October 13, 2015

Work in Transition

It’s likely that work done by humans will increasingly involve innovative thinking, flexibility, creativity, and social skills, the things machines don’t do well. In a recent study on automation from the University of Oxford, researchers tried to quantify how likely jobs are to be computerized by evaluating how much creativity, social intelligence, and dexterity they involve. Choreographers, elementary school teachers, and psychiatric social workers are probably safe, according to that analysis, while telemarketers and tax preparers are more likely to be replaced. Most professions won’t go the way of the telemarketer, but the work involved is likely to migrate toward the tasks humans are uniquely skilled at, with automation taking over tasks that are rules-based and predictable.


Honda Using Experimental New ASIMO for Disaster Response Research

The robot was never intended to be a disaster mitigation robot; it was designed to work in offices, specifically the kind of offices that have notexperienced an earthquake, explosion, alien invasion, sharknado, or other messy event. Honda is clearly aware of ASIMO’s limitations in tackling these kinds of situations, and that’s probably why (as we reported two years ago) the company has been developing a new version of ASIMO that is specifically designed for disasters. At the IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) this week, Honda engineers presented a pair of papers on research they’re doing with disaster-response humanoid robots.


Big Data Really Freaks This Guy Out

Ceglowski, who comes across a bit like a paranoid Ray Romano, also has an issue with the validity of the findings from big data. “There’s a con going on here,” he said. “On the data side they say, ‘Hey just collect everything. Collect all the data and we have these magical algorithms that will find everything in it for you.’ But on the algorithm side, where I am, they tell us ‘Throw any code you have at it–we have this awesome training data and we have enough of it that you’re sure to surface something interesting.'” The problem, Ceglowski said, is that any big data analysis that involves people has a built-in self-destruct mechanism. “Human beings always ruin everything,” he said.


Microservices: Simple servers, complex security

As Garrett explained, "The attack surface of a microservices app can be much greater [than a traditional monolithic application]." With older apps, "the attack surface is very linear -- traffic hits the load balancer, then the Web (presentation tier), and then the application and data tiers." But with microservices, Garrett noted the flow is entirely different: "It's generally necessary to expose a large number of different services so that external applications can address them directly, leading to a much greater attack surface." "If you break up your application into smaller services," said Kelsey Hightower, product manager and chief advocate for CoreOS, "you'll need a more robust authentication/authorization solution between each service.


Emerging: DataOps and three tips for getting there

"DataOps is a data management method that emphasizes communication, collaboration, integration, automation and measurement of cooperation between data engineers, data scientists and other data professionals." As with any new approach, the pioneers haven't sorted out the language just yet: While Palmer refers to it as a "data management method," Bergh calls it an "analytic development method" that should be overseen by a chief data officer or a chief analytics officer. (The Bergh team refers to DataOps as AnalyticOps.) In either case, the ultimate goal is to accelerate analytics. And, regardless of how businesses decide to practice DataOps, successful programs will require IT expertise in the form of data integration, data quality, data security and data governance, according to Palmer and Bergh.


SAP unveils SaaS analytics platform

"Whether you're in the boardroom or in front of a customer, there is a fit solution that will meet your needs," Smith says. "By bringing these capabilities together on a single platform, there's advantages those users can get — commonalities in collaboration and business process and workflow that can help bring these capabilities together."...  "SAP Cloud for Analytics was transformational by allowing real-time updates to our plans, collaboration across the organization from within the app, advanced analytics and one-click visualization for our users," Stephen Hayes, analytics manager, Live Oak Bank, said in a statement today. "The end-user experience was well-received from our leadership team to our analysts."


VMware Value Lies In Modern Data Center Management

Unlike the IBM mainframe, VMware is a software company, one that so far has been able to evolve its product lines rapidly. For example, on Tuesday, Oct. 13, at VMworld in Barcelona, VMware introduced vRealize Automation 7, which gives enterprise IT or a DevOps team the ability to generate a graphical blueprint that can lead to a deployable system. On the blueprint a team can identify different parts of an application spread over many machines, then assign the application-appropriate networking and security. The system described in the blueprint will tend to be on-premises, but parts of it can exist in Amazon Web Services or an OpenStack Kilo cloud.


The missing ingredient for effective problem management

The missing ingredient in a typical implementation is skilled problem managers using a consistent, evidence-based, structured approach to solving problems. By structured, I mean either to adopt one of the major problem-solving frameworks such as Kepner and Fourie and follow it consistently, with all problem managers using it the same way and all the time. ... Technical knowledge is useful to give the confidence to challenge subject matter experts, particularly if they are invoking their deep technical knowledge to suggest that their opinion should be accepted without question. Problem managers should always seek evidence to support assertions, ensure that alternatives are properly assessed and that actions proposed are sensible


Q&A and Book Review of Software Development Metrics

Velocity is another metric that depends on certain assumptions. It depends on (1) a time-boxed process model, and (2) incremental delivery of production-ready features at least to a test environment. Provided these assumptions hold, Velocity is useful for short-term planning and also to accumulate empirical data for burn charts, which in turn can expose emerging delivery risks. So, it's useful for steering in cases when the work is done in a certain way. In my experience, Velocity is a little too slippery to use for tracking improvement. There are three reasons. First, a team's improvement efforts might include changing the length of the time-boxed iterations or shifting away from a time-boxed model altogether.


Tech Firms Laud Obama's Retreat on Encrypted-Data Law

Battered by Edward Snowden’s revelations that they aided in NSA surveillance, technology companies have leaped at the chance to showcase features such as encryption that help deter hackers. Apple, for example, helped set off the debate by announcing that iPhones would automatically encrypt data stored on them and that Apple couldn’t help the government unlock the information. What companies have rarely mentioned is that the data sought most often by police and American intelligence services -- text messages, e-mails, photos and calling records -- can still be legally obtained with court orders. That’s true no matter how much encryption is used to prevent unauthorized parties from accessing them, as Bloomberg News reported last October.



Quote for the day:

"When you do the common things in life in an uncommon way, you will command the attention of the world." -- George W. Carver

October 12, 2015

The merger of Dell and EMC stems from the rise of cloud computing

All of which helps to explain why Messrs Dell and Tucci are keen to merge their companies. Consolidation would give the merged firm more bargaining power, not least when dealing with big cloud providers themselves, and would also gel with another trend in the IT industry: converged infrastructure. Traditionally, servers, storage devices and networking equipment have been sold separately. Now they are being increasingly offered in integrated bundles by one vendor, sparing customers the tedious task of making them work together—a trend that has been pioneered by EMC in a joint venture with Cisco, a big maker of networking gear.


10 new words you need to know in Silicon Valley

A startup incubator provides management support and office space and other business resources for new companies trying to get off the ground. AngelPad is the biggest incubator in Silicon Valley. An accelerator has a tighter, shorter-term focus. The idea is to rapidly build a business in a few months, if not weeks, so that the company can succeed or crash quickly without too great of a loss. Accelerators offer mentorship for developing ideas and business plans, and provide an infusion of cash and employees, so that the company can function on its own quickly -- or fail fast.Y Combinator is the top accelerator in the valley.


5 ways the internet of things will change your everyday life

Coffee machines will chug into gear just in time to hand us a fresh cup as we walk out the door, as the lights, once more, operate throughout the day to make it seem like somebody is home. Smart doorbells – think Ring – will alert us when there is someone at the door, meaning we can accept deliveries even when abroad, or appear to be home even when in work. Pets won’t go unaffected, either, with a smart doggy door opening and closing as our pooch goes in and out of the back garden, while the humble smart watch connects to a home system so we can communicate with our lonely dogs, or a programmed laser toy can keep cats entertained.


