November 19, 2015

Power To The People: Stop Thinking Of Them As Users

Users are people. Treat them like people. The makers of apps and operating systems, media and television tend to forget this principle. Why? Because to truly acknowledge that users are people and not just big numbers on a spreadsheet is to acknowledge that people are individuals with vast diversity of cultures, needs, opinions wants, hopes and fears. The uniqueness of people is a messy business and individuals don’t scale. ... The term user was distinguished the actor—end user—of the software from the people that created, often known as developers. The user was synonymous with the word “operator.” User specifically meant a human. Systems where the primary actors were other machines or pieces of software do not classify the other operators as users.


Forget Big Data, use "Little Data" instead

To help reconnect with other humans, rather than treat customers as a data point in the Big data pile, we should add a personal touch via "little data", which is personal, specific information. "I wouldn't be surprised if $1bn is wasted on Big Data this year," he said, adding: "Little Data often makes the most magic. Big Data is about a pattern… but Little Data is about a person." While he admitted Big Data has huge potential -- he pointed to medical research as an example -- but said companies shouldn't ignore personal information they have on customers. "Creating magic for customers often costs nothing," he said. "It's the Little Data, and Little Data is almost free." He pointed to BA, which sent him a personalised email asking why he always books one-way trips rather than returns -- it's because of his work travel.


Why AI could destroy more jobs than it creates, and how to save them

Brynjolfsson identifies various astonishing technologies lining up to encroach on human labour. Take Rethink Robotics' Baxter, a robotic humanoid torso complete with arms, claw-like grips and a head with an LCD face. Baxter is designed to replace factory line workers employed in repetitive but as-yet-unautomated tasks, such as inserting large components into circuit boards. Baxter can be trained to carry out new jobs far more simply than its robotic predecessors, primarily by taking its arm and guiding it to where it needs to pick up and drop items. His 'hands' can be swapped out for suctions cups or different grippers to allow him to take on different tasks.


In The Cloud, The Big Get Bigger

As cloud computing moved into the mainstream, some smaller cloud providers and wanna-be suppliers were acquired. In May, EMC bought Virtustream; ActiveState sold its PaaS system, Stackato, to HP in July; HP also bought Amazon API look-alike Eucalyptus Systems in September 2014. OpenStack vendor Piston Cloud Computing was acquired by Cisco in January; GoGrid was purchased by Datapipe the same month. The consolidation continues apace, with the table stakes growing each month for what it takes to become a global cloud provider. "The consolidation and shakeout will accelerate in 2016, which will force many current providers to refocus on a narrower field, retreat from cloud or exit," Forrester said.


Is Microsoft Azure PCI DSS Compliane?

Not allowing users to change logging entries is one thing. Maintaining log file integrity is a completely different thing. If there is failure here for a QSA and/or Microsoft to misunderstand a simple PCI DSS control like this, what else is wrong? Have the compensating controls been understood correctly? So. Is Microsoft Azure PCI DSS Compliant? Some of it might be, some of it definitely isn’t (according to the data above), and to date I haven’t been able to find any formal documentation that assures me, a seasoned Qualified Security Assessor, that any of the services you can buy from Azure have been correctly validated. If you decide to host your CDE or parts of it in Azure, do so at your own risk.


The Entrepreneur’s Guide To Surviving A Tech Bubble

We’re in a cycle — I don’t believe in the questions about the bubble. I think cycles come and get a little overheated. It’s more like a deflation: How much air comes out of the balloon versus the balloon actually popping? While the market is never in equilibrium, the public and private markets have different variables driving their valuations. Once companies go public, there is a change in how people value them. Pre-IPO, they are judged by their potential and then post, they are judged by their performance. Unfortunately, the performance of those companies don’t always back up their valuations. Today, public markets are demanding sustainable business models before allowing companies to go public, while in the past companies often went public without the need to prove their model out.


Dell Pushing Advanced Scale to the Enterprise

If supercomputers are the spearhead of advanced computing, the slowdown in Moore’s Law has flattened the spear tip just as the enterprise’s need for advanced computing has grown. Result: Some of the grandeur has slipped from the TOP500 and making the list is not the badge of glory it once was. Ganthier said, “It’s kind of starting to run its course because standing up [in the TOP500] is just a beauty contest.” The real action, Dell is betting, is putting HPC to work. He said Dell wouldn’t walk away from the TOP500 – there were 13 Dells on the list this year – but it wasn’t a priority. In implementing this strategy, Turkel said Dell wants to replicate in the HPC sphere what the company did to the PC market starting in the late 1980s and later on with X86 servers – ease and broaden market acceptance of technology.


The Amazing Ways Shell Uses Analytics to Drive Business Success

Of course, we’ve long been conscious of the fact that we could eventually use up all of the non-renewable oil and gas buried under the earth – perhaps sooner than we think. While this is an environmental concern to us all, it’s a financial one to companies like Shell. Dwindling reserves mean the cost of getting at what is available goes up, as they are forced to look deeper underground in ever more remote locations. One alternative is offered by the growing hope that “unconventional resources”, such as shale gas and tight oil will fill the gap. These resources, trapped in shale and sandstone, now supply 20% of the gas used in the USA and their use is expanding rapidly around the globe.


Blockchain Revolution Butts Head With Creaky Banking Pay Systems

“The payments leg is some of the real difficulty here,” he said in an interview. The services that move cash between financial firms and their customers “are all running lagged systems and none of them communicate efficiently,” he said. “We need everyone else to catch up to us.” ItBit is one of dozens of new companies seeking to use blockchain technology to revolutionize back-office functions for markets ranging from commodities to loans to bonds. Wall Street firms see the technology as a way to reduce costs and increase efficiency as they face stricter regulatory requirements following the 2008 financial crisis. While trading in stocks or derivatives is done in milliseconds, the verification and settlement of those transactions still take days.


Why Privacy Advocates Warn the Cybersecurity Bill Is a Mistake

"The first problem with CISA is that it has very weak front-end privacy protection," said Robyn Greene, policy counsel, New America's Open Technology Institute, a Washington think tank. "There's a low requirement for companies to remove unnecessary personally identifiable information from the information they want to share with the government." Under CISA, companies would only be required to remove PII if they know it is not directly related to a threat. The institute's position is that PII should be removed before sharing unless it is necessary to identify or protect against a threat. "Your personal information is personal and shouldn't be shared with the government or other companies unnecessarily," Greene said.




Quote for the day:

"Hard work spotlights the character of people: Some turn up their sleeves, some turn up their noses, and some don't turn up at all." -- Sam Ewing,


November 18, 2015

Thread – An Open Standard Protocol for Home Automation

The Thread architecture is built from ground up keeping device to device communication in mind. Since devices are creating a mesh, one particular malfunctioning device (called host) cannot bring the entire Thread network down. This is very similar to how the internet is made resilient – remember that it was designed to keep up communication while parts of it are failing. Moving to a mesh network topology makes home networks internet-grade. Thread is built on 6LowPAN (Low power Wireless Personal Area Networks) which lets IPv6 packets to be sent and received over wireless networks. This allows even small devices to be connected to the internet and thus actually create the Internet of Things.


