December 12, 2015

When it comes to cloud security which is better? Heavy hand or gentle policing?

Gentle policing based on very strong knowledge of how their organization is using cloud is very important. This way, they look at what people are trying to accomplish with cloud, and can step in and consult. Gentle policing isn’t meant to inhibit cloud usage as much as help to guide the organization to the more secure options that are available, if users chose an option that wasn’t secure. ... Enterprises can gather all of their different data points across their infrastructure and cloud systems and see that certain data indicators probably increases their confidence level that a breach occurred, and then those data will help them to figure out what to do there.


How to deal with the aftermath of a data breach

Jay Abbot, managing director of Just Advanced Security Consulting, said that most companies could not detect a breach if it occurred, and the ones they do notice are the ones where the attackers go public with the outcome. “The biggest part of preparedness is the ability to actually detect a breach,” Abbot says. “In security, we typically think defensively and layer up controls that place defences at different locations, but we rarely actually put in place a dedicated monitoring solution that can look at everything and identify anomalous activity.” The Sans Institute recommends a six-point plan when dealing with incident response, including preparation, identification, containment, eradication, recovery and lessons learned.


Puppet Labs CEO talks containers, infrastructure, and the implications of an IPO

His opinion stands beside a well-appreciated, but seldom articulated, understanding in the industry - that a significant number of occasions in which an acquisition is heralded as a win for both sides are no more than a soft landing for a business gone mad. Further, the reality is that most technology acquisitions are dismal failures, and that politics, silos, and ulterior motives within large companies mean that success from an acquisition is a relatively rare thing. An acquisition is, in Kanies's mind, a relatively good way to get rich, but the worst way to achieve anything.


Is There a Correlation Between Employee Happiness and Agile?

Startup culture is a quasi-religion for this group, and they strive to protect it. This makes sense: it's naturally iterative, focused on delivering working code in weeks or even days. Agile has focused on managing the work and this may reek of control, which is an anathema to these companies. ... The Tech Titans leadership doesn’t want Agile because Agile isn’t good for their questionable labor behavior. Notice I didn’t say labor practices - that smacks too much of unionization and blaming the execs, which I’m not going to get into. The labor behavior is different. It comes from a tightly wound knot of employee expectations, peer pressure, and management dictate - the social norms of a company, its culture.


The Languages And Frameworks You Should Learn In 2016

In the last few years, there has been a trend towards shifting the business logic of web apps from the backend to the frontend, with the backend being delegated to a simple API. This makes the choice of a frontend framework that much more important. Another significant advancement for the web as a platform in 2015 was the release of the Edge web browser. This is the successor of Internet Explorer which has an updated interface and faster performance. What sets it apart from IE is that it adopts the same quick release schedule that Firefox and Chrome follow. This is going to move the JavaScript community forward as updates to JavaScript and web standards will be available in weeks rather than years everywhere.


Why CIOs need to worry about Chennai

Newspaper reports indicate offshore providers have kicked in with contingency plans and have been flying out associates from Chennai to other locations to try and maintain service levels. But with airports and railway stations shut now, and no way to get in or out of the city, CIOs can only keep their fingers crossed and hope for the best. Indian firms, rightly, are focusing on the safety of their employees. The impact of these floods could go far beyond Chennai, and potentially touch our daily lives in the US and elsewhere. Besides the immediate human costs of this disaster, the impact could go far beyond Chennai, and potentially touch our daily lives in the US and elsewhere.


How to avoid bloatware, the persistent PC security pest

Bloatware, otherwise known as junkware or crapware, is software that comes preinstalled on new PCs and laptops, and some Android devices. And for many consumers it's the bane of their computer's existence. With the holiday season already in full swing and gift giving just around the corner, expect to hear a few stories about the long-expected bloatware resurgence. But did it ever go away? Despite promises that PC and phone makers would ditch the bloatware in the wake of a high-profile privacy controversy involving the unwanted software, it seems as prevalent today as it ever has been. One quick look at a number of laptops in Best Buy shows clearer than ever how prevalent unwanted software can be.


Disaster recovery planning: Where virtualisation can help

Server virtualisation is a great tool to consolidate and simplify the deployment of application workloads. Where hardware was underutilised – typically with a single application per operating system instance – virtualisation has provided the isolation and management benefits of the server while concentrating the physical estate into a much more efficient footprint.  Virtual servers are a combination of virtual disk files that represent the physical disk, plus configuration information for processors, memory and other attached devices. This makes the virtual server – or virtual machine (VM) – highly portable, and allows virtualisation to provide capabilities such as high availability and fault tolerance, without lots of additional hardware or complex configurations.


The Paleo Diet: Unstructured Data for the Enterprise CEO

Essentially, while the stream of structured (transactional) data readily explains what is happening at the moment, the stream of unstructured data can yield insights into what’s going tohappen, or why something happened. To date, structured data has been the basis of enterprise analytics because it’s relatively easy to interpret: structured data is primarily numeric, repeatable in type, and predictable in timing and treatment. Unstructured data is far more challenging. Not only is the data volume vastly greater, but unstructured data has (by definition!) no inherent format or repeatability, and brings with it an extremely unfavorable signal-to-noise ratio.


Beyond the Law: A Common Rule for Data Research

No doubt, privacy and data protection laws provide a backstop against abuse of commercial data use with boundaries like consent and avoidance of harms. But in many cases where informed consent is not feasible and where data uses create both benefits and risks, legal boundaries are ambiguous and rest on blurry-edged concepts such as “unfairness” or the “legitimate interests of the controller.” Misgivings over data ethics could diminish collaboration between researchers and private-sector entities, restrict funding opportunities and lock research projects in corporate coffers, contributing to the development of new products without furthering generalizable knowledge.




Quote for the day:

"A positive attitude will let you do everything better than a negative attitude will." -- Zig Ziglar


December 09, 2015

Google Says It Has Proved Its Controversial Quantum Computer Really Works

Google posted a research paper describing its results online last night, but it has not been formally peer-reviewed. Neven said that journal publications would be forthcoming. Google’s results are striking—but even if verified, they would only represent partial vindication for D-Wave. The computer that lost in the contest with the quantum machine was running code that had it solve the problem at hand using an algorithm similar to the one baked into the D-Wave chip. An alternative algorithm is known that could have let the conventional computer be more competitive, or even win, by exploiting what Neven called a “bug” in D-Wave’s design.


PINE A64 is a $15, 'high-performance' take on the Raspberry Pi

"PINE64 set out to create a simple, smart and affordable computer that gives people access toward making their next big idea come to life." says Co-Founder Johnson Jeng. "We provide a powerful 64-bit quad-core single-board computer at an exceptional price and remain compatible with multiple open source software platforms to build a community of creativity and innovation." If you're familiar with other ARM-based boards then you know the drill. It can be set up to operate as a mini computer, a gaming console, control your connected home and let you run your own media center. It'll handle Android 5.1 (Lollipop), Ubuntu Linux, openHAB, OpenWRT and Kodi, which offers 4Kx2K output via the H.265 video standard (1080p60 and 4Kp30) and also supports Miracast.