Understanding basics of Recommendation Engines (with case study)

Ever wondered, “what algorithm google uses to maximize its target ads revenue?”. What about the e-commerce websites which advocates you through options such as ‘people who bought this also bought this’. Or “How does Facebook automatically suggest us to tag friends in pictures”? The answer is Recommendation Engines. With the growing amount of information on world wide web and with significant rise number of users, it becomes increasingly important for companies to search, map and provide them with the relevant chunk of information according to their preferences and tastes. Companies nowadays are building smart and intelligent recommendation engines by studying the past behavior of their users.


Microsoft Researchers Are Working on Multi-Person Virtual Reality

Microsoft is testing a commercial augmented reality product, called HoloLens. Lanier stresses that his work is separate from HoloLens and does not reflect how that product will develop. Still, multi-person mixed reality is a long-standing challenge for those interested in the technology. Beyond gaming, there is hope that virtual and augmented reality could prove useful for communications, collaboration, and for new ways of accessing and handling information. Lanier’s project is called Comradre (and pronounced “comradery”). A video produced by Lanier’s lab shows several projects developed by student interns in which more than one person interacts with the same virtual object or phenomena.


Big Data & Brews from Strata NY 2015: Tony Baer on Spark in the Hadoop Ecosystem

It’s really about a whole ecosystem. The fact is, is that it started getting into this contemplation of what is Hadoop? The fact is that what you’re really looking is a big data platform and ecosystem of technologies, and hopefully you’re working with technology providers that hopefully will simplify all this because the result is that you want to take advantage of innovations in scale-out clusters, commodity hardware, commodity software, so you can get results that are not commodity. ... The idea of simplifying Spark and making Spark accessible, so you can use it with tools, such as Datameer for instance. Their survey basically said that roughly about half, 49 percent I think was the exact, were using Spark basically stand alone


How to implement integrated management systems

When talking about an integrated management system (IMS), we mean systems where we deal with as many requirements as possible in the same way. E.g., if two systems have policy requirements (like management approval, revision, and communication), why don’t we deal with them the same way? Why don’t we control documents and records in the same form? When thinking about integrating management systems, there are many courses of action to be considered based on the organization’s context, the number of existing systems, and the systems’ maturity, for example. In terms of standards requirements, you can use PAS 99 as a guide (it can help you map and define one set of documentation, policies, procedures, and processes suitable for all of your management systems).


Kroger CIO: Four lessons for strategic IT

Kroger is a huge company, with almost $110 billion in revenue and 400,000 employees. Given his experience, Chris' perspective is highly valuable and can teach us a lot. As a brief summary, here are his four points on how a CIO can contribute strategically: Earn credibility as a reliable service provider; Learn the business profoundly well; Develop relationships with leaders across the company; and Rely on experts, both internal and external to the organization, to help you keep up with the latest technology. This simple advice presents a roadmap for CIO and IT relevance. However, executing the four-step program requires infrastructure, process, people, and technology. In other words, it's far easier said than done.


Future-proof your IT outsourcing contract: A CIO checklist

Getting each part of an IT outsourcing contract nailed down is labor-intensive. Pace Harmon, for example, "takes a shot" at writing the SLAs but at some point brings in the client's subject matter experts to go through the document line by line. "It's not easy, it's a grind," Sealock said. A word of caution: If the price per unit of work seems too good to be true, it probably is. Service providers eager to break into an industry are known to agree to a price point that is too low to meet the agreed-upon SLA. Once on the job and under pressure to improve margins, the service provider will start cutting corners. Another reason to get the alignment right on SOW, SLA and price?


Big Data Solutions with MS SQL ColumnStore Index

The primary purpose of the MS SQL CS Index was to enable the download of as much data as possible to memory and work with this memory when processing data, as opposed to reading it from the disc. Two advantages of this innovation were higher speed and lower HDD IOPS costs. But the product was not perfect. Even though the problem of read-only mode in the 2012 version was fixed with the 2014 clustered CS Index that lets you modify data in the table, it turned out with the clustered CS, it was impossible to have simple indices with calculable fields, foreign keys and triggers. When working with data, it is important to know which method of indexing is the most effective in which scenarios.



Quote for the day:

"Adding manpower to a late software project, makes it later.” -- Frederick Brooks Jr.

October 11, 2015

Collaborating in a shared service management environment

The processes for IT, facilities and human resources (HR) are broadly similar and do overlap, such as with commencement and exit procedures, and can easily be brought together in a single tool to manage. However, even when doing so and when supporting departments have their own tools and processes, it is not always clear to end users where they should turn for support. For instance, in practice the management of mobile phones can be sourced to each of these departments, or a combination thereof. The collaboration between IT, facilities and HR, also called shared service management, cuts costs and improves the quality of service for end users.


Man vs. machine circa 2018: A reality check on Gartner's crystal ball

Plummer said that IT leaders need to view things as customers and work to satisfy "their nonhuman requests." Reality check: This prediction sounds like it came from Salesforce, which is betting on the machine-thing-customer connection. Things requesting support won't be a surprise. ...
3 million workers will be supervised by a roboboss by 2018. Reality check: The theory here is that humans will focus on creativity, relations and strategic planning. Umm ok. Societal norms as well as politics will likely to put off the roboboss for a few more years. ... Half of the fastest growing companies will have more smart machines than people by 2018. Reality check: Not surprising, but 50 percent may be a bit too high for that time frame.


Seven Essentials for Building Your 2016 Dream Team

We all know success will be a team effort. So you send your best reps into the battle. But what if you don’t have enough “best reps”? Simple. You hire more. That may not seem so simple. But what if you had a defined process for bringing in the right reps? That’s what we’re going to discuss in this post. We’ll talk about how to hire pros who can get the job done. ... The seven essentials all are action items. They’ll help you bring in revenue-focused people who can get you to goal. But it’s not enough to know what the seven are. Each is a separate entity with plenty for you to consider. In the end, they fit together into a unified whole: your talent strategy.


Amazon’s growing clout in cloud computing stirs questions

In the past decade, Amazon has come to dominate yet another business: cloud computing. And now, as Amazon Web Services solidifies its grip on the business of selling computing services to companies over the Internet, it’s having to answer the sort of questions that dogged Microsoft when it ruled desktop computing: Will it lock customers in to its technology? Will it squish smaller tech companies that pioneer AWS niches when those businesses become lucrative? Now nearly 10 years old, AWS has left giants such as Microsoft and Google in its wake. Market-research firm Gartner thinks AWS is “the overwhelming market share leader,” running more than 10 times the infrastructure cloud-computing capacity as the next 14 largest rivals combined.


Development & Technology for Marketing Content: A Look at The Future

The marketing and development industries can’t afford to stay siloed any longer. Search marketers need to understand how JavaScript front end technologies work. Designers need to understand browser rendering technologies. Developers need to be staying abreast of marketing campaigns and the technologies behind them. Only teams where there’s cross-discipline understanding are going to be able to produce truly exceptional marketing content, and the gap between those agencies and clients and everyone else is only going to get more obvious as the rate of progress hastens. ... Very quickly, your skill sets are going to become interdependent on other creative disciplines


Too much information... the threat of mass surveilance

Snowden, the fugitive former NSA analyst, caused another stir this week when he revealed how British spies can turn smartphones belonging to suspects on and off from a remote location, and record what is happening around them. The spying agency effectively takes over the phone, and it can be used to track the target. This is what one would expect from a spying agency, but variations of this kind of snooping technology are widely available, and can even be used by ordinary individuals. Using smartphone technology to spy on another person is remarkably easy, according to Noonan. "Ordinary iPhones have a feature called Find My Phone, and once you have the password, you can find out where the phone is. So it acts as a tracking device."