AI technology: Is the genie (or genius) out of the bottle?

Needless to say, the early pioneers (as is typical) were a bit overly optimistic, although, in the bigger picture, perhaps not that much. The 1970s brought government funding cuts and the field went from the "Peak of Inflated Expectations" to the "Trough of Disillusionment," to use the modern vernacular of the Gartner Hype Cycle. During the 1980s, commercial success was achieved through the development of expert systems that enhanced knowledge and analytics capabilities, and the market grew to over $1 billion -- the "Slope of Enlightenment," literally and figuratively. Enthusiasm for AI was rekindled.


More women on tech boards, but industry lags

"A diverse board makeup improves employee morale and productivity and sends a message to employees throughout the organization that a company is committed to the advancement of women and minorities. At the same time, it enhances a company’s reputation and attractiveness at a time when many investors are increasingly using a variety of nonfinancial metrics, such as board diversity, as criteria in investment decision-making," Chiang wrote. The tech industry is wrestling with a chronic lack of diversity from the highest corporate ranks to the rank and file. New efforts are targeting the shortage of women at the top of the tech industry. Boardlist, for example, is a database that privately held companies can search to find female candidates to fill open board seats.


Decoding DevOps: a Management Primer

The good news is most organizations are willing to share their own best practices; the bad news is that most development teams are already understaffed and as a result, there is very little time for admins to think about, build, test, optimize and implement all the changes that are required to successfully move to a DevOps process. That includes not only taking the time to learn about the process, but also deciding how to realign existing processes and skills to fit a new DevOps model. One should not underestimate the required change in culture to adopt the new mindset, either. For most organizations and IT decision makers, these challenges are likely off-putting and intimidating.


New, Better Way to Search for Technology

The scout can strategically search for offerings to minimize the evaluation effort without eliminating the unknown unknowns. Rather than using typical Internet searches that don’t find everything, federated search explores sources simultaneously in real time. While only a small percentage of the web’s technical content is crawled and available via Google, Deep Web searches uncover and expose the desired information. Federated search automatically pulls data from multiple sites — such as patent, publication, expertise, and invention databases — to find the content hidden below the surface. Without it, users have to manually enter submission forms for each individual search site which is very time consuming.


Amazon: An Evil Empire dawns on the Internet of Things

Amazon has hardly been open to allowing 3rd parties access to the Prime APIs for playing music -- for example, SONOS cannot play Amazon Prime Music content. iOS and Android can do it, but in this case, Amazon controls the app in question, and Prime exists outside of both Apple and Google's in-app purchasing rules, as it is a yearly subscription purchased directly from Amazon. What we're seeing here is the beginnings of an Internet of Things Evil Empire. An empire that wants to control not just the content you consume, and what cloud infrastructure you use, but also the devices you are allowed to buy that consume that content and use that infrastructure. One could make the argument that Apple with iOS does the exact same thing. But at its core, Apple is a devices company that has a brick and mortar retail presence, that just so happens to have a content cloud.


The Right Way to Scale Agile: Scaling Value Delivery over Process

One of the key tenets of the Agile Manifesto is "individuals and interactions over processes and tools". Another critical piece of the Manifesto states that to be agile, software professionals or organizations should focus on "responding to change over following a plan". With any piece of writing, interpretations may vary, but it's pretty rational to take these tenets as meaning organizations need to lead with people, deliver value, and collaborate instead of following a closely prescribed scaled agile process. It sounds easy enough, but really changing the way you work is easier said than done. When you design your workflow process, you should remember that how you do something is just means to an end and it’s the underlying reasons that are important.


Security Trends That Will Impact Your Data In 2016

As expected, technology forecasts and predictions for 2016 continue to come into Information Management at a brisk pace now, with the latest concerning data protection and cybersecurity. Haiyan Song, senior vice president, security markets, at Splunk, offered Information Management her thoughts this week on what will be the top security trends that data professionals and cybersecurity managers need to be aware of. Splunk is a market-leading platform that powers operational intelligence. ... Song notes that cyber-attacks have historically caused little physical damage, but “the proliferation of IoT will cause more disruption and actual physical damage versus just hardware and software disruption,” she says.


What the JPMorgan Chase Breach Teaches Us

"We simply are not doing enough to protect data," Easttom says during this interview with Information Security Media Group. "Having data sitting on a server unencrypted is an egregious omission in the security posture. ... Unfortunately, there are lots of companies, not just banks - healthcare, hospitals, all sorts of organizations - that have, frankly, too low of a security posture." Organizations have to get ahead of regulatory mandates and make cybersecurity part of their overall corporate strategy, with understanding and buy-in from the top, he says. "Organizations don't have to wait for regulation," Easttom says. "They need to start bringing security to the forefront of all their conversations ... and those conversations need to be at the highest level."


5 Ways to Create a Culture of Analytics Within Your Company

Leading companies don’t make decisions based on their gut, they use data to drive answers. Once you can understand and dissect the data presented, you can use the numbers for more than just simple performance tracking. The 2015 State of Analytics survey reveals that high-performing teams are 4.6x more likely to say they’ve moved beyond using data to keep score and onto using data to drive business decisions. The most popular ways businesses use data today are for ‘driving operational efficiencies’ (37%), ‘facilitating growth’ (37%), ‘optimizing operational processes’ (35%) and ‘Improving existing products, services and features’ (35%). When planning the success and growth of your business, make sure your company is making smart decisions based on real data insights.



Quote for the day:


"You cannot swim for new horizons until you have courage to lose sight of the shore." -- William Faulkner,


November 17, 2015

A Manual for the Data-Driven Finance Chief

The quicker CFOs can uncover insights, the quicker they can make insight-driven decisions and take actions that can improve the company’s performance. But while technology is getting faster (and cheaper), some companies are struggling to move their organizations at an equivalent pace. One of the best ways to overcome this challenge is by implementing an agile analytics operating model. With greater analytics agility, a CFO can help his or her company transform into an insight-powered enterprise that can defend, differentiate, and disrupt in its market. ... Talent in financial organizations today is primarily skilled in the areas of financial management and planning. With the opportunity that data insights can offer a business, CFOs could look to transform this talent pool into a digital workforce.


