November 09, 2015

H2O and the Magic of Machine Learning

What’s really interesting to me is if you think about how this pattern recognition technology can enable insights to be derived from data. It’s really compelling because before machine learning you needed people to come up with creative ideas and essentially superimpose their own perspective on to a data set. Whereas now with machine learning, you can, essentially, get some insights via machine learning into the different patterns that exist in the data. You’re basically facilitating that first step of a human being working with the information to try to understand what the segments are, maybe what they mean and give some direction to where that person goes and try to better analyze the data and then come up with some ideas, right?


Watch a man turn his arm into a virtual keyboard using a device

Japanese electronics powerhouse NEC is working on a system called, fittingly, “ARmKeypad,” which creates a virtual keyboard using a set of glasses and a smartwatch, The Wall Street Journal reports. NEC told the Wall Street Journal the keyboard’s main advantage is that, unlike voice-operated devices, it can be operated in noisy environments. The company sees it being useful in healthcare, manufacturing, document management, and security. The idea of typing on whatever surface we happen to be looking at is something long promised by science fiction films but that's been slower to move into reality. And the arm is a start. The company plans to publicly release the ARmKeypad in 2016.


Gartner Predicts Our Digital Future

Here’s a scene from our digital future: You sit down to dinner at a restaurant where your server was selected by a “robo-boss” based on an optimized match of personality and interaction profile, and the angle at which he presents your plate, or how quickly he smiles can be evaluated for further review. Or, perhaps you walk into a store to try on clothes and ask the digital customer assistant embedded in the mirror to recommend an outfit in your size, in stock and on sale. Afterwards, you simply tell it to bill you from your mobile and skip the checkout line. These scenarios describe two predictions in what will be an algorithmic and smart machine driven world where people and machines must define harmonious relationships.


Deep Learning in a Nutshell: Core Concepts

Feature engineering is the most important skill when you want to achieve good results for most predictions tasks. However, it is difficult to learn and master since different data sets and different kinds of data require different feature engineering approaches. Only crude guidelines exist, which makes feature engineering more of an art than a science. Features that are usable for one data set often are not usable for other data sets (for example the next image data set only contains land animals). The difficulty of feature engineering and the effort involved is the main reason to seek algorithms that can learn features; that is, algorithms that automatically engineer features.


Taming today's cyberthreat landscape: A CIO checklist

One of the few things the "experts" seem to agree upon is that cybercrime is a clear and present danger to our national security. These issues have gone way beyond the province of esoteric IT journals and cultish science fiction novels -- they have invaded our daily collective consciousness and well-being as individuals, as families, as companies, as governments, as a society and as a culture at large. Many opine at great length on how the cyber landscape has become the new battleground upon which future wars will be fought: Nations will rise and fall based upon their techno-prowess to aggressively attack and defend against the new breed of cybercriminals.


Flash storage: Is there a tipping point anytime soon?

Flash is still too expensive for general use when compared to conventional disk storage, which offers much higher capacities than flash at a fraction of the cost. Now the signs are that we are going to see that situation changing -- but if the analysts are to be believed, that is not going to happen quickly. "When you go to refresh your technology, you look at flash and now you think about phasing it in," said Valdis Filks, the expert on flash storage at analyst house Gartner. But as he explained, this will take some time: "It is only after two or three cycles [of technology upgrades] that most companies can bring in a complete change in technology, like a move to all flash".


The Data Movement Dilemma

Most organizations quickly realize, if they analyze their situation, that it isn’t possible to adopt a single solution for data movement. There will already be a variety of different approaches implemented throughout their systems, and in most cases, the technology will be fit for purpose. Nevertheless, they are also likely to discover that the dynamics of new applications, coupled with data growth in many areas, will inevitably stress some data movement technologies as time passes. The problem is to “maintain the plumbing” and replace only those parts that are under stress and in danger of being overwhelmed. The only solution that comes to mind is a capability that can to manage data movement with an automation capability, like Automic’s, that can monitor every data transfer and provide actionable information when specific service levels are threatened.


Japan its own enemy in push to improve cybersecurity

"In the U.S., if they find a problem, they have to report," he said. "The Japanese engineer feels he fails his duty if he escalates a report. They feel ashamed." To be sure, the cybersecurity industry around the world, not just in Japan, frequently echoes the call for greater transparency within and among organizations. The U.S. Senate last month passed the Cybersecurity Information Sharing Act to ease data sharing between private companies and the government for security purposes, although civil liberties advocates warned it posed a threat to privacy. But the problem may be particularly acute for Japan's private sector behemoths and government ministries. These sprawling bureaucracies are wrapped in a "negative culture that cuts against wanting to communicate quickly," said William H. Saito, the top cybersecurity adviser to Prime Minister Shinzo Abe.


CloudFlare Supplies Security At Network's Edge

"We're equivalent to CloudFront, Amazon's Edge product, but we're built to have more flexibility," said Matthew Prince, cofounder and CEO of CloudFlare in San Francisco. Prince was literally moving between 665 Third Street and 101 Townsend Street, CloudFlare's new home, when InformationWeek caught up with him in the South of Market section of the city, not far from where the Giants baseball team plays at AT&T Stadium. CloudFlare's building is still a work in progress -- a former warehouse converted to offices a long time ago but still needing a lot of modernization and some finishing touches. The move was delayed by the need to get the building rezoned for offices.


How Carders Can Use eBay as a Virtual ATM

So-called “triangulation fraud” — scammers using stolen cards to buy merchandise won at auction by other eBay members — is not a new scam. But it’s a crime that’s getting more sophisticated and automated, at least according to a victim retailer who reached out to KrebsOnSecurity recently after he was walloped in one such fraud scheme. The victim company — which spoke on condition of anonymity — has a fairly strong e-commerce presence, and is growing rapidly. For the past two years, it was among the Top 500 online retailers as ranked by InternetRetailer.com. The company was hit with over 40 orders across three weeks for products that later traced back to stolen credit card data.



Quote for the day:


"The leader who exercises power with honor will work from the inside out, starting with himself." --Blaine Lee


November 08, 2015

AIOTI publishes recommendations on the future of the Internet of Things

The report from WG01 built on the work of the IoT Research Cluster (IERC) and is focused on boosting the IoT technological advancements and converging the shaping and development of new dynamic business models and IoT ecosystems. Aschair of the AIOTI WG01, Dr. Ovidiu Vermesan Chief, Scientist at SINTEFsaid: "our report will promote the market emergence of IoT and overcome the fragmentation of 'silos', architectures and applications. IoT technology is the needed enabler for eliminating the 'digital divide' and creating the basis for the implementation of the Digital Single Market".