Hacks to perform faster Text Mining in R

Text Mining, is one of the most frequent yet challenging exercise faced by beginners in data science / analytics experts. The biggest challenge is one needs to thoroughly assess the underlying patterns in text, that too manually. For example: it is pretty common to delete numbers from the text before we do any kind of text mining. But what if we want to extract something like “24/7”. Hence, the text cleansing exercise is highly personalized as per the objective of the exercise and the type of text patterns. ... You may find numerous ways on internet to do sentiment analysis. However, subject extraction is very specific to the context. In this article, I have shared the top 4 hacks applied in the industry to do subject extraction in R.


Compliance and ITSM

Now if you take the word compliant and put it into a translator, or search on Wiki, you get something like this: abide by others, docile, obeying, obliging, agreeing with a set of rules, adherence to standards, regulations, and other requirements. Now there are definitely different compliances to be compared to but, in general, you comply with a need or rule set up by others or yourself. ... Whether it is a process or requirement, it doesn’t really matter. What matters is how compliant you are, and that’s the tricky part. What risk are you willing to take? Do you understand the ‘data or information’ you have? Do you have the knowledge to see the risks and take decisions on the level of compliance you want or need? What actions you need to take?.


Code Signing certificates becoming popular cybercrime commodity

When cybercriminal create malicious code, their purpose is to make it appear as legitimate as possible. This is done by using signing certificates to sign their code. By stealing private keys of certificates using Trojan horses or by compromising the certificate key builder of software vendors, cybercriminals manage to get access to code signing certificates. When the researchers discovered that fraudsters used valid certificated, the first thing that came to their mind is that they somehow manage to acquire them directly from the certificate’s issuer. ... It can be rather difficult to separate legitimate from dummy companies and this is due to the fact that cybercriminals take all the required steps for making it appear as authentic.



Quote for the day:

"There is a difference between knowing the path & walking the path." -- Morpheus

October 10, 2015

California digital privacy laws boosted, protecting consumers

The new laws will prevent state and local law enforcement from snooping on emails without a warrant and alert the public when they use high-tech surveillance to tap into cellphone calls. The laws also prohibit paparazzi from flying drones over private property and make sure TV manufacturers warn viewers that voice commands may be recorded -- but stop companies from using the information to target ads. ... "It's a very exciting day for privacy in California," said Nicole Ozer, technology and civil liberties policy director for the American Civil Liberties Union of California. "Everybody is using technology is so many diverse ways. But electronic privacy law in the state and federal level have not been updated in decades.''


How Big Data Analytics Is Shining a Light on Anonymous Web Traffic

The key to greater understanding of these data-poor personas lies in the clickstream data that follows everybody on the Internet. Whether you like it or not, there’s certain amount of data that you drag around to each subsequent website you visit, including what kind of Web browser, device, and plug-ins you’re using; you’re IP address and geographical location; your time zone and language preference; and what website you came from. The owner of any particular website knows even more about you, including what website pages you view, what you search for, and how long you stay on each page. This data is a rich source of information that allows website operators to build models of website visitors who don’t otherwise say much about themselves.


Analyzing the Internet of Things

To date, a lot of effort has been put into creating sensors, deploying them, and generating masses of data. However, lagging behind that effort is the analysis of the data. As with any data, no value is driven without analysis and action. It would have been better if more thought was given to how to utilize the data generated prior to creating sensors that stream it out. Given that we are where we are, the best path forward is to begin to aggressively analyze the data of the IoT. This is what I, and others, have begun to call the Analytics of Things (AoT). The value of the AoT is already proven in a wide variety of settings. These examples are still from early adopters and often initial prototypes. However, this type of analysis will be ubiquitous very soon.


Top 10 Technology Trends Signal the Digital Mesh

We sit at the center of an expanding set of devices, other people, information and services that are fluidly and dynamically interconnected. This “digital mesh” surrounds the individual and new, continuous and ambient experiences will emerge to exploit it. In his session revealing Gartner’s Top 10 Strategic Technology Trends at Gartner/Symposium ITxpo 2015 in Orlando, David Cearley, vice president and Gartner Fellow, shared three categories for this year’s trends: the digital mesh, smart machines, and the new IT reality. ... Recent advances make it possible to mix multiple materials together with traditional 3D printing in one build.


Strategic Planning – Ideas to Delivery

DevOps is a term that has been around since the end of the last decade, originating from the Agile development movement and is a fusion of “development” and “operations”. In more practical terms it integrates developers and operations teams in order to improve collaboration and productivity by automating infrastructure, workflows and continuously measuring application performance. The drivers behind the approach are the competing needs to incorporate new products into production whilst maintaining 99.9% uptime to customers in an agile manner. To understand further the increase in complexity we need to look at how new features and functions need to be applied to our delivery of software. The world of mobile apps, middleware and cloud deployment has reduced release cycles to weeks not months with an emphasis on delivering incremental change.


Samsung wants to help IoT speak a common language

At the highest level, SAMI provides an abstraction layer for ingesting device data, processing, storing, routing, and accessing it through very developer-friendly APIs. SAMI deals with everything from data security, to real-time data, to transformations, aggregations, storage, user management, device management, and much more. SAMI also handles crucial aspects around security and privacy, which are mission critical in IoT cloud services. By developing on top of a platform that allows easy and secure access to any kind of data, from any kind of device, and interconnects with other device platforms, IoT developers using SAMI can focus on building their added value to the ecosystem.


How IoT Is poised to drive higher efficiencies for Telecom

Integration of disparate systems will take IoT deployments to a completely different level and we are already seeing that happening. As an example, IoT solutions integrated with procurement systems can ensure that network assets giving trouble or nearing end of life can be procured and replaced before they eventually shut down and impact customer operations. Customers can be informed of potential downtimes well in advance or a real-time basis, thereby helping them take timely decisions on routing traffic through alternative paths/operators. IoT solutions, as I mentioned earlier, give us the ability to know what’s happening on a real-time basis and more importantly, enable us to take decisions on a real-time basis as well.


Taming today's cyberthreat landscape: A CIO checklist

One of the few things the "experts" seem to agree upon is that cybercrime is a clear and present danger to our national security. These issues have gone way beyond the province of esoteric IT journals and cultish science fiction novels -- they have invaded our daily collective consciousness and well-being as individuals, as families, as companies, as governments, as a society and as a culture at large. Many opine at great length on how the cyber landscape has become the new battleground upon which future wars will be fought: Nations will rise and fall based upon their techno-prowess to aggressively attack and defend against the new breed of cybercriminals.


15 female founders building killer tech companies

There are a lot of lists of amazing, inspirational female founders totally crushing it around the web, but they all seem to feature the same people. We know from talking to amazing female founders and working with some awesome female-led customers, that there are so many other women out there building incredible tech companies that will change the world. These women not only deserve the spotlight for all of their hard work, but provide an excellent source of inspiration and tactical advice for anyone trying to build a business. Here are 15 female founders you might not have heard of building killer tech companies.


The Challenges in Handling 1 Billion Resident Business Objects

The term “Big Data” is nothing new. It describes huge volumes in principle; whether on disk, networks or anywhere else. Big Memory facilitates Big Data activities by doing more processing on the server or tight cluster of servers, still keeping stuff in RAM. The Big Memory approach is also conducive to real-time querying/aggregation/analytics. Think map/reduce in real-time, a kind of Hadoop that does not need to “start” and wait until done, rather “real-time Hadoop” that keeps working on data in RAM. Big Memory comes in different forms, primarily: heaps and composite data structures. Just like in any “regular” programming language, all complex/composite data structures like lists, trees, dictionaries, sets etc. are built around the heap primitives like: alloc/read/write/free.