Enterprise security for our mobile-first, cloud-first world

Extending Microsoft’s security commitment to customers, we also announced the Microsoft Enterprise Cybersecurity Group (ECG). This dedicated group of worldwide security experts delivers security solutions, expertise and services that empower organizations to modernize their IT platforms, securely move to the cloud and keep data safe. ECG offers security assessments, provides ongoing monitoring and threat detection, and incident response capabilities. ECG helps customers take advantage of Microsoft’s best-in-class security and privacy technologies to optimize their investments and confidently advance their security postures.


Tor Project Claims FBI Paid Carnegie Mellon $1 Million To Deanonymize Tor Users

A few weeks before the big Black Hat Conference in 2014, it was announced that a planned presentation from two Carnegie Mellon University researchers (Michael McCord and Alexander Volynkin), entitled "You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget" was pulled from the program, leading to lots and lots of speculation about what happened. Soon after this, the Tor Project announced it had discovered a group of relays that appeared to trying to deanonymize Tor users who were operating Tor hidden services.  A few months after this, the FBI and Europol suddenly took down a bunch of darknet sites and arrested people accused of running them (calling it "Operation Onymous") -- including arresting a guy named Blake Benthall for running Silk Road 2.0.


Why the CIA wanting encryption backdoors is a failure of leadership

Wired's Kim Zetter, who wrote a strong rebuttal of the anti-encryption brigade's controlled and often contradictory rhetoric, pointed to vague comments made by incumbent CIA director John Brennan, who said on Monday: "There are a lot of technological capabilities that are available right now that make it exceptionally difficult, both technically as well as legally, for intelligence and security services to have the insight they need to uncover it. I do think this is a time for particularly Europe, as well as here in the United States, for us to take a look and see whether or not there have been some inadvertent or intentional gaps that have been created in the ability of intelligence and security services to protect the people that they are asked to serve."


Everything as a Service (XaaS) Case Studies in the New IoT Economy

With wide acceptance and large-scale adoption of cloud solutions, the race is on to innovate new products and services at all levels. Each year, hundreds of innovative companies will quickly bring services and applications to market, delivered on established cloud platforms. The cloud facilitates rapid development by making it possible to integrate technologies easily across a platform. There’s no need to reinvent the wheel for all types of functionality needed to support a new service delivery. Instead, businesses are able to concentrate on developing disruptive technology to meet a specific business or industry need, while partnering with other cloud companies to handle things on the backend, such as billing, accounting, order management, or customer relations.


Electromagnetic Pulse weapons could knock enterprises offline

The effect would be that the enterprise would be immediately shutdown and become inoperable. “Anything to do with circuit boards and electronic technology would be blown out unless it is hardened,” says Fleming. Hardened electronics require features such as heavy wiring and additional capacitors to withstand the EMPs and absorb the energy enough to at least come back up after the attack. Since to date EMP attacks have been highly unlikely, such expensive electronics hardening is extremely uncommon even though the impact of an EMP attack would be severe. The nation’s defenses are secure. NORAD has taken preventive measures to protect its technology.


FTC Scrutinizes Cross-Device Tracking, Possible Privacy Issues

Modern online tracking techniques make the browser cookie look "pretty wonderful," said Joseph Lorenzo Hall, chief technologist and director of the Internet Architecture Project at the Center for Democracy & Technology, at a Federal Trade Commission workshop on cross-device tracking. Hall pointed to audio beacons as an example of an advertising technology that makes past privacy debates about cookies seem quaint by comparison. Audio beacons play ultrasonic sounds when an ad appears on a smartphone, computer, or TV, to communicate that event covertly to nearby devices running software designed to listen for such signals. They represent the ad industry's latest attempt to develop reliable ways to track people online.


Effective cyber risk management: An integrated approach

Even though ‘getting hacked’ may seem inevitable, by taking an integrated approach to risk management, cybersecurity risk can be effectively managed. The risk process must be ongoing and iterative, and not a one-time, infrequent, or ‘check the-box’ activity. Not only must the right stakeholders be engaged at the right levels within an organization, but the right automated tools and processes must also be in place to support risk decision-making and monitoring. It’s important to note that accountability does not lie with just one person (e.g. the chief information officer (CIO) or chief information security officer (CISO)); only an integrated approach to risk management will ensure that a company’s cybersecurity risk is managed effectively.”


How to create successful business intelligence – A supply chain approach to Big Data

From a technology standpoint, in order to deliver BI that can quickly adapt to the changing needs of the business a new approach to how data is delivered is required. A new concept that is gaining traction in the business world is viewing data delivery as akin to a supply chain. Currently this is not how most data is accessed and delivered. At the moment, data architectures tend to be hierarchical and facilitated by process. In order to accelerate data delivery, a linear approach is required, essentially the creation of a data and insights supply chain to the business. Current business intelligence systems are most often used to report on the historical state of the business as opposed to being used for demand planning.


Preparing IT systems and organizations for the Internet of Things

The transition from a traditional enterprise IT architecture to one optimized for the Internet of Things will not be easy. Elements of companies’ current technology stacks may need to be redesigned so they can support billions of interdependent processing events per year from millions of products, devices, and applications. Because networked devices are always on, companies must be able to react to customer and system requests in real time; agile software development and delivery will therefore become a critical competency. Seamless connectivity will also become a must-have, as will collaboration across IT and business units, which have traditionally been siloed. Moreover, companies must be able to securely and efficiently collect, analyze, and store the data emerging from these refined IT architectures.



Quote for the day:


"Action is not about talking. It's about how you are listened to." -- Bob Dunham


November 16, 2015

Encryption is not the enemy: A 21st century response to terror

Any time a back door or a pre-built vulnerability is left in a system (let's say, like our phone operating systems), it weakens everyone's safety. Sure, it might give some governments a temporary advantage, but it's far more likely that hackers and terrorists themselves will use these vulnerabilities to further cause damage to citizens or, at the very least, steal their personal and financial data. And lest any policy-makers reading this think, "Well, it'll be safe because we'll safeguard the keys," let me point out the elephant in the room: the United States Office of Personnel Management (OPM) was systematically penetrated and deflowered to such a complete and damaging degree that the actual fingerprints of U.S. government officials with high-level security clearances were exfiltrated with the alacrity of water entering a submarine with a screen door.


Inside Mark Zukerberg's Bold Plan for the Future of Facebook

"There are different ways to do innovation," he says, drawing a stark contrast without ever mentioning Page, Google, or Alphabet. "You can plant a lot of seeds, not be committed to any particular one of them, but just see what grows. And this really isn’t how we’ve approached this. We go mission-first, then focus on the pieces we need and go deep on them, and be committed to them." Facebook’s mission is "to give everyone in the world the power to share and make the world more open and connected," as Zuckerberg says, explaining that he is now spending a third of his time overseeing these future initiatives. "These things can’t fail. We need to get them to work in order to achieve the mission."