Despite progress, the future of AI will require human assistance

One of the basic obstacles Horvitz is interested in solving is a classic IT problem: AI technologies were essentially built in silos. For systems to become more powerful, they'll likely need to be knitted together. "When I say we're trying to build systems where the whole is greater than the sum of its parts, we sometimes see surprising increases in competency when we combine, for example, language and vision together," said Horvitz, who recently launched (and, along with his wife, is funding) the One Hundred Year Study on Artificial Intelligence at Stanford University, an interdisciplinary research effort on the effects of AI. Exactly how AI systems should be integrated together is still up for debate, "but I'm pretty sure that the next big leaps in AI will come from these kinds of integrative solutions,"


How to get the most from the Internet of Things

Things (IoT) systems and connectivity solutions that enable customers to more efficiently collect, process and analyze IoT data. Here, we share our vision for IoT.  The Internet of Things (IoT) is one of the most important technological innovations of the past decade. Analytical insights from IoT can lead to valuable business outcomes like automation, improved productivity, reduced downtime and enhanced knowledge of what’s going on at your company. McKinsey estimates that IoT will have a total potential economic impact of $3.9 trillion to $11.1 trillion a year by 2025. IoT is, well, exactly what it sounds like: A network of physical things that are connected to the Internet.


Big Data Industry Predictions for 2016

Companies will continue to seek competitive advantage by adopting new big data technologies and allowing machines to simulate subjective ‘squishy’ data – including human communication cues such as nonverbal behavior, facial expressions, tone of voice. Big data analytics makes this possible by assimilating vast amounts of information, including the types of data that were too slow ... As the machines get better at interpreting a variety of data types and collating it with vast quantities of structured data, they can begin to improve and accelerate both employee-owned business processes and customer-facing experiences. Employees’ work can be recorded and compared with what is considered ideal and can then receive personalized decision support so to execute their tasks faster and more effectively.


Easily Create Java Agents with Byte Buddy

A Java agent is a Java program that executes just prior to the start of another Java application (the “target” application), affording that agent the opportunity to modify the target application, or the environment in which it runs. In this article we will start with the basics, and crescendo to an advanced agent implementation using the bytecode manipulation tool Byte Buddy. In the most basic use case, a Java agent sets application properties or configures a certain environment state, enabling the agent to serve as a reusable and pluggable component. ... a Java agent is defined like any other Java program, except that premain replaces the main method as the entry point. As the name suggests, this method is executed before the main method of the target application.


Cyber Insurance Underwriting Moves from ‘Toddler’ to ‘Teen’

The cyber line is “sustainable, but not if we continue to drive pricing down to the lowest common denominator, and not if we don’t underwrite risks. There definitely was a point in the last few years, where you could get a cyber quote with no information,” Stephens said. “It doesn’t seem sustainable to me to do it that way. Insurers have swung the pendulum a little bit back, to actually asking for detailed information, and really trying to differentiate a good risk from a bad risk. They’ll continue to do that.” Carriers expect this area to grow, said Manny Cho, regional underwriting manager at Axis Pro in San Francisco, but they need to be profitable in order for that to happen.


Here's what open source critics are missing in their Apple-bashing

The source of the sin was Apple's release of Swift as open source. Though the page now humbly acknowledges "open source software is at the heart of Apple platforms and developer tools," it originally touted Apple as "the first major computer company to make Open Source development a key part of its ongoing software strategy." Too much? Perhaps. Or not. Apple has actually had that claim on its site for some time, but it wasn't until Swift was released that people paid attention. Ironically,developers started grousing about it on the eve of Apple living up to the spirit of its claim.


Your Tech Employees Aren't Happy? Here's How to Fix it

Part of the problem might be in the employers' perception of work-life balance. Dice found that there seems to be a significant gap in how employers interpret work-life balance and what employees actually want. For example, 67 percent of HR professionals stated that their employees enjoyed a balanced work life, while 75 percent of employees ranked work-life balance as a top benefit they wish they had. Compare that to the number of employees that feel work-life balance is a myth and those who reported a lack of work-life balance at work, it seems there is a disconnect in how employers view this issue. But fostering a culture that encourages a work-life balance isn't that hard, and it's pretty cheap, according to Dice


The Tech Revolution Is Failing to Deliver

Another way to think about it is that many of the recent innovations only make it easier and more fun to do things we hardly ever noticed were hard and no fun. People use internet messenging apps where they once relied on email, or they pay with their phones where they used to pull out a credit card. There is no perceptible change even in time use -- we're just switching to a new, seemingly more perfect way to conduct the same old transactions. Much of the "Internet of Things" (now often referred to as the Internet of Everything) -- connected light bulbs and faucets, excessive electronics and software in cars -- provides this kind of "quality improvement": Gadgets are wonderful, but rarely essential.



Quote for the day:


"Transparency doesn't mean sharing every detail. Transparency means providing context for the decisions we make." -- @simonsinek


December 08, 2015

Cloud operations and security: A developer's survival guide

When considering ops and security, the best practices in automation are mostly around monitoring. DevOps requires two types of monitoring. Application performance monitoring tools enable code-level analysis and correct performance issues. At the infrastructure level, server monitoring provides visibility into capacity, memory, and CPU consumption so developers can fix issues as soon as they appear. The key is to make sure that developers can see the data so they can make better calls during the development process. Finally, you need version control; not just for your application code, but in your infrastructure, configurations, and databases. The payoff is a single source of truth for both your application code and your platform that you can use to quickly identify where things went wrong, and then automatically fall back to a known state.


Why Teams Don't Learn From Their Mistakes (And How To Change That)

At a Toyota plant, Kaplan had a revelation. In the automaker's well-known production system, if anyone on the production line sees an error, they send an alert that halts production across the plant. Senior executives rush over to see what's gone wrong and address the issue, and afterward the process is adapted to prevent it from happening again. "The system was about cars, which are very different from people," Kaplan says when we meet for an interview. "But the underlying principle is transferable. If a culture is open and honest about mistakes, the entire system can learn from them." When Kaplan took this lesson back to the Virginia Mason Medical Center in Seattle, the results were astounding.


Can the cloud really do it all? Tech chiefs aren't convinced

"It will take time for these organisations to adapt to the new opex based funding model for XaaS as traditionally it's been anathema to load support costs onto the taxpayer whereas periodic injections of capital investment haven't been so problematic," he said. Dan Gallivan, director of IT at Payate said that while CIOs will still consider non-cloud options if it makes sense, cloud options are definitely in favour: "It seems to be the trend for most application providers to move to cloud, the benefits are great; scalable, flexible and accessible." There is still room for on-premise options, said Shawn Beighle, CIO of the International Republican Institute, but he said: "It really depends on the results of the needs assessment, but I almost always look for SaaS solutions first before considering an on-prem solution."


