December 21, 2015

Why we need a national IoT strategy

While the Center for Data Innovation report anticipates that the private sector will be the primary driver of innovation and development in the IoT over time, it notes that there is hesitation among many firms to dive headlong into the field owing to concerns over the risks of not being able to recoup investment in the nascent technology. In that regard, the center is suggesting that the government could position itself as an early adopter, deploying IoT devices and applications in its own facilities and in the sectors where it plays a dominant role, such as defense, transportation and energy. Castro also sees a role for the government to play in expanding deployment of the infrastructure that supports IoT -- and ensuring universal access to it -- to prevent a new type of digital divide from taking hold.


A practical guide to effectively ushering DevOps into any organization

Many times, we observe that within the IT organization, development, testing, and operations have different goals, objectives, and KPI’s. They never cross-functionally define business needs. They mostly define technology as organization-specific. As an example, a functional tester doesn’t know how developers are communicating with each other, or the security team for security-related issues. An operations engineer has KPI up-time, but he really doesn’t know the various application modules he's supporting.  Suddenly, by enforcing DevOps, we're telling all the organization to begin communicating, start intersecting, start having cross-communication. So this has become a key problem in the 21st century infrastructure, application, testing, or overall DevOps framework implementation. Communication and understanding have become key challenges for organizations.


Cloud Foundry Launches Cross-Vendor Cloud Service Certification

"We are betting big on Cloud Foundry to run our next-generation Nexen digital ecosystem. We need to be able to run our apps all over the world, and that means we need Certified Cloud Foundry to guarantee portability," Kumar said in Cloud Foundry's announcement Dec. 15. Cloud Foundry also has a reputation for providing good virtual machine and container tools geared to modern microservice applications. It automatically embraced VMware and open source hypervisors. Its Garden and Warden container technologies were designed to deal with different container formats and runtimes, moving it beyond the just-Docker approach prevalent in the early days of containers. Another user commenting in Cloud Foundry's announcement was Kaiser Permanente's CTO Mike Sutten.


Benefits of an “Agile” Mindset

The main difference in rapid project initiation lies in the level of detail explored. Because the agile approach is designed to be tolerant of change, the lean principles of “just enough” and “just in time” are applied to project planning. Agile projects draw the “just enough” line at a relatively high level, leaving significant ambiguity at this phase of the project. This ambiguity is most obvious in the lack of requirements detail and the rough preliminary project plan produced. A Guide to the Project Management Body of Knowledge (PMBOK® Guide) Fifth Edition, Project Management Institute, Inc., 2013, does not specify the level of detail needed for project initiation.


Essential data points for the tech year ahead

If an overarching conclusion can be drawn from the results of Computerworld's Forecast survey of 182 IT professionals, it's that 2016 is shaping up to be the year of IT as a change agent. IT is poised to move fully to the center of the business in 2016, as digital transformation becomes a top strategic priority. CIOs and their tech organizations are well positioned to drive that change, thanks to IT budget growth, head count increases and a pronounced shift toward strategic spending. Amid the breakneck pace of change in technology and business alike, where should you direct your focus in the new year? Read on for key highlights and data points on budgeting, hiring, business priorities and disruptive technologies that promise to define the IT landscape in 2016.


JUnit Lambda: The Prototype

The most important piece of JUnit’s API is the @Test annotation and nothing changes here: Only the methods annotated with it will be considered as tests. The tried and tested annotations to set up and tear down tests stay virtually unchanged but have new names: @Before and @After, which run before and after each test method, are now called @BeforeEach and @AfterEach; and @BeforeClass and @AfterClass, which run before the first and after the last test from a class, are now called @BeforeAll and @AfterAll. I like the new names. They are more intention revealing and thus easier to understand – especially for beginners. Then there is the new @Name, which can be used to give more human readable names to test classes and methods.


Four technologies impacting enterprise communication

Messaging through smartphone applications is an obvious means of communication considering we are always connected. We used to walk away from our phones, but now we still have them even if we are busy. Enterprise UC services offer instant messaging, but it is not usually effective for inter-company work teams. A new breed of business-focused messaging apps, such as Slack and HipChat, are gaining popularity, but they don't do a great job at real-time communications. Workstream communications and collaboration (WCC) is where asynchronous messaging-based solutions combine with UC. Services are already available from several vendors including Cisco, Interactive Intelligence and Unify, and many more are coming.


5 Strategic Planning Pitfalls and their Antidotes

People often enter a planning process with the expressed concern that “this will not be actionable and we will fail to actually implement it back at work.” As a result, an inordinate amount of time goes into attempting to plan for how to implement the plan back at work. Predictably, back at work, the day-to-day whirlwind of business as usual takes those well made plans and has their way with them, leaving people feeling frustrated at the time spent preparing for execution. ... Planning at its best results in new context, prioritization, and vision that allows day-to-day work to be executed in sync with the directional push, not separate and distinct from it. Over-communicate the plans and priorities you craft in strategic planning sessions so that everyone, at every level, understands how what they do today connects to where you are going tomorrow.


“DevOps: A Software Architect's Perspective”

Activities that have system-wide impact should occur within the constraints of the enterprise. There are two types of monitoring and metrics that are relevant to a team. One is the monitoring and metrics of their particular code (service, subsystem, whatever). The team needs to have leeway to do the right thing in this case. The other type of monitoring and metrics are those with business relevance - transactions per second, latency, reliability, orders per second, etc. Monitoring needs to present both the business relevant metrics and have the ability to drill down to determine which code segments are contributing what to those metrics. Developers when they deploy a new version should first ensure that the business metrics are not affected (or are affected in predicted ways) and then that their particular new deployment is behaving well.


Welcome To The ‘Always-On’ IT Department

To be effective, and considerate, the IT department should have no more than four to six layers for the user to navigate through. Fewer than four and the user’s problem really can’t be identified with enough certainty. More than six, and the user is probably going to get very perturbed.  “The first thing is programming [the on-call scheduling system] as explicitly as possible,” Jones says. “We know people don’t want to sit through 10 different choices, but the more choices you have, the more likely you are to get somebody to the right place. Still, there’s a limit to the number of buttons on a phone – and usually we don’t want 10 choices – you can’t use a zero because that will call an operator, theoretically. This is the dilemma, because to be explicit and to be quick and to the point, and also be easy to program are often totally at odds with each other.”



Quote for the day:


"When you believe you have lost your power and control, nothing will ever seem easy or simple." -- Shannon Alder


December 20, 2015

Mobile App Developers are Suffering

First, a user must discover the potential new app. This is by far the most challenging problem that developers face. There are two portals for discovery today: 1. paid promotion, which is dominated by Facebook, and 2. the app stores themselves. The biggest issue is that these two forms of promotion only work for the apps that have already been discovered. Paid promotion is completely unsustainable for most apps given that the cost for an active install increased to $4.14 in the last few months. I can count on my hands the number of business models in the app ecosystem which can support that cost of customer acquisition. This means that app ads are only usable by the very small percentage of the ecosystem that is monetizing well. For the majority, it is a prohibitive channel.