Apple says the iPad Pro is built for business

Business and creative functions such as graphics design and photo and video editing aren’t exactly foreign to Apple’s tablet, but new accessories, apps and the additional data the iPad Pro’s larger screen accommodates, enable you to accomplish more of the work you’re likely to be conducting on computers today. The iPad Pro is a bridge into a new way of operating, says an Apple spokesman. The company tells CIO.com its goal is to give you tools that cause you to rethink how a touch-enabled environment might apply to you and the way you work. The device won’t meet the needs of all businesses and their respective employees’ preferences, of course, but the company says advancements in the iPad Pro will give workers a new opportunity to reflect on what they use for work and whether the new iPad is a fit for their work life.


8 Biggest Cloud Mistakes Companies Make

According to a recent report by Harvard Business Review and Verizon, 84% of the IT and business executives polled said their use of cloud had increased in the past year, with 39% reporting it increased significantly. Another 40% said the cloud had increased their revenue, and 36% said it had increased their profit margin. These figures are sure to rise as more businesses discover the benefits of moving to the cloud, including lower capital and operating costs for data centers and improved application performance and resiliency. In addition, cloud usage is expanding to the nuts and bolts of IT operations, instead of an experimental thing. While initial cloud implementations focused on areas such as application development and sales force automation, more organizations now are exploring cloud for core business systems like supply-chain management and industry-specific services, such as financial applications or transportation management.


Analytics for Innovation: Why You Need to Read the External Signals

The market is moving faster than ever: consumer preferences are more dynamic, the rate of global innovation and technological development is incessant, and our current information methods can’t keep up with it. New players are threatening the status quo: Apple makes watches, Apparel companies are building wearable sensors, technology companies are building automobiles. Colliding worlds mean that traditional approaches to establishing market leadership and maintaining competitive advantage just aren’t working. ... Keurig got to the right product requirements eventually that hit on the major points – but now they are waiting on this in delay mode. Intelligence from external signals, up front, could have helped them avoid catastrophe in the first place, and more quickly bring them to the next opportunity that would address what consumers wanted.


Fact or Fiction? Reversing your PIN can call the police in an emergency

This urban legend is over a decade old and consistently makes it’s rounds on the Internet. Surprisingly, a lot of social media users care so much about this topic that they continually share this old tale with their friends, urging them to READ IT RIGHT AWAY! As it goes with all urban legends, there is a grain of truth in this myth. The idea of ’emergency code’ for ATMs had been hatched some time ago and is obviously where the myth originated. ... While it might save the victim’s money on the card, the method cannot take into account the behavior of the criminal. For example what if the enraged criminal hurts or kills the victim? Does this make the cost too high a price to pay? After all, the police might also not be on time to prevent the crime, so what’s the point then?


Create a data security culture to keep data safe

Sadly, there have been so many projects and deadlines that the organisation has given up keeping track of how every last piece of radioactive material is handled. Surely to track it all would be impossible anyway? In either case, most of the “legacy” is kept in a huge man-made lake outside. Nobody really knows what is in there. Those who do flag the hazards and suggest protections are routinely ignored or worse.  Enter your “comprehensive enterprise programme”. You’ve bought checklists with hundreds of predefined handling policies from outside experts. You’ve created a small team of dedicated personnel to audit and track every action for every employee on-site.


The Role of Specifications in Agile

That shared understanding and empathy for the target customer unlocks hidden bandwidth for product owners. They can focus on higher-level requirements and leave implementation details to the development team, who is fully equipped to do so – again, because of that shared understanding. ... User stories are the form that specifications take. Each user story is created in advance and placed in a backlog, but only the small set of the very next stories are flesh out in detail. Then, the level of detail is very high. Designs are included at this stage, and so are detailed descriptions of fine grained behavior like validation, individual errors messages, etc. Though the PM owns the user story, the team itself generates the detail through a processes called grooming.


Cyberspies inject victim profiling and tracking scripts in strategic websites

"We believe that the computer profiling data gathered by the WITCHCOVEN script, combined with the evercookie that persistently identifies a unique user, can -- when combined with basic browser data available from HTTP logs -- be used by cyber threat actors to identify users of interest, and narrowly target those individuals with exploits specifically tailored to vulnerabilities in their computer system," the FireEye researchers said in their report. The company has not detected any follow-up exploitation attempts against its customers so far, but this could be because the attackers use a highly targeted approach to victim selection. The subsequent exploits could be embedded in malicious documents attached to email spear phishing messages and not necessarily be served through a browser.


How to Build A Culture Primed to Perform

Here’s the kicker though: not all “whys” are created equal, and too often, cultures are designed to motivate using the destructive “whys.” Our answer is not only elegantly simple, but also empirically powerful. Using our total motivation framework, we’ve measured the motives of over 20,000 people at more than 50 major institutions. We’ve observed an incredibly strong relationship between their culture and performance metrics like sales and customer experience. In one study, employees with high levels of total motivation (or ToMo for short) generated 38% more in revenues than their low ToMo counterparts. Culture is an entirely quantifiable and engineerable asset—and the most important one. ToMo gives leaders the tools to unlock the highest levels of performance in their people and company.



Quote for the day:


"Bring the best of your authentic self to every opportunity." -- Brian Jantsch


November 15, 2015

Sick of apps, mice and menus? Finland's Solu might have an answer

It involves an all-you-can-eat software subscription and near unlimited storage. It is also blending Mozilla's HTML5-led approach with Firefox OS -- which it hoped to draw web developers to its open mobile platform -- and the path trodden by BlackBerry and Jolla, which developed their own OSes but equipped them to run Android apps. "We have a revenue-sharing model for our subscription a bit like Spotify, which is whenever people use your applications we pass on that subscription to the developers. This means that developers get money even by accident -- for example by users collaborating," Lawson said.


A Lifelong Learner’s Path from Library Science to Data Science

Kurt recognized that the entry level to math and software “is really boring, really difficult, and doesn’t have a lot of reward,” but he believes that: “one of the most dangerous things is the ingrained sense that I don’t know math, and can’t. The irony is when you look at the upper level advanced stuff in math, the skills needed are related to creative skills. The danger then becomes that the barriers of the tech industry keep the wrong people out. Poking at what’s happening and trying to find something more interesting about it fits both the mathematical and the creative mindset.”


OPNFV Won’t Be a Product

As to why OPNFV was even formed when there were already so many open source groups, Sen said NFV “brings stuff from all the other open source efforts. When we started, we thought we were building one platform, but it’s really a framework where you have a lot of choices.” Chris Wright, chief technologist with Red Hat, said network users’ expectations are being set by Internet companies where orders are self-service and immediate. “Tomorrow’s network is software-centric, with apps that scale out on-demand,” he said. However, network environments are much more complex than many of these Internet companies that have raised the bar.