What the Windows 7 Pro sales lifecycle changes mean to consumers and business buyers

Enterprise deployments are essentially immune from the Microsoft sales lifecycle. In big organizations, IT departments buy Volume License editions of Windows with the Software Assurance add-on, which give them the freedom to deploy a consistent image of whatever Windows version they've chosen as their corporate standard. The two-year extension makes it easier for small and medium-size businesses to get some of that flexibility. Because the end-of-sales date for consumer editions of Windows 7 PCs arrived as scheduled in 2014, new PCs running those editions are difficult to find. But business PCs with Windows 7 preinstalled can continue to be sold until late 2016.


Connecting humans and computers

It’s important to think about how wearable devices could incorporate larger viewing experience, either by extending the display or leveraging external displays opportunistically. There is some exciting research going on at Microsoft, Mitsubishi and Disney which is looking into projecting displays from wearables onto nearby walls, so that information within the device is easier to expose and interact with. As these devices become really small, I think that these factors will be critical to balancing user experience with form and maintaining the convenience that we have with desktop and notebook computing.The next issue with wearables is the quality of inference from sensor data. In my opinion as a researcher, Fitbit and other activity trackers of that sort are inadequate due to poor inference qualities.


Digital Transformation Going Mainstream in 2016, IDC Predicts

The digital technologies that are changing the economics and practices of traditional business — cloud computing, mobile devices, advanced data analysis and artificial intelligence — are better, cheaper and more widely available. “Mainstream companies in every industry are realizing they’ll be disrupted if they don’t get moving now,” said Frank Gens, IDC’s chief analyst and the report’s principal author. Many of these companies, according to IDC, are not moving fast enough. It predicts that a third of the top 20 companies in every industry will be “disrupted” over the next three years, meaning their revenue, profits and market position will deteriorate — not that they will go out of business.


How will blockchain technology transform financial services?

For the financial services sector it offers the opportunity to overhaul existing banking infrastructure, speed settlements and streamline stock exchanges, although regulators will want to be assured that it can be done securely. The developments potentially combine two of the most dynamic industries: the computing hub of Silicon Valley and the money management of Wall Street and the City of London. “We could go the way that file transfer technology changed music, allowing new businesses like iTunes to emerge,” says Michael Harte, chief operations and technology officer at Barclays. “That is why there is such feverish activity at the moment.”


The ironic history of the hybrid cloud

It is interesting to note that the frame of reference for this was the mainframe, which was the prevalent form of Enterprise Computing at the time. Ironically, in many ways cloud computing actually evolved from core concepts that are very mainframe centric. By the way, it should come as some surprise that the mainframe, which was called dead back in the 1980s, is growing at 20 percent year over year according to IBM’s latest financials [Disclosure: IBM is a client of the writer]. However Licklider’s vision went well beyond the initial Internet, which was more about communication. This vision was for everyone on the globe to be interconnected and able to access programs and data at any site from anywhere.


How NSX Simplifies and Enables True Disaster Recovery with Site Recovery Manager

The primary use cases are full site disaster recovery scenarios or unplanned outage where the primary site can go down due to a disaster and secondary site takes immediate control and enables business continuity. The other key use case is planned datacenter migration scenarios where one could migrate workloads from one site to another maintaining the underlying networking and security profiles. The main difference between the two use cases is the frequency of the synchronization runs. In a datacenter migration use case you can take one datacenter running NSX and reproduce the entire networking configuration on the DR side in a single run of the synchronization workflow or run it once initially and then a second time to incrementally update the NSX objects before cutover.


Microservices Decoded: Best Practices and Stacks

Earlier incarnations of microservice concepts were aptly titled 'Service Oriented Architecture' (SOA), however this term was too broad in scope and specific implementation strategies were vague. ... Clarity within software engineering field surrounding microservice architecture is currently a bit ambiguous. This is a result of the immaturity of the architecture itself and lack of industry agreed upon conventions. As microservice solutions gain notoriety the more refined, low-level definitions and specification criteria will also inherently evolve. Until these definitions and specifications mature we will can analyze and identify a number of generally accepted characteristics surrounding microservices based on pioneers who have implemented scaled and functioning microservice solutions.


Bitcoin is off to the races again - and it could soar higher

"The global banks and wire-houses have meaningfully gotten involved in the space," said Michael Sonnenshein, director of business development and sales at Grayscale Investments, which manages the Bitcoin Investment Trust, a publicly listed vehicle that tracks bitcoin. "In 2013, they were beginning to dip their toe, but primarily behind closed doors and within internal working groups." There are still lingering issues surrounding bitcoin's validity. To be sure, it is volatile and - because its loosely regulated - a draw for frauds and criminals. Some big names in the crytptocurrency community - perhaps most notably Blythe Masters, the CEO of Digital Asset Holdings - have been critical of bitcoin and say the underpinning blockchain technology is actually what's most sexy to Wall Street.


Best Practices for Optimizing the Requirements Process

This web seminar will focus on best practices for creating a fully optimized requirements life cycle that can be leveraged by any organization into project success. Drawing upon years of experience from many successful projects, the experts from Greenridge Business Systems will offer insight into how to take advantage of a “people, process and technology” approach to requirements that can have a dramatic positive impact. A case study involving a large-scale government project will also be showcased. Attendees will also learn requirements gathering best practices when large numbers of stakeholders are involved and how visualization reduces confusion through real-time collaboration and the use of fully immersive and functional simulations.



Quote for the day:


"People don't resist change. They resist being changed." -- Peter M. Senge


November 07, 2015

Why use NGINX as a load balancer?

In addition to being free, scalable, and easier to maintain, the key reason many organizations want an open source load balancer is that it provides a more flexible development environment, which helps organizations adopt a more agile development process. Sarah says that when compared with other options, NGINX offers huge performance improvements. "With NGINX, organizations can deliver applications reliably and without fear of instance, VM, or hardware failure," she says. "This is crucial as websites and applications make their way into our everyday lives." In the typical setup in most organizations, web server and ADC (application delivery components, often hardware) are separate components. But when it comes to web application delivery, NGINX is changing that approach.


Cyber-security: The cost of immaturity

All sorts of companies offer cyber-security services, from small, specialist outfits to giant arms companies such as BAE Systems (which TalkTalk has hired to sort out its mess). The biggest firms are finding it hard to keep staff. As in the public-relations and corporate-intelligence industries, if you know your stuff, you can make more money starting up on your own. Venture-capitalists are not showering money on the industry as prodigiously as they did a year ago, but the fast growth rate means that raising capital is still easy. The big companies are still able to trade on their brand name (nobody gets fired for hiring IBM) but the mammals are beating the dinosaurs.


Mobile Collaboration: Where Does It Rank on Your Priority List?

Collaboration is a major driver for increased mobile usage. We’ve used chat and messaging tools to maintain personal connections for years with popular apps like FaceTime, WhatsApp, Voxer, and many others. With their success in fostering simple and straightforward communication, it was only a matter of time before these apps found their way into the business world. This “consumerization of IT” is paving the way for new breeds of business-class technology to redefine the boundaries of the workplace. But it is more than technology fueling this shift. The way teams form and work together has changed as well.