Quote for the day:

"Celebrate what you want to see more of." -- Tom Peters

October 09, 2015

Time to get mapping - how a blind government can develop sight

Indeed, it’s possible today to build an entire organisation using chains of these standardised, cheap, modular capabilities. And - as was the case with the arrival of other forms of shared infrastructure such as electricity, railways, canals, roads, or radio bandwidth - the ability to consume standard stuff using shared plumbing always changes the economic balance in favour of operating models that standardise and consume, instead of building their own special versions. This can be illustrated by considering that most people would find it time-consuming, expensive and uncomfortable to knit their own underwear. Government should view building its own stuff in the same way - why would it want to do that, without a good reason?


Big Data’s Relationship with Business Intelligence and Data Warehousing

A BIDW is a data analysis system that collects the transactional information and typically provides summaries on selected key fields of the transactions being watched. These summaries can be used to better understand the overall health and trends in the transactions being monitored. The BIDW data is a copy of production and is not in real time, so long-running queries can be initiated without concerns about impacting the live customer actions. Data may be loaded daily or weekly, depending on the data source. The data is kept at several levels to serve the different customers of the BIDW; summary data and dashboards are the most common outputs of a BIDW, but if needed, you can drill into the transactions.


Visio Series: Simple Network Diagrams

There are many free and paid for tools for scanning a network available, and most of them can output the results to a text or XML file. Devices communicate on a network because they are software assigned a unique identifier (Internet Protocol address) to each connection. The connected port is usually on a hardware component that is hardware assigned (Media Access Protocol address). A laptop, for example, could be connected via an Ethernet cable, Wi-Fi or Bluetooth to a network. Each method will have a different IP address and MAC address, but they are all on the same device. The data available in each scanning tool output varies tremendously, but they will all have an IP address and MAC address. Here are three free tools showing examples of their interfaces.


Microsoft and model clauses – where the cloud stands after Safe Harbor

The government argues that as Microsoft is a US company, it is covered by US legislation and regulation that reaches across borders into operations based in other countries. Microsoft says that the data is covered by European data privacy and protection laws – and specifically the Irish interpretation and enforcement of those. The ramifications of the US government’s interpretation being upheld would of course set a precedent that US law enforcement agencies can demand access to data stored on servers or within US-headquartered companies anywhere around the globe. Following the loss of Safe Harbor, and in light of the post-NSA scandal paranoia around the world, the impact of such a precedent could have major ramifications for US cloud computing firms trying to do business around the globe.


New FortiGate Connector for Cisco ACI Delivers App-Centric Security Automation

There are several other customer stories featuring ACI-Fortinet solution, but I’d run out of time and space to list them all. For your easy reference visit http://www.fortinet.com/videos/index.html for more customer videos. Let’s look in detail at the key capabilities of Fortinet-Cisco ACI solution and the benefits it brings to Data Center customers. Fortinet’s FortiGate firewall solution integrated into Cisco Application Policy Infrastructure Controller (APIC) delivers application-centric security automation in modern data centers. The solution provides automated and predefined policy-based security provisioning for next-generation firewall services. It enables location independent security services insertion anywhere in the network fabric through a single-pane-of-glass management.


Six CIO tips for business innovation with data

First, the business runs a number of information-led initiatives to boost customer engagement. “We are, essentially, a retailer and we want to have long-term, valuable relationships with our clients,” he says. The second way First Utility uses data is for optimisation. “Information helps us to understand what processes work, which processes are causing us problems and how we can use our experience around those processes to make the business better,” says Wilkins. The third way the firm uses information is strategically, says Wilkins. “Now we’ve built a platform, we want to know our technology is working and where the business can use systems and services to develop and grow,” he adds. “It’s all about making the most of data to find new opportunities and to market to new sets of customers.”


Why have most merchants missed the EMV deadline?

Mark Horwedel, CEO of the Merchant Advisory Group, agrees. He said the large majority of the burden – especially the financial burden – of this transition falls on the merchants. “This is the most complicated and most costly point-of-sale (POS) project that’s ever been foisted on merchants. They’re making us pay for 75% of the conversion,” he said, adding that in Europe, networks lowered their interchange fees or offered to share some of the cost of installing new equipment. Besides that, he said, U.S. merchants pay transaction fees that are seven to eight times those paid in Europe. “Credit cards are a bank product,” he said, “and on their face they are unsafe, but the industry has made a one-sided effort to shift the expenses (of making it more secure) to the merchants.”


5 Signs Security's Finally Being Taken Seriously

Developed by the Georgia Tech Information Security Center (GTISC) and sponsored by Forbes, the Financial Services Roundtable (FSR), and Palo Alto Networks, the Governance of Cybersecurity: 2015 Report examines cybersecurity risk governance practices and attitudes of executives at these top companies from four surveys over the course of seven years. Unlike a lot of security studies out there lately, this one shows a lot of promise. In spite of breach statistics today—or perhaps because of them—this study shows that enterprises are finally taking security seriously. "This report shows that, for the first time, directors and officers understand they have a fiduciary duty to protect the digital assets of their companies and are paying more than cursory attention to cyber risks; it is a welcome change that will help protect shareholders and customers,” says Jody Westby


5 Disruptive Technology Advancements Which Will Change Business as Usual

Historically, there have been a variety of disruptive technologies that have changed the business world. The personal computer essentially displaced the typewriter, forever changing the way we communicate and work. Email also changed communication, largely displacing traditional letter-writing and causing problems with the greeting card industry. Additionally, smartphones have displaced numerous technologies with all of their available apps, including calculators, GPS devices, and MP3 players. Technology is continuing to advance, and more innovative solutions are hitting the market. If current businesses don’t adapt, they could be at risk of becoming the next technology to be phased out. By identifying some of the disruptive technologies that are on the horizon, businesses can create a plan to adapt for the future.


Surface Book, Surface 4 Pro, XPS 12 or iPad Pro?

It's actually a great problem to have. And it's one that I suspect others will grapple with in the coming months as the 2-in-1 computing category becomes viable for a wider audience. My own decision may actually be more difficult though, for a few reasons that don't apply to others. First, my computing needs are actually relatively meager and I try to keep up with all of the major platforms. So I actually rotate through using a Chromebook Pixel, MacBook 12 and HP laptop running Windows 10. As a full time writer, my most used app is really a browser. I can write directly into a content management system through the web. Other daily activities include email, social networking, music and video consumption, light gameplay, general web browsing and online reading.



Quote for the day:

"If you have no critics you'll likely have no success." -- M.Forbes

October 08, 2015

Big data makes a difference at Penn Medicine

"We're working in two week sprints, where the clinicians adjust their pathways, and we adjust the algorithms to their needs," Draugelis notes.  The team builds a prototype of a new pathway for a particular condition about once every six months. Currently, it is focusing on finding a better way to predict which patients have congestive heart failure and which are likely to be readmitted after discharge from the hospital. In addition, the team is working on acute conditions such as maternal deterioration after delivery and severe sepsis. "We're creating machine learning predictive models based on thousands of variables," Draugelis says. "We look at them in real time, but we train them up over millions of patient records."