CIOs receive low marks on IT reform report card

"This scorecard is not intended to be a juridical, prescriptive exercise. It should not be considered a scarlet letter on the back of a federal agency," says Rep. Gerry Connolly (D-Va.). "It is," he says, "an initial assessment, a point-in-time snapshot, much like the quarterly report card one might get from the university or at a school. The intent isn't to punish or stigmatize -- it is in fact to exhort and urge agencies to seize this opportunity and use the scorecard as a management tool to better guide decision making and investments within the agency." "To me the real measure will be six months or a year from now, did we really move the needle on these things?" says U.S. CIO Tony Scott.


Strong data security is not optional

A truly game-changing ruling in Remijas v. Neiman Marcus has made it easier for consumers to sue companies after breaches involving their personal data. Historically, even when sensitive information such as credit card numbers, birth dates, government ID numbers and medical records have been accessed, it’s been hard for consumers to sue companies over the breach. Companies have typically been able to avoid these lawsuits by invoking a Supreme Court case,Clapper v. Amnesty International. The case, which was about phone records and national security, required a showing of a risk of “imminent” and “concrete” injury in order to have standing to bring suit.


How social media can help employees perform better.

When someone connects with people who share similar perspectives and relationships to their own, those new connections typically don’t offer new insights or alternative viewpoints that person couldn’t have accessed before. The natural tendency to be drawn to people similar to yourself can create an “echo chamber,” which can lead to network structures that are detrimental to individual and organizational performance. Enterprise social networking platforms may be better able to offer features that counteract or overcome of our typical social tendencies. Social networking platforms can provide features that allow users to overcome these inherent limitations in our natural networking tendencies, allowing people to develop and maintain networks more beneficial to an organization’s purpose and to their own performance.


7 Key Risks All Businesses Should Manage (But Often Don’t)

Risk is inherent in doing business. The best way to fail is never to take any risks. But there are two kinds of risks: the kind you take consciously to move your company forward, and the kind that sneak up on you and pounce when you’re not looking. The latter are the kind companies must actively manage to avoid being wiped out. When it comes to managing risks, many companies prepare for natural disasters, fire, or maybe theft prevention (even though many small ones don’t even do that), but I think there are bigger risks companies of all sizes should manage. If you have a plan for what to do in case of physical emergency, you should also plan for ...


Claimed Breakthrough Slays Classic Computing Problem; Encryption Could Be Next

Computer scientists measure the difficulty of a problem by looking at how much the computational resources an algorithm needs to solve it grow as the size of the initial problem is increased. Graph isomorphism is considered extremely difficult because the best known algorithm needs roughly exponentially more resources as the size of the graphs it was working on increases. That algorithm was published in 1983 by Babai with Eugene Luks of the University of Oregon. Babai claims that his new algorithm experiences a much less punishingly steep increase in resources as the graphs it is working on get larger, giving graph isomorphism a major difficulty downgrade.


A New Architecture for Information Systems

Just as we can describe a new system, we can also assume a new architecture. Today’s systems architects deliver a crucial business function—carefully planning the relationships between nodes that include networked devices, software, services, and data in the context of business activities. The artifact from these activities typically takes the form of areference architecture. As such, information architecture activities relate equally to the concepts, contexts, language, and intents that foster UX planning, or architecture, activities that articulate a strategy and roadmap for digital user engagement. As businesses and technologists embrace digital transformation and digital experience as vital strategic paradigms, they must mature their digital initiatives by extending their notion of the system to include the thoughtful consideration of information architecture and customers’ digital experience.


Google Cloud gains security for Docker containers

From a security standpoint, though, it's a challenge to tell whether the containers have any vulnerabilities or if there are issues with how the application is being developed. ... Twistlock's Container Security Suite scans the applications both in image registries and in runtime to detect vulnerabilities present in the Linux distribution, application frameworks, and custom-developed application code. It also has activity monitoring and smart profiling capabilities to detect misconfigurations and malicious activities and to take appropriate action, such as blocking the containers from launching and killing misbehaving containers dynamically. The suite can also apply enterprise access control policies to the container environment.



Quote for the day:


"Be clear about your goal but be flexible about the process of achieving it." -- Brian Tracy


November 14, 2015

How Cloud Computing Changes Storage Tiering

New challenges in controlling data traversing the data center and the cloud have emerged. How do we handle replication? How do we ensure data integrity? How do we optimally utilize storage space within our cloud model? The challenge is translating the storage-efficiency technology that’s already been created for the data center — things like deduplication, thin provisioning, and data tiering — for the cloud. ... cloud computing adds an extra tier. “Cloud introduces another storage tier which, for example, allows for moving data to an off-premise location for archival, backups, or the elimination of off-site infrastructure for disaster recovery,” he said. “This, when combined with virtual DR data center, can create a very robust cloud-ready data tier.”


3 Tips for Managing a Boss You Don't Even Like

“You don’t have to love your boss but you need to be able to work well with them. One of the main reasons employees leave their job is because of their boss. A troubled relationship with your boss can negatively affect your morale, your productivity, your happiness, and of course, your career. A positive relationship can improve your morale, productivity and happiness which could lead to more career success in the form of promotions, raises and higher self-esteem.” Everyone can contribute to the workplace happiness, which means that much too often, no-one does.


Big Data and Social Listening

The purposes behind social listening are simple: To extract unsolicited opinion, to gather real world case studies, and to examine sentiment about products and services. For example, a company that makes smartwatches wants to know what its competition has done correctly, where the flaws are in its products, and how consumers feel that the products could be improved upon. The company wants to gather opinions, ratings, reviews, and sentiments about competitor’s smartwatches before investing time and money into a product that has no advantages over current offerings. To gather this information manually would put the company out of the proper release cycle and perhaps make the product obsolete by the time it debuts.


Service design thinking

This move towards service design thinking is not even necessarily an adjunct of the digital movement - better service design need not involve technology at all, but instead brings a long-absent focus on the users of public services and their needs in place of the internal imperatives of the providing organisations. Pioneering initiatives from the "The Public Office" in 2007 to the joint seminar series on "Innovating Through Design in Public Services"hosted by the London School of Economics Public Policy Group and the Design Council in 2010-11 highlighted some of the art of the possible. At last, some of that thinking finally seems to be entering the mainstream.


You Don’t Have to Choose Between ‘Big Data’ and ‘IoT’

With the technologies that are at our disposal today, we can attempt way more than we were able to in the past. In fact, we now can uncover problems that we didn’t know we had. The key is to examine each process that makes a difference to the business and ask questions that challenge the status quo – it is important to imagine new ways of doing current tasks and to ponder the possibility of doing things we always wished we could do but didn’t have a way of doing. To those out there who are trying to decide where to spend their IT budget, don’t get trapped in the mindset that you have to consider a “big data” or an “IoT” initiative. Make the call solely on the merits of the problem at hand and make a commitment to using the most capable technology platform out there.