Your New Medical Team: Algorithms and Physicians

Patients also may be skeptical that a computer can deliver the best care. A 2010 study published in Health Affairs found that consumers didn’t believe doctors could deliver substandard care. In contrast, they thought that care strictly based on evidence and guidelines — as any system for automating medical care would be — was tailored to the lowest common denominator, meeting only the minimum quality standards. But algorithms can be put to good use in certain areas of medicine, as complements to, not substitutes for, clinicians. A Princeton University economics professor, Janet Currie, and colleagues developed a simple algorithm to improve care for heart attack patients.


Can Europe ever build its own Silicon Valley?

The economist says government investment is also key and that is where the US has done well in the past: “Why are all the innovative companies like Apple, Amazon, Google and Facebook coming out of the US and not Europe? The answer you will often hear is: Europe has lots of culture but there is too much state and not enough market. As a result, it is not entrepreneurial enough.” She continues: “This view ignores the fact that all the revolutionary technologies that make the iPhone so smart were actually funded by government. Not through narrow market-fixing policies, but through mission-oriented policies that catalysed the creation of entirely new technologies and sectors.”


Artificial Intelligence is Already Remaking Modern Businesses

Today, artificial intelligence (AI) technology should be causing similar unease. But it also heralds an opportunity and a challenge to business to harness this new cognitive power. Today, AI systems are already scoring better than the average high-school senior on the SAT. They are diagnosing disease and keeping up to date in realtime with medical research better than human doctors. And they are handling financial and media buying decisions with mind-boggling speed and intelligence. Today, competitive advantage in business is gained by recognizing where machines can be superior, and leaning in hard. Among the companies doing this are Google, Renaissance Technology with its hedge funds, and my own company, Rocket Fuel.


The Six Decisions To Make Before Establishing an Innovation Outpost

Most CEOs assign the responsibility to establish and manage their innovation outposts (and the outpost’s relationships to startups) to their R&D organizations. While that avoids internal management conflict, it’s the wrong way to make an innovation outpost decision. Instead CEOs and their exec staff should start with a high-level discussion to decide whether their companies should even establish an Innovation Outpost, whether in Silicon Valley or some other innovation ecosystem. Because this is a critical decision that requires broad management buy-in, the conversation should include senior management, particularly the Chief Digital Officer, the Chief Strategy Officer, the Chief Financial Officer, and the Head of R&D, and maybe even their board of directors.


The DevOps Supremacy – How IT Operations Must Become Like Jason Bourne

Like Bourne movies, today's digital business is equally intense. It's a case of working "outside-in", quickly understanding the needs of your customers; working faster than your competitors to deliver a high-quality experience. Now more than ever, it's about anticipating and responding to any impending issues that could compromise this experience versus just being obsessive about finding the cause of problems. Some folks in operations would argue they have great situational awareness since they can monitor all the infrastructure and components underpinning applications. But is this good enough? Does monitoring at a detailed diagnostic level mean you're paying attention to the right things from the perspective of the business and what your customers are experiencing – in this very moment as they engage and interact your business?


Leadership begins between your own two ears

The principles circle back on themselves. If you believe you can do it enough to step off the mountain and open your current state of preparedness to the wider world, you can do it and will figure out what you couldn’t have known at the beginning.  Hardly anyone with a job description expects candidates to have every single attribute and experience they are asking for. The best people want challenge, want to stretch. What’s consistently amazing to me is how different men and women can be about these inevitable shortfalls. If there is a job with 10 qualifications, women will tend to see two that they don’t have and disqualify themselves. Men, on the other hand, will tend to see three to give that they have and say, "I can do that!"


Attackers are Building Big Data Warehouses of Stolen Credentials and PII

Indicators of developing attacker data warehouses include the nature of the data offered for sale. “On one of the websites, we saw that you could ask for data and passwords by industry sector,” says Beek. Attackers are also swapping data from different breaches with each other so that they can build up stronger user profiles. “We see discussions in closed forums where one group is exchanging files with another group just to benefit each other’s operations in this way,” he affirms. These warehouse approaches could grow, using the same kinds of analytics on harvested PII data that legitimate businesses do on their big data stores. They could identify patterns and create robust databases that connect information about the person’s place of employment with their personal profile and quickly reach far beyond the data that the criminal started with.



Quote for the day:


"Nothing consoles and comforts like certainty does.” -- Amit Kalantri


December 07, 2015

How Prudential Annuities CIO sparks talent transformation

In addition, the trend toward buying big data, data analytics and data management solutions instead of building them in-house has made certain skills like data stewards, data scientists and integration engineers much more mission-critical and thus, harder to find than they used to be. Finally, he says that insurance companies have a difficult time recruiting younger IT talent, since it doesn't have the flashy allure of Silicon Valley start-ups and mobile app development companies. "We want to be to a leading-edge technology business, and a place where innovative ideas are rewarded; we know retaining our existing talent and attracting new talent is at the center of how we're going to do that. I was looking at a great team who knew how to do their jobs, but they didn't feel they had the agency or the individual buy-in to get their ideas heard.


Mobile App Development: Cost, Time & Process

While thinking of developing a mobile app, the most common question that may pop up in your mind would be about “the development cost”. This is just like a puzzle, especially for those people who never thought about developing a mobile application. For guidance, you can ask about the mobile app development cost to your friends or other people who are experienced in this industry. In most cases, they all will similarly answer you that “it depends”. Of course, the mobile app development cost depends on various factors, including features, complexity, location etc. Apart from cost, there are a lot of other parameters that should be considered in mobile app development.


Big Data and Healthcare

There is an innovative opportunity on the near horizon - the capability to determine potential unfavorable outcomes for patients while they are still in the hospital. By taking the existing data on the patient from as many sources as possible, including lab results, pharmacy history, patient specific data, physician notes, nursing notes, etc. and assembling them into the EMR, then using this data combined with the historical data for this patient and other patients, it is possible to forecast the likelihood of re-admission within 31 days, or of post-discharge infection, or any of several other possible outcomes. Armed with this foreknowledge, the case manager can intervene prior to the discharge of the patient to effectively eliminate or reduce the likelihood of the potentially unfavorable outcome by proper pre-release education or other interventions.


'Cyber Crime Is The Greatest Threat To Every Company In The World'

When speaking at the IBM Security Summit, Rometty was so pumped up on security that she could have been mistaken for a CTO (chief technology officer). She had this to say on IBM’s new security technology: “We announced that more than 1,000 organizations across 16 industries are participating in our X-Force Exchange threat intelligence network. We only launched the network a month ago, so its rapid growth speaks to significant need. And we’re bringing a potent weapon to the fight – a 700 terabyte threat database including two decades of malicious cyberattack data from IBM’s security operations, as well as anonymous threat data from more than 4,000 organizations, which have contributed 300 new collections of data in the last month.”


