, CFO, CMO – these have been established for decades, creating defined paths to success. The CISO has been around for roughly 10 to 15 years, but it didn’t come to prominence until the last few years, and then as a technical role.” And technical skills, he added, while key to the “functional” success of a CISO, “do not lend themselves well to the business acumen and communication skills needed to work with your typical C-suite today. The main shift needed is towards thinking in terms of risk, not technology, and how this risk relates to various aspects of the business.” Christiansen agrees, to the point that he said the job is getting a different title. “The role of the CISO is evolving to the chief information risk officer (CIRO),” he said.


Don't underestimate the network's importance in manufacturing analytics and IoT

The practice on manufacturing floors was to leave choices about networking topology and machine-to-machine (M2M) interconnections to vendors, but as this dialogue moves into internal ERP and other higher-level office systems that support analytics and dashboards, corporate IT will be involved. There are two flavors of Internet of Things (IoT) communications in manufacturing environments: an IP-based network that is hard-wired and that interconnects machines on the floor with the ability to move information to the internet; and a more localized communications scheme where devices in immediate proximity to each other communicate through wireless technology like Bluetooth or over wired Ethernet.



Why Agile Didn’t Work

On the top is the lofty goal of “satisfying customers by satisfying their constant changing requirements”. We achieve this goal by “delivering working software frequently”. To deliver working software, though, requires significant technical and managerial support. Ensuring that changing requirements do not break the system and slow down development is foremost a technical issue: how to design the system in a way that is flexible and how to create automation that ensures changes do not break things. To foster advanced technical skills in teams, teams have to be motivated to learn from their mistakes and to develop themselves.



Shadow IT risks heightened in hybrid cloud

Shadow IT risks are heightened when combined with hybrid cloud. Most companies have data security and compliance practices to protect not only their own information, but that of their customers and suppliers. These practices and policies assume that data is contained within a controlled environment. But if users create a hybrid cloud workflow that connects shadow IT software as a service (SaaS) applications to highly structured applications, they can violate security and governance requirements – a risk known as bandit hybridization. The dangers of bandit hybridization are growing for two reasons. First, SaaS adoption is increasing, and line departments can easily adopt SaaS applications without IT support.



Quote for the day:

"Nothing so conclusively proves a man's ability to lead others as what he does from day to day to lead himself." -- Thomas J. Watson

September 14, 2015

Getting started with open source machine learning

Common machine learning tasks include classification (applying labels to items), clustering (grouping items automatically), and topic detection. It is also commonly used in natural language processing. Machine learning is increasingly being used in a wide variety of use cases, including content recommendation, fraud detection, image analysis and ecommerce. It is useful across many industries and most popular programming languages have at least one open source library implementing common ML techniques. Reflecting the broader push in software towards open source, there are now many vibrant machine learning projects available to experiment with as well as a plethora of books, articles, tutorials, and videos to get you up to speed.


Don't get too excited about superfast 5G wireless yet

It's a bit of rerun from the last advent of new wireless technology. In 2008, Verizon was the first in the US to lead the charge to the variant of 4G technology called Long-Term Evolution, or LTE, and it launched its service to consumers two years later. At the time, AT&T also downplayed the immediate benefits of 4G, noting that early devices would be clunky and would quickly run through their batteries. Eventually, the move to 4G LTE by both Verizon and AT&T helped drive a jump in mobility, ushering in the rise of sophisticated smartphones and mobile programs and services that are now integral to our lives. The hope is that 5G, which will bring speeds that are higher than what Google Fiber offers through a superfast landline connection, will usher in a new revolution.


APIs Are The New FTEs

Imagine the power of tools such as Bubble. While their tagline, “build your startup by pointing and clicking,” might not be applicable to everyone today, I strongly believe that within 10 years we will see at least one unicorn built without writing a single line of code. APIs are truly democratizing startup creation. Not only will you practically need no money to get started, you won’t need any tech skills either. All you will need is a keen understanding of the user and how to take your product to market. Of course, this has major implications in terms of pace of product development, and the consequent noise in the market, but net-net it’s great for consumers. Anyone with a great idea anywhere in the world can build a billion-dollar tech company. That’s exciting!


The Value of Storage Management

We’ll learn more about how HTC lowers total storage utilization cost while bringing in a common management view to improve problem resolution, automate resources allocation, and more fully gain compliance -- as well as set the stage for broader virtualization and business continuity benefits. ... From a performance standpoint, our former primary storage platform was not great at telling us how close we were to the edge of our performance capabilities. We never knew exactly what was going to cause a problem or the unpredictability of virtual workloads in particular. We never knew where we were going to have issues. Being able to see into that has allowed us to prevent help desk cost for slow services, for problems that maybe we didn’t even know were going on initially.


A Video-Game Algorithm to Solve Online Abuse

To truly curb abuse, Riot designed punishments and disincentives to persuade players to modify their behavior. For example, it may limit chat resources for players who behave abusively, or require players to complete unranked games without incident before being able to play top-ranked games. The company also rewards respectful players with positive reinforcement. Lin firmly believes that the lessons he and his team have learned from their work have broader significance. “One of the crucial insights from the research is that toxic behavior doesn’t necessarily come from terrible people; it comes from regular people having a bad day,” says Justin Reich, a research scientist from Harvard’s Berkman Center, who has been studying Riot’s work.


The ‘missing link’: Do your processes support strategy?

It is easy to be drawn into an illusion that all organisations in a particular industry or sub-sector must have identical processes. If we were to examine the airline industry, for example, it is likely that all airlines will have processes enabling tickets to be booked, passengers to be boarded, aircraft to be cleaned ready for their next flight and so on. Yet whilst all airlines might have these processes, the activities, goals and measures each airline deem relevant may differ substantially. ... It is crucial that we have an understanding of our organization’s mission, vision, objectives and strategy before and during our process design or improvement initiatives. If we don’t, we risk designing a process that is out of kilter with the organization’s aspirations.


5 reasons why Lego-like modular PCs aren't as exciting as they seem

Companies like Acer, which recently announced its Revo modular computer, promise to make PC component upgrades as easy as snapping together a few Lego bricks. The idea is that anyone should be able to customize their own desktop rig without the usual tangle of wires, finicky connectors, and exposed circuit boards. You may recall Razer making similar promises a couple years ago with Project Christine, a modular PC that didn’t get beyond the concept stage. And of course there’s the recently released Micro Lego Computer and its accessories, all of which literally look like Lego blocks. While these announcements always elicit oohs and aahs from the tech press, in reality they just don’t make a lot of sense. Without a concerted, industry-wide effort to make the modular PC a reality, you’d be wise to steer clear of the concept.