Peer Feedback Loops: Why Metrics and Meetings Are Not Enough

We know that we cannot learn without metrics and meetings. But we can certainly measure and talk without learning. If learning is our goal, we need more than performance data and task alignment. Henry Ford's complaint about the whole person attached to the pair of hands he actually asks for, may remind us that knowledge work is more than brains. Like it or not, there is a whole person attached too. A person with specific behaviors, awareness levels, emotions and needs that highly influence the success of any systemic improvement. An expanded version of the Johari-window model may help to better explain why we need personal feedback to encourage this kind of improvement.


Strata + Hadoop World: A quiet mind is a creative mind

Not only did commentators and broadcasters have access to data such as the distance between a breakaway group of riders and the rest of the pack, but fans could access rider statistics through a beta site. The old-world sport meets new-world technology was powered by Dimension Data, an IT services company. "Each of these devices on the bikes talks to other bikes, as well as sensors in the team cars," Jim McHugh, vice president of marketing at Cisco, said during his Strata + Hadoop World talk. That data gets relayed to a race helicopter, and then to a media truck at the end of the stage, and then to a Dimension Data truck. "Inside that truck, an analytics platform is doing the analysis and computation, which are passed on to broadcasters and commentators and digital platforms," he said.


Phil Zimmermann speaks out on encryption, privacy, and avoiding a surveillance state

When we shop online, it's encryption that makes sure that your credit card details aren't being snooped on. When you log into your bank account, it's encryption that means you can be sure it's really your bank's website you are visiting, not a glossy fake. Encrypted databases keep your medical records safe from prying eyes, while encrypted email protects your business proposals, declarations of love, or nude selfies. PGP is now owned by Symantec, and for the last dozen years Zimmermann has been working on encrypted voice communications protocols, and most recently the creation of a company called Silent Circle. One of the voice encryption standards used by Silent Circle is called ZRTP and as the company's website puts it bluntly: 'The Z in ZRTP stands for Zimmermann."


NASA Wants To Know What Happens To Our Bodies And Brains After A Year In Space

The study is the first to measure inter-cranial pressure during a mission, and hopes to figure out why astronauts’ vision changes in zero-gravity, and hopefully come up with a fix. "If we want to stay in space longer than six months to explore," says Michael Stenger, co-principal investigator of the Fluid Shifts investigation, "we have to determine what causes these vision changes so that we can begin developing countermeasures to prevent them." It’s also good for inter-cranial pressure sufferers back on Earth. Normally, measurements are done using a lumbar puncture or by drilling a hole in the skull. The astronauts are interested in neither, so they have come up with a number of non-invasive tests that could be useful back down here.


DjVu: a Short Technical Introduction

An interesting aspect of IW44 wavelet codec is that it is optimized to allow on-the-fly decompression/rendering of the area visible in the display window (and not more) as the user zooms and pans around. This allows to keep the images in compressed form in the RAM of the client machine, and allows to display very large images without excessive memory requirements. Scanned color and grayscale documents in DjVu are typically 30 to 100KB per page at 300dpi, which is 5 to 10 times smaller than JPEG, and about 2-3 times smaller than MRC/T.44 or TIFF/FX. Digitally produced documents with mostly text are typically 1 to 3 times smaller than PDF or gzipped PostScript originals at 300dpi, but can be considerably smaller if the documents contain many pictures.



Chatham House warns of growing risk of ‘serious cyber attack’ on nuclear facilities

The nuclear sector is less likely to disclose cyber security incidents because of “national security sensitivities … leading nuclear industry personnel to believe that cyber attacks are less of a threat than is actually the case.” Moreover, as a late adopter of digital technologies the “nuclear industry as a whole is currently struggling to adapt” and there is a “lack of executive-level awareness of the risks involved”. Among the report’s specific findings is the fact that many nuclear facilities now have VPNs and undocumented Internet connections, meaning they are not air-gapped as many facility operators believe, and that even where there are air gaps, “this safeguard can be breached with nothing more than a flash drive”.


Gartner: ‘Widening gulf’ between digital front-runners and everybody else

The survey showed that digital doers don’t think or act like digital planners. Companies that are already doing digital initiatives, for example, don’t make a distinction between digital business strategy and plain old business strategy. Planners, on the other hand, see the two as separate. Digital investments by the doer group are for “piloting and deploying,” while the planner group “is into investigation and experimentation.” Makes sense. Here’s where the gap is more than just semantic: Digital business front-runners overwhelming list “adopting new technology” as their highest priority, followed by “creating a highly collaborative environment” and “supporting customer-driven technology change.”



Reactive Messaging Patterns with the Actor Model

Actors make perfect DDD Aggregates because they are atomic processing units that form the ideal transactional boundary. So that's a big perk for using Actor model with DDD, at least from a tactical approach. Another essential point is that Actor model being message-driven means that actors fit naturally into an event-driven architecture. With event-driven, actors can easily support Event Sourcing, where the Events Messages produced by an actor are used to produce their persistent state. However, you can't really query an Event Journal very practically unless you project the events into a query model. So, when you use Event Sourcing it means that you need to use CQRS so you can query data that was produced as the result of sending actors Command Messages.


10 Reasons Why Your Strategy Isn’t Working

The surface conclusion would assume the organizations cited are simply failing to adequately mobilize their people to deliver results. Be very careful with that assumption. There’s a whole litany of reasons for poor execution, of which several can be traced back to the decisions and choices made during strategy design. As an advisor to executive teams leading organizations of all sizes, I am frequently exposed to frustrations, obstacles and traps executive teams face when it comes to getting strategy right. And now (September and October) is the time to get it right – well in advance of 2016. To help you prepare for your best results ever, I’ve put together a list outlining 10 questions you can use to get beneath underperformance and identify the gaps in your strategy approach.



Quote for the day:

"One sees great things from the valley; only small things from the peak." -- G. K. Chesterton

October 07, 2015

Data Science Falls Into Many Roles

What is quite interesting is the break down of tasks that they spend their time on per: extract-transform-load operations, data cleaning, basic exploratory analysis, and machine learning and statistics. The fine details are in their report, but most spend 1-4 hours a week on data cleaning and also on exploratory analysis. I was surprised that this third year of the survey there were no longitudinal information of change over the past two years. There are new and more in depth questions this time particularly in the skills, but I would have assumed some general trends on salary. How hard is it to find work in data science? About 35% say it is easy, and 29% say it is an average difficulty, although per their salary chart these map quite closely to their average pay range.


The Myths and Realities of Digital Disruption - An Executive's Guide

Over the last few years the concept of digital disruption has received as much or more attention than any other business topic. Given the massive changes we have seen in the media, advertising, retail, taxi services and other sectors, speculation that similar shifts will spread across the wider economy is only natural. But are these disruptions imminent? Why have some industries been so much more disrupted than others? How, and to what extent, will each of our major industrial sectors really change? Where will Silicon Valley (or its many global imitators) find the next generation of mega successes? This report provides a business executive’s guide to these issues.


Big Data Analytics – The game changer in the world of sports

On-field technologies or sensors present in the gaming equipment also help in the gathering of valuable data are changing the scenario of today’s sporting world. Now you can collect millions of data from the swinging of a tennis racquet to the spin of a baseball. You can learn about the tactics applied by your opponents and analyse with the help of Big Data to predict how they are going to play the next match. Or even improve your own team’s performance by checking out if the players are working as a team or is there any gap in the flow of play. Coaching will also be influenced a lot by Big Data analytics. We have already seen some clubs like Chelsea and Portland Trail Blazers are using coaching apps to make players understand the tactics easier. With Big Data analytics one can understand exactly what happened in each game and predict closely what tactics is going to be beneficial in the next match.