Driving Digital Transformation Using Enterprise Architecture

The speciality here is, change in pattern for “Transformation” when the prefix “Digital” gets associated. It is no longer IT for Business. It is technology-enabled business, literally! The basics of market place of how one get their 4Ps together to generate values is changing and thus newer Business Model. That is where the critical differentiation comes in. This drives in a couple of thoughts: A) Business Gurus need to understand information and technology B) Technical Gurus need to understand business. It is no longer a question of business and IT alignment, it is a question of merger and how the mix looks like! Everyone understands this and understands that change is unavoidable. However, they are also apprehensive of repeating “past failures to transform”.


Google reveals the most popular searches in 2015

Google has released its list of the most searched terms of 2015. Over 3.5 billion searches are made on Google everyday - around 1.2 trillion per year - and the company combs through these to compile a list of the most popular. The list is a good way to measure what happened during the year and includes a mix of news events, films, celebrities, and apps. Here are the top 10 most popular searches on Google in the past year.


In Who Do We Trust? How Privilege Plays Out in Security and Privacy Online

To make matters worse, there are often conflicting reports on how consumers should protect themselves from identity theft, surveillance and other online threats. Without trusted beacons out there, it is often up to individuals to figure out how to protect themselves — or recover — from invasions when they do occur. Threatening the situation even further is the acceleration of cybersecurity misinformation and government manipulation in the wake of the November 13th Paris attacks. As information about the Daesh (aka ISIS)-affiliated perpetrators began to emerge, so did reports on how they planned their attacks.


The First Person to Hack the iPhone Built a Self-Driving Car. In His Garage

There are two breakthroughs that make Hotz’s system possible. The first comes from the rise in computing power since the days of the Grand Challenge. He uses graphics chips that normally power video game consoles to process images pulled in by the car’s camera and speedy Intel chips to run his AI calculations. Where the Grand Challenge teams spent millions on their hardware and sensors, Hotz, using his winnings from hacking contests, spent a total of $50,000—the bulk of which ($30,000) was for the car itself. The second advance is deep learning, an AI technology that has taken off over the past few years. It allows researchers to assign a task to computers and then sit back as the machines in essence teach themselves how to accomplish and finally master the job. In the past


Tech support call scams becoming more aggressive

Another variation of the tech support scam is luring people to the bogus, malicious fake site. The US Federal Trade Commission (FTC) recently fined ($1.3 million) and shut down some scammers who had stolen over $17 million from their duped victims by luring them to their sites with pop-up alerts telling the victim that malware was on their PC. The ads provided a contact number and people would be told to call to get rid of the problem. From there they’d be directed to a malicious site and the unsuspecting victim would follow instructions, and then nasty malware, ransomware would be downloaded, and they would be charged thousands of dollars to have it removed. Every business, of every size, and every individual is a potential target. Make sure that everyone in the organization can recognize some of the key red flags of a tech support scammer.


Using MySQL with Entity Framework

Starting with version 6.7, Connector/Net will no longer include the MySQL for Visual Studio integration. That functionality is now available in a separate product called MySQL for Visual Studio available using the MySQL Installer for Windows ... They have created an *open system for others to plug-in ‘providers’ – postgres and sqlite have it – mysql is just laggin… but, good news for those interested, i too was looking for this and found that the MySql Connector/Net 6.0 will have it… You would need a mapping provider for MySQL. That is an extra thing the Entity Framework needs to make the magic happen. This blog talks about other mapping providers besides the one Microsoft is supplying. I haven’t found any mentionings of MySQL.


Peer Feedback Loops: How to Contribute to a Culture of Continuous Improvement

Feedback is an essential part of any lean or agile development. This holds for the technical level as well as for your work management system. This article advocates for complementing the well-known strategies of metrics and meetings with peer feedback. Why peer feedback? Simply speaking, because this kind of feedback encourages continuous improvement on a personal level too. ... the value-add of peer feedback depends heavily on how it is facilitated. That is why, the three articles of the series present a total of nine methods I've tried and tested in various environments. To make these methods as comprehensive as possible they are presented in the context of real-life case studies and complemented by some figures to illustrate what they can look like.


Web Socket Server in C#

A lot of the Web Socket examples out there are for old Web Socket versions and included complicated code (and external libraries) for fall back communication. All modern browsers that anyone cares about (including safari on an iphone) support at least version 13 of the Web Socket protocol so I'd rather not complicate things. This is a bare bones implementation of the web socket protocol in C# with no external libraries involved. You can connect using standard HTML5 JavaScript. This application serves up basic html pages as well as handling WebSocket connections. This may seem confusing but it allows you to send the client the html they need to make a web socket connection and also allows you to share the same port.


When And Why OpenStack Needs A Cloud Management Platform

Different companies stop at different stages of this maturity model, depending on the business needs and the maturity of their IT organization. As the environments in stage 1 and stage 2 grow in size and complexity, companies can reach an operational scale that requires more sophisticated management tools than the ones provided out of the box by server virtualization and IaaS cloud engines. ... OpenStack does a great job in providing the instrumentation for the aforementioned capabilities – think the metering APIs that OpenStack Telemetry (Ceilometer) offers or the orchestration templates that you can define with OpenStack Orchestration



Quote for the day:


"Before you are a leader, success is all about growing yourself. When you become a leader, success is all about growing others." -- Jack Welch


December 19, 2015

Next Breakthrough Wearable Doesn’t Need More Functionalities, It Needs Versatility

Garmin’s Vivofit line drives home this point. Popping the display out of the band makes you realise what’s at the heart of these products when stripped of their bands. It’s like that scene in Return of the Jedi when you realise that, beneath all of that cool black armour, Darth Vader is really just an elderly bald man playing the harmonica. Paired with the dozens of different bands the company offers, the Vivofit can become a completely different thing entirely. Misfit’s Shine takes this idea to a compelling extreme. It’s a device that’s essentially a little metal pebble that slots into various different wearable form factors, including a wristband, a necklace and a simple clip.


2016 - The Year of Connected Customer

Although most companies recognize the importance of customer relationships, they lack the necessary skills, processes and technology to utilize data to their advantage. Most businesses are drowning in customer and employee data, yet they're unable to quench their thirst for actionable insights that deliver customer value and successful business outcomes. IDC research shows that less than one percent of customer data is analyzed by businesses today. The inability to analyze customer data results in 77% of customer who are not engaged with companies that they do business with. Companies cannot afford to ignore the connected customer.


Why Elon Musk Is Nervous About Artificial Intelligence

Thiel has called Altman and Musk's fears "a little bit overdone at this point," but for years has admitted that the outcome of artificial intelligence research could be a mixed bag. An artificially intelligent computer "could be very good, it could be very bad, it could be somewhere in between," he told Business Insider in 2009. "Certainly we would hope that it would be friendly to human beings." Regardless of how friendly AI might be, Thiel says that with the technology developing, it might be best not to come off as an anti-computer human being, lest future synthetic entities turn out to be the type to hold a grudge.