How data screwups may decide the fitness tracker wars

The fitness tracker war won't be won or lost on hardware design, app graphics, the ability to track exercise and sleep or the response to a well-heeled rival like Apple or Samsung. The fitness tech game will be won on how well vendors handle your data. Every relationship has a breaking point -- the one moment when you say enough and move on forever. Apply that axiom to the fitness tracking industry and the breaking point is when your favorite wearable loses your data. In recent months, I've suffered data losses about a dozen times across two vendors. If you use a fitness tracker, there's nothing worse than going for a run, hitting 20,000 steps and watching the app give you credit and then refresh and lose the information. It's like the run never happened.


Mocking Financial Middleware System

Integration is primarily core part of any financial application as either way you have to integrate with banking host or middle ware and this is not an easy job at all. Do keep in mind that Host systems usually refers to Core Banking Systems and Middle ware is actually channel integrator that talks to host systems like ATM, SMS, phone banking, IVR, WAP, etc In the development environment the most critical challenge is to write integration code offsite because middleware or host systems are not available at development centers. This critical limitation forces companies to do all the integration onsite which obviously increase the development and post production support cost because in majority of cases fixes needs to be investigated onsite.


Delivering Software with Water-Scrum-Fall

Agile is a mindset, a set of guidelines, Scrum is a framework that can be deployed, it has strict rules and events to follow, they are not the same thing. Agile thinking exposes our inability to deliver fast, it drives out what the customer actually wants and improves quality by providing multiple opportunities for continuous feedback, which in turn focuses the developers towards how to build the right thing right. There some simple things you should start to be aware of and look to change. Firstly collaboration. This has to start with engaging your customers, they need to understand how you work, especially if you are going to use Scrum or even just looking to change the way you work. Your customers will need to understand what is capable and what role they will need play.


Jane Austen on Python: The intersection of literature and tech

Creative thinking is required to determine where our code might break, to build in checks, and to return useful data. Any programmer can return the error message, but to compose an error message that is helpful—rather than intimidating—requires a programmer who is also a creative thinker and possesses excellent written and verbal communication skills. When you're writing good tests, you're doing world building: Accessibility requires empathy, and empathy requires imagination. You can leverage that awesome feeling you get when you get lost in a book and identify with the main character by putting yourself in the shoes of the people using your code. Imagine their struggles and frustrations. Create a persona for them. Fix the things that hinder or annoy them about your app.


Why Ford is shifting its focus from cars to 'mobility'

Ford has taken several steps to address these larger transportation issues. A big piece is a new focus on e-bikes. In June, they unveiled the MoDe:Flex, a versatile bike that can be used in different needs such as the road, mountain or city riding. Another is "GetAround"—in which customers who finance through Ford credit can allow vehicles to become part of a peer-to-peer carsharing service. The company's innovate mobility series challenged cities around the world to solve different mobility problems, specific to local communities. In Mumbai, for example, the problem was how to get around in monsoon season. The solution: Using data you could get from the car. Windshield wipers, Klampfl said, could indicate heavy rain in different areas.


A Twitter app for rural Kenyan potato farmers

“SokoShambani is a market-based micro-logistics platform that enables small-scale farmers to trade directly with high value market entities,” explains Stephen Kimiri, the CEO and developer. Farmers subscribe to a free SMS service on the 8988 short-code powered by Twitter and @ViaziSouthRift. “Through this, they are able to trade directly while sharing farming intelligence, market reports and updates,” explains Kimiri. The startup has singled out potato farmers in rural Kenya after noting that potato is a staple food second only to maize in Kenya and that farmers are usually given a raw deal for their produce in the markets. “With such a small number of big consumers with stable and obvious demand, an ineffective supply chain and large number of small-scale participants, it makes this value chain particularly ‘ripe’ for intervention,” says Kimiri.


SharePoint Server 2016: IT's Ultimate Swiss Army Knife?

Information technology leadership faces unique strategy con­cerns that simply didn't exist 10 years ago. Managing the relationship between cloud, mobile and on-premises applications requires an eye toward innovation and change -- and a willingness to take a few risks to improve business practices. A recent Gartner Inc. report, "Flipping to Digital Leadership: Insights from the 2015 Gartner CIO Agenda Report," best describes the challenges of IT decision makers. "Seizing this opportunity requires flipping long-held behaviors and beliefs -- from a legacy perspective to a digital one in information and technology leadership, from a focus on the visible to the genuinely valuable in value leadership, and from control to vision in people leadership."



Quote for the day:


"Nothing will ever be attempted if all possible objections must first be overcome." -- Samuel Johnson


November 06, 2015

Cyber liability from perspective of board members and execs

What actually constitutes negligence by failing to take “reasonable efforts?” It appears to have been a sequel injection that led to TalkTalk being breached as well the JP Morgan Chase Corporate Challenge website. Yet “SQLi has been listed on the industry standard OWASP Top 10 for more than a decade. Should TalkTalk or the third-party contractor who built and managed JP Morgan’s site be liable for not finding such a common, well-known vulnerability?” ... Companies with “a dedicated CISO detected more security incidents and reported lower average financial losses per incident,” so should we “assume that a company that does not have a CISO is not making a reasonable effort to secure data?”


Microsoft and Red Hat Sign Unlikely Deal to Support Enterprise Hybrid Cloud

Developers will gain access to .NET technologies across Red Hat offerings,” giving developers the ability to build applications and include .NET services,” Paul Cormier, Red Hat executive vice president and president, Products and Technologies, said in a briefing. He called the partnership a “powerful win for the enterprise customer.” “I think everyone knows that there is no doubt now that Linux is a key part of enterprise computing today,” Cormier said. With “cloud at the center of Microsoft’s strategy going forward” the company sees its capabilities around hybrid cloud as a differentiation in the market, Scott Guthrie, EVP of the cloud and enterprise group at Microsoft said.


100 open source Big Data architecture papers for data professionals.

If you are a Big Data enthusiast or a technologist ramping up (or scratching your head), it is important to spend some serious time deeply understanding the architecture of key systems to appreciate its evolution. Understanding the architectural components and subtleties would also help you choose and apply the appropriate technology for your use case. In my journey over the last few years, some literature has helped me become a better educated data professional. My goal here is to not only share the literature but consequently also use the opportunity to put some sanity into the labyrinth of open source systems.  One caution, most of the reference literature included is hugely skewed towards deep architecture overview (in most cases original research papers) than simply provide you with basic overview.


Microsoft risks IT ire with Windows 10 update push

Microsoft has made it clear that it will take on a greater role in managing the Windows update process with Windows 10. The company has also made it clear that it will aggressively push users -- both consumers and businesses -- to upgrade from Windows 7 and Windows 8 to its latest OS. With that in mind, it's hard to image either predecessor hanging around anywhere near as long as Windows XP. The decision to not only push updates out, but also ensure that all Windows 10 devices receive them in a timely fashion, fits well with the concept of Windows as a service. The change may even go unnoticed by many consumers. IT departments, however, are keenly aware of this shift -- and many aren't happy about it.