Agile, DevOps and Cloud, 1 + 1 + 1 can equal more than 3

Where agile breaks the barriers in development, DevOps (development and operations) integrates operations. It industrializes the process of creating software and gets it into production. Webopedia defines DevOps X as a phrase in enterprise software development used to mean a type of agile relationship between development and IT operations. The goal of DevOps is to change and improve the relationship by advocating better communication and collaboration between the two business units. ... Cloud enables the developer to provision his development environment at the touch of a button. When he logs on, he’s provided with a number of development environment options. He chooses the one most applicable for the job and has it provisioned quickly. His advantage is that he doesn’t need to construct his development environment any further.


The seven people you need on your data team

You’ve been asked to start a data team to extract valuable customer insights from your product usage, improve your company’s marketing effectiveness, or make your boss look all “data-savvy” (hopefully not just the last one of these). And even better, you’ve been given carte blanche to go hire the best people! But now the panic sets in – who do you hire? Here’s a handy guide to the seven people you absolutely have to have on your data team. ... The one I have in mind is a team that takes raw data from various sources and turns it into valuable insights that can be shared broadly across the organization. This team needs to understand both the technologies used to manage data, and the meaning of the data – a pretty challenging remit, and one that needs a pretty well-balanced team to execute.


Building a Recommendation Engine with Spark ML on Amazon EMR using Zeppelin

Spark is commonly used for iterative machine learning algorithms at scale. Furthermore, Spark includes a library with common machine learning algorithms, MLlib, which can be easily leveraged in a Spark application. For an example, see the "Large-Scale Machine Learning with Spark on Amazon EMR" post on the AWS Big Data Blog. Spark succeeds where traditional MapReduce approach fails, making it easy to develop and execute iterative algorithms. Many ML algorithms are based on iterative optimization, which makes Spark a great platform for implementing them. Other open-source alternatives for building ML models are either relatively slow, such as Mahout using Hadoop MapReduce, or limited in their scale, such as Weka or R.


Microsoft open sources Distributed Machine Learning Toolkit

The toolkit, available now on GitHub, is designed for distributed machine learning -- using multiple computers in parallel to solve a complex problem. It contains a parameter server-based programing framework, which makes machine learning tasks on big data highly scalable, efficient and flexible. It also contains two distributed machine learning algorithms, which can be used to train the fastest and largest topic model and the largest word-embedding model in the world. The toolkit offers rich and easy-to-use APIs to reduce the barrier of distributed machine learning, so researchers and developers can focus on core machine learning tasks like data, model and training.


The Biggest Misconception About Information Security

Technologies are used to protect information and ensure its confidentiality, integrity and availability. But according to a recent survey by the Ponemon Institute on “Risk & Innovation in Cybersecurity Investments,” 90% of respondents said their organization invested in a technology that was ultimately discontinued or scrapped before or soon after deployment. In other words, these technology investments become “shelfware” which means they sit on the shelf instead of being properly implemented or utilized. There are a variety of reasons to explain this shelfware phenomenon but they predominantly boil down to people and process issues. Some organizations lack the resources to properly staff and support their technologies, a problem that many are able to solve through the use of Managed Security Services.



Quote for the day:


"Strength comes from overcoming adversity, not avoiding it." -- Gordon Tredgold


November 13, 2015

Luring Top Campus Talent to the Field of Data Analytics

“Many students discover they love the challenge of analyzing the data and coming up with meaningful insights and recommendations. It has changed the career trajectory and aspirations of many students,” Dykes said. Adobe has hired more than 20 students from this competition, and many others have gone on to work in the field of analytics for ad agencies and other companies, according to Dykes. “When I was a manager in Adobe Consulting, it was one of our best hiring channels for new talent. Many of our hires from the competition went on to be our best consultants and then took roles in product management, product marketing, and consulting leadership at Adobe,” Dykes said.


Business commerce: Can B2B really get ‘friendlier’ online?

The eCommerce sites aimed at consumers have polished their customer experiences to remove any hint of friction. However, B2B buying is more complicated – while some purchases might be simple commodities that could go through B2C-style experiences, many are long “considered purchases” that involve multiple stakeholders and capital expenditure. Here, removing friction would not speed up procurement – it would only make it more pleasant. Managing the purchase process and making it go faster is a goal for all B2B companies on both sides of the buyer and seller divide. However, it can be harder to remove some of the friction that exists than you think, unless you can put the right data in front of the right people at the right times.


Accounting And Finance Professionals Play Increasing Role In Cybersecurity

The number and severity of damaging cyberattacks has brought to the forefront the importance of providing the finance profession with the tools they need to protect the personal and corporate financial information they handle. With the amount of sensitive information they handle, accounting professionals are at the center of the fray, making it critical that they are prepared to prevent and respond to cyber threats. “For accountants, measures must be taken to ensure that the sensitive personal and corporate financial information they handle is safe: accountants need to be at the forefront of cybersecurity,” said the report’s author, Dr. Jonathan Hill, Interim Dean at Pace’s Seidenberg School of Computer Science and Information Systems.


The Potential of Geolocation for Revolutionizing Retail

One of the most exciting areas of development is the marrying of mobile apps, location sensing technologies (e.g., GPS), and data analytics to improve the in-store experience for customers. Location sensing technologies in retail typically involve customers using the retailer’s app, or a third-party app, and ceding permission to track their location in return for a better experience or reward. The customer’s location can be determined through the phone’s GPS capability — or more accurately within the store via WiFi, light-based triangulation or beacons. ... Many retailers, from Macy’s to Walgreens, are already experimenting with location-sensing technologies, with most of the focus to date on navigation, location based promotional offers, and reviews of nearby products.


4 ways CIOs can speak better CFO

“I’ve worked with my CFO for seven years, and I’ve never been told ‘no’ for a project, partly because I only come to him when it’s something I really need, and because I’ve also developed a great relationship with him,” says Darren Schoen, director of technology infrastructure at the Broward Center for the Performing Arts. But achieving that level of report isn’t something that happens overnight, it’s something that takes time and persistence, Schoen says. “Some CIOs and IT folks are intimidated by the CFO, but you shouldn’t be. If you talk to them in a language they understand and start working together, that intimidation dissipates and you start developing a truly collaborative relationship,” Schoen says.


Teradata’s Embrace of Hadoop

Teradata, if you don’t know the company’s products, has been working towards a Unified Data Architecture (UDA) for years. If you don’t know what a UDA is, it’s a little like the Grand Universal Theory that physicists have been searching for and failing to find for years. It’s a single unified data architecture that can launch queries effectively and efficiently over any kind of data. Until I completed research for that algebra book (The Algebra of Data by Sherman and Bloor) I believed that such an architecture was a mirage of the kind that moves further into the distance the closer you get to it. After all, nowadays we have relational databases, document databases, graph databases and even triple-stores. But now, because it’s mathematically possible – and provably so – I have more confidence in Teradata’s ambition.