How to Make Your Data Center PUE Calculation More Accurate

While PUE has become the de facto metric for measuring infrastructure efficiency, data center managers must clarify three things before embarking on their measurement strategy: There must be agreement on exactly what devices constitute IT loads, what devices constitute physical infrastructure, and what devices should be excluded from the measurement. Since most data center operators who attempt to determine PUE will encounter one or more of the above problems, a standard way to deal with them should be defined. The three-pronged approach outlined below can be used to effectively determine PUE. This methodology defines a standard approach for collecting data and drawing insight from data centers.


Design Thinking

Empathizing is not easy. It should wreck you! It should shake you to the core. And it has done just that to me–to my life. I am so grateful for the people who I have met, who have shared their struggles, because I have learned so much from them. It has strengthened and enlightened me–my entire life–and it started with my own mother. My mother had a heart of gold and would give the very shirt off of her back, but also the shirt off of my back, my brother’s back, and my dad’s back. Though she used to tell us, “We will not give a hand out, but a helping hand.” (I can attest she gave more than a hand!) How I miss so much of that wisdom today. My mother gave her life helping others and building them up to succeed. And, through her example of selflessness and generosity, I have learned how to be a leader, a father, and a friend.


Behind American Express’ Machine Learning Effort

We use machine learning to identify potential fraud concerns whenever an American Express Card is used anywhere in the world. Our machine learning models help to protect $1 trillion in charge volume every year. Making the decision in less than 2 milliseconds, it allows us to approve charges at the point of sale, with the least amount of disruption to our customers. The point-of-sale decisions we make using machine learning in turn automatically trigger fraud alerts to our Card Members through instant emails, text messages and smart phone notifications. Card Members are able to verify charges through these channels very quickly, allowing them to continue with their transaction without further disruption.



Quote for the day:

"You can't let praise or criticism get to you. It's a weakness to get caught up in either one." -- John Wooden

September 13, 2015

The Challenges And Benefits Of Robotics In The Next 5 Years

Much to the disappointment of science fiction writers everywhere—and contrary to the anxieties of Elon Musk and Stephen Hawking—Tappeiner insists that robots will not be taking over the world anytime soon. “Definitely not in the next five years,” Tappeiner says. “Probably not in the next 50 years.” ... Even though robotics and automation in military research has helped to animate the spectre of killer robots, Tappeiner argues that robots will continue to serve humans for the near future, largely because current AI techniques still fall far short of the capabilities of the human brain. While machine learning excels at specific tasks like translation (Google Translate, for example, uses a technique called statistical machine translation), that intelligence is not easy to generalise.


Open Rest

One of the features of Spring Data Rest is exporting query methods as RESTful endpoints. That is awesome for simple cases eg. to supply your API with an endpoint to filter users by their username, you just have to write one line of code. Unfortunately those query methods are indivisible and cannot be combined with each other. That implies, that developers solving some complex cases, like queries with optional parameters, have to either write multiple query methods or write a custom method and export it with a controller. ... Second feature, that OpenRest comes with is Data Transfer Objects for POST, PUT and PATCH requests. Since Spring Data Rest is a great piece of code, one of my main principles while writing OpenRest was change as little as possible, and let users to switch it off and use basic features of Spring Data Rest when needed.


Developing Advanced Talent Analytics: Why It Matters to CFOs

Developing a talent analytics program should start with identifying the top business challenges HR needs to address. As CFOs typically have a view across the organization, they can provide a perspective on what the business needs from HR and where to focus efforts. That information will help determine the data HR will need to collect and analyze. For example, if the challenge is to improve the leadership pipeline at the business units, what are the metrics that the business needs to make decisions around leadership? Another foundational element is the quality of the data. If you go in to an advanced analytics project with inconsistent or poor-quality data, the HR group will quickly lose credibility with stakeholders.


How Wearables, Analytics and the IoT Will Redefine the Enterprise of 2020

New technology like wearable computing, mobile apps, the Internet-of-Things (IoT) and data analytics are beginning to influence all aspects of our lives. As a consumer, it can feel like your applications are always a step ahead of you. Use navigation app Waze at a certain time of day, and it knows you are heading from the office to home, pre-populating the route. This pervasive connectivity, and abundance of information about users, places, and things play a pivotal role in creating highly contextual and efficient experiences. In the case of smart apps, the experience begins 30 secondsbefore the user taps it — it knows what the user is looking for before they do.


Why NASA Wants Microsoft’s HoloLens in Space

Norris, who is also the leader of the Ops Lab at JPL, says NASA is also working on other applications for HoloLens, like using augmented reality for inventory management. Apparently keeping track of where things are and how to find them is a big challenge on the space station, even though objects have bar codes on them and are organized with a database. NASA has prototyped an app that can be used to recognize an object and show the HoloLens wearer a path to follow that leads to where the object should be stored, Norris says. In the meantime, to get some sense of what it will be like to use HoloLens on the space station, NASA experimented with HoloLens at the Aquarius underwater research station off the coast of Key Largo, Florida, in late July and early August.


Cyber-security Trouble shooting

Attributing digital attacks is said to be getting easier. But it is necessarily harder than in the real, “kinetic” world. So is deciding on the scale and direction of any retaliation. Arms control is all but impossible: digital weapons have to be secret to be effective. Though officials are cagey about the details, they believe they have detected Chinese and other hackers snooping on (and perhaps interfering in other ways with) computers and networks which run important infrastructure. Efforts to strengthen the systems involved are under way; the creaky power grid is a particular worry. Working out who is ahead is hard. America is doubtless making similar efforts on infrastructure networks in Russia and China—which may be in some ways more vulnerable to attack.


Unleash the power of razor template

To be able to perform true unit testing we need to isolate mvc features from rendering the view, which means no authorization, no model binding, no request validation, no filter actions, no method selectors, and no action invocation. You should only need to specify specify the view content, the view model, view data, temp data, bundles, etc... and a controller context because razor happens to need one to expose UrlHelper and HtmlHelper. So why not use Razor Engine or similar? simply because Razor Engine has a distinct application where MVC features are not needed, ie. Razor Engine does not support the view '~/Views/Home/Index.cshtml' from the default ASP.NET MVC project template, but if you need full support of razor features then we need something else, that is where Xania.AspNet.Simulator comes into play.