Facebook CTO: Firms should wait before jumping on VR bandwagon

"Compare it to the development of previous computing platforms, like phones and computers, I think the first smartphones came out in 2003," he said. "In the first year, I think BlackBerry and Palm Treo were the initial smartphones that came out. I think they each sold in the hundreds of thousands of units. So just to kind of give a sense of the time frame that we're thinking about this and how we expect this to develop, that's how we're thinking." Schroepfer also believes that VR headsets will grow to be as popular phones are today but that it's important not to mislead people on the rate of adoption. "I'm incredibly bullish on VR but it's a brand new platform and it will take a while to develop.


50 years of Data Science

This paper reviews some ingredients of the current “Data Science moment”, including recent commentary about data science in the popular media, and about how/whether Data Science is really different from Statistics. The now-contemplated field of Data Science amounts to a superset of the fields of statistics and machine learning which adds some technology for ‘scaling up’ to ‘big data’. This chosen superset is motivated by commercial rather than intellectual developments. ... Because all of science itself will soon become data that can be mined, the imminent revolution in Data Science is not about mere ‘scaling up’, but instead the emergence of scientific studies of data analysis science-wide. In the future, we will be able to predict how a proposal to change data analysis workflows would impact the validity of data analysis across all of science, even predicting the impacts field-by-field.


EU tells US it must make next move on new Safe Harbor deal

Safe Harbor was simple for European companies to implement, as all they had to do was contract with a U.S. data processor registered under the agreement. It was the responsibility of the U.S. company to ensure compliance. The alternative mechanisms provided for in the EU's 1995 Data Protection Directive -- standard contract clauses, binding corporate rules, or obtaining the informed consent of the person whose data is transferred -- put the responsibility squarely on the company at the origin of the transfer. "Whatever they choose, they must be able to prove that the protection is in place, that they guarantee the protection of data transferred to the U.S. This is especially a challenge for SMEs," Jourová said.


Semantic Technology Is Not Only For Data Geeks

Innovative data architects and vendors realize that semantics is the key to bringing context and meaning to our information so we can extract those much-needed business insights, at scale, and more importantly, personalized. Data relevance has always mattered. In today's hyperclimate, where customer and business success is measured in seconds and minutes, data relevance is measured in microseconds. Results of data relevance, or the lack of it, can be magnified. Think about the reaction to a retailer's stock and reputation when there is a security breach of customer credit cards. Consider how an ill-thought-out tweet by an executive of a clothing company alienates customers, bringing down sales and revenue as it speeds across social media and the news.


Embedded systems face design, power, security challenges

Prestridge notes that (despite the noteworthy hacks lately) the automotive industry has been working on security for years, as has the medical and aerospace industry. ... Prestridge outlines the challenge: “Functional safety-certified tools aren’t enough; code analysis tools (both static and runtime) can help ferret out potential security issues by spotting things like the classic buffer overrun exploit before the design gets in the field. By using code analysis tools, developers can prevent these problems before they ever get checked into a build. And by selecting a pre-certified tool that has already been quality-tested by an independent third-party organization specialized on safety requirements, entire companies can save valuable time and money.”


Dropbox Enterprise Targets Large Businesses

Box understood this early on, and has made headway in the enterprise market. Dropbox focused on growth before revenue, then launched Dropbox for Business in 2013. Now, it finds itself trying to bring more paying customers to its expansive, under-monetized user base of 400 million individuals and 8 million businesses. ... Dropbox Enterprise represents a new tier in the Dropbox Business offering. It adds deployment tools to help IT administrators rapidly migrate and create accounts. It offers domain controls to give administrators insight into personal Dropbox usage on corporate domains. It allows for collaboration visibility to provide IT with oversight of Dropbox files shared with external personnel. It also provides unrestricted access to the Dropbox API for integrating the service with existing IT systems, as well as access to a customer manager for assistance.



Quote for the day:


"In conclusion,IT has come a long way in India, today we're a nation of a connected billion. How do we use this connectivity going forward?" -- @Sampitroda


November 05, 2015

Top 4 open source IRC clients

Like a lot of people involved in the open source movement, though I use a variety of different tools for real time communications, I just can't seem to get away from IRC. While IRC isn't perfect, and I don’t love some of its quirks, it's here to stay for at least the foreseeable future as its low barrier to entry and wide selection of open source clients make IRC, and particularly Freenode, the go-to place for open source projects to collaborate. But it's been awhile since I’ve evaluated what tools I use to connect to IRC. Given how much time I spend there, I thought it's about time to take a look at what my options are and see if there’s a client that can better meet my needs.


How IT can win over management teams and influence boards

CFOs should be focused on how to deploy capital in the best possible way and just not get burdened with recording past transactions. The goal need to be providing CFOs with all the tools necessary to shape the future financial performance of the enterprise. Most organizations are behind the curve in adopting modern collaboration tools, world class information warehouses and data lakes, as well as reporting and modern trends such as cloud and mobile computing. The CIO’s goal should be to earn the trust of the management team, roll up his or her sleeves and attack immediate problems, while at the same time putting a longterm plan in place to make IT a strategic and core competency of the enterprise.


Surveillance law will force companies to retain customers' web surfing history

The bill describes this requirement as the retention of internet connection records, or ICR. Currently there is no requirement for communications companies to store this data, and so law-enforcement agencies can often only paint a fragmented intelligence picture of a known suspect. The government said an ICR is a record of the internet services a specific device has connected to, "such as a website or instant-messaging application". It insisted: "An ICR is not a person's full internet browsing history. It is a record of the services that they have connected to, which can provide vital investigative leads. It would not reveal every web page that they visit or anything that they do on that web page."


Rethinking your defense: the real-time intelligent security command centre

The real-time economy comes with real-time threats and knowing what happens on your network 24/7 is nothing less than a must. To achieve this, a big data security platform with artificial intelligence is the cornerstone of your defense. It’s the real-time intelligent command center and dashboard enabling you to fight evil as it happens and even before it does. ... With BT Assure Analytics your security Samurai are equipped with a big data platform which can bring together the mass of data from across your security systems. It can weigh up the risks and work out which systems are under threat – immediately. So you’ll know how to firm up your best defense before an attack happens. The artificial intelligence gives your security Samurai the edge over potential attackers!


Symantec launches cyberthreat intelligence service for the enterprise

This week, Symantec announced the launch of Directed Threat Research, a threat intelligence program which provides the enterprise with industry threat data. Symantec's Al Cooley and Roger Park said in a blog post that the foundation of the program, built with DeepSight Intelligence, combines telemetry from Symantec's Global Intelligence Network with threat analysis to provide enterprise players with the "full picture" of today's threats -- from the adversary to their tactics and intended victims. "DeepSight Intelligence gives broad visibility to global and industry specific threats; however, sometimes urgency and the amorphic nature of threats leave security operations without any results from intelligence sources," Symantec said.