8 Apps, Gadgets To Keep IT Pros Awake On The Job

Most people think datacenters run on electricity, but, personally, I've found they run on caffeine. Servers and work stations really should dispense coffee, soda, and energy drinks right out of their sides. This is especially an issue during the holidays when vacations leave every IT department short-staffed. IT pros could find themselves doing longer shifts than normal or even covering the night shift for the first time in a long time. To help you stay awake during those long shifts, I've pulled together a list of gadgets, apps, and products to help you stay alert through the days when you wish you were settling in for a long winter's nap.


Q&A with Vasco Duarte on the #NoEstimates Book

In my own experience estimates are rarely needed, and even when needed they just point to another dysfunction that we should be tackling. In this context, eliminating estimates is indeed the goal. But just like Toyota has devised a multiple-level approach to waste (unnecessary waste, and necessary waste), so must we for estimates. Sometimes we must accept estimates, but endeavor to find ways to eliminate that need for estimates. This is possible, and I have helped many teams and organizations totally eliminate the need for estimates. In the later chapters of the book, we follow Carmen – our hero in the #NoEstimates story – as she discovers some of the ways in which you can eliminate estimation waste, and still be able to answer those critical business questions that customers will ask, such as: “will we be able to release this Feature on time?”


Four Big Data Governance Tasks to Prep for the Internet of Things

Distinguishing between useful investments in IoT capabilities and dead-end technologies, can be a tough job for healthcare organizations not entirely equipped to predict the future course of an explosive marketplace, but providers can start to define the scope and direction of short-term investments that will position them for seamless expansion as new needs arise. ... “We have noticed that when it comes to the access of information, our world is completely different today than what it used to be,” explained Amy Hester, PhD(c), BSN, RN, BC, Director of Clinical Informatics and Innovation at the University of Arkansas Medical Center to HealthITAnalytics.com in January. “Under the old way of doing things, it was possible for a patient’s vital signs to be 8 or 12 hours old by the time they were entered into the record.


Mobile Cloud Computing and its Critical Role in Data Management

The incorporation of mobile technologies is expected to push cloud computing beyond conventional norms. The utility of mobile computing is mostly associated with location, usage, and cost. It will also result in freedom for users to switch between devices with data security in place irrespective of a different device. The aforementioned benefits the computers in our pockets with the increase in number of mobile apps in recent times. Mobile technologies are responsible for growing demands with immediate gratification being the highlight prompting companies to react quickly and strongly.The most pivotal aspect of relationship between mobile and the Cloud is that mobility has increased its boundaries beyond the smartphones and tablets.


Finnish Thingsee builds the future of IOT

“For a short period of time after Nokia began to change, many people were disappointed but it has started to show them a kind of diversity in the hundreds of startups that are being founded,” says Yllasjarvi, noting that his team members are 90% ex-Nokia employees. “It is remarkable how after only a few years from the shift at Nokia, we’ve seen the birth of hundreds of new companies. Lots of foreign companies have come here and set up operations. Instead of one big company employing lots of people, there is increased diversity that is helping to rebuild the economy and make it stronger over the long run. It’s less vulnerable to changes and it brings new growth when the startups succeed and achieve their goal, bringing up the whole of Finland,” he asserts.


Home Automation using Raspberry Pi 2 and Windows 10 IoT

In today's era, technology can enhance human life. Technology is evolving decade by decade. Automation was a science fiction earlier but not today. By combining latest technology with home, we can build an awesome home. With the Raspberry Pi and Windows 10, we can build a home automation system that is capable of operating home devices automatically. ... A Raspberry Pi 2 will serve as a master device. For each room, want to automate, an Arduino UNO is needed. Arduino UNO will act as a secondary controller, which takes command from the Raspberry Pi 2 and operates specific device. Here, Raspberry Pi 2 and all Arduino UNOs are connected together on a I2C bus. All Arduino UNOs act as slaves. Each Arduino UNO have unique I2C slave address on the bus.




Quote for the day:

"Employers are like horses — they require management.” -- P.G. Wodehouse


December 06, 2015

Why the Internet of Things Should Be a Bank Thing

The most obvious IoT application for banks is in payments. In a commonly floated scenario, a customer's refrigerator senses the household has run out of milk and orders a fresh carton from the local grocery store. The payment seamlessly takes place in the background. A good experience would incent the customer to use a bank app for this rather than a built-in payment system. Loyalty programs could flow through such an app, and the bank could collect data that could be used in marketing and customer service. ... "Cars are interesting to think about for any number of reasons, not the least of which is because many people spend an inordinate amount of time in their cars," said Dominic Venturo, chief innovation officer at U.S. Bank in Minneapolis.


What Mark Zuckerberg can learn from Elon Musk about changing the world

Facebook says its mission is to make the world more "open and connected," which is fine, but it doesn't quite grab you in the gut like unhooking planet earth from its oil addiction and colonizing the Red Planet. Zuckerberg's stated plans for the philanthropy so far are ambitious because of the sums involved, but not terribly thrilling. He and Chan, a physician, want to cure diseases, improve education, and open up the world to the Internet. The structure of their giving will turbocharge these efforts, by bringing entrepreneurship into the picture in a bigger way.


A New World of Data

The center of data gravity is moving with more apps being delivered via cloud Software as a Service (SaaS). In the past, I might only have to extract Salesforce data with other on-premises app data into a client’s on-premises data warehouse. Today there is a constantly growing list of popular cloud app data sources that analytics pros need to include in decision-making processes. If you neglect the ocean of cloud and IoT data sources that your opponents do include in their analytics, you will lose your competitive edge and may miss a key window of opportunity in the hyper-competitive global economy. Don’t believe me? ... Furthermore, there is a priceless peace of mind that comes with knowing someone else is on the hook along with me to make sure everything works. I guess you could say that I have finally seen the cloud light.


Understanding the Different Kinds of Infrastructure Convergence

They key differentiating point – and the whole premise behind hyper-convergence – is that this model doesn’t actually rely on the underlying hardware. Not entirely at least. This approach truly converges all the aspects of data processing at a single compute layer, dramatically simplifying storage and networking through software-defined approaches. The same compute system now works as a distributed storage system, taking away chunks of complexities in storage provisioning and bringing storage technology in tune with server technology refreshes. Here’s the big piece to remember: since the key aspect of hyper-convergence is software doing the storage controller functionality, it’s completely hardware-agnostic.