Agile Fluency and Let's Code Javascript

With the fluency model, it is not really the case. What you have is four different stops on a journey and any one of those stops can be right for any team, depending on what they need and what their organization needs. Figuring out exactly what fluency your team has, takes some experience. We have distilled down four core metrics – they are not sufficient conditions, but if you do not have these capabilities, then you are probably not fluent. So, for a one star teams, the teams that are focused on value which means talking in terms of business value. So, if you have a team and they are not talking in terms of business value, they are not showing progress in terms of business value, they are not giving their business partners the chance to change direction, change the order of stories, for example,


The Future of VMware? Experts Opine

Whether VMware will remain relevant as IT migrates to the cloud is “a really interesting question,” Miniman said. “First of all, this shift to cloud is a long term thing. We’re talking one of these ten-year swings. Wikibon’s latest research on it is, in ten years, it’s a third of the enterprise spend.” There’s time to adapt. VMware is “doing a great job of trying to make things more efficient, and they listen to their customers,” he said. He pointed to the company’s progress with VSAN and NSX. “However, I worry about VMware ignoring the impact of AWS and Azure." Initiatives like Pivotal’s Cloud Foundry (a well-funded offshoot developed by VMware) are promising, he said. “But I feel like they’re kind of trying to run out the clock on some stuff they’re doing, and not pushing as aggressively in some of the new technologies as fast.


Perceptions of Time in EA Teams

Some enterprises will be predominantly at one extreme or the other. Based on the research, there is a likely expectation that EA teams in Japan, the US, and some Western European countries — such as Switzerland, Ireland, Germany, Italy, England, Sweden, Austria, and the Netherlands — will produce results comparatively quickly. EA teams in other countries with slower-paced cultures, such as most Mediterranean and Arab countries, are more likely to work at a comparatively gentle or slow pace. The key point is that pace is relative — it is likely to be comparatively fast or comparatively slow, but there will always be some EA environments with a mixture of both fast and slow, and some that fluctuate between the two extremes.



Quote for the day:

“Everyone is gifted, but some people never open their package.” -- Wolfgang Riebe

September 12, 2015

Baidu’s Duer Joins the Virtual Assistant Party

Duer’s success will depend on how well it can parse naturally spoken language. This is notoriously difficult, although researchers have been making significant progress in recent years in both speech recognition and, to a lesser degree, natural language processing thanks to a powerful machine-learning technique known as deep learning. Companies such as Facebook see natural language as a key challenge for mining information and communicating with users. According to Baidu, Duer will mine meaning from written information on the Web. Baidu will collect information about a restaurant, for example, and Duer will infer whether it is pet-friendly or has outdoor seating.


Aggressive Android ransomware spreading in the USA

After a successful installation, the malware tries to obtain Device Administrator privileges. This trick is being used by Android malware authors more and more, as it makes it more difficult to remove the infection. Earlier versions of this Android/Locker family do this in just the same way as all other Android Trojans – they rely on the user willingly activating the elevated privileges. In the latest versions, however, the Trojan obtains Device Administrator rights much more covertly. The activation window is overlaid with the Trojan’s malicious window pretending to be an “Update patch installation”. As the victims click through this innocuous-looking installation they also unknowingly activate the Device Administrator privileges in the hidden underlying window.


Think your meeting's important? 25 years ago, this one spawned Wi-Fi

Most important, for anyone today who wants to buy an inexpensive Wi-Fi router and connect almost any portable device to it, NCR decided from the beginning that its WLAN technology should become an industry standard. The group that would develop that standard, called IEEE 802.11, first met 25 years ago Thursday.  ... Out of that initial impulse grew one of the most successful examples of open standards in action. Wi-Fi, which got its name from the industry group that certifies 802.11 products for interoperability, has gone into more than 10 billion devices and is used in home and business networks and public hotspots around the world. Even many mobile operators with their own licensed frequencies rely on Wi-Fi to better serve subscribers.


Peter Thiel Explains Biotech Investing Rationale: Get Rid of Randomness

The question is, can you change those probabilities into different numbers? The reason we invested in Stemcentrx at a valuation that would have been higher than many other biotechs we looked at is that we felt the whole company was designed to get these probabilities as close to one as possible at every step, to get rid of as much of this randomness or contingency as possible. That is something that we found deeply reassuring. One of the very unusual things they do is graft human cancer into the mice. It’s a somewhat more expensive way to do this than studying cancer in cell culture. It’s a somewhat harder structure to build. But drugs tested this way are much more likely to work in humans.


Machine Learning and Its Impact on Cyber-Security

First, the collection and storage of large volumes of data has been steadily adopted as a best practice, particularly in financial services and defense industries. However, a typical challenge faced by these organizations is the approach and tooling required to sort, mine and interpret the insights and patterns from the aggregated data. Secondly, the talent pool to deal with these tasks has been continually on the decline. This leaves opportunities for things to fall through the proverbial crack and cause security incidents to increase. These two points are illustrations of why machine learning can improve the security posture of an organization.


How to Balance the Five Analytic Dimensions

So many data scientists select an analytic technique in hopes of achieving a magical solution, but in the end, the solution simply may not even be possible due to other limiting factors. It is important for organizations working with analytic capabilities to understand the various constraints of implementation most real-world applications will encounter. When developing a solution one has to consider: data complexity, speed, analytic complexity, accuracy & precision, and data size. Data Scientists, nor the organizations they work for, will be able to be the best in each category simultaneously; however, it will prove necessary to understand the trade-offs of each.


OpenText Delivers Big Data Analytics in the OpenText Cloud

OpenText Big Data Analytics is a complete advanced analytics solution, combining advanced analytics software and maintenance with professional and learning services to accelerate big data initiatives. The solution is available as a managed cloud service to offer users complete management within the OpenText cloud. With this new Analytics-as-a-Service offering, the power of big data analytics is now accessible to business users and analysts in marketing, financial, and operational functions, driving a better understanding of customers, markets and operations to deliver more targeted campaigns, create more relevant products and offers and or discover opportunities for performance improvements.


Meeting Developer Demands with WebRTC and CloudRTC Platforms

Developers are quickly adopting WebRTC and cloud communications platforms as vendors bringing to market new offerings with a variety of tools and features. The primary focus of cloud communications platforms is to enable developers to integrate communication capabilities such as voice, messaging, and video chat into their applications using REST APIs and SDK’s. By providing access to communications services through the use of simple web based technologies, cloud communications platforms are abstracting away the complexity of telecommunications infrastructure and making communications much more flexible and extensible. These platforms provide a much larger and more creative population of developer’s access to interconnectivity technology, setting the foundation for an ecosystem that will redefine how we think about communications.