Context Is King: What’s Your Software’s Operating Range?

The operating-range metaphor might help you understand my point. For example, the operating temperature is the temperature at which an electrical or mechanical device operates. The device will operate effectively within that range; outside that range, the device might fail. The user manual for your laptop, printer, and refrigerator likely included a short chapter detailing the device’s operating environment. If you’re like me, you probably paid little attention to that section or skipped it. In most cases this is fine because you’re using these devices in the environment for which they were designed. But if you were to use them in an extreme environment, that information would suddenly become quite relevant.


Simple Authentication using Jwt in Asp.Net Web Api 2.2

In an enterprise settings the best way to implement token based authentication is to use a separate Security Token Service (STS). When users log in to the client application, the client application then sends those credentials together with its own identity information to the STS for verification. The STS examines these credentials and checks if the user has permissions on the requested resource. If everything is OK, the STS then issues a token with information about what claims or permissions the user has on requested resources, back to the client application. After receiving the token, the client application then presents the token to the resource holding server which in turn if the user has the right permissions, let them access the secure resource.


Strategies for a next-generation security architecture

Uncovering certain vulnerabilities and crafting the mechanics of a hack is very, very dangerous but not necessarily illegal, and, in fact, it's very dangerous to make it illegal. There's not just this specialization, but also this distribution of risk, and that, in turn, is setting up the possibility that people can go in and literally buy cyber terrorists armies to do what they want to do, and as we're starting to see countries move against each other, we're starting to get into science fiction land.  It's going to get worse before it gets better because the stakes are now really high. There's a lot of money to be made. Obviously, it's worth it to the criminals to take on more risk because you take on risk when there's more money at the other end of it, and it's also worth taking the time and effort to develop some of the skills.


CIO interview: Mark Hutchinson, South Manchester NHS

The trust is planning to begin recruitment imminently, and is looking to fill around 15 new posts. “We’re looking for people who have experience with configuring clinical IT systems, people with experience in business process redesign, people who understand clinical environments, tech roles like developers, people who can write interfaces and infrastructure engineers,” says Hutchinson says, to mention a few. “In general, we are looking for people with the right skills and values, who want a challenge and who want to help improve patient care at UHSM.” The trust is also heavily involving clinicians in creating pathways and workflows that work well for them as part of the IT projects. These include consultants, pharmacists, allied health professionals, pathology and nurses.


Programmers: Stop Calling Yourselves Engineers

It’s no accident that the most truly engineered of software-engineering projects extend well beyond the computer. Autonomous-vehicle design offers the most obvious contemporary example. When Google designs self-driving cars, it musters its own computational systems, like mapping and navigation. But it also integrates those into a world much larger than browsers and smartphones and data centers. Autonomous vehicles share the roads with human-driven cars, pedestrians, and bicyclists. Those roads are managed, maintained, and regulated. Self-driving cars also interface with federal motor-vehicle standards and regulations, along with all the other material demands and foibles of a machine made of metal and plastic and rubber rather than bits. Engineering addresses complex, large-scale systems.



Quote for the day:


“Great leaders create memorable journeys” -- John Stein


November 03, 2015

How The Internet Of Things Is Changing Work

Hooking up workplaces and environments to the world of IoT is often as easy as wiring a building up with IT cabling, says Justin Lee, CEO of real estate firm TheSquareFoot. So long as a workplace can be hooked up to the Internet, it can usually be effectively outfitted with an IoT system—i.e., sensors that generate data talking to each other and sending that data somewhere. Cost to outfit a workplace ramps up as the workforce increases in size, and while IoT solutions are becoming more common for smaller businesses, IoT solutions for large corporations over 1,000 people are not nearly as commercialized or streamlined yet, says Lee. But we're not yet at a place where real estate understands how to prepare an IoT-ready workplace.


10 tips to meet your project planning goals

If you’re a project manager, chances are your daily calendar is already filled from the moment you sit down at your desk to whatever time of day – or evening, most likely – you clock out. Many people at all levels of the enterprise rely heavily on you to have a solid grasp on all aspects of project management, including timing, status and direction of projects, at all times. ... Strategy should drive business activities, including projects, and not the other way around…otherwise the project is simply a pointless exercise. By ensuring strategic alignment, project managers can help organizations avoid ambiguous PMO direction, underutilized PMO resources, low company performance at a high cost, and declining project success rates. Alignment helps to establish a shared vision.


Instead of replacing individual desktops every year, companies only have to replace thin clients every 5 years. And when it comes time to do updates, the IT staff updates the one computer instead of spending time updating every individual workstation. VDI is a great solution for most companies. But if every employee in the company has to process large amounts of data, that one computer may not be powerful enough. If there are a large number of employees and each employee’s workstation requires multiple GPUs to process data quickly, switching to a Virtual Desktop Infrastructure may not be cost effective since there are still only a small number of open slots for GPUs in most computers.


To land a data center job in this evolving space, work relevant, change-focused terminology into your interviews for engineer, operations or manager positions. Simply rattling off DevOps and automation terms won't impress an interviewer, nor will a prevaricating job candidate who lacks the fundamentals to grow in a data center position. We've created fun visual cues in this slideshow of hot data center terminology to help you understand and describe modern data center operations. Establish your knowledge of IT infrastructure scalability and resiliency, culture and business trends as well as other defining developments while leaving a strong impression on your future employer.


What you need to do is get your head in the cloud in order to understand a new wave of threats and identify ways to strengthen defenses. I’m not just talking about the benefits of using the cloud for security – unlimited storage capabilities for global threat intelligence and historical data, powerful processing capabilities for security analytics, and the ability to deploy security technologies to even the most remote outposts. You also need think about how attackers are now banking on the increasing usage of Software as a Service (SaaS) apps and the advent of Shadow IT and resulting Shadow Data (as I discussed previously) to steal valuable digital assets. These attacks often incorporate basic tactics but with a modern twist.


Scaling Docker with Kubernetes V1

Kubernetes is an open source project to manage a cluster of Linux containers as a single system, managing and running Docker containers across multiple hosts, offering co-location of containers, service discovery and replication control. It was started by Google and now it is supported by Microsoft, RedHat, IBM and Docker amongst others. Google has been using container technology for over ten years, starting over 2 billion containers per week. With Kubernetes it shares its container expertise creating an open platform to run containers at scale. The project serves two purposes. Once you are using Docker containers the next question is how to scale and start containers across multiple Docker hosts, balancing the containers across them. It also adds a higher level API to define how containers are logically grouped, allowing to define pools of containers, load balancing and affinity.