Data Protection in a Hyper-Converged Infrastructure

Hyper converged infrastructure offer great modern backup methods, including data deduplication, intelligent load balancing, data compression, synthetic backup and rapid snapshots. For example, deduplication is a type of data compression where a single master copy of data is created with subsequent references. It can be seen in virtual desktop infrastructure (VDI) environments that have thousands of users accessing the same applications. Another example is self-healing. In an event that a block storage volume with intensive read/write fails, the system canautomatically rebalance by moving workloads that handle recovery to nodes that are not involved in the event.


Ten practical ideas for organizing and managing your enterprise architecture

When it comes time to implement new technologies or IT-enabled processes, most companies tend to bring all relevant stakeholders to the table. They assemble leaders in the EA department and members of the finance department and the strategy team, as well as the software-development group, to vet options and come to a decision about which changes to make and how. This approach is useful for ensuring that all perspectives are heard and that all system requirements are accounted for. But when disagreements occur, those around the table will tend to deflect blame onto the EA department and absolve themselves of responsibility—particularly when multimillion-dollar IT infrastructure updates and system replacements are at stake.


The Role of an Enterprise Architect in a Lean Enterprise

A first and important step to promoting consistency is having a long-term vision for the enterprise portfolio. Being able to describe both the current state and future state architectures is essential to bringing projects in line. Start by assessing the current portfolio. Map out what systems exist and what they do. This does not need to be deeply detailed or call out individual servers. Instead, focus on applications and products and how they relate. Multiple layers may be required. If the enterprise is big enough, break the problem down into functional areas and map them out individually. If there is an underlying architectural pattern or strategy, identify it and where it has and has not been followed.


Conducting service provider due diligence is key for FIs in the digital age

Cyber governance of a company is now key. For an FI, this not only means ensuring its own cyber policies and systems are in place, but also that of its service providers. So, a service provider due diligence is a key requirement. Many FIs depend on third party service providers for services such as administrative, trading, custodial, data storage (including cloud solutions), human resources and technology services. Depending on the level of risk, due diligence can range from and include contract reviews, due diligence questionnaires on IT security, staff training, business continuity plans and cyber breach incident response plans and cyber security audits, existence and extent of cyber insurance, to onsite visits.


SQL SERVER – Practical Tips to Reduce SQL Server Database Table Size

The disk space intended for a data file in a database is logically divided into pages numbered contiguously from 0 to n. In SQL Server, the page size is 8 KB. This means SQL Server databases have 128 pages per megabyte. Disk I/O operations are performed at the page level. That is, SQL Server reads or writes whole data pages. The more compact data types is used, the less pages for storing that data are required, and as a result, less I/O operations needed. Introduced in SQL Server, buffer pool significantly improves I/O throughput. The primary purpose of the SQL buffer pool is to reduce database file I/O and improve the response time for data retrieval.


Trend-Setting Products for 2016

In today’s fast-paced digital economy, it is understood that effective data management strategies can have significant impact.CA’s global study of senior IT and business executives on the role of software as a business enabler found that “digital transformation” is underway as a coordinated strategy among more than half of the survey participants. The top 14% of respondents were identified as “digital disruptors” and, according to the survey, have two times higher revenue growth than mainstream organizations and two-and-a-half times higher profit growth than mainstream enterprises.



Quote for the day:


“Before you make a decision, ask yourself this question: will it result in regret or joy in the future?” -- Rob Liano


December 05, 2015

3 Myths of OpenStack Distros, parts 2 and 3

Although it may seem as though all distros should be equally stable and interoperable, and that they should be released with the corresponding community version, the realities of hardening software mean that that’s simply not possible. Make sure that your vendor is providing you with the best possible version of OpenStack for you, not just hitting the market as quickly as possible. At Mirantis, we’re very proud of the stability of Mirantis OpenStack 7.0. I’d like to invite you to download it now and see for yourself how well-tested and stable the release is. We welcome your feedback about this blog and about our product.


Securing File and Print Servers

Another important security feature of the NFTS file system is the Encrypting File System (EFS) feature. EFS can be used to secure confidential corporate data from unauthorized access, because it enables you to encrypt files and folders to further enhance the security of these files and folders. Even when an unauthorized person manages to access the files and folders because of incorrectly configured NTFS permissions, the files and folders would be encrypted. EFS uses keys to encrypt and decrypt data, and the cryptography application programming interface (CryptoAPI) architecture to provide cryptographic functions. EFS can work on computers that are members of a domain, and on standalone computers. The keys which EFS uses to encrypt and decrypt data, is a public and private key pair, and a per file encryption key.


Microsoft plans to add containers to Windows client, too

What would container support in Windows client mean from a security standpoint? Instead of using a virtual machine to run a browser, a user could use a Hyper-V container to isolate the browser from other apps running on the operating system. That could keep attackers from infiltrating other parts of the Windows OS via a browser attack. Over the past several years, Microsoft Research has investigated ways to make the Windows OS more secure. The ServiceOS project -- formerly known as "Gazelle" and "MashupOS" -- aimed to tighten security by isolating the browser from the OS. There seems to have been little, if any, work to advance ServiceOS for the past few years, however.


Turn the Lights Back on with GIS and Operations Dashboards

Often, too little or too much information slows down analysis and decision-making. Operations dashboards must be configurable to display relevant datasets based on an individual’s role in the utility. For example, a dashboard for emergency operations centre staff might include a live map that plots locations of outages, customers and assets; automated vehicle location data to enable real-time tracking of field crews; and live weather feeds that enable dispatchers to monitor severe weather events that could impact restoration efforts and allow them to redirect crews accordingly. - See more at: http://blogs.esri.com/esri/esri-insider/2015/12/03/turn-the-lights-back-on-with-gis-and-operations-dashboards/#sthash.C53SvaRu.dpuf


Consumer acceptance of in-store location-based tracking on the rise

“In our hyper-connected world, it’s not possible to do this without technology. Consumers today want tech-enabled in-store experiences – in fact, over a quarter would like the shops they visit to know exactly who they are when they walk in through the door, thanks to location-based technologies,” he said. Services such as price comparison sites and in-store Wi-Fi mean customers are now reviewing and comparing products from other stores while shopping. Some 87% of customers will have researched products before entering bricks-and-mortar stores, according to the research, which puts pressure on shop assistants to make the customer’s experience in-store a differentiator.


Why Mark Zuckerberg Wants to Spend on Personalized Learning

“We’re starting to build this technology now, and the results are already promising,” Zuckerberg and Chan wrote in an open letter to their newborn daughter, Max, about the charitable work. “Not only do students perform better on tests, but they gain the skills and confidence to learn anything they want. And this journey is just beginning. The technology and teaching will rapidly improve every year you’re in school,” they wrote. While the general concept of personalized learning isn’t new—teachers have long tried to design lessons to reach individual kids—the explosion of new technology, apps, and the “smart” software has only begun to penetrate classrooms in the last few years. As a result, we don’t know yet how well it works or, really, whether it works at all.