Gathering intelligence: how manufacturers can use Big Data

Research by the MTC suggests there are three essential areas that companies should be prioritising, if they are to get the most out of the rise of Industry 4.0. These are data on product quality, including faults or components not meeting their required specifications; information on the health of production equipment, such as maintenance and repair data; and any data that allows them to be more flexible, by allowing them to more easily meet customer demands for increased customisation of their products. In addition to these, information on the power consumption of each machine, and therefore the energy efficiency of the production line as a whole, is also an important area that companies may wish to analyse, she said.


Five super-easy IP traffic monitoring tools

For system admins, one of the most important tasks is keeping an eye on the network. When things go bad in your world, a rogue ne'er-do-well could be the cause. Whether that malicious entity is a hacker, a compromised system, or a bad piece of hardware, it's essential to sniff out the issue. To that end, you need the right tools. One of the first tools you might turn to is an IP traffic monitoring tool. The good news is that there are tons of these tools ready to serve you. The bad news... some of them are a bit complex. That's why I thought I'd find the easiest IP traffic monitoring tools and list five of them for your network monitoring pleasure.


Microsoft CEO seeks a Visual Basic for new digital age

Nadella’s vision is data-centric with information sucked in to spit out smarter human-computer interactions. “It’s going to be data. There will never be a search box that doesn’t autocomplete or have recommendations.” In the same way that Visual Basic programming opened up Windows development to a broader constituency, Nadella wants Microsoft to be at the heart of democratising cloud computing so it’s “much easier to write applications that fuel the world”. Technology pillars for this new generation of data-driven apps will include some of Microsoft’s full house of analysis technologies including Cortana Analytics, Azure Machine Learning, Kinect Computer Vision and Bing Web Understanding.


Digital Don Accused of Hacks at JPMorgan, Dow Jones Over 8 Years

“The conduct alleged in this case showcases the brave new world of hacking for profit,” U.S. Attorney Preet Bharara in Manhattan said Tuesday in announcing two of the indictments that laid out parts of the scheme. “It is no longer hacking merely for a quick payout,” Bharara said. “It is hacking as a business model.” The allegations are perhaps the starkest illustration yet that even the most sophisticated computer networks, run by companies at the heart of the global financial system, may be vulnerable in the age of the Digital Don. The latest revelations come just three months after U.S. authorities arrested several men they accuse of lurking inside servers where corporate press announcements were awaiting release, in order to trade on the information before it went public.



Quote for the day:


"There is no greater learning experience than teaching." -- Gordon Tredgold


November 12, 2015

Next Generation Session Management with Spring Session

This article will demonstrate how the recently released Spring Session APIs help surmount some of the limitations of the current approach to session management, traditionally employed by enterprise Java.  ... Spring Session provides an app server independent way to configure pluggable session data stores within the bounds of the Servlet specification without having to rely on any application server specific APIs. This means that Spring Session works with all app servers (Tomcat, Jetty, WebSphere, WebLogic, JBoss) that implement the servlet spec, and it is very easy to configure in exactly the same way on all app servers. You also get to choose whatever external session data store best meets your needs.


How Apple Is Giving Design A Bad Name

Apple is destroying design. Worse, it is revitalizing the old belief that design is only about making things look pretty. No, not so! Design is a way of thinking, of determining people’s true, underlying needs, and then delivering products and services that help them. Design combines an understanding of people, technology, society, and business. The production of beautiful objects is only one small component of modern design: Designers today work on such problems as the design of cities, of transportation systems, of health care. Apple is reinforcing the old, discredited idea that the designer’s sole job is to make things beautiful, even at the expense of providing the right functions, aiding understandability, and ensuring ease of use.


Medicine On The Cutting Edge – The Bionic Eye

Prof Paulo Stanga, consultant ophthalmologist and vitreoretinal surgeon at the hospital, said the first results of the trial were a total success. “Mr Flynn’s progress is truly remarkable. He is seeing the outline of people and objects very effectively. Stanga is recruiting four more patients to the trial in Manchester. “On behalf of the Manchester Royal Eye hospital, we feel privileged to be conducting the world’s first study into retinal implants for patients with AMD. This technology is revolutionary and changes patients’ lives – restoring some functional vision and helping them to live more independently,” he said.


Quantum computers aren’t perfect for deep learning

Deep learning, though, is a whole other thing. Generally speaking, it requires a model and a set of values for parameters, and you can’t make a prediction until you have both of those things, Greg Corrado, a senior research scientist at Google Research, told reporters at last week’s event. “The number of parameters a quantum computer can hold, and the number of operations it can hold, are very small,” Corrado said. He explained that recognizing a cat in a photo, for example, might require millions of parameters. It would involve taking “billions upon billions upon billions of steps,” to make out the cat’s granular characteristics, such as its whiskers, and then eventually identify the image in the photo at a higher level.


How can we protect the internet’s undersea cables?

Sabotage has actually been rare in the history of undersea cables. There are certainly occurrences (though none recently), but these are disproportionately publicized.  ... The fact is it’s incredibly difficult to monitor these lines. Cable companies have been trying to do so for more than a century, since the first telegraph lines were laid in the 1800s. But the ocean is too vast and the lines simply too long. It would be impossible to stop every vessel that came anywhere near critical communications cables. We’d need to create extremely long, “no-go” zones across the ocean, which itself would profoundly disrupt the economy.


TensorFlow could be Google’s new, open-source, central nervous system

That’s an important advance, since Google’s machine learning initiatives are some of their most important, at this point. Machine learning is increasingly how Google sifts the mountains of data we provide for them, how it pulls salable signals out of seemingly endless volumes of noise. Machine learning lets the company burrow ever-more-invasively into people’s lives by providing services too interesting and valuable to pass up, from translation to facial recognition. It’s also the main technology driving the epic Now-versus-Siri-versus-Cortana triforce of corporate one-upmanship, which could very well end up determining many users’ choice of mobile platforms over the next five years.


Huawei predicts the 'superphone' by 2020

"Inspired by the biological evolution, the mobile phone we currently know will come to life as the superphone," said Shao on Thursday afternoon. "The intelligence of the superphone will continue to evolve and develop itself into digital intelligence, capable of empowering us with interactions with the world. Through evolution and adaptation, the superphone will be more intelligent, enhancing and even transforming our perceptions, enabling humans to go further than ever before." The Chinese company said the superphone will take advantage of advancements in big data, cloud computing, and digital intelligence by tying in with the Internet of Things (IoT), where all physical things are digitalised.