Help Wanted: Security Analytics Unicorn

Today’s cyber attacks are increasing in sophistication and stealth. Malicious parties can infiltrate an organization’s network and rest undetected for weeks, months, even years, without raising a red flag. If targeted attackers have any virtues at all - patience tops the list. Because cyber criminals are willing to wait and collect sensitive information over time, rather than execute a flash attack, security analysts need to be able to identify and visualize user and activity patterns spanning longer periods of time. Understanding what “normal patterns” look like in a simple way enables security analysts to connect the dots at a higher level in order to detect important anomalies. Without the skills and tools to transform security analysts into entry-level data scientists, this is easier said than done.


Government as a platform, or a platform for government? Which are we getting?

The distinction here – and government’s choice – between a blueprint for GaaP that supports participation versus one that supports mere access, is critical. The former is about democratic re-invigoration, and the latter is about – well, just technology. Participation is much more disruptive to existing modes of organising within government. ... At one point, Chi Onwurah MP, who ably led the review, mentioned that she was comfortable with a notion that she coined as “platform for government” – let’s call this PfG – but less happy with “government as a platform”. Her distinction between GaaP and PfG is useful in helping to think through the dimensions, and thus the significant implications, of what is at stake. The table below summarises some of the most important issues.


How can you tell if your Web application has been hacked? “When your Web application is compromised, it will start to do things out of the ordinary,” says Steve Durbin, managing director of Information Security Forum. The key is to gain a thorough understanding of what constitutes normal behavior for your application, then keep your eyes peeled for aberrations. ... Don’t be so focused on what’s moving outside the network that you ignore lateral movement. If the Web server is communicating with other internal network resources, such as user file shares and individual user computers, that can be a sign attackers have gained entry and are moving around the network. If the application lets users upload files, then make sure it uses a dedicated file server and not a general one employed within the enterprise, for example.


Confusing the ends and the means

What everyone gets wrong is that innovation isn't the "ends" that executives seek. They seek growth, differentiation, inordinate profits. If those factors come from following the existing processes more efficiently, they will be ecstatic. But we all know that doing things more efficiently rarely creates new products or services, so they are frequently disappointed. When executives are clear with their expectations, when they communicate exactly what they want from innovation teams, when they provide appropriate scope and time frames, when they apply appropriate resources, they establish that innovation is a set of tools to help achieve profits, growth and differentiation through the creation of new products and services.



Quote for the day:


"This idea that robots, AI, can eventually encroach on creativity is pretty daunting" -- Hod Lipson


November 02, 2015

Software Development Estimation: A Controversial Best Practice

It’s like discussing politics or religion at a social gathering. Too controversial. Too inflamed. It’s one of those third rails of software development. Be careful if you touch it—you may get shocked. What makes this topic such a hot button one? For one thing, it seems like developers are really bad at it. Ask for an estimate on a feature, get the answer that it will be done by the end of the week, and discover that two weeks later it’s still work in progress. Or ask a developer for an estimate and the answer is, “I don’t know. Two to two hundred hours.” What are you supposed to do with that? For another thing, developers seem to resent being asked for estimates. Whether they are or aren’t good at estimating, they seem to find the whole activity to be a time waster.


How Skyport Systems wants to redefine security in the enterprise

To build security into the fabric of your organization, it can't be an afterthought. Gourlay said that money spent on tools like perimeter security is money wasted, as there is no guarantee that it can always be done the right way. "If you don't do it perfectly once, you've left the door open for somebody to get in that shouldn't be there," Gourlay said. So, their approach is to re-platform for security, with an architecture designed from the get-go to be hardened and secure by default. The Skyport system is composed of a two major components: An on-premise server and a management system. "The reality is that any mid-size company and larger is going to have a blend of on-premises compute and cloud-based compute," 


Social exclusion, IoT and data privacy the biggest issues facing digital economy

Onwurah said the default government position was to do nothing, and called for a more progressive “interventionist industrial strategy”. Asked what she might include in a hypothetical communications white paper, were she sitting on the government benches, Onwurah picked on three themes – digital exclusion, the IoT and data privacy and security. She said that, in her constituency of Newcastle-upon-Tyne Central, she saw people come to her surgeries who were unable to get online to conduct their mandatory job searches to continue to claim benefits, so were sanctioned and had to resort to food banks. Onwurah challenged the secretary of state for work and pensions, Iain Duncan Smith, to consider the impact of digital exclusion in his controversial welfare reforms.


Come the AI legal armageddon, what’s in it for me?

Lawyers must wake up to the possibility and likelihood that the machine will evolve from dealing solely with commoditised and research related legal work and move into the realm of reasoning and judging too; it already can, but we're only using this brilliant technology currently as a carthorse rather than its true calling as a thoroughbred. It’s also inevitable that more of the Top 100 firms that have been sniffing around the AI technology suppliers will tip, eventually. They will have no choice. They too will deploy IBM Watson or RAVN or another alternative AI software tech start-up provider perhaps for commoditised and/or high end complex due diligence work or a bespoke niche offering. The AI Armageddon is only a puff away.


Why tech isn’t poised for another huge bust

The most important change brought by cloud computing, however, might be in spending. The dot-com bubble was fueled by a hardware and software buying explosion as companies built and grew computer networks, but that spending was cyclical, and after people and companies bought what they needed, it crashed: U.S. technology spending by companies grew at a compound annual growth rate of 13% from 1995 to 2000, before falling to -3.5% over the next three years. Since the end of 2003, however, technology spending growth has smoothed — the 2009 economic crash notwithstanding — and generally come in line with economic growth. Over the past 11 years, the mean growth rate has been about 4.3%, topping 7% only once and falling below 3% only in 2009.


Public Policy Considerations for Recent Re-Identification Demonstration Attacks

The more complicated reality is that, while this recent re-identification demonstration provided some important warning signals for future potential health privacy concerns, it was not likely to have been implemented by anyone other than an academic re-identification scientist; nor would it have been nearly so successful if it had not carefully selected targets who were particularly susceptible for re-identification. As I’ve written elsewhere, from a public policy standpoint, it is essential that the re-identification scientists and the media accurately communicate re-identification risk research; because public opinion should, and does, play an important role in setting priorities for policy-makers. There is no “free lunch”.


Despite Best Intentions, Most Organizations Misinterpret, Misuse Data

Organizations for the most part agree on the great value of corporate date. Unfortunately, for the most part data professionals believe their organizations do a poor job of interpreting and using that data. A new study from Dimensional Research reveals this disconnect, and concludes that “data professionals have little confidence in the way business stakeholders within their organizations use corporate data when making important business decisions.” The study finds a number of areas in which those that capture and manage data, and those that act on it, are out of sync. ... Data models are also valued, but not used effectively, at many organizations. Again, the vast majority of data professionals see the value of data models, but only 20 percent of IT leaders fully understand that value. And, conversely, a majority of business users complain about data professionals on the same point.