What Is Disruptive Innovation?

Disruptive innovations are made possible because they get started in two types of markets that incumbents overlook. Low-end footholds exist because incumbents typically try to provide their most profitable and demanding customers with ever-improving products and services, and they pay less attention to less-demanding customers. In fact, incumbents’ offerings often overshoot the performance requirements of the latter. This opens the door to a disrupter focused (at first) on providing those low-end customers with a “good enough” product. In the case of new-market footholds, disrupters create a market where none existed. Put simply, they find a way to turn nonconsumers into consumers.


Lynne Cazaly on Making Sense using Visual Communications

Lynne Cazaly spoke at the recent Agile New Zealand conference on the importance of clarity and sense-making in a world where VUCA (volatility, uncertainty, complexity, ambiguity) is the norm. ... Two point communication is what we are doing, you and I are having a conversation and so many meetings and work place settings are these, two point communication, or just people standing around talking and to bring it to a next level to three point communication, let’s have something that we are talking about; it is great to see people gathering around the story walls and project plans etc. but the same happens in any team any conversation any session; get that third point of communication going which is the visual map, maybe the artifact but it’s the thing that helps people make sense so you get to great content a lot quicker.



Quote for the day:


"The person who doesn’t have something to do after the meeting, shouldn’t have attended the meeting." -- Dan Rockwell


December 04, 2015

DBA Skills for developers

In many smaller companies or departments, there is no dedicated DBA. In these cases, it falls on *someone* in the office to get to grips with the blackbox that is the database server, keep it running and dive in when the things go wrong. The objective of this article is to give non data-focused developers a quick roundup of useful information and knowledge that will enable them to both solve some routine issues that come up and also help prepare for some in advance. This is not intended to be a very indepth article, rather its a quick read over coffee break that should give give the reader some useful starting points. I would be delighted if any more experienced DBAs out there would like to comment and help expand the list.


Technology Will Translate Brain Signals into Actions for Brain Injury Patients

While this is a great achievement for the team, the people involved in making it possible consider it just one of the many milestones that they will cover in future. They wish to add more features into this system so there is literally no difference in how a normal person browses on the internet and how a quadriplegic patient will. The coming milestones for the team would be when they are able to add the drag and drop feature to this system. The team will also be working on the multi-touch capability of the system. As of the moment, BrainGate clinical facilities are the only places where this equipment is available. As more programs are introduced and awareness is spread about this system, it will go in every corner of the world.


How CloudFlare is accelerating the web with HTTP/2

The main focus of both SPDY and HTTP/2 is on performance, especially latency as perceived by the end-user while using a browser, with a secondary focus on network and server resource usage. One main benefit is the ability to use a single TCP connection from browsers to a website, or in the case of CloudFlare, a reverse proxy. As such, CloudFlare is in the perfect position to provide the benefits of HTTP/2 to all CloudFlare users by accelerating the web surfing experience between clients' browsers and CloudFlare, without the need to change anything on the origin server.


9 enterprise tech trends for 2016 and beyond

InfoWorld’s David Linthicum recently suggested it was time to retire the phase “cloud computing” and simply say “computing.” That’s how essential cloud has become -- and why for the past couple of years cloud has framed my annual attempt to identify the nine key enterprise tech trends going forward. In 2015, it became a lot clearer what cloud infrastructure in all its scalable, self-service glory will be best for: running applications composed of microservices outfitted with RESTful APIs. Most likely those services will run in containers, which give developers more control than ever in building, testing, and deploying applications. Containers in turn support devops, where ops leverages new automation, instrumentation, and monitoring -- and devs take new responsibility for applications in production.


Using data-driven insights for transformational outcomes

In this environment, it’s entirely possible for an agency to meet or exceed transactional performance metrics while experiencing breakdowns in the system—whether it’s food stamps ending up in the wrong hands, millions of Medicaid dollars channeled to one doctor at multiple addresses, or a child who is seriously injured despite multiple visits by a child welfare agency. And when human service systems experience their worst failures, where it matters the most, it often becomes obvious that traditional performance indicators do not guarantee meaningful, mission-critical outcomes for the people who rely on these services. But this all-too-common pattern is beginning to change, thanks to the rapid proliferation of new technologies and methods, and the introduction of more sophisticated data analytics.


Wearables will be life-changing… but no ingestibles, thanks

“When you look at what the IoT devices need, they’ve got to have some sort of processing, they need connectivity and a lot of security, and our entire portfolio is built around these things,” Goel says. Goel is particularly excited about wearables, pointing me to research that suggests three-quarters of our bodies could end up being connected by various forms of technology. Thus clothed we can better see what’s in front of us and what’s around the corner, understand our bodies, risks and opportunities. Already we see watches, wristbands, heart monitors, eyewear and more and Goel expects a mixture of approaches in different markets. And those different approaches will all require different features, connectivity and power characteristics hence the wide variety of IoT protocols and proposed standards from Zigbee, Thread, Bluetooth variants, WiFi, Z-Wave, WeMo and many more.


Workforce Management for Human Capital Management

Out of necessity, workforce management software is evolving as an integral part of systems for business units and for human resources. Importantly, advanced workforce management systems typically include analytics that help management understand workforce performance; in our previous workforce management research 61 percent of organizations said that analytics is important to workforce management. ... Furthermore, analytics can guide executives and managers to improve decision-making and rectify issues that could be leading to increased costs and be out of compliance with regulations. Many organizations, however, are not prepared to undertake these efforts; they still use an array of spreadsheets or tools that are not synchronized with real-time data from workforce management systems.


The SQL Server 2016 Query Store: Overview and Architecture

The Query Store is a feature that can help us to troubleshoot query performance, as well as capturing query execution information, such as the number of executions or the average duration of a query. The Query Store also captures every Execution Plan that has been generated for a specific query and you can then decide what Execution Plan you want SQL Server to use for that specific query. ... it is important to understand that the Query Store is a complete new feature inside SQL Server 2016, which is only available as a preview version at the time of writing these articles. This means that information inside the articles can change when SQL Server 2016 is officially released. Personally I don’t think this is very likely at the moment, seeing how the Query Store functionality remained stable during the various CTP versions, but I’m obliged to give a warning.


A Multi-Tenant (SaaS) Application With ASP.NET MVC and ASP.NET Boilerplate

Event Cloud is a free SaaS (multi-tenant) application. We can create a tenant which has it's own events, users, roles... There are some simple business rules applied while creating, canceling and registering to an event. ... Entities are parts of our domain layer and located under EventCloud.Core project. ASP.NET Boilerplate startup template comes with Tenant, User, Role... entities which are common for most applications. We can customize them based on our needs. Surely, we can add our application specific entities. ... Here, we handle these events and send email to related users as a notification (not implemented emailing actually to make the sample application simpler). An event handler should implement IEventHandler<event-type> interface. ABP automatically calls the handler when related events occur.