Do Containers Change Enterprise IT?

A highly distributed cloud-native application has built into it business continuity capability, as such applications are designed to be resilient within themselves. If one part dies, another piece takes over automatically. Where these components live is not much of an issue. However, the data created and used by the containers needs to be stored not in each container, but within some centralized and distributed database to ensure the data is available at all times to all components. The containers themselves become stateless, yet the application may be stateful within various layers of the application. For that, we need to store data somewhere outside the container.


How Data Center Providers Have Become Cloud Leaders

The cloud obviously lives in the data center. In today’s ever-changing IT environment, more emphasis is being placed on the data center. In fact, almost all new technologies being deployed today require a place to reside. This location is the data center. It’s no wonder that the modern data center is being referred to as the data center of everything. In using advanced data center technologies your organizations would literally have a secure slice of the cloud to manage and control. Although the workload is considered to be cloud-based, there is still a very real physical point to all of that information. In creating a data center platform ready for the cloud, administrators must take a few important details into consideration.



Quote for the day:

"Truly successful decision-making relies on a balance between deliberate and instinctive thinking." -- Malcolm

September 11, 2015

iPad Pro’s potential as a laptop replacement excites CIOs

Rohinee Mohindroo, CIO of Rakuten Marketing, says that the combination of the iPad Pro's size, smart keyboard and stylus make it an attractive package that could potentially replace laptops and desktops at the digital marketing company, many of whose 800 employees use iPads to show clients presentations. "What's exciting about the iPad Pro is the possibility of replacing desktops because of the usability factor," Mohindroo says. "The Pencil and the keyboard definitely make the usability a lot more appealing and I think we'll have a lot more people interested in moving to the iPad Pro."


People in CIO positions should stay off this list

A CIO also won't be trusted, Cameron explained in the report, if the IT department doesn't build systems that are "end-to-end" -- integrated into all the other applications a business uses on a daily basis. At Home Depot, Cameron told me, a checkout clerk can ring you up, of course, but he can also let you know about a sale the store is having that day or check on the availability of another item you might need. "All of a sudden it's not a point-of-sale transaction," he said. "I'm now invoking marketing systems, bundling systems, inventory systems, shipping."Integrating these systems and making the data available to that checkout person is how IT organizations help their companies compete for today's customers.


What to Do To Create a Continual Improvement Culture

In many organization CEOs are not aware of what is going on. This is a weakness that must be addressed systemically. Many of the better management methods proposed by W. Edwards Deming address this issue. CEOs are given a false picture when they focus on results instead of the management system. CEOs are given a false picture when they crate a climate of fear. CEOs are given a false picture in organizations focused on achieving bonuses instead of continual improvement. These weaknesses in CEOs effectiveness cascade down the organization with each level experiencing their own versions of these weaknesses. In order to create the right culture requires a management system that is built to support the organization in growing into such a culture.


What will the Internet of Things mean for project management?

If it’s connected to a computer, then it’s still part of that computer and not considered part of the IoT. That will change in the next 6 months, right? Be ready. Will smart watches ever become a viable part of project engagements? Probably. More IoT considerations. The IoT can include heart monitoring implants, animal chips, onboard car sensors, and various field operational devices used by workers in both the private and public sectors – including policemen, firemen, etc. So, could those include something like a handheld device that scans bar codes without a computer and transits data in real-time? Yes, most definitely. These things, while not prominent today, could be requested and included in tomorrow’s IT organization and project customer base.


Salaries by Roles in Data Science and Business Intelligence

Data Scientist is the hottest role. What's next? We present national average salaries, job title progression in career, job trends and skills for popular job titles in Data Science & Business Intelligence. Check out the salaries of related roles ... Methodology: For the popular job titles as queries, the Glassdoor API will return the jobs in USA that a person in that job would typically go on to take - based on a frequency percentage. We condensed this data by filtering the top titles first based on frequency, and then by highest increase in median pay.  Indeed.com searches millions of jobs listed across thousands of websites. The job trends graphs below show the percentage of jobs Indeed finds that contain the given job title as a search term.


How the Internet of Things will revolutionise medicine

Over the next five years the traditional 'doctor-patient' model will completely open up as self-monitoring devices do away with the need for routine check-ups and appointments, and IoT sensors in our homes and on our bodies increasingly allow us to look after ourselves. "The opportunities for connected devices to revolutionise healthcare are vast, and many go beyond individual doctor to patient relationships," says Nick Braund of the Technology & Innovation team at tech agency PHA Media. Its 'bionic doctor' project picked out gadgets including the Dario smart glucose meter, the Tricella Liif Pillbox, the Pancreum Genesiswearable pancreas and the Lechal vibrating navigational shoes for the blind as IoT products at the forefront of a new era of digital health.


Flap over Zappos holacracy puts spotlight on 'bossless' workplace

There are lots of names coming about: Holacracy is one. I call it wiki management. Steve Denning calls it radical management. It's known in the software development world as Agile management. They are all forms of peer-to-peer networks. Some of them have supervisors, and some of them don't. So, it isn't necessary that they eliminate supervisors, but it is necessary that the supervisors don't have the sovereign authority that they do in top-down hierarchies. In these organizations, everyone gets to evaluate everyone else in a way that affects compensation in some way, shape or form. So, there is what I call a wider band of accountability, which is what I think makes them so highly effective. In a top-down hierarchy, evaluations go one way: The boss evaluates the subordinate. The subordinate rarely gets to evaluate the boss in a way that affects their compensation.


Taking care of business: Why IT needs to change its ways

As a way of preventing the possible consequences of IT not being run like a business, industry leaders have recently formed a consortium to look at how to better run the business of IT. With billions of dollars invested in IT each year, consortium members realised their investments must be made prudently with tangible results in order to succeed. The result of their efforts is The Open Group IT4IT Forum, which released a Snapshot of its proposed Reference Architecture for running IT more like a business in November 2014. The Reference Architecture is meant to serve as an operating model for IT, providing the “missing link” that previous IT-function specific models have failed to address. The model allows IT to achieve the same level of business, discipline, predictability and efficiency as other business functions.


The real problem with artificial intelligence

AI is basically smart software that enables machines to mimic human behavior. For many people, it is already a part of daily life. Apple's Siri, Google Now, and Skype's Real-Time Translation tool are all examples of artificial intelligence.  Some AI systems incorporate many different components like computer vision, speech recognition, tactile feedback and touch systems. All of these sensory modalities give computers the ability to sense as well as, or even better than humans. The collected data can then be used to plan or take action.  ... But when people like Musk or Hawking warn about AI, they are cautioning against giving AI systems complete autonomy — which isn’t something that happens naturally, Dietterich said.