Google makes Symantec an offer it can’t refuse

"It’s obviously concerning that a CA would have such a long-running issue and that they would be unable to assess its scope after being alerted to it and conducting an audit," Ryan Sleevi, a software engineer on the Google Chrome team, wrote in the blog post. He went on to require that, beginning in June, Symantec publicly log all certificates it issues or risk having Chrome flag them as potentially unsafe. Currently, under the Chrome certificate transparency policy, Symantec and all other Chrome-trusted CAs must log all extended validation certificates—that is, TLS credentials that certify a site is owned by a specific organization, such as PayPal, Microsoft, or Bank of America. Beginning June 1, Symantec will be required to log all certificates, not just those with the extended validation flag.


What is the status of OPNFV?

While the Arno release is a nice start, OPNFV has a way to go before establishing itself as the de facto open source NFV platform. Looking at the project list for OPNFV's next release, Brahmaputra, we can start to get a sense of which problems OPNFV will soon target. A couple of exciting examples include service function chaining, as well as group-based policy, so we will hopefully have the ability to orchestrate the insertion of virtualized network functions into service chains on an open-source platform. In the meantime, there is plenty more to learn and glean from the existing Arno release.


The Mathematics of Adaptive Security

Given the fundamental disconnect between how a security policy is described and how the security policy is implemented, the question has to be asked: “Is the perfect security policy even achievable? And if it is possible, what is the probability of introducing an error once the security policy is inevitably changed?” For that matter, what is the perfect security policy? The “ideal” security policy marries the current state (running context) of all workloads in a data center, the applications that those workloads take part in, the environment the applications run in (for instance, development, PCI, production), and the minimum of ports that need to be open to make the application work. This would effectively reduce the exposure of each workload and every application to the bare minimum.



Quote for the day:


"Machines will gain common sense when we master unsupervised learning" -- Yann LeCun


November 01, 2015

A Framework to Research the Social Determinants of ICTs for E-Health

We define the term access beyond broadband connectivity (material access), to also include motivation, skills and different type of usages, which in e-health ranges from accessing online healthcare information, services and clinical treatment, to self-support. Around the globe, e-health has continued to expand with the expectations that it will both reduce healthcare expenditure and improve quality and access to healthcare for all citizens. However, emerging evidence suggests that, if not managed carefully, e-health will further exacerbate health inequities because those with poorer health are often those with lower or no information and communication (ICT) use


How do I become an Enterprise Architect?

The role of EA is a challenging one, requiring a broad set of knowledge and skills. EAs have been described as generalists, and “a mile wide and an inch deep”. This has a degree of truth, but is also deceptive. The reality is that an EA requires very strong understanding of both business and technology, and has several areas of deep expertise. However, EAs are often assigned broad domains defined by business segments or technology categories, and must therefore initiate, review, align, integrate and communicate the work of a broad range of specialists. This requires very strong soft skills, which enable EAs to interact effectively with people. Soft skills cannot simply be studied. They require an accumulation of experience with a variety of people and circumstances.


The technology behind bitcoin could transform how the economy works

Bitcoin itself may never be more than a curiosity. However blockchains have a host of other uses because they meet the need for a trustworthy record, something vital for transactions of every sort. Dozens of startups now hope to capitalise on the blockchain technology, either by doing clever things with the bitcoin blockchain or by creating new blockchains of their own. One idea, for example, is to make cheap, tamper-proof public databases—land registries, say, (Honduras and Greece are interested); or registers of the ownership of luxury goods or works of art. Documents can be notarised by embedding information about them into a public blockchain—and you will no longer need a notary to vouch for them.


Tech giants take a break to reload in spending war

The companies don't typically disclose the components of their capital expenditures, but each of the Big Three has ramped up spending to support their own Web and mobile services and to build out operations to rent computing horsepower to other companies. While Amazon's spending also includes the mega warehouses for its e-commerce business, the company has singled out its growing Amazon Web Services cloud-computing operation as a chief reason for the spending jump in recent years. Capital expenditures have become a big component in the tech companies' jockeying for digital superiority.


Enterprise Architecture: Ripe for Digital Disruption

The key to Agile Architecture is emergence. In fact, business agility is the emergent property we seek from the Complex Adaptive System (CAS) we call the enterprise. Agile Architecture is a set of intentional acts we as individuals should take in order to get our enterprises to exhibit this most important of emergent properties. The question of the day, therefore, is what are these intentional acts? How do we actually go about architecting an enterprise to be agile? At this point many of the enterprise architects reading this will want to argue over whether the Agile Architecture I’m discussing is actually Enterprise Architecture (EA). Frankly, I don’t give a damn what you call it.


Balancing Complexity and Continuous Improvements – A Case Study

Within the IT department, TOGAF provided an ontology for discussing IT issues, and it also provided a foundation for the Enterprise Architecture repository. However, it was seen within the organization primarily as an IT architecture concern, not a framework for transformational change. The EA team decided that in order to really benefit from TOGAF and address the complexity challenges throughout the enterprise, they would need to prove that TOGAF could be used to add value throughout the entire organization and influence how changes were delivered to the IT landscape, as well as prove the value of a structured approach to addressing internal issues.


Your Data is Speaking. But are you Listening?

During the planning, leaders should use data to better understand the current organizational situation. Where are we succeeding? Where are we not succeeding? Where is our current corporate business definition working or requiring change? Where is digital transformation changing the basis of competition and possibly requiring new business capabilities? Additionally, leaders may request qualitative and quantitative data for existing and planned new products. How big is the market? What features do different segments want? And the list goes on and on. The important thing is they let the data speak to them and hear what it means to them and their business.


Digital transformations will spur software quality measurement

The move to digital products and services will mean that the failure of a system can become public knowledge very quickly indeed. System outages in industries like banking damage credibility and deter customers. “Software is becoming life-critical to businesses,” Delaroche declared. “In the past CIOs could deal with problems behind closed doors. But because many systems will be market-facing after digital transformations, problems will be public,” he said. One result of this will be to heap pressure on CIOs. “Today we hear about a major software outage every week, but in a few years there will be one every day,” Delaroche said.


Performance Testing without Requirements

In the absence of feedback and constructive input from those charged with this responsibility, you have work to do. The first challenge is to identify those responsible and elicit their system/application performance goals, expectations, and non-functional requirements. If requirements are still not forthcoming and you elect to stay the course, state in your test plan or formal communications your predicament in order to protect yourself. Concede that you are in exploratory mode and, for now, have committed yourself to waive formal requirements. You’ll have to create makeshift requirements and goals. (I’ve got some examples later in this blog as a start.) At a minimum, document what you are going to do during your performance testing effort.