8 tips for hiring a Web designer for your business

Many ecommerce and website platforms claim to be so easy to use that even nontechnical folks can create an attractive website. However, if you are like most people, you are still probably going to need some design help if you don’t want your site to look like everyone else’s. So how do you find a good Web designer – and by “good” we mean an individual or agency who has designed in your preferred Web platform, has a great portfolio, understands your business and goals, but won’t charge you tens of thousands of dollars? Following are eight suggestions, along with pricing guidelines and advice on where to find talented Web designers.


Building a design-driven culture

One essential to running a design-driven company is making sure the right people with the right skill set are in the right place. To start, that means ensuring a chief design lead has a seat at the table where strategic decisions are made. That person could be a chief design officer, a chief digital officer, or a chief marketing officer. All that matters is that whoever has the responsibility is the primary customer advocate. He or she must bring the customer’s point of view to business decisions, translate business goals into customer-friendly initiatives, and build a culture in which employees think about how what they do affects customers.


Automation Will Change Jobs More Than Kill Them

“It makes a lot of sense to look at automation at the task level, as a way to think about redefining jobs,” said Erik Brynjolfsson, a professor at M.I.T.’s Sloan School of Management and co-author of “The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies.” The McKinsey authors emphasized the potential for automation to enrich work, liberating people to focus on more creative tasks. Apparently there is a lot of room for improvement on that front. According to one calculation in the report, “just 4 percent of the work activities across the U.S. economy require creativity at median human level of performance.”



Quote for the day:

"People are smarter than you think. Give them a chance to prove themselves." -- Tim Ferriss

November 11, 2015

App companies propose new model for worker benefits

The on-demand model has been touted by many startups as an option that lets workers decide to work whenever they want to, and in multiple jobs, but there has also been criticism that the companies use the model to avoid paying the workers a variety of benefits that they would have paid their employees. The use of independent service providers by companies apparently in their core operations has led to worker lawsuits against many app companies including Uber, Lyft and Instacart, demanding that workers should be classified as employees with attendant benefits and not as independent contractors.


5 Technologies That Are Changing The Future of Driving

A multitude of technological developments that have been going on for years have a chance of converging to drastically affect the way we think of driving, and transportation in general. If this convergence happens the results could be nothing short of incredible, and the impact can go beyond transportation alone. Here are five technologies that may very well represent the future of driving, and in doing so, drive us towards a very interesting new world of possibilities


Cisco Extends Security Everywhere with Broader Visibility, Control, and Protection

The value of Cisco architecture is its emphasis on embedding security spanning the extended network – including routers, switches and the data center – closing gaps across the attack continuum and significantly reducing time to detection and remediation. Specifically, Cisco is adding Cisco® Cloud Access Security (CAS), which provides visibility and data security for cloud-based applications; Identity Services Engine (ISE) enhancements, extending visibility and control for network and endpoints with new location access controls; and Threat Awareness Service, which provides organizations with threat visibility into their networks.


Data Science Education Gets Stronger, But It’s Not There Yet

Universities and corporations are responding to the data analytic skills in the marketplace by launching new educational programs aimed at boosting the number of qualified data scientists. One observer noted that, over the course of the past five to six years, the number of master’s-level data science and data analytics programs at American universities has gone from the single digits to about 90. “You can’t walk onto a university campus anymore and swing a cat without somebody telling you that they have an analytics program,” says Jennifer Lewis Priestley, a professor of applied statistics and data science at Kennesaw State University, and the creator of KSU’s data science Ph.D program.


The open source model works for eLearning business

The fun is often at the edges—the differentiating features that disproportionately add value by strongly aligning to a business's or a sector's specific requirements. Some of those innovations—not all—find their way back into the core product, and that accelerates the innovation cycle. Each "player" benefits because promoting and collaborating on a common platform helps grow the market opportunity for everyone participating. Partners can focus (and differentiate) on the implementation services, support, and innovations the customers really value whilst alleviating the challenges of sustaining investment in bespoke or the alternative of proprietary solutions on their own.


Big Data Investments Pay Off Big, But Oh Those Costs

According to the newly released Global Technology Adoption Index from Dell, investments in those areas are definitely leading to improvements in efficiencies and organizational growth. But cost remains a major barrier to implementation for many organizations, the study revealed. Still, there is some good news on the big data front, as more organizations report they are less unsure on what to do with it all. “While the GTAI findings remained consistent year-over-year in that 44% of organizations globally still do not know how to approach big data, we were pleased to see that gap closing in one region in particular, North America,” a Dell spokesperson told Information Management.


Coding bootcamps question the need for computer science degrees

Computer science now applies to almost every field of work, yet universities continue to treat CS firstly as a theoretical natural science rather than an engineering discipline. Even the most cutting-edge computer science subjects such as quantum computing and deep learning are being adopted by industry today. If a computer science topic cannot be given a practical, industrial framing in the classroom, it begs the question whether that topic is worth exploring at all. One consequence of this academic focus on theory is that many computer science students leave college incapable of programming. Daniel Gelernter, CEO of Dittach writes about why he doesn’t hire computer science majors for his tech company:


Data is NOT Information

Information architecture is an often misunderstood, and overlooked architectural domain that logically sits between the business and application domains. It provides a crucial link between business process and, the applications and data used by an organisation. By identifying the information assets necessary to conduct business, and how these are structured, information architecture scopes the requirements for current and future data technologies while abstracting away the complexities of application design and data management. With the current popularity of Big Data, and increasing data storage and cost, the need to understand thevalue of information derived from this data is as important as ever.


Real-time Data Processing in AWS Cloud

Modern enterprise apps are about everything: complex backend, rich frontend, mobile clients, traditional and NoSQL databases, Big Data, Streaming and so on. Throw those into clouds, and voila — you’ve got yourself a project worth years of development. In this article, I will discuss a bio-informatic software as a service (SaaS) product called Chorus, which was built as a public data warehousing and analytical platform for mass spectrometry data. Other features of the product include real-time visualization of raw mass-spec data. ... Frontend application should serve the images to the end-users providing the endpoint for browser and desktop apps hosted on Amazon EC2. Backend services consisting of business logic, rules, data access and security layer are also hosted on Amazon EC2.


Block storage on the open-source cloud platform

Through the use of a common interface and APIs, Cinder abstracts the process of creating and attaching volumes to Nova compute instances. This means storage can be provided to OpenStack environments through a variety of methods. By default, Cinder volumes are created on a standard Linux server that runs Logical Volume Manager (LVM). This allows physical disks to be combined to implement redundant array of independent disks (RAID) data protection and to carve out logical volumes from a physical pool of space, called a volume group. Cinder volumes are created from a volume group called cinder-volumes, with the OpenStack administrator assigned the task of deciding exactly how this LVM group is mapped onto physical disk.



Quote for the day:


"If you really want the key to success, start by doing the opposite of what everyone else is doing." -- Brad Szollose