The Power of Search to Analyze Business Data

Despite promises that self-service BI would deliver on this desire, typical business users, such as marketers and sales managers, can still do little with the current crop of tools unless they go through costly and time-consuming training. As a result, very few organizations are realizing the full potential from their BI investments. The solution to providing every business user with full access to up-to-date information from every corner of the enterprise lies in search technology. While this idea has been floated in the past, recent advances, including increased computing performance and scale out architectures, have now made powerful search-driven analytics products feasible.



Quote for the day:


"Leaders who won't own failures become failures." -- Orrin Woodward


September 10, 2015

Microsoft turns to Dell to push the Surface Pro into enterprise

"In some respects, it gives Microsoft a missing piece of what they needed to move more Surface Pro devices," countered Moorhead, sticking to the interpretation of a distribution deal. "There's a lot more to it than just having a really good product when you're dealing with a Fortune 500 company." Neither Microsoft nor Dell said whether the deal is an exclusive, but Moorhead believes it is, at least a time-constrained one, pointing out that Microsoft posted a video clip of Dell CEO Michael Dell promoting the partnership. "Innovation isn't just about great devices. It's about partnerships that bring together products, software and services to deliver extraordinary customer value," said Dell.


Cybercriminal Gang Extorts Businesses Via DDoS Attacks

"Your site is going under attack unless you pay 25 Bitcoin," one email stated. "Please note that it will not be easy to mitigate our attack, because our current UDP flood power is 400-500 Gbps, so don’t even bother." The email goes on to inform the target that a low-level DDoS attack was being launched against it to demonstrate the seriousness of the threat. The attackers promise never to threaten the victim again if the ransom is paid up: "We do bad things, but we keep our word." Subsequent emails warn the victim against ignoring the ransom demand. "And you are ignoring us. Probably because you don’t want to pay extortionists. And you believe that after sometime we will give up. But we never give up," the follow-up messages read.


6 Incredible Ways Big Data Is Used by the US Government

Big Data use in Government certainly presents big challenges – officials and politicians have a fine line to tread if they do not want to come across as attempting to implement a real-life version of Orwell’s Big Brother. It is certainly terrifying to think of the uses a modern-day Hitler or Stalin could find for the data and technology we have available today. After all, if the US Government can use it then so can any ruling administration – many of which are subject to even less regulation, and their citizens less free to scrutinize and hold them to account. However with the right balances in place – such as robust regulation and protection of “whistle blowers” – I believe it can be used for great positive social change - as demonstrated by the projects I’ve mentioned in this article.


How Big Data May Bring Some Sanity to the Holiday Shopping Rush

“The technology requirements are much greater than consumer travel,” Bob Mylod, former head of worldwide strategy and planning at Priceline, said in an interview last year. “In some ways, we’re talking about a different industry, but the transactional dynamic is the same.” Mylod is the managing partner of Annox Capital, which is an investor in Freightos. While the upstarts are leading the innovation race, industry giants aren't ignoring the trend. Deutsche Post has invested millions upgrading its freight-forwarding business, though a planned rollout of SAP software was shelved because of a negative impact on earnings. Flexport's chief executive officer, Ryan Petersen, says the company is using money from a recent $22 million funding round to boost head count.


Data Security: Hunkering Down at NYU Langone

Hospitals are merging, and depending on the size of the merger, they aren’t integrating technologies, more so creating interfaces only. It is hard to standardize across the board, and it is very difficult to implement. It takes a long time. I compare it to where I came from, NewYork-Presbyterian Hospital and University of Medicine and Dentistry of New Jersey. Every organization has pluses and minuses. IT is centralized at Langone, so that’s a plus. Other organizations are completely de-centralized or just starting to centralize their environments. This makes it easy for us to administrate the systems we have in place. Leadership is also relatively new. At some hospitals, people have been there for 30 or 40 years, and it’s hard to get that culture change. But at Langone, there is a security focus and it helps us get stuff done.


New Teams, New Tools — Why Compliance Must Collaborate

The trick is to find tools that meet these varying needs — and that work together in lockstep, creating a single integrated and user-driven framework. Compliance and legal must be able to utilize these tools without relying on IT, and they must be capable of retrieving and analyzing multiple sets of data previously stored in various locations under varying terms. Having a single, secure platform is preferable since it allows data to be gathered, consolidated and integrated across servers, systems and users — and also enables greater collaboration both within and across functions. The new solution is one that embraces new processes and best practices and breaks down the silos between Compliance, Legal and IT, thus fostering greater collaboration between the functions


Breaking Down Data Silos with Foreign Data Wrappers

The digital revolution is wreaking havoc on data management systems. The rapid growth of data has made it more difficult than ever for companies to store, manage and make sense of the information they collect. At the same time, as data becomes more varied, enterprises are not only harnessing massive amounts of structured data from a growing network of connected devices but also semi-structured and unstructured data as well. As a result, the need for solutions that can support multiple data types has turned the typical data center into a patchwork of data management technologies used to handle the volume, velocity and variety of big data. These include relational databases, standalone NoSQL solutions and specialized extensions to handle geographic data, to name a few.


A day in the life of a social CIO

Chou takes social seriously, but he doesn't feel the need to post, or check in, every hour. "People always believe that people who are extremely engaged in social are on it 24/7," he says. "If I have a five-minute or 10-minute gap. I will take a look at what's going on, I'll check my notifications, but I'm not constantly on my phone checking the social stream." ... During the past year, Chou started blogging, and he tries to regularly share ideas on LinkedIn's publishing platform. He enjoys the feedback he gets on industry-specific topics and leadership, and thinks it helps him grow personally. "Part of the reason [I blog on LinkedIn] is it forces me to really get deep into a topic and try to research it and learn as much as I can so I can really write about it," Chou says. "It's something to force myself to dig a few levels deeper on a topic of interest."


The Difference Between Business Intelligence and Real Data Science

BI requires concerned analysts to look at the data backwards, namely the historical data, and so their analysis is more retrospective. It demands the data to be absolutely accurate, since it is based on what actually occurred in the past. For example, the quarterly results of a company are generated from actual data reported for business done over the last three months. There is no scope for error as the reporting is descriptive, without being judgmental. With regard to data science, data scientists are required to make use of predictive and prescriptive analyses. They have to come up with reasonably accurate predictions about what must happen in the future, using probabilities and confidence levels.