14 Creepy Ways To Use Big Data

"So much information that consumers deem personal is, in fact, quite readily accessible," said Yoram Golandsky, CEO of cyber-risk consultancy and solution provider CybeRisk Security Solutions, in an interview. "There isn't one repository that can't be broken into. Eventually we find a way in." "It's a massive problem. Personal information is being disseminated far and wide. I don't think people appreciate how far and wide," said Rogers, in an interview. "It's getting to the point where you have to assume your data is not safe with anybody." While the warnings may sound alarmist or even paranoid, consider the sources: A world-class hacker and security expert, another sought-after security expert, and a Dark Web expert.



Quote for the day:


"Technology means the systematic application of scientific or other organized knowledge to practical tasks." - J. K. Galbraith


October 31, 2015

Without the proper amount preparedness and clear-headed foresight, a digital life left forsaken might cause a lot of ... inconvenience. Not only are there risks of fraud and identity theft with an unkempt digital afterlife, but there's also the possibility of exposing our darkest, digital secrets to unsuspecting (or overly curious) loved ones. OK, maybe we don't all have secrets lurking in our various inboxes. But anyone hoping to maintain some degree of privacy after death needs to take action before the reaper comes knocking. Google, Facebook, Twitter and other sites have various policies in place to deal with deceased users, so being aware of some of the options will help you maintain control over your information -- even from the grave.


Common Sense Software Engineering – Part IV; Life Cycles & Agile

All a life-cycle represents, is a way to get from the start of a project to a successful conclusion. It is a fairly straight-forward concept. Yet, today when reading anything about current variations on such techniques we are provided instead with a wealth of arcane terminology that really doesn’t mean much except to those who are using it. “Sprints”, “Stand-up Meetings”, “Scrum” and others appear to hide the simplicity of Agile’s foundations instead of allowing new-comers to easily understand it’s potential. Life-Cycles are also not to be taken as hard and fast rules of development as there are a number of standardized models that can be applied as the development situation warrants. Agile is just one among many such life-cycles but it appears increasingly that its promoters believe that it is more or less a panacea for all software development related issues.


Walmart undermines its online strategy — again

Walmart's online and mobile teams aren't ever given free rein. Sure, they can dream up great products and services for generating the most revenue and profits for online sales. But, it seems, they absolutely are not allowed to do anything that would truly threaten in-store revenue and profits. Result: Those services never go nearly far enough. Walmart's top bean-counters never forget on which side their bread is buttered. With that reality, buy-online-pickup-in-store made a lot of sense for Walmart. It makes the sale online, but it then finishes the transaction in a brick-and-mortar outlet, where the customer just might pick up a few more items before leaving. That takes advantage of all those locations staffed with personable, customer-facing employees, something that a sterile digital retailer can't match.


Could 5G networks make Brazil’s traffic mobile?

The most promising area of improvement could be transport. Brazil's has some of the worst congestion problems in the world. On Friday evenings in Sao Paulo, according to local traffic engineers, there are tailbacks for 112 miles on average but 183 miles at worst. At the moment, mobile phones actually make the traffic worse, because the first thing many drivers do at the traffic lights, in these days of screen addiction, is interact with their handset. There are systems in place already that try to improve the flow. Sao Paolo has a station dedicated to reporting traffic conditions and alternative routes, 24 hours a day, seven days a week. SulAmerica Traffic Radio gathered a large following of listeners who also act as reporters, calling in to update other motorists or to vent their frustrations.


It is time for CIOs to shift gears to multi-speed IT

CIOs are recognizing that they need to juggle orienting IT to maintain reliable legacy systems while also quenching the organization’s thirst for innovation. Of the C-level executives we surveyed in a 2015 Accenture Strategy survey of more than 900 executives around the world, 81 percent said the IT organization has reached a fork inthe road, and the choice before them is whether they will accelerate the digital agenda or move out of the passing lane to allow others in the organization to lead. Either way, 88 percent of executives believe that the IT organization needs to broaden its scope and keep pace with evolving needs of the business.


5 Steps from Business Analyst to Data Scientist

What’s the difference, you might ask? While the end result of these two jobs is often similar, a business analyst and a data scientist use different tools to get there. In general, data scientists have much greater technical expertise, especially in computer programming, systems engineering, and statistics. Business analysts, by their very nature, rely on intuition and have human biases that are starting to be seen as flaws that put them at a disadvantage compared to the cold hard facts that data scientists can produce. In addition, business analysts are often concerned with the single truth of what did happen in the past, while data scientists are working in a much more fluid version of what might happen in the future.


Engineering Internet of Things systems

Machine sensing and feedback loops, which have long been integral parts of control theory, have become possible on an enormous scale through the connection of low-cost sensors to cloud-based platforms providing analytics and security. The availability of operational and maintenance data that results has changed conventional wisdom about engineering practices and tools. Data has transformed industries such as retail, banking and insurance, giving rise to concepts such as business intelligence, the single customer view, multichannel marketing and financial market technical analysis. These and other such concepts have been made possible by the ability to monitor, analyze and react to business data generated by millions of transactions.


Nokia greenlights intelligent transportation system that uses drivers' smartphones

Until now, ITS systems have used short-range comms. But Nokia's navigation division, HERE - which is about to be sold to a group of German car makers - is preparing a pilot with Finnish traffic agencies to test a system that uses existing commercial mobile networks. "Transportation is one, or maybe the only, industry sector where the internet and modern mobile technologies haven't yet made a huge impact," Mika Rytkönen, Nokia HERE's head of digital transport infrastructure and business development for the EU, says. "What we are building now is a system where standard mobile networks can be used to connect road traffic to the cloud and traffic-management centres. This C-ITS [cooperative ITS] can be used to introduce new digital services to increase safety and sustainability and ease traffic jams."


Four and a Half Types of NoSQL Databases, and When to Use Them

System performance (throughput and latency) is achieved by simplifying how data is retrieved, and time-to-value is achieved by bypassing a lot of data modeling effort that is typically done for relational databases, especially on data formats that have complexity or a lot of variation. ... Any application that currently runs slower than you want or need, and does not require the core RDBMS capabilities—such as multi-row transactions, full SQL querying support, or integration with commercial applications—can likely use a NoSQL database. There are four main types of NoSQL databases, plus one type of “database” that should also be considered in the mix. In this blog post, I’ll provide a brief description of these types of NoSQL databases and when they can be used.


How Applications of Big Data Play a Vital Role in Industries

The goals of organizations have also evolved into visualizing Big Data into the larger scheme of things. With the spike in allocated budgets and inclusion, the participation of Big Data to apply itself into industry verticals is also rising. Implementation of Big Data has indeed brought results and the applications of big data have also evolved with time. This infographic presents how applications of Big Data are driving Industries and bringing innovative practices of growth in respective industries. Big Data provides solutions to overcome challenges faced by Industries who’ve ventured into the field. The infographic details challenges faced in 10 different Industries and how certain practices are being revolutionaized because of Big Data.



Quote for the day:

"Technology made large populations possible; large populations now make technology indispensable." -- Joseph Wood Krutch