The road to hybrid cloud architecture is paved with mistakes

One error organizations used to make when implementing hybrid cloud architecture, said David Linthicum, author of numerous books on IT, started with OpenStack. IT organizations use the open source cloud software platform to build a private cloud, which offers advantages similar to public cloud but uses in-house architecture. It's a perfectly reasonable endeavor, except many organizations didn't fully understand what they're getting into. "It was too much of an engineering challenge for them to take on, and they ended up going over budget or just abandoning it quickly,"Linthicum said. The problem for many was that they believed the hype on private cloud as a bulletproof and easy-to-implement alternative to public cloud, Linthicum said, citing 2013 as the banner year for vendor bunk.


Business Technology Starts to Get Personal

Remarkably, mass-produced goods increasingly personalize into something unique because of a lot of snooping on you. Few consumers turn personalizing features off, adjust use or boycott the products. In a conflict of personalization and privacy, personalization has triumphed. Mr. Immelt foresaw much the same kind of thing happening with machines. “We can now track every jet engine separately throughout its life,” he said, giving each one the machine equivalent of a Facebook page, which states where it is and how it is “feeling,” making maintenance more efficient. Changing the behavior of devices will enable companies, he said, “to make sure you don’t allow any space between the customer and you.”


Stephen King's practical advice for tech writers

The lay audience has no special or expert knowledge. They connect with the human interest aspect of articles. They usually need background information; they expect more definition and description; and they may want attractive graphics or visuals. The managerial audience may or may not have more knowledge than the lay audience about the subject, but they need knowledge so they can make a decision about the issue. Any background information, facts, or statistics needed to make a decision should be highlighted. The experts may be the most demanding audience in terms of knowledge, presentation, and graphics or visuals. ... For the "expert" audience, ... style and vocabulary may be specialized or technical, source citations are reliable and up-to-date, and documentation is accurate.


Windows 10 on the Raspberry Pi: What you need to know

Windows 10 on the Pi should be able to run any Universal Windows app. Existing Windows Store apps for Windows 8 machines should also be able to be converted into Universal Windows apps, without "much effort", according to Microsoft. While the Windows Store has faced criticism for the poor selection of apps on offer - there are still a wide variety of apps that could be ported - although the performance on the Pi's smartphone-oriented hardware may vary. However, Microsoft is primarily pushing Windows 10 IoT Core - which can run on hardware with or without screens - as an OS that makes it easier to create IoT devices. This aim of lowering the barrier to building appliances is complemented by the Pi's low price and ability to control a range of hardware via its general-purpose input output (GPIO) pins.


Data centre security – Do you understand your risk?

Let’s assume for a moment that you still manage all or some of your data in-house. By implication that means that somewhere in the building you have a room full of servers that need to be maintained and protected. And as a manager you’ll be aware of the physical risks that threaten the integrity of your data. These include not only flood, fire and incursions by malicious third parties but also the havoc that can be created by unauthorized members of staff entering the secure area and, accidentally or deliberately, tampering with the equipment. Naturally enough you do your level best to protect your hardware and software from all these threats. So now let’s say that you’ve made an important decision to outsource your storage and IT functionality to an external data centre.


14 ways to improve corporate wellness programs with wearables

Wellness and fitness program managers should "take extraordinary steps" to protect sensitive information collected via wellness programs, Huffman said. He also suggested that companies work closely with HR managers to assure staff that their wellness program teams don't have access to sensitive data, such as employee health insurance claims.  Eric Dreiband, a partner with law firm Jones Day, stressed the importance of maintaining a secure "firewall" between data collected by wearable technology and personnel records. The goal is to keep staff health and fitness data away from supervisors or other decision makers, so that it cannot inadvertently affect employee pay or promotions.


Average Cost of Cyber-crime in the U.S. Rises to $15 Million

The Cost of Cyber Crime Study also examined global costs, which are not as high on average as those in the U.S. For the 2015 study, the global average annualized cost of cyber-crime is $7.7 million for a 1.9 percent year-over-year increase. The global study methodology examined 252 companies across seven countries, with 1,928 attacks used to measure the total cost. Specifically in the U.S., the study looked at 58 companies, with 638 cyber-attacks used to measure the total cost. "We were surprised by the consistent increase in the cost of cyber-crime over just one year in all countries," Larry Ponemon, chairman and founder of the Ponemon Institute, told eWEEK. "We believe this is due to the increased sophistication and stealth of cyber-attacks."



Quote for the day:

"Successful people make the most of the best and the best of the worst." -- Steve Keating

October 06, 2015

EU Court Of Justice Throws The Internet For A Loop In Ending Safe Harbor

In short, though, this is yet more damage directly done by the NSA and the US's ridiculous attitude towards mass surveillance, without any concern at all to the economic costs that such mass surveillance creates for US companies. As the EFF notes in its response to the news, the US brought this on itself with its idiotic mass surveillance efforts. This end result is a mess that could lead to greater fragmentation of the internet, which won't do anything to better protect people's privacy (and, actually, might make it more exposed). The only logical way forward is to move away from mass surveillance and towards a more comprehensive view of privacy that takes into account the public's rights -- including the right to free expression.


Cloud Computing: A data-centric business model

The most central aspect of any business is data because data is the fuel for all business processes. The custodian of this data is the business owner. The technical aspects of cloud computing are only tools for the provisioning, manipulating and storing of data. Decisions on all aspects of any cloud computing deployment must therefore be purposely driven by business process owners. The IT Team acts as the trusted technology advisor to and the technology execution arm of the business process owners. On the flip side, the business process owner must act as the trusted business advisor to and business execution arm of the IT Team. This defines why collaboration is essential in the delivery of a cloud computing solution. It also explains why the object of this collaboration must be business data.


The Modern Data Center: Challenges and Innovations

End-user and customers’ expectation levels have never been higher, and the demand for data shows no sign of slowing down. Data center managers must manage all of these elements while also remaining efficient and keeping costs under control. So where does the data center go from here? ... At the heart of the data center evolution is IT’s rapid rate of change. If you examine enterprise data centers, then you might observe the ways that cloud computing and hyperscale innovations are displacing traditional enterprise systems, with new paradigms pioneered by innovators like Amazon and Google. With new options being developed, enterprises now have to chart strategies for cloud computing, including public, private or hybrid cloud.


Cybersecurity through enterprise risk management

This shows a massive value gap between protecting against cybersecurity risks and the value lost in a cybersecurity breach. This also indicates that decision makers either don’t believe that the risk actually exists or they just don’t know how to control the risk. I believe that most decision makers would spend the money for protection if they believed it would control the risk. While this is a very immature space, some incredible technologies are now coming together that are capable of delivering a protection fabric instead of a bunch of security point products. In a majority of the key breaches that have happened, the affected organizations had substantial investments in security technology. Buying the right tools doesn’t necessarily protect you from a catastrophic security event.


Cyber security G&T – Investing yourself in engagement and education

People have to care, people have to retain, people have to recall and when they recall make (and keep making) a consciously secure choice – a choice that often feels awkward and frequently takes a little more effort than the insecure alternative … until it becomes a habit. I’m arguably stating the bleeding obvious there, unless you’re solely thinking about ‘lusers’: folk at the faraway coalface who just get told about good passwords, clearing desks, care they should take with links in mails and what has to happen when they inevitably lose their pass, smartphone or laptop. What about staff involved in change sign-off, procurement and strategic planning? Each of those have (or should have) a chunky security element, but how are those conversations and relationships at the moment?