SDN 101: An Introduction to Software Defined Networking

Part of the confusion that surrounds SDN is that many vendors don’t buy in totally to the ONF definition of SDN. For example, while some vendors are viewing OpenFlow as a foundational element of their SDN solutions, other vendors are taking a wait and see approach to OpenFlow. Another source of confusion is disagreement relative to what constitutes the infrastructure layer. To the ONF, the infrastructure layer is a broad range of physical and virtual switches and routers. As described below, one of the current approaches to implementing network virtualization relies on an architecture that looks similar to the one shown in Figure 1, but which only includes virtual switches and routers.



Quote for the day:

"Organizations are most vulnerable when they are at the peak of their success." -- R.T. Lenz

September 09, 2015

Cloudera Aims to Replace MapReduce With Spark as Default Hadoop Framework

Brandwein noted that there are at least 50 percent more active Spark projects than there are Hadoop projects. The One Platinum Initiative would in effect formalize what is already rapidly becoming a de facto standard approach to building analytics applications on Hadoop. “We want to unify Apache Spark and Hadoop,” he said. “We already have over 200 customers running Apache Spark on Hadoop.” ... The long-term goal, said Brandwein, is to make it possible for Spark jobs to scale simultaneously across multi-tenant clusters with over 10,000 nodes, which will require significant improvements in Spark reliability, stability, and performance.


2015 reality check: IT spending, confidence on an upswing

Unlike in years past, IT also has a better handle on organizational objectives, helping it focus on the initiatives most closely aligned to business needs as opposed to chasing new technologies for the sake of staying current. "We're seeing a better relationship between IT and the business -- they are engaging with IT on the front end and working as partners," notes Jason Hayman, research manager for TEKsystems, a provider of IT staffing solutions, IT talent management and IT services. "Because of that, there's no secret as to what the organizational priorities are. That gives IT comfort -- it's the devil you know." Read on for some statistics and insight on 2015 mid-year tech spending and IT hiring trends along with some perspective from IT leaders.


Wearables And Nanotech: The Future Of Healthcare

While applications and tools are enabling self-monitoring of health, more sophisticated devices and technologies are also capable of delivering the data generated to healthcare professionals, who can process it to predict and prevent bigger health concerns in the future. Wearable devices are playing a major role in transferring actionable data from patients to doctors and caregivers, even employers. As a recent example, Google X Lab has partnered with Novartis to design contact lenses that track glucose levels in the wearer’s tears and transfers that information to a mobile device that the doctor uses for monitoring. ... The way disruptive technologies are creating seismic shifts in the healthcare landscape, it’s not hard to predict that we are in the midst of a healthcare revolution that empowers us more than ever to manage our lives to perform better on the field, at work, or in our home.


TomTom Spark Hands On – Best Choice For Fitness Enthusiasts

Moving beyond the music feature, the TomTom Spark Cardio + Music is a solid fitness tracker. It has GPS capability for plotting your runs or cycles on a map and it accurately tracks your distance covered, steps taken, calories burned, minutes of activity and sleep. The watch picks up the intensity of your sessions too, thanks to the built-in heart rate sensor. Image wise, TomTom Spark Cardio + Music looks sporty. Sporty to extreme. The smartwatch is quite solid, with a monochrome display and there’s a large square on the strap under the screen, which houses the GPS unit. Deliberately placed there, as you tend to have that part of your wrist pointed skyward, the size of it helps with easy access and control even in the middle of the run; easy and quick navigation system, even with sweaty fingers.


Security vulnerability management more than patching, warns Secunia

“You cannot predict what products will be making your infrastructure vulnerable next month, based on what made it vulnerable this month,” said Kasper Lindgaard, Secunia director of research and security. “You should not assume patching the top 10 high-profile software names means you are all set and secure,” he said. According to Lindgaard, keeping track of what makes an IT environment vulnerable is an ongoing and complex task. “It requires a combination of vulnerability intelligence and visibility of applications, devices and business critical data in your systems,” he said.


Delivering Scalable, Maintainable Objects with Domain-Driven Design

In many ways a DTO used this way mimics what DDD calls an aggregate: a single object that encompasses several other objects and contains all the content for a single transaction. However, DDD also has some rules for creating aggregates that are designed to keep your applications simple, maintainable, responsive and scalable. As I discussed in an earlier column, these are the design goals for avoiding the CRAP cycle that leads to unmaintainable applications that have to be replaced rather than enhanced. For my example in this column, I'll use SalesOrder object used in a company's Billing system to calculate a sales order's price. In this column, I'm going to start filling in the details of that SalesOrder object in a way that meets the "rules of DDD aggregates."


Kaspersky And FireEye Security Products Cracked By Researchers

Tavis Ormandy, a security researcher at Google, made public the fact he had cracked Kaspersky’s anti-virus product before revealing the details to the Russian company. Ormandy has been criticized within the cybersecurity industry for his practice of disclosing vulnerabilities publicly rather than informing the company first and giving them time to fix the flaw. ... Los Angeles-based researcher Hermansen claims he has discovered at least four flaws within FireEye’s core security product -- revealing details of one and offering the other three for sale to the highest bidder. Hermansen posted details of how to trigger the remote file disclosure vulnerability as well as details of a file that is used to keep track of every registered user that has access to a particular system


Netflix thinks its customers are too dumb to download video

Amazon was the first major streaming-video provider to allow video downloads on iOS and Android devices, for Amazon Prime customers ($99 a year). Before that, there was really no affordable way to watch the movie or TV show of your choice while sitting in an airplane unless you went old school and purchased a DVD or digital download, or transferred saved content from a computer. "There's no doubt that the way people watch entertainment is changing — anytime, anywhere viewing is important," Michael Paull, vice president of digital video at Amazon, said this month in a press release announcing the service. Amazon Prime's full catalog is not available for download, but the selection is fairly large and likely to grow in the future.


Israel is number two in cybersecurity behind the U.S.

Israel is a nation where every citizen faces mandatory military service. Cybersecurity plays an increasingly important role in today's modern warfare. More and more Israeli military men and women are gaining experience with cybersecurity technology. This carries over to their post-military careers, and has led to a disproportionately high number of cybersecurity startups compared to other nations. ... In a recent VentureBeat article, Jerusalem Venture Partners(JVP) stated that the last couple of years have demonstrated that significant public companies are being created in the cyber-security space in Israel, from Imperva to Varonis to the most successful Israeli IPO of 2014 – CyberArk.