IT asset management strategy: License compliance and beyond

Discovery tools operate using one of two basic technologies: either agent-based or agentless. With agent-based discovery, software needs to be loaded on every one of the assets. The tool queries the agent, and the agent is going to talk back to the discovery tool. With agentless discovery, there's no agent on the individual component. [Instead, you have] profiles built into the discovery tool that I am looking for a match to. So it detects that this box exists. And it then compares what it sees in the box to the profile list. And when it finds a match, it reports that as a particular asset. That's an Exchange server, that's a file server, that's a straight file server and that's on SQL Server. And then, you as the customer can add profiles over time, so that the tool finds more and more things on its own.



Quote for the day:


"Innovation is not about saying yes to everything. It's about saying NO to all but the most crucial features." -- Steve Jobs,


December 03, 2015

How Project Managers can be a Positive Agent for Agile

Often part of the challenge is a slug of good old fashioned misunderstanding which can be cleared up. But also reasons for this sort of ‘dysfunction’ can be as simple as the PM feels increasingly squeezed between projects running agile, senior leaders liking the results but middle management still asking for reports etc in the old style. ... So that’s working with their scrum masters and working with them through a education path where we blend in the numerous soft skills of the professional facilitator and coach to help them up skill. Equipping this community with the coaching and mentoring skills, tools and techniques is part of the answer so they can seek to engage with PMs, turn around their expectations and help them see agile as an opportunity more than a threat.


Clavis Aurea, or Does the “Golden Key” actually solve encryption issues

There are quite a few examples of the ‘golden key’ idea being brought to life. Take the most obvious use case: TSA locks, created by Transportation of Security Administration. The concept is simple: travelers use TSA-approved luggage locks with a keyhole for the authorities to use (so they don’t smash open the padlock if they think the luggage needs to be searched). There are ten master (‘golden’) keys to be used on most types of luggage locks. The idea is based on the assumption that only TSA has access to master keys, whereas petty criminals raiding the luggage trunks have to use some other means to crack the padlock. However, recently the pictures of all TSA keys leaked online, followed by their 3D models.


Network Segmentation and Its Unintended Complexity

The premise is simple: you determine where your sensitive information and systems are located, you segment them off onto an area of the network that only those with a business need can access and everything stays in check. Or does it? When you get down to specific implementations and business needs, that’s where complexity comes into the picture. For instance, it may be possible to segment off critical parts of the network on paper but when you consider variables such as protocols in use, web services links, remote access connections and the like, you inevitably come across distinct openings in what was considered to be a truly cordoned-off environment.


IoT And The Supply Chain: The Complexity of Staying Connected

Imagine a factory room covered in sensors, each speaking to each other; it’s the factory of the future. Each item is a specially created building block. They can monitor and track themselves. They even act autonomously, while simultaneously contributing to the whole. The atmosphere and system will be oriented around decentralized decision making. Each smart unit will be expected to make decisions—sounds a bit dangerous, doesn’t it? If not done properly, it would be a very precarious system. To make things worse, “micro-logistics” really does refer to the smallest “micro” possible. Every speck in the chain must work properly. The lack of common standards and a frustrating skill gap means implementing these dreamy space-age solutions is not going to be normalized for some years to come. Finally, once all of these technologies are connected, the real battle begins.


Using Big Data to Track and Measure Emotion

Conversation Analytic platforms use a bundle of algorithms called EVS (Emotional Voice Streams). EVS decodes the vocabulary and searches for relationships between words and phrases to establish the topic of the dialogue as well as sentiment, simultaneously analysing non-verbal audio cues to decode information about the emotional state of the speakers. The emotion is marked on a 5-degree scale varying from strong negative to strong positive. The value is assigned to each word. Conversation Analytics uses data stream created by EVS to discover common patterns - like expressions and events that trigger negative reactions, time of the day when customer's show highest discontent, or agents who show great talent in managing angry customers.


Farsighted or Foolhardy? A Look Back at My 2015 Predictions

While it turns out the Apple Watch was the must-have tech gadget for Apple fanatics, it “is still probably not for you,” as the New York Times puts it. Why? Well, I’ve come to discover that the killer app for the Apple Watch is in fact… the clock! I use my Apple Watch when I’m coaching the kids’ soccer to figure out when time is up… but that’s about it. And the downside? Now when a call comes in, my MacBook, iPad, iPhone… and now my watch all light up with that familiar samba tune. Does this mean the Apple Watch is a failure? Of course not, otherwise I wouldn’t have bought one. On the other hand (or wrist), niche wearables like Fitbits did shake up industries for the better. IDC noted that not only did Fitbit “experience triple-digit year-over-year growth,” it also built an ecosystem by partnering with corporate wellness groups, fashion and food companies.


Microservices dilemma: Convert a monolithic solution or start from scratch?

“Don’t Start With a Monolith” states that it is very hard to split an existing monolith into microservices if it was not designed to be split. Tilkov points out that monolithic services are often tightly coupled with loosely defined interfaces, which makes the redesign to split them into well defined microservices extremely difficult. The best way to ensure that your microservices have well defined boundaries is to design that into the architecture at the beginning. ... This is the common ground, and having these boundaries well defined is crucial for successful microservices. Fowler argues that working with an existing implementation is the best way to find this, while Tilkov states that it must be planned from the start, ideally with enough domain knowledge to avoid serious mistakes.


Mossberg: An encryption backdoor is a bad idea

The problem is that, even if the FBI served the companies with a legal, court-approved search warrant for particular encrypted phones, they couldn’t comply. The lawmen would have to serve the warrant on the phones’ owners, and try and force them to unlock the devices with a password, fingerprint, or some other authentication method. Mr. Comey does pay some lip service to the values of strong encryption. In Senate testimony this past July, he acknowledged that "it is important for our global economy and our national security to have strong encryption standards. The development and robust adoption of strong encryption is a key tool to secure commerce and trade, safeguard private information, promote free expression and association, and strengthen cyber security."


Why security will make small businesses move to the cloud in 2016

Arean argues: “Services like Office 365 can obviously never be 100% secure, but you can be safe in the knowledge that they will have a team of skilled security specialists working to eliminate threats – which is much more time and resources than most SMEs can afford to devote to security.” Yet he admits it is still ‘scary’ for small businesses to migrate their operations into the major cloud vendors. “Even with public cloud platforms like Microsoft Azure, AWS or Google, which make the process much simpler, there is still work to be done in making cloud services more accessible and more intuitive for first time users,” Arean explains. “It very much still requires a ‘hold your hand’ approach to set it up which needs to be simplified in order to facilitate more widespread adoption.”