Cloud services go mainstream in healthcare

Cloud brokering is happening elsewhere in healthcare, where CIOs are exercising the additional due diligence in embracing hosted software in the face of stringent regulations. Creative Solutions in Healthcare is running 100 percent of its infrastructure in a VMware public cloud, says Shawn Wiora, CIO and CISO of the Fort Worth, Texas, nursing home provider, which has 5,000 patients. ... For other healthcare CIOs, the business agility of cloud outweighs the risk of regulatory noncompliance. Partners in Health CIO Dave Mayo in 2013 began using Microsoft Azure and Office 365 to ensure that the nonprofit organization's 17,000 clinicians, which provide healthcare services in such impoverished countries as Rwanda, Haiti and Mexico, could reliably exchange information, including X-rays and other digital images. “Email is our supply chain,” Mayo says.


'Going virtual' may double your security costs

Why do cyberattacks involving virtualized environments cost twice as much? Kaspersky explained that the main reason is virtualized infrastructure gets used more often for mission-critical operations and for storing sensitive data. An attack on virtualized infrastructure, according to the survey, more frequently results in the loss of important data and the ability to operate essential services, and also in damage to the company's reputation. Next come the complexities and risks of virtualized environments. 56% of respondents feel fully prepared to tackle the complicated risks; Kaspersky argued that figure is inflated, calling it a "misguided impression." Just over half of firms surveyed (52%) believe that they understand those risks.


Technology CEOs Focus on Growth for the Future

Uncertainty. Disruption. Innovation. Standing at the forefront of change, companies in the technology space are often the first to feel the impact of a shifting global economy - positive or negative.  As part of KPMG’s 2015 Global CEO Outlook report, 102 technology c-suite executives were surveyed. They told us that despite the constantly evolving global business environment, they are feeling more confident in their growth prospects within the sector than they did last year.  Indeed, growth has become an imperative for global technology CEOs and developing new growth strategies is the top strategic priority over the next 3 years. Eighty-four percent of technology CEOs have stated they have an aggressive growth strategy; so what are technology CEOs doing to make sure they are on pace for growth?


Rating Agency Threatens to Downgrade Banks Over Security Shortcomings

By any measure, S&P's warning to the financial services industry about the threats they face from online attackers is belated. Indeed, it comes three years after financial services firms began suffering significant disruptions to their websites from a wave of DDoS attacks, nearly two years after the Target breach that resulted in the compromise of 40 million payment card accounts and related fraud , and one year after JPMorgan Chase suffered a breach that compromised information on 83 million households and small businesses. Financial services security expert Avivah Litan, an analyst for the consultancy Gartner, says it's no surprise that S&P is behind the curve on cybersecurity.


Your future in a world dominated by machines

"We need to get over the fact that the internet is no longer dominated by us," he told the LinuxCon Europe event in Dublin. Today a sizeable number of these algorithms are devoted to packaging us up as products, so our identities can be sold in online ad auctions that take place in the blink of an eye each time we load a web page. "These algorithms get together and they trade your identity, they trade your history, they trade and bid against each other for the right to show you information," he said, adding the trade generates multi-billion dollar revenues for purveyors such as Google and Facebook.



Quote for the day:

"There can be no courage unless you're scared." -- Eddie Rickenbacker

October 05, 2015

The reality of android soldiers and why laws for robots are doomed to failure

"Every decade, within 20 years we are going to have sentient robots and there is always somebody saying it, but if you look at the people on the ground working [on AI] they don't say this. They get on with the work. AI is mostly a practical subject developing things that you don't even know are AI — in your phone, in your car, that's the way we work." And even if, at some point in the far future, AI matures to the point at which a computer system can abide by the rules of war, the fundamental moral questions will still apply. Sharkey said, "You've still got the problems of accountability and people will have to decide is this morally what we want to have, a machine making that decision to kill a human."


What ‘digital’ really means

It’s tempting to look for simple definitions, but to be meaningful and sustainable, we believe that digital should be seen less as a thing and more a way of doing things. To help make this definition more concrete, we’ve broken it down into three attributes: creating value at the new frontiers of the business world, creating value in the processes that execute a vision of customer experiences, and building foundational capabilities that support the entire structure. Being digital requires being open to reexamining your entire way of doing business and understanding where the new frontiers of value are. For some companies, capturing new frontiers may be about developing entirely new businesses in adjacent categories; for others, it may be about identifying and going after new value pools in existing sectors.


How to identify and thwart insider threats

Though least privilege, zero trust approaches can limit damage from insiders, these are not fool proof. There are cases where data requires additional protections. An entitled employee for example might have full and unrestrained access to his work product in order to do his job. Likewise, an imposter can retrieve data in a very stealthy manner, avoiding the use of readily detected system scans and brute force dictionary attacks on login screens. Organizations should consider detection methods from the User Behavior Analytics space to deal with insiders, says Tierney. These methods apply behavioral baselines to identify attacks based on employee actions that deviate from normal, established behavior patterns.


Have it Your Way! You Pick the Cloud Model

Ask yourself how important performance and availability are to your company? Is 100 percent availability essential to your company’s survival? Do you have a highly available architecture? Is robust performance critical to your operational success? With by-the-instance cloud you will create both scale and availability by distributing content across multiple instances and geographies. Alternatively, resource pool-based clouds are ideal for environments with large transactional systems that have an underlying HA infrastructure and scale, at a granular level, to fine-tune your compute, network, or storage independent of one another. By-the-instance clouds tend to be less expensive on the front end since they do not include HA redundancy in the infrastructure.


Fifteen Trends Safeguarding Government

Every employee at every level of government is charged with protecting our information from for - eign and domestic hackers, who might use that information to harm or demoralize American sys - tems. Furthermore, this protection only becomes more important each day as more people, places, and things are connected to the Internet. As American government becomes increasingly connected, a question looms: How will our inter - ests and information be safeguarded as cyber - threats mount and evolve? Unfortunately, there is no silver bullet to cyberse - curity. Instead, government will have to adopt mul - tiple tactics that work in concert and evolve with new threat environments. In this guide, we explore the tools and strategies that public servants are using to safeguard our information systems.


Psychology Of Color To Improve Site Conversion

It’s important to understand that the psychology of color plays a big role in persuasion. Keep in mind that persuasion is different from coercion, manipulation, or simply being pushy. Instead, it’s about bringing the change in attitude necessary to encourage customers to take action. In this case, the action would be a conversion or purchase. Of course, an essential aspect of the psychology of color is value. If devoid of value, your products or services won’t sell regardless of the color scheme. For the psychology of color to work in your website’s favor, the content, design, loading speed, call for action, and other landing page factors must work in tandem.


Is The CIO The Next VP Of Electricity?

So, are CIOs on their way out? The answer depends on the scope of the CIO role. The new role is responsible for the full digital strategy of the organization. Companies that feel they have a weakness in their digital strategy tend to hire a CDO (Chief Digital Officer). When the CDO comes in to define a digital strategy, they spend a lot of time thinking about the customer needs and the full customer journey to find ways to enhance the company’s offering and better engage with customers across all devices. They think beyond the standard website and internal software to more creative ways to improve the customer experience. CIOs should embrace the CDO role. They should be open to reinventing their roles, positioning themselves as versatile experts capable of leveraging technology to empower the entire organization.


IoT: Can It Bridge The Digital Divide To Fulfill Its Promise?

Internet access and digital skills are key to unlocking the potential of the IoT, which can help with those challenges. Applications such as telecommuting, virtual meetings, app-based public transport, smart cars, smart logistics, smart buildings, and smart appliances can help curb emissions and provide more sustainable urban growth. "As of 2014, 60 percent of the global population did not have access to internet, and 56 percent out of this 60 percent belonged to emerging countries," according to the Frost & Sullivan website. "Given the benefits that developed economies derive from proliferation of internet, bridging this digital divide is a pressing global challenge necessitating enhanced public-private collaboration."