EBags adopts mobile-first strategy with innovation lab to drive growth

EBags’ Innovation Lab will consist of a team of people, spanning various locations, working to bring the best mobile tools and ideas to its consumers. The retailer came to this decision after seeing a growth of a 78 percent increase year-over-year through smartphone devices, and will now focus on developing practices for mobile first and then expanding to desktop from there. “The Innovation lab concept we have just launched is interesting because it is not a group of mad scientists in a physical lab,” said Peter Cobb, co-founder and executive vice president at eBags. “There is a team of people in India, Ukraine, Silicon Valley, and Denver all working together virtually on the latest innovative thinking and mobile-first strategies.



Quote for the day:

"It is not fair to ask of others what you are not willing to do yourself." -- Eleanor Roosevelt

September 08, 2015

Clouds ahead: What an IT career will look like five years out

IT pros who don't take the time to lift their heads and assess the likely IT landscape five years out may be asking for career trouble. ... "The IT department isn't going away, and the role of the CIO isn't going to be marginalized. But as more workloads shift to the cloud, the construction of the IT department, by necessity, must change away from traditional roles to those more focused on vendor, business, security, and service management," Quin says. "This doesn't mean that development and administration jobs go away, just that there are fewer of them." The jobs that remain, Quin says, will focus on what he calls the "shim" layer that integrates different public cloud services with a few applications that must remain in-house. These could include highly sensitive corporate (or scientific) data or medical records and images, for example.


The myth of the cybersecurity skills shortage

In any case, security positions are not entry-level positions, and if you treat them as such, you will have terrible security. The best security practitioners have experience in the technology and processes that they are supposed to secure. If you are not an experienced developer, you do not have the standing to tell people how to secure the code they write. If you have no experience as a system administrator, you cannot maintain the security of a system. If you have no experience as an administrator, you cannot secure a database. If you have no experience in designing a network, you cannot competently design a secure network.


Why We Should Continuously Break Everything

Continuous delivery teaches us that small, frequent changes are easier to manage, test, and fix than large, infrequent ones. In the words of Jez Humble, “…continuous delivery becomes even more important when you’re risk averse. Big-bang releases are horribly risky.” Continuous change may seem to cause continuous failure; counterintuitively, though, it actually reduces the overall cost of failure. Systems rot over time, even when they sit unchanged. Rot can arise due to human forgetfulness, or due to drift between a past decision and that decision’s appropriateness for current conditions. Exposing rot is no different than doing integration testing. The more you try to do at once, the more complex it is to understand and repair the problems you find.


A Cloud Foundry Story - Idea to Production in 90 Minutes

The immediate fix was to wipe the database, and this was easy as the application has a microservice architecture, and a specific service for adminsitrative functions called scaler, one of the 12 factors that make cloud native applications successful. So, once the database was wiped of any concerning images (using the /clear REST endpoint) and had newly collected a few innocuous images, the next step was to shut down collection of new images, so that the demo would stay somewhat static, but remain available. Again, because of the microservices architecture, it was a simple matter of stopping the watcher service with one simple command (cf stop watcher). From there were were safe to show the demo again, and I had time to play with solutions to the problem.


Larry Wall's programmer 'vices' as IT virtues

Most folks see impatience as impetuousness, but Wall's definition is about having a sense of drive. Put another way: "Patience is also synonymous with inaction," Brian said. As businesses embrace agile practices where speed and continuous improvement are standards, impatience might just become an advantage for IT organizations. And why shouldn't it? The business doesn't want to wait weeks and months for systems to be built and questions to be answered, nor should it have to. "I talk to a lot of teams who struggle with agility and, oftentimes, I think it has to do with delivery teams who don't fully appreciate the urgency of the job and the fact that things have to get done right now -- in the best possible way, of course," he said.


How to Overcome Toughest IoT Challenges

“Customers are skeptical when a solution provider they think of as their ‘HP VAR’ or ‘Microsoft reseller’ claims to be able to implement IOT solutions,” DeSarbo said. "IoT is where the cloud was five years ago; there’s a lot of hype and a lot of skepticism.” VARs can overcome that skepticism by clearly documenting and communicating the value and ROI every IoT solution they present to clients. “The absolute wrong thing to do is to say you’re into IoT without being able to back up the claim with actual implementations. There’s a lot of rolling of eyes now at IoT,” DeSarbo said. “Solution providers need to tell more stories about their applications that leveraged IoT. They have to tie those in with their real business impact economic value.”


Cyber security is now the biggest risk worrying Australian insurers

Concerns about technology were a key focus in Australia, with distribution channels, change management, and product development featured among the top seven ‘banana skins’. The pace of change is a source of anxiety for insurers concerned that existing business models can remain viable in the face of disruptive technology. “The industry is on the precipice of an enormous amount of change, largely being driven by digital innovation. The impact of wearable devices and connected cars will be significant – once consumers get a level of comfort around sharing data with insurers, the expectations of more personalised and customised products and premiums will quickly follow,” Fergusson said.


As the U.S. government faces cyberattack, 'there's no playbook' for fighting back

Robert Knake, former head of cybersecurity policy at the National Security Council, said those advocating for hacking back are overreacting. “It’s bad. But it’s not devastating,” said Knake of the confidential data exposed by the breach. “The reason it’s not devastating is that we know about it.” Speaking at a recent Atlantic Council panel debating the consequences of cyber revenge, Knake said identifying the breach offers the opportunity to mitigate the damage. Once armed with this knowledge, the government can use the hack to its advantage, he argued. For example, in the event that a nation uses information gleaned from the breach to identify Americans involved in sensitive activities, Knake said the U.S. could respond with misdirection by changing personnel.


How Many Types of KPIs Are There?

Performance measures reported in scorecards and dashboards is one of the core components of integrated enterprise and corporate performance management (EPM/CPM) rivaling in importance other improvement methods such as customer relationship management and managerial accounting. Regardless of the type of KPI, analytics (such as segmentation, correlation, regression, forecasting, and clustering) should ideally be imbedded in each method, and they are critical for employees to achieve and exceed KPI targets. ... Brett describes different types of KPIs in an article titled “Five Distinct Views of Scorecards – and Their Implications.” With Mr. Knowles permission, here they are abbreviated with my minor edits


Sylvia Isler on Migrating to and Operating Microservices

Microservices are an architectural technique. It is a tool that we have in our bag of tricks as software engineers and it is not necessarily a means to an end. If you have some bottleneck or if you have some set of algorithms that can be subdivided and provided as individual services to the consumers of those services, then it may make sense to decouple them from the monolith and deploy them as microservices. But if you have a monolithic architecture and you have not thought through how the components in that monolithic architecture are working together, the interfaces between them, then going to microservices without doing your homework and thinking through the data for all of your architecture, what the pain points are, the potential bottlenecks and the performance issues, then going to microservices may be a mistake.



Quote for the day:

"Just because we have the intelligence to stop every intrusion doesn't mean we should." -- Matthew Wong

September 07, 2015

4 new cybercrime trends threaten your business

Hackers aren't sending attachments to everyone, though. The difference in this reincarnation of a tried-and-true tactic is that cybercriminals are targeting businesses, and sometimes masking as requests or files coming from within the company. They’re even sending them at a time when you'd expect to receive such a missive. "We see the highest point of entry on Tuesday at 10 a.m. local time, when everyone is really busy," Epstein says.  Clay Calvert, director of cybersecurity for MetroStar Systems, says that hackers are often searching for the names of comptrollers or CFOs from company websites – typically available on "about us" pages – and then sending them emails pretending to be from a higher up in the company. They're the targets because they control the money.


Apple and Cisco partner to bolster iOS in the enterprise

"The corporate market is one in which the Apple brand still has a strong pull with employees. It also allows them to sustain a prime premium that has become a little harder to sustain in the consumer market" because of competition from more inexpensive Android devices, he said, adding that strong employee demand for the iPad, in particular, is a market Apple wants to preserve. Cisco, which in turn benefits from its association with a popular name brand, can help do that. "It is a good partnership for both companies and helps Apple gain more credibility in the enterprise," agreed Gartner's Baker.


Who Will Own the Robots?

Those who are inventing the technologies can play an important role in easing the effects. “Our way of thinking as engineers has always been about automation,” says Hod Lipson, the AI researcher. “We wanted to get machines to do as much work as possible. We always wanted to increase productivity; to solve engineering problems in the factory and other job-related challenges is to make things more productive. It never occurred to us that isn’t a good thing.” Now, suggests Lipson, engineers need to rethink their objectives. “The solution is not to hold back on innovation, but we have a new problem to innovate around: how do you keep people engaged when AI can do most things better than most people? I don’t know what the solution is, but it’s a new kind of grand challenge for engineers.”


Is IT service continuity only for the rich?

Start on your IT continuity plan by creating an asset database of the enterprise's applications. For most organizations, continuity doesn't mean mirroring all the same applications with the same user experience as the primary infrastructure. Instead, the business needs to be able to continue with core processes until the main data center is back on line. A mission critical application running on a physical server must continue operating despite an outage, but it may not need to be replicated as a physical system. Running the app as a virtual machine allows IT to spin up the image rapidly when needed and provide a good-enough user experience as a stop-gap measure. A workload that is not deemed mission critical, for example a payroll or purchasing program, may be disregarded during outages.


Connectedness for the mainframe in the application economy: blessing or curse?

While this is simply one vector into a system, it’s possible to create a product (or put it into an existing product such as CA Auditor for z/OS) that can scan for these vulnerabilities on a system, plug them and report on the number of times these attempts were blocked. Last but not least, such news about technical exploits helps, but there is a huge cultural and communication barrier for mainframe security professionals in getting the broader organization and the rest of the security community to understand the risk. There is still a culture of denial or, “Wait my mainframe has never been compromised.” This is why we believe the mainframe reframed discussion is a timely and thoughtful conversation we need to have as a community.


The Internet of Things comes to the NFL

"Every NFL stadium is connected to a command center here in San Jose," Stelfox says. "That command center has to operate as sort of a central command of all the data. When the data is collected in the stadium, it's sent in the stadium to the broadcaster in the stadium — it never leaves the stadium from a broadcaster perspective — but it's also distributed out to the NFL cloud." All that happens in under a couple of seconds. "The command center is our point of clarity," she says. "We can see every tag on every player from San Jose when the game is live. If there's something that goes wrong, we know about it very quickly and we have dual recovery. All of that is controlled from a single point of coverage in San Jose."


10 ways IT can use self service

Like user ID issuance and renewals, data retention is another area where policies are manually executed. Decisions on how long to keep accounting, HR, manufacturing, sales, and other data are made in separate meetings between IT and these areas' managers—and the meetings can be long and tedious. A self-service approach to data retention could eliminate these one-on-one meetings. IT would send out an annual update screen to each area end-user manager that lists the area's data resources and current data retention policies and ask managers to either sign off on existing policy to continue it or to make changes. This self-service update could then be sent to the IT data administrator. The transaction log from data retention reviews could be stored for auditors to review when they check on data governance.


Enterprise data architecture strategy and the big data lake

The data lake takes a fundamentally different approach to data storage than the conventional data acquisition and ingestion method. The traditional method seeks to make the data conform to a predefined data model to create a uniform data asset that is shared by all data consumers. By normalizing the data into a single defined format, this approach, called schema-on-write, can limit the ways the data can be analyzed downstream. The approach that is typically applied for data stored in a data lake is called schema-on-read, meaning there are no predefined constraints for how the data is stored, but that it is the consumer's responsibility to apply the rules for rendering the accessed data in a way that is suited to each user's needs.


Case study: How Ebury took a cloud-first approach to delivering financial services

“We’re very aggressive in terms of adding value as fast as possible to our customers, and we would experience friction with them if we weren’t able to quickly make the decisions we need to or we would fail fast in terms of trying things out if we were slowed down by having to provision additional servers and on-premise hardware,” he says. It is this kind of attitude to business agility that has shaped the firm’s cloud-first approach to IT, which has markedly accelerated since Young joined the firm a year ago. “When I joined, we had most of our kit running in Rackspace, but there was no cloud approach at all regarding the desktop or other applications that don’t necessarily sit in the datacentre,” he says.


Q&A on the Book Agile Impressions

There are so many ways of people working well together that it's easier to tell when they're not working well together. The most common symptom I see is what you asked about previously: does each party make themselves readily available to work on the other's issues? If not, they're not even working together, so they're clearly not working well together. Do they know each other's names? They don't need to be best buddies, but they must treat each other with respect. When they're meeting together, do most questions get answered? The answers don't have to be what the questioner wanted to hear, but are their questions responded to, not ignored? Those are the signs I see most often that two parties are not working well together.



Quote for the day:

"Leadership cannot just go along to get along. Leadership must meet the moral challenge of the day." -- Jesse Jackson