Stress management can reduce absenteeism

Luthans’ research clearly demonstrates that boosting psychological capital in a company equates to improved productivity. In a paper titled “Positive psychological capital: Beyond human and social capital,” he states that “the value created when human capital is aligned with corporate strategy and fully engaged in making the enterprise effective has been researched extensively…and found to have a significant positive impact on performance outcomes.” As companies face tougher competition for both human capital and improved financial results, they would benefit by investing in programs that foster a resilient workforce. As the ever-changing workplace requires people to learn new skills and adapt to changing management styles, the importance of stress management is evident. But it’s how a person responds to these situations that magnifies his or her level of resiliency.


What Big Data Analytics Can Learn From The NoSQL World

The first lesson Big Data can learn from the NoSQL world (and from other modern software domains like mobile, social and more) is that simplicity and ease-of use are key – they are not nice-to-haves and do not take a back seat to anything else. Developers are viewed by the NoSQL world as the “masters” – and the technology needs to fit the way these masters will use it. Perhaps the main reason that NoSQL has been so successful is its appeal to developers who find it easy to use and who feel they are an order of magnitude more productive than other environments. The same is true for ops. The result is something that makes everyone more productive – developers, ops people etc.


Why a Solid IT Infrastructure is Important in Establishing Business Continuity

Ensuring business continuity in a connected environment will require high availability. This refers to the operational duration of any system. A 100% uptime means your infrastructure never experiences any unexpected outage. As this is virtually impossible, reputable service providers aim for at least 99.999% uptime, which translates to only five minutes of downtime in any given year. From the perspective of a connected business, this approach ensures the optimized performance of a website or enterprise platform. It detects points of failure that can potentially cause the downtime and mitigates failure by distributing the load and traffic across the infrastructure. In the event of failure, a high availability infrastructure will have failover and recovery mechanisms.


Yesterday’s technologies, today’s problems

What those really old systems will do, however, is fail. I don’t know about you, but I sure wouldn’t want to try to restore data from a Windows 2000 system, never mind a VAX/VMS box, an AT&T 3B2 System V Release 3.2 Unix system, or a TRS Color Computer (endearingly known as CoCo). I didn’t pick these computers at random. I know people who are using all of them for production. I can also guarantee that if you’re using a “modern” but out-of-date copy of Mac OS X, Linux or Windows, you will be attacked and hacked. If your system is on the Internet, it’s only a matter of days before your systems will be cracked. Worse still are those embedded devices, such as Wi-Fi access points, that never get their firmware updated. Many of these contain cracked software, such as OpenSSL with the Heartbleed vulnerability.


Understanding the Cyber Dialogue

Cybersecurity is more than a technological issue—it’s a business issue. In a BoardVision video moderated by Judy Warner—editor-in-chief of NACD Directorshipmagazine—Mary Ann Cloyd, leader of PwC’s Center for Board Governance, and Zan M. Vautrinot, former commander of the Air Forces Cyber Command and current director of Symantec, Ecolab, and Parsons Corp., discuss effective cyber-risk oversight, addressing the following questions: How can boards communicate with management about cyber risk? How does cyber risk fit into discussions about risk appetite?


The Soul of a New Release: Eating Our Own Dog Food

The second pillar of a successful release was made possible by what we call the “meta-solution” situation, an Alice in Wonderland kind of paradox that occurs when you build monitoring solutions that you can use to monitor your own services. To give you an idea how this was beneficial to us, let me describe the solution we were building in a few words. Plumbr is designed to detect slow and failing user transactions in an application, and automatically link such transactions to the root cause in the source code. Building such a solution meant that the task of testing and especially performance testing new code was reduced to processing the alerts triggered by Plumbr (the instance that was monitoring Plumbr) and fixing the exposed root causes as they appeared during the development process.


Everything You Know About Latency Is Wrong

Almost all latency benchmarks are broken because almost all benchmarking tools are broken. The number one cause of problems in benchmarks is something called “coordinated omission,” which Gil refers to as “a conspiracy we’re all a part of” because it’s everywhere. Almost all load generators have this problem. We can look at a common load-testing example to see how this problem manifests. With this type of test, a client generally issues requests at a certain rate, measures the response time for each request, and puts them in buckets from which we can study percentiles later. The problem is what if the thing being measured took longer than the time it would have taken before sending the next thing? What if you’re sending something every second, but this particular thing took 1.5 seconds?



Quote for the day:


"Boring is an attitude, not the truth. Possibility is where you decide it is." -- Seth Godin


December 18, 2015

#noprojects – Focus on Value, Not Projects

#noprojects provides a better and less risky approach to delivery by removing the common factor in all of these failures, the project itself. This is not to say that there are no failures in a #noprojects approach. However, because of the discrete nature of #noprojects activities, technical failure is self-contained, easily identified and generally recoverable. Failure relating to project process, project governance, stakeholder buy-in, and scope management is, by definition, no longer relevant. Opportunity costs can be the hardest to quantify, but can be the largest single cost to an organisation running a project.


How to avoid being caught out by ransomware

Patrick Wheeler, director of product at Proofpoint, calls regular backups “the most reliable method for recovering infected systems”, which makes it all the more important to prevent the initial infection. Gary Warner, chief threat scientist at PhishMe, says that rather than a simple backup, in order to be effective, a backup must be “serialised”, with older versions of files available in case newer versions have been corrupted or encrypted.Other advice includes storing backups in an offline environment because many ransomware variants will try to encrypt data on connected network shares and removable drives. Daniel Miessler, director of client advisory services at IOActive, stresses the importance of having known-good and up-to-date backups that are as close to real time as possible.


Can This Man Make AI More Human?

Given that probabilistic algorithms and other technology in the works at Geometric Intelligence would be compatible with deep learning, it is possible that eventually the likes of Google or Facebook will acquire the company and add it to its overall AI portfolio. And despite Marcus’s criticism of connectionism and deep-learning fever, I have a hunch that he would be quite satisfied with such an outcome. Even if that does happen, it will be significant if ­Marcus can show that the most miraculous learning system we know—the human mind—is key to the future of artificial intelligence. Marcus gives me another example of his son’s cleverness. “My wife asked him, ‘Which of your animal friends will come to school today?’”


Public cloud vs. on-premises, which is more secure?

Perhaps cloud pessimists have good reason. In 2014 CodeSpaces became a poster-child example of how not to use the cloud correctly. Hackers gained access into the company’s central AWS administrative and demanded a ransom. When it was not paid hackers deleted everything in CodeSpaces’ AWS environment. It was a dark day for cloud security. Some saw it as an example of why the cloud can be insecure. Others used it as a teaching moment. But there are certain workloads that will likely never move to a public cloud. Some organizations for regulatory, compliance, safety or customer demand reasons require “air-gap,” offline data center operations – meaning no network connectivity into or out of the data center.


Big Data – The Trillion Dollar Asset

If you look at companies today, most of them are not very good at using the data they have to make better decisions in real time. I think this is where the next trillion dollars comes from for our customers and for our industry.” Dell’s in the midst of a $67 billion, history-making tech acquisition with EMC and clearly trusts the enterprise information technology as a service (ITaaS) leader to store and manage a treasure chest of smart data. And Dell isn’t the only tech player betting on a hot data economy. ... And by 2020 IDC believes that line of business buyers will help drive analytics beyond its historical sweet spot of relational (performance management) to the double-digit growth rates of real-time intelligence and exploration/discovery of the unstructured worlds.


The Inception Of Wearables In The Workforce

The information organisations will be able to gather with wearables can improve productivity, increase employee engagement and even potentially lower the number of sick days employees take. The use of this data presents the opportunity to largely disrupt existing benefits and rewards schemes. While wearables allow employees to go hands-free and participate in meetings while on the go, the real value for organisations will be real-time insights and the information these devices can collect. For instance, wearables can allow employers to easily track an employee’s time throughout the day and gain a clear picture on where time is being spent and quickly identify inefficiencies. This information can have an enormous impact on a company’s ROI and show new ways to improve employee engagement based on individuals’ preferences and habits.


Now's the time to perform a personal Android security audit

Head over to the Google Play Store settings and look at your list of available devices. These are the Android devices that show up as options every time you install a new app from the Play Store Web interface -- and also the devices that show up as options in the Android Device Manager (more on that in a sec). ... You might not realize it, but Google has its own utility for tracking, finding, and remotely wiping an Android device in case you ever lose it -- and the whole system is built right into the operating system. So what are you waiting for? Make sure all of your phones and tablets are enrolled now, before it's too late. Just head into the Google section of each device's main settings menu (or look for the app called Google Settings), then tap Security and verify that "Remotely locate this device" and "Allow remote lock and erase" are both checked.


Lessons Learned About Cloud Migration

An interesting side effect of cloud migration is that it placed APM tools on the agenda of the CIO. With the elasticity and flexibility of the cloud, companies can more directly and immediately drive cost optimizations. Greg Birdwell from BARBRI made the point, “We use an APM tool not only to monitor the health of our infrastructure. If I see that we have servers consuming significantly less CPU or memory, I can switch to cheaper instances. The cost savings are immediate.” Mark Kaplan of BARBRI said that Ruxit helped them to get exactly the insight into the dependencies and resource requirements of their environemt as basis for migration It might still take a while until we see CIOs around the world looking at APM tools and calculating cost benefits based on monitoring data, but things are moving that direction.


Biometrics to support 50pc of mobile transactions in 2016: report

There was also was significant growth in 2015 in the number of people using their mobile devices to open a wide range of financial accounts. With this trend in mind, financial institutions are increasingly optimizing their account opening content for the mobile Web and integrating it into their apps. Others who are lagging behind are expected to put this at the top of their priority lists in 2016, per Mitek. With certain clients already seeing a greater volume of account openings on mobile compared to desktop and other expected to put a focus on this next year, Mitek forecasts that mobile will win the account opening race in 2016.


Work-life balance: don't overlook the role of technology

Often management make assumptions that employees are armed with the right equipment or that the tools are "good enough" to work with, so are reluctant to rock the boat to invest in new technology. PwC saw that a UC deployment achieved a whopping 54% uplift in employee well-being. That clearly highlights that employee's value being given technology that make their jobs and collaboration easier.  For me the big worry was the marked difference between the 8% well-being benefit that management expected and the realised 54%. This shows how out-of-touch management really are with how employees feel about their jobs and their desire to perform to the best of their ability.



Quote for the day:


"The final test of a leader is that he leaves behind him in other men the conviction and the will to carry on." -- Walter Lippmann


December 17, 2015

Cisco Spark – is this the New Collaboration Era?

Kudos to Cisco for taking a bottom-up approach to redefine the solution around a problem set that decision-makers can understand. Nobody has really cracked the code yet, but based on what we saw last week, I think Cisco has come the closest so far. Rowan rightly noted that two key UC building blocks – telephony and video – were designed pre-mobility and pre-Internet, and that just won’t cut it for today’s collaboration needs. So, they’ve re-designed these as part of Spark Service for the cloud and from the cloud, and when you start like this from a clean slate you’re already ahead of the pack. As to whether we really are in a new era, we’ll find out next year, but I’ll start with three distinct things Cisco has done to change the game.


9 ways corporate fitness and wellness programs will change in 2016

The trend of incorporating "mental well-being" into corporate health programs is gaining traction in places such as Silicon Valley, according to Nichol Bradford, founder of the Transformative Technology Lab in Palo Alto, Calif. Some tech companies are "looking into ways to incorporate wearable gear that measures brainwaves, as well as meditation programs that help employees better communicate and become leaders," he says. ... Many modern corporate fitness and wellness programs already employ activity trackers, but 2016 will bring additional technologies and applications into the mix. We can expect to see a more "multifaceted" approach to delivering new features, according to Jeff Ruby, Newtopia founder and CEO, including live fitness coaching delivered to employees via two-way video conferencing.


The Connected Person’: IoT, Big Data, and the Cloud

In the relatively near future, a standards- and cloud-enabled IoT for service providers will likely also serve “the connected person.” This is already happening to some degree via apps on mobile devices. The personalized cloud for individuals will be populated by devices, software and data that ultimately bring the world to one’s digital doorstep. This will provide a means to access, monitor and to some extent control one’s digital world, from the home area network to the larger world. Cloud-enabled IoT and associated Big Data processing has implications for healthcare, education, transportation, personal finance – all the industry verticals served today by the Internet. In this vision, cloud-based hardware in conjunction with cloud-based software will capture, share, route, process and visualize information.


Refactoring Code to Load a Document

Much modern web server code talks to upstream services which return JSON data, do a little munging of that JSON data, and send it over to rich client web pages using fashionable single page application frameworks. Talking to people working with such systems I hear a fair bit of frustration of how much work they need to do to manipulate these JSON documents. Much of this frustration could be avoided by encapsulating a combination of loading strategies. ... Specifying just the bits I need via databinding is a really good way to get hold of a reduced set of data like this. Libraries that use databinding like this usually have a configuration parameter that indicates how the databinding should treat fields in the JSON that don't have a binding in the target records.


Hidden colocation cost drivers that add up

When it comes to colocation deals, there is absolutely no substitute for due diligence. Consider the value-added services and support level that are most appropriate for the business, as well as what happens when you need more. Are there cost penalties, for example, or will excess support requests simply go unanswered? Read the contract, service-level agreement (SLA) and any price lists or addendums carefully. Ask the provider directly about any costs or fees that weren't covered, such as early termination. When you select a colocation provider, don't be afraid to start small and expand services later, and don't hesitate to negotiate for the most cost-effective services. You can often negotiate services and support costs, and competitive providers want to talk when a long-term contract is on the line.


5 Ways ADCs Can Improve Performance of Network Infrastructure

Optimizing network performance is a task that spans multiple domains – from architecting the network, with capacity and topology (segmentation) considerations, through redundancy, bandwidth management and security aspects. But today, I would like to raise 5 additional ways to optimize overall network performance by best utilizing advanced Application Delivery Controller (ADC) capabilities for front end applications. ... A lot has been said about the 30 year old Transmission Control Protocol (TCP) and how it was designed for reliability. This impacts efficiency and performance and on top of that challenge, there’s also the chatty nature of the HTTP protocol to consider.


The 10 most important lessons IT learned in 2015

The end of a year is always a good time for reflection, especially so if you're evaluating what your business did right and what you can improve upon. In an increasingly digital world, IT has quickly become one of, if not the most, important aspects of an organization. So, it should be with great care that executives and admins look back on their year and try to glean some wisdom about what can be done differently in the year to come. ... "BYOX is the new mantra with consumers bringing their own applications, cloud sharing tools, social media into the enterprise; essentially bringing their own expectations of which technology they want to use and how and where they want to work in a corporate environment," said Chuck Pol, president of Vodafone Americas.


“Outsourcing Is Bad:” Why Good Vendors Agree

For both obviously tech driven and less obviously tech driven companies, success hinges upon strategic software development that meets business goals. IT is now more than ever in the driver’s seat—or has the chance to be. That means ensuring “t’s are crossed and i’s are dotted.” You can’t do that unless your internal software development folks are strong, and your external software development resources are integrated with them in a meaningful way. I refer to this latter integration as “team augmentation”—not to be confused with staff augmentation. Team aug requires any third party team members to be grown up and into, embrace and support today’s business and IT culture of rapid development, big picture thinking, knowledge sharing, ownership, and quality.


It's Time For IT Teams to Digitize Like The Startups Do

Unlike a manufacturing plant, a knowledge work factory has no industrial engineers who recognize errors as valuable redesign opportunities. Instead, each employee in the knowledge work factory is expected to manage a dizzying array of one-off corrections. If they think of these corrections at all, they and their managers view these as valuable activity. After all, they are preserving revenue, making the sales force more effective and keeping customers happy. This is virtuous activity – “virtuous waste.”  Despite its circular logic, the virtuous waste misperception provides an opportunity for knowledge workers to continue the status quo. Startups exploit this opportunity.


IoT startup Afero goes end to end for security

At the heart of the company's platform is the Afero Cloud, which performs services like security and includes long-term data storage. Devices with the Afero ASR-1 Secure Radio Module, which uses the low-power Bluetooth Smart protocol, will connect to that cloud with encryption end to end. Other types of IoT devices can communicate with Afero-powered products through cloud-to-cloud integration, but without the same security, the company says. For security, Afero looked to the larger world of digital security for best practices. For each session, the device and the cloud service both are authenticated using an elliptic-curve key exchange, usually with 256-bit key pairs.



Quote for the day:


"Leadership is an opportunity to serve. It is not a trumpet call to self-importance." -- J. Donald Walters


December 16, 2015

Move Fast and Fix Things

The first thing we do when starting an experiment is enable it for a tiny fraction (1%) of all the requests. When an experiment "runs" in a request, Scientist does many things behind the scenes: it runs the control and the candidate (randomizing the order in which they run to prevent masking bugs or performance regressions), stores the result of the control andreturns it to the user, stores the result of the candidate and swallows any possible exceptions (to ensure that bugs or crashes in the new code cannot possibly impact the user), and compares the result of the control against the candidate, logging exceptions or mismatches in our Scientist web UI.


Why fail fast when you can learn?

Start-ups are comfortable with the prospect of failure - it comes with the territory. When a start-up's new idea, feature or service does not work it is quickly amended or removed altogether and the business moves on to the next idea. Failing fast has become a mantra in the digital age. Traditional businesses - and particularly CIOs - are regularly encouraged to follow the start-up community in their willingness to experiment and to fail. As long as the failure is small in nature, recognised quickly and appropriate action is taken to stop or adjust the experiment then, CIOs are told, everything will be OK.


Experts predict what 2016 will bring for DevOps and IT

“Thinking about log data may seem too far in the weeds for most tech industry professionals. However, using analytics to monitor, manage and gather insights from logs will be the only near-perfect way to make sense of the increasingly complex and cloud-based architectures.” Log management isn’t exactly new or cutting edge, but Beedgen believes that 2016 will see more vendors trying to move into the log management space,  ... The sharing economy has changed the way businesses engage customers and deliver services, and that includes IT through aspects such as cloud services, microservices, APIs and more. Fitz predicts, “Next year this ‘Uberfication of IT’ will turn into a ‘Balkanization of IT,’ driving stakeholders to demand better insight, governance and control of federated technologies to integrate adoption, usage, monitoring, security, cost control and more across shared services.”


The Dark Side of Wearables: How They're Secretly Jeopardizing Your Security 

As wearable devices make their way into the workplace and corporate networks, they bring a host of security and privacy challenges for IT departments and increase the amount of data that data brokers have to sell about an individual. Jeff Jenkins, chief operating officer and co-founder of APX Labs, talked about the security and privacy of wearables during a panel interview with Tech Pro Research at CES 2015. Because wearable devices are designed to be small and portable, Jenkins said, "you have to make sure you're thinking security first and you're thinking about the information that's being generated by them. You have situations where it's no longer just personal data that may be exposed or compromised, but also potentially operational data, that could be sensitive in nature."


Top 15 security predictions for 2016

In putting a security spin on the holiday song, “It’s the most predictive time of the year.” Not that those in the industry – even the best informed – have an infallible crystal ball. It’s that being effective in an ever-more-rapidly evolving threat environment means looking ahead. An accurate prediction can help an organization protect itself better. A wrong one can mean less ability to prevent or respond effectively to a breach that can damage reputation, the bottom line and more. So, here are some best guesses about 2016 from more than a dozen vendors and analysts.


The Internet crisis coming January 1, 2016 is way worse than Y2K

on January 1, 2016, anyone with a phone that’s more than five years old will not be able to access the encrypted web, which includes sites that are extremely important for most people to access, like Google, Facebook, and Twitter. The population this change will most affect are residents of the developing world, where up to 7% of people could find themselves without Internet because their 5+ year old phones don’t pass encryption muster. Most sites are encrypted. If you see that https with a green lock at the start of a URL, that means the site has been certified, and you know that you’re on, say, the real HelloGiggles, as opposed to a dastardly impostor hellbent on destroying all the cat videos in the world. No, but in all seriousness, encryption means that you can browse the Internet with an easy mind, and not worry that one wrong click will jeopardize your security.


In Virtual Reality, Exercise Bike Becomes a Race Car

With several virtual-reality headsets for consumers coming out this year—including Oculus’s anticipated Rift—excitement is growing around applications like gaming. But virtual reality has long been used for rehabilitation, including exercising. A 2011 study from the University of North Carolina at Charlotte, for instance, found that when people thought the intensity of a virtual-reality workout increased, so did their motivation. Inside the headset, VirZoom cofounder and CEO Eric Janzsen challenged me to a race-car race. I leaned to hug corners on tight turns and pedaled faster to speed up my car. When I rolled over what looked through my headset like rougher ground, I was forced to pedal harder to keep up the same pace.


Top 5 Shakers: Outlook on the Future of Mobile Technology

It might work different but there will be no popularity for anything that doesn’t serve privacy and no design that is invasive to the environment will become dominant either. Right now the phone market is cold and without innovation. The only drivers are more and better computing power and maybe a better camera. I am really bored by what the major manufacturers are throwing in the market right now. There are some interesting ideas around and startups and lesser manufacturers are at least trying to bring them to market. However the market segment is too small and far from gobbling up a significant piece of the market, which is currently served by large brands primarily, and that means it won’t drive user culture change.


Why Microsoft will beat Google in the enterprise cloud war

It's easier to get started with Google's tools, for example, but Microsoft provides greater flexibility and support for critical IT deployment needs, according to Keitt. Office 365 customers have more options when it comes to licensing for apps and data that will be hosted by Microsoft partners; access to the platform in a shared environment; and using dedicated Office 365 environments. "Google doesn't provide that deployment flexibility," Keitt says, and adds that Google for Work only supports multi-tenancy deployments. Vanessa Thompson, research vice president at IDC (CIO.com and IDC are both owned by IDG Communications), says both platforms are gaining momentum. "As the level of comfort for cloud-based solutions in general increases, there will be uplift across both solutions."


Software-as-a-Service: What businesses need to know

Software-as-a-Service (SaaS) is a new distribution model that is rapidly gaining popularity with businesses all over the world. A branch of cloud computing, SaaS lets businesses and consumers lease a particular piece of software from a third-party supplier, who delivers it over a network connection – most commonly the Internet. As with other examples of cloud computing, this provides a number of benefits in terms of flexibility, scalability and affordability, which is why it is hardly surprising that many businesses have been willing to embrace SaaS. ... The fact that businesses are no longer purchasing their software outright, as they did with previous distribution models, is mirrored by the growth of other cloud sectors and, indeed, other industries. Resource sharing is gaining more traction in both business and consumer markets, enabling much greater efficiencies to be achieved.



Quote for the day:


"You can't think your way out of a box; you've got to act." -- Tom Peters


December 15, 2015

Still Dreaming of the Paperless Office?

Going paper-free means putting an on-going strategy in place, which also encompasses technology, to ensure the project does not stall. This is where the IT department can step up to the plate as it understands the solutions available and can prioritize departments to move forward first, such as those driven by regulatory change, for example. By moving through departments in a chain reaction, an efficient digital transformation program can be put in place. ... We have to be realistic. Going paper free isn’t going to happen today, or even tomorrow. But there are steps that companies can take now to start the digital transformation process. Believe me your competition will be thinking about it even if they haven’t taken the plunge, so don’t get behind the curve.


6 Game-Changing Social Media Trends for 2016 – The Influencer’s View

Social media will be at our fingertips, and people will be more connected than ever. Gemio, a wearable bracelet being delivered to market in spring, 2016, aims to connect tweens and teens both in person by locating other friends wearing the tech, and on the related social app. ... Consumers are simply drowning in content and it’s being perceived by many as just noise with little attention being paid. In order to overcome the apathy towards content, marketers are going to have to ensure that the content they produce in 2016 is clearly targeted and personalized to address not only the overall customer experience, but each one of the points along the buyer’s journey up to the purchase and beyond to realize life-time customer value.


The Vital Role CIOs Play in Bottom-Line Growth

While the CIO’s role remains tied to technology, that technology is far from fixed. Just in the past few years, we’ve seen the increasing use of such developments as cloud computing, big data analytics, BYOD, and even more. Unlike in past decades, these technologies have the potential to affect every person within the organization, not just in what they do for their jobs but how they perform them. This is by no means a light responsibility for CIOs. To effectively make these types of decisions, CIOs need to be more in tune with the business objectives of their organizations than ever before. That requires CIOs to be a valuable player on the executive board, a credible voice that fellow executives will listen to. CIOs also need to learn the best ways to explain their ideas to those who may not be intimately familiar with new technological concepts.


A requiem for Yahoo

Things only got worse when Yahoo started cycling through CEOs—and CEO scandals—like most people change underwear. I got renewed hope when Google exec Marissa Meyer took over in 2012, but her tone-deaf moves to restrict telecommuting even as she installed a nursery in her own office didn't help. More to the point, she hasn't managed to deliver the turnaround she promised when she took the job.  Still, I'd love to see Yahoo return to its former glory, but it's hard to imagine exactly how that's going to happen. The company still enjoys massive traffic to its sites and services, but they're no longer considered cutting-edge. With big-ticket hirings like David Pogue and Katie Couric, Yahoo is now a media company, and a pretty mainstream one at that.


Advanced Security Service Insertion in OpenStack Cloud

OpenStack security groups offer a first line of defense for securing east-west traffic — that is, traffic between virtual machines. The OpenStack Firewall-as-a-Service (FWaaS) plugin can help you configure firewall rules and policies on firewalls or Intrusion Prevention Systems (IPS). Unfortunately, these simpler solutions come with some limitations: security groups operate at the instance level, and FWaaS works on virtual routers within a project. The way FWaaS is currently implemented in OpenStack, a single set of rules is applied to all virtual routers on all subnets, which limits their flexibility and capabilities, thereby preventing companies from the deployment of enterprise-critical production workloads.


Data Center Trends – Are You A Gate Keeper or the Leader of a Business Critical Function

Owning the entire data center stack means that you can affect change without disruption. It also means that you can establish metrics for efficiency and performance at all levels of the stack, from energy input to work output. You can establish metrics because you now have visibility into all parts of what makes the system that is a data center work. Not only do you have visibility, but you have the ability to more easily cross train, to implement more effective change management, and you can do much better long range maintenance planning. ... With top down ownership for the DC Stack the DCO is able to more effectively work with the entire executive team to define a strategic data center ownership document for the company.


How organizational agility will save and destroy your company

Organizational agility is talked about a lot. Indeed, in recognition that industries are changing fast, many organizations have agility in one form or another as a bullet in their corporate strategy. But if you look at most organizations, it just isn't making the huge difference that the pundits claim it will. Why is that? Business agility is hard to attain. ... These elements are compounding. Meaning, if you have a change in market segmentation or new market creation and your underlying technology changes, your organization has to adapt to both changes simultaneously, compounding the complexity of the change and making it all the more important that your organization is nimble.


Couchbase 4.1 delivers greatly-enhanced SQL capabilities

Beyond SQL support per se, Couchbase now supports the mainstream RDBMS concepts of covering indexes and prepared statements. Covering indexes allow a DBA or dev to create an index on a combination of columns in a database table that match the sort order and/or filtering criteria used in frequently-occurring queries, often underlying reports. Such indexes allow the queries to run much more quickly. ... For queries that are run frequently, this can mean a big performance boost. Combined with support for covering indexes, the prepared statement capability makes Couchbase much faster for frequently-run queries. In fact, Couchbase says customers can expect "2-3x Faster Query Performance."


Nuance tames IoT interface woes with new developer tools

Using an application-specific interaction model will help create better products. IoT devices don't need to recognize the entire range of English speech, just a subset of commands tied into what the device is supposed to do.  Once developers have a model set up, it can then learn from users' speech patterns to improve and morph based on how people actually operate a product. Developers are in complete control over what anonymized speech data is fed back into their models, too.  According to Kenn Harper, the senior director of mobile devices at Nuance, Mix will eventually be available in multiple pricing tiers, including one that allows developers to just pay as they go for what they need with minimal support, and another that includes a higher level of partnership between Nuance and an end customer.


IBM's Watson Taps APIs, Learning Centers For IoT Expansion

"One of Watson's strengths is its scale," Karns said. It can handle multiple streams of data, sorting out the correlations as needed. For instance, when IoT sensors are used with operating machinery or systems they will generate hundreds of megabytes per second of status data that must be monitored and analyzed. IBM's new Watson IoT announcements build on developments earlier this year. In March the company announced a plan to invest more than $3 billionover the next four years to build a dedicated IoT business unit staffed by more than 2,000 consultants, researchers, and developers. In October IBM announced plans to acquire most of the assets of The Weather Company, and said it would use many of those components to create a foundation for its IoT cognitive computing efforts, and as parts of the company's Insight cloud services.



Quote for the day:


"Nothing so conclusively proves a man's ability to lead others as what he does from day to day to lead himself." -- Thomas J. Watson


December 14, 2015

Why high IT talent turnover is your fault

Just 32 percent of IT leaders and 41 percent of IT professionals say their organization has a clearly articulated employee value proposition (EVP), which goes beyond compensation to take into account all of the elements a company has to offer its employees-not just compensation, but also opportunities for career development, career path progressing and succession planning, work-life balance, culture and other company differentiators, Hayman says, but many don't look beyond compensation and vacation time. It is surprising that a higher level of IT professionals feel an EVP has been articulated - leading to the possible conclusion that IT professionals limit their definition of an EVP to compensation and benefits while discounting other factors.


The advent of the citizen developer

The inability of the average business user to somehow mold software into solutions that meet their unique needs in the moment has become a 'holy grail' of several generations of companies attempting to solve the problem -- rapid application development (RAD) two decades ago and then model-driven development and enterprise mashups about decade ago. Lack of ability to directly shape applications to meet users ongoing needs has thus been long-standing, even pernicious, issue that actively holds back the tech enablement. I'd even argue this is impeding the strategic progress of enterprise-wide digital transformation, which IDC says will be a top goal of the majority of organizations in 2016, as existing IT departments are insufficiently sized and resourced to fully digitize the contemporary organization.


BFF @ SoundCloud

One of BFF characteristics is that it eliminates any direct calls outside of the perimeter to the downstream services. Implementation of this pattern also enabled a minimal invasive migration towards microservice-based architecture, as the BFF hid any underlying changes from the application itself. New features went through the BFF, which then called either the new microservice or the monolith. Whenever further functionality got extracted out of the monolith, the BFF was changed, while the app code remained the same. One can see a similarity to the strangler pattern, where the BFF is strangling the public API offered by the monolith.


Use DeployImage Module and PowerShell to Build a Nano Server: Part 1

Nano Server jumps to a whole new level of server management. There is no GUI on the server. All management is done 100% via Remote Server Administration Tools (RSAT) and Windows PowerShell remoting. Here’s the tricky part…Nano Server is really new. It’s still in testing along with Windows Server 2016. In fact, it’s so that new the installer is a couple of PowerShell scripts and instructions on TechNet with a very long and detailed article about how to set up and deploy it. With all this in mind, I went about writing a sample script to deploy it to a partition structure in a virtual machine. It worked quite well, but a little bird tapped me on the shoulder and suggested flipping it into a module to allow for easy consumption in the PowerShell Gallery.


Digital Transformation is Different for Every Business

The goal of a digital transformation is to bring everyone, from the consumer to the account manager, up to speed with relevant, technology-driven solutions that facilitate business processes. If you think about whothe transformation will primarily affect, it makes sense that those are the areas a business should look to for inspiration. However, businesses tend to look to outside consultants, media reports, and other 3rdparty sources first. The resulting information provided may be helpful to a company, but it may not address the problems their employees and customers face on a daily basis. Businesses can overcome these obstacles by approaching the digital transformation from a place of innovation and openness. The process should highlight the culture of a company and strengthen business teams with a common goal.


Effective IT service brokers look beyond the data center

Cloud computing should be used for new workloads -- and in most IT shops, it is. A Gartner survey of enterprises has found that 70-80% of platform-as-a-service and infrastructure-as-a-service is "net new," Bittman said. Cloud often enters the equation as part of data center modernization plans. "Not everything traditional will be modernized," he said, but when it is modernized it is often called private cloud with automatic provisioning and self-service functions. IT shops should use cloud services for things their team doesn't manage well, so they can focus on providing IT services to their customers. In this scenario, IT becomes an intermediary -- or broker -- between the customer, the data center and the cloud service providers, Bittman said. Some IT pros here said they foresee a shift toward IT broker roles, and others already play the part.


Cyberfraud: a not so silent threat

Protecting against fraudulent online transactions on the side of financial institutions is saving both their own reputation along with other people’s money. Previous studies have shown that customers sometimes take little care in the security of their own online payments, expecting the banks to provide such protection as well as reimburse them their losses. About 28% of users of payment services do not bother to check if the site of a bank is real or fake, 34% of the users connect to public wireless networks on devices that do not have security solutions installed at all. The most typical situation is when a person needs to make an urgent online transaction – not having time to think about what type of connection is being used and how to make it more secure.


Open-source security: Can OpenStack really protect your cloud data?

OpenStack is relatively new code. Therefore is likely to contain numerous software vulnerabilities and implementation issues, which continue to be uncovered by the OpenStack community. However with specific portals and projects devised to tackle emerging security issues head on, it the OpenStack community appears to be taking security concerns quite seriously. At the highest-level, general implementation-based vulnerabilities do exist such as clear text RPC communications and the use of plaintext passwords in some of the authentication files. In addition to this, the reliance of OpenStack on other components can pose an issue. For example, if your team were to use an old version of OpenSSL that suffers from Heartbleed, your organisation’s OpenStack implementation may be affected as well.


How Cloud, APIs Are Transforming Outsourcing

Upwork provides a platform for coordinating labor, but it doesn't offer much in the way of oversight capabilities. That's where Teamed.io comes in. "The way we manage this work is very different," said Bugayenko. "We are micro-task managers. We break down the big problem, which we're solving for the customer, into small pieces. And they we give these small tasks to a large number of people, sometimes 20 or 25 of them. Then our managers and our software enable the management of these micro-tasks, to make sure quality is high and the milestones are in place." Bugayenko is not a disinterested party here, but he claims his distributed approach produces better results than traditional outsourcing. "We have clients who are working with us and with traditional outsourcing as well, and they tell us that the difference is huge," he said.


Data Lake-as-a-Service: Big Data Processing and Analytics in the Cloud

A "Data Lake-as-a-Service" provides a pre-built cloud service that abstracts the complexity of the underlying platform and infrastructure layers, so a company can use a data lake without having to install or maintain the technology themselves. This category is emerging, so the specific software and services provided by vendors varies greatly. Common capabilities generally include automated provisioning, scalable data storage, varying levels of analytic functions and a simplified interface for management. Beyond those, Data Lake-as-a-Service providers can differ greatly, with different features catered to different use cases. For example, Cazena's Data Lake-as-a-Service includes end-to-end security, with data movers that make it simple to encrypt, move and load data into the cloud.



Quote for the day:


"Great things are not something accidental, but must certainly be willed." -- Vincent van Gogh


December 13, 2015

Cyberattacks will compromise 1-in-3 healthcare records next year

"Frankly, healthcare data is really valuable from a cyber criminal standpoint. It could be 5, 10 or even 50 times more valuable than other forms of data," said Lynne Dunbrack, research vice president for IDC's Health Insights. Not only do healthcare records often have Social Security and credit card numbers, but they are also used by criminals to file fraudulent medical claims and to get medications to resell. Healthcare fraud costs the industry from $74 billion to $247 billion a year in the U.S., according to FBI statistics. Fraudulent billing represents between 3% and 10% of healthcare expenditures in the U.S. each year, Dunbrack said.


China Wants to Replace Millions of Workers with Robots

A more comprehensive effort to upgrade China’s manufacturing base is already underway, under a program announced in May known as Made in China 2025, which aims to make China an innovative and green “world manufacturing power” by that year. The effort involves adding connectivity and intelligence to manufacturing equipment and factories, to improve overall flexibility and efficiency. It was inspired by Germany’s Industry 4.0 effort, launched in 2011, and by similar efforts to promote more advanced manufacturing in the U.S. The robotic component of this overhaul will be about more than just installing more robots in manufacturing plants, however.


Pixel C deep-dive review: A terrific tablet that tries to be more

At its core, the Pixel C is a 10.2-in. tablet -- and in that regard, it's a pleasure to use. The metal casing feels smooth and luxurious under your fingers. At 1.1 lb., it isn't the lightest tablet around, but it seems strong and sturdy and is quite comfortable to hold (using two hands, which is pretty much par for the course with a device of this size). The slate is relatively thin, too, at 0.28 in. -- a touch slimmer than Apple's original iPad Air and just four-hundredths of an inch thicker than the newer iPad Air 2. Staying true to the Pixel name, the Pixel C's display is gorgeous -- a 2560 x 1800 LCD panel that's impossibly crisp and detailed. It's super bright, too, to the point that I've actually found myself using it at the lowest possible brightness setting most of the time.


Prioritize your optimization ideas and build a roadmap

Your prioritization criteria should be customized to your company’s unique business goals and your access to resources. Our suggested framework for evaluating test ideas breaks them down into two key components: impact and effort. By analyzing experiments by impact and effort, you methodically weigh the potential return on investment (ROI) of each test and campaign. ... Ultimately, the criteria you use to prioritize your ideas will depend on your particular program’s goals and resources. If your team is technically savvy but low on design resources, you might set up tests easily but have trouble getting mockups.


5 Tips to Get Stakeholders to Like—Even Love—Your Product Roadmap

Evidence is far more compelling than your opinion. Your stakeholders are less interested to hear about what you think than about what you’ve proven. So one of the first steps in making sure all of your teams, including executives, are in agreement with your product strategy is to bring them evidence of why the strategy makes sense. That could be a video of your customers discussing or using your product, user analytics, direct customer quotes or requests, etc.—but it needs to be evidence, not speculation. It also needs to align with your product vision and goals. ... You can quantify many of the ways your product helps your customers—more money your customers can make, time it can save them each day or month or year, etc.


Why SaaS Is the Key to Maintaining a Bimodal Approach to IT

"Bimodal IT is not two-speed," he said. "It's about Samurais and ninjas. You don't want an army of ninjas because it would be too chaotic, and you don't want your innovation done by Samurais because it would be too boring. "The end game is to recognize who your Samurais are and who are your ninjas and have them working together." ... Despite its homonymity, SaaS isn’t about snappy fingers and fierce attitudes. It stands for ‘Software as a Service,’ and as Gartner defines it, is “software that is owned, delivered and managed remotely by one or more providers. “The provider delivers software based on one set of common code and data definitions that is consumed in a one-to-many model by all contracted customers at any time on a pay-for-use basis or as a subscription based on use metrics.”


Here’s What Developers Are Doing with Google’s AI Brain

Most recently, the Google Brain helped develop Smart Reply, a system that automatically recommends a quick response to messages in Gmail after it scans the text of an incoming message. The neural network technique used to develop Smart Reply was presented by Google researchers at the NIPS conference last year. Dean expects deep learning and machine learning to have a similar impact on many other companies. “There is a vast array of ways in which machine learning is influencing lots of different products and industries,” he said. For example, the technique is being tested in many industries that try to make predictions from large amounts of data, ranging from retail to insurance.


How to Monetize Your Customer Data

Companies need to start treating information as a corporate asset that generates tangible future benefits by applying infonomics principles. A term coined by Gartner, infonomics is an emerging theory and practice focused on quantifying information’s value and defining how to manage information as an enterprise asset. Although there’s increasing innovation, issues emerge in the areas of data ownership and data privacy. Regulations are fragmented across different industries and geographic regions and often fall behind technology changes. The public perception and threat of bad press from privacy breaches will most likely have more impact on companies than regulations.


Data Centers on the Edge: Streaming and IoT Reshape the Network

The demand for edge-centric content distribution represents a disruption to the geography of the data center business, which has historically been focused on major business markets, home to lots of customers, network exchanges and established business models. That’s all beginning to change, according to Compass’ Crosby, who says the data center industry must also rethink some of its common assumptions. “I think that in the very near future, the location of customers and the latency needs of the applications they need to support will determine where they want their data center(s) to be located,” said Crosby.


Secure Authentication for Public Wi-Fi

Public Wi-Fi networks, by their very nature, are a hotbed for silent cyber attacks, as a business's sophisticated security systems won't have any affect on them to protect users. Some may even say that breaching them is child's play, following reports of a seven-year-old successfully attacking one in less than 11 minutes.[2] Hotspots are more often than not left unencrypted, so information is openly presented, and without warning can be collected by hackers. By simply entering an email address - and some hotspots don't even ask for any user information to log on - millions of people can access the same networks. This giveaway of such a personal piece of information to a network that is so easy to access is terrifying and users need to consider where their data is being collected before handing it over.



Quote for the day:


"When data disproves a theory, a good scientist discards the theory and a poor one discards the data." -- Will Spencer