Why Agile Fails in Large Enterprises

When you transition to agile, it requires a significant shift in culture. However, some teams still use waterfall and other legacy strategies for certain operations, which can lead to agile failure. According to the ninth annual State of Agile survey by VersionOne, 42 percent of participants noted that their company culture was at odds with core agile values, and 37 percent felt pressure to follow traditional waterfall processes. To make things worse, participants cited lack of management support and unwillingness of team to follow agile as reasons their agile projects failed. ... However, as the survey revealed, 44 percent of respondents cited that ability to change organizational culture as the biggest barrier to further agile adoption, while 32 percent believed pre-existing rigid/waterfall frameworks are to blame.



Quote for the day:


"If business leaders don't engage cybersecurity action and oversight, they put their entire business at risk." -- Chris Furlow


December 01, 2015

A primer on the technologies building the IoT

The choice of a network technology depends largely on the geographical range to be covered. When data have to be transferred over short distances (for example, inside a room), devices can use wireless personal area network (PAN) technologies such as Bluetooth and ZigBee as well as wired connections through technologies such as Universal Serial Bus (USB). When data have to be transferred over a relatively bigger area such as an office, devices could use local area network (LAN) technologies. Examples of wired LAN technologies include Ethernet and fiber optics. Wireless LAN networks include technologies such as Wi-Fi.


'Composable' Synergy Infrastructure Is Biggest HPE Breakthrough In Last Decade

The new unified architecture is being billed as the first ever designed to bridge traditional and cloud-native applications into fluid resource pools that can be deployed at "cloud speed." That could eliminate the big advantage that Amazon Web Services has had over internal IT departments that have struggled to provision workloads instantly like AWS can. At the heart of the Synergy infrastructure, which will be available starting in the second quarter next year, is a set of open APIs that bring software intelligence to deploying workloads based on the business demands of the application. Hence the term "composable" infrastructure.


When Smart Things Rule the World

While autonomous business will enrich our lives, it also raises concerns about the impact on human employment. As with all technologies there will be an impact as it replaces jobs in some areas, and creates new jobs in others. However, the elimination of all, or most, employees is not a plausible scenario for most organizations in the future. “The dehumanized organization may be efficient, but it will fail to foster the emotional loyalty that characterizes the most successful organizations of our time,” Mr. Prentice said. “It’s likely that the role of humans will shift to less routine work that requires creativity and emotional intelligence, or involves complex motor skills that machines struggle to master.”


What do business people think of their CIO?

CIOs are in a race to redefine the role of IT in an era of digital transformation. While this change occurs, it is important to remain clear that the perception of business benefit is a primary reference point against which IT is evaluated. In other words, corporate functions and lines of business expect IT to deliver practical and useful benefit. Given the importance of business perceptions toward IT and the CIO, it is worthwhile to examine data on this topic. Unfortunately, the results clearly show that IT must improve its image and reputation as a provider of business value. While looking at the data, one surprising trend emerged. Although the CIO and folks in IT view themselves positively, the self-perception of IT is still extremely low. Self-loathing in IT seems to be a reality, unfortunately.


Between private cloud heaven and hell

“That was considered to be a bit too negative. So I’ve changed it to ‘stairway to heaven,'” said Waite, a Gartner analyst, at the research shop’s 2015Catalyst convention in San Diego. “Anyway, my points are exactly the same.” The truth is, Waite said, public cloud providers like Amazon Web Services and Microsoft Azure can host most everything far more efficiently than you can — no matter what size organization you run. So before anything else, think carefully about your data and whether it needs to be in a private cloud. When you’re crystal-clear on that, start climbing the stairway. Here are Waite’s milestones on the way to private cloud success.


3 Ways Conventional BI Analytics Will Fail Retailers this Holiday Season

Conventional BI analytics can’t give you those answers to help optimize distribution and merchandizing. You need real-time analytics that can examine millions of questions, build hundreds of models and help you understand the subtle differences. Conventional prediction models take too long to manually craft and update. If your predictive modeling takes a month to complete and mine takes a day, I could decide based on the latest data possible, while you are deciding based on months-old data. And, since we know that consumer behavior is fickle, every extra day of data matters. When a model can be created, updated and acted upon faster—in days or hours, not weeks or months, you end up acting based on more current data.


Where Fin-Tech Is Struggling With Regulation

... many of these regs and rules were pre-mobile, pre-eCommerce, pre-Internet. Because many of the fintech models are introducing innovative and new methods of delivering financial services, it can create confusion on the applicability of which regs/rules apply. ... the number of fintech startups has increased significantly as more investment dollars have poured into this sector. Venture investing in fintech has gone up approximately three times in the past 18-24 months, so the sheer number of new startups in this sector has created more regulatory concerns. ... there has been a lot of new financial services regulation introduced in recent years such as Dodd-Frank, the Foreign Account Tax Compliance Act, Durbin amendment and other new regs and even banks are challenged with keeping up with all the new regulations that they need to be in compliance with.


Divya Jain: Machine learning maven. Startup founder. Women in tech advocate.

In addition to machine learning, Jain is interested in the growing IoT market. "Making smart watches, and buildings, and all kinds of little things is really going to be very helpful—not just as a business, but I think in our daily work lives these things are going to make a big difference," she said. When asked for her thoughts on some of the biggest issues affecting enterprise IT, Jain said it's a matter of relevant information. Even with advances in technology, finding information on the internet is still easier than finding information within an organization, she said. We have some of the technology available, but it has to be secure and properly managed because of the sensitive nature of enterprise data.


Building Flat Organizations with Cross-functional Teams and Fewer Managers

It all means that organizations deal with more complex problems in a rapidly changing environment. It demands intelligence and mobility. This leads to so many changes within the organizations! Command and control barely work for intelligent people, so you have to invent new ways. ... The company strategy can't be created by a single person, since he or she doesn't know everything, it should emerge from successful initiatives at the lowest levels. Flatness is just one characteristic of a “new generation” companies. It helps to make decisions faster, run more experiments, fail faster and find new solutions faster. The truth is that we don't have proven best practices how to create flat organizations and what "new generation" means in general. We have just some working examples and many critique quarrels.


How this cloud BI CEO is working hard to stand out from the analytics crowd

At the time, the IT team was struggling with its own legacy, homemade system and teams had to wait in line for their data extractions. Those needing more data had to wait again, causing a bottleneck in the IT department. "The systems were not agile and queries were slow to be resolved," she says. Frustrated, it was this experience as a young, female controller who had to "wrestle with an all-male IT department over unfettered access to fresh data" that led her to start her own business. "I had to do something to modernise business intelligence and create the product of my dreams," she says. What she was about to learn, and fast, was that her struggle lay not just in being a woman in a male-dominated industry, but it was also because her vision of business intelligence as a service ran against the grain.



Quote for the day:


"None of my inventions came by accident. I see a worthwhile need to be met and I make trial after trial." -- Thomas Edison