Finding your digital sweet spot

Of course, not all industries face the same opportunities or the same threats. Hotels and airlines, for instance, are greatly exposed to the disruptive potential of digital, with our research showing that over the next five years their share of sales via digital channels will rise to 50 percent in mature markets. This will clearly disadvantage digital laggards. Large grocery chains, on the other hand, could be less affected. Their share of sales via digital channels is expected to rise to just 10 percent. With an expense base dominated by the cost of goods sold, the potential for digital to radically transform their economics is somewhat constrained. To capture the value available, organizations will need to assess the value at stake, invest proportionally to that value, and align their business and operating models accordingly.


The Art of Dealing With Disaster

Unless you’ve not been involved in planning and implementing one, the complexity of a disaster recovery system may come as a surprise. I cannot provide a complete picture in a single blog post, but I can at least explain why such systems are complex. First of all there’s the expense. While it is technically feasible to completely replicate a data center somewhere a good distance away, so that computer systems are proof against a geographically widespread disaster, its also very expensive. Large businesses do that and some may still do, but nowadays the preferred and less expensive option is to use the cloud – Disaster Recovery as a Service, as it is called. There are several advantages, including the fact that you can choose a cloud disaster recovery site that is thousands of miles from your data center.



Quote for the day:

"The first task of a leader is to keep hope alive." -- Joe Batten

October 04, 2015

How Is Knowing the Business Important to Data Science?

Many Data Scientists forget the essential step of learning about the business from the business's perspective. Since the business is the customer of the Data Scientist, this can be easily boiled down to “What does the customer truly want to accomplish?” This simple but straightforward question may seem frivolous to an inexperienced Data Scientist, but getting at what the business objectives are for any Data Science project will create a necessary roadmap for moving forward. The fact of the matter is that most businesses have many competing objectives and constraints that have to be properly balanced in order to be successful on a day-to-day basis. As the Data Scientist, one of your primary aims in ensuring a successful Data Science project is uncovering important, possibly derailing factors that can impact outcomes.


The Best Android Wear Watch

Choosing the right Android Wear smartwatch remains a very personal decision. Given that the functionality of Android Wear is mostly consistent across devices you don’t necessarily lose any core experience from one watch to the other. If one simply looks gorgeous to you, chances are you’ll be happier with it in the long run. Below are detailed all the smartwatches running Android Wear available to buy right now. ... While a lot of the Android Wear watches are dust proof and can survive submerged in about 1M of water, the ZenWatch is little more susceptible to dust and cannot be submerged. ASUS’s time in the Android market has been slightly overshadowed by other, more established mobile-phone manufacturers, such as Samsung,


A CIO's guide to enterprise cloud migration

A poorly planned and implemented migration, however, can put a serious dent in the cloud business case. With that in mind, CIOs need to address a number of questions to ensure a smooth migration: Which enterprise cloud migration strategy is right for your organization, if any?; Which applications are suitable for the cloud and which aren't?; Do you have the appropriate tools to aid in migration efforts and cut back on expensive manual tasks?; and What types of computing workloads will work best in which specific types of clouds? In this CIO Essential Guide, we'll address these questions by exploring the intricacies of cloud migration and suggesting best practices for getting the job done.


Data Integrity - A Sequence of Words Lost in the World of Big Data

Data Integrity should, in my opinion, be enforced at the source to the greatest extent possible, to avoid unnecessary work at the end. I hate to bring it up in this day of Hadoop, but Relational Database Management Systems (RDBMS) still have their place in the world of data management. As stated earlier, there is no question about it, Big Data that satisfies the definition of at least the three V's listed above, requires a new approaches, e.g., Hadoop. However, if your data is not that big, consider more traditional means of managing your data to still obtain cutting edge advantages, like predictive analysis. Analysis of good data is worth a ton of analysis on bad data. Even in a Big Data environment, there are principles that, when enforced, will ensure the quality of the data, and enhance its value.


The workforce of the future will live in the cloud

The design of the workplace needs to put employees first, ensuring they have the necessary tools to work efficiently. According to a study by Cushman & Wakefield’s Global Business Consulting, the older generations of employeesadapt to the workplace, but millennials expect the workplace to be adapted to their preferences. By utilising cloud technologies, offices can adopt an open concept where employees may not necessarily be assigned to a fixed workstation, especially in organizations where employees have to travel between multiple offices frequently. The practice of ‘hot desking’, a concept where employees sit at any free desk or work from remote locations, has gained traction in a number of multi-national corporations today.


The Blockchain Might Be The Next Disruptive Technology

But to go ahead, the blockchain technology needs to fix a few issues. Starting with the network capacity. As we saw earlier, a block is added to the ledger every 10 minutes. Due to the limited size of a block (1MB), the network is restricted to processing 7 transactions per second (tps). This is way far from what VISA can handle, with up to 56,000 tps. A debate around the block size appeared a few weeks ago and a fork happened in the blockchain: A few miners started increasing block size to 8MB. And this sized is scheduled to double every two years. To solve this debate, if the Bitcoin XT reaches 75 percent of the network, the network will entirely switch to the new block size.


Brain Networking

By applying control theory equations to the wiring diagrams generated from brain scans, the researchers showed that the geographical and functional differences between regions of the brain are linked. While the analysis cannot say whether the frontal cortex’s location or its role evolved first, it suggests that part of the frontal cortex’s ability to control executive function depends on its distance from other parts of the brain network.  “This study heralds a new wave of network science, grounded in rigorous control theory,” said co-author Grafton, director of UCSB’s Brain Imaging Center. “When applied to state-of-the-art brain imaging data we begin to see some of the design tradeoffs inherent in the architecture of brain connections.”


Modeling Enterprise Risk Management and Security with the ArchiMate® Language

The importance of Enterprise Risk Management (ERM) and security rises with the progress of globalization and growth of the Internet. An increasing number of organizations interact with consumers and trading partners around the world, and are therefore exposed to an increasing variety of risks. In this context, organizations need to understand the variables that affect their operations, so describing, classifying, managing, and mitigating risk factors is very important. Enterprise Architects must help organizations manage risk through architectures that help avoid, transfer, mitigate, or accept adverse risks. Risk and security models help organizations develop guidance and take action to embrace opportunity and manage risk.


How Enterprise Cloud and Virtual Networking are Changing the Telco Market

As far as telcos are concerned, SDN is an enabling technology, not a revenue-generating product in itself. It is a new way to architect their networks that enables them to manage infrastructure and deliver services in new ways. “What’s more interesting is NFV and virtualization of services,” Chander said. NFV is a blueprint for defining those services, things like VPN, WAN, intrusion detection, firewall, and so on. It is virtualizing functions that used to be performed by physical boxes. They become software defined, but they are actual revenue-generating services. AT&T and Japan’s NTT Communications are examples of service providers that use SDN technologies in the most advanced ways.


Enterprise Architecture: Just Breathe and Find the Time to Plan

Just breathe. Besides being one of my favorite Pearl Jam songs, that is my advice when you are feeling the pressures of this brave new digital world. Just breathe – and start planning. That old adage “failing to plan is planning to fail” has never rung so true. With the category in its report, The Forrester Wave™: Enterprise Architecture Management Suites, Q3, 2015, we believe that Forrester is confirming that using EA to plan and manage business and IT transformation is essential for digital success. Today, IT is being called upon to move mountains and move them quickly. So just when it seems there is no time to sit down and plan ahead, that is the time when it is most important to keep calm.



Quote for the day:

"Leadership is a process of influencing the probability of achieving a desired change through human relationships." -